stable

cachelib-17^20231016-1.fc37, fb303-2023.10.16.00-1.fc37, & 9 more

FEDORA-2023-2a9214af5f created by salimma a year ago for Fedora 37

Update Folly stack to the latest 2023.10.16.00 tag

proxygen: Security fix for CVE-2023-44487

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2023-2a9214af5f

This update's test gating status has been changed to 'waiting'.

a year ago

This update has been submitted for testing by bodhi.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has been pushed to testing.

a year ago
User Icon dcavalca provided feedback a year ago
karma
BZ#2221799 mcrouter-2023.10.09.00 is available
BZ#2239431 proxygen-2023.10.16.00 is available
BZ#2239594 wangle-2023.10.16.00 is available
BZ#2239613 fb303-2023.10.09.00 is available
BZ#2239614 fbthrift-2023.10.09.00 is available
BZ#2239623 fizz-2023.10.09.00 is available
BZ#2239624 folly-2023.10.09.00 is available
BZ#2243253 [Major Incident] CVE-2023-44487 proxygen: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [fedora-all]

This update has been submitted for stable by bodhi.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
high
Karma
1
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
1
Stable by Time
7 days
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
approved
a year ago
BZ#2221799 mcrouter-2023.10.09.00 is available
0
1
BZ#2239431 proxygen-2023.10.16.00 is available
0
1
BZ#2239594 wangle-2023.10.16.00 is available
0
1
BZ#2239613 fb303-2023.10.09.00 is available
0
1
BZ#2239614 fbthrift-2023.10.09.00 is available
0
1
BZ#2239623 fizz-2023.10.09.00 is available
0
1
BZ#2239624 folly-2023.10.09.00 is available
0
1
BZ#2243253 [Major Incident] CVE-2023-44487 proxygen: HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) [fedora-all]
0
1

Automated Test Results