Fedora Linux 8783 Published by

A librime security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: librime-1.7.3-2.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-5d37367673
2022-12-03 01:41:59.480594
--------------------------------------------------------------------------------

Name : librime
Product : Fedora 36
Version : 1.7.3
Release : 2.fc36
URL :   https://rime.im/
Summary : Rime Input Method Engine Library
Description :
Rime Input Method Engine Library

Support for shape-based and phonetic-based input methods,
including those for Chinese dialects.

A selected dictionary in Traditional Chinese,
powered by opencc for Simplified Chinese output.

--------------------------------------------------------------------------------
Update Information:

Update capnproto to version 0.9.2 to address CVE-2022-46149. Dependent packages
were rebuilt for both the fix for the security issue and the capnproto SONAME
bump.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Dec 2 2022 Fabio Valentini - 1.7.3-2
- Rebuild for capnproto 0.9.2 / CVE-2022-46149
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2150076 - CVE-2022-46149 capnproto: out of bounds read when handling a list of lists. [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2150076
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-5d37367673' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________