Aggregator

USN-8279-1: Linux kernel vulnerabilities

3 days 11 hours ago
It was discovered that the Linux kernel algif_aead module did not properly handle in-place cryptographic operations. This flaw is known as Copy Fail. A local attacker could use this to escalate privileges, or possibly escape a container. (CVE-2026-31431) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - Ethernet bonding driver; - SMB network file system; - Netfilter; - io_uring subsystem; - Packet sockets; - TLS protocol; (CVE-2024-35862, CVE-2024-50060, CVE-2026-23274, CVE-2026-23351, CVE-2026-31419, CVE-2026-31504, CVE-2026-31533, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

USN-8278-1: Linux kernel vulnerabilities

3 days 11 hours ago
It was discovered that the Linux kernel algif_aead module did not properly handle in-place cryptographic operations. This flaw is known as Copy Fail. A local attacker could use this to escalate privileges, or possibly escape a container. (CVE-2026-31431) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Cryptographic API; - Compute Acceleration Framework; - Drivers core; - Null block device driver; - Ublk userspace block driver; - Bluetooth drivers; - Counter interface drivers; - DMA engine subsystem; - DPLL subsystem; - GPU drivers; - HID subsystem; - Intel Trace Hub HW tracing drivers; - IIO ADC drivers; - IIO subsystem; - On-Chip Interconnect management framework; - IRQ chip drivers; - Modular ISDN driver; - LED subsystem; - Multiple devices driver; - UACCE accelerator framework; - MMC subsystem; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - NVME drivers; - PHY drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - SLIMbus drivers; - SPI subsystem; - TCM subsystem; - W1 Dallas's 1-wire bus driver; - Xen hypervisor drivers; - BTRFS file system; - EFI Variable file system; - exFAT file system; - Ext4 file system; - HFS+ file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - Scheduler infrastructure; - Netfilter; - NFC subsystem; - Tracing infrastructure; - io_uring subsystem; - BPF subsystem; - Perf events; - Floating proportions library; - Memory management; - Bluetooth subsystem; - CAN network layer; - Ceph Core library; - Networking core; - IPv4 networking; - IPv6 networking; - L2TP protocol; - MAC80211 subsystem; - NET/ROM layer; - Packet sockets; - Network traffic control; - SCTP protocol; - TLS protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - ALSA AC97 driver; - Generic PCM loopback sound driver; - Creative Sound Blaster X-Fi driver; - AMD SoC Alsa drivers; - Texas InstrumentS Audio (ASoC/HDA) drivers; - USB sound devices; - KVM subsystem; (CVE-2024-50004, CVE-2024-58096, CVE-2024-58097, CVE-2025-37926, CVE-2025-38201, CVE-2025-38591, CVE-2025-40039, CVE-2025-40082, CVE-2025-40149, CVE-2025-68351, CVE-2025-68358, CVE-2025-68365, CVE-2025-68725, CVE-2025-68749, CVE-2025-68803, CVE-2025-68823, CVE-2025-71160, CVE-2025-71162, CVE-2025-71163, CVE-2025-71180, CVE-2025-71182, CVE-2025-71183, CVE-2025-71184, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190, CVE-2025-71191, CVE-2025-71192, CVE-2025-71193, CVE-2025-71194, CVE-2025-71195, CVE-2025-71196, CVE-2025-71197, CVE-2025-71198, CVE-2025-71199, CVE-2025-71200, CVE-2025-71220, CVE-2025-71222, CVE-2025-71224, CVE-2025-71225, CVE-2025-71268, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-22994, CVE-2026-22996, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23000, CVE-2026-23001, CVE-2026-23003, CVE-2026-23005, CVE-2026-23006, CVE-2026-23010, CVE-2026-23011, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23031, CVE-2026-23032, CVE-2026-23033, CVE-2026-23035, CVE-2026-23037, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23050, CVE-2026-23053, CVE-2026-23054, CVE-2026-23056, CVE-2026-23057, CVE-2026-23058, CVE-2026-23059, CVE-2026-23061, CVE-2026-23062, CVE-2026-23063, CVE-2026-23064, CVE-2026-23065, CVE-2026-23068, CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087, CVE-2026-23088, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23094, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107, CVE-2026-23108, CVE-2026-23110, CVE-2026-23113, CVE-2026-23116, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23123, CVE-2026-23124, CVE-2026-23125, CVE-2026-23126, CVE-2026-23128, CVE-2026-23129, CVE-2026-23131, CVE-2026-23133, CVE-2026-23135, CVE-2026-23136, CVE-2026-23139, CVE-2026-23140, CVE-2026-23141, CVE-2026-23142, CVE-2026-23144, CVE-2026-23145, CVE-2026-23146, CVE-2026-23148, CVE-2026-23150, CVE-2026-23151, CVE-2026-23156, CVE-2026-23159, CVE-2026-23160, CVE-2026-23163, CVE-2026-23164, CVE-2026-23166, CVE-2026-23167, CVE-2026-23168, CVE-2026-23170, CVE-2026-23172, CVE-2026-23173, CVE-2026-23176, CVE-2026-23178, CVE-2026-23179, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187, CVE-2026-23190, CVE-2026-23191, CVE-2026-23193, CVE-2026-23198, CVE-2026-23200, CVE-2026-23202, CVE-2026-23204, CVE-2026-23205, CVE-2026-23206, CVE-2026-23212, CVE-2026-23213, CVE-2026-23214, CVE-2026-23215, CVE-2026-23216, CVE-2026-23254, CVE-2026-23256, CVE-2026-23257, CVE-2026-23258, CVE-2026-23260, CVE-2026-23261, CVE-2026-23262, CVE-2026-23264, CVE-2026-23274, CVE-2026-23351, CVE-2026-23394, CVE-2026-31419, CVE-2026-31504, CVE-2026-31533, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

USN-8277-1: Linux kernel vulnerabilities

3 days 11 hours ago
It was discovered that the Linux kernel algif_aead module did not properly handle in-place cryptographic operations. This flaw is known as Copy Fail. A local attacker could use this to escalate privileges, or possibly escape a container. (CVE-2026-31431) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - S390 architecture; - Cryptographic API; - GPU drivers; - Ethernet bonding driver; - Network file system (NFS) server daemon; - Distributed Switch Architecture; - Netfilter; - Control group (cgroup); - Kernel kexec() syscall; - Memory management; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - TLS protocol; - Unix domain sockets; (CVE-2025-71088, CVE-2025-71090, CVE-2025-71127, CVE-2025-71134, CVE-2025-71139, CVE-2025-71141, CVE-2025-71142, CVE-2025-71144, CVE-2025-71152, CVE-2025-71155, CVE-2026-23274, CVE-2026-23351, CVE-2026-23394, CVE-2026-31419, CVE-2026-31504, CVE-2026-31533, CVE-2026-43033, CVE-2026-43077, CVE-2026-43078)

linux-firmware-20260519-1.fc43

3 days 13 hours ago
FEDORA-2026-16c8693020 Packages in this update:
  • linux-firmware-20260519-1.fc43
Update description:

Update to 20260519:

  • ASoC: tas2783: Add Firmware files for tas2783A projects
  • add firmware for MT7927 WiFi device
  • Add HP ISH firmware for Intel Panther Lake systems
  • ti: Add PCM6240 firmware with multiple audio profiles support
  • qcom: add CDSP firmware for shikra platform
  • amdgpu: updates for various ASICs
  • qcom: update ADSP firmware for x1e80100 platform
  • qcom: Add cdsp1r.jsn for sa8775p platform
  • Add firmware for Lontium LT9611C
  • xe: Update GUC to v70.65.0 for LNL, BMG, PTL
  • rtl_bt: Add missing rtl8761a_config.bin for RTL8761AU
  • Add Dell ISH firmware 581.7783.0 for Intel Panther Lake systems.
  • qcom: update ADSP firmware for x1e80100 platform
  • linux-firmware:Add firmware for Lontium LT7911EXC bridge
  • qcom/x1e80100/dell: mark that qcom/NOTICE.txt is applicable too
  • qcom: Update CDSP firmware for Kaanapali platform
  • qcom: vpu: add Gen2 firmware binary for Agatti
  • amdgpu: DMCUB updates for various ASICs
  • Add firmware file for Intel BlazarIGfp2/BlazarIW/ScorpiusGfp2
  • Update firmware file for Intel BlazarI/BlazarU/BlazarU-HrPGfP/Scorpius core
  • qcom: Update ADSP firmware for Glymur platform
  • mediatek MT7925: update bluetooth firmware to 20260414153243
  • update firmware for MT7925 WiFi device
  • Revert "Update firmware file for Intel Quasar core"
  • qcom: Add gpdspr.jsn for qcs8300 platform
  • ath12k: QCC2072 hw1.0: add to WLAN.COL.1.0.c2-00074-QCACOLSWPL_V1_TO_SILICONZ-1
  • ath12k: QCC2072 hw1.0: add board-2.bin
  • ath12k: IPQ5424 hw1.0: add to WLAN.WBE.1.6-01275-QCAHKSWPL_SILICONZ-1
  • ath12k: IPQ5424 hw1.0: add board-2.bin
  • qcom: Update ADSP firmware for Kaanapali platform
  • cirrus: cs35l56: Add firmware for Cirrus Amps for some Lenovo laptops (17aa235c 17aa235d)
  • QCA: Update Bluetooth WCN6856 firmware 2.1.0-00665 to 2.1.0-00666
  • amdgpu: DMCUB updates for DCN36
  • Update AMD cpu microcode
  • powervr: update Imagination Rogue firmware images
  • qcom: Update ADSP firmware for Kaanapali platform
  • i915: Xe3LPD DMC v2.34
  • i915: Xe3LPD_3002 DMC v2.29
  • qcom: Update ADSP firmware for QCM6490 platform
  • firmware/amdgpu: Update DMCUB fw to Release 0.1.55.0
  • mediatek: vpu: drop old sym link

linux-firmware-20260519-1.fc44

3 days 13 hours ago
FEDORA-2026-2b07c67f06 Packages in this update:
  • linux-firmware-20260519-1.fc44
Update description:

Update to 20260519:

  • ASoC: tas2783: Add Firmware files for tas2783A projects
  • add firmware for MT7927 WiFi device
  • Add HP ISH firmware for Intel Panther Lake systems
  • ti: Add PCM6240 firmware with multiple audio profiles support
  • qcom: add CDSP firmware for shikra platform
  • amdgpu: updates for various ASICs
  • qcom: update ADSP firmware for x1e80100 platform
  • qcom: Add cdsp1r.jsn for sa8775p platform
  • Add firmware for Lontium LT9611C
  • xe: Update GUC to v70.65.0 for LNL, BMG, PTL
  • rtl_bt: Add missing rtl8761a_config.bin for RTL8761AU
  • Add Dell ISH firmware 581.7783.0 for Intel Panther Lake systems.
  • qcom: update ADSP firmware for x1e80100 platform
  • linux-firmware:Add firmware for Lontium LT7911EXC bridge
  • qcom/x1e80100/dell: mark that qcom/NOTICE.txt is applicable too
  • qcom: Update CDSP firmware for Kaanapali platform
  • qcom: vpu: add Gen2 firmware binary for Agatti
  • amdgpu: DMCUB updates for various ASICs
  • Add firmware file for Intel BlazarIGfp2/BlazarIW/ScorpiusGfp2
  • Update firmware file for Intel BlazarI/BlazarU/BlazarU-HrPGfP/Scorpius core
  • qcom: Update ADSP firmware for Glymur platform
  • mediatek MT7925: update bluetooth firmware to 20260414153243
  • update firmware for MT7925 WiFi device
  • Revert "Update firmware file for Intel Quasar core"
  • qcom: Add gpdspr.jsn for qcs8300 platform
  • ath12k: QCC2072 hw1.0: add to WLAN.COL.1.0.c2-00074-QCACOLSWPL_V1_TO_SILICONZ-1
  • ath12k: QCC2072 hw1.0: add board-2.bin
  • ath12k: IPQ5424 hw1.0: add to WLAN.WBE.1.6-01275-QCAHKSWPL_SILICONZ-1
  • ath12k: IPQ5424 hw1.0: add board-2.bin
  • qcom: Update ADSP firmware for Kaanapali platform
  • cirrus: cs35l56: Add firmware for Cirrus Amps for some Lenovo laptops (17aa235c 17aa235d)
  • QCA: Update Bluetooth WCN6856 firmware 2.1.0-00665 to 2.1.0-00666
  • amdgpu: DMCUB updates for DCN36
  • Update AMD cpu microcode
  • powervr: update Imagination Rogue firmware images
  • qcom: Update ADSP firmware for Kaanapali platform
  • i915: Xe3LPD DMC v2.34
  • i915: Xe3LPD_3002 DMC v2.29
  • qcom: Update ADSP firmware for QCM6490 platform
  • firmware/amdgpu: Update DMCUB fw to Release 0.1.55.0
  • mediatek: vpu: drop old sym link

USN-8276-1: Highlight.js vulnerability

3 days 15 hours ago
It was discovered that Highlight.js used plain JavaScript objects for internal language name lookups, making them susceptible to prototype pollution attacks. An attacker could use this to cause a denial of service or unexpected application behaviour.

rrdtool-1.9.0-8.fc42

3 days 15 hours ago
FEDORA-2026-93281f2f96 Packages in this update:
  • rrdtool-1.9.0-8.fc42
Update description:

This is an update backporting some safety checks from the rrdtool-1.10.0.

rrdtool-1.9.0-8.fc43

3 days 15 hours ago
FEDORA-2026-111ad9560f Packages in this update:
  • rrdtool-1.9.0-8.fc43
Update description:

This is an update backporting some safety checks from the rrdtool-1.10.0.

python-uv-build-0.11.15-1.fc43 rust-astral-tokio-tar-0.6.2-1.fc43 rust-astral_async_http_range_reader-0.11.0-2.fc43 rust-astral_async_zip-0.0.18~rc4-2.fc43 uv-0.11.15-1.fc43

3 days 17 hours ago
FEDORA-2026-f8487121bd Packages in this update:
  • python-uv-build-0.11.15-1.fc43
  • rust-astral_async_http_range_reader-0.11.0-2.fc43
  • rust-astral_async_zip-0.0.18~rc4-2.fc43
  • rust-astral-tokio-tar-0.6.2-1.fc43
  • uv-0.11.15-1.fc43
Update description:

Update uv and python-uv-build to 0.11.5, fixing GHSA-3cv2-h65g-fgmm and GHSA-4gg8-gxpx-9rph.

python-uv-build-0.11.15-1.fc44 rust-astral-tokio-tar-0.6.2-1.fc44 rust-astral_async_http_range_reader-0.11.0-2.fc44 rust-astral_async_zip-0.0.18~rc4-2.fc44 uv-0.11.15-1.fc44

3 days 17 hours ago
FEDORA-2026-0b1aaac651 Packages in this update:
  • python-uv-build-0.11.15-1.fc44
  • rust-astral_async_http_range_reader-0.11.0-2.fc44
  • rust-astral_async_zip-0.0.18~rc4-2.fc44
  • rust-astral-tokio-tar-0.6.2-1.fc44
  • uv-0.11.15-1.fc44
Update description:

Update uv and python-uv-build to 0.11.5, fixing GHSA-3cv2-h65g-fgmm and GHSA-4gg8-gxpx-9rph.

perl-Imager-1.031-1.fc44

3 days 19 hours ago
FEDORA-2026-63ab4e8283 Packages in this update:
  • perl-Imager-1.031-1.fc44
Update description:

Imager 1.031 - GIF: fix a heap buffer overflow with attacker controlled data CVE-2026-8454 Imager 1.030 - addtag(): store non-"int" numbers as strings - addtag: improve the regexp used to decide if a value can be stored as an int. - API: i_tags_get_int() - now fails if the value is stored as a string and is out of range for an int.

USN-8275-1: Linux kernel (Xilinx ZynqMP) vulnerabilities

4 days ago
Stonejiajia, Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-2640) Shir Tamari and Sagi Tzadik discovered that the OverlayFS implementation in the Ubuntu Linux kernel did not properly perform permission checks in certain situations. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-32629) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - Block layer subsystem; - Drivers core; - Bluetooth drivers; - DMA engine subsystem; - GPU drivers; - HID subsystem; - Intel Trace Hub HW tracing drivers; - IIO ADC drivers; - IRQ chip drivers; - Modular ISDN driver; - LED subsystem; - UACCE accelerator framework; - Ethernet bonding driver; - Network drivers; - STMicroelectronics network drivers; - Ethernet team driver; - NVME drivers; - PHY drivers; - SLIMbus drivers; - W1 Dallas's 1-wire bus driver; - Xen hypervisor drivers; - BTRFS file system; - Ext4 file system; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NTFS3 file system; - SMB network file system; - NFC subsystem; - BPF subsystem; - IRQ subsystem; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - IPv4 networking; - IPv6 networking; - L2TP protocol; - NET/ROM layer; - Network traffic control; - SCTP protocol; - TLS protocol; - XFRM subsystem; - Creative Sound Blaster X-Fi driver; - USB sound devices; (CVE-2023-53421, CVE-2023-53520, CVE-2023-53662, CVE-2023-54207, CVE-2025-38057, CVE-2025-38125, CVE-2025-38232, CVE-2025-38408, CVE-2025-38591, CVE-2025-40149, CVE-2025-40164, CVE-2025-68211, CVE-2025-68340, CVE-2025-68365, CVE-2025-68725, CVE-2025-68817, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23026, CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23112, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23128, CVE-2026-23133, CVE-2026-23145, CVE-2026-23146, CVE-2026-23150, CVE-2026-23164, CVE-2026-23167, CVE-2026-23170, CVE-2026-23209, CVE-2026-23273)