The following Fedora EPEL 8 Security updates need testing: Age URL 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-7d6d0b91ad chromium-133.0.6943.126-1.el8 0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-768199da7e cutter-re-2.3.4-6.el8 rizin-0.7.4-5.el8 The following builds have been pushed to Fedora EPEL 8 updates-testing java-latest-openjdk-24.0.0.0.36-2.rolling.el8 openssl3-3.2.2-7.1.el8 Details about builds: ================================================================================ java-latest-openjdk-24.0.0.0.36-2.rolling.el8 (FEDORA-EPEL-2025-8afbe2a97e) OpenJDK 24 Runtime Environment -------------------------------------------------------------------------------- Update Information: Fixed alternatives priority Java-latest-openjdk updated to jdk 24 -------------------------------------------------------------------------------- ChangeLog: * Thu Feb 20 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:24.0.0.0.36-3 - Rewrote priority macro for epel8 and 9 * Tue Feb 18 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:24.0.0.0.36-1 - Updated to 24+36, GA final candidate * Wed Feb 12 2025 Jiri <jvanek@xxxxxxxxxx> - 1:24.0.0.0.34-5 - One more jcmd * Wed Feb 12 2025 Jiri <jvanek@xxxxxxxxxx> - 1:24.0.0.0.34-4 - Added forgotten jcmd * Tue Feb 4 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:24.0.0.0.34-3 - Added aarch64 specific libsleef.so * Mon Feb 3 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:24.0.0.0.34-2 - Temporarily disabled debug_package * Mon Feb 3 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:24.0.0.0.34-1 - Updated to jdk-24+34-ea * Sun Feb 2 2025 Jiri Vanek <jvanek@xxxxxxxxxx> - 1:23.0.2.0.7-2 - Removed parallel installs support -------------------------------------------------------------------------------- ================================================================================ openssl3-3.2.2-7.1.el8 (FEDORA-EPEL-2025-9176cc66c2) Utilities from the general purpose cryptography library with TLS implementation -------------------------------------------------------------------------------- Update Information: Rebase on CentOS Stream 9's openssl to pick up CVE fixes -------------------------------------------------------------------------------- ChangeLog: * Fri Feb 21 2025 Michel Lind <salimma@xxxxxxxxxxxxxxxxx> - 3.2.2-7.1 - Merge c9s openssl changes to pick up CVE fixes Resolves: RHBZ#2345070 * Wed Jan 29 2025 Dmitry Belyavskiy <dbelyavs@xxxxxxxxxx> - 1:3.2.2-7 - RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797) Resolves: RHEL-76756 * Thu Sep 5 2024 Dmitry Belyavskiy <dbelyavs@xxxxxxxxxx> - 1:3.2.2-6 - rebuilt Related: RHEL-55339 * Wed Sep 4 2024 Dmitry Belyavskiy <dbelyavs@xxxxxxxxxx> - 1:3.2.2-5 - Fix CVE-2024-6119: Possible denial of service in X.509 name checks Resolves: RHEL-55339 * Wed Aug 21 2024 Clemens Lang <cllang@xxxxxxxxxx> - 1:3.2.2-4 - Fix CVE-2024-5535: SSL_select_next_proto buffer overread Resolves: RHEL-45657 * Sat Jun 22 2024 Daiki Ueno <dueno@xxxxxxxxxx> - 1:3.2.2-3 - Replace HKDF backward compatibility patch with the official one Related: RHEL-40823 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2259950 - TRIAGE CVE-2024-0727 openssl3: openssl: denial of service via null dereference [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2259950 [ 2 ] Bug #2274021 - TRIAGE CVE-2024-2511 openssl3: openssl: Unbounded memory growth with session handling in TLSv1.3 [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2274021 [ 3 ] Bug #2281032 - CVE-2024-4603 openssl3: openssl: Excessive time spent checking DSA keys and parameters [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=2281032 [ 4 ] Bug #2294928 - CVE-2024-5535 openssl3: SSL_select_next_proto buffer overread [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2294928 [ 5 ] Bug #2345070 - [Minor Incident] CVE-2024-12797 openssl3: RFC7250 handshakes with unauthenticated servers don't abort as expected [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=2345070 -------------------------------------------------------------------------------- -- _______________________________________________ epel-devel mailing list -- epel-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to epel-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/epel-devel@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue