Releases retrieved: 5.0.1 Upstream release that is considered latest: 5.0.1 Current version/release in rawhide: 5.0.0-4.fc43 URL: https://www.gnu.org/software/screen/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/4772/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/screen
Created attachment 2089963 [details] Update to 5.0.1 (#2366507)
the-new-hotness/release-monitoring.org's scratch build of screen-5.0.1-1.fc40.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=132773896
(In reply to Upstream Release Monitoring from comment #0) > Releases retrieved: 5.0.1 > Upstream release that is considered latest: 5.0.1 > Current version/release in rawhide: 5.0.0-4.fc43 > URL: https://www.gnu.org/software/screen/ > Based on the information from Anitya: https://release-monitoring.org/project/4772/ > To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/screen 5.0.1 is a security fix release. It includes only a few code fixes, types and security issues. It doesn't include any new features ( https://lists.gnu.org/archive/html/info-gnu/2025-05/msg00002.html ): - CVE-2025-46805: do NOT send signals with root privileges - CVE-2025-46804: avoid file existence test information leaks - CVE-2025-46803: apply safe PTY default mode of 0620 - CVE-2025-46802: prevent temporary 0666 mode on PTYs in attacher - CVE-2025-23395: reintroduce lf_secreopen() for logfile - buffer overflow due bad strncpy() - uninitialized variables warnings - typos - combining char handling that could lead to a segfault
FEDORA-2025-824e33e598 (screen-5.0.1-2.fc41) has been submitted as an update to Fedora 41. https://bodhi.fedoraproject.org/updates/FEDORA-2025-824e33e598
FEDORA-EPEL-2025-70302aabff (screen-5.0.1-2.el10_1) has been submitted as an update to Fedora EPEL 10.1. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-70302aabff
FEDORA-EPEL-2025-70302aabff has been pushed to the Fedora EPEL 10.1 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-70302aabff See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2025-824e33e598 has been pushed to the Fedora 41 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-824e33e598` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-824e33e598 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2025-7e02027bad has been pushed to the Fedora 42 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-7e02027bad` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-7e02027bad See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-EPEL-2025-beeb62ad3c has been pushed to the Fedora EPEL 10.1 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-beeb62ad3c See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2025-f055a0d751 has been pushed to the Fedora 42 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-f055a0d751` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-f055a0d751 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2025-653690f2f7 has been pushed to the Fedora 41 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-653690f2f7` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-653690f2f7 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-EPEL-2025-beeb62ad3c (screen-5.0.1-4.el10_1) has been pushed to the Fedora EPEL 10.1 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2025-f055a0d751 (screen-5.0.1-4.fc42) has been pushed to the Fedora 42 stable repository. If problem still persists, please make note of it in this bug report.
FEDORA-2025-653690f2f7 (screen-5.0.1-4.fc41) has been pushed to the Fedora 41 stable repository. If problem still persists, please make note of it in this bug report.