Fedora Linux 9252 Published by

Fedora has released multiple security updates for various packages, including microcode_ctl, python3.14, roundcubemail, and azure-cli. The updates address vulnerabilities such as use after free in CSS, heap buffer overflow in Codecs, and insufficient policy enforcement in Frames. These updates are recommended to prevent potential Denial of Service attacks, SQL injection, and other security risks. Users can refer to the Fedora Security Advisories for detailed information about each update.

Fedora 42 Update: microcode_ctl-2.1-70.1.fc42
Fedora 42 Update: python3.14-3.14.3-1.fc42
Fedora 42 Update: roundcubemail-1.6.13-1.fc42
Fedora 42 Update: python-azure-core-1.38.0-2.fc42
Fedora 42 Update: azure-cli-2.68.0-2.fc42
Fedora 43 Update: chromium-145.0.7632.75-1.fc43
Fedora 43 Update: microcode_ctl-2.1-71.1.fc43
Fedora 43 Update: python-azure-core-1.38.0-2.fc43
Fedora 43 Update: roundcubemail-1.6.13-1.fc43
Fedora 43 Update: azure-cli-2.81.0-2.fc43




[SECURITY] Fedora 42 Update: microcode_ctl-2.1-70.1.fc42


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-85ee8cb2a2
2026-02-20 01:16:08.171243+00:00
--------------------------------------------------------------------------------

Name : microcode_ctl
Product : Fedora 42
Version : 2.1
Release : 70.1.fc42
URL : https://pagure.io/microcode_ctl
Summary : Tool to transform and deploy CPU microcode update for x86
Description :
The microcode_ctl utility is a companion to the microcode driver written
by Tigran Aivazian [tigran@aivazian.fsnet.co.uk].

The microcode update is volatile and needs to be uploaded on each system
boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts
back to the old microcode.

--------------------------------------------------------------------------------
Update Information:

Update to upstream 2.1-51. 20260210
Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision
0x10002f3;
Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000410
up to 0xd000421;
Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002e0
up to 0x10002f1;
Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca
up to 0xcc;
Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision
0xbc up to 0xbe;
Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up
to 0x3e;
Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up
to 0x58;
Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000643 up to 0x2b000661;
Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000401 up to 0x2c000421;
Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000643 up to 0x2b000661;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a
up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x437 up to 0x43b;
Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up
to 0xc;
Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437
up to 0x43b;
Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up
to 0x65;
Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x25
up to 0x28;
Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision
0xa000100 up to 0xa000133;
Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision
0x10003d0 up to 0x1000405;
Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000362
up to 0x3000382;
Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up
to 0xd;
Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up
to 0x133;
Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from
revision 0x12f up to 0x133;
Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4129 up to 0x6134;
Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4129 up to 0x6134;
Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4129
up to 0x6134;
Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4129 up to 0x6134;
Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x123 up
to 0x125;
Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up
to 0x21;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x119 up
to 0x11b;
Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in
intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x119 up to 0x11b;
Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x119 up to 0x11b;
Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02)
from revision 0x119 up to 0x11b;
Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision
0x119 up to 0x11b;
Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x119 up to 0x11b;
Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x119 up to 0x11b;
Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x210002b3 up to 0x210002d3;
Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002b3
up to 0x210002d3.
Resolves RHBZ#2431378
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 18 2026 Eugene Syromiatnikov [evgsyr@gmail.com] 2:2.1-70.1
- Update to upstream 2.1-51. 20260210
- Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision
0x10002f3;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000404
up to 0xd000421;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002d0
up to 0x10002f1;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca
up to 0xcc;
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision
0xbc up to 0xbe;
- Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up
to 0x3e;
- Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up
to 0x58;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000639 up to 0x2b000661;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000639 up to 0x2b000661;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a
up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x437 up to 0x43b;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up
to 0xc;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437
up to 0x43b;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up
to 0x65;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x24
up to 0x28;
- Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision
0xa0000d1 up to 0xa000133;
- Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision
0x10003a2 up to 0x1000405;
- Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000341
up to 0x3000382;
- Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up
to 0xd;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up
to 0x133;
- Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from
revision 0x12f up to 0x133;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4128 up to 0x6134;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4128 up to 0x6134;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4128 up to 0x6134;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4128 up to 0x6134;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4128
up to 0x6134;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4128 up to 0x6134;
- Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x11f up
to 0x125;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up
to 0x21;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
- Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x118 up
to 0x11b;
- Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in
intel-ucode/06-c5-02) from revision 0x118 up to 0x11b;
- Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x118 up to 0x11b;
- Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x118 up to 0x11b;
- Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02)
from revision 0x118 up to 0x11b;
- Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision
0x118 up to 0x11b;
- Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x118 up to 0x11b;
- Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x118 up to 0x11b;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x210002a9 up to 0x210002d3;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002a9
up to 0x210002d3.
- Resolves RHBZ#2431378
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2431378 - microcode_ctl is outdated
https://bugzilla.redhat.com/show_bug.cgi?id=2431378
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-85ee8cb2a2' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 42 Update: python3.14-3.14.3-1.fc42


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-9ad2d11c1f
2026-02-20 01:16:08.171226+00:00
--------------------------------------------------------------------------------

Name : python3.14
Product : Fedora 42
Version : 3.14.3
Release : 1.fc42
URL : https://www.python.org/
Summary : Version 3.14 of the Python interpreter
Description :
Python 3.14 is an accessible, high-level, dynamically typed, interpreted
programming language, designed with an emphasis on code readability.
It includes an extensive standard library, and has a vast ecosystem of
third-party libraries.

The python3.14 package provides the "python3.14" executable: the reference
interpreter for the Python language, version 3.
The majority of its standard library is provided in the python3.14-libs package,
which should be installed automatically along with python3.14.
The remaining parts of the Python standard library are broken out into the
python3.14-tkinter and python3.14-test packages, which may need to be installed
separately.

Documentation for Python is provided in the python3.14-docs package.

Packages containing additional libraries for Python are generally named with
the "python3.14-" prefix.

--------------------------------------------------------------------------------
Update Information:

New version of the Python interpreter also bringing security fixes.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 4 2026 Karolina Surma [ksurma@redhat.com] - 3.14.3-1
- Update to Python 3.14.3
- Fix CVE-2025-15366, CVE-2025-15367
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 3.14.2-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2431785 - CVE-2025-11468 python3.14: Missing character filtering in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431785
[ 2 ] Bug #2431794 - CVE-2026-0672 python3.14: Header injection in http.cookies.Morsel in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431794
[ 3 ] Bug #2431800 - CVE-2026-0865 python3.14: wsgiref.headers.Headers allows header newline injection in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431800
[ 4 ] Bug #2431816 - CVE-2025-15282 python3.14: Header injection via newlines in data URL mediatype in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431816
[ 5 ] Bug #2433819 - CVE-2026-1299 python3.14: email header injection due to unquoted newlines [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2433819
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-9ad2d11c1f' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 42 Update: roundcubemail-1.6.13-1.fc42


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-d684b372f1
2026-02-20 01:16:08.171174+00:00
--------------------------------------------------------------------------------

Name : roundcubemail
Product : Fedora 42
Version : 1.6.13
Release : 1.fc42
URL : http://www.roundcube.net
Summary : Round Cube Webmail is a browser-based multilingual IMAP client
Description :
RoundCube Webmail is a browser-based multilingual IMAP client
with an application-like user interface. It provides full
functionality you expect from an e-mail client, including MIME
support, address book, folder manipulation, message searching
and spell checking. RoundCube Webmail is written in PHP and
requires a database: MySQL, PostgreSQL and SQLite are known to
work. The user interface is fully skinnable using XHTML and
CSS 2.

--------------------------------------------------------------------------------
Update Information:

Release 1.6.13
Managesieve: Fix handling of string-list format values for date tests in Out of
Office (#10075)
Fix remote image blocking bypass via SVG content reported by nullcathedral
Fix CSS injection vulnerability reported by CERT Polska
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 9 2026 Remi Collet [remi@remirepo.net] - 1.6.13-1
- update to 1.6.13
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2438812 - CVE-2026-26079 roundcubemail: Roundcube Webmail: Cascading Style Sheets (CSS) injection via mishandled comments [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2438812
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-d684b372f1' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 42 Update: python-azure-core-1.38.0-2.fc42


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3beebfc8ff
2026-02-20 01:16:08.171142+00:00
--------------------------------------------------------------------------------

Name : python-azure-core
Product : Fedora 42
Version : 1.38.0
Release : 2.fc42
URL : https://pypi.org/project/azure-core/
Summary : Azure Core shared client library for Python
Description :
Azure Core shared client library for Python

--------------------------------------------------------------------------------
Update Information:

Update to 1.38.0 to address CVE-2026-21226
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 9 2026 Paul Wouters [paul.wouters@aiven.io] - 2:1.38.0-1
- Update to 1.38.0 to address CVE-2026-21226
- Resolves: rhbz#2404058 - python-azure-core-1.38.0 is available
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 2:1.35.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
* Fri Sep 19 2025 Python Maint - 2:1.35.1-2
- Rebuilt for Python 3.14.0rc3 bytecode
* Fri Sep 12 2025 Packit [hello@packit.dev] - 2:1.35.1-1
- Update to 1.35.1 upstream release
- Resolves: rhbz#2357349
* Fri Aug 15 2025 Python Maint - 2:1.34.0-3
- Rebuilt for Python 3.14.0rc2 bytecode
* Fri Jul 25 2025 Fedora Release Engineering [releng@fedoraproject.org] - 2:1.34.0-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
* Wed Jun 11 2025 Jeremy Cline [jeremycline@linux.microsoft.com] - 2:1.34.0-1
- Update to v1.34
* Fri Jun 6 2025 Python Maint - 2:1.30.2-4
- Rebuilt for Python 3.14
* Tue Jun 3 2025 Python Maint - 2:1.30.2-3
- Bootstrap for Python 3.14
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2404058 - python-azure-core-1.38.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2404058
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3beebfc8ff' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 42 Update: azure-cli-2.68.0-2.fc42


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3beebfc8ff
2026-02-20 01:16:08.171142+00:00
--------------------------------------------------------------------------------

Name : azure-cli
Product : Fedora 42
Version : 2.68.0
Release : 2.fc42
URL : https://github.com/Azure/azure-cli
Summary : Microsoft Azure Command-Line Tools
Description :
Microsoft Azure Command-Line Tools

--------------------------------------------------------------------------------
Update Information:

Update to 1.38.0 to address CVE-2026-21226
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 11 2026 Jeremy Cline [jeremycline@linux.microsoft.com] - 2.68.0-2
- Relax the dependency on azure-core
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2404058 - python-azure-core-1.38.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2404058
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3beebfc8ff' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 43 Update: chromium-145.0.7632.75-1.fc43


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-443f9ace49
2026-02-20 00:51:59.594194+00:00
--------------------------------------------------------------------------------

Name : chromium
Product : Fedora 43
Version : 145.0.7632.75
Release : 1.fc43
URL : http://www.chromium.org/Home
Summary : A WebKit (Blink) powered web browser that Google doesn't want you to use
Description :
Chromium is an open-source web browser, powered by WebKit (Blink).

--------------------------------------------------------------------------------
Update Information:

Update to 145.0.7632.75
CVE-2026-2441: Use after free in CSS
CVE-2026-2313: Use after free in CSS
CVE-2026-2314: Heap buffer overflow in Codecs
CVE-2026-2315: Inappropriate implementation in WebGPU
CVE-2026-2316: Insufficient policy enforcement in Frames
CVE-2026-2317: Inappropriate implementation in Animation
CVE-2026-2318: Inappropriate implementation in PictureInPicture
CVE-2026-2319: Race in DevTools
CVE-2026-2320: Inappropriate implementation in File input
CVE-2026-2321: Use after free in Ozone
CVE-2026-2322: Inappropriate implementation in File input
CVE-2026-2323: Inappropriate implementation in Downloads
--------------------------------------------------------------------------------
ChangeLog:

* Sat Feb 14 2026 Than Ngo [than@redhat.com] - 145.0.7632.75-1
- Update to 145.0.7632.75
* CVE-2026-2441: Use after free in CSS
* Thu Feb 12 2026 Than Ngo [than@redhat.com] - 145.0.7632.45-1
- Update to 145.0.7632.45
* CVE-2026-2313: Use after free in CSS
* CVE-2026-2314: Heap buffer overflow in Codecs
* CVE-2026-2315: Inappropriate implementation in WebGPU
* CVE-2026-2316: Insufficient policy enforcement in Frames
* CVE-2026-2317: Inappropriate implementation in Animation
* CVE-2026-2318: Inappropriate implementation in PictureInPicture
* CVE-2026-2319: Race in DevTools
* CVE-2026-2320: Inappropriate implementation in File input
* CVE-2026-2321: Use after free in Ozone
* CVE-2026-2322: Inappropriate implementation in File input
* CVE-2026-2323: Inappropriate implementation in Downloads
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-443f9ace49' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 43 Update: microcode_ctl-2.1-71.1.fc43


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-60e8919a4a
2026-02-20 00:51:59.594183+00:00
--------------------------------------------------------------------------------

Name : microcode_ctl
Product : Fedora 43
Version : 2.1
Release : 71.1.fc43
URL : https://pagure.io/microcode_ctl
Summary : Tool to transform and deploy CPU microcode update for x86
Description :
The microcode_ctl utility is a companion to the microcode driver written
by Tigran Aivazian [tigran@aivazian.fsnet.co.uk].

The microcode update is volatile and needs to be uploaded on each system
boot i.e. it doesn't reflash your cpu permanently, reboot and it reverts
back to the old microcode.

--------------------------------------------------------------------------------
Update Information:

Update to upstream 2.1-51. 20260210
Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision
0x10002f3;
Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000410
up to 0xd000421;
Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002e0
up to 0x10002f1;
Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca
up to 0xcc;
Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision
0xbc up to 0xbe;
Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up
to 0x3e;
Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up
to 0x58;
Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000643 up to 0x2b000661;
Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000401 up to 0x2c000421;
Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000643 up to 0x2b000661;
Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000401 up to 0x2c000421;
Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000643 up to 0x2b000661;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a
up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x437 up to 0x43b;
Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up
to 0xc;
Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437
up to 0x43b;
Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up
to 0x65;
Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x25
up to 0x28;
Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision
0xa000100 up to 0xa000133;
Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision
0x10003d0 up to 0x1000405;
Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000362
up to 0x3000382;
Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up
to 0xd;
Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up
to 0x133;
Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from
revision 0x12f up to 0x133;
Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4129 up to 0x6134;
Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4129 up to 0x6134;
Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4129 up to 0x6134;
Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4129 up to 0x6134;
Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4129
up to 0x6134;
Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4129 up to 0x6134;
Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x123 up
to 0x125;
Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up
to 0x21;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x3a up to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x3a up to 0x3e;
Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x119 up
to 0x11b;
Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in
intel-ucode/06-c5-02) from revision 0x119 up to 0x11b;
Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x119 up to 0x11b;
Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x119 up to 0x11b;
Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02)
from revision 0x119 up to 0x11b;
Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision
0x119 up to 0x11b;
Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x119 up to 0x11b;
Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x119 up to 0x11b;
Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x210002b3 up to 0x210002d3;
Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002b3
up to 0x210002d3.
Resolves RHBZ#2431378
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 18 2026 Eugene Syromiatnikov [evgsyr@gmail.com] 2:2.1-71.1
- Update to upstream 2.1-51. 20260210
- Addition of 06-ae-01/0x97 (GNR-D B0/B1) microcode at revision
0x10002f3;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd000404
up to 0xd000421;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002d0
up to 0x10002f1;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0xca
up to 0xcc;
- Update of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode from revision
0xbc up to 0xbe;
- Update of 06-8c-02/0xc2 (TGL-R C0) microcode from revision 0x3c up
to 0x3e;
- Update of 06-8d-01/0xc2 (TGL-H R0) microcode from revision 0x56 up
to 0x58;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000639 up to 0x2b000661;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000639 up to 0x2b000661;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c0003f7 up to 0x2c000421;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000639 up to 0x2b000661;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) from
revision 0x3a up to 0x3e;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x3a
up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) from
revision 0x3a up to 0x3e;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x437 up to 0x43b;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x437 up to 0x43b;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x437 up to 0x43b;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0xa up
to 0xc;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x437
up to 0x43b;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x64 up
to 0x65;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x24
up to 0x28;
- Update of 06-ad-01/0x20 (GNR-AP/SP H0) microcode from revision
0xa0000d1 up to 0xa000133;
- Update of 06-ad-01/0x95 (GNR-AP/SP B0) microcode from revision
0x10003a2 up to 0x1000405;
- Update of 06-af-03/0x01 (SRF-SP C0) microcode from revision 0x3000341
up to 0x3000382;
- Update of 06-b5-00/0x80 (ARL-U A1) microcode from revision 0xa up
to 0xd;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12f up
to 0x133;
- Update of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) from
revision 0x12f up to 0x133;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4128 up to 0x6134;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4128 up to 0x6134;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4128 up to 0x6134;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4128 up to 0x6134;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4128
up to 0x6134;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4128 up to 0x6134;
- Update of 06-bd-01/0x80 (LNL B0) microcode from revision 0x11f up
to 0x125;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1d up
to 0x21;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x3a up to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) from
revision 0x3a up to 0x3e;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x3a up to 0x3e;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x3a up to 0x3e;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x3a up
to 0x3e;
- Update of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
- Update of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) from
revision 0x3a up to 0x3e;
- Update of 06-c5-02/0x82 (ARL-H A1) microcode from revision 0x118 up
to 0x11b;
- Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode (in
intel-ucode/06-c5-02) from revision 0x118 up to 0x11b;
- Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x118 up to 0x11b;
- Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c5-02) from
revision 0x118 up to 0x11b;
- Update of 06-c5-02/0x82 (ARL-H A1) microcode (in intel-ucode/06-c6-02)
from revision 0x118 up to 0x11b;
- Update of 06-c6-02/0x82 (ARL-HX 8P/S B0) microcode from revision
0x118 up to 0x11b;
- Update of 06-c6-04/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x118 up to 0x11b;
- Update of 06-ca-02/0x82 microcode (in intel-ucode/06-c6-02) from
revision 0x118 up to 0x11b;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x210002a9 up to 0x210002d3;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x210002a9
up to 0x210002d3.
- Resolves RHBZ#2431378
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2431378 - microcode_ctl is outdated
https://bugzilla.redhat.com/show_bug.cgi?id=2431378
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-60e8919a4a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 43 Update: python-azure-core-1.38.0-2.fc43


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-45e69bddb9
2026-02-20 00:51:59.594060+00:00
--------------------------------------------------------------------------------

Name : python-azure-core
Product : Fedora 43
Version : 1.38.0
Release : 2.fc43
URL : https://pypi.org/project/azure-core/
Summary : Azure Core shared client library for Python
Description :
Azure Core shared client library for Python

--------------------------------------------------------------------------------
Update Information:

Update to 1.38.0 to address CVE-2026-21226
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 9 2026 Paul Wouters [paul.wouters@aiven.io] - 2:1.38.0-1
- Update to 1.38.0 to address CVE-2026-21226
- Resolves: rhbz#2404058 - python-azure-core-1.38.0 is available
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 2:1.35.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2404058 - python-azure-core-1.38.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2404058
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-45e69bddb9' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 43 Update: roundcubemail-1.6.13-1.fc43


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-547e298156
2026-02-20 00:51:59.594102+00:00
--------------------------------------------------------------------------------

Name : roundcubemail
Product : Fedora 43
Version : 1.6.13
Release : 1.fc43
URL : http://www.roundcube.net
Summary : Round Cube Webmail is a browser-based multilingual IMAP client
Description :
RoundCube Webmail is a browser-based multilingual IMAP client
with an application-like user interface. It provides full
functionality you expect from an e-mail client, including MIME
support, address book, folder manipulation, message searching
and spell checking. RoundCube Webmail is written in PHP and
requires a database: MySQL, PostgreSQL and SQLite are known to
work. The user interface is fully skinnable using XHTML and
CSS 2.

--------------------------------------------------------------------------------
Update Information:

Release 1.6.13
Managesieve: Fix handling of string-list format values for date tests in Out of
Office (#10075)
Fix remote image blocking bypass via SVG content reported by nullcathedral
Fix CSS injection vulnerability reported by CERT Polska
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 9 2026 Remi Collet [remi@remirepo.net] - 1.6.13-1
- update to 1.6.13
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2438813 - CVE-2026-26079 roundcubemail: Roundcube Webmail: Cascading Style Sheets (CSS) injection via mishandled comments [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2438813
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-547e298156' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new



[SECURITY] Fedora 43 Update: azure-cli-2.81.0-2.fc43


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-45e69bddb9
2026-02-20 00:51:59.594060+00:00
--------------------------------------------------------------------------------

Name : azure-cli
Product : Fedora 43
Version : 2.81.0
Release : 2.fc43
URL : https://github.com/Azure/azure-cli
Summary : Microsoft Azure Command-Line Tools
Description :
Microsoft Azure Command-Line Tools

--------------------------------------------------------------------------------
Update Information:

Update to 1.38.0 to address CVE-2026-21226
--------------------------------------------------------------------------------
ChangeLog:

* Wed Feb 11 2026 Jeremy Cline [jeremycline@linux.microsoft.com] - 2.81.0-2
- Relax the dependency on azure-core
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2404058 - python-azure-core-1.38.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2404058
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-45e69bddb9' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new