Fedora Security Advisories

openbao-2.5.2-1.fc43

6 hours 13 minutes ago
FEDORA-2026-a9c2a486a6 Packages in this update:
  • openbao-2.5.2-1.fc43
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.el10_1

6 hours 13 minutes ago
FEDORA-EPEL-2026-0649f3a8b7 Packages in this update:
  • openbao-2.5.2-1.el10_1
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.fc42

6 hours 13 minutes ago
FEDORA-2026-fba501f889 Packages in this update:
  • openbao-2.5.2-1.fc42
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.el9

6 hours 13 minutes ago
FEDORA-EPEL-2026-edf72f1c4c Packages in this update:
  • openbao-2.5.2-1.el9
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.el10_3

6 hours 13 minutes ago
FEDORA-EPEL-2026-3ca530e604 Packages in this update:
  • openbao-2.5.2-1.el10_3
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.el10_2

6 hours 13 minutes ago
FEDORA-EPEL-2026-573863831f Packages in this update:
  • openbao-2.5.2-1.el10_2
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.fc44

6 hours 13 minutes ago
FEDORA-2026-bb074cb239 Packages in this update:
  • openbao-2.5.2-1.fc44
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

openbao-2.5.2-1.el8

6 hours 13 minutes ago
FEDORA-EPEL-2026-69cfe25adc Packages in this update:
  • openbao-2.5.2-1.el8
Update description:

Update to upstream 2.5.2, including fixes for CVE-2026-33757 and CVE-2026-33758

bind9-next-9.21.20-1.fc44

7 hours 48 minutes ago
FEDORA-2026-01c20fe8ca Packages in this update:
  • bind9-next-9.21.20-1.fc44
Update description: Update to 9.21.20 (rhbz#2440560) Security Fixes:
  • Fix unbounded NSEC3 iterations when validating referrals to unsigned delegations. (CVE-2026-1519)
  • Fix memory leaks in code preparing DNSSEC proofs of non-existence. (CVE-2026-3104)
  • Prevent a crash in code processing queries containing a TKEY record. (CVE-2026-3119)
  • Fix a stack use-after-return flaw in SIG(0) handling code. (CVE-2026-3591)
New Features:
  • Provide response round-trip time (RTT) counters via statistics channel.
  • Introduce max-delegation-servers configuration option.
Bug Fixes:
  • Fix parsing key inactivation time in KASP code.
  • Fix the handling of key statements defined inside views.
Update to 9.21.19 Security Fixes:
  • Fix a use-after-free error in dns_client_resolve() triggered by a DNAME response.
  • Fix a NULL pointer dereference in qp-trie cache code.
  • Immediately remove purged ADB names and entries from the SIEVE list.
Feature Changes:
  • Record query time for all dnstap responses.
  • Optimize TCP source port selection on Linux.

and multiple bug fixes.

Update to 9.21.18 Feature Changes:
  • Enable minimal ANY answers by default.
  • Lowercase the NSEC Next Domain Name field.
  • Update requirements for system test suite.
Bug Fixes:
  • Make catalog zone names and member zones' entry names case-insensitive. [GL #5693]
  • Fix implementation of BRID and HHIT record types. [GL #5710]
  • Fix implementation of DSYNC record type. [GL #5711]
  • Fix response policy and catalog zones to work with $INCLUDE directive.

Source: https://downloads.isc.org/isc/bind9/9.21.20/doc/arm/html/notes.html#notes-for-bind-9-21-20

bind9-next-9.21.20-1.fc43

8 hours 1 minute ago
FEDORA-2026-a6efefa854 Packages in this update:
  • bind9-next-9.21.20-1.fc43
Update description: Update to 9.21.20 (rhbz#2440560) Security Fixes:
  • Fix unbounded NSEC3 iterations when validating referrals to unsigned delegations. (CVE-2026-1519)
  • Fix memory leaks in code preparing DNSSEC proofs of non-existence. (CVE-2026-3104)
  • Prevent a crash in code processing queries containing a TKEY record. (CVE-2026-3119)
  • Fix a stack use-after-return flaw in SIG(0) handling code. (CVE-2026-3591)
New Features:
  • Provide response round-trip time (RTT) counters via statistics channel.
  • Introduce max-delegation-servers configuration option.
Bug Fixes:
  • Fix parsing key inactivation time in KASP code.
  • Fix the handling of key statements defined inside views.
Update to 9.21.19 Security Fixes:
  • Fix a use-after-free error in dns_client_resolve() triggered by a DNAME response.
  • Fix a NULL pointer dereference in qp-trie cache code.
  • Immediately remove purged ADB names and entries from the SIEVE list.
Feature Changes:
  • Record query time for all dnstap responses.
  • Optimize TCP source port selection on Linux.

and multiple bug fixes.

Update to 9.21.18 Feature Changes:
  • Enable minimal ANY answers by default.
  • Lowercase the NSEC Next Domain Name field.
  • Update requirements for system test suite.
Bug Fixes:
  • Make catalog zone names and member zones' entry names case-insensitive. [GL #5693]
  • Fix implementation of BRID and HHIT record types. [GL #5710]
  • Fix implementation of DSYNC record type. [GL #5711]
  • Fix response policy and catalog zones to work with $INCLUDE directive.

Source: https://downloads.isc.org/isc/bind9/9.21.20/doc/arm/html/notes.html#notes-for-bind-9-21-20

bind9-next-9.21.20-1.fc42

8 hours 1 minute ago
FEDORA-2026-bcc66a29da Packages in this update:
  • bind9-next-9.21.20-1.fc42
Update description: Update to 9.21.20 (rhbz#2440560) Security Fixes:
  • Fix unbounded NSEC3 iterations when validating referrals to unsigned delegations. (CVE-2026-1519)
  • Fix memory leaks in code preparing DNSSEC proofs of non-existence. (CVE-2026-3104)
  • Prevent a crash in code processing queries containing a TKEY record. (CVE-2026-3119)
  • Fix a stack use-after-return flaw in SIG(0) handling code. (CVE-2026-3591)
New Features:
  • Provide response round-trip time (RTT) counters via statistics channel.
  • Introduce max-delegation-servers configuration option.
Bug Fixes:
  • Fix parsing key inactivation time in KASP code.
  • Fix the handling of key statements defined inside views.
Update to 9.21.19 Security Fixes:
  • Fix a use-after-free error in dns_client_resolve() triggered by a DNAME response.
  • Fix a NULL pointer dereference in qp-trie cache code.
  • Immediately remove purged ADB names and entries from the SIEVE list.
Feature Changes:
  • Record query time for all dnstap responses.
  • Optimize TCP source port selection on Linux.

and multiple bug fixes.

Update to 9.21.18 Feature Changes:
  • Enable minimal ANY answers by default.
  • Lowercase the NSEC Next Domain Name field.
  • Update requirements for system test suite.
Bug Fixes:
  • Make catalog zone names and member zones' entry names case-insensitive. [GL #5693]
  • Fix implementation of BRID and HHIT record types. [GL #5710]
  • Fix implementation of DSYNC record type. [GL #5711]
  • Fix response policy and catalog zones to work with $INCLUDE directive.

Source: https://downloads.isc.org/isc/bind9/9.21.20/doc/arm/html/notes.html#notes-for-bind-9-21-20

nginx-1.28.3-1.fc44 nginx-mod-brotli-1.0.0~rc-7.fc44 nginx-mod-fancyindex-0.6.0-2.fc44 nginx-mod-headers-more-0.39-7.fc44 nginx-mod-modsecurity-1.0.4-8.fc44 nginx-mod-naxsi-1.6-15.fc44 nginx-mod-vts-0.2.4-7.fc44

8 hours 26 minutes ago
FEDORA-2026-4de4d247a0 Packages in this update:
  • nginx-1.28.3-1.fc44
  • nginx-mod-brotli-1.0.0~rc-7.fc44
  • nginx-mod-fancyindex-0.6.0-2.fc44
  • nginx-mod-headers-more-0.39-7.fc44
  • nginx-mod-modsecurity-1.0.4-8.fc44
  • nginx-mod-naxsi-1.6-15.fc44
  • nginx-mod-vts-0.2.4-7.fc44
Update description:

nginx-mod-brotli:

  • Rebuild for 1.28.3

nginx-mod-fancyindex:

  • Rebuild for 1.28.3

nginx-mod-naxsi:

  • Rebuild for 1.28.3

nginx-mod-headers-more:

  • Rebuild for 1.28.3

nginx-mod-vts:

  • Rebuild for 1.28.3

nginx-mod-modsecurity:

  • Rebuild for 1.28.3

nginx:

  • Update to 1.28.3
  • fixes CVE-2026-27654, CVE-2026-27784, CVE-2026-32647, CVE-2026-27651, CVE-2026-28753, CVE-2026-28755

libarchive-3.8.6-1.fc44

17 hours 9 minutes ago
FEDORA-2026-b42b8b1c00 Packages in this update:
  • libarchive-3.8.6-1.fc44
Update description:

CVE-2026-4111 libarchive: Infinite Loop Denial of Service in RAR5 Decompression via archive_read_data() in libarchive

chromium-146.0.7680.164-1.el10_3

17 hours 50 minutes ago
FEDORA-EPEL-2026-de2c69d4e4 Packages in this update:
  • chromium-146.0.7680.164-1.el10_3
Update description:

Update to 146.0.7680.164

* High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676: Use after free in Dawn * High CVE-2026-4677: Out of bounds read in WebAudio * High CVE-2026-4678: Use after free in WebGPU * High CVE-2026-4679: Integer overflow in Fonts * High CVE-2026-4680: Use after free in FedCM

chromium-146.0.7680.164-1.el10_1

17 hours 50 minutes ago
FEDORA-EPEL-2026-034dddc133 Packages in this update:
  • chromium-146.0.7680.164-1.el10_1
Update description:

Update to 146.0.7680.164

* High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676: Use after free in Dawn * High CVE-2026-4677: Out of bounds read in WebAudio * High CVE-2026-4678: Use after free in WebGPU * High CVE-2026-4679: Integer overflow in Fonts * High CVE-2026-4680: Use after free in FedCM

Update to 146.0.7680.153

* CVE-2026-4439: Out of bounds memory access in WebGL * CVE-2026-4440: Out of bounds read and write in WebGL * CVE-2026-4441: Use after free in Base * CVE-2026-4442: Heap buffer overflow in CSS * CVE-2026-4443: Heap buffer overflow in WebAudio * CVE-2026-4444: Stack buffer overflow in WebRTC * CVE-2026-4445: Use after free in WebRTC * CVE-2026-4446: Use after free in WebRTC * CVE-2026-4447: Inappropriate implementation in V8 * CVE-2026-4448: Heap buffer overflow in ANGLE * CVE-2026-4449: Use after free in Blink * CVE-2026-4450: Out of bounds write in V8 * CVE-2026-4451: Insufficient validation of untrusted input in Navigation * CVE-2026-4452: Integer overflow in ANGLE * CVE-2026-4453: Integer overflow in Dawn * CVE-2026-4454: Use after free in Network * CVE-2026-4455: Heap buffer overflow in PDFium * CVE-2026-4456: Use after free in Digital Credentials API * CVE-2026-4457: Type Confusion in V8 * CVE-2026-4458: Use after free in Extensions * CVE-2026-4459: Out of bounds read and write in WebAudio * CVE-2026-4460: Out of bounds read in Skia * CVE-2026-4461: Inappropriate implementation in V8 * CVE-2026-4462: Out of bounds read in Blink * CVE-2026-4463: Heap buffer overflow in WebRTC * CVE-2026-4464: Integer overflow in ANGLE

chromium-146.0.7680.164-1.el10_2

17 hours 50 minutes ago
FEDORA-EPEL-2026-1abb979baa Packages in this update:
  • chromium-146.0.7680.164-1.el10_2
Update description:

Update to 146.0.7680.164

* High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676: Use after free in Dawn * High CVE-2026-4677: Out of bounds read in WebAudio * High CVE-2026-4678: Use after free in WebGPU * High CVE-2026-4679: Integer overflow in Fonts * High CVE-2026-4680: Use after free in FedCM

chromium-146.0.7680.164-1.el9

17 hours 50 minutes ago
FEDORA-EPEL-2026-d3092556ab Packages in this update:
  • chromium-146.0.7680.164-1.el9
Update description:

Update to 146.0.7680.164

* High CVE-2026-4673: Heap buffer overflow in WebAudio * High CVE-2026-4674: Out of bounds read in CSS * High CVE-2026-4675: Heap buffer overflow in WebGL * High CVE-2026-4676: Use after free in Dawn * High CVE-2026-4677: Out of bounds read in WebAudio * High CVE-2026-4678: Use after free in WebGPU * High CVE-2026-4679: Integer overflow in Fonts * High CVE-2026-4680: Use after free in FedCM

Update to 146.0.7680.153

* CVE-2026-4439: Out of bounds memory access in WebGL * CVE-2026-4440: Out of bounds read and write in WebGL * CVE-2026-4441: Use after free in Base * CVE-2026-4442: Heap buffer overflow in CSS * CVE-2026-4443: Heap buffer overflow in WebAudio * CVE-2026-4444: Stack buffer overflow in WebRTC * CVE-2026-4445: Use after free in WebRTC * CVE-2026-4446: Use after free in WebRTC * CVE-2026-4447: Inappropriate implementation in V8 * CVE-2026-4448: Heap buffer overflow in ANGLE * CVE-2026-4449: Use after free in Blink * CVE-2026-4450: Out of bounds write in V8 * CVE-2026-4451: Insufficient validation of untrusted input in Navigation * CVE-2026-4452: Integer overflow in ANGLE * CVE-2026-4453: Integer overflow in Dawn * CVE-2026-4454: Use after free in Network * CVE-2026-4455: Heap buffer overflow in PDFium * CVE-2026-4456: Use after free in Digital Credentials API * CVE-2026-4457: Type Confusion in V8 * CVE-2026-4458: Use after free in Extensions * CVE-2026-4459: Out of bounds read and write in WebAudio * CVE-2026-4460: Out of bounds read in Skia * CVE-2026-4461: Inappropriate implementation in V8 * CVE-2026-4462: Out of bounds read in Blink * CVE-2026-4463: Heap buffer overflow in WebRTC * CVE-2026-4464: Integer overflow in ANGLE
Checked
28 minutes 42 seconds ago