yarnpkg-1.22.22-11.el9
- yarnpkg-1.22.22-11.el9
Apply fixes for CVE-2025-8262 and CVE-2025-7783.
Apply fixes for CVE-2025-8262 and CVE-2025-7783.
Backport fix for CVE-2025-53644.
Backport fix for CVE-2025-53644.
Update to release v28.3.3
Update to release v28.3.3
This update fixes these CVEs: CVE-2025-4948 CVE-2025-32908 CVE-2025-32907 CVE-2025-4969 CVE-2025-4945 CVE-2025-4476
This update fixes these CVEs: CVE-2025-4948 CVE-2025-32908 CVE-2025-32907 CVE-2025-4969 CVE-2025-4945 CVE-2025-4476
Security: This update includes fixes for CVE-2025-47905 aka VSV00016: A client-side desync vulnerability can be triggered in Varnish Cache. This vulnerability can be triggered under specific circumstances involving malformed HTTP/1 chunked requests.
Automatic update for libtiff-4.7.0-5.fc43.
Changelog * Tue Jul 29 2025 Michal Hlavinka <mhlavink@redhat.com> - 4.7.0-5 - fix CVE-2025-8177: buffer oveflow in thumbnail setrow when processing malformed TIFF (rhbz#2383827)This update contains fix for https://www.cve.org/CVERecord?id=CVE-2025-8194
This update contains fix for https://www.cve.org/CVERecord?id=CVE-2025-8194
This update contains fix for https://www.cve.org/CVERecord?id=CVE-2025-8194
This update contains fix for https://www.cve.org/CVERecord?id=CVE-2025-8194
Backports patch to fix non-CVE 2025-8224
Update to 1.70.3 and adopt go-vendor-tools
This update includes a backported fix for CVE-2025-2814 from upstream version 3.07, in which Crypt::URandom is used to read random bytes rather than falling back to Perl's insecure rand() function if using /dev/urandom directly wasn't possible.-
This update, to the current upstream release version, includes a fix to source random numbers using the Crypt::URandom module rather than trying to read /dev/urandom and falling back to Perl's insecure rand() function if /dev/urandom is not usable (CVE-2025-2814).
This update, to the current upstream release version, includes a fix to source random numbers using the Crypt::URandom module rather than trying to read /dev/urandom and falling back to Perl's insecure rand() function if /dev/urandom is not usable (CVE-2025-2814).
This update, to the current upstream release version, includes a fix to source random numbers using the Crypt::URandom module rather than trying to read /dev/urandom and falling back to Perl's insecure rand() function if /dev/urandom is not usable (CVE-2025-2814).