Fedora Linux 8783 Published by

A libksba security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: libksba-1.6.2-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-3ef41c3410
2022-10-25 13:12:34.597416
--------------------------------------------------------------------------------

Name : libksba
Product : Fedora 36
Version : 1.6.2
Release : 1.fc36
URL :   https://www.gnupg.org/
Summary : CMS and X.509 library
Description :
KSBA (pronounced Kasbah) is a library to make X.509 certificates as
well as the CMS easily accessible by other applications. Both
specifications are building blocks of S/MIME and TLS.

--------------------------------------------------------------------------------
Update Information:

New upstream release fixing CVE-2022-3515
--------------------------------------------------------------------------------
ChangeLog:

* Fri Oct 7 2022 Jakub Jelen - 1.6.2-1
- New upstream release (#2132953)
* Mon Sep 19 2022 Jakub Jelen - 1.6.1-1
- New upstream release (#2127464)
* Thu Jul 21 2022 Fedora Release Engineering - 1.6.0-4
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2135610 - CVE-2022-3515 libksba: integer overflow may lead to remote code execution
  https://bugzilla.redhat.com/show_bug.cgi?id=2135610
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-3ef41c3410' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________