https://bugzilla.redhat.com/show_bug.cgi?id=2428090
Bug ID: 2428090
Summary: python-zstd-1.5.7.3 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-zstd
Keywords: FutureFeature, Triaged
Assignee: ngompa13(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: daltonminer(a)gmail.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jonathan(a)almalinux.org, michel(a)michel-slm.name,
ngompa13(a)gmail.com,
python-packagers-sig(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Releases retrieved: 1.5.7.3
Upstream release that is considered latest: 1.5.7.3
Current version/release in rawhide: 1.5.7.2-3.fc44
URL: https://pypi.org/project/zstd/1.4.4.0
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/38517/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-zstd
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2428090
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2418489
Bug ID: 2418489
Summary: CVE-2025-65896 python-asyncmy: Asyncmy SQL injection
[fedora-43]
Product: Fedora
Version: 43
Status: NEW
Whiteboard: {"flaws": ["15c909b6-40cb-48a6-8eef-a770c657891e"]}
Component: python-asyncmy
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: nphilipp(a)redhat.com
Reporter: jmoroney(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
nphilipp(a)redhat.com,
python-packagers-sig(a)lists.fedoraproject.org
Blocks: 2418446
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2418489
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2418486
Bug ID: 2418486
Summary: CVE-2025-65896 python-asyncmy: Asyncmy SQL injection
[epel-10]
Product: Fedora EPEL
Version: epel10
Status: NEW
Whiteboard: {"flaws": ["15c909b6-40cb-48a6-8eef-a770c657891e"]}
Component: python-asyncmy
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: nphilipp(a)redhat.com
Reporter: jmoroney(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
nphilipp(a)redhat.com,
python-packagers-sig(a)lists.fedoraproject.org
Blocks: 2418446
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2418486
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2418488
Bug ID: 2418488
Summary: CVE-2025-65896 python-asyncmy: Asyncmy SQL injection
[fedora-42]
Product: Fedora
Version: 42
Status: NEW
Whiteboard: {"flaws": ["15c909b6-40cb-48a6-8eef-a770c657891e"]}
Component: python-asyncmy
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: nphilipp(a)redhat.com
Reporter: jmoroney(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
nphilipp(a)redhat.com,
python-packagers-sig(a)lists.fedoraproject.org
Blocks: 2418446
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2418488
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2418487
Bug ID: 2418487
Summary: CVE-2025-65896 python-asyncmy: Asyncmy SQL injection
[epel-9]
Product: Fedora EPEL
Version: epel9
Status: NEW
Whiteboard: {"flaws": ["15c909b6-40cb-48a6-8eef-a770c657891e"]}
Component: python-asyncmy
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: nphilipp(a)redhat.com
Reporter: jmoroney(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
nphilipp(a)redhat.com,
python-packagers-sig(a)lists.fedoraproject.org
Blocks: 2418446
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
The following link provides references to all essential vulnerability
management information. If something is wrong or missing, please contact a
member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essent…
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2418487
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2442231
Bug ID: 2442231
Summary: CVE-2026-21863 valkey: Valkey: Denial of Service via
invalid clusterbus packet [fedora-all]
Product: Fedora
Version: rawhide
Status: NEW
Whiteboard: {"flaws": ["f65b99c4-7238-4f51-8f7a-2842dbce400b"]}
Component: valkey
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jonathan(a)almalinux.org
Reporter: trathi(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, jonathan(a)almalinux.org,
nathans(a)redhat.com, ngompa13(a)gmail.com
Blocks: 2442026
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2442231
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2442222
Bug ID: 2442222
Summary: CVE-2026-27623 valkey: Valkey: Denial of Service via
specially crafted network requests [fedora-all]
Product: Fedora
Version: rawhide
Status: NEW
Whiteboard: {"flaws": ["b6977e4b-ee23-48da-a135-1fcd9f2b45dc"]}
Component: valkey
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jonathan(a)almalinux.org
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, jonathan(a)almalinux.org,
nathans(a)redhat.com, ngompa13(a)gmail.com
Blocks: 2442021 (CVE-2026-27623)
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2442021
[Bug 2442021] CVE-2026-27623 Valkey: Valkey: Denial of Service via specially
crafted network requests
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2442222
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2442220
Bug ID: 2442220
Summary: CVE-2025-67733 valkey: Valkey: Data tampering and
denial of service via improper null character handling
in Lua scripts [fedora-all]
Product: Fedora
Version: rawhide
Status: NEW
Whiteboard: {"flaws": ["2e045ad3-767c-4039-9407-c3ff7b617262"]}
Component: valkey
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jonathan(a)almalinux.org
Reporter: saroy(a)redhat.com
CC: epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, jonathan(a)almalinux.org,
nathans(a)redhat.com, ngompa13(a)gmail.com
Blocks: 2442025 (CVE-2025-67733)
Target Milestone: ---
Classification: Fedora
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2442025
[Bug 2442025] CVE-2025-67733 Valkey: Valkey: Data tampering and denial of
service via improper null character handling in Lua scripts
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2442220
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…