Fedora alert FEDORA-2026-cb321bebb5 (bcftools)
| From: | updates--- via package-announce <package-announce@lists.fedoraproject.org> | |
| To: | package-announce@lists.fedoraproject.org | |
| Subject: | [SECURITY] Fedora 44 Update: bcftools-1.23.1-1.fc44 | |
| Date: | Sat, 28 Mar 2026 00:19:22 +0000 | |
| Message-ID: | <20260328001922.D579080EF1@bastion01.rdu3.fedoraproject.org> | |
| Archive-link: | Article |
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-cb321bebb5 2026-03-28 00:15:26.019832+00:00 -------------------------------------------------------------------------------- Name : bcftools Product : Fedora 44 Version : 1.23.1 Release : 1.fc44 URL : https://www.htslib.org/ Summary : Tools for genomic variant calling and manipulating VCF/BCF files Description : BCFtools is a set of utilities that manipulate genomic variant calls in the Variant Call Format (VCF) and its binary counterpart (BCF). All commands work transparently with both VCFs and BCFs, both uncompressed and BGZF-compressed. (This BCFtools includes the polysomy subcommand, which is implemented using the GNU Scientific Library. Hence this package is licensed according to the GNU General Public License, rather than the MIT license used when BCFtools is built without the polysomy subcommand.) -------------------------------------------------------------------------------- Update Information: Update to 1.23.1 -------------------------------------------------------------------------------- ChangeLog: * Thu Mar 19 2026 Rasmus Ory Nielsen <ron@ron.dk> - 1.23.1-1 - Updated to 1.23.1 - Removed patch now that issue 2495 is fixed upstream -------------------------------------------------------------------------------- References: [ 1 ] Bug #2448857 - CVE-2026-31972 samtools: SAMtools: Information Disclosure and Denial of Service via use-after-free vulnerability in mpileup command https://bugzilla.redhat.com/show_bug.cgi?id=2448857 [ 2 ] Bug #2448860 - CVE-2026-31973 samtools: SAMtools: Denial of Service due to NULL pointer dereference in cram-size command https://bugzilla.redhat.com/show_bug.cgi?id=2448860 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-cb321bebb5' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
