Aggregator

chromium-145.0.7632.75-1.el10_1

6 days 22 hours ago
FEDORA-EPEL-2026-c1f2ed019e Packages in this update:
  • chromium-145.0.7632.75-1.el10_1
Update description:

Update to 145.0.7632.75

  • CVE-2026-2441: Use after free in CSS
  • CVE-2026-2313: Use after free in CSS
  • CVE-2026-2314: Heap buffer overflow in Codecs
  • CVE-2026-2315: Inappropriate implementation in WebGPU
  • CVE-2026-2316: Insufficient policy enforcement in Frames
  • CVE-2026-2317: Inappropriate implementation in Animation
  • CVE-2026-2318: Inappropriate implementation in PictureInPicture
  • CVE-2026-2319: Race in DevTools
  • CVE-2026-2320: Inappropriate implementation in File input
  • CVE-2026-2321: Use after free in Ozone
  • CVE-2026-2322: Inappropriate implementation in File input
  • CVE-2026-2323: Inappropriate implementation in Downloads

chromium-145.0.7632.75-1.fc42

6 days 22 hours ago
FEDORA-2026-583eef79a8 Packages in this update:
  • chromium-145.0.7632.75-1.fc42
Update description:

Update to 145.0.7632.75

  • CVE-2026-2441: Use after free in CSS
  • CVE-2026-2313: Use after free in CSS
  • CVE-2026-2314: Heap buffer overflow in Codecs
  • CVE-2026-2315: Inappropriate implementation in WebGPU
  • CVE-2026-2316: Insufficient policy enforcement in Frames
  • CVE-2026-2317: Inappropriate implementation in Animation
  • CVE-2026-2318: Inappropriate implementation in PictureInPicture
  • CVE-2026-2319: Race in DevTools
  • CVE-2026-2320: Inappropriate implementation in File input
  • CVE-2026-2321: Use after free in Ozone
  • CVE-2026-2322: Inappropriate implementation in File input
  • CVE-2026-2323: Inappropriate implementation in Downloads

chromium-145.0.7632.75-1.el10_2

6 days 22 hours ago
FEDORA-EPEL-2026-c43b37669d Packages in this update:
  • chromium-145.0.7632.75-1.el10_2
Update description:

Update to 145.0.7632.75

  • CVE-2026-2441: Use after free in CSS
  • CVE-2026-2313: Use after free in CSS
  • CVE-2026-2314: Heap buffer overflow in Codecs
  • CVE-2026-2315: Inappropriate implementation in WebGPU
  • CVE-2026-2316: Insufficient policy enforcement in Frames
  • CVE-2026-2317: Inappropriate implementation in Animation
  • CVE-2026-2318: Inappropriate implementation in PictureInPicture
  • CVE-2026-2319: Race in DevTools
  • CVE-2026-2320: Inappropriate implementation in File input
  • CVE-2026-2321: Use after free in Ozone
  • CVE-2026-2322: Inappropriate implementation in File input
  • CVE-2026-2323: Inappropriate implementation in Downloads

USN-7992-2: Inetutils vulnerability

1 week ago
USN-7992-1 fixed vulnerabilities in telnetd in Inetutils. This update provides the corresponding update for Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. Original advisory details: Kyu Neushwaistein discovered that telnetd in Inetutils incorrectly handled certain environment variables. A remote attacker could use this issue to bypass authentication and open a session as an administrator.

USN-8051-1: libssh vulnerabilities

1 week ago
It was discovered that libssh clients incorrectly handled the key exchange process. A remote attacker could possibly use this issue to cause libssh clients to crash, resulting in a denial of service. (CVE-2025-8277) It was discovered that the libssh SCP client incorrectly sanitized paths received from servers. A remote attacker could use this issue to cause libssh SCP clients to overwrite files outside of the working directory and possibly execute arbitrary code. (CVE-2026-0964) It was discovered that libssh incorrectly handled parsing configuration files. A local attacker could possibly use this issue to cause libssh to access non-regular files, resulting in a denial of service. (CVE-2026-0965) It was discovered that libssh incorrectly handled the ssh_get_hexa() function. A remote attacker could possibly use this issue to cause libssh to crash, resulting in a denial of service. (CVE-2026-0966) It was discovered that libssh incorrectly handled certain regular expressions. A local attacker could possibly use this issue to cause libssh to consume resources, resulting in a denial of service. (CVE-2026-0967) It was discovered that the libssh SFTP client incorrectly handled certain malformed longname fields. A remote attacker could use this issue to cause libssh SFTP clients to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-0968)

microcode_ctl-2.1-71.1.fc43

1 week ago
FEDORA-2026-60e8919a4a Packages in this update:
  • microcode_ctl-2.1-71.1.fc43
Update description:
  • Update to upstream 2.1-51. 20260210
  • Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision 0x10002f3;
  • Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000410 up to 0xd000421;
  • Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002e0 up to 0x10002f1;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca up to 0xcc;
  • Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision 0xbc up to 0xbe;
  • Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up to 0x3e;
  • Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up to 0x58;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up to 0xc;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up to 0x65;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x25 up to 0x28;
  • Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision 0xa000100 up to 0xa000133;
  • Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision 0x10003d0 up to 0x1000405;
  • Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000362 up to 0x3000382;
  • Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up to 0xd;
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up to 0x133;
  • Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from revision 0x12f up to 0x133;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x123 up to 0x125;
  • Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up to 0x21;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x210002b3 up to 0x210002d3;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002b3 up to 0x210002d3.
  • Resolves RHBZ#2431378

microcode_ctl-2.1-74.fc44

1 week ago
FEDORA-2026-3b12e49fee Packages in this update:
  • microcode_ctl-2.1-74.fc44
Update description:
  • Update to upstream 2.1-51. 20260210
  • Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision 0x10002f3;
  • Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000410 up to 0xd000421;
  • Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002e0 up to 0x10002f1;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca up to 0xcc;
  • Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision 0xbc up to 0xbe;
  • Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up to 0x3e;
  • Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up to 0x58;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up to 0xc;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up to 0x65;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x25 up to 0x28;
  • Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision 0xa000100 up to 0xa000133;
  • Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision 0x10003d0 up to 0x1000405;
  • Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000362 up to 0x3000382;
  • Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up to 0xd;
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up to 0x133;
  • Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from revision 0x12f up to 0x133;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x123 up to 0x125;
  • Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up to 0x21;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x210002b3 up to 0x210002d3;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002b3 up to 0x210002d3.
  • Resolves RHBZ#2431378

microcode_ctl-2.1-70.1.fc42

1 week ago
FEDORA-2026-85ee8cb2a2 Packages in this update:
  • microcode_ctl-2.1-70.1.fc42
Update description:
  • Update to upstream 2.1-51. 20260210
  • Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision 0x10002f3;
  • Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000410 up to 0xd000421;
  • Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002e0 up to 0x10002f1;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca up to 0xcc;
  • Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision 0xbc up to 0xbe;
  • Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up to 0x3e;
  • Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up to 0x58;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision 0x2c000401 up to 0x2c000421;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b000643 up to 0x2b000661;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
  • Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up to 0xc;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437 up to 0x43b;
  • Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up to 0x65;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x25 up to 0x28;
  • Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision 0xa000100 up to 0xa000133;
  • Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision 0x10003d0 up to 0x1000405;
  • Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000362 up to 0x3000382;
  • Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up to 0xd;
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up to 0x133;
  • Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from revision 0x12f up to 0x133;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4129 up to 0x6134;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
  • Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x123 up to 0x125;
  • Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up to 0x21;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up to 0x3e;
  • Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
  • Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision 0x119 up to 0x11b;
  • Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from revision 0x119 up to 0x11b;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x210002b3 up to 0x210002d3;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002b3 up to 0x210002d3.
  • Resolves RHBZ#2431378

USN-8031-2: Linux kernel (GCP FIPS) vulnerabilities

1 week ago
It was discovered that improper initialization of CPU cache memory could allow a local attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. (CVE-2024-36331) Oleksii Oleksenko, Cedric Fournet, Jana Hofmann, Boris Köpf, Stavros Volos, and Flavien Solt discovered that some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information. A local attacker could possibly use this to expose sensitive information. (CVE-2024-36350, CVE-2024-36357) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - MIPS architecture; - PA-RISC architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Serial ATA and Parallel ATA drivers; - ATM drivers; - Drivers core; - ATA over ethernet (AOE) driver; - DRBD Distributed Replicated Block Device drivers; - Network block device driver; - Ublk userspace block driver; - Bluetooth drivers; - Bus devices; - Character device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - Device frequency scaling framework; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - EDAC drivers; - Arm Firmware Framework for ARMv8-A(FFA); - ARM SCMI message protocol; - FPGA Framework; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - HW tracing; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - Input Device (Miscellaneous) drivers; - IOMMU subsystem; - IRQ chip drivers; - MCB driver; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - Microchip PCI driver; - Intel Management Engine Interface driver; - PCI Endpoint Test driver; - TI TPS6594 PFSM driver; - VMware VMCI Driver; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVDIMM (Non-Volatile Memory Device) drivers; - NVME drivers; - PCI subsystem; - Amlogic Meson DDR PMU; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - Power supply drivers; - Powercap sysfs driver; - PTP clock framework; - PWM drivers; - RapidIO drivers; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - S/390 drivers; - SCSI subsystem; - ASPEED SoC drivers; - QCOM SoC drivers; - Samsung SoC drivers; - SPI subsystem; - small TFT LCD display modules; - Media staging drivers; - TCM subsystem; - Trusted Execution Environment drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - Cadence USB3 driver; - ChipIdea USB driver; - USB Device Class drivers; - USB core drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - Renesas USBHS Controller drivers; - USB Type-C support driver; - USB Type-C Connector System Software Interface driver; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Backlight driver; - Framebuffer layer; - TSM Common Guest driver; - Virtio drivers; - Xen hypervisor drivers; - File systems infrastructure; - BTRFS file system; - Ceph distributed file system; - EFI Variable file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFFS2 file system; - JFS file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - SMB network file system; - DRM display driver; - Asynchronous Transfer Mode (ATM) subsystem; - BPF subsystem; - Memory Management; - Internal shared memory driver; - LZO compression library; - Mellanox drivers; - padata parallel execution mechanism; - Networking subsytem; - Bluetooth subsystem; - Netfilter; - Network traffic control; - SCTP protocol; - Network sockets; - UDP network protocol; - eXpress Data Path; - XFRM subsystem; - Digital Audio (PCM) driver; - Universal MIDI packet (UMP) support module; - Tracing infrastructure; - User-space API (UAPI); - io_uring subsystem; - IPC subsystem; - Perf events; - Kernel exit() syscall; - IRQ subsystem; - Padata parallel execution mechanism; - Kernel command line parsing driver; - Hibernation control; - RCU subsystem; - Restartable seuqences system call mechanism; - Maple Tree data structure library; - Memory management; - KASAN memory debugging framework; - 802.1Q VLAN protocol; - 9P file system network protocol; - Appletalk network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - Distributed Switch Architecture; - HSR network protocol; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - Management Component Transport Protocol (MCTP); - MultiProtocol Label Switching driver; - Multipath TCP; - NetLabel subsystem; - Netlink; - NFC subsystem; - Open vSwitch; - RDS protocol; - Rose network layer; - RxRPC session sockets; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - TLS protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - ALSA framework; - WCD audio codecs; - Intel ASoC drivers; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - USB sound devices; - Virtio sound driver; - CPU Power monitoring subsystem; - KVM subsystem; (CVE-2025-21884, CVE-2025-21931, CVE-2025-22026, CVE-2025-22101, CVE-2025-22102, CVE-2025-22115, CVE-2025-22120, CVE-2025-22126, CVE-2025-22128, CVE-2025-23140, CVE-2025-23141, CVE-2025-23142, CVE-2025-23144, CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148, CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23155, CVE-2025-23156, CVE-2025-23157, CVE-2025-23158, CVE-2025-23159, CVE-2025-23160, CVE-2025-23161, CVE-2025-23163, CVE-2025-37738, CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742, CVE-2025-37744, CVE-2025-37745, CVE-2025-37748, CVE-2025-37749, CVE-2025-37754, CVE-2025-37755, CVE-2025-37757, CVE-2025-37758, CVE-2025-37759, CVE-2025-37761, CVE-2025-37763, CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767, CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771, CVE-2025-37772, CVE-2025-37773, CVE-2025-37775, CVE-2025-37777, CVE-2025-37778, CVE-2025-37780, CVE-2025-37781, CVE-2025-37784, CVE-2025-37786, CVE-2025-37787, CVE-2025-37788, CVE-2025-37789, CVE-2025-37790, CVE-2025-37792, CVE-2025-37793, CVE-2025-37794, CVE-2025-37796, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801, CVE-2025-37803, CVE-2025-37805, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810, CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819, CVE-2025-37820, CVE-2025-37822, CVE-2025-37823, CVE-2025-37824, CVE-2025-37826, CVE-2025-37827, CVE-2025-37828, CVE-2025-37829, CVE-2025-37830, CVE-2025-37831, CVE-2025-37836, CVE-2025-37839, CVE-2025-37840, CVE-2025-37841, CVE-2025-37842, CVE-2025-37844, CVE-2025-37846, CVE-2025-37849, CVE-2025-37850, CVE-2025-37851, CVE-2025-37852, CVE-2025-37853, CVE-2025-37854, CVE-2025-37856, CVE-2025-37857, CVE-2025-37858, CVE-2025-37859, CVE-2025-37861, CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865, CVE-2025-37867, CVE-2025-37869, CVE-2025-37871, CVE-2025-37872, CVE-2025-37873, CVE-2025-37874, CVE-2025-37875, CVE-2025-37878, CVE-2025-37879, CVE-2025-37881, CVE-2025-37883, CVE-2025-37884, CVE-2025-37885, CVE-2025-37886, CVE-2025-37887, CVE-2025-37891, CVE-2025-37892, CVE-2025-37897, CVE-2025-37900, CVE-2025-37901, CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37916, CVE-2025-37917, CVE-2025-37918, CVE-2025-37920, CVE-2025-37921, CVE-2025-37922, CVE-2025-37923, CVE-2025-37924, CVE-2025-37925, CVE-2025-37927, CVE-2025-37928, CVE-2025-37930, CVE-2025-37931, CVE-2025-37933, CVE-2025-37935, CVE-2025-37936, CVE-2025-37938, CVE-2025-37940, CVE-2025-37943, CVE-2025-37944, CVE-2025-37945, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37956, CVE-2025-37957, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963, CVE-2025-37967, CVE-2025-37968, CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37973, CVE-2025-37975, CVE-2025-37977, CVE-2025-37978, CVE-2025-37979, CVE-2025-37980, CVE-2025-37982, CVE-2025-37983, CVE-2025-37984, CVE-2025-37985, CVE-2025-37986, CVE-2025-37987, CVE-2025-37988, CVE-2025-37989, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994, CVE-2025-37995, CVE-2025-37998, CVE-2025-38003, CVE-2025-38004, CVE-2025-38005, CVE-2025-38006, CVE-2025-38007, CVE-2025-38008, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38019, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027, CVE-2025-38031, CVE-2025-38034, CVE-2025-38035, CVE-2025-38037, CVE-2025-38039, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044, CVE-2025-38045, CVE-2025-38048, CVE-2025-38051, CVE-2025-38052, CVE-2025-38053, CVE-2025-38055, CVE-2025-38057, CVE-2025-38058, CVE-2025-38059, CVE-2025-38060, CVE-2025-38061, CVE-2025-38062, CVE-2025-38063, CVE-2025-38065, CVE-2025-38066, CVE-2025-38067, CVE-2025-38068, CVE-2025-38071, CVE-2025-38072, CVE-2025-38074, CVE-2025-38075, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38084, CVE-2025-38085, CVE-2025-38086, CVE-2025-38087, CVE-2025-38088, CVE-2025-38089, CVE-2025-38090, CVE-2025-38094, CVE-2025-38095, CVE-2025-38097, CVE-2025-38098, CVE-2025-38099, CVE-2025-38100, CVE-2025-38101, CVE-2025-38102, CVE-2025-38103, CVE-2025-38104, CVE-2025-38107, CVE-2025-38108, CVE-2025-38109, CVE-2025-38110, CVE-2025-38111, CVE-2025-38112, CVE-2025-38113, CVE-2025-38115, CVE-2025-38117, CVE-2025-38119, CVE-2025-38120, CVE-2025-38122, CVE-2025-38123, CVE-2025-38124, CVE-2025-38125, CVE-2025-38126, CVE-2025-38127, CVE-2025-38129, CVE-2025-38131, CVE-2025-38135, CVE-2025-38136, CVE-2025-38138, CVE-2025-38142, CVE-2025-38143, CVE-2025-38145, CVE-2025-38146, CVE-2025-38147, CVE-2025-38148, CVE-2025-38149, CVE-2025-38153, CVE-2025-38154, CVE-2025-38155, CVE-2025-38156, CVE-2025-38157, CVE-2025-38158, CVE-2025-38159, CVE-2025-38160, CVE-2025-38161, CVE-2025-38162, CVE-2025-38163, CVE-2025-38164, CVE-2025-38165, CVE-2025-38166, CVE-2025-38167, CVE-2025-38169, CVE-2025-38170, CVE-2025-38173, CVE-2025-38174, CVE-2025-38180, CVE-2025-38181, CVE-2025-38182, CVE-2025-38183, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38191, CVE-2025-38192, CVE-2025-38193, CVE-2025-38194, CVE-2025-38197, CVE-2025-38198, CVE-2025-38200, CVE-2025-38202, CVE-2025-38208, CVE-2025-38210, CVE-2025-38211, CVE-2025-38212, CVE-2025-38214, CVE-2025-38215, CVE-2025-38217, CVE-2025-38218, CVE-2025-38219, CVE-2025-38220, CVE-2025-38222, CVE-2025-38225, CVE-2025-38226, CVE-2025-38229, CVE-2025-38230, CVE-2025-38231, CVE-2025-38232, CVE-2025-38236, CVE-2025-38239, CVE-2025-38244, CVE-2025-38245, CVE-2025-38246, CVE-2025-38248, CVE-2025-38249, CVE-2025-38250, CVE-2025-38251, CVE-2025-38253, CVE-2025-38255, CVE-2025-38257, CVE-2025-38258, CVE-2025-38259, CVE-2025-38260, CVE-2025-38262, CVE-2025-38263, CVE-2025-38264, CVE-2025-38265, CVE-2025-38269, CVE-2025-38274, CVE-2025-38275, CVE-2025-38277, CVE-2025-38278, CVE-2025-38279, CVE-2025-38280, CVE-2025-38282, CVE-2025-38283, CVE-2025-38285, CVE-2025-38286, CVE-2025-38289, CVE-2025-38290, CVE-2025-38292, CVE-2025-38293, CVE-2025-38295, CVE-2025-38298, CVE-2025-38299, CVE-2025-38300, CVE-2025-38303, CVE-2025-38304, CVE-2025-38305, CVE-2025-38307, CVE-2025-38310, CVE-2025-38312, CVE-2025-38313, CVE-2025-38319, CVE-2025-38320, CVE-2025-38321, CVE-2025-38322, CVE-2025-38323, CVE-2025-38324, CVE-2025-38326, CVE-2025-38328, CVE-2025-38331, CVE-2025-38332, CVE-2025-38333, CVE-2025-38334, CVE-2025-38335, CVE-2025-38336, CVE-2025-38337, CVE-2025-38338, CVE-2025-38342, CVE-2025-38343, CVE-2025-38344, CVE-2025-38345, CVE-2025-38346, CVE-2025-38347, CVE-2025-38348, CVE-2025-38349, CVE-2025-38351, CVE-2025-38354, CVE-2025-38361, CVE-2025-38362, CVE-2025-38363, CVE-2025-38364, CVE-2025-38365, CVE-2025-38368, CVE-2025-38369, CVE-2025-38371, CVE-2025-38373, CVE-2025-38374, CVE-2025-38375, CVE-2025-38376, CVE-2025-38377, CVE-2025-38382, CVE-2025-38384, CVE-2025-38385, CVE-2025-38386, CVE-2025-38387, CVE-2025-38388, CVE-2025-38389, CVE-2025-38390, CVE-2025-38391, CVE-2025-38392, CVE-2025-38393, CVE-2025-38395, CVE-2025-38396, CVE-2025-38399, CVE-2025-38400, CVE-2025-38401, CVE-2025-38402, CVE-2025-38403, CVE-2025-38405, CVE-2025-38406, CVE-2025-38407, CVE-2025-38408, CVE-2025-38409, CVE-2025-38410, CVE-2025-38412, CVE-2025-38414, CVE-2025-38415, CVE-2025-38416, CVE-2025-38418, CVE-2025-38419, CVE-2025-38420, CVE-2025-38422, CVE-2025-38424, CVE-2025-38427, CVE-2025-38428, CVE-2025-38429, CVE-2025-38430, CVE-2025-38436, CVE-2025-38437, CVE-2025-38439, CVE-2025-38441, CVE-2025-38443, CVE-2025-38444, CVE-2025-38445, CVE-2025-38448, CVE-2025-38449, CVE-2025-38455, CVE-2025-38456, CVE-2025-38457, CVE-2025-38458, CVE-2025-38459, CVE-2025-38460, CVE-2025-38461, CVE-2025-38462, CVE-2025-38463, CVE-2025-38464, CVE-2025-38465, CVE-2025-38466, CVE-2025-38467, CVE-2025-38468, CVE-2025-38469, CVE-2025-38470, CVE-2025-38471, CVE-2025-38472, CVE-2025-38473, CVE-2025-38474, CVE-2025-38476, CVE-2025-38478, CVE-2025-38480, CVE-2025-38481, CVE-2025-38482, CVE-2025-38483, CVE-2025-38485, CVE-2025-38487, CVE-2025-38488, CVE-2025-38489, CVE-2025-38490, CVE-2025-38491, CVE-2025-38493, CVE-2025-38494, CVE-2025-38495, CVE-2025-38496, CVE-2025-38497, CVE-2025-38499, CVE-2025-38501, CVE-2025-38503, CVE-2025-38506, CVE-2025-38507, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531, CVE-2025-38532, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537, CVE-2025-38538, CVE-2025-38539, CVE-2025-38540, CVE-2025-38542, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548, CVE-2025-38549, CVE-2025-38550, CVE-2025-38551, CVE-2025-38552, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38562, CVE-2025-38566, CVE-2025-38568, CVE-2025-38569, CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38577, CVE-2025-38578, CVE-2025-38579, CVE-2025-38581, CVE-2025-38582, CVE-2025-38583, CVE-2025-38584, CVE-2025-38585, CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614, CVE-2025-38615, CVE-2025-38619, CVE-2025-38622, CVE-2025-38623, CVE-2025-38624, CVE-2025-38625, CVE-2025-38626, CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639, CVE-2025-38640, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646, CVE-2025-38648, CVE-2025-38650, CVE-2025-38652, CVE-2025-38653, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671, CVE-2025-38675, CVE-2025-38676, CVE-2025-38677, CVE-2025-38679, CVE-2025-38680, CVE-2025-38681, CVE-2025-38683, CVE-2025-38684, CVE-2025-38685, CVE-2025-38686, CVE-2025-38687, CVE-2025-38688, CVE-2025-38691, CVE-2025-38692, CVE-2025-38693, CVE-2025-38694, CVE-2025-38695, CVE-2025-38696, CVE-2025-38697, CVE-2025-38698, CVE-2025-38699, CVE-2025-38700, CVE-2025-38701, CVE-2025-38702, CVE-2025-38703, CVE-2025-38704, CVE-2025-38705, CVE-2025-38706, CVE-2025-38707, CVE-2025-38708, CVE-2025-38710, CVE-2025-38711, CVE-2025-38712, CVE-2025-38713, CVE-2025-38714, CVE-2025-38715, CVE-2025-38716, CVE-2025-38718, CVE-2025-38721, CVE-2025-38722, CVE-2025-38724, CVE-2025-38725, CVE-2025-38728, CVE-2025-38729, CVE-2025-38730, CVE-2025-38732, CVE-2025-38734, CVE-2025-38735, CVE-2025-39673, CVE-2025-39675, CVE-2025-39676, CVE-2025-39679, CVE-2025-39681, CVE-2025-39683, CVE-2025-39684, CVE-2025-39685, CVE-2025-39686, CVE-2025-39687, CVE-2025-39689, CVE-2025-39691, CVE-2025-39692, CVE-2025-39693, CVE-2025-39694, CVE-2025-39701, CVE-2025-39702, CVE-2025-39703, CVE-2025-39705, CVE-2025-39706, CVE-2025-39707, CVE-2025-39709, CVE-2025-39710, CVE-2025-39711, CVE-2025-39712, CVE-2025-39713, CVE-2025-39714, CVE-2025-39715, CVE-2025-39716, CVE-2025-39718, CVE-2025-39719, CVE-2025-39720, CVE-2025-39721, CVE-2025-39724, CVE-2025-39726, CVE-2025-39730, CVE-2025-39731, CVE-2025-39732, CVE-2025-39734, CVE-2025-39736, CVE-2025-39737, CVE-2025-39738, CVE-2025-39739, CVE-2025-39742, CVE-2025-39743, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747, CVE-2025-39748, CVE-2025-39749, CVE-2025-39750, CVE-2025-39752, CVE-2025-39753, CVE-2025-39756, CVE-2025-39757, CVE-2025-39758, CVE-2025-39759, CVE-2025-39760, CVE-2025-39761, CVE-2025-39763, CVE-2025-39766, CVE-2025-39770, CVE-2025-39772, CVE-2025-39773, CVE-2025-39776, CVE-2025-39779, CVE-2025-39781, CVE-2025-39782, CVE-2025-39783, CVE-2025-39787, CVE-2025-39788, CVE-2025-39790, CVE-2025-39794, CVE-2025-39795, CVE-2025-39797, CVE-2025-39798, CVE-2025-39800, CVE-2025-39801, CVE-2025-39889, CVE-2025-39890, CVE-2025-39946, CVE-2025-39989, CVE-2025-40215, CVE-2025-40297, CVE-2025-68750)

apptainer-1.4.5-3.el8

1 week ago
FEDORA-EPEL-2026-82f07c2a59 Packages in this update:
  • apptainer-1.4.5-3.el8
Update description:

Enable FIPS support. This was built with golang-1.25.7 so it also fixes these CVE's based on older golang versions: CVE-2025-61723, CVE-2025-61725, CVE-2025-58183, CVE-2025-58185, CVE-2025-58188, and CVE-2025-58189.