Fedora Linux Distribution - Page 476
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. -- https://www.genivia.com/advisory.html
Rebase to qpdf-7.1.1 because of CVEs
This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. -- https://www.genivia.com/advisory.html
This release includes the latest stable upstream release of mod_http2. The changes since the last update are: * fixes a race condition where aborting streams triggers an unnecessary timeout. * accurate reporting of h2 data input/output per request via mod_logio. Fixes an issue where output sizes where counted n-times on reused slave connections. See [issue
This release includes the latest stable upstream release of mod_http2. The changes since the last update are: * fixes a race condition where aborting streams triggers an unnecessary timeout. * accurate reporting of h2 data input/output per request via mod_logio. Fixes an issue where output sizes where counted n-times on reused slave connections. See [issue
Update to latest upstream release and security fix for CVE-2017-12626
Upstream announcement: Welcome to **phpMyAdmin 4.8.0.1**, which fixes a security flaw found in phpMyAdmin. This version fixes a security flaw found in version 4.8.0 where an attacker can manipulate a user in to following a specially-crafted link, allowing the attacker to execute arbitrary SQL commands on the server. For more information, please see
Update to latest upstream release and security fix for CVE-2017-12626
Upstream announcement: Welcome to **phpMyAdmin 4.8.0.1**, which fixes a security flaw found in phpMyAdmin. This version fixes a security flaw found in version 4.8.0 where an attacker can manipulate a user in to following a specially-crafted link, allowing the attacker to execute arbitrary SQL commands on the server. For more information, please see
**Version 1.6.4** - 2018-04-13 * Security fixes in some edge case scenarios, recommended update for all users * Fixed regression in version guessing of path repositories * Fixed removing aliased packages from the repository, which might resolve some odd update bugs * Fixed updating of package URLs for GitLab * Fixed run-script --list failing when script handlers were defined * Fixed
**Version 1.6.4** - 2018-04-13 * Security fixes in some edge case scenarios, recommended update for all users * Fixed regression in version guessing of path repositories * Fixed removing aliased packages from the repository, which might resolve some odd update bugs * Fixed updating of package URLs for GitLab * Fixed run-script --list failing when script handlers were defined * Fixed