Fedora 42 Update: cups-2.4.17-1.fc42
Fedora 42 Update: tinyproxy-1.11.2-7.fc42
Fedora 42 Update: perl-Net-CIDR-Lite-0.23-1.fc42
Fedora 42 Update: python-cbor2-5.6.5-8.fc42
Fedora 42 Update: opkssh-0.13.0-8.fc42
Fedora 43 Update: sudo-1.9.17-7.p2.fc43
Fedora 43 Update: pie-1.4.1-1.fc43
Fedora 43 Update: pgadmin4-9.14-3.fc43
Fedora 43 Update: python3-docs-3.14.4-1.fc43
Fedora 43 Update: python3.14-3.14.4-1.fc43
Fedora 42 Update: chromium-147.0.7727.101-1.fc42
Fedora 42 Update: pie-1.4.1-1.fc42
Fedora 42 Update: composer-2.9.7-1.fc42
Fedora 42 Update: pgadmin4-9.14-3.fc42
Fedora 42 Update: libcap-2.73-3.fc42
[SECURITY] Fedora 42 Update: cups-2.4.17-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-34454fdb74
2026-04-22 11:41:11.030813+00:00
--------------------------------------------------------------------------------
Name : cups
Product : Fedora 42
Version : 2.4.17
Release : 1.fc42
URL : https://openprinting.github.io/cups/
Summary : CUPS printing system
Description :
CUPS printing system provides a portable printing layer for
UNIX?? operating systems. It has been developed by Apple Inc.
to promote a standard printing solution for all UNIX vendors and users.
CUPS provides the System V and Berkeley command-line interfaces.
--------------------------------------------------------------------------------
Update Information:
2.4.17 - security fixes for CVE-2026-39316, CVE-2026-39314, CVE-2026-34979,
CVE-2026-34990, CVE-2026-27447, CVE-2026-34978
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 17 2026 Zdenek Dohnal [zdohnal@redhat.com] - 1:2.4.17-1
- 2.4.17 (fedora#2456363, fedora#2456362, fedora#2454994, fedora#2454993,
fedora#2454992, fedora#2454990)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2454946 - CVE-2026-34979 cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing
https://bugzilla.redhat.com/show_bug.cgi?id=2454946
[ 2 ] Bug #2454947 - CVE-2026-34990 cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication
https://bugzilla.redhat.com/show_bug.cgi?id=2454947
[ 3 ] Bug #2454949 - CVE-2026-27447 cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison
https://bugzilla.redhat.com/show_bug.cgi?id=2454949
[ 4 ] Bug #2454954 - CVE-2026-34980 cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network
https://bugzilla.redhat.com/show_bug.cgi?id=2454954
[ 5 ] Bug #2454957 - CVE-2026-34978 cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier
https://bugzilla.redhat.com/show_bug.cgi?id=2454957
[ 6 ] Bug #2456107 - CVE-2026-39314 cups: CUPS: Denial of Service via integer underflow in IPP attribute handling
https://bugzilla.redhat.com/show_bug.cgi?id=2456107
[ 7 ] Bug #2456120 - CVE-2026-39316 cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers.
https://bugzilla.redhat.com/show_bug.cgi?id=2456120
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-34454fdb74' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
[SECURITY] Fedora 42 Update: tinyproxy-1.11.2-7.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-d67a979089
2026-04-22 11:41:11.030779+00:00
--------------------------------------------------------------------------------
Name : tinyproxy
Product : Fedora 42
Version : 1.11.2
Release : 7.fc42
URL : https://tinyproxy.github.io/
Summary : A small, efficient HTTP/SSL proxy daemon
Description :
tinyproxy is a small, efficient HTTP/SSL proxy daemon that is very useful in a
small network setting, where a larger proxy like Squid would either be too
resource intensive, or a security risk.
--------------------------------------------------------------------------------
Update Information:
Backport upstream fixes for CVE-2026-3945 and CVE-2026-31842.
--------------------------------------------------------------------------------
ChangeLog:
* Sat Apr 11 2026 Carl George [carlwgeorge@fedoraproject.org] - 1.11.2-7
- Backport upstream CVE fixes
- Fixes CVE-2026-3945
- Fixes CVE-2026-31842
- Run upstream test suite
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 1.11.2-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2452969 - CVE-2026-3945 tinyproxy: tinyproxy: Denial of Service via integer overflow in HTTP chunked transfer encoding parser [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2452969
[ 2 ] Bug #2455913 - CVE-2026-31842 tinyproxy: HTTP Request parsing desynchronization via case-sensitive Transfer-Encoding handling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2455913
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-d67a979089' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: perl-Net-CIDR-Lite-0.23-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-4b112416d8
2026-04-22 11:41:11.030786+00:00
--------------------------------------------------------------------------------
Name : perl-Net-CIDR-Lite
Product : Fedora 42
Version : 0.23
Release : 1.fc42
URL : https://metacpan.org/release/Net-CIDR-Lite
Summary : Perl extension for merging IPv4 or IPv6 CIDR addresses
Description :
Faster alternative to Net::CIDR when merging a large number of CIDR address
ranges. Works for IPv4 and IPv6 addresses.
--------------------------------------------------------------------------------
Update Information:
This update addresses two security issues regarding incorrect handling of
malformed IPv6 addresses:
Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
Reject invalid uncompressed IPv6 (CVE-2026-40198)
--------------------------------------------------------------------------------
ChangeLog:
* Sat Apr 11 2026 Paul Howarth - 0.23-1
- Update to 0.23
- Security: Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Security: Reject invalid uncompressed IPv6 (CVE-2026-40198)
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 0.22-14
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
* Fri Jul 25 2025 Fedora Release Engineering [releng@fedoraproject.org] - 0.22-13
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-4b112416d8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: python-cbor2-5.6.5-8.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-0afc953516
2026-04-22 11:41:11.030775+00:00
--------------------------------------------------------------------------------
Name : python-cbor2
Product : Fedora 42
Version : 5.6.5
Release : 8.fc42
URL : https://github.com/agronholm/cbor2
Summary : Python CBOR (de)serializer with extensive tag support
Description :
This library provides encoding and decoding for the Concise Binary Object
Representation (CBOR) (RFC 7049) serialization format.
--------------------------------------------------------------------------------
Update Information:
Backport upstream patch for CVE-2025-64076
--------------------------------------------------------------------------------
ChangeLog:
* Fri Apr 10 2026 Carl George [carlwgeorge@fedoraproject.org] - 5.6.5-8
- Backport upstream patch for CVE-2025-64076
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 5.6.5-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
* Fri Sep 19 2025 Python Maint - 5.6.5-6
- Rebuilt for Python 3.14.0rc3 bytecode
* Fri Aug 15 2025 Python Maint - 5.6.5-5
- Rebuilt for Python 3.14.0rc2 bytecode
* Fri Jul 25 2025 Fedora Release Engineering [releng@fedoraproject.org] - 5.6.5-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
* Tue Jun 3 2025 Python Maint - 5.6.5-3
- Rebuilt for Python 3.14
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2418105 - CVE-2025-64076 python-cbor2: cbor2: Integer Underflow and Memory Leak leading to Denial of Service [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2418105
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-0afc953516' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: opkssh-0.13.0-8.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-245867ac28
2026-04-22 11:41:11.030781+00:00
--------------------------------------------------------------------------------
Name : opkssh
Product : Fedora 42
Version : 0.13.0
Release : 8.fc42
URL : https://github.com/openpubkey/opkssh
Summary : OpenPubkey SSH
Description :
OpenPubkey SSH is a tool which enables ssh to be used with OpenID Connect
allowing SSH access to be managed via identities like alice@example.com instead
of long-lived SSH keys.
--------------------------------------------------------------------------------
Update Information:
Fix CVE-2026-34986 in bundled go-jose
--------------------------------------------------------------------------------
ChangeLog:
* Sat Apr 11 2026 Till Hofmann [thofmann@fedoraproject.org] - 0.13.0-8
- Update bundled go-jose to v4.1.4
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2455639 - CVE-2026-34986 opkssh: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2455639
[ 2 ] Bug #2455667 - CVE-2026-34986 opkssh: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2455667
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-245867ac28' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: sudo-1.9.17-7.p2.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-e860be4db8
2026-04-23 01:08:14.063118+00:00
--------------------------------------------------------------------------------
Name : sudo
Product : Fedora 43
Version : 1.9.17
Release : 7.p2.fc43
URL : https://www.sudo.ws
Summary : Allows restricted root access for specified users
Description :
Sudo (superuser do) allows a system administrator to give certain
users (or groups of users) the ability to run some (or all) commands
as root while logging all commands and arguments. Sudo operates on a
per-command basis. It is not a replacement for the shell. Features
include: the ability to restrict what commands a user may run on a
per-host basis, copious logging of each command (providing a clear
audit trail of who did what), a configurable timeout of the sudo
command, and the ability to use the same configuration file (sudoers)
on many different machines.
--------------------------------------------------------------------------------
Update Information:
Fix CVE-2026-35535
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Alejandro L??pez [allopez@redhat.com] - 1.9.17-7.p2
- Fix CVE-2026-35535
- Resolves: rhbz#2458153
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-e860be4db8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
[SECURITY] Fedora 43 Update: pie-1.4.1-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3f4283f831
2026-04-23 01:08:14.063017+00:00
--------------------------------------------------------------------------------
Name : pie
Product : Fedora 43
Version : 1.4.1
Release : 1.fc43
URL : https://github.com/php/pie
Summary : PHP Installer for Extensions
Description :
PIE (PHP Installer for Extensions).
PIE can install an extension to any installed PHP version.
A list of extensions that support PIE can be found on
https://packagist.org/extensions.
Documentation: /usr/share/doc/pie/docs/usage.md
--------------------------------------------------------------------------------
Update Information:
Version 1.4.1
Update bundled Composer to 2.9.7
Version 1.4.0
New features!
Prompt to install missing system dependencies
Prompt to install build toolchain
Support pre-packaged-binary for download-url-method
Support INSTALL_ROOT environment variable to override destination
For more information, see Upstream annoucenement
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Remi Collet [remi@remirepo.net] - 1.4.1-1
- update to 1.4.1
* Wed Apr 8 2026 Remi Collet [remi@remirepo.net] - 1.4.0-1
- update to 1.4.0
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3f4283f831' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: pgadmin4-9.14-3.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-e9ecdd44c4
2026-04-23 01:08:14.062994+00:00
--------------------------------------------------------------------------------
Name : pgadmin4
Product : Fedora 43
Version : 9.14
Release : 3.fc43
URL : https://www.pgadmin.org/
Summary : Administration tool for PostgreSQL
Description :
pgAdmin is the most popular and feature rich Open Source administration and development
platform for PostgreSQL, the most advanced Open Source database in the world.
--------------------------------------------------------------------------------
Update Information:
Update axios to 1.15.0, fixes CVE-2026-40175 and CVE-2025-62718.
Update to pgadmin4-9.14.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Sandro Mani [manisandro@gmail.com] - 9.14-3
- Add pgadmin4_CVE-2026-40175.prebundle.patch
* Thu Apr 9 2026 Sandro Mani [manisandro@gmail.com] - 9.14-2
- Rework vendor bundle, use corepack yarn
* Thu Apr 2 2026 Sandro Mani [manisandro@gmail.com] - 9.14-1
- Update to 9.14
* Thu Apr 2 2026 Sandro Mani [manisandro@gmail.com] - 9.13-2
- Refresh vendor bundle, fixes CVE-2026-4800
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2454043 - CVE-2026-4800 pgadmin4: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2454043
[ 2 ] Bug #2454310 - pgadmin4-9.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2454310
[ 3 ] Bug #2454886 - Query Tool crashes with React error #130 in pgAdmin 9.14 (regression from 9.13)
https://bugzilla.redhat.com/show_bug.cgi?id=2454886
[ 4 ] Bug #2456577 - CVE-2026-39865 pgadmin4: Axios: Denial of Service via HTTP/2 session cleanup logic state corruption [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2456577
[ 5 ] Bug #2457505 - CVE-2025-62718 pgadmin4: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457505
[ 6 ] Bug #2457878 - CVE-2026-40175 pgadmin4: Axios: Remote Code Execution via Prototype Pollution escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457878
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-e9ecdd44c4' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: python3-docs-3.14.4-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-9a8fddee0b
2026-04-23 01:08:14.062938+00:00
--------------------------------------------------------------------------------
Name : python3-docs
Product : Fedora 43
Version : 3.14.4
Release : 1.fc43
URL : https://www.python.org/
Summary : Documentation for the Python 3 programming language
Description :
The python3-docs package contains documentation on the Python 3
programming language and interpreter.
--------------------------------------------------------------------------------
Update Information:
New minor version of the Python interpreter
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 8 2026 Karolina Surma [ksurma@redhat.com] - 3.14.4-1
- Update to Python 3.14.4
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2444707 - CVE-2026-2297 python3.14: CPython: Logging Bypass in Legacy .pyc File Handling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2444707
[ 2 ] Bug #2448191 - CVE-2026-3644 python3.14: Incomplete control character validation in http.cookies [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2448191
[ 3 ] Bug #2448207 - CVE-2026-4224 python3.14: Stack overflow parsing XML with deeply nested DTD content models [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2448207
[ 4 ] Bug #2449259 - CVE-2026-3479 python3.14: Python pkgutil.get_data(): Path Traversal via improper resource argument validation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2449259
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-9a8fddee0b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: python3.14-3.14.4-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-9a8fddee0b
2026-04-23 01:08:14.062938+00:00
--------------------------------------------------------------------------------
Name : python3.14
Product : Fedora 43
Version : 3.14.4
Release : 1.fc43
URL : https://www.python.org/
Summary : Version 3.14 of the Python interpreter
Description :
Python 3.14 is an accessible, high-level, dynamically typed, interpreted
programming language, designed with an emphasis on code readability.
It includes an extensive standard library, and has a vast ecosystem of
third-party libraries.
--------------------------------------------------------------------------------
Update Information:
New minor version of the Python interpreter
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 8 2026 Karolina Surma [ksurma@redhat.com] - 3.14.4-1
- Update to Python 3.14.4
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2444707 - CVE-2026-2297 python3.14: CPython: Logging Bypass in Legacy .pyc File Handling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2444707
[ 2 ] Bug #2448191 - CVE-2026-3644 python3.14: Incomplete control character validation in http.cookies [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2448191
[ 3 ] Bug #2448207 - CVE-2026-4224 python3.14: Stack overflow parsing XML with deeply nested DTD content models [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2448207
[ 4 ] Bug #2449259 - CVE-2026-3479 python3.14: Python pkgutil.get_data(): Path Traversal via improper resource argument validation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2449259
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-9a8fddee0b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: chromium-147.0.7727.101-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3675ac2066
2026-04-23 00:55:31.005427+00:00
--------------------------------------------------------------------------------
Name : chromium
Product : Fedora 42
Version : 147.0.7727.101
Release : 1.fc42
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).
--------------------------------------------------------------------------------
Update Information:
Update to 147.0.7727.101
Critical CVE-2026-6296: Heap buffer overflow in ANGLE
Critical CVE-2026-6297: Use after free in Proxy
Critical CVE-2026-6298: Heap buffer overflow in Skia
Critical CVE-2026-6299: Use after free in Prerender
Critical CVE-2026-6358: Use after free in XR
High CVE-2026-6359: Use after free in Video
High CVE-2026-6300: Use after free in CSS
High CVE-2026-6301: Type Confusion in Turbofan
High CVE-2026-6302: Use after free in Video
High CVE-2026-6303: Use after free in Codecs
High CVE-2026-6304: Use after free in Graphite
High CVE-2026-6305: Heap buffer overflow in PDFium
High CVE-2026-6306: Heap buffer overflow in PDFium
High CVE-2026-6307: Type Confusion in Turbofan
High CVE-2026-6308: Out of bounds read in Media
High CVE-2026-6309: Use after free in Viz
High CVE-2026-6360: Use after free in FileSystem
High CVE-2026-6310: Use after free in Dawn
High CVE-2026-6311: Uninitialized Use in Accessibility
High CVE-2026-6312: Insufficient policy enforcement in Passwords
High CVE-2026-6313: Insufficient policy enforcement in CORS
High CVE-2026-6314: Out of bounds write in GPU
High CVE-2026-6315: Use after free in Permissions
High CVE-2026-6316: Use after free in Forms
High CVE-2026-6361: Heap buffer overflow in PDFium
High CVE-2026-6362: Use after free in Codecs
High CVE-2026-6317: Use after free in Cast
Medium CVE-2026-6363: Type Confusion in V8
Medium CVE-2026-6318: Use after free in Codecs
Medium CVE-2026-6319: Use after free in Payments
Medium CVE-2026-6364: Out of bounds read in Skia
Update to 147.0.7727.55
Critical CVE-2026-5858: Heap buffer overflow in WebML
Critical CVE-2026-5859: Integer overflow in WebML
High CVE-2026-5860: Use after free in WebRTC
High CVE-2026-5861: Use after free in V8
High CVE-2026-5862: Inappropriate implementation in V8
High CVE-2026-5863: Inappropriate implementation in V8
High CVE-2026-5864: Heap buffer overflow in WebAudio
High CVE-2026-5865: Type Confusion in V8
High CVE-2026-5866: Use after free in Media
High CVE-2026-5867: Heap buffer overflow in WebML
High CVE-2026-5868: Heap buffer overflow in ANGLE
High CVE-2026-5869: Heap buffer overflow in WebML
High CVE-2026-5870: Integer overflow in Skia
High CVE-2026-5871: Type Confusion in V8
High CVE-2026-5872: Use after free in Blink
High CVE-2026-5873: Out of bounds read and write in V8
Medium CVE-2026-5874: Use after free in PrivateAI
Medium CVE-2026-5875: Policy bypass in Blink
Medium CVE-2026-5876: Side-channel information leakage in Navigation
Medium CVE-2026-5877: Use after free in Navigation
Medium CVE-2026-5878: Incorrect security UI in Blink
Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE
Medium CVE-2026-5880: Incorrect security UI in browser UI
Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess
Medium CVE-2026-5882: Incorrect security UI in Fullscreen
Medium CVE-2026-5883: Use after free in Media
Medium CVE-2026-5884: Insufficient validation of untrusted input in Media
Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML
Medium CVE-2026-5886: Out of bounds read in WebAudio
Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads
Medium CVE-2026-5888: Uninitialized Use in WebCodecs
Medium CVE-2026-5889: Cryptographic Flaw in PDFium
Medium CVE-2026-5890: Race in WebCodecs
Medium CVE-2026-5891: Insufficient policy enforcement in browser UI
Medium CVE-2026-5892: Insufficient policy enforcement in PWAs
Medium CVE-2026-5893: Race in V8
Low CVE-2026-5894: Inappropriate implementation in PDF
Low CVE-2026-5895: Incorrect security UI in Omnibox
Low CVE-2026-5896: Policy bypass in Audio
Low CVE-2026-5897: Incorrect security UI in Downloads
Low CVE-2026-5898: Incorrect security UI in Omnibox
Low CVE-2026-5899: Incorrect security UI in History Navigation
Low CVE-2026-5900: Policy bypass in Downloads
Low CVE-2026-5901: Policy bypass in DevTools
Low CVE-2026-5902: Race in Media
Low CVE-2026-5903: Policy bypass in IFrameSandbox
Low CVE-2026-5904: Use after free in V8
Low CVE-2026-5905: Incorrect security UI in Permissions
Low CVE-2026-5906: Incorrect security UI in Omnibox
Low CVE-2026-5907: Insufficient data validation in Media
Low CVE-2026-5908: Integer overflow in Media
Low CVE-2026-5909: Integer overflow in Media
Low CVE-2026-5910: Integer overflow in Media
Low CVE-2026-5911: Policy bypass in ServiceWorkers
Low CVE-2026-5912: Integer overflow in WebRTC
Low CVE-2026-5913: Out of bounds read in Blink
Low CVE-2026-5914: Type Confusion in CSS
Low CVE-2026-5915: Insufficient validation of untrusted input in WebML
Low CVE-2026-5918: Inappropriate implementation in Navigation
Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets
Update to 146.0.7680.177
High CVE-2026-5273: Use after free in CSS
High CVE-2026-5272: Heap buffer overflow in GPU
High CVE-2026-5274: Integer overflow in Codecs
High CVE-2026-5275: Heap buffer overflow in ANGLE
High CVE-2026-5276: Insufficient policy enforcement in WebUSB
High CVE-2026-5277: Integer overflow in ANGLE
High CVE-2026-5278: Use after free in Web MIDI
High CVE-2026-5279: Object corruption in V8
High CVE-2026-5280: Use after free in WebCodecs
High CVE-2026-5281: Use after free in Dawn
High CVE-2026-5282: Out of bounds read in WebCodecs
High CVE-2026-5283: Inappropriate implementation in ANGLE
High CVE-2026-5284: Use after free in Dawn
High CVE-2026-5285: Use after free in WebGL
High CVE-2026-5286: Use after free in Dawn
High CVE-2026-5287: Use after free in PDF
High CVE-2026-5288: Use after free in WebView
High CVE-2026-5289: Use after free in Navigation
High CVE-2026-5290: Use after free in Compositing
Medium CVE-2026-5291: Inappropriate implementation in WebGL
Medium CVE-2026-5292: Out of bounds read in WebCodecs
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 15 2026 Than Ngo [than@redhat.com] - 147.0.7727.101-1
- Update to 147.0.7727.101
* Critical CVE-2026-6296: Heap buffer overflow in ANGLE
* Critical CVE-2026-6297: Use after free in Proxy
* Critical CVE-2026-6298: Heap buffer overflow in Skia
* Critical CVE-2026-6299: Use after free in Prerender
* Critical CVE-2026-6358: Use after free in XR
* High CVE-2026-6359: Use after free in Video
* High CVE-2026-6300: Use after free in CSS
* High CVE-2026-6301: Type Confusion in Turbofan
* High CVE-2026-6302: Use after free in Video
* High CVE-2026-6303: Use after free in Codecs
* High CVE-2026-6304: Use after free in Graphite
* High CVE-2026-6305: Heap buffer overflow in PDFium
* High CVE-2026-6306: Heap buffer overflow in PDFium
* High CVE-2026-6307: Type Confusion in Turbofan
* High CVE-2026-6308: Out of bounds read in Media
* High CVE-2026-6309: Use after free in Viz
* High CVE-2026-6360: Use after free in FileSystem
* High CVE-2026-6310: Use after free in Dawn
* High CVE-2026-6311: Uninitialized Use in Accessibility
* High CVE-2026-6312: Insufficient policy enforcement in Passwords
* High CVE-2026-6313: Insufficient policy enforcement in CORS
* High CVE-2026-6314: Out of bounds write in GPU
* High CVE-2026-6315: Use after free in Permissions
* High CVE-2026-6316: Use after free in Forms
* High CVE-2026-6361: Heap buffer overflow in PDFium
* High CVE-2026-6362: Use after free in Codecs
* High CVE-2026-6317: Use after free in Cast
* Medium CVE-2026-6363: Type Confusion in V8
* Medium CVE-2026-6318: Use after free in Codecs
* Medium CVE-2026-6319: Use after free in Payments
* Medium CVE-2026-6364: Out of bounds read in Skia
* Thu Apr 9 2026 Than Ngo [than@redhat.com] - 147.0.7727.55-1
- Update to 147.0.7727.55
* Critical CVE-2026-5858: Heap buffer overflow in WebML
* Critical CVE-2026-5859: Integer overflow in WebML
* High CVE-2026-5860: Use after free in WebRTC
* High CVE-2026-5861: Use after free in V8
* High CVE-2026-5862: Inappropriate implementation in V8
* High CVE-2026-5863: Inappropriate implementation in V8
* High CVE-2026-5864: Heap buffer overflow in WebAudio
* High CVE-2026-5865: Type Confusion in V8
* High CVE-2026-5866: Use after free in Media
* High CVE-2026-5867: Heap buffer overflow in WebML
* High CVE-2026-5868: Heap buffer overflow in ANGLE
* High CVE-2026-5869: Heap buffer overflow in WebML
* High CVE-2026-5870: Integer overflow in Skia
* High CVE-2026-5871: Type Confusion in V8
* High CVE-2026-5872: Use after free in Blink
* High CVE-2026-5873: Out of bounds read and write in V8
* Medium CVE-2026-5874: Use after free in PrivateAI
* Medium CVE-2026-5875: Policy bypass in Blink
* Medium CVE-2026-5876: Side-channel information leakage in Navigation
* Medium CVE-2026-5877: Use after free in Navigation
* Medium CVE-2026-5878: Incorrect security UI in Blink
* Medium CVE-2026-5879: Insufficient validation of untrusted input in ANGLE
* Medium CVE-2026-5880: Incorrect security UI in browser UI
* Medium CVE-2026-5881: Policy bypass in LocalNetworkAccess
* Medium CVE-2026-5882: Incorrect security UI in Fullscreen
* Medium CVE-2026-5883: Use after free in Media
* Medium CVE-2026-5884: Insufficient validation of untrusted input in Media
* Medium CVE-2026-5885: Insufficient validation of untrusted input in WebML
* Medium CVE-2026-5886: Out of bounds read in WebAudio
* Medium CVE-2026-5887: Insufficient validation of untrusted input in Downloads
* Medium CVE-2026-5888: Uninitialized Use in WebCodecs
* Medium CVE-2026-5889: Cryptographic Flaw in PDFium
* Medium CVE-2026-5890: Race in WebCodecs
* Medium CVE-2026-5891: Insufficient policy enforcement in browser UI
* Medium CVE-2026-5892: Insufficient policy enforcement in PWAs
* Medium CVE-2026-5893: Race in V8
* Low CVE-2026-5894: Inappropriate implementation in PDF
* Low CVE-2026-5895: Incorrect security UI in Omnibox
* Low CVE-2026-5896: Policy bypass in Audio
* Low CVE-2026-5897: Incorrect security UI in Downloads
* Low CVE-2026-5898: Incorrect security UI in Omnibox
* Low CVE-2026-5899: Incorrect security UI in History Navigation
* Low CVE-2026-5900: Policy bypass in Downloads
* Low CVE-2026-5901: Policy bypass in DevTools
* Low CVE-2026-5902: Race in Media
* Low CVE-2026-5903: Policy bypass in IFrameSandbox
* Low CVE-2026-5904: Use after free in V8
* Low CVE-2026-5905: Incorrect security UI in Permissions
* Low CVE-2026-5906: Incorrect security UI in Omnibox
* Low CVE-2026-5907: Insufficient data validation in Media
* Low CVE-2026-5908: Integer overflow in Media
* Low CVE-2026-5909: Integer overflow in Media
* Low CVE-2026-5910: Integer overflow in Media
* Low CVE-2026-5911: Policy bypass in ServiceWorkers
* Low CVE-2026-5912: Integer overflow in WebRTC
* Low CVE-2026-5913: Out of bounds read in Blink
* Low CVE-2026-5914: Type Confusion in CSS
* Low CVE-2026-5915: Insufficient validation of untrusted input in WebML
* Low CVE-2026-5918: Inappropriate implementation in Navigation
* Low CVE-2026-5919: Insufficient validation of untrusted input in WebSockets
* Wed Apr 1 2026 Than Ngo [than@redhat.com] - 146.0.7680.177-1
- Update to 146.0.7680.177
* High CVE-2026-5273: Use after free in CSS
* High CVE-2026-5272: Heap buffer overflow in GPU
* High CVE-2026-5274: Integer overflow in Codecs
* High CVE-2026-5275: Heap buffer overflow in ANGLE
* High CVE-2026-5276: Insufficient policy enforcement in WebUSB
* High CVE-2026-5277: Integer overflow in ANGLE
* High CVE-2026-5278: Use after free in Web MIDI
* High CVE-2026-5279: Object corruption in V8
* High CVE-2026-5280: Use after free in WebCodecs
* High CVE-2026-5281: Use after free in Dawn
* High CVE-2026-5282: Out of bounds read in WebCodecs
* High CVE-2026-5283: Inappropriate implementation in ANGLE
* High CVE-2026-5284: Use after free in Dawn
* High CVE-2026-5285: Use after free in WebGL
* High CVE-2026-5286: Use after free in Dawn
* High CVE-2026-5287: Use after free in PDF
* High CVE-2026-5288: Use after free in WebView
* High CVE-2026-5289: Use after free in Navigation
* High CVE-2026-5290: Use after free in Compositing
* Medium CVE-2026-5291: Inappropriate implementation in WebGL
* Medium CVE-2026-5292: Out of bounds read in WebCodecs
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2457163 - CVE-2026-5858 CVE-2026-5859 CVE-2026-5860 CVE-2026-5861 CVE-2026-5874 CVE-2026-5875 CVE-2026-5876 CVE-2026-5894 chromium: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457163
[ 2 ] Bug #2457164 - CVE-2026-5858 CVE-2026-5859 CVE-2026-5860 CVE-2026-5861 CVE-2026-5874 CVE-2026-5875 CVE-2026-5876 CVE-2026-5894 chromium: various flaws [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457164
[ 3 ] Bug #2458847 - CVE-2026-6296 CVE-2026-6297 CVE-2026-6298 CVE-2026-6300 CVE-2026-6301 CVE-2026-6302 CVE-2026-6305 CVE-2026-6306 CVE-2026-6307 CVE-2026-6318 CVE-2026-6319 CVE-2026-6358 CVE-2026-6359 CVE-2026-6360 CVE-2026-6362 chromium: various flaws [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2458847
[ 4 ] Bug #2458848 - CVE-2026-6296 CVE-2026-6297 CVE-2026-6298 CVE-2026-6300 CVE-2026-6301 CVE-2026-6302 CVE-2026-6305 CVE-2026-6306 CVE-2026-6307 CVE-2026-6318 CVE-2026-6319 CVE-2026-6358 CVE-2026-6359 CVE-2026-6360 CVE-2026-6362 chromium: various flaws [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2458848
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3675ac2066' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: pie-1.4.1-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3b2063832d
2026-04-23 00:55:31.005311+00:00
--------------------------------------------------------------------------------
Name : pie
Product : Fedora 42
Version : 1.4.1
Release : 1.fc42
URL : https://github.com/php/pie
Summary : PHP Installer for Extensions
Description :
PIE (PHP Installer for Extensions).
PIE can install an extension to any installed PHP version.
A list of extensions that support PIE can be found on
https://packagist.org/extensions.
Documentation: /usr/share/doc/pie/docs/usage.md
--------------------------------------------------------------------------------
Update Information:
Version 1.4.1
Update bundled Composer to 2.9.7
Version 1.4.0
New features!
Prompt to install missing system dependencies
Prompt to install build toolchain
Support pre-packaged-binary for download-url-method
Support INSTALL_ROOT environment variable to override destination
For more information, see Upstream annoucenement
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Remi Collet [remi@remirepo.net] - 1.4.1-1
- update to 1.4.1
* Wed Apr 8 2026 Remi Collet [remi@remirepo.net] - 1.4.0-1
- update to 1.4.0
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3b2063832d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: composer-2.9.7-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-d91f313a63
2026-04-23 00:55:31.005308+00:00
--------------------------------------------------------------------------------
Name : composer
Product : Fedora 42
Version : 2.9.7
Release : 1.fc42
URL : https://getcomposer.org/
Summary : Dependency Manager for PHP
Description :
Composer helps you declare, manage and install dependencies of PHP projects,
ensuring you have the right stack everywhere.
Documentation: https://getcomposer.org/doc/
--------------------------------------------------------------------------------
Update Information:
Version 2.9.7 - 2026-04-14
Fixes regression calling custom script command aliases that are called a
substring of a composer command (#12802)
Version 2.9.6 - 2026-04-14
Security: Fixed command injection via malicious Perforce reference (GHSA-
gqw4-4w2p-838q / CVE-2026-40261)
Security: Fixed command injection via malicious Perforce repository definition
(GHSA-wg36-wvj6-r67p / CVE-2026-40176)
Security: Fixed git credentials remaining in git mirror .git/config after clone
or update failed (2bcbfc3d)
Security: Fixed usage of insecure 3DES ciphers when ext-curl is missing
(5e71d77e)
Security: Fixed Perforce unescaped user input in queryP4User shell command
(ef3fc088)
Security: Hardened git/hg/perforce/fossil identifier validation to ensure branch
names starting with - do not cause issues (6621d45, d836b90, 5e08c764)
Fixed inconsistent treatment of SingleCommandApplication script commands wrt
autoloading (#12758)
Fixed GitHub API authentication errors not being visible to the user (#12737)
Fixed some platform package parsing failing when Composer runs in web SAPIs
(#12735)
Fixed error reporting for clarity when a constraint cannot be parsed (#12743)
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Remi Collet [remi@remirepo.net] - 2.9.7-1
- update to 2.9.7
* Tue Apr 14 2026 Remi Collet [remi@remirepo.net] - 2.9.6-1
- update to 2.9.6
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2459009 - CVE-2026-40261 composer: command injection via malicious Perforce source reference/url [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2459009
[ 2 ] Bug #2459011 - CVE-2026-40176 composer: command injection via malicious Perforce repository definition [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2459011
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-d91f313a63' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: pgadmin4-9.14-3.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-b4633cbe23
2026-04-23 00:55:31.005293+00:00
--------------------------------------------------------------------------------
Name : pgadmin4
Product : Fedora 42
Version : 9.14
Release : 3.fc42
URL : https://www.pgadmin.org/
Summary : Administration tool for PostgreSQL
Description :
pgAdmin is the most popular and feature rich Open Source administration and development
platform for PostgreSQL, the most advanced Open Source database in the world.
--------------------------------------------------------------------------------
Update Information:
Update axios to 1.15.0, fixes CVE-2026-40175 and CVE-2025-62718.
Update to pgadmin4-9.14.
--------------------------------------------------------------------------------
ChangeLog:
* Tue Apr 14 2026 Sandro Mani [manisandro@gmail.com] - 9.14-3
- Add pgadmin4_CVE-2026-40175.prebundle.patch
* Thu Apr 9 2026 Sandro Mani [manisandro@gmail.com] - 9.14-2
- Rework vendor bundle, use corepack yarn
* Thu Apr 2 2026 Sandro Mani [manisandro@gmail.com] - 9.14-1
- Update to 9.14
* Thu Apr 2 2026 Sandro Mani [manisandro@gmail.com] - 9.13-2
- Refresh vendor bundle, fixes CVE-2026-4800
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2454043 - CVE-2026-4800 pgadmin4: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2454043
[ 2 ] Bug #2454310 - pgadmin4-9.14 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2454310
[ 3 ] Bug #2454886 - Query Tool crashes with React error #130 in pgAdmin 9.14 (regression from 9.13)
https://bugzilla.redhat.com/show_bug.cgi?id=2454886
[ 4 ] Bug #2456577 - CVE-2026-39865 pgadmin4: Axios: Denial of Service via HTTP/2 session cleanup logic state corruption [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2456577
[ 5 ] Bug #2457505 - CVE-2025-62718 pgadmin4: Axios: Server-Side Request Forgery and proxy bypass due to improper hostname normalization [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457505
[ 6 ] Bug #2457878 - CVE-2026-40175 pgadmin4: Axios: Remote Code Execution via Prototype Pollution escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2457878
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-b4633cbe23' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: libcap-2.73-3.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-d4c643a2ba
2026-04-23 00:55:31.005205+00:00
--------------------------------------------------------------------------------
Name : libcap
Product : Fedora 42
Version : 2.73
Release : 3.fc42
URL : https://sites.google.com/site/fullycapable/
Summary : Library for getting and setting POSIX.1e capabilities
Description :
libcap is a library for getting and setting POSIX.1e (formerly POSIX 6)
draft 15 capabilities.
--------------------------------------------------------------------------------
Update Information:
An update to patch a security vulnerability.
Advisory: https://github.com/AndrewGMorgan/libcap_mirror/security/advisories/GHS
A-f78v-p5hx-m7hh
Changelog
* Mon Apr 06 2026 Carlos Rodriguez-Fernandez [carlosrodrifernandez@gmail.com] -
2.73-3
- Patch for security vulnerability
--------------------------------------------------------------------------------
ChangeLog:
* Mon Apr 6 2026 Carlos Rodriguez-Fernandez [carlosrodrifernandez@gmail.com] - 2.73-3
- Patch for security vulnerability
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-d4c643a2ba' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new