Aggregator
next-20260120: linux-next
Version:next-20260120 (linux-next)
Released:2026-01-20
python-tinycss2-1.5.1-1.fc43 weasyprint-68.0-1.fc43
FEDORA-2026-f59e87ad88
Packages in this update:
- python-tinycss2-1.5.1-1.fc43
- weasyprint-68.0-1.fc43
update to new upstream version including a fix for CVE-2025-68616
freerdp-3.21.0-1.fc42
FEDORA-2026-943caf40d9
Packages in this update:
- freerdp-3.21.0-1.fc42
Update to 3.21.0
freerdp-3.21.0-1.fc43
FEDORA-2026-23d669bf94
Packages in this update:
- freerdp-3.21.0-1.fc43
Update to 3.21.0
curl-8.11.1-7.fc42
FEDORA-2026-3f0f0f85be
Packages in this update:
- curl-8.11.1-7.fc42
- fix broken TLS options for threaded LDAPS (CVE-2025-14017)
curl-8.15.0-5.fc43
FEDORA-2026-e27b23af78
Packages in this update:
- curl-8.15.0-5.fc43
- fix broken TLS options for threaded LDAPS (CVE-2025-14017)
perl-HarfBuzz-Shaper-0.033-1.fc42
FEDORA-2026-2a6cbb84d6
Packages in this update:
- perl-HarfBuzz-Shaper-0.033-1.fc42
Upgrade to upstream. Eliminates distributing harfbuzz sources.
Upgrade to upstream 0.032.
perl-HarfBuzz-Shaper-0.033-2.fc43
FEDORA-2026-2b5249b4b6
Packages in this update:
- perl-HarfBuzz-Shaper-0.033-2.fc43
Merge branch 'rawhide' into f43
Upgrade to upstream 0.032 to fix CVE-2026-22693.
DSA-6104-1 python-keystonemiddleware - security update
next-20260119: linux-next
Version:next-20260119 (linux-next)
Released:2026-01-19
USN-7969-1: Dungeon Crawl Stone Stoup vulnerability
David Mendenhall discovered that Dungeon Crawl Stone Soup was incorrectly
handling Lua bytecode embedded in an uploaded .crawlrc file. An attacker
could possibly use this issue to execute arbitrary code.
USN-7968-1: Apache HTTP Server vulnerabilities
It was discovered that the Apache HTTP Server incorrectly handled failed
ACME certificate renewals. This could result in renewal attempts to be
repeated without delays, possibly leading to a denial of service.
(CVE-2025-55753)
Anthony Parfenov discovered that the Apache HTTP Server would pass the
query string to cmd directives when configured with Server Side Includes
(SSI) enabled and mod_cgid. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2025-58098)
Mattias Åsander discovered that the Apache HTTP Server incorrectly
neutralized certain environment variables. This could result in
unexpectedly superseding variables calculated by the server for CGI
programs. (CVE-2025-65082)
Mattias Åsander discovered that the Apache HTTP Server incorrectly
handled AllowOverride FileInfo configurations when using mod_userdir with
suexec. An attacker with access to use the RequestHeader directive in
htaccess can cause some CGI scripts to run under an unexpected userid.
(CVE-2025-66200)
USN-7966-2: Telegraf vulnerabilities
USN-7966-1 fixed vulnerabilities in Snowflake. This update provides the
corresponding updates for Telegraf.
Original advisory details:
It was discovered that Pion DTLS, vendored in Telegraf, did not impose a limit
on the amount of data that was buffered during the handshake. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29189)
It was discovered that Pion DTLS, vendored in Telegraf, did not prevent the
fragmentBuffer from processing zero length fragments. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29190)
It was discovered that Pion DTLS, vendored in Telegraf, did not require
CertificateVerify when Client Cert was sent. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29222)
USN-7967-1: Avahi vulnerabilities
It was discovered that Avahi incorrectly terminated when processing browser
records with wide-area disabled. An attacker could possibly use this issue
to cause Avahi to crash, resulting in a denial of service. (CVE-2025-68276)
It was discovered that Avahi incorrectly terminated when processing
unsolicited CNAME records pointing to resource records with short TTLs. An
attacker could possibly use this issue to cause Avahi to crash, resulting
in a denial of service. (CVE-2025-68468)
It was discovered that Avahi incorrectly terminated when processing
unsolicited CNAME records in quick succession. An attacker could possibly
use this issue to cause Avahi to crash, resulting in a denial of service.
(CVE-2025-68471)
5.10.248: longterm
Version:5.10.248 (longterm)
Released:2026-01-19
Source:linux-5.10.248.tar.xz
PGP Signature:linux-5.10.248.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.10.248
5.15.198: longterm
Version:5.15.198 (longterm)
Released:2026-01-19
Source:linux-5.15.198.tar.xz
PGP Signature:linux-5.15.198.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.15.198
USN-7955-2: urllib3 regression
USN-7955-1 fixed vulnerabilities in urllib3. The update introduced a
regression in response streaming on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that urllib3 incorrectly handled decompression during
HTTP redirects. An attacker could possibly use this issue to cause urllib3
to use excessive resources, causing a denial of service.
USN-7966-1: Snowflake vulnerabilities
It was discovered that Pion DTLS, vendored in Snowflake, did not impose a limit
on the amount of data that was buffered during the handshake. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29189)
It was discovered that Pion DTLS, vendored in Snowflake, did not prevent the
fragmentBuffer from processing zero length fragments. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29190)
It was discovered that Pion DTLS, vendored in Snowflake, did not require
CertificateVerify when Client Cert was sent. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29222)
6.19-rc6: mainline
Version:6.19-rc6 (mainline)
Released:2026-01-18
Source:linux-6.19-rc6.tar.gz
Patch:full (incremental)