Fedora 42 Update: nss-3.120.1-1.fc42
Fedora 42 Update: firefox-148.0-1.fc42
Fedora 42 Update: python3.15-3.15.0~a6-1.fc42
Fedora 43 Update: udisks2-2.11.1-1.fc43
Fedora 43 Update: libmaxminddb-1.13.1-1.fc43
Fedora 43 Update: gh-2.87.0-2.fc43
Fedora 43 Update: python3.15-3.15.0~a6-1.fc43
Fedora 43 Update: freerdp-3.23.0-1.fc43
[SECURITY] Fedora 42 Update: nss-3.120.1-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-0709b275a5
2026-02-27 01:18:53.068267+00:00
--------------------------------------------------------------------------------
Name : nss
Product : Fedora 42
Version : 3.120.1
Release : 1.fc42
URL : http://www.mozilla.org/projects/security/pki/nss/
Summary : Network Security Services
Description :
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled client and
server applications. Applications built with NSS can support SSL v2
and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509
v3 certificates, and other security standards.
--------------------------------------------------------------------------------
Update Information:
Update NSS to 3.120.1
Update to Firefox 148.0
--------------------------------------------------------------------------------
ChangeLog:
* Wed Feb 18 2026 Frantisek Krenzelok [fkrenzel@redhat.com] - 3.120.1-1
- Update NSS to 3.120.1
* Mon Jan 19 2026 Frantisek Krenzelok [fkrenzel@redhat.com] - 3.120.0-1
- Update NSS to 3.120.0
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-0709b275a5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: firefox-148.0-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-0709b275a5
2026-02-27 01:18:53.068267+00:00
--------------------------------------------------------------------------------
Name : firefox
Product : Fedora 42
Version : 148.0
Release : 1.fc42
URL : https://www.mozilla.org/firefox/
Summary : Mozilla Firefox Web browser
Description :
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance and portability.
--------------------------------------------------------------------------------
Update Information:
Update NSS to 3.120.1
Update to Firefox 148.0
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 23 2026 Bojan Smojver [bojan@rexursive.com] - 148.0-1
- Add patch for dstdint compilation problem
* Mon Feb 23 2026 Martin Stransky [stransky@redhat.com] - 148.0-1
- Update to latest upstream (148.0)
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-0709b275a5' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: python3.15-3.15.0~a6-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-10af0bfadd
2026-02-27 01:18:53.068212+00:00
--------------------------------------------------------------------------------
Name : python3.15
Product : Fedora 42
Version : 3.15.0~a6
Release : 1.fc42
URL : https://www.python.org/
Summary : Version 3.15 of the Python interpreter
Description :
Python 3.15 is an accessible, high-level, dynamically typed, interpreted
programming language, designed with an emphasis on code readability.
It includes an extensive standard library, and has a vast ecosystem of
third-party libraries.
The python3.15 package provides the "python3.15" executable: the reference
interpreter for the Python language, version 3.
The majority of its standard library is provided in the python3.15-libs package,
which should be installed automatically along with python3.15.
The remaining parts of the Python standard library are broken out into the
python3.15-tkinter and python3.15-test packages, which may need to be installed
separately.
Documentation for Python is provided in the python3.15-docs package.
Packages containing additional libraries for Python are generally named with
the "python3.15-" prefix.
--------------------------------------------------------------------------------
Update Information:
New alpha release of Python 3.15
--------------------------------------------------------------------------------
ChangeLog:
* Thu Feb 12 2026 Karolina Surma [ksurma@redhat.com] - 3.15.0~a6-1
- Update to Python 3.15.0a6
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2431620 - CVE-2025-15366 python3.15: IMAP command injection in user-controlled commands [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431620
[ 2 ] Bug #2431644 - CVE-2025-15367 python3.15: POP3 command injection in user-controlled commands [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431644
[ 3 ] Bug #2431789 - CVE-2025-11468 python3.15: Missing character filtering in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431789
[ 4 ] Bug #2431799 - CVE-2026-0672 python3.15: Header injection in http.cookies.Morsel in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431799
[ 5 ] Bug #2431802 - CVE-2026-0865 python3.15: wsgiref.headers.Headers allows header newline injection in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431802
[ 6 ] Bug #2431823 - CVE-2025-15282 python3.15: Header injection via newlines in data URL mediatype in Python [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2431823
[ 7 ] Bug #2433820 - CVE-2026-1299 python3.15: email header injection due to unquoted newlines [fedora-42]
https://bugzilla.redhat.com/show_bug.cgi?id=2433820
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-10af0bfadd' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: udisks2-2.11.1-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-c6d7c9de1d
2026-02-27 00:52:14.662444+00:00
--------------------------------------------------------------------------------
Name : udisks2
Product : Fedora 43
Version : 2.11.1
Release : 1.fc43
URL : https://github.com/storaged-project/udisks
Summary : Disk Manager
Description :
The Udisks project provides a daemon, tools and libraries to access and
manipulate disks, storage devices and technologies.
--------------------------------------------------------------------------------
Update Information:
Rebase to latest upstream release
--------------------------------------------------------------------------------
ChangeLog:
* Wed Feb 25 2026 Tomas Bzatek [tbzatek@redhat.com] - 2.11.1-1
- Version 2.11.1 (#2442584,#2442588)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2442584 - CVE-2026-26103 udisks2: Missing Authorization Check Allows Unprivileged Users to Restore LUKS Headers via udisks D-Bus API [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2442584
[ 2 ] Bug #2442588 - CVE-2026-26104 udisks2: Missing Authorization Check Allows Unprivileged Users to Back Up LUKS Headers via udisks D-Bus API [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2442588
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-c6d7c9de1d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: libmaxminddb-1.13.1-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-814a1deec8
2026-02-27 00:52:14.662439+00:00
--------------------------------------------------------------------------------
Name : libmaxminddb
Product : Fedora 43
Version : 1.13.1
Release : 1.fc43
URL : https://maxmind.github.io/libmaxminddb/
Summary : C library for reading MaxMind DB files
Description :
The libmaxminddb library provides a C library for reading MaxMind DB
files, including the GeoIP2 databases from MaxMind. This is a custom
binary format designed to facilitate fast lookups of IP addresses
while allowing for great flexibility in the type of data associated
with an address.
The MaxMind DB format is an open file format. The specification is
available at https://maxmind.github.io/MaxMind-DB/ and licensed under
the Creative Commons Attribution-ShareAlike 3.0 Unported License.
--------------------------------------------------------------------------------
Update Information:
libmaxminddb 1.13.1
Re-release for Ubuntu PPA, no code changes.
libmaxminddb 1.13.0
MMDB_get_entry_data_list() now validates that the claimed array/map size is
plausible given the remaining bytes in the data section. A crafted database
could previously claim millions of array elements while only having a few
bytes of data, causing disproportionate memory allocation (memory
amplification DoS).
Fixed integer overflow in MMDB_read_node() and find_ipv4_start_node()
pointer arithmetic. The node_number * record_length multiplication was
performed in uint32_t, which could overflow for very large databases. Now
cast to uint64_t before multiplying, matching the pattern already used in
find_address_in_search_tree().
Fixed printf format specifier mismatches in mmdblookup's metadata dump. %i
was used for unsigned types and %llu for uint64_t, which is technically
undefined behavior. Now uses the portable PRIu32, PRIu16, and PRIu64
macros from .
Fixed an integer overflow in the search tree bounds check in
find_address_in_search_tree(). The addition of node_count and
data_section_size was performed in uint32_t arithmetic, which could wrap
on very large databases, causing valid lookups to be incorrectly rejected as
corrupt.
Fixed a NULL pointer dereference in mmdblookup when displaying metadata for
a database with an out-of-range build_epoch. The gmtime() return value is
now checked before passing to strftime().
MMDB_close() now NULLs the file_content, data_section, and
metadata_section pointers and zeroes file_size, data_section_size, and
metadata_section_size after unmapping. Previously, calling MMDB_close()
twice on the same struct (or calling it after a failed MMDB_open() that
succeeded at mapping) would double-munmap the file content, which is undefined
behavior.
Fixed a stack buffer overflow in print_indentation() when
MMDB_dump_entry_data_list() was called with a negative indent value. The
negative integer was cast to size_t, producing a massive value passed to
memset(). Negative indent values are now clamped to 0.
MMDB_lookup_string() now sets *mmdb_error to MMDB_SUCCESS when
getaddrinfo fails (non-zero *gai_error). Previously, *mmdb_error was
left uninitialized in this case, which could cause callers to read an
indeterminate value.
Added a recursion depth limit to skip_map_or_array(), matching the existing
MAXIMUM_DATA_STRUCTURE_DEPTH (512) limit already used by
get_entry_data_list(). A crafted MMDB file with deeply nested maps or arrays
could previously cause a stack overflow via unbounded recursion in the
MMDB_aget_value / MMDB_get_value code path.
Fixed an off-by-one error in MMDB_read_node() that allowed reading one node
past the end of the search tree when called with node_number == node_count.
This caused the function to read from the data section separator and return an
invalid record with an underflowed data offset. The check now correctly
rejects node_number >= node_count.
The handling of float and double types was rewritten to fix compiler errors
and to eliminate the use of volatile.
Improved endian preprocessor check if MMDB_LITTLE_ENDIAN is not set.
--------------------------------------------------------------------------------
ChangeLog:
* Wed Feb 25 2026 Robert Scheck [robert@fedoraproject.org] 1.13.1-1
- Upgrade to 1.13.1 (#2442507)
* Fri Jan 16 2026 Fedora Release Engineering [releng@fedoraproject.org] - 1.12.2-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2442507 - libmaxminddb-1.13.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2442507
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-814a1deec8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: gh-2.87.0-2.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-21a2f3709a
2026-02-27 00:52:14.662437+00:00
--------------------------------------------------------------------------------
Name : gh
Product : Fedora 43
Version : 2.87.0
Release : 2.fc43
URL : https://github.com/cli/cli
Summary : GitHub's official command line tool
Description :
A command-line interface to GitHub for use in your terminal or your scripts.
gh is a tool designed to enhance your workflow when working with GitHub. It
provides a seamless way to interact with GitHub repositories and perform various
actions right from the command line, eliminating the need to switch between your
terminal and the GitHub website.
--------------------------------------------------------------------------------
Update Information:
Update to 2.87.0
--------------------------------------------------------------------------------
ChangeLog:
* Wed Feb 18 2026 Mikel Olasagasti Uranga [mikel@olasagasti.info] - 2.87.0-2
- Drop patch included in 2.87.0
* Wed Feb 18 2026 Packit [hello@packit.dev] - 2.87.0-1
- Update to 2.87.0 upstream release
- Resolves: rhbz#2440729
* Mon Feb 2 2026 Maxwell G [maxwell@gtmx.me] - 2.86.0-3
- Rebuild for https://fedoraproject.org/wiki/Changes/golang1.26
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2432198 - CVE-2026-23831 gh: Rekor denial of service [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2432198
[ 2 ] Bug #2433105 - CVE-2026-23991 gh: go-tuf client DoS via malformed server response [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433105
[ 3 ] Bug #2433107 - CVE-2026-23992 gh: go-tuf improperly validates the configured threshold for delegations [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433107
[ 4 ] Bug #2433108 - CVE-2026-23991 gh: go-tuf client DoS via malformed server response [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433108
[ 5 ] Bug #2433551 - CVE-2026-24117 gh: Rekor Server-Side Request Forgery (SSRF) [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433551
[ 6 ] Bug #2433598 - CVE-2026-24137 gh: sigstore legacy TUF client allows for arbitrary file writes with target cache path traversal [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433598
[ 7 ] Bug #2434249 - CVE-2026-24686 gh: go-tuf Path Traversal in TAP 4 Multirepo Client Allows Arbitrary File Write via Malicious Repository Names [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2434249
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-21a2f3709a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: python3.15-3.15.0~a6-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-cf721e4319
2026-02-27 00:52:14.662380+00:00
--------------------------------------------------------------------------------
Name : python3.15
Product : Fedora 43
Version : 3.15.0~a6
Release : 1.fc43
URL : https://www.python.org/
Summary : Version 3.15 of the Python interpreter
Description :
Python 3.15 is an accessible, high-level, dynamically typed, interpreted
programming language, designed with an emphasis on code readability.
It includes an extensive standard library, and has a vast ecosystem of
third-party libraries.
The python3.15 package provides the "python3.15" executable: the reference
interpreter for the Python language, version 3.
The majority of its standard library is provided in the python3.15-libs package,
which should be installed automatically along with python3.15.
The remaining parts of the Python standard library are broken out into the
python3.15-tkinter and python3.15-test packages, which may need to be installed
separately.
Documentation for Python is provided in the python3.15-docs package.
Packages containing additional libraries for Python are generally named with
the "python3.15-" prefix.
--------------------------------------------------------------------------------
Update Information:
New alpha release of Python 3.15
--------------------------------------------------------------------------------
ChangeLog:
* Thu Feb 12 2026 Karolina Surma [ksurma@redhat.com] - 3.15.0~a6-1
- Update to Python 3.15.0a6
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2431630 - CVE-2025-15366 python3.15: IMAP command injection in user-controlled commands [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431630
[ 2 ] Bug #2431654 - CVE-2025-15367 python3.15: POP3 command injection in user-controlled commands [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431654
[ 3 ] Bug #2431829 - CVE-2025-11468 python3.15: Missing character filtering in Python [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431829
[ 4 ] Bug #2431840 - CVE-2026-0672 python3.15: Header injection in http.cookies.Morsel in Python [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431840
[ 5 ] Bug #2431842 - CVE-2026-0865 python3.15: wsgiref.headers.Headers allows header newline injection in Python [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431842
[ 6 ] Bug #2431852 - CVE-2025-15282 python3.15: Header injection via newlines in data URL mediatype in Python [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2431852
[ 7 ] Bug #2433830 - CVE-2026-1299 python3.15: email header injection due to unquoted newlines [fedora-43]
https://bugzilla.redhat.com/show_bug.cgi?id=2433830
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-cf721e4319' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: freerdp-3.23.0-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-be60dd75d9
2026-02-27 00:52:14.662442+00:00
--------------------------------------------------------------------------------
Name : freerdp
Product : Fedora 43
Version : 3.23.0
Release : 1.fc43
URL : http://www.freerdp.com/
Summary : Free implementation of the Remote Desktop Protocol (RDP)
Description :
The xfreerdp & wlfreerdp Remote Desktop Protocol (RDP) clients from the FreeRDP
project.
xfreerdp & wlfreerdp can connect to RDP servers such as Microsoft Windows
machines, xrdp and VirtualBox.
--------------------------------------------------------------------------------
Update Information:
Update to 3.23.0 to fix CVE-2026-26965, CVE-2026-26955, CVE-2026-26271,
CVE-2026-25997, CVE-2026-25959, CVE-2026-25955, CVE-2026-25954, CVE-2026-25953,
CVE-2026-25952, CVE-2026-25942, CVE-2026-25941
--------------------------------------------------------------------------------
ChangeLog:
* Wed Feb 25 2026 Neal Gompa [ngompa@fedoraproject.org] - 2:3.23.0-1
- Update to 3.23.0 (CVE-2026-26965, CVE-2026-26955, CVE-2026-26271,
CVE-2026-25997, CVE-2026-25959, CVE-2026-25955, CVE-2026-25954,
CVE-2026-25953, CVE-2026-25952, CVE-2026-25942, CVE-2026-25941)
Resolves: rhbz#2442589
- Small spec cleanups
- Enable rdp2tcp channel support
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2442589 - freerdp-3.23.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2442589
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-be60dd75d9' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new