6 days 13 hours ago
FEDORA-EPEL-2026-1be2809c6a
Packages in this update:
- chromium-146.0.7680.80-1.el10_3
Update description:
Update to 146.0.7680.80
* CVE-2026-3909: Out of bounds write in Ski
6 days 13 hours ago
FEDORA-EPEL-2026-317a58d9a7
Packages in this update:
- chromium-146.0.7680.80-1.el9
Update description:
Update to 146.0.7680.80
* CVE-2026-3909: Out of bounds write in Ski
Update to 146.0.7680.71
- CVE-2026-3913: Heap buffer overflow in WebML
- CVE-2026-3914: Integer overflow in WebML
- CVE-2026-3915: Heap buffer overflow in WebML
- CVE-2026-3916: Out of bounds read in Web Speech
- CVE-2026-3917: Use after free in Agents
- CVE-2026-3918: Use after free in WebMCP
- CVE-2026-3919: Use after free in Extensions
- CVE-2026-3920: Out of bounds memory access in WebML
- CVE-2026-3921: Use after free in TextEncoding
- CVE-2026-3922: Use after free in MediaStream
- CVE-2026-3923: Use after free in WebMIDI
- CVE-2026-3924: Use after free in WindowDialog
- CVE-2026-3925: Incorrect security UI in LookalikeChecks
- CVE-2026-3926: Out of bounds read in V8
- CVE-2026-3927: Incorrect security UI in PictureInPicture
- CVE-2026-3928: Insufficient policy enforcement in Extensions
- CVE-2026-3929: Side-channel information leakage in ResourceTiming
- CVE-2026-3930: Unsafe navigation in Navigation
- CVE-2026-3931: Heap buffer overflow in Skia
- CVE-2026-3932: Insufficient policy enforcement in PDF
- CVE-2026-3934: Insufficient policy enforcement in ChromeDriver
- CVE-2026-3935: Incorrect security UI in WebAppInstalls
- CVE-2026-3936: Use after free in WebView
- CVE-2026-3937: Incorrect security UI in Downloads
- CVE-2026-3938: Insufficient policy enforcement in Clipboard
- CVE-2026-3939: Insufficient policy enforcement in PDF
- CVE-2026-3940: Insufficient policy enforcement in DevTools
- CVE-2026-3941: Insufficient policy enforcement in DevTools
- CVE-2026-3942: Incorrect security UI in PictureInPicture
6 days 13 hours ago
FEDORA-2026-b7d2936de3
Packages in this update:
- chromium-146.0.7680.80-1.fc44
Update description:
Update to 146.0.7680.80
* CVE-2026-3909: Out of bounds write in Ski
6 days 14 hours ago
FEDORA-2026-409856189a
Packages in this update:
- gnome-remote-desktop-49.3-2.fc43
Update description:
Fixes CVE-2025-5024 by adding connection throttling
6 days 15 hours ago
FEDORA-2026-c571483404
Packages in this update:
Update description:
Rebuilt with updated dr_wav to fix CVE-2026-29022.
6 days 17 hours ago
6 days 17 hours ago
6 days 22 hours ago
FEDORA-2026-5c75eb75d1
Packages in this update:
- python-multipart-1.3.1-1.fc43
Update description:
Update to version 1.3.1 to fix CVE-2026-28356.
6 days 22 hours ago
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Network block device driver;
- Bluetooth drivers;
- Character device driver;
- TPM device driver;
- Data acquisition framework and drivers;
- Counter interface drivers;
- CPU frequency scaling framework;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Tablet) drivers;
- ISDN/mISDN subsystem;
- Macintosh device drivers;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- MediaTek network drivers;
- NVME drivers;
- PA-RISC drivers;
- PCI subsystem;
- Chrome hardware platform drivers;
- x86 platform drivers;
- ARM PM domains;
- Voltage and Current Regulator drivers;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- SPI subsystem;
- Realtek RTL8723BS SDIO drivers;
- TCM subsystem;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- USB Type-C Connector System Software Interface driver;
- Backlight driver;
- Framebuffer layer;
- Watchdog drivers;
- BFS file system;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- HFS+ file system;
- Journaling layer for block devices (JBD2);
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- SMB network file system;
- XFS file system;
- BPF subsystem;
- Ethernet bridge;
- Memory management;
- Network traffic control;
- io_uring subsystem;
- Locking primitives;
- Scheduler infrastructure;
- Shadow Call Stack mechanism;
- Tracing infrastructure;
- Bluetooth subsystem;
- CAIF protocol;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Ethtool driver;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NET/ROM layer;
- NFC subsystem;
- Open vSwitch;
- Rose network layer;
- SCTP protocol;
- Network sockets;
- Sun RPC protocol;
- TIPC protocol;
- VMware vSockets driver;
- Wireless networking;
- Rust bindings mechanism;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- Turtle Beach Wavefront ALSA driver;
- STMicroelectronics SoC drivers;
- USB sound devices;
(CVE-2022-49465, CVE-2024-36903, CVE-2024-36927, CVE-2024-37354,
CVE-2024-41014, CVE-2024-46830, CVE-2024-47666, CVE-2024-49968,
CVE-2025-22022, CVE-2025-22111, CVE-2025-22121, CVE-2025-38022,
CVE-2025-38129, CVE-2025-38556, CVE-2025-40040, CVE-2025-40083,
CVE-2025-40110, CVE-2025-40211, CVE-2025-40248, CVE-2025-40252,
CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258,
CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263,
CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308,
CVE-2025-40309, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321,
CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68176, CVE-2025-68177, CVE-2025-68185,
CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68200,
CVE-2025-68204, CVE-2025-68217, CVE-2025-68220, CVE-2025-68227,
CVE-2025-68229, CVE-2025-68238, CVE-2025-68241, CVE-2025-68244,
CVE-2025-68245, CVE-2025-68254, CVE-2025-68255, CVE-2025-68257,
CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266,
CVE-2025-68282, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286,
CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290,
CVE-2025-68295, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303,
CVE-2025-68308, CVE-2025-68312, CVE-2025-68321, CVE-2025-68325,
CVE-2025-68327, CVE-2025-68328, CVE-2025-68330, CVE-2025-68331,
CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337,
CVE-2025-68339, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349,
CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366,
CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68727,
CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68734,
CVE-2025-68740, CVE-2025-68746, CVE-2025-68757, CVE-2025-68758,
CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68767,
CVE-2025-68769, CVE-2025-68771, CVE-2025-68774, CVE-2025-68776,
CVE-2025-68777, CVE-2025-68780, CVE-2025-68782, CVE-2025-68783,
CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795,
CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800,
CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808,
CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816,
CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-68821,
CVE-2025-71064, CVE-2025-71066, CVE-2025-71068, CVE-2025-71069,
CVE-2025-71075, CVE-2025-71077, CVE-2025-71078, CVE-2025-71079,
CVE-2025-71081, CVE-2025-71082, CVE-2025-71083, CVE-2025-71084,
CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71091,
CVE-2025-71093, CVE-2025-71094, CVE-2025-71096, CVE-2025-71097,
CVE-2025-71098, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105,
CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113,
CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120,
CVE-2025-71121, CVE-2025-71125, CVE-2025-71127, CVE-2025-71131,
CVE-2025-71132, CVE-2025-71133, CVE-2025-71136, CVE-2025-71137,
CVE-2025-71147, CVE-2025-71154, CVE-2025-71180, CVE-2025-71182,
CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22980,
CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991,
CVE-2026-22992, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021,
CVE-2026-23047)
6 days 22 hours ago
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- Nios II architecture;
- PA-RISC architecture;
- RISC-V architecture;
- S390 architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Xtensa architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Block device driver;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Hardware random number generator core;
- Character device driver;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- DMA engine subsystem;
- ARM SCMI message protocol;
- EFI core;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- ISDN/mISDN subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- NVME drivers;
- PCI subsystem;
- PCCARD (PCMCIA/CardBus) bus subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- PWM drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- TTY drivers;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- GFS2 file system;
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- JFS file system;
- KERNFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Mellanox drivers;
- NFS page cache wrapper;
- Memory management;
- Memory Management;
- Media input infrastructure;
- Bluetooth subsystem;
- IP tunnels definitions;
- Network traffic control;
- Rose network layer;
- Network sockets;
- io_uring subsystem;
- Control group (cgroup);
- Kernel crash support code;
- Kernel futex primitives;
- PID allocator;
- Scheduler infrastructure;
- Syscalls implementation;
- Timer subsystem;
- Tracing infrastructure;
- 9P file system network protocol;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- Intel ASoC drivers;
- QCOM ASoC drivers;
- USB sound devices;
(CVE-2025-21833, CVE-2025-22103, CVE-2025-22105, CVE-2025-22106,
CVE-2025-22107, CVE-2025-22113, CVE-2025-22121, CVE-2025-22124,
CVE-2025-22125, CVE-2025-23129, CVE-2025-23130, CVE-2025-23133,
CVE-2025-23143, CVE-2025-37860, CVE-2025-38105, CVE-2025-38502,
CVE-2025-38556, CVE-2025-38627, CVE-2025-38643, CVE-2025-38709,
CVE-2025-39678, CVE-2025-39697, CVE-2025-39805, CVE-2025-39806,
CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811,
CVE-2025-39812, CVE-2025-39813, CVE-2025-39815, CVE-2025-39817,
CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825,
CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829,
CVE-2025-39832, CVE-2025-39835, CVE-2025-39836, CVE-2025-39838,
CVE-2025-39839, CVE-2025-39841, CVE-2025-39842, CVE-2025-39843,
CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847,
CVE-2025-39848, CVE-2025-39849, CVE-2025-39850, CVE-2025-39851,
CVE-2025-39852, CVE-2025-39853, CVE-2025-39854, CVE-2025-39857,
CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864,
CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39870,
CVE-2025-39871, CVE-2025-39873, CVE-2025-39876, CVE-2025-39877,
CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885,
CVE-2025-39886, CVE-2025-39891, CVE-2025-39894, CVE-2025-39895,
CVE-2025-39897, CVE-2025-39899, CVE-2025-39901, CVE-2025-39902,
CVE-2025-39907, CVE-2025-39909, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39914, CVE-2025-39916, CVE-2025-39920, CVE-2025-39923,
CVE-2025-39927, CVE-2025-39929, CVE-2025-39931, CVE-2025-39932,
CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39940,
CVE-2025-39942, CVE-2025-39943, CVE-2025-39944, CVE-2025-39945,
CVE-2025-39947, CVE-2025-39948, CVE-2025-39949, CVE-2025-39950,
CVE-2025-39951, CVE-2025-39952, CVE-2025-39953, CVE-2025-39955,
CVE-2025-39957, CVE-2025-39961, CVE-2025-39965, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978,
CVE-2025-39980, CVE-2025-39981, CVE-2025-39982, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39991,
CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40000, CVE-2025-40001, CVE-2025-40006,
CVE-2025-40008, CVE-2025-40009, CVE-2025-40010, CVE-2025-40011,
CVE-2025-40013, CVE-2025-40016, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40024, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029,
CVE-2025-40030, CVE-2025-40031, CVE-2025-40032, CVE-2025-40033,
CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40047,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052,
CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057,
CVE-2025-40058, CVE-2025-40059, CVE-2025-40060, CVE-2025-40061,
CVE-2025-40062, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079,
CVE-2025-40080, CVE-2025-40081, CVE-2025-40083, CVE-2025-40084,
CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096,
CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103,
CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125,
CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134,
CVE-2025-40137, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40155, CVE-2025-40156, CVE-2025-40159,
CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167,
CVE-2025-40169, CVE-2025-40171, CVE-2025-40172, CVE-2025-40173,
CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40180,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192,
CVE-2025-40193, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198,
CVE-2025-40200, CVE-2025-40201, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40206, CVE-2025-40207, CVE-2025-40211, CVE-2025-40218,
CVE-2025-40219, CVE-2025-40220, CVE-2025-40221, CVE-2025-40223,
CVE-2025-40226, CVE-2025-40231, CVE-2025-40233, CVE-2025-40235,
CVE-2025-40237, CVE-2025-40238, CVE-2025-40240, CVE-2025-40242,
CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259,
CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264,
CVE-2025-40266, CVE-2025-40268, CVE-2025-40269, CVE-2025-40271,
CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,
CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281,
CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285,
CVE-2025-40286, CVE-2025-40287, CVE-2025-40288, CVE-2025-40289,
CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40301,
CVE-2025-40303, CVE-2025-40304, CVE-2025-40305, CVE-2025-40306,
CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,
CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319,
CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,
CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331,
CVE-2025-40333, CVE-2025-40337, CVE-2025-40339, CVE-2025-40341,
CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,
CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351,
CVE-2025-40353, CVE-2025-40358, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179,
CVE-2025-68180, CVE-2025-68183, CVE-2025-68184, CVE-2025-68185,
CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204,
CVE-2025-68208, CVE-2025-68213, CVE-2025-68214, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231,
CVE-2025-68233, CVE-2025-68235, CVE-2025-68237, CVE-2025-68238,
CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,
CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,
CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68310, CVE-2025-68311,
CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,
CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68734)
6 days 22 hours ago
FEDORA-2026-7ed700921c
Packages in this update:
- containernetworking-plugins-1.9.1-1.fc42
Update description:
Update to release v1.9.1
6 days 23 hours ago
Rahul Hoysala discovered that Vim did not correctly handle certain tag
resolutions. An attacker could possibly use this issue to cause a denial
of service. (CVE-2026-25749)
It was discovered that Vim did not correctly handle processing certain
specialKey commands. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2026-26269)
Kim Dong Han discovered that Vim did not correctly handle opening certain
URLs. If a user or system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to execute arbitrary code.
(CVE-2026-28417)
Kim Dong Han discovered that Vim did not correctly handle parsing
Emacs-style tag files. An attacker could possibly use this issue to cause
a denial of service. (CVE-2026-28418, CVE-2026-28419)
Kim Dong Han discovered that Vim did not correctly handle processing
maximum combining characters from Unicode supplementary planes. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10.
(CVE-2026-28420)
Kim Dong Han discovered that Vim did not correctly handle swap file
recovery. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. (CVE-2026-28421)
Kim Dong Han discovered that Vim did not correctly handle rendering
status lines. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. (CVE-2026-28422)
1 week ago
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- Nios II architecture;
- PA-RISC architecture;
- RISC-V architecture;
- S390 architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Xtensa architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Block device driver;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Hardware random number generator core;
- Character device driver;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- DMA engine subsystem;
- ARM SCMI message protocol;
- EFI core;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- ISDN/mISDN subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- NVME drivers;
- PCI subsystem;
- PCCARD (PCMCIA/CardBus) bus subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- PWM drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- SPI subsystem;
- TCM subsystem;
- Trusted Execution Environment drivers;
- TTY drivers;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- GFS2 file system;
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- JFS file system;
- KERNFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Mellanox drivers;
- NFS page cache wrapper;
- Memory management;
- Memory Management;
- Media input infrastructure;
- Bluetooth subsystem;
- IP tunnels definitions;
- Network traffic control;
- Rose network layer;
- Network sockets;
- io_uring subsystem;
- Control group (cgroup);
- Kernel crash support code;
- Kernel futex primitives;
- PID allocator;
- Scheduler infrastructure;
- Syscalls implementation;
- Timer subsystem;
- Tracing infrastructure;
- 9P file system network protocol;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- Intel ASoC drivers;
- QCOM ASoC drivers;
- USB sound devices;
(CVE-2025-21833, CVE-2025-22103, CVE-2025-22105, CVE-2025-22106,
CVE-2025-22107, CVE-2025-22113, CVE-2025-22121, CVE-2025-22124,
CVE-2025-22125, CVE-2025-23129, CVE-2025-23130, CVE-2025-23133,
CVE-2025-23143, CVE-2025-37860, CVE-2025-38105, CVE-2025-38502,
CVE-2025-38556, CVE-2025-38627, CVE-2025-38643, CVE-2025-38709,
CVE-2025-39678, CVE-2025-39697, CVE-2025-39805, CVE-2025-39806,
CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811,
CVE-2025-39812, CVE-2025-39813, CVE-2025-39815, CVE-2025-39817,
CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825,
CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829,
CVE-2025-39832, CVE-2025-39835, CVE-2025-39836, CVE-2025-39838,
CVE-2025-39839, CVE-2025-39841, CVE-2025-39842, CVE-2025-39843,
CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847,
CVE-2025-39848, CVE-2025-39849, CVE-2025-39850, CVE-2025-39851,
CVE-2025-39852, CVE-2025-39853, CVE-2025-39854, CVE-2025-39857,
CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864,
CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39870,
CVE-2025-39871, CVE-2025-39873, CVE-2025-39876, CVE-2025-39877,
CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885,
CVE-2025-39886, CVE-2025-39891, CVE-2025-39894, CVE-2025-39895,
CVE-2025-39897, CVE-2025-39899, CVE-2025-39901, CVE-2025-39902,
CVE-2025-39907, CVE-2025-39909, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39914, CVE-2025-39916, CVE-2025-39920, CVE-2025-39923,
CVE-2025-39927, CVE-2025-39929, CVE-2025-39931, CVE-2025-39932,
CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39940,
CVE-2025-39942, CVE-2025-39943, CVE-2025-39944, CVE-2025-39945,
CVE-2025-39947, CVE-2025-39948, CVE-2025-39949, CVE-2025-39950,
CVE-2025-39951, CVE-2025-39952, CVE-2025-39953, CVE-2025-39955,
CVE-2025-39957, CVE-2025-39961, CVE-2025-39965, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978,
CVE-2025-39980, CVE-2025-39981, CVE-2025-39982, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39991,
CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40000, CVE-2025-40001, CVE-2025-40006,
CVE-2025-40008, CVE-2025-40009, CVE-2025-40010, CVE-2025-40011,
CVE-2025-40013, CVE-2025-40016, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40024, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029,
CVE-2025-40030, CVE-2025-40031, CVE-2025-40032, CVE-2025-40033,
CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40047,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052,
CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057,
CVE-2025-40058, CVE-2025-40059, CVE-2025-40060, CVE-2025-40061,
CVE-2025-40062, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079,
CVE-2025-40080, CVE-2025-40081, CVE-2025-40083, CVE-2025-40084,
CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096,
CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103,
CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125,
CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134,
CVE-2025-40137, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40155, CVE-2025-40156, CVE-2025-40159,
CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167,
CVE-2025-40169, CVE-2025-40171, CVE-2025-40172, CVE-2025-40173,
CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40180,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192,
CVE-2025-40193, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198,
CVE-2025-40200, CVE-2025-40201, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40206, CVE-2025-40207, CVE-2025-40211, CVE-2025-40218,
CVE-2025-40219, CVE-2025-40220, CVE-2025-40221, CVE-2025-40223,
CVE-2025-40226, CVE-2025-40231, CVE-2025-40233, CVE-2025-40235,
CVE-2025-40237, CVE-2025-40238, CVE-2025-40240, CVE-2025-40242,
CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259,
CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264,
CVE-2025-40266, CVE-2025-40268, CVE-2025-40269, CVE-2025-40271,
CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,
CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281,
CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285,
CVE-2025-40286, CVE-2025-40287, CVE-2025-40288, CVE-2025-40289,
CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40301,
CVE-2025-40303, CVE-2025-40304, CVE-2025-40305, CVE-2025-40306,
CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,
CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319,
CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,
CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331,
CVE-2025-40333, CVE-2025-40337, CVE-2025-40339, CVE-2025-40341,
CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,
CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351,
CVE-2025-40353, CVE-2025-40358, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179,
CVE-2025-68180, CVE-2025-68183, CVE-2025-68184, CVE-2025-68185,
CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204,
CVE-2025-68208, CVE-2025-68213, CVE-2025-68214, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231,
CVE-2025-68233, CVE-2025-68235, CVE-2025-68237, CVE-2025-68238,
CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,
CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,
CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68310, CVE-2025-68311,
CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,
CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68734, CVE-2026-23202,
CVE-2026-23207)
1 week ago
FEDORA-2026-390ce5262d
Packages in this update:
Update description:
Rebuilt with updated dr_wav to fix CVE-2026-29022.
1 week ago
FEDORA-2026-8ee0451243
Packages in this update:
- containernetworking-plugins-1.9.1-1.fc43
Update description:
- Update to release v1.9.1
- Resolves: rhbz#2448053, rhbz#2423997, rhbz#2424031
- Upstream fixes
1 week ago
Version:next-20260316 (linux-next)
Released:2026-03-16
1 week ago
FEDORA-2026-d6b4b4df31
Packages in this update:
- containernetworking-plugins-1.9.1-1.fc44
Update description:
- Update to release v1.9.1
- Resolves: rhbz#2448053, rhbz#2423997, rhbz#2424031
- Upstream fixes
1 week ago
FEDORA-2026-38d944f97d
Packages in this update:
- containernetworking-plugins-1.9.1-1.fc45
Update description:
Automatic update for containernetworking-plugins-1.9.1-1.fc45.
Changelog
* Mon Mar 16 2026 Bradley G Smith <
bradley.g.smith@gmail.com> - 1.9.1-1
- Update to release v1.9.1
- Resolves: rhbz#2448053, rhbz#2423997, rhbz#2424031
- Upstream fixes
1 week ago
Zhicheng Chen discovered that curl could incorrectly reuse the wrong
connection for Negotiate-authenticated HTTP or HTTPS requests. This could
result in the use of credentials from a different connection, contrary to
expectations. This issue only affected Ubuntu 20.04 LTS. (CVE-2026-1965)
It was discovered that curl incorrectly leaked OAuth2 bearer tokens when
following a redirect. This could result in tokens being sent to the wrong
host, contrary to expectations. This issue only affected Ubuntu 20.04 LTS.
(CVE-2026-3783)
Muhamad Arga Reksapati discovered that curl incorrectly reused existing
HTTP proxy connections even if the request used different credentials. This
could result in the use of incorrect credentials, contrary to expectations.
(CVE-2026-3784)
1 week ago
It was discovered that Roundcube Webmail did not properly sanitize the
animate tag within SVG documents. An attacker could possibly use
this issue to cause a cross-site scripting attack.