Fedora Linux Distribution - Page 472
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updated Boost libraries are available that fix compatibility with CUDA 9.x compilers and fix a possible integer overflow in Boost.Regex.
Information leak via crafted user-supplied CDROM [XSA-258] (#1571867) x86: PV guest may crash Xen with XPTI [XSA-259] (#1571878)
Security fix for CVE-2018-1088 (Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled)
Information leak via crafted user-supplied CDROM [XSA-258] (#1571867) x86: PV guest may crash Xen with XPTI [XSA-259] (#1571878)
Security fix for CVE-2018-1088 (Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled)
This is an update to the latest upstream release, which disables the UDP port by default (CVE-2018-1000115).
This is an update to the latest upstream release, which disables the UDP port by default (CVE-2018-1000115).
This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. -- https://www.genivia.com/advisory.html
This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. -- https://www.genivia.com/advisory.html
Update to newer release of Tika including security fixes for CVE-2016-4434 and CVE-2016-6809.
The v4.16.4 update contains fixes across the tree
Update to newer release of Tika including security fixes for CVE-2016-4434 and CVE-2016-6809.
Security fix for [CVE-2018-10194](https://access.redhat.com/security/cve/cve-2018-10194).
New upstream release - This release fixes CVE-2018-1106 which is a moderate security issue.
Security fix for [CVE-2018-10194](https://access.redhat.com/security/cve/cve-2018-10194).
New upstream release - This release fixes CVE-2018-1106 which is a moderate security issue.
This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. -- https://www.genivia.com/advisory.html
Rebase to qpdf-7.1.1 because of CVEs