-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2025-83aa12829d 2025-08-09 03:07:08.046910+00:00 -------------------------------------------------------------------------------- Name : incus Product : Fedora 41 Version : 6.15 Release : 1.fc41 URL : https://linuxcontainers.org/incus Summary : Powerful system container and virtual machine manager Description : Container hypervisor based on LXC Incus offers a REST API to remotely manage containers over the network, using an image based work-flow and with support for live migration. This package contains the Incus daemon. -------------------------------------------------------------------------------- Update Information: New release of Incus. Release information: https://github.com/lxc/incus/releases/tag/v6.15.0 -------------------------------------------------------------------------------- ChangeLog: * Sun Aug 3 2025 Robby Callicotte <rcallicotte@xxxxxxxxxxxxxxxxx> - 6.15-1 - Updated to incus-6.15 * Thu Jul 24 2025 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 6.14-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild * Mon Jun 30 2025 Robby Callicotte <rcallicotte@xxxxxxxxxxxxxxxxx> - 6.14-1 - Updated to incus-6.14 - Added patch for non-constant format strings * Fri May 30 2025 Robby Callicotte <rcallicotte@xxxxxxxxxxxxxxxxx> - 6.13-1 - Updated to incus-6.13 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2369373 - incus-6.15.0 is available https://bugzilla.redhat.com/show_bug.cgi?id=2369373 [ 2 ] Bug #2374808 - CVE-2025-52889 incus: Incus denial of service [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2374808 [ 3 ] Bug #2374809 - CVE-2025-52889 incus: Incus denial of service [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2374809 [ 4 ] Bug #2374810 - CVE-2025-52890 incus: Incus firewall rule bypass [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2374810 [ 5 ] Bug #2374811 - CVE-2025-52890 incus: Incus firewall rule bypass [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2374811 [ 6 ] Bug #2375609 - incus: mapstructure May Leak Sensitive Information [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2375609 [ 7 ] Bug #2375625 - incus: mapstructure May Leak Sensitive Information [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2375625 [ 8 ] Bug #2384118 - incus: Host Header Injection in github.com/go-chi/chi [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2384118 [ 9 ] Bug #2384130 - incus: Host Header Injection in github.com/go-chi/chi [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2384130 [ 10 ] Bug #2384144 - incus: go-viper information leak [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2384144 [ 11 ] Bug #2384160 - incus: go-viper information leak [fedora-42] https://bugzilla.redhat.com/show_bug.cgi?id=2384160 [ 12 ] Bug #2385075 - incus: FTBFS in Fedora rawhide/f43 https://bugzilla.redhat.com/show_bug.cgi?id=2385075 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2025-83aa12829d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue