--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2026-6388b28850
2026-02-11 00:58:02.841951+00:00
--------------------------------------------------------------------------------

Name        : rust-scx_rusty
Product     : Fedora 42
Version     : 0.5.4
Release     : 7.fc42
URL         : https://crates.io/crates/scx_rusty
Summary     : A multi-domain, BPF / user space hybrid scheduler
Description :
A multi-domain, BPF / user space hybrid scheduler used within sched_ext,
which is a Linux kernel feature which enables implementing kernel thread
schedulers in BPF and dynamically loading them.
https://github.com/sched-ext/scx/tree/main

--------------------------------------------------------------------------------
Update Information:

Update the time crate to version 0.3.47.
Update the time-macros crate to version 0.2.27.
Update the time-core crate to version 0.1.8.
Update the num-conv crate to version 0.2.0.
Update the git2 crate to version 0.20.4.
Update the bytes crate to version 1.11.1.
Additionally, this update contains rebuilds of applications affected by security
advisories:
bytes: RUSTSEC-2026-0007
git2: RUSTSEC-2026-0008
jsonwebtoken: CVE-2026-25537
time: RUSTSEC-2026-0009
All applications that statically link libgit2 via the git2 Rust bindings were
also rebuilt against the latest version of the git2 / libgit2-sys crates to pull
in fixes included in libgit2 between v1.8.1 and v1.9.2.
--------------------------------------------------------------------------------
ChangeLog:

* Sat Feb  7 2026 Fabio Valentini <[email protected]> - 0.5.4-7
- Rebuild for RUSTSEC-2026-{0007,0008,0009} and CVE-2026-25537
* Sat Jan 17 2026 Fedora Release Engineering <[email protected]> - 
0.5.4-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
* Fri Jul 25 2025 Fedora Release Engineering <[email protected]> - 
0.5.4-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2437465 - CVE-2026-25537 rust-jsonwebtoken: jsonwebtoken has Type 
Confusion that leads to potential authorization bypass [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2437465
  [ 2 ] Bug #2437467 - CVE-2026-25537 uv: jsonwebtoken has Type Confusion that 
leads to potential authorization bypass [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2437467
  [ 3 ] Bug #2438046 - CVE-2026-25727 atuin: time affected by a stack 
exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438046
  [ 4 ] Bug #2438075 - CVE-2026-25727 keylime-agent-rust: time affected by a 
stack exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438075
  [ 5 ] Bug #2438077 - CVE-2026-25727 maturin: time affected by a stack 
exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438077
  [ 6 ] Bug #2438086 - CVE-2026-25727 rustup: time affected by a stack 
exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438086
  [ 7 ] Bug #2438091 - CVE-2026-25727 tbtools: time affected by a stack 
exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438091
  [ 8 ] Bug #2438097 - CVE-2026-25727 tuigreet: time affected by a stack 
exhaustion denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438097
  [ 9 ] Bug #2438098 - CVE-2026-25727 uv: time affected by a stack exhaustion 
denial of service attack [fedora-42]
        https://bugzilla.redhat.com/show_bug.cgi?id=2438098
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2026-6388b28850' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://forge.fedoraproject.org/infra/tickets/issues/new

Reply via email to