https://bugzilla.redhat.com/show_bug.cgi?id=2222911
Fedora Update System <updates(a)fedoraproject.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|MODIFIED |CLOSED
Fixed In Version| |luajit-2.1.1707061634-2.fc4
| |1
Resolution|--- |ERRATA
Last Closed| |2024-03-01 20:20:16
--- Comment #15 from Fedora Update System <updates(a)fedoraproject.org> ---
FEDORA-2024-26d44d709a (luajit-2.1.1707061634-2.fc41) has been pushed to the
Fedora 41 stable repository.
If problem still persists, please make note of it in this bug report.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2222911
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2267266
Bug ID: 2267266
Summary: TRIAGE CVE-2024-27285 rubygem-asciidoctor: yard:
Cross-site scripting in the frams.erb template file
[epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: rubygem-asciidoctor
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: dan.j.allen(a)gmail.com
Reporter: psampaio(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dan.j.allen(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
logans(a)cottsay.net, mjg(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2267244
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2267266
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2267248
Bug ID: 2267248
Summary: TRIAGE CVE-2024-27285 rubygem-asciidoctor: yard:
Cross-site scripting in the frams.erb template file
[epel-7]
Product: Fedora EPEL
Version: epel7
Status: NEW
Component: rubygem-asciidoctor
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: dan.j.allen(a)gmail.com
Reporter: psampaio(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dan.j.allen(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
logans(a)cottsay.net, mjg(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2267244
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2267248
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2267256
Bug ID: 2267256
Summary: TRIAGE CVE-2024-27285 rubygem-asciidoctor: yard:
Cross-site scripting in the frams.erb template file
[epel-8]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: rubygem-asciidoctor
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: dan.j.allen(a)gmail.com
Reporter: psampaio(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: dan.j.allen(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
logans(a)cottsay.net, mjg(a)fedoraproject.org
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2267244
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2267256
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…