Fedora 43 Update: proftpd-1.3.9a-1.fc43
Fedora 43 Update: kernel-7.0.4-100.fc43
Fedora 43 Update: nodejs22-22.22.2-2.fc43
Fedora 42 Update: kernel-6.19.14-101.fc42
Fedora 42 Update: proftpd-1.3.9a-1.fc42
Fedora 44 Update: gnutls-3.8.13-1.fc44
Fedora 44 Update: kernel-7.0.4-200.fc44
Fedora 44 Update: proftpd-1.3.9a-1.fc44
Fedora 44 Update: nodejs22-22.22.2-3.fc44
Fedora 44 Update: SDL3_image-3.4.4-1.fc44
[SECURITY] Fedora 43 Update: proftpd-1.3.9a-1.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-bdb9342c72
2026-05-08 19:57:57.884176+00:00
--------------------------------------------------------------------------------
Name : proftpd
Product : Fedora 43
Version : 1.3.9a
Release : 1.fc43
URL : http://www.proftpd.org/
Summary : Flexible, stable and highly-configurable FTP server
Description :
ProFTPD is an enhanced FTP server with a focus toward simplicity, security,
and ease of configuration. It features a very Apache-like configuration
syntax, and a highly customizable server infrastructure, including support for
multiple 'virtual' FTP servers, anonymous FTP, and permission-based directory
visibility.
This package defaults to the standalone behavior of ProFTPD, but all the
needed scripts to have it run by systemd instead are included.
--------------------------------------------------------------------------------
Update Information:
Cumulative bug-fix release from upstream. Includes fix for a possible SQL-
injection issue via mod_sql (CVE-2026-42167). Note that mod_sql is not enabled
by default.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 30 2026 Paul Howarth - 1.3.9a-1
- Update to 1.3.9a
- SCP transfers failed for files with spaces in their names (GH#1886)
- LDAPDefaultGID ignored since 1.3.9 (GH#1898)
- Compilation of mod_wrap2 failed when the --enable-wrapper-options configure
option was used (Bug #4512)
- mod_sftp failed to parse authorized user/host public keys with CRLF line
endings (GH#1904)
- Uploads using MODE Z sometimes resulted in corrupted files or broken
transfers (GH#1896)
- Remove usage of the deprecated MySQL_OPT_RECONNECT option for newer MySQL
versions (GH#1911)
- Update usage of MySQL API for SSL/TLS connections to server (GH#340)
- mod_sftp leaked file descriptor when reading SFTPHostKey file (GH#1959)
- Large/slow SCP downloads could be unnecessarily truncated by TimeoutStalled
(GH#1964)
- Handling of CRLs in mod_tls was incorrect, leading to confusing errors
(GH#1960)
- Resumed SSL_SESSION management in mod_tls lead to memory growth, infinite
loop using newer OpenSSL versions (GH#1963)
- mod_quotatab_ldap interactions could lead to segfault due to stale pointer
(GH#1984)
- RNTO before authentication lead to out-of-order response codes (GH#2003)
- MaxLoginAttemptsFromUser event never triggered in mod_ban for SFTP sessions
(GH#2009)
- Using toupper(3) on non-ASCII FTP command bytes might cause remote DoS
(GH#2019)
- Out-of-bounds single byte read when FTP command input buffer starts with LF
(GH#2020)
- FTP command LIST/NLST -B could cause buffer overflow when listing certain
crafted filenames (GH#2030)
- Memory exhaustion with mod_log_forensic when downloading very large files
via SFTP (GH#2043)
- Setting process groups during authentication crashed when using mod_radius
and (GH#2046)
- SQL injection possible via mod_sql because of is_escaped_text() logic error
(GH#2052, CVE-2026-42167)
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 1.3.9-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2466604 - CVE-2026-42167 proftpd: SQL injection due to logic error in is_escaped_text() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2466604
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-bdb9342c72' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 43 Update: kernel-7.0.4-100.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-abc00fb4e8
2026-05-08 19:57:57.884186+00:00
--------------------------------------------------------------------------------
Name : kernel
Product : Fedora 43
Version : 7.0.4
Release : 100.fc43
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package
--------------------------------------------------------------------------------
Update Information:
The 7.0.4 stable kernel rebase contains additional hardware support, new
features, and a number of important fixes across the tree. It also contains a
fix for the dirtyfrag vulnerability. This covers CVE-2026-43284 and
CVE-2026-43500. For users who experience a problem with the 7.0.4 rebase, a
build of 6.19.14 with just the dirtyfrag fixes should be available in koji
shortly.
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 7 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.4-100]
- xfrm: esp: avoid in-place decrypt on shared skb frags (Kuan-Ting Chen)
- rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (Hyunwoo Kim)
* Thu May 7 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.4-0]
- wifi: mt76: mt7925: fix incorrect TLV length in CLC command (Quan Zhou)
- ASoC: SOF: Don't allow pointer operations on unconfigured streams (Mark Brown)
- Turn on DVB_PT3 for Fedora at user request (Justin M. Forbes)
- Enable MEDIA_TUNER_MXL301RF for Fedora (Justin M. Forbes)
- mfd: bcm2835-pm: Add BCM2712 PM device support (Phil Elwell)
- mfd: bcm2835-pm: Introduce SoC-specific type identifier (Phil Elwell)
- Linux v7.0.4
* Thu Apr 30 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.3-0]
- Linux v7.0.3
* Mon Apr 27 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.2-0]
- drm/v3d: Reject empty multisync extension to prevent infinite loop (Ashutosh Desai)
- net: macb: Use napi_schedule_irqoff() in IRQ handler (Kevin Hao)
- net: macb: Use netif_napi_add_tx() instead of netif_napi_add() for TX NAPI (Kevin Hao)
- net: macb: Remove dedicated IRQ handler for WoL (Kevin Hao)
- net: macb: Factor out the handling of non-hot IRQ events into a separate function (Kevin Hao)
- net: macb: Introduce macb_queue_isr_clear() helper function (Kevin Hao)
- net: macb: Replace open-coded implementation with napi_schedule() (Kevin Hao)
- net: macb: fix use of at91_default_usrio without CONFIG_OF (Conor Dooley)
- net: macb: drop usrio pointer on EyeQ5 config (Th??o Lebrun)
- net: macb: set MACB_CAPS_USRIO_DISABLED if no usrio config is provided (Th??o Lebrun)
- net: macb: runtime detect MACB_CAPS_USRIO_DISABLED (Th??o Lebrun)
- net: macb: timer adjust mode is not supported (Conor Dooley)
- net: macb: clean up tsu clk rate acquisition (Conor Dooley)
- net: macb: warn on pclk use as a tsu_clk fallback (Conor Dooley)
- net: macb: add mpfs specific usrio configuration (Conor Dooley)
- net: macb: np4 doesn't need a usrio pointer (Conor Dooley)
- net: macb: rework usrio refclk selection code (Conor Dooley)
- net: macb: split USRIO_HAS_CLKEN capability in two (Conor Dooley)
- net: macb: rename macb_default_usrio to at91_default_usrio as not all platforms have mii mode control in usrio (Conor Dooley)
- Revert "net: macb: Clean up the .usrio settings in macb_config instances" (Conor Dooley)
- net: macb: add support for Microchip pic64hpsc ethernet endpoint (Charles Perry)
- net: macb: add safeguards for jumbo frame larger than 10240 (Charles Perry)
- net: macb: set default_an_inband to true for SGMII (Charles Perry)
- net: macb: Clean up the .usrio settings in macb_config instances (Kevin Hao)
- net: macb: Clean up the .init settings in macb_config instances (Kevin Hao)
- net: macb: Clean up the .clk_init setting in the macb_config instances (Kevin Hao)
- net: cadence: macb: enable EEE for Mobileye EyeQ5 (Nicolai Buchwitz)
- net: cadence: macb: enable EEE for Raspberry Pi RP1 (Nicolai Buchwitz)
- net: cadence: macb: add ethtool EEE support (Nicolai Buchwitz)
- net: cadence: macb: implement EEE TX LPI support (Nicolai Buchwitz)
- net: cadence: macb: add EEE LPI statistics counters (Nicolai Buchwitz)
- net: macb: use ethtool_sprintf to fill ethtool stats strings (Sean Chang)
- net: macb: add the .pcs_inband_caps() callback for SGMII (Charles Perry)
- net: macb: add support for reporting SGMII inband link status (Charles Perry)
- net: macb: fix SGMII with inband aneg disabled (Charles Perry)
- net: cadence: macb: add ethtool nway_reset support (Nicolai Buchwitz)
- ARM: dts: broadcom: bcm2835-rpi: Move non simple-bus nodes to root level (Rob Herring (Arm))
- arm64: dts: broadcom: bcm2712: Move non simple-bus nodes to root level (Rob Herring (Arm))
- arm64: dts: broadcom: bcm2712-d-rpi-5-b: update uart10 interrupt (Gregor Herburger)
- arm64: dts: broadcom: bcm2712-d-rpi-5-b: add fixes for pinctrl/pinctrl_aon (Gregor Herburger)
- arm64: dts: broadcom: bcm2712-rpi-5-b: add pinctrl properties for csi i2cs (Gregor Herburger)
- arm64: dts: broadcom: bcm2712: add camera backend node pispbe (Gregor Herburger)
- arm64: dts: broadcom: rp1: add csi nodes (Gregor Herburger)
- arm64: dts: broadcom: rp1: add i2c controller (Gregor Herburger)
- arm64: dts: broadcom: bcm2712: Add V3D device node (Ma??ra Canal)
- arm64: dts: freescale: imx93: Add Ethos-U65 NPU and SRAM nodes (Rob Herring (Arm))
- redhat: configs: fedora: Enable AMD ISP4 MIPI camera solution (Kate Hsuan)
- Documentation: add documentation of AMD isp 4 driver (Bin Du)
- media: platform: amd: isp4 debug fs logging and more descriptive errors (Bin Du)
- media: platform: amd: isp4 video node and buffers handling added (Bin Du)
- media: platform: amd: isp4 subdev and firmware loading handling added (Bin Du)
- media: platform: amd: Add isp4 fw and hw interface (Bin Du)
- media: platform: amd: low level support for isp4 firmware (Bin Du)
- media: platform: amd: Introduce amd isp4 capture driver (Bin Du)
- Linux v7.0.2
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2467807 - [Major Incident] kernel: "Dirty Frag" is a new universal Local Privilege Escalation (LPE) vulnerability in the Linux kernel [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2467807
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-abc00fb4e8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
[SECURITY] Fedora 43 Update: nodejs22-22.22.2-2.fc43
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-e3f870229a
2026-05-08 19:57:57.884168+00:00
--------------------------------------------------------------------------------
Name : nodejs22
Product : Fedora 43
Version : 22.22.2
Release : 2.fc43
URL : http://nodejs.org/
Summary : JavaScript runtime
Description :
Node.js is a platform built on Chrome's JavaScript runtime \
for easily building fast, scalable network applications. \
Node.js uses an event-driven, non-blocking I/O model that \
makes it lightweight and efficient, perfect for data-intensive \
real-time applications that run across distributed devices.}
--------------------------------------------------------------------------------
Update Information:
Update to version 22.22.2
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 29 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.2-2
- update of nghttp2
* Wed Apr 29 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.2-1
- Update to version 22.22.2 (rhbz#2444849)
* Mon Jan 19 2026 Jan Stan??k [jstanek@redhat.com] - 1:22.22.0-3
- Diverge from rawhide
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2447160 - CVE-2026-1528 nodejs22: undici: Denial of Service via crafted WebSocket frame with large length [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447160
[ 2 ] Bug #2447163 - CVE-2026-2229 nodejs22: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447163
[ 3 ] Bug #2447170 - CVE-2026-1525 nodejs22: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447170
[ 4 ] Bug #2447175 - CVE-2026-1527 nodejs22: Undici: HTTP header injection and request smuggling vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447175
[ 5 ] Bug #2447181 - CVE-2026-1526 nodejs22: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447181
[ 6 ] Bug #2453565 - CVE-2026-21717 nodejs22: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453565
[ 7 ] Bug #2453568 - CVE-2026-21714 nodejs22: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453568
[ 8 ] Bug #2453572 - CVE-2026-21713 nodejs22: Node.js: Information disclosure via timing oracle in HMAC verification [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453572
[ 9 ] Bug #2453595 - CVE-2026-21716 nodejs22: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453595
[ 10 ] Bug #2453598 - CVE-2026-21715 nodejs22: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453598
[ 11 ] Bug #2453600 - CVE-2026-21710 nodejs22: Node.js: Denial of Service due to crafted HTTP `__proto__` header [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453600
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-e3f870229a' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
[SECURITY] Fedora 42 Update: kernel-6.19.14-101.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-87dc12705e
2026-05-08 19:40:45.156117+00:00
--------------------------------------------------------------------------------
Name : kernel
Product : Fedora 42
Version : 6.19.14
Release : 101.fc42
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package
--------------------------------------------------------------------------------
Update Information:
The 6.19.14-101 stable update contains a fix for the dirtyfrag vulnerability.
This covers CVE-2026-43284 and CVE-2026-43500
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 7 2026 Justin M. Forbes [jforbes@fedoraproject.org] [6.19.14-101]
- Revert "redhat/kernel.spec.template: Fix indentation of uki-virt generation code" (Justin M. Forbes)
- Revert "redhat/kernel.spec.template: Simplify uki-virt signing" (Justin M. Forbes)
- Revert "redhat/kernel.spec.template: Add kernel-uki-dtbloader sub-package" (Justin M. Forbes)
- Revert "redhat/kernel.spec.template: Make -uki-dtbloader provide kernel-core-uname-r" (Justin M. Forbes)
- Turn off F43 and F44 release targets (Justin M. Forbes)
- rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (Hyunwoo Kim)
- rxrpc: Fix rxrpc_input_call_event() to only unshare DATA packets (David Howells)
- rxrpc: Fix re-decryption of RESPONSE packets (David Howells)
- rxrpc: Fix error handling in rxgk_extract_token() (David Howells)
- rxrpc: Fix rxkad crypto unalignment handling (David Howells)
- rxrpc: Fix conn-level packet handling to unshare RESPONSE packets (David Howells)
- rxrpc: Fix memory leaks in rxkad_verify_response() (David Howells)
- rxrpc: Fix potential UAF after skb_unshare() failure (David Howells)
- xfrm: esp: avoid in-place decrypt on shared skb frags (Kuan-Ting Chen)
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-87dc12705e' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 42 Update: proftpd-1.3.9a-1.fc42
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-739d341ab8
2026-05-08 19:40:45.156106+00:00
--------------------------------------------------------------------------------
Name : proftpd
Product : Fedora 42
Version : 1.3.9a
Release : 1.fc42
URL : http://www.proftpd.org/
Summary : Flexible, stable and highly-configurable FTP server
Description :
ProFTPD is an enhanced FTP server with a focus toward simplicity, security,
and ease of configuration. It features a very Apache-like configuration
syntax, and a highly customizable server infrastructure, including support for
multiple 'virtual' FTP servers, anonymous FTP, and permission-based directory
visibility.
This package defaults to the standalone behavior of ProFTPD, but all the
needed scripts to have it run by systemd instead are included.
--------------------------------------------------------------------------------
Update Information:
Cumulative bug-fix release from upstream. Includes fix for a possible SQL-
injection issue via mod_sql (CVE-2026-42167). Note that mod_sql is not enabled
by default.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 30 2026 Paul Howarth - 1.3.9a-1
- Update to 1.3.9a
- SCP transfers failed for files with spaces in their names (GH#1886)
- LDAPDefaultGID ignored since 1.3.9 (GH#1898)
- Compilation of mod_wrap2 failed when the --enable-wrapper-options configure
option was used (Bug #4512)
- mod_sftp failed to parse authorized user/host public keys with CRLF line
endings (GH#1904)
- Uploads using MODE Z sometimes resulted in corrupted files or broken
transfers (GH#1896)
- Remove usage of the deprecated MySQL_OPT_RECONNECT option for newer MySQL
versions (GH#1911)
- Update usage of MySQL API for SSL/TLS connections to server (GH#340)
- mod_sftp leaked file descriptor when reading SFTPHostKey file (GH#1959)
- Large/slow SCP downloads could be unnecessarily truncated by TimeoutStalled
(GH#1964)
- Handling of CRLs in mod_tls was incorrect, leading to confusing errors
(GH#1960)
- Resumed SSL_SESSION management in mod_tls lead to memory growth, infinite
loop using newer OpenSSL versions (GH#1963)
- mod_quotatab_ldap interactions could lead to segfault due to stale pointer
(GH#1984)
- RNTO before authentication lead to out-of-order response codes (GH#2003)
- MaxLoginAttemptsFromUser event never triggered in mod_ban for SFTP sessions
(GH#2009)
- Using toupper(3) on non-ASCII FTP command bytes might cause remote DoS
(GH#2019)
- Out-of-bounds single byte read when FTP command input buffer starts with LF
(GH#2020)
- FTP command LIST/NLST -B could cause buffer overflow when listing certain
crafted filenames (GH#2030)
- Memory exhaustion with mod_log_forensic when downloading very large files
via SFTP (GH#2043)
- Setting process groups during authentication crashed when using mod_radius
and (GH#2046)
- SQL injection possible via mod_sql because of is_escaped_text() logic error
(GH#2052, CVE-2026-42167)
* Sat Jan 17 2026 Fedora Release Engineering [releng@fedoraproject.org] - 1.3.9-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
* Fri Jul 25 2025 Fedora Release Engineering [releng@fedoraproject.org] - 1.3.9-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2466604 - CVE-2026-42167 proftpd: SQL injection due to logic error in is_escaped_text() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2466604
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-739d341ab8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 44 Update: gnutls-3.8.13-1.fc44
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-668d2793e8
2026-05-08 19:27:40.960942+00:00
--------------------------------------------------------------------------------
Name : gnutls
Product : Fedora 44
Version : 3.8.13
Release : 1.fc44
URL : http://www.gnutls.org/
Summary : A TLS protocol implementation
Description :
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS
protocols and technologies around them. It provides a simple C language
application programming interface (API) to access the secure communications
protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and
other required structures.
--------------------------------------------------------------------------------
Update Information:
Update to 3.8.13, fixes, like 13 CVEs.
--------------------------------------------------------------------------------
ChangeLog:
* Mon May 4 2026 Alexander Sosedkin [asosedkin@redhat.com] - 3.8.13-1
- Update to 3.8.13
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-668d2793e8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 44 Update: kernel-7.0.4-200.fc44
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-8cffa03dad
2026-05-08 19:27:40.960947+00:00
--------------------------------------------------------------------------------
Name : kernel
Product : Fedora 44
Version : 7.0.4
Release : 200.fc44
URL : https://www.kernel.org/
Summary : The Linux kernel
Description :
The kernel meta package
--------------------------------------------------------------------------------
Update Information:
The 7.0.4 stable kernel rebase contains additional hardware support, new
features, and a number of important fixes across the tree. It also contains a
fix for the dirtyfrag vulnerability. This covers CVE-2026-43284 and
CVE-2026-43500. For users who experience a problem with the 7.0.4 rebase, a
build of 6.19.14 with just the dirtyfrag fixes should be available in koji
shortly.
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 7 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.4-200]
- xfrm: esp: avoid in-place decrypt on shared skb frags (Kuan-Ting Chen)
- rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (Hyunwoo Kim)
* Thu May 7 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.4-0]
- wifi: mt76: mt7925: fix incorrect TLV length in CLC command (Quan Zhou)
- ASoC: SOF: Don't allow pointer operations on unconfigured streams (Mark Brown)
- Turn on DVB_PT3 for Fedora at user request (Justin M. Forbes)
- Enable MEDIA_TUNER_MXL301RF for Fedora (Justin M. Forbes)
- mfd: bcm2835-pm: Add BCM2712 PM device support (Phil Elwell)
- mfd: bcm2835-pm: Introduce SoC-specific type identifier (Phil Elwell)
- Linux v7.0.4
* Thu Apr 30 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.3-0]
- Linux v7.0.3
* Mon Apr 27 2026 Justin M. Forbes [jforbes@fedoraproject.org] [7.0.2-0]
- drm/v3d: Reject empty multisync extension to prevent infinite loop (Ashutosh Desai)
- net: macb: Use napi_schedule_irqoff() in IRQ handler (Kevin Hao)
- net: macb: Use netif_napi_add_tx() instead of netif_napi_add() for TX NAPI (Kevin Hao)
- net: macb: Remove dedicated IRQ handler for WoL (Kevin Hao)
- net: macb: Factor out the handling of non-hot IRQ events into a separate function (Kevin Hao)
- net: macb: Introduce macb_queue_isr_clear() helper function (Kevin Hao)
- net: macb: Replace open-coded implementation with napi_schedule() (Kevin Hao)
- net: macb: fix use of at91_default_usrio without CONFIG_OF (Conor Dooley)
- net: macb: drop usrio pointer on EyeQ5 config (Th??o Lebrun)
- net: macb: set MACB_CAPS_USRIO_DISABLED if no usrio config is provided (Th??o Lebrun)
- net: macb: runtime detect MACB_CAPS_USRIO_DISABLED (Th??o Lebrun)
- net: macb: timer adjust mode is not supported (Conor Dooley)
- net: macb: clean up tsu clk rate acquisition (Conor Dooley)
- net: macb: warn on pclk use as a tsu_clk fallback (Conor Dooley)
- net: macb: add mpfs specific usrio configuration (Conor Dooley)
- net: macb: np4 doesn't need a usrio pointer (Conor Dooley)
- net: macb: rework usrio refclk selection code (Conor Dooley)
- net: macb: split USRIO_HAS_CLKEN capability in two (Conor Dooley)
- net: macb: rename macb_default_usrio to at91_default_usrio as not all platforms have mii mode control in usrio (Conor Dooley)
- Revert "net: macb: Clean up the .usrio settings in macb_config instances" (Conor Dooley)
- net: macb: add support for Microchip pic64hpsc ethernet endpoint (Charles Perry)
- net: macb: add safeguards for jumbo frame larger than 10240 (Charles Perry)
- net: macb: set default_an_inband to true for SGMII (Charles Perry)
- net: macb: Clean up the .usrio settings in macb_config instances (Kevin Hao)
- net: macb: Clean up the .init settings in macb_config instances (Kevin Hao)
- net: macb: Clean up the .clk_init setting in the macb_config instances (Kevin Hao)
- net: cadence: macb: enable EEE for Mobileye EyeQ5 (Nicolai Buchwitz)
- net: cadence: macb: enable EEE for Raspberry Pi RP1 (Nicolai Buchwitz)
- net: cadence: macb: add ethtool EEE support (Nicolai Buchwitz)
- net: cadence: macb: implement EEE TX LPI support (Nicolai Buchwitz)
- net: cadence: macb: add EEE LPI statistics counters (Nicolai Buchwitz)
- net: macb: use ethtool_sprintf to fill ethtool stats strings (Sean Chang)
- net: macb: add the .pcs_inband_caps() callback for SGMII (Charles Perry)
- net: macb: add support for reporting SGMII inband link status (Charles Perry)
- net: macb: fix SGMII with inband aneg disabled (Charles Perry)
- net: cadence: macb: add ethtool nway_reset support (Nicolai Buchwitz)
- ARM: dts: broadcom: bcm2835-rpi: Move non simple-bus nodes to root level (Rob Herring (Arm))
- arm64: dts: broadcom: bcm2712: Move non simple-bus nodes to root level (Rob Herring (Arm))
- arm64: dts: broadcom: bcm2712-d-rpi-5-b: update uart10 interrupt (Gregor Herburger)
- arm64: dts: broadcom: bcm2712-d-rpi-5-b: add fixes for pinctrl/pinctrl_aon (Gregor Herburger)
- arm64: dts: broadcom: bcm2712-rpi-5-b: add pinctrl properties for csi i2cs (Gregor Herburger)
- arm64: dts: broadcom: bcm2712: add camera backend node pispbe (Gregor Herburger)
- arm64: dts: broadcom: rp1: add csi nodes (Gregor Herburger)
- arm64: dts: broadcom: rp1: add i2c controller (Gregor Herburger)
- arm64: dts: broadcom: bcm2712: Add V3D device node (Ma??ra Canal)
- arm64: dts: freescale: imx93: Add Ethos-U65 NPU and SRAM nodes (Rob Herring (Arm))
- redhat: configs: fedora: Enable AMD ISP4 MIPI camera solution (Kate Hsuan)
- Documentation: add documentation of AMD isp 4 driver (Bin Du)
- media: platform: amd: isp4 debug fs logging and more descriptive errors (Bin Du)
- media: platform: amd: isp4 video node and buffers handling added (Bin Du)
- media: platform: amd: isp4 subdev and firmware loading handling added (Bin Du)
- media: platform: amd: Add isp4 fw and hw interface (Bin Du)
- media: platform: amd: low level support for isp4 firmware (Bin Du)
- media: platform: amd: Introduce amd isp4 capture driver (Bin Du)
- Linux v7.0.2
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2467807 - [Major Incident] kernel: "Dirty Frag" is a new universal Local Privilege Escalation (LPE) vulnerability in the Linux kernel [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2467807
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-8cffa03dad' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
[SECURITY] Fedora 44 Update: proftpd-1.3.9a-1.fc44
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-549ee32ea1
2026-05-08 19:27:40.960911+00:00
--------------------------------------------------------------------------------
Name : proftpd
Product : Fedora 44
Version : 1.3.9a
Release : 1.fc44
URL : http://www.proftpd.org/
Summary : Flexible, stable and highly-configurable FTP server
Description :
ProFTPD is an enhanced FTP server with a focus toward simplicity, security,
and ease of configuration. It features a very Apache-like configuration
syntax, and a highly customizable server infrastructure, including support for
multiple 'virtual' FTP servers, anonymous FTP, and permission-based directory
visibility.
This package defaults to the standalone behavior of ProFTPD, but all the
needed scripts to have it run by systemd instead are included.
--------------------------------------------------------------------------------
Update Information:
Cumulative bug-fix release from upstream. Includes fix for a possible SQL-
injection issue via mod_sql (CVE-2026-42167). Note that mod_sql is not enabled
by default.
--------------------------------------------------------------------------------
ChangeLog:
* Thu Apr 30 2026 Paul Howarth - 1.3.9a-1
- Update to 1.3.9a
- SCP transfers failed for files with spaces in their names (GH#1886)
- LDAPDefaultGID ignored since 1.3.9 (GH#1898)
- Compilation of mod_wrap2 failed when the --enable-wrapper-options configure
option was used (Bug #4512)
- mod_sftp failed to parse authorized user/host public keys with CRLF line
endings (GH#1904)
- Uploads using MODE Z sometimes resulted in corrupted files or broken
transfers (GH#1896)
- Remove usage of the deprecated MySQL_OPT_RECONNECT option for newer MySQL
versions (GH#1911)
- Update usage of MySQL API for SSL/TLS connections to server (GH#340)
- mod_sftp leaked file descriptor when reading SFTPHostKey file (GH#1959)
- Large/slow SCP downloads could be unnecessarily truncated by TimeoutStalled
(GH#1964)
- Handling of CRLs in mod_tls was incorrect, leading to confusing errors
(GH#1960)
- Resumed SSL_SESSION management in mod_tls lead to memory growth, infinite
loop using newer OpenSSL versions (GH#1963)
- mod_quotatab_ldap interactions could lead to segfault due to stale pointer
(GH#1984)
- RNTO before authentication lead to out-of-order response codes (GH#2003)
- MaxLoginAttemptsFromUser event never triggered in mod_ban for SFTP sessions
(GH#2009)
- Using toupper(3) on non-ASCII FTP command bytes might cause remote DoS
(GH#2019)
- Out-of-bounds single byte read when FTP command input buffer starts with LF
(GH#2020)
- FTP command LIST/NLST -B could cause buffer overflow when listing certain
crafted filenames (GH#2030)
- Memory exhaustion with mod_log_forensic when downloading very large files
via SFTP (GH#2043)
- Setting process groups during authentication crashed when using mod_radius
and (GH#2046)
- SQL injection possible via mod_sql because of is_escaped_text() logic error
(GH#2052, CVE-2026-42167)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2466604 - CVE-2026-42167 proftpd: SQL injection due to logic error in is_escaped_text() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2466604
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-549ee32ea1' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 44 Update: nodejs22-22.22.2-3.fc44
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-3b76d8047d
2026-05-08 19:27:40.960901+00:00
--------------------------------------------------------------------------------
Name : nodejs22
Product : Fedora 44
Version : 22.22.2
Release : 3.fc44
URL : https://nodejs.org
Summary : JavaScript runtime
Description :
Node.js is a platform built on Chrome's JavaScript runtime
for easily building fast, scalable network applications.
Node.js uses an event-driven, non-blocking I/O model that
makes it lightweight and efficient, perfect for data-intensive
real-time applications that run across distributed devices.
--------------------------------------------------------------------------------
Update Information:
Update to version 22.22.2
--------------------------------------------------------------------------------
ChangeLog:
* Wed Apr 8 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.2-3
- Rework of update of nghttp2
* Wed Apr 8 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.2-2
- Update bundled nghttp2 to 1.68.1
* Wed Apr 8 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.2-1
- Update to version 22.22.2 (rhbz#2444849)
* Wed Apr 8 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.1-1
- Update to version 22.22.1 (rhbz#2444849)
* Wed Apr 8 2026 tjuhasz [tjuhasz@redhat.com] - 1:22.22.0-9
- Remove disablement of LTO from specfile
* Wed Apr 8 2026 Andrei Radchenko [aradchen@redhat.com] - 1:22.22.0-8
- spec: remove obsolete requires
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2447160 - CVE-2026-1528 nodejs22: undici: Denial of Service via crafted WebSocket frame with large length [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447160
[ 2 ] Bug #2447163 - CVE-2026-2229 nodejs22: Undici: Denial of Service via invalid WebSocket permessage-deflate extension parameter [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447163
[ 3 ] Bug #2447170 - CVE-2026-1525 nodejs22: Undici: HTTP Request Smuggling and Denial of Service due to duplicate Content-Length headers [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447170
[ 4 ] Bug #2447175 - CVE-2026-1527 nodejs22: Undici: HTTP header injection and request smuggling vulnerability [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447175
[ 5 ] Bug #2447181 - CVE-2026-1526 nodejs22: undici: Denial of Service via unbounded memory consumption during WebSocket permessage-deflate decompression [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2447181
[ 6 ] Bug #2453565 - CVE-2026-21717 nodejs22: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453565
[ 7 ] Bug #2453568 - CVE-2026-21714 nodejs22: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453568
[ 8 ] Bug #2453572 - CVE-2026-21713 nodejs22: Node.js: Information disclosure via timing oracle in HMAC verification [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453572
[ 9 ] Bug #2453595 - CVE-2026-21716 nodejs22: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix. [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453595
[ 10 ] Bug #2453598 - CVE-2026-21715 nodejs22: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453598
[ 11 ] Bug #2453600 - CVE-2026-21710 nodejs22: Node.js: Denial of Service due to crafted HTTP `__proto__` header [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2453600
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-3b76d8047d' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
[SECURITY] Fedora 44 Update: SDL3_image-3.4.4-1.fc44
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-992a75bea6
2026-05-08 19:27:40.960935+00:00
--------------------------------------------------------------------------------
Name : SDL3_image
Product : Fedora 44
Version : 3.4.4
Release : 1.fc44
URL : https://github.com/libsdl-org/SDL_image
Summary : Image loading library for SDL
Description :
Simple DirectMedia Layer (SDL) is a cross-platform multimedia library designed
to provide fast access to the graphics frame buffer and audio device.
This is a simple library to load images of various formats as SDL surfaces.
It can load BMP, GIF, JPEG, LBM, PCX, PNG, PNM (PPM/PGM/PBM), QOI, TGA, XCF,
XPM, and simple SVG format images. It can also load AVIF, JPEG-XL, TIFF, and
WebP images.
--------------------------------------------------------------------------------
Update Information:
Update to 3.4.4.
--------------------------------------------------------------------------------
ChangeLog:
* Sat May 2 2026 Simone Caronni [negativo17@gmail.com] - 3.4.4-1
- Update to 3.4.4
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2455135 - SDL3_image-3.4.4 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2455135
[ 2 ] Bug #2455890 - CVE-2026-35444 SDL3_image: SDL_image: Information disclosure via crafted XCF files [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2455890
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-992a75bea6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new