Attention: Malicious code in current Beta, pre-release & testing versions/variants: F40 and rawhide affected - users of F40/rawhide need to respond

A post was merged into an existing topic: “xz” lessons learned: if/how to involve Fedora Magazine in CVE handling?

An update for users who follow on “email only”:

8 posts were split to a new topic: “xz” lessons learned: if/how to involve Fedora Magazine in CVE handling?

For people who follow on “email only”:

There is a minor update (update 4), but only the preferred mitigation for toolbox users has been updated:

The new preference is more of a best practice.

I have moved the Fedora Magazine related posts into a separated topic since this has evolved into its own discussion.

Update for users who follow “email only”:

Extract of the one changed point:

All other points of update 4 remain valid. See the top post for all currently valid posts.

1 Like

Thanks for doing this, @py0xc3!

2 Likes

I think I pinned the topic for a week, so it should start to disappear on Friday or Saturday. I would leave it pinned for that time to ensure that the “returnees from the Easter break” get the message (especially containers are not updated by everyone on a regular basis if there is no reason; toolbox etc.).

3 Likes

This does NOT affect users of the Fedora releases (F38, F39 are thus not affected)

This means even after updates?

yes. the affected version was never submitted to any stable release.

4 Likes