Fedora Linux 8783 Published by

The following security updates are available for Fedora Linux:

Fedora 40 Update: chromium-124.0.6367.118-1.fc40
Fedora 40 Update: kernel-6.8.8-300.fc40
Fedora 40 Update: libcoap-4.3.4a-2.fc40
Fedora 40 Update: rust-pythonize-0.21.1-1.fc40
Fedora 40 Update: matrix-synapse-1.105.1-1.fc40
Fedora 38 Update: kernel-6.8.8-100.fc38
Fedora 38 Update: rust-pythonize-0.21.1-1.fc38
Fedora 38 Update: matrix-synapse-1.105.1-1.fc38
Fedora 38 Update: python-pip-22.3.1-4.fc38
Fedora 38 Update: grub2-2.06-118.fc38
Fedora 39 Update: libcoap-4.3.4a-2.fc39
Fedora 39 Update: rust-pythonize-0.21.1-1.fc39
Fedora 39 Update: matrix-synapse-1.105.1-1.fc39
Fedora 39 Update: httpd-2.4.59-2.fc39



Fedora 40 Update: chromium-124.0.6367.118-1.fc40


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-5cf9499b62
2024-05-03 01:40:26.180654
--------------------------------------------------------------------------------

Name : chromium
Product : Fedora 40
Version : 124.0.6367.118
Release : 1.fc40
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

update to 124.0.6367.118
* High CVE-2024-4331: Use after free in Picture In Picture
* High CVE-2024-4368: Use after free in Dawn
update to 124.0.6367.91
update to 124.0.6367.78
* Critical CVE-2024-4058: Type Confusion in ANGLE
* High CVE-2024-4059: Out of bounds read in V8 API
* High CVE-2024-4060: Use after free in Dawn
--------------------------------------------------------------------------------
ChangeLog:

* Wed May 1 2024 Than Ngo [than@redhat.com] - 124.0.6367.118-1
- update to 124.0.6367.118
* High CVE-2024-4331: Use after free in Picture In Picture
* High CVE-2024-4368: Use after free in Dawn
- use system highway
* Sat Apr 27 2024 Than Ngo [than@redhat.com] - 124.0.6367.91-1
- update to 124.0.6367.91
- fixed bz#2277228 - chromium wrapper causes library issues (symbol lookup error)
- use system dav1d
* Wed Apr 24 2024 Than Ngo [than@redhat.com] - 124.0.6367.78-1
- update to 124.0.6367.78
* Critical CVE-2024-4058: Type Confusion in ANGLE
* High CVE-2024-4059: Out of bounds read in V8 API
* High CVE-2024-4060: Use after free in Dawn
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2275548 - CVE-2024-3833 CVE-2024-3834 CVE-2024-3837 CVE-2024-3839 CVE-2024-3840 CVE-2024-3841 CVE-2024-3843 CVE-2024-3844 CVE-2024-3845 CVE-2024-3846 CVE-2024-3847 chromium: various flaws [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2275548
[ 2 ] Bug #2275815 - CVE-2024-3914 chromium: chromium-browser: use after free in V8 [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2275815
[ 3 ] Bug #2276890 - CVE-2024-4058 chromium: chromium-browser: Type Confusion in ANGLE [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2276890
[ 4 ] Bug #2276891 - CVE-2024-4058 chromium: chromium-browser: Type Confusion in ANGLE [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2276891
[ 5 ] Bug #2277228 - chromium wrapper causes library issues (symbol lookup error)
https://bugzilla.redhat.com/show_bug.cgi?id=2277228
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-5cf9499b62' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 40 Update: kernel-6.8.8-300.fc40


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-010fe8772a
2024-05-03 01:40:26.180628
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 40
Version : 6.8.8
Release : 300.fc40
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 6.8.8 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Apr 27 2024 Justin M. Forbes [jforbes@fedoraproject.org] [6.8.8-0]
- Update BugsFixed for 6.8.8 (Justin M. Forbes)
- Turn on ISM for Fedora (Justin M. Forbes)
- Turn off some Fedora UBSAN options to avoid false positives (Justin M. Forbes)
- fedora: aarch64: Enable a QCom Robotics platforms requirements (Peter Robinson)
- Turn on UBSAN for Fedora (Justin M. Forbes)
- Linux v6.8.8
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #126342 - Meta bug: custom built kernels
https://bugzilla.redhat.com/show_bug.cgi?id=126342
[ 2 ] Bug #2276666 - CVE-2024-26922 kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2276666
[ 3 ] Bug #2277155 - Fedora 39 - Device Driver for ISM not configured in kernel
https://bugzilla.redhat.com/show_bug.cgi?id=2277155
[ 4 ] Bug #2277170 - CVE-2024-26924 kernel: netfilter: nft_set_pipapo: do not free live element [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2277170
[ 5 ] Bug #2278253 - CVE-2024-27022 kernel: fork: defer linking file vma until vma is fully initialized [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278253
[ 6 ] Bug #2278255 - CVE-2024-27021 kernel: r8169: fix LED-related deadlock on module removal [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278255
[ 7 ] Bug #2278257 - CVE-2024-27020 kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278257
[ 8 ] Bug #2278259 - CVE-2024-27019 kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278259
[ 9 ] Bug #2278261 - CVE-2024-27018 kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278261
[ 10 ] Bug #2278263 - CVE-2024-27017 kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278263
[ 11 ] Bug #2278265 - CVE-2024-27016 kernel: netfilter: flowtable: validate pppoe header [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278265
[ 12 ] Bug #2278267 - CVE-2024-27015 kernel: netfilter: flowtable: incorrect pppoe tuple [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278267
[ 13 ] Bug #2278269 - CVE-2024-27014 kernel: net/mlx5e: Prevent deadlock while disabling aRFS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278269
[ 14 ] Bug #2278271 - CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278271
[ 15 ] Bug #2278276 - CVE-2024-27012 kernel: netfilter: nf_tables: restore set elements when delete set fails [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278276
[ 16 ] Bug #2278278 - CVE-2024-27011 kernel: netfilter: nf_tables: fix memleak in map from abort path [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278278
[ 17 ] Bug #2278280 - CVE-2024-27010 kernel: net/sched: Fix mirred deadlock on device recursion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278280
[ 18 ] Bug #2278282 - CVE-2024-27009 kernel: s390/cio: fix race condition during online processing [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278282
[ 19 ] Bug #2278284 - CVE-2024-27008 kernel: drm: nv04: Fix out of bounds access [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278284
[ 20 ] Bug #2278286 - CVE-2024-27007 kernel: userfaultfd: change src_folio after ensuring it's unpinned in UFFDIO_MOVE [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278286
[ 21 ] Bug #2278288 - CVE-2024-27006 kernel: thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278288
[ 22 ] Bug #2278290 - CVE-2024-27005 kernel: interconnect: Don't access req_list while it's being manipulated [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278290
[ 23 ] Bug #2278292 - CVE-2024-27004 kernel: clk: Get runtime PM before walking tree during disable_unused [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278292
[ 24 ] Bug #2278294 - CVE-2024-27003 kernel: clk: Get runtime PM before walking tree for clk_summary [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278294
[ 25 ] Bug #2278296 - CVE-2024-27002 kernel: clk: mediatek: Do a runtime PM get on controllers during probe [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278296
[ 26 ] Bug #2278298 - CVE-2024-27001 kernel: comedi: vmk80xx: fix incomplete endpoint checking [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278298
[ 27 ] Bug #2278300 - CVE-2024-27000 kernel: serial: mxs-auart: add spinlock around changing cts state [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278300
[ 28 ] Bug #2278302 - CVE-2024-26999 kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278302
[ 29 ] Bug #2278304 - CVE-2024-26998 kernel: serial: core: Clearing the circular buffer before NULLifying it [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278304
[ 30 ] Bug #2278309 - CVE-2024-26996 kernel: usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278309
[ 31 ] Bug #2278311 - CVE-2024-26995 kernel: usb: typec: tcpm: Correct the PDO counting in pd_set [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278311
[ 32 ] Bug #2278313 - CVE-2024-26994 kernel: speakup: Avoid crash on very long word [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278313
[ 33 ] Bug #2278315 - CVE-2024-26993 kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278315
[ 34 ] Bug #2278317 - CVE-2024-26992 kernel: KVM: x86/pmu: Disable support for adaptive PEBS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278317
[ 35 ] Bug #2278319 - CVE-2024-26991 kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278319
[ 36 ] Bug #2278321 - CVE-2024-26990 kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278321
[ 37 ] Bug #2278323 - CVE-2024-26989 kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278323
[ 38 ] Bug #2278325 - CVE-2024-26988 kernel: init/main.c: Fix potential static_command_line memory overflow [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278325
[ 39 ] Bug #2278328 - CVE-2024-26987 kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278328
[ 40 ] Bug #2278330 - CVE-2024-26986 kernel: drm/amdkfd: Fix memory leak in create_process failure [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278330
[ 41 ] Bug #2278332 - CVE-2024-26985 kernel: drm/xe: Fix bo leak in intel_fb_bo_framebuffer_init [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278332
[ 42 ] Bug #2278334 - CVE-2024-26984 kernel: nouveau: fix instmem race condition around ptr stores [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278334
[ 43 ] Bug #2278336 - CVE-2024-26983 kernel: bootconfig: use memblock_free_late to free xbc memory to buddy [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278336
[ 44 ] Bug #2278338 - CVE-2024-26982 kernel: Squashfs: check the inode number is not the invalid value of zero [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278338
[ 45 ] Bug #2278340 - CVE-2024-26981 kernel: nilfs2: fix OOB in nilfs_set_de_type [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278340
[ 46 ] Bug #2278342 - CVE-2024-26980 kernel: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278342
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-010fe8772a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 40 Update: libcoap-4.3.4a-2.fc40


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-75863445ff
2024-05-03 01:40:26.180521
--------------------------------------------------------------------------------

Name : libcoap
Product : Fedora 40
Version : 4.3.4a
Release : 2.fc40
URL : https://libcoap.net/
Summary : C library implementation of CoAP
Description :
The Constrained Application Protocol (CoAP) is a specialized web transfer
protocol for use with constrained nodes and constrained networks in the Internet
of Things. The protocol is designed for machine-to-machine (M2M) applications
such as smart energy and building automation.

libcoap implements a lightweight application-protocol for devices with
constrained resources such as computing power, RF range, memory, bandwidth,
or network packet sizes. This protocol, CoAP, was standardized in the IETF
working group "CoRE" as RFC 7252.

--------------------------------------------------------------------------------
Update Information:

Patch to fix CVE-2024-31031
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 24 2024 Peter Robinson [pbrobinson@fedoraproject.org] - 4.3.4a-2
- Patch to fix CVE-2024-31031
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2275804 - CVE-2024-31031 libcoap: unsigned integer overflow vulnerability in coap_pdu.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2275804
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-75863445ff' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 40 Update: rust-pythonize-0.21.1-1.fc40


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-3ff83cb806
2024-05-03 01:40:26.180434
--------------------------------------------------------------------------------

Name : rust-pythonize
Product : Fedora 40
Version : 0.21.1
Release : 1.fc40
URL : https://crates.io/crates/pythonize
Summary : Serde Serializer & Deserializer from Rust Python, backed by PyO3
Description :
Serde Serializer & Deserializer from Rust Python, backed by PyO3.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 0.21.1-1
- Update to v0.21.1
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-3ff83cb806' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 40 Update: matrix-synapse-1.105.1-1.fc40


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-3ff83cb806
2024-05-03 01:40:26.180434
--------------------------------------------------------------------------------

Name : matrix-synapse
Product : Fedora 40
Version : 1.105.1
Release : 1.fc40
URL : https://github.com/element-hq/synapse
Summary : A Matrix reference homeserver written in Python using Twisted
Description :
Matrix is an ambitious new ecosystem for open federated Instant Messaging and
VoIP. Synapse is a reference "homeserver" implementation of Matrix from the
core development team at matrix.org, written in Python/Twisted. It is intended
to showcase the concept of Matrix and let folks see the spec in the context of
a coded base and let you run your own homeserver and generally help bootstrap
the ecosystem.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.1-1
- Update to v1.105.1 (CVE-2024-31208)
* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-2
- Update pyo3 to v0.21.1
* Wed Apr 17 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-1
- Update to v1.105.0
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-3ff83cb806' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 38 Update: kernel-6.8.8-100.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-f35f9525d6
2024-05-03 01:33:51.377673
--------------------------------------------------------------------------------

Name : kernel
Product : Fedora 38
Version : 6.8.8
Release : 100.fc38
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package

--------------------------------------------------------------------------------
Update Information:

The 6.8.8 stable kernel update contains a number of important fixes across the
tree.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Apr 27 2024 Justin M. Forbes [jforbes@fedoraproject.org] [6.8.8-100]
- Revert "cpupower: Bump soname version" (Justin M. Forbes)
- Drop soname for libcpupower.so since we reverted the bump (Justin M. Forbes)
* Sat Apr 27 2024 Justin M. Forbes [jforbes@fedoraproject.org] [6.8.8-0]
- Update BugsFixed for 6.8.8 (Justin M. Forbes)
- Turn on ISM for Fedora (Justin M. Forbes)
- Turn off some Fedora UBSAN options to avoid false positives (Justin M. Forbes)
- fedora: aarch64: Enable a QCom Robotics platforms requirements (Peter Robinson)
- Turn on UBSAN for Fedora (Justin M. Forbes)
- Linux v6.8.8
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2276666 - CVE-2024-26922 kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2276666
[ 2 ] Bug #2277155 - Fedora 39 - Device Driver for ISM not configured in kernel
https://bugzilla.redhat.com/show_bug.cgi?id=2277155
[ 3 ] Bug #2277170 - CVE-2024-26924 kernel: netfilter: nft_set_pipapo: do not free live element [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2277170
[ 4 ] Bug #2278253 - CVE-2024-27022 kernel: fork: defer linking file vma until vma is fully initialized [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278253
[ 5 ] Bug #2278255 - CVE-2024-27021 kernel: r8169: fix LED-related deadlock on module removal [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278255
[ 6 ] Bug #2278257 - CVE-2024-27020 kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278257
[ 7 ] Bug #2278259 - CVE-2024-27019 kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278259
[ 8 ] Bug #2278261 - CVE-2024-27018 kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278261
[ 9 ] Bug #2278263 - CVE-2024-27017 kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278263
[ 10 ] Bug #2278265 - CVE-2024-27016 kernel: netfilter: flowtable: validate pppoe header [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278265
[ 11 ] Bug #2278267 - CVE-2024-27015 kernel: netfilter: flowtable: incorrect pppoe tuple [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278267
[ 12 ] Bug #2278269 - CVE-2024-27014 kernel: net/mlx5e: Prevent deadlock while disabling aRFS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278269
[ 13 ] Bug #2278271 - CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278271
[ 14 ] Bug #2278276 - CVE-2024-27012 kernel: netfilter: nf_tables: restore set elements when delete set fails [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278276
[ 15 ] Bug #2278278 - CVE-2024-27011 kernel: netfilter: nf_tables: fix memleak in map from abort path [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278278
[ 16 ] Bug #2278280 - CVE-2024-27010 kernel: net/sched: Fix mirred deadlock on device recursion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278280
[ 17 ] Bug #2278282 - CVE-2024-27009 kernel: s390/cio: fix race condition during online processing [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278282
[ 18 ] Bug #2278284 - CVE-2024-27008 kernel: drm: nv04: Fix out of bounds access [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278284
[ 19 ] Bug #2278286 - CVE-2024-27007 kernel: userfaultfd: change src_folio after ensuring it's unpinned in UFFDIO_MOVE [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278286
[ 20 ] Bug #2278288 - CVE-2024-27006 kernel: thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278288
[ 21 ] Bug #2278290 - CVE-2024-27005 kernel: interconnect: Don't access req_list while it's being manipulated [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278290
[ 22 ] Bug #2278292 - CVE-2024-27004 kernel: clk: Get runtime PM before walking tree during disable_unused [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278292
[ 23 ] Bug #2278294 - CVE-2024-27003 kernel: clk: Get runtime PM before walking tree for clk_summary [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278294
[ 24 ] Bug #2278296 - CVE-2024-27002 kernel: clk: mediatek: Do a runtime PM get on controllers during probe [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278296
[ 25 ] Bug #2278298 - CVE-2024-27001 kernel: comedi: vmk80xx: fix incomplete endpoint checking [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278298
[ 26 ] Bug #2278300 - CVE-2024-27000 kernel: serial: mxs-auart: add spinlock around changing cts state [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278300
[ 27 ] Bug #2278302 - CVE-2024-26999 kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278302
[ 28 ] Bug #2278304 - CVE-2024-26998 kernel: serial: core: Clearing the circular buffer before NULLifying it [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278304
[ 29 ] Bug #2278309 - CVE-2024-26996 kernel: usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278309
[ 30 ] Bug #2278311 - CVE-2024-26995 kernel: usb: typec: tcpm: Correct the PDO counting in pd_set [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278311
[ 31 ] Bug #2278313 - CVE-2024-26994 kernel: speakup: Avoid crash on very long word [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278313
[ 32 ] Bug #2278315 - CVE-2024-26993 kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278315
[ 33 ] Bug #2278317 - CVE-2024-26992 kernel: KVM: x86/pmu: Disable support for adaptive PEBS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278317
[ 34 ] Bug #2278319 - CVE-2024-26991 kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278319
[ 35 ] Bug #2278321 - CVE-2024-26990 kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278321
[ 36 ] Bug #2278323 - CVE-2024-26989 kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278323
[ 37 ] Bug #2278325 - CVE-2024-26988 kernel: init/main.c: Fix potential static_command_line memory overflow [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278325
[ 38 ] Bug #2278328 - CVE-2024-26987 kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278328
[ 39 ] Bug #2278330 - CVE-2024-26986 kernel: drm/amdkfd: Fix memory leak in create_process failure [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278330
[ 40 ] Bug #2278332 - CVE-2024-26985 kernel: drm/xe: Fix bo leak in intel_fb_bo_framebuffer_init [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278332
[ 41 ] Bug #2278334 - CVE-2024-26984 kernel: nouveau: fix instmem race condition around ptr stores [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278334
[ 42 ] Bug #2278336 - CVE-2024-26983 kernel: bootconfig: use memblock_free_late to free xbc memory to buddy [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278336
[ 43 ] Bug #2278338 - CVE-2024-26982 kernel: Squashfs: check the inode number is not the invalid value of zero [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278338
[ 44 ] Bug #2278340 - CVE-2024-26981 kernel: nilfs2: fix OOB in nilfs_set_de_type [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278340
[ 45 ] Bug #2278342 - CVE-2024-26980 kernel: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2278342
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-f35f9525d6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 38 Update: rust-pythonize-0.21.1-1.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-7be0693731
2024-05-03 01:33:51.377585
--------------------------------------------------------------------------------

Name : rust-pythonize
Product : Fedora 38
Version : 0.21.1
Release : 1.fc38
URL : https://crates.io/crates/pythonize
Summary : Serde Serializer & Deserializer from Rust Python, backed by PyO3
Description :
Serde Serializer & Deserializer from Rust Python, backed by PyO3.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 0.21.1-1
- Update to v0.21.1
* Fri Jan 26 2024 Fedora Release Engineering [releng@fedoraproject.org] - 0.20.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-7be0693731' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 38 Update: matrix-synapse-1.105.1-1.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-7be0693731
2024-05-03 01:33:51.377585
--------------------------------------------------------------------------------

Name : matrix-synapse
Product : Fedora 38
Version : 1.105.1
Release : 1.fc38
URL : https://github.com/element-hq/synapse
Summary : A Matrix reference homeserver written in Python using Twisted
Description :
Matrix is an ambitious new ecosystem for open federated Instant Messaging and
VoIP. Synapse is a reference "homeserver" implementation of Matrix from the
core development team at matrix.org, written in Python/Twisted. It is intended
to showcase the concept of Matrix and let folks see the spec in the context of
a coded base and let you run your own homeserver and generally help bootstrap
the ecosystem.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.1-1
- Update to v1.105.1 (CVE-2024-31208)
* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-2
- Update pyo3 to v0.21.1
* Wed Apr 17 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-1
- Update to v1.105.0
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-7be0693731' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 38 Update: python-pip-22.3.1-4.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-600031d2e9
2024-05-03 01:33:51.377571
--------------------------------------------------------------------------------

Name : python-pip
Product : Fedora 38
Version : 22.3.1
Release : 4.fc38
URL : https://pip.pypa.io/
Summary : A tool for installing and managing Python packages
Description :
pip is a package management system used to install and manage software packages
written in Python. Many packages can be found in the Python Package Index
(PyPI). pip is a recursive acronym that can stand for either "Pip Installs
Packages" or "Pip Installs Python".

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2023-5752
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 17 2024 Charalampos Stratakis [cstratak@redhat.com] - 22.3.1-4
- Security fix for CVE-2023-5752
Resolves: rhbz#2263291
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263291 - CVE-2023-5752 python-pip: pip: Mercurial configuration injectable in repo revision when installing via pip [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2263291
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-600031d2e9' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 38 Update: grub2-2.06-118.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-01f402fae5
2024-05-03 01:33:51.377526
--------------------------------------------------------------------------------

Name : grub2
Product : Fedora 38
Version : 2.06
Release : 118.fc38
URL : http://www.gnu.org/software/grub/
Summary : Bootloader with support for Linux, Multiboot and more
Description :

The GRand Unified Bootloader (GRUB) is a highly configurable and
customizable bootloader with modular architecture. It supports a rich
variety of kernel formats, file systems, computer architectures and
hardware devices.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2023-4692
Security fix for CVE-2023-4693
Fri Mar 08 2024 Nicolas Frayer nfrayer@redhat.com - 2.06-118
fs/xfs: Handle non-continuous data blocks in directory extents
Related: #2254370
Fri Mar 08 2024 Nicolas Frayer nfrayer@redhat.com - 2.06-117
GRUB2 NTFS driver vulnerabilities
(CVE-2023-4692)
(CVE-2023-4693)
Resolves: #2236613
Resolves: #2241978
Resolves: #2241976
Resolves: #2238343
--------------------------------------------------------------------------------
ChangeLog:

* Fri Mar 8 2024 Nicolas Frayer [nfrayer@redhat.com] - 2.06-118
- fs/xfs: Handle non-continuous data blocks in directory extents
- Related: #2254370
* Fri Mar 8 2024 Nicolas Frayer [nfrayer@redhat.com] - 2.06-117
- GRUB2 NTFS driver vulnerabilities
- (CVE-2023-4692)
- (CVE-2023-4693)
- Resolves: #2236613
- Resolves: #2241978
- Resolves: #2241976
- Resolves: #2238343
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2236613 - CVE-2023-4692 grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution
https://bugzilla.redhat.com/show_bug.cgi?id=2236613
[ 2 ] Bug #2238343 - CVE-2023-4693 grub2: out-of-bounds read at fs/ntfs.c
https://bugzilla.redhat.com/show_bug.cgi?id=2238343
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-01f402fae5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 39 Update: libcoap-4.3.4a-2.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-450b75e4a0
2024-05-03 01:25:18.628875
--------------------------------------------------------------------------------

Name : libcoap
Product : Fedora 39
Version : 4.3.4a
Release : 2.fc39
URL : https://libcoap.net/
Summary : C library implementation of CoAP
Description :
The Constrained Application Protocol (CoAP) is a specialized web transfer
protocol for use with constrained nodes and constrained networks in the Internet
of Things. The protocol is designed for machine-to-machine (M2M) applications
such as smart energy and building automation.

libcoap implements a lightweight application-protocol for devices with
constrained resources such as computing power, RF range, memory, bandwidth,
or network packet sizes. This protocol, CoAP, was standardized in the IETF
working group "CoRE" as RFC 7252.

--------------------------------------------------------------------------------
Update Information:

Patch to fix CVE-2024-31031
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 24 2024 Peter Robinson [pbrobinson@fedoraproject.org] - 4.3.4a-2
- Patch to fix CVE-2024-31031
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2275804 - CVE-2024-31031 libcoap: unsigned integer overflow vulnerability in coap_pdu.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2275804
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-450b75e4a0' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 39 Update: rust-pythonize-0.21.1-1.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-d408b654d6
2024-05-03 01:25:18.628867
--------------------------------------------------------------------------------

Name : rust-pythonize
Product : Fedora 39
Version : 0.21.1
Release : 1.fc39
URL : https://crates.io/crates/pythonize
Summary : Serde Serializer & Deserializer from Rust Python, backed by PyO3
Description :
Serde Serializer & Deserializer from Rust Python, backed by PyO3.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 0.21.1-1
- Update to v0.21.1
* Fri Jan 26 2024 Fedora Release Engineering [releng@fedoraproject.org] - 0.20.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-d408b654d6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 39 Update: matrix-synapse-1.105.1-1.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-d408b654d6
2024-05-03 01:25:18.628867
--------------------------------------------------------------------------------

Name : matrix-synapse
Product : Fedora 39
Version : 1.105.1
Release : 1.fc39
URL : https://github.com/element-hq/synapse
Summary : A Matrix reference homeserver written in Python using Twisted
Description :
Matrix is an ambitious new ecosystem for open federated Instant Messaging and
VoIP. Synapse is a reference "homeserver" implementation of Matrix from the
core development team at matrix.org, written in Python/Twisted. It is intended
to showcase the concept of Matrix and let folks see the spec in the context of
a coded base and let you run your own homeserver and generally help bootstrap
the ecosystem.

--------------------------------------------------------------------------------
Update Information:

Update matrix-synapse to v1.105.1 (CVE-2024-31208)
Update to v1.105.0
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.1-1
- Update to v1.105.1 (CVE-2024-31208)
* Tue Apr 23 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-2
- Update pyo3 to v0.21.1
* Wed Apr 17 2024 Kai A. Hiller [V02460@gmail.com] - 1.105.0-1
- Update to v1.105.0
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2263120 - matrix-synapse-1.105.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2263120
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-d408b654d6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--



Fedora 39 Update: httpd-2.4.59-2.fc39


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2024-d0dccd6b96
2024-05-03 01:25:18.628819
--------------------------------------------------------------------------------

Name : httpd
Product : Fedora 39
Version : 2.4.59
Release : 2.fc39
URL : https://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------
Update Information:

This update includes httpd version 2.4.59, fixing various security issues and
bugs. See https://downloads.apache.org/httpd/CHANGES_2.4.59 for complete details
of the changes in this release.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Apr 15 2024 Joe Orton [jorton@redhat.com] - 2.4.59-2
- mod_ssl: add DH param handling fix (r1916863)
* Fri Apr 5 2024 Joe Orton [jorton@redhat.com] - 2.4.59-1
- update to 2.4.59
* Thu Mar 28 2024 Joe Orton [jorton@redhat.com] - 2.4.58-8
- rebuild to fix changelog ordering
* Wed Jan 24 2024 Fedora Release Engineering [releng@fedoraproject.org] - 2.4.58-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Sat Jan 20 2024 Fedora Release Engineering [releng@fedoraproject.org] - 2.4.58-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Fri Jan 5 2024 Joe Orton [jorton@redhat.com] - 2.4.58-4
- fix OpenSSL 3.0 deprecation warnings (r1913912, r1915067)
- mod_ssl: move to provider API for pkcs11 support (#2253014)
* Fri Dec 8 2023 Joe Orton [jorton@redhat.com] - 2.4.58-3
- mod_dav_fs: add DAVLockDBType, use global lock around lockdb
- fix build with libxml2 2.12
* Thu Nov 2 2023 Joe Orton [jorton@redhat.com] - 2.4.58-2
- add dependency on apr-util-1(dbm) so a DBM provider is present
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2273491 - CVE-2023-38709 httpd: HTTP response splitting
https://bugzilla.redhat.com/show_bug.cgi?id=2273491
[ 2 ] Bug #2273499 - CVE-2024-24795 httpd: HTTP Response Splitting in multiple modules
https://bugzilla.redhat.com/show_bug.cgi?id=2273499
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-d0dccd6b96' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
--