Fedora Security Advisories

libopenmpt-0.8.6-1.el9

2 hours 34 minutes ago
FEDORA-EPEL-2026-f68290c016 Packages in this update:
  • libopenmpt-0.8.6-1.el9
Update description: libopenmpt 0.8.6 (2026-03-24)
  • [Sec] The security fix in libopenmpt 0.8.5 (r25042) was incomplete, causing a regression when playing short looped (“chip”) samples (r25084).
libopenmpt 0.8.5 (2026-03-22)
  • [Sec] Possible out-of-bounds sample data read in a specific combination of reverse sample playback + offset past sample loop. (r25042).
  • MOD: ProTracker arpeggio wrapraound results in an effective period of 65536 on Paula, not pausing the sample entirely.
  • ULT: Loop points were incorrectly limited for 16-bit samples.
  • zlib: Update to v1.3.2 (2026-02-17).
  • miniz: Update to v3.1.1 (2026-02-03).

libopenmpt-0.8.6-1.el10_2

2 hours 34 minutes ago
FEDORA-EPEL-2026-3e5052fb10 Packages in this update:
  • libopenmpt-0.8.6-1.el10_2
Update description: libopenmpt 0.8.6 (2026-03-24)
  • [Sec] The security fix in libopenmpt 0.8.5 (r25042) was incomplete, causing a regression when playing short looped (“chip”) samples (r25084).
libopenmpt 0.8.5 (2026-03-22)
  • [Sec] Possible out-of-bounds sample data read in a specific combination of reverse sample playback + offset past sample loop. (r25042).
  • MOD: ProTracker arpeggio wrapraound results in an effective period of 65536 on Paula, not pausing the sample entirely.
  • ULT: Loop points were incorrectly limited for 16-bit samples.
  • zlib: Update to v1.3.2 (2026-02-17).
  • miniz: Update to v3.1.1 (2026-02-03).

libopenmpt-0.8.6-1.el10_1

2 hours 34 minutes ago
FEDORA-EPEL-2026-b529a37d50 Packages in this update:
  • libopenmpt-0.8.6-1.el10_1
Update description: libopenmpt 0.8.6 (2026-03-24)
  • [Sec] The security fix in libopenmpt 0.8.5 (r25042) was incomplete, causing a regression when playing short looped (“chip”) samples (r25084).
libopenmpt 0.8.5 (2026-03-22)
  • [Sec] Possible out-of-bounds sample data read in a specific combination of reverse sample playback + offset past sample loop. (r25042).
  • MOD: ProTracker arpeggio wrapraound results in an effective period of 65536 on Paula, not pausing the sample entirely.
  • ULT: Loop points were incorrectly limited for 16-bit samples.
  • zlib: Update to v1.3.2 (2026-02-17).
  • miniz: Update to v3.1.1 (2026-02-03).

libopenmpt-0.8.6-1.el10_3

2 hours 34 minutes ago
FEDORA-EPEL-2026-171a377c45 Packages in this update:
  • libopenmpt-0.8.6-1.el10_3
Update description: libopenmpt 0.8.6 (2026-03-24)
  • [Sec] The security fix in libopenmpt 0.8.5 (r25042) was incomplete, causing a regression when playing short looped (“chip”) samples (r25084).
libopenmpt 0.8.5 (2026-03-22)
  • [Sec] Possible out-of-bounds sample data read in a specific combination of reverse sample playback + offset past sample loop. (r25042).
  • MOD: ProTracker arpeggio wrapraound results in an effective period of 65536 on Paula, not pausing the sample entirely.
  • ULT: Loop points were incorrectly limited for 16-bit samples.
  • zlib: Update to v1.3.2 (2026-02-17).
  • miniz: Update to v3.1.1 (2026-02-03).

libopenmpt-0.8.6-1.el8

2 hours 34 minutes ago
FEDORA-EPEL-2026-4a5d8adc71 Packages in this update:
  • libopenmpt-0.8.6-1.el8
Update description: libopenmpt 0.8.6 (2026-03-24)
  • [Sec] The security fix in libopenmpt 0.8.5 (r25042) was incomplete, causing a regression when playing short looped (“chip”) samples (r25084).
libopenmpt 0.8.5 (2026-03-22)
  • [Sec] Possible out-of-bounds sample data read in a specific combination of reverse sample playback + offset past sample loop. (r25042).
  • MOD: ProTracker arpeggio wrapraound results in an effective period of 65536 on Paula, not pausing the sample entirely.
  • ULT: Loop points were incorrectly limited for 16-bit samples.
  • zlib: Update to v1.3.2 (2026-02-17).
  • miniz: Update to v3.1.1 (2026-02-03).

chromium-146.0.7680.177-1.el10_1

1 day 5 hours ago
FEDORA-EPEL-2026-3dc5de63cc Packages in this update:
  • chromium-146.0.7680.177-1.el10_1
Update description:

Update to 146.0.7680.177

  • High CVE-2026-5273: Use after free in CSS
  • High CVE-2026-5272: Heap buffer overflow in GPU
  • High CVE-2026-5274: Integer overflow in Codecs
  • High CVE-2026-5275: Heap buffer overflow in ANGLE
  • High CVE-2026-5276: Insufficient policy enforcement in WebUSB
  • High CVE-2026-5277: Integer overflow in ANGLE
  • High CVE-2026-5278: Use after free in Web MIDI
  • High CVE-2026-5279: Object corruption in V8
  • High CVE-2026-5280: Use after free in WebCodecs
  • High CVE-2026-5281: Use after free in Dawn
  • High CVE-2026-5282: Out of bounds read in WebCodecs
  • High CVE-2026-5283: Inappropriate implementation in ANGLE
  • High CVE-2026-5284: Use after free in Dawn
  • High CVE-2026-5285: Use after free in WebGL
  • High CVE-2026-5286: Use after free in Dawn
  • High CVE-2026-5287: Use after free in PDF
  • High CVE-2026-5288: Use after free in WebView
  • High CVE-2026-5289: Use after free in Navigation
  • High CVE-2026-5290: Use after free in Compositing
  • Medium CVE-2026-5291: Inappropriate implementation in WebGL
  • Medium CVE-2026-5292: Out of bounds read in WebCodecs

chromium-146.0.7680.177-1.el9

1 day 5 hours ago
FEDORA-EPEL-2026-6a5f534eb8 Packages in this update:
  • chromium-146.0.7680.177-1.el9
Update description:

Update to 146.0.7680.177

  • High CVE-2026-5273: Use after free in CSS
  • High CVE-2026-5272: Heap buffer overflow in GPU
  • High CVE-2026-5274: Integer overflow in Codecs
  • High CVE-2026-5275: Heap buffer overflow in ANGLE
  • High CVE-2026-5276: Insufficient policy enforcement in WebUSB
  • High CVE-2026-5277: Integer overflow in ANGLE
  • High CVE-2026-5278: Use after free in Web MIDI
  • High CVE-2026-5279: Object corruption in V8
  • High CVE-2026-5280: Use after free in WebCodecs
  • High CVE-2026-5281: Use after free in Dawn
  • High CVE-2026-5282: Out of bounds read in WebCodecs
  • High CVE-2026-5283: Inappropriate implementation in ANGLE
  • High CVE-2026-5284: Use after free in Dawn
  • High CVE-2026-5285: Use after free in WebGL
  • High CVE-2026-5286: Use after free in Dawn
  • High CVE-2026-5287: Use after free in PDF
  • High CVE-2026-5288: Use after free in WebView
  • High CVE-2026-5289: Use after free in Navigation
  • High CVE-2026-5290: Use after free in Compositing
  • Medium CVE-2026-5291: Inappropriate implementation in WebGL
  • Medium CVE-2026-5292: Out of bounds read in WebCodecs

chromium-146.0.7680.177-1.fc44

1 day 5 hours ago
FEDORA-2026-450ba465fd Packages in this update:
  • chromium-146.0.7680.177-1.fc44
Update description:

Update to 146.0.7680.177

  • High CVE-2026-5273: Use after free in CSS
  • High CVE-2026-5272: Heap buffer overflow in GPU
  • High CVE-2026-5274: Integer overflow in Codecs
  • High CVE-2026-5275: Heap buffer overflow in ANGLE
  • High CVE-2026-5276: Insufficient policy enforcement in WebUSB
  • High CVE-2026-5277: Integer overflow in ANGLE
  • High CVE-2026-5278: Use after free in Web MIDI
  • High CVE-2026-5279: Object corruption in V8
  • High CVE-2026-5280: Use after free in WebCodecs
  • High CVE-2026-5281: Use after free in Dawn
  • High CVE-2026-5282: Out of bounds read in WebCodecs
  • High CVE-2026-5283: Inappropriate implementation in ANGLE
  • High CVE-2026-5284: Use after free in Dawn
  • High CVE-2026-5285: Use after free in WebGL
  • High CVE-2026-5286: Use after free in Dawn
  • High CVE-2026-5287: Use after free in PDF
  • High CVE-2026-5288: Use after free in WebView
  • High CVE-2026-5289: Use after free in Navigation
  • High CVE-2026-5290: Use after free in Compositing
  • Medium CVE-2026-5291: Inappropriate implementation in WebGL
  • Medium CVE-2026-5292: Out of bounds read in WebCodecs
Checked
38 minutes 46 seconds ago