Fedora Security Advisories

chromium-143.0.7499.192-1.fc44

4 hours 27 minutes ago
FEDORA-2026-5551bc920f Packages in this update:
  • chromium-143.0.7499.192-1.fc44
Update description:

Automatic update for chromium-143.0.7499.192-1.fc44.

Changelog * Wed Jan 7 2026 Than Ngo <than@redhat.com> - 143.0.7499.192-1 - Update tp 143.0.7499.192 * High CVE-2026-0628: Insufficient policy enforcement in WebView tag - Fix rhbz#2425338, Enable control flow integrity support for x86_64/aarch64 - Enable build for epel10.1

chromium-143.0.7499.192-1.el10_1

12 hours 43 minutes ago
FEDORA-EPEL-2026-2f73131e02 Packages in this update:
  • chromium-143.0.7499.192-1.el10_1
Update description:

Update to 143.0.7499.192

* High CVE-2026-0628: Insufficient policy enforcement in WebView tag * Enable control flow integrity support for x86_64/aarch64 * Enable build for epel10.1

chromium-143.0.7499.192-1.fc42

12 hours 43 minutes ago
FEDORA-2026-540f5a89d1 Packages in this update:
  • chromium-143.0.7499.192-1.fc42
Update description:

Update to 143.0.7499.192

* High CVE-2026-0628: Insufficient policy enforcement in WebView tag * Enable control flow integrity support for x86_64/aarch64 * Enable build for epel10.1

chromium-143.0.7499.192-1.el10_2

12 hours 43 minutes ago
FEDORA-EPEL-2026-7101d35773 Packages in this update:
  • chromium-143.0.7499.192-1.el10_2
Update description:

Update to 143.0.7499.192

* High CVE-2026-0628: Insufficient policy enforcement in WebView tag * Enable control flow integrity support for x86_64/aarch64 * Enable build for epel10.1

chromium-143.0.7499.192-1.el9

12 hours 43 minutes ago
FEDORA-EPEL-2026-1e6d3d4287 Packages in this update:
  • chromium-143.0.7499.192-1.el9
Update description:

Update to 143.0.7499.192

* High CVE-2026-0628: Insufficient policy enforcement in WebView tag * Enable control flow integrity support for x86_64/aarch64 * Enable build for epel10.1

chromium-143.0.7499.192-1.fc43

12 hours 43 minutes ago
FEDORA-2026-66162d01ae Packages in this update:
  • chromium-143.0.7499.192-1.fc43
Update description:

Update to 143.0.7499.192

* High CVE-2026-0628: Insufficient policy enforcement in WebView tag * Enable control flow integrity support for x86_64/aarch64 * Enable build for epel10.1

python-urllib3-2.6.3-1.fc43

20 hours 48 minutes ago
FEDORA-2026-724d1b1044 Packages in this update:
  • python-urllib3-2.6.3-1.fc43
Update description: 2.6.3 (2026-01-07)
  • Fixed a high-severity security issue where decompression-bomb safeguards of the streaming API were bypassed when HTTP redirects were followed. GHSA-38jv-5279-wg99, CVE-2026-21441
  • Started treating Retry-After times greater than 6 hours as 6 hours by default.

python3.12-3.12.12-2.fc43

1 day 2 hours ago
FEDORA-2026-2c35952b90 Packages in this update:
  • python3.12-3.12.12-2.fc43
Update description:
  • Security fix for CVE-2025-12084
  • Require at least the same expat version as used during the build time

python3.12-3.12.12-2.fc42

1 day 2 hours ago
FEDORA-2026-8e0e785a72 Packages in this update:
  • python3.12-3.12.12-2.fc42
Update description:
  • Security fix for CVE-2025-12084
  • Require at least the same expat version as used during the build time

foomuuri-0.31-1.el10_1

1 day 8 hours ago
FEDORA-EPEL-2026-aff50f711b Packages in this update:
  • foomuuri-0.31-1.el10_1
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.el10_2

1 day 8 hours ago
FEDORA-EPEL-2026-b90feb26b8 Packages in this update:
  • foomuuri-0.31-1.el10_2
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.fc43

1 day 8 hours ago
FEDORA-2026-429edf2dcf Packages in this update:
  • foomuuri-0.31-1.fc43
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.el9

1 day 8 hours ago
FEDORA-EPEL-2026-8919df6bce Packages in this update:
  • foomuuri-0.31-1.el9
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

foomuuri-0.31-1.fc42

1 day 8 hours ago
FEDORA-2026-63f333201f Packages in this update:
  • foomuuri-0.31-1.fc42
Update description:

Upstream update to v0.31 with fixes to CVE-2025-67603 and CVE-2025-67858.

  • CVE-2025-67603: Add PolicyKit authorization to D-Bus methods.
  • CVE-2025-67858: Verify interface input parameter on D-Bus methods.
  • Security hardening:
  • Add ProtectSystem=full to all systemd service files. This changes /etc to read-only for all Foomuuri processes. Make sure you don't write any state files there in your startup hook or Foomuuri Monitor event hook.
  • Change umask to 022 when using --fork to fork as a background daemon process.
  • More strict IP address verify for iplist entries.

libsodium-1.0.18-9.el9

1 day 10 hours ago
FEDORA-EPEL-2026-8ec67a8105 Packages in this update:
  • libsodium-1.0.18-9.el9
Update description:

Fix CVE-2025-69277 libsodium: libsodium: Improper validation of elliptic curve points could lead to data integrity or information disclosure

libsodium-1.0.18-9.el8

1 day 10 hours ago
FEDORA-EPEL-2026-59cdc10842 Packages in this update:
  • libsodium-1.0.18-9.el8
Update description:

Fix CVE-2025-69277 libsodium: libsodium: Improper validation of elliptic curve points could lead to data integrity or information disclosure

libsodium-1.0.21-2.el10_1

1 day 11 hours ago
FEDORA-EPEL-2026-e25dddef14 Packages in this update:
  • libsodium-1.0.21-2.el10_1
Update description:

Version 1.0.21

This point release includes all the changes from 1.0.20-stable, which include a security fix for the crypto_core_ed25519_is_valid_point() function, as well as two new sets of functions:

  • The new crypto_ipcrypt_* functions implement mechanisms for securely encrypting and anonymizing IP addresses as specified in https://ipcrypt-std.github.io
  • The sodium_bin2ip and sodium_ip2bin helper functions have been added to complement the crypto_ipcrypt_* functions and easily convert addresses between bytes and strings.
  • XOF: the crypto_xof_shake* and crypto_xof_turboshake* functions are standard extendable output functions. From input of any length, they can derive output of any length with the same properties as hash functions. These primitives are required by many post-quantum mechanisms, but can also be used for a wide range of applications, including key derivation, session encryption and more.

Version 1.0.20-stable

  • XCFramework: cross-compilation is now forced on Apple Silicon to avoid Rosetta-related build issues
  • The Fil-C compiler is supported out of the box
  • The CompCert compiler is supported out of the box
  • MSVC 2026 (Visual Studio 2026) is now supported
  • Zig builds now support FreeBSD targets
  • Performance of AES256-GCM and AEGIS on ARM has been improved with some compilers
  • Android binaries have been added to the NuGet package
  • Windows ARM binaries have been added to the NuGet package
  • The Android build script has been improved. The base SDK is now 27c, and the default platform is 21, supporting 16 KB page sizes.
  • The library can now be compiled with Zig 0.15 and Zig 0.16
  • Zig builds now generate position-independent static libraries by default on targets that support PIC
  • arm64e builds have been added to the XCFramework packages
  • XCFramework packages are now full builds instead of minimal builds
  • MSVC builds have been enabled for ARM64
  • iOS 32-bit (armv7/armv7s) support has been removed from the XCFramework build script
  • Security: optblockers have been introduced in critical code paths to prevent compilers from introducing unwanted side channels via conditional jumps. This was observed on RISC-V targets with specific compilers and options.
  • Security: crypto_core_ed25519_is_valid_point() now properly rejects small-order points that are not in the main subgroup
  • ((nonnull)) attributes have been relaxed on some crypto_stream* functions to allow NULL output buffers when the output length is zero
  • A cross-compilation issue with old clang versions has been fixed
  • JavaScript: support for Cloudflare Workers has been added
  • JavaScript: WASM_BIGINT is forcibly disabled to retain compatibility with older runtimes
  • A compilation issue with old toolchains on Solaris has been fixed
  • crypto_aead_aes256gcm_is_available is exported to JavaScript
  • libsodium is now compatible with Emscripten 4.x
  • Security: memory fences have been added after MAC verification in AEAD to prevent speculative access to plaintext before authentication is complete
  • Assembly files now include .gnu.property notes for proper IBT and Shadow Stack support when building with CET instrumentation
Checked
30 minutes 5 seconds ago