Aggregator

krb5-1.22.2-4.fc43

6 days 7 hours ago
FEDORA-2026-684396998a Packages in this update:
  • krb5-1.22.2-4.fc43
Update description:
  • Fix NegoEx parsing vulnerabilities (CVE-2026-40355, CVE-2026-40356)
  • Add upstream patches to build against openssl 4.0
  • Make configure.ac work with autoconf 2.73

krb5-1.22.2-4.fc44

6 days 7 hours ago
FEDORA-2026-8b43ea2f82 Packages in this update:
  • krb5-1.22.2-4.fc44
Update description:
  • Fix NegoEx parsing vulnerabilities (CVE-2026-40355, CVE-2026-40356)
  • Add upstream patches to build against openssl 4.0
  • Make configure.ac work with autoconf 2.73

USN-8224-1: Linux kernel (BlueField) vulnerabilities

6 days 7 hours ago
Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM). An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege escalation, or possibly escape a container. (LP: #2143853, CVE-2026-23268, CVE-2026-23269, CVE-2026-23403, CVE-2026-23404, CVE-2026-23405, CVE-2026-23406, CVE-2026-23407, CVE-2026-23408, CVE-2026-23409, CVE-2026-23410, CVE-2026-23411) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Cryptographic API; - GPU drivers; - I2C subsystem; - BTRFS file system; - XFRM subsystem; - Padata parallel execution mechanism; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Netfilter; - Network traffic control; - SMC sockets; (CVE-2021-47599, CVE-2022-48875, CVE-2022-49046, CVE-2022-49698, CVE-2024-46816, CVE-2024-49927, CVE-2024-56640, CVE-2025-21726, CVE-2025-21780, CVE-2025-37849, CVE-2025-40019, CVE-2025-40215, CVE-2026-23060, CVE-2026-23074)

krb5-1.22.2-7.fc45

6 days 8 hours ago
FEDORA-2026-2e9fe57a46 Packages in this update:
  • krb5-1.22.2-7.fc45
Update description:

Automatic update for krb5-1.22.2-7.fc45.

Changelog * Tue Apr 28 2026 Julien Rische <jrische@redhat.com> - 1.22.2-7 - Fix NegoEx parsing vulnerabilities (CVE-2026-40355, CVE-2026-40356) - resolves: rhbz#2463398 - resolves: rhbz#2463395

USN-8222-1: OpenSSH vulnerabilities

6 days 9 hours ago
Christos Papakonstantinou discovered that the OpenSSH scp tool incorrectly handled the legacy scp protocol (-O) option. This could result in certain files being installed setuid or setgid, contrary to expectations. (CVE-2026-35385) Florian Kohnhäuser discovered that OpenSSH incorrectly handled shell metacharacters in usernames within a command line. When untrusted usernames and non-default configurations using % in ssh_config are being used, an attacker could possibly use this issue to execute arbitrary code. (CVE-2026-35386) Christos Papakonstantinou discovered that OpenSSH incorrectly handled parsing the PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms options. This could result in unintended ECDSA algorithms being used, contrary to expectations. (CVE-2026-35387) Michalis Vasileiadis discovered that OpenSSH incorrectly handled proxy-mode multiplexing sessions. This could result in no confirmation being asked, contrary to expectations. (CVE-2026-35388) Vladimir Tokarev discovered that OpenSSH incorrectly handled certificates with the principal name containing a comma character when using user-trusted CA keys in authorized_keys and an authorized_keys principals="" option that lists more than one principal. This could result in inappropriate principal matching, contrary to expectations. (CVE-2026-35414)

USN-8195-3: PackageKit vulnerability

6 days 12 hours ago
USN-8195-1 fixed a vulnerability in PackageKit. This update provides the corresponding fix to Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Original advisory details: It was discovered that PackageKit incorrectly handled certain transactions. A local attacker could use this issue to install arbitrary packages as root, possibly resulting in privilege escalation.

USN-8221-1: wheel vulnerability

6 days 21 hours ago
It was discovered that wheel did not correctly handle certain file paths. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to execute arbitrary code.