Aggregator

USN-7945-1: Libxslt vulnerability

5 hours 52 minutes ago
Ivan Fratric discovered that Libxslt was vulnerable to type confusion when performing XML transformations. An attacker could possibly use this issue to cause Libxslt to crash or corrupt memory, causing a denial of service or undefined behavior.

foomuuri-0.31-1.el10_1

6 hours 9 minutes ago
FEDORA-EPEL-2026-aff50f711b Packages in this update:
  • foomuuri-0.31-1.el10_1
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.el10_2

6 hours 9 minutes ago
FEDORA-EPEL-2026-b90feb26b8 Packages in this update:
  • foomuuri-0.31-1.el10_2
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.fc43

6 hours 9 minutes ago
FEDORA-2026-429edf2dcf Packages in this update:
  • foomuuri-0.31-1.fc43
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.el9

6 hours 9 minutes ago
FEDORA-EPEL-2026-8919df6bce Packages in this update:
  • foomuuri-0.31-1.el9
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.fc42

6 hours 9 minutes ago
FEDORA-2026-63f333201f Packages in this update:
  • foomuuri-0.31-1.fc42
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

USN-7944-1: Net-SNMP vulnerability

6 hours 17 minutes ago
Bahae Bahrini discovered that Net-SNMP could be made to write out of bounds. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.

libsodium-1.0.18-9.el9

8 hours 10 minutes ago
FEDORA-EPEL-2026-8ec67a8105 Packages in this update:
  • libsodium-1.0.18-9.el9
Update description:

Fix CVE-2025-69277 libsodium: libsodium: Improper validation of elliptic curve points could lead to data integrity or information disclosure

libsodium-1.0.18-9.el8

8 hours 10 minutes ago
FEDORA-EPEL-2026-59cdc10842 Packages in this update:
  • libsodium-1.0.18-9.el8
Update description:

Fix CVE-2025-69277 libsodium: libsodium: Improper validation of elliptic curve points could lead to data integrity or information disclosure

libsodium-1.0.21-2.el10_1

9 hours 25 minutes ago
FEDORA-EPEL-2026-e25dddef14 Packages in this update:
  • libsodium-1.0.21-2.el10_1
Update description:

Version 1.0.21

This point release includes all the changes from 1.0.20-stable, which include a security fix for the crypto_core_ed25519_is_valid_point() function, as well as two new sets of functions:

  • The new crypto_ipcrypt_* functions implement mechanisms for securely encrypting and anonymizing IP addresses as specified in https://ipcrypt-std.github.io
  • The sodium_bin2ip and sodium_ip2bin helper functions have been added to complement the crypto_ipcrypt_* functions and easily convert addresses between bytes and strings.
  • XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are standard extendable output functions. From input of any length, they can derive output of any length with the same properties as hash functions. These primitives are required by many post-quantum mechanisms, but can also be used for a wide range of applications, including key derivation, session encryption and more.

Version 1.0.20-stable

  • XCFramework: cross-compilation is now forced on Apple Silicon to avoid Rosetta-related build issues
  • The Fil-C compiler is supported out of the box
  • The CompCert compiler is supported out of the box
  • MSVC 2026 (Visual Studio 2026) is now supported
  • Zig builds now support FreeBSD targets
  • Performance of AES256-GCM and AEGIS on ARM has been improved with some compilers
  • Android binaries have been added to the NuGet package
  • Windows ARM binaries have been added to the NuGet package
  • The Android build script has been improved. The base SDK is now 27c, and the default platform is 21, supporting 16 KB page sizes.
  • The library can now be compiled with Zig 0.15 and Zig 0.16
  • Zig builds now generate position-independent static libraries by default on targets that support PIC
  • arm64e builds have been added to the XCFramework packages
  • XCFramework packages are now full builds instead of minimal builds
  • MSVC builds have been enabled for ARM64
  • iOS 32-bit (armv7/armv7s) support has been removed from the XCFramework build script
  • Security: optblockers have been introduced in critical code paths to prevent compilers from introducing unwanted side channels via conditional jumps. This was observed on RISC-V targets with specific compilers and options.
  • Security: crypto_core_ed25519_is_valid_point() now properly rejects small-order points that are not in the main subgroup
  • ((nonnull)) attributes have been relaxed on some crypto_stream* functions to allow NULL output buffers when the output length is zero
  • A cross-compilation issue with old clang versions has been fixed
  • JavaScript: support for Cloudflare Workers has been added
  • JavaScript: WASM_BIGINT is forcibly disabled to retain compatibility with older runtimes
  • A compilation issue with old toolchains on Solaris has been fixed
  • crypto_aead_aes256gcm_is_available is exported to JavaScript
  • libsodium is now compatible with Emscripten 4.x
  • Security: memory fences have been added after MAC verification in AEAD to prevent speculative access to plaintext before authentication is complete
  • Assembly files now include .gnu.property notes for proper IBT and Shadow Stack support when building with CET instrumentation

libsodium-1.0.21-2.fc43

9 hours 25 minutes ago
FEDORA-2026-cb424f8aa2 Packages in this update:
  • libsodium-1.0.21-2.fc43
Update description:

Version 1.0.21

This point release includes all the changes from 1.0.20-stable, which include a security fix for the crypto_core_ed25519_is_valid_point() function, as well as two new sets of functions:

  • The new crypto_ipcrypt_* functions implement mechanisms for securely encrypting and anonymizing IP addresses as specified in https://ipcrypt-std.github.io
  • The sodium_bin2ip and sodium_ip2bin helper functions have been added to complement the crypto_ipcrypt_* functions and easily convert addresses between bytes and strings.
  • XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are standard extendable output functions. From input of any length, they can derive output of any length with the same properties as hash functions. These primitives are required by many post-quantum mechanisms, but can also be used for a wide range of applications, including key derivation, session encryption and more.

Version 1.0.20-stable

  • XCFramework: cross-compilation is now forced on Apple Silicon to avoid Rosetta-related build issues
  • The Fil-C compiler is supported out of the box
  • The CompCert compiler is supported out of the box
  • MSVC 2026 (Visual Studio 2026) is now supported
  • Zig builds now support FreeBSD targets
  • Performance of AES256-GCM and AEGIS on ARM has been improved with some compilers
  • Android binaries have been added to the NuGet package
  • Windows ARM binaries have been added to the NuGet package
  • The Android build script has been improved. The base SDK is now 27c, and the default platform is 21, supporting 16 KB page sizes.
  • The library can now be compiled with Zig 0.15 and Zig 0.16
  • Zig builds now generate position-independent static libraries by default on targets that support PIC
  • arm64e builds have been added to the XCFramework packages
  • XCFramework packages are now full builds instead of minimal builds
  • MSVC builds have been enabled for ARM64
  • iOS 32-bit (armv7/armv7s) support has been removed from the XCFramework build script
  • Security: optblockers have been introduced in critical code paths to prevent compilers from introducing unwanted side channels via conditional jumps. This was observed on RISC-V targets with specific compilers and options.
  • Security: crypto_core_ed25519_is_valid_point() now properly rejects small-order points that are not in the main subgroup
  • ((nonnull)) attributes have been relaxed on some crypto_stream* functions to allow NULL output buffers when the output length is zero
  • A cross-compilation issue with old clang versions has been fixed
  • JavaScript: support for Cloudflare Workers has been added
  • JavaScript: WASM_BIGINT is forcibly disabled to retain compatibility with older runtimes
  • A compilation issue with old toolchains on Solaris has been fixed
  • crypto_aead_aes256gcm_is_available is exported to JavaScript
  • libsodium is now compatible with Emscripten 4.x
  • Security: memory fences have been added after MAC verification in AEAD to prevent speculative access to plaintext before authentication is complete
  • Assembly files now include .gnu.property notes for proper IBT and Shadow Stack support when building with CET instrumentation

libsodium-1.0.21-2.el10_2

9 hours 25 minutes ago
FEDORA-EPEL-2026-c60f76437d Packages in this update:
  • libsodium-1.0.21-2.el10_2
Update description:

Version 1.0.21

This point release includes all the changes from 1.0.20-stable, which include a security fix for the crypto_core_ed25519_is_valid_point() function, as well as two new sets of functions:

  • The new crypto_ipcrypt_* functions implement mechanisms for securely encrypting and anonymizing IP addresses as specified in https://ipcrypt-std.github.io
  • The sodium_bin2ip and sodium_ip2bin helper functions have been added to complement the crypto_ipcrypt_* functions and easily convert addresses between bytes and strings.
  • XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are standard extendable output functions. From input of any length, they can derive output of any length with the same properties as hash functions. These primitives are required by many post-quantum mechanisms, but can also be used for a wide range of applications, including key derivation, session encryption and more.

Version 1.0.20-stable

  • XCFramework: cross-compilation is now forced on Apple Silicon to avoid Rosetta-related build issues
  • The Fil-C compiler is supported out of the box
  • The CompCert compiler is supported out of the box
  • MSVC 2026 (Visual Studio 2026) is now supported
  • Zig builds now support FreeBSD targets
  • Performance of AES256-GCM and AEGIS on ARM has been improved with some compilers
  • Android binaries have been added to the NuGet package
  • Windows ARM binaries have been added to the NuGet package
  • The Android build script has been improved. The base SDK is now 27c, and the default platform is 21, supporting 16 KB page sizes.
  • The library can now be compiled with Zig 0.15 and Zig 0.16
  • Zig builds now generate position-independent static libraries by default on targets that support PIC
  • arm64e builds have been added to the XCFramework packages
  • XCFramework packages are now full builds instead of minimal builds
  • MSVC builds have been enabled for ARM64
  • iOS 32-bit (armv7/armv7s) support has been removed from the XCFramework build script
  • Security: optblockers have been introduced in critical code paths to prevent compilers from introducing unwanted side channels via conditional jumps. This was observed on RISC-V targets with specific compilers and options.
  • Security: crypto_core_ed25519_is_valid_point() now properly rejects small-order points that are not in the main subgroup
  • ((nonnull)) attributes have been relaxed on some crypto_stream* functions to allow NULL output buffers when the output length is zero
  • A cross-compilation issue with old clang versions has been fixed
  • JavaScript: support for Cloudflare Workers has been added
  • JavaScript: WASM_BIGINT is forcibly disabled to retain compatibility with older runtimes
  • A compilation issue with old toolchains on Solaris has been fixed
  • crypto_aead_aes256gcm_is_available is exported to JavaScript
  • libsodium is now compatible with Emscripten 4.x
  • Security: memory fences have been added after MAC verification in AEAD to prevent speculative access to plaintext before authentication is complete
  • Assembly files now include .gnu.property notes for proper IBT and Shadow Stack support when building with CET instrumentation

libsodium-1.0.21-2.fc42

9 hours 25 minutes ago
FEDORA-2026-b7217393db Packages in this update:
  • libsodium-1.0.21-2.fc42
Update description:

Version 1.0.21

This point release includes all the changes from 1.0.20-stable, which include a security fix for the crypto_core_ed25519_is_valid_point() function, as well as two new sets of functions:

  • The new crypto_ipcrypt_* functions implement mechanisms for securely encrypting and anonymizing IP addresses as specified in https://ipcrypt-std.github.io
  • The sodium_bin2ip and sodium_ip2bin helper functions have been added to complement the crypto_ipcrypt_* functions and easily convert addresses between bytes and strings.
  • XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are standard extendable output functions. From input of any length, they can derive output of any length with the same properties as hash functions. These primitives are required by many post-quantum mechanisms, but can also be used for a wide range of applications, including key derivation, session encryption and more.

Version 1.0.20-stable

  • XCFramework: cross-compilation is now forced on Apple Silicon to avoid Rosetta-related build issues
  • The Fil-C compiler is supported out of the box
  • The CompCert compiler is supported out of the box
  • MSVC 2026 (Visual Studio 2026) is now supported
  • Zig builds now support FreeBSD targets
  • Performance of AES256-GCM and AEGIS on ARM has been improved with some compilers
  • Android binaries have been added to the NuGet package
  • Windows ARM binaries have been added to the NuGet package
  • The Android build script has been improved. The base SDK is now 27c, and the default platform is 21, supporting 16 KB page sizes.
  • The library can now be compiled with Zig 0.15 and Zig 0.16
  • Zig builds now generate position-independent static libraries by default on targets that support PIC
  • arm64e builds have been added to the XCFramework packages
  • XCFramework packages are now full builds instead of minimal builds
  • MSVC builds have been enabled for ARM64
  • iOS 32-bit (armv7/armv7s) support has been removed from the XCFramework build script
  • Security: optblockers have been introduced in critical code paths to prevent compilers from introducing unwanted side channels via conditional jumps. This was observed on RISC-V targets with specific compilers and options.
  • Security: crypto_core_ed25519_is_valid_point() now properly rejects small-order points that are not in the main subgroup
  • ((nonnull)) attributes have been relaxed on some crypto_stream* functions to allow NULL output buffers when the output length is zero
  • A cross-compilation issue with old clang versions has been fixed
  • JavaScript: support for Cloudflare Workers has been added
  • JavaScript: WASM_BIGINT is forcibly disabled to retain compatibility with older runtimes
  • A compilation issue with old toolchains on Solaris has been fixed
  • crypto_aead_aes256gcm_is_available is exported to JavaScript
  • libsodium is now compatible with Emscripten 4.x
  • Security: memory fences have been added after MAC verification in AEAD to prevent speculative access to plaintext before authentication is complete
  • Assembly files now include .gnu.property notes for proper IBT and Shadow Stack support when building with CET instrumentation

USN-7922-4: Linux kernel (Raspberry Pi) vulnerabilities

23 hours 8 minutes ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - ACPI drivers; - InfiniBand drivers; - Media drivers; - Network drivers; - Pin controllers subsystem; - AFS file system; - F2FS file system; - Tracing infrastructure; - Memory management; - Appletalk network protocol; - Netfilter; (CVE-2022-49026, CVE-2022-49390, CVE-2024-47691, CVE-2024-49935, CVE-2024-50067, CVE-2024-50095, CVE-2024-50196, CVE-2024-53090, CVE-2024-53218, CVE-2025-21855, CVE-2025-37958, CVE-2025-38666, CVE-2025-39964, CVE-2025-39993, CVE-2025-40018)