suricata-8.0.4-1.el10_2
- suricata-8.0.4-1.el10_2
upstream bugfix/security release
upstream bugfix/security release
Upstream bugfix/security release
Upstream bugfix/security release
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
Update to 1.5.4. Fixes a buffer overflow caused by integer promotion rules in OFBMPImageFormatHandler and OFQOIImageFormatHandler.
Update to 1.5.3
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
Automatic update for perl-Crypt-PasswdMD5-1.4.3-1.fc45.
Changelog * Sat May 23 2026 Paul Howarth <paul@city-fan.org> - 1.4.3-1 - Update to 1.43 - Replace use of the cryptographically weak rand() function with the much stronger Crypt::URandom::urandom() (GH#3, CVE-2026-6659, rhbz#2479575) - Add Encode, Exporter, ExtUtils::MakeMaker to Makefile.PL - Add files AI_POLICY.md and SECURITY.md