Aggregator
USN-8059-2: Linux kernel (Raspberry Pi Real-time) vulnerabilities
USN-8061-1: Linux kernel vulnerabilities
USN-8060-1: Linux kernel vulnerabilities
USN-8059-1: Linux kernel vulnerabilities
next-20260224: linux-next
vim-9.2.045-1.fc42
- vim-9.2.045-1.fc42
Security fix for CVE-2026-26269
vim-9.2.045-1.fc43
- vim-9.2.045-1.fc43
Security fix for CVE-2026-26269
USN-8029-3: Linux kernel (Azure) vulnerabilities
chromium-145.0.7632.109-1.fc43
- chromium-145.0.7632.109-1.fc43
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediachromium-145.0.7632.109-1.el9
- chromium-145.0.7632.109-1.el9
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediachromium-145.0.7632.109-1.fc42
- chromium-145.0.7632.109-1.fc42
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediachromium-145.0.7632.109-1.el10_2
- chromium-145.0.7632.109-1.el10_2
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediachromium-145.0.7632.109-1.el10_1
- chromium-145.0.7632.109-1.el10_1
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediachromium-145.0.7632.109-1.fc44
- chromium-145.0.7632.109-1.fc44
Update to 145.0.7632.109
* CVE-2026-2648: Heap buffer overflow in PDFium * CVE-2026-2649: Integer overflow in V8 * CVE-2026-2650: Heap buffer overflow in Mediavalkey-8.0.7-1.el8
- valkey-8.0.7-1.el8
Valkey 8.0.7 - Released Mon 23 February 2026
Upgrade urgency SECURITY: This release includes security fixes we recommend you apply as soon as possible.
Security fixes
- (CVE-2026-21863) Remote DoS with malformed Valkey Cluster bus message
- (CVE-2025-67733) RESP Protocol Injection via Lua error_reply
Bug fixes
- Fix ltrim should not call signalModifiedKey when no elements are removed (#2787)
- Fix chained replica crash when doing dual channel replication (#2983)
- Fix used_memory_dataset underflow due to miscalculated used_memory_overhead (#3005)
- Avoids crash during MODULE UNLOAD when ACL rules reference a module command and subcommand (#3160)
- Fix server assert on ACL LOAD and resetchannels (#3182)
- Fix bug causing no response flush sometimes when IO threads are busy (#3205)
valkey-8.0.7-1.fc42
- valkey-8.0.7-1.fc42
Valkey 8.0.7 - Released Mon 23 February 2026
Upgrade urgency SECURITY: This release includes security fixes we recommend you apply as soon as possible.
Security fixes
- (CVE-2026-21863) Remote DoS with malformed Valkey Cluster bus message
- (CVE-2025-67733) RESP Protocol Injection via Lua error_reply
Bug fixes
- Fix ltrim should not call signalModifiedKey when no elements are removed (#2787)
- Fix chained replica crash when doing dual channel replication (#2983)
- Fix used_memory_dataset underflow due to miscalculated used_memory_overhead (#3005)
- Avoids crash during MODULE UNLOAD when ACL rules reference a module command and subcommand (#3160)
- Fix server assert on ACL LOAD and resetchannels (#3182)
- Fix bug causing no response flush sometimes when IO threads are busy (#3205)
valkey-9.0.3-1.fc44
- valkey-9.0.3-1.fc44
Valkey 9.0.3 - February 23, 2026
Upgrade urgency SECURITY: This release includes security fixes we recommend you apply as soon as possible.
Security fixes
- (CVE-2025-67733) RESP Protocol Injection via Lua error_reply
- (CVE-2026-21863) Remote DoS with malformed Valkey Cluster bus message
- (CVE-2026-27623) Reset request type after handling empty requests
Bug fixes
- Avoids crash during MODULE UNLOAD when ACL rules reference a module command and subcommand (#3160)
- Fix server assert on ACL LOAD when current user loses permission to channels (#3182)
- Fix bug causing no response flush sometimes when IO threads are busy (#3205)
valkey-8.1.6-1.fc43
- valkey-8.1.6-1.fc43
Valkey 8.1.6 - Released Mon 23 February 2026
Upgrade urgency SECURITY: This release includes security fixes we recommend you apply as soon as possible.
Security fixes
- (CVE-2026-21863) Remote DoS with malformed Valkey Cluster bus message
- (CVE-2025-67733) RESP Protocol Injection via Lua error_reply
Bug fixes
- Restrict ttl from being negative and avoid crash in import-mode (#2944)
- Fix chained replica crash when doing dual channel replication (#2983)
- Fix used_memory_dataset underflow due to miscalculated used_memory_overhead (#3005)
- Fix crashing while MODULE UNLOAD when ACL rules reference a module command or subcommand (#3160)
- Fix server assert on ACL LOAD and resetchannels (#3182)
- Fix bug causing no response flush sometimes when IO threads are busy (#3205)
php-zumba-json-serializer-3.2.4-1.fc44
- php-zumba-json-serializer-3.2.4-1.fc44
Version 3.2.4
- Fix serialization of parent class private properties by @Copilot in #71
- Fix fatal error when serializing objects with uninitialized typed properties by @Copilot in #68
Version 3.2.3
[Security] Added method to restrict which classes can be unserialized. Security Advisory GHSA-v7m3-fpcr-h7m2