Aggregator
asterisk-18.26.4-1.el9
- asterisk-18.26.4-1.el9
Update to Asterisk 18.26.4, addressing numerous security vulnerabilities accumulated since the long-stale 18.12.1 package. The following CVEs are fixed in this update:
- CVE-2022-26498 (fixed in 18.13.0): use-after-free in chan_ooh323
- CVE-2022-42705 (fixed in 18.15.0): use-after-free in res_pjsip_pubsub
- CVE-2022-37325 (fixed in 18.15.1): crash in H323 channel via malformed IE
- CVE-2023-37457 (fixed in 18.20.0): buffer overflow in PJSIP_HEADER function
- CVE-2023-49294 (fixed in 18.20.1): arbitrary file read via AMI GetConfig
- CVE-2023-49786 (fixed in 18.20.1): DTLS race condition causing DoS
- CVE-2024-35190 (fixed in 18.23.1): unauthorized SIP requests matched as endpoint
- CVE-2024-42365 (fixed in 18.24.2): Write=originate allows code execution
- CVE-2024-42491 (fixed in 18.25.0): crash via malformed Contact/Record-Route URI
- CVE-2025-49832 (fixed in 18.26.3): DoS/RCE in res_stir_shaken
- CVE-2025-47779 (fixed in 18.26.2): identity forging via malformed From header
- CVE-2025-1131 (fixed in 18.26.3): local privilege escalation via safe_asterisk
- CVE-2025-54995 (fixed in 18.26.4): resource exhaustion via RTP port leak
asterisk-18.26.4-1.el8
- asterisk-18.26.4-1.el8
Update to Asterisk 18.26.4, addressing numerous security vulnerabilities accumulated since the long-stale 18.12.1 package. The following CVEs are fixed in this update:
- CVE-2022-26498 (fixed in 18.13.0): use-after-free in chan_ooh323
- CVE-2022-42705 (fixed in 18.15.0): use-after-free in res_pjsip_pubsub
- CVE-2022-37325 (fixed in 18.15.1): crash in H323 channel via malformed IE
- CVE-2023-37457 (fixed in 18.20.0): buffer overflow in PJSIP_HEADER function
- CVE-2023-49294 (fixed in 18.20.1): arbitrary file read via AMI GetConfig
- CVE-2023-49786 (fixed in 18.20.1): DTLS race condition causing DoS
- CVE-2024-35190 (fixed in 18.23.1): unauthorized SIP requests matched as endpoint
- CVE-2024-42365 (fixed in 18.24.2): Write=originate allows code execution
- CVE-2024-42491 (fixed in 18.25.0): crash via malformed Contact/Record-Route URI
- CVE-2025-49832 (fixed in 18.26.3): DoS/RCE in res_stir_shaken
- CVE-2025-47779 (fixed in 18.26.2): identity forging via malformed From header
- CVE-2025-1131 (fixed in 18.26.3): local privilege escalation via safe_asterisk
- CVE-2025-54995 (fixed in 18.26.4): resource exhaustion via RTP port leak
DSA-6207-1 flatpak - security update
DSA-6208-1 mediawiki - security update
asterisk-18.26.4-1.fc44
- asterisk-18.26.4-1.fc44
Update to Asterisk 18.26.4, addressing numerous security vulnerabilities accumulated since the long-stale 18.12.1 package. The following CVEs are fixed in this update:
- CVE-2022-26498 (fixed in 18.13.0): use-after-free in chan_ooh323
- CVE-2022-42705 (fixed in 18.15.0): use-after-free in res_pjsip_pubsub
- CVE-2022-37325 (fixed in 18.15.1): crash in H323 channel via malformed IE
- CVE-2023-37457 (fixed in 18.20.0): buffer overflow in PJSIP_HEADER function
- CVE-2023-49294 (fixed in 18.20.1): arbitrary file read via AMI GetConfig
- CVE-2023-49786 (fixed in 18.20.1): DTLS race condition causing DoS
- CVE-2024-35190 (fixed in 18.23.1): unauthorized SIP requests matched as endpoint
- CVE-2024-42365 (fixed in 18.24.2): Write=originate allows code execution
- CVE-2024-42491 (fixed in 18.25.0): crash via malformed Contact/Record-Route URI
- CVE-2025-49832 (fixed in 18.26.3): DoS/RCE in res_stir_shaken
- CVE-2025-47779 (fixed in 18.26.2): identity forging via malformed From header
- CVE-2025-1131 (fixed in 18.26.3): local privilege escalation via safe_asterisk
- CVE-2025-54995 (fixed in 18.26.4): resource exhaustion via RTP port leak
Also fixes F44FailsToInstall for asterisk-snmp (BZ#2433748).
asterisk-18.26.4-1.fc43
- asterisk-18.26.4-1.fc43
Update to Asterisk 18.26.4, addressing numerous security vulnerabilities accumulated since the long-stale 18.12.1 package. The following CVEs are fixed in this update:
- CVE-2022-26498 (fixed in 18.13.0): use-after-free in chan_ooh323
- CVE-2022-42705 (fixed in 18.15.0): use-after-free in res_pjsip_pubsub
- CVE-2022-37325 (fixed in 18.15.1): crash in H323 channel via malformed IE
- CVE-2023-37457 (fixed in 18.20.0): buffer overflow in PJSIP_HEADER function
- CVE-2023-49294 (fixed in 18.20.1): arbitrary file read via AMI GetConfig
- CVE-2023-49786 (fixed in 18.20.1): DTLS race condition causing DoS
- CVE-2024-35190 (fixed in 18.23.1): unauthorized SIP requests matched as endpoint
- CVE-2024-42365 (fixed in 18.24.2): Write=originate allows code execution
- CVE-2024-42491 (fixed in 18.25.0): crash via malformed Contact/Record-Route URI
- CVE-2025-49832 (fixed in 18.26.3): DoS/RCE in res_stir_shaken
- CVE-2025-47779 (fixed in 18.26.2): identity forging via malformed From header
- CVE-2025-1131 (fixed in 18.26.3): local privilege escalation via safe_asterisk
- CVE-2025-54995 (fixed in 18.26.4): resource exhaustion via RTP port leak
Also fixes F44FailsToInstall for asterisk-snmp (BZ#2433748).
asterisk-18.26.4-1.fc42
- asterisk-18.26.4-1.fc42
Update to Asterisk 18.26.4, addressing numerous security vulnerabilities accumulated since the long-stale 18.12.1 package. The following CVEs are fixed in this update:
- CVE-2022-26498 (fixed in 18.13.0): use-after-free in chan_ooh323
- CVE-2022-42705 (fixed in 18.15.0): use-after-free in res_pjsip_pubsub
- CVE-2022-37325 (fixed in 18.15.1): crash in H323 channel via malformed IE
- CVE-2023-37457 (fixed in 18.20.0): buffer overflow in PJSIP_HEADER function
- CVE-2023-49294 (fixed in 18.20.1): arbitrary file read via AMI GetConfig
- CVE-2023-49786 (fixed in 18.20.1): DTLS race condition causing DoS
- CVE-2024-35190 (fixed in 18.23.1): unauthorized SIP requests matched as endpoint
- CVE-2024-42365 (fixed in 18.24.2): Write=originate allows code execution
- CVE-2024-42491 (fixed in 18.25.0): crash via malformed Contact/Record-Route URI
- CVE-2025-49832 (fixed in 18.26.3): DoS/RCE in res_stir_shaken
- CVE-2025-47779 (fixed in 18.26.2): identity forging via malformed From header
- CVE-2025-1131 (fixed in 18.26.3): local privilege escalation via safe_asterisk
- CVE-2025-54995 (fixed in 18.26.4): resource exhaustion via RTP port leak
Also fixes F44FailsToInstall for asterisk-snmp (BZ#2433748).
micropython-1.28.0-1.fc43
- micropython-1.28.0-1.fc43
Update to 1.28.0
micropython-1.28.0-1.fc44
- micropython-1.28.0-1.fc44
Update to 1.28.0
micropython-1.28.0-1.fc45
- micropython-1.28.0-1.fc45
Automatic update for micropython-1.28.0-1.fc45.
Changelog * Mon Apr 6 2026 Lumír Balhar <lbalhar@redhat.com> - 1.28.0-1 - Update to 1.28.0 - Security fix for CVE-2026-1998 - Update mbedtls submodule to 3.6.6 - mbedtls security fixes for CVE-2026-25834, CVE-2026-34871, CVE-2026-25833 - CVE-2025-52496, CVE-2025-52497, CVE-2025-49087, CVE-2025-54764, CVE-2025-59438 Resolves: rhbz#2455368, rhbz#2376688, rhbz#2376701, rhbz#2382261, rhbz#2405245, rhbz#2405374, rhbz#2437327, rhbz#2454032, rhbz#2454086, rhbz#2454213perl-Net-CIDR-Lite-0.23-1.fc42
- perl-Net-CIDR-Lite-0.23-1.fc42
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.fc43
- perl-Net-CIDR-Lite-0.23-1.fc43
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.el10_3
- perl-Net-CIDR-Lite-0.23-1.el10_3
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.fc44
- perl-Net-CIDR-Lite-0.23-1.fc44
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.el10_2
- perl-Net-CIDR-Lite-0.23-1.el10_2
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.el10_1
- perl-Net-CIDR-Lite-0.23-1.el10_1
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)
perl-Net-CIDR-Lite-0.23-1.el8
- perl-Net-CIDR-Lite-0.23-1.el8
This update addresses two security issues regarding incorrect handling of malformed IPv6 addresses:
- Fix IPv4 mapped IPv6 packed length (CVE-2026-40199)
- Reject invalid uncompressed IPv6 (CVE-2026-40198)