Fedora Security Advisories

perl-HTTP-Tiny-0.094-1.fc43

2 hours 51 minutes ago
FEDORA-2026-3bfb774625 Packages in this update:
  • perl-HTTP-Tiny-0.094-1.fc43
Update description:

0.094 - fix to prevent invalid characters in all headers, and prevent header smuggling (CVE-2026-7010)

cockpit-362-1.fc44

5 hours 16 minutes ago
FEDORA-2026-ac9d9c87c8 Packages in this update:
  • cockpit-362-1.fc44
Update description:

Automatic update for cockpit-362-1.fc44.

Changelog for cockpit * Wed May 20 2026 Packit <hello@packit.dev> - 362-1 - Bug fixes and translation updates - Fix arbitrary code execution via specially crafted logs page link (CVE-2026-4802)

cockpit-362-1.fc43

5 hours 18 minutes ago
FEDORA-2026-58cee40a55 Packages in this update:
  • cockpit-362-1.fc43
Update description:

Automatic update for cockpit-362-1.fc43.

Changelog for cockpit * Wed May 20 2026 Packit <hello@packit.dev> - 362-1 - Bug fixes and translation updates - Fix arbitrary code execution via specially crafted logs page link (CVE-2026-4802)

unbound-1.25.1-1.fc44

6 hours 15 minutes ago
FEDORA-2026-49f37e16aa Packages in this update:
  • unbound-1.25.1-1.fc44
Update description: Update to 1.25.1 (rhbz#2480119)
  • Fix CVE-2026-33278, Possible remote code execution during DNSSEC validation. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42944, Heap overflow and crash with multiple nsid, cookie, padding EDNS options. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42959, Crash during DNSSEC validation of malicious content. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-32792, Packet of death with DNSCrypt. Thanks to Andrew Griffiths from 'calif.io' for the report.
  • Fix CVE-2026-40622, "Ghost domain name" variant. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-41292, Parsing a long list of incoming EDNS options degrades performance. Thanks to GitHub user 'N0zoM1z0', also Qifan Zhang from Palo Alto Networks, for the report.
  • Fix CVE-2026-42534, Jostle logic bypass degrades resolution performance. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42923, Degradation of service with unbounded NSEC3 hash calculations. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42960, Possible cache poisoning attack while following delegation. Thanks to TaoFei Guo from Peking University, Yang Luo and JianJun Chen, Tsinghua University, for the report.
  • Fix CVE-2026-44390, Unbounded name compression in certain cases causes degradation of service. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-44608, Use after free and crash in RPZ code. Thanks to Qifan Zhang, Palo Alto Networks, for the report.

Swapped sources signature source number with systemd unit to have them close.

Update to 1.25.0 (rhbz#2463781) Feature changes:
  • Improved TTL 0 handling
  • Reload also certificates on reload if they have changed
  • Allow control-interface specification also of port.
  • Added new tls-protocols option. Can disable TLS 1.2 explicitly.

And bug fixes.

Remove merged patches.

Source: https://nlnetlabs.nl/projects/unbound/download/#unbound-1-25-0

unbound-1.25.1-1.fc43

6 hours 15 minutes ago
FEDORA-2026-3223ded15e Packages in this update:
  • unbound-1.25.1-1.fc43
Update description: Update to 1.25.1 (rhbz#2480119)
  • Fix CVE-2026-33278, Possible remote code execution during DNSSEC validation. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42944, Heap overflow and crash with multiple nsid, cookie, padding EDNS options. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42959, Crash during DNSSEC validation of malicious content. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-32792, Packet of death with DNSCrypt. Thanks to Andrew Griffiths from 'calif.io' for the report.
  • Fix CVE-2026-40622, "Ghost domain name" variant. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-41292, Parsing a long list of incoming EDNS options degrades performance. Thanks to GitHub user 'N0zoM1z0', also Qifan Zhang from Palo Alto Networks, for the report.
  • Fix CVE-2026-42534, Jostle logic bypass degrades resolution performance. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42923, Degradation of service with unbounded NSEC3 hash calculations. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-42960, Possible cache poisoning attack while following delegation. Thanks to TaoFei Guo from Peking University, Yang Luo and JianJun Chen, Tsinghua University, for the report.
  • Fix CVE-2026-44390, Unbounded name compression in certain cases causes degradation of service. Thanks to Qifan Zhang, Palo Alto Networks, for the report.
  • Fix CVE-2026-44608, Use after free and crash in RPZ code. Thanks to Qifan Zhang, Palo Alto Networks, for the report.

Swapped sources signature source number with systemd unit to have them close.

perl-HTTP-Tiny-0.094-1.fc44

10 hours 53 minutes ago
FEDORA-2026-703a749924 Packages in this update:
  • perl-HTTP-Tiny-0.094-1.fc44
Update description:

0.094 - fix to prevent invalid characters in all headers, and prevent header smuggling (CVE-2026-7010)

haveged-1.9.21-1.fc43

18 hours 21 minutes ago
FEDORA-2026-43e2722e8f Packages in this update:
  • haveged-1.9.21-1.fc43
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.21-1.fc44

18 hours 23 minutes ago
FEDORA-2026-12643837bd Packages in this update:
  • haveged-1.9.21-1.fc44
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.21-1.fc42

18 hours 24 minutes ago
FEDORA-2026-7fcffd5c31 Packages in this update:
  • haveged-1.9.21-1.fc42
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.21-1.el10_2

18 hours 25 minutes ago
FEDORA-EPEL-2026-ca77194ac0 Packages in this update:
  • haveged-1.9.21-1.el10_2
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.21-1.el10_3

18 hours 27 minutes ago
FEDORA-EPEL-2026-b3a94630f0 Packages in this update:
  • haveged-1.9.21-1.el10_3
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.21-1.el9

18 hours 27 minutes ago
FEDORA-EPEL-2026-efe6be3dfa Packages in this update:
  • haveged-1.9.21-1.el9
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

haveged-1.9.14-2.el8

18 hours 29 minutes ago
FEDORA-EPEL-2026-56fb074420 Packages in this update:
  • haveged-1.9.14-2.el8
Update description:

Backport fix for CVE-2026-41054: privilege escalation via command socket

kernel-7.0.9-104.fc43

19 hours 26 minutes ago
FEDORA-2026-3f85a4eba7 Packages in this update:
  • kernel-7.0.9-104.fc43
Update description:

The 7.0.9-104/204 kernels contain a fix for a SKBFL_SHARED_FRAG page-cache corruption vulnerability as well as some mitigations for PinTheft

kernel-7.0.9-204.fc44

19 hours 26 minutes ago
FEDORA-2026-57965ac9f7 Packages in this update:
  • kernel-7.0.9-204.fc44
Update description:

The 7.0.9-104/204 kernels contain a fix for a SKBFL_SHARED_FRAG page-cache corruption vulnerability as well as some mitigations for PinTheft

Checked
22 minutes 7 seconds ago