[SECURITY] Fedora 39 Update: wdt-1.32.1910230^20230711git3b52ef5-2.fc39
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-7934802344
2023-11-03 18:20:20.955871
--------------------------------------------------------------------------------
Name : wdt
Product : Fedora 39
Version : 1.32.1910230^20230711git3b52ef5
Release : 2.fc39
URL : https://www.facebook.com/WdtOpenSource
Summary : Warp speed Data Transfer
Description :
Warp speed Data Transfer is aiming to transfer data between two systems
as fast as possible.
--------------------------------------------------------------------------------
Update Information:
Update Folly stack to the latest 2023.10.16.00 tag proxygen: Security fix for
CVE-2023-44487
--------------------------------------------------------------------------------
ChangeLog:
* Wed Oct 18 2023 Michel Lind [salimma@fedoraproject.org] - 1.32.1910230^20230711git3b52ef5-2
- Rebuilt for folly 2023.10.16.00
* Wed Sep 13 2023 Michel Lind [salimma@fedoraproject.org] - 1.32.1910230^20230711git3b52ef5-1
- Update to snapshot from 20230711
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2221799 - mcrouter-2023.10.09.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2221799
[ 2 ] Bug #2239431 - proxygen-2023.10.16.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239431
[ 3 ] Bug #2239594 - wangle-2023.10.16.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239594
[ 4 ] Bug #2239613 - fb303-2023.10.09.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239613
[ 5 ] Bug #2239614 - fbthrift-2023.10.09.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239614
[ 6 ] Bug #2239623 - fizz-2023.10.09.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239623
[ 7 ] Bug #2239624 - folly-2023.10.09.00 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2239624
[ 8 ] Bug #2243253 - [Major Incident] CVE-2023-44487 proxygen: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2243253
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-7934802344' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
A wdt security update has been released for Fedora Linux 39.