Aggregator

miniupnpd-2.3.10-1.fc42

3 days 7 hours ago
FEDORA-2026-2e8a8fd35b Packages in this update:
  • miniupnpd-2.3.10-1.fc42
Update description:

2026/03/24: fix missing fclose and potential double free in option file parsing

2026/03/23: upnphttp.c: fix removal of quotes in ParseHttpHeaders() minixml.c: fix buffer read overflow

2026/02/05: Rewrite permission line parser

2025/05/26: Fix false negative filtered STUN CGNAT test result for unsupported servers #825

2025/05/24: Fix Mac OS X 10.9 build

2025/05/15: build: teststun executable

2025/04/28: pf: fix delete_pinhole for openbsd. Was broken since miniupnpd 2.3.7

2025/04/26 Fix parsing of interfaces names starting with a digit nftables: add counter for DNAT rule (ENABLE_NFT_RULE_COUNTER in config.h) nftables: improve scripts to support already existing tables

miniupnpd-2.3.10-1.fc43

3 days 8 hours ago
FEDORA-2026-5f908cb040 Packages in this update:
  • miniupnpd-2.3.10-1.fc43
Update description:

2026/03/24: fix missing fclose and potential double free in option file parsing

2026/03/23: upnphttp.c: fix removal of quotes in ParseHttpHeaders() minixml.c: fix buffer read overflow

2026/02/05: Rewrite permission line parser

2025/05/26: Fix false negative filtered STUN CGNAT test result for unsupported servers #825

2025/05/24: Fix Mac OS X 10.9 build

2025/05/15: build: teststun executable

2025/04/28: pf: fix delete_pinhole for openbsd. Was broken since miniupnpd 2.3.7

2025/04/26 Fix parsing of interfaces names starting with a digit nftables: add counter for DNAT rule (ENABLE_NFT_RULE_COUNTER in config.h) nftables: improve scripts to support already existing tables

USN-8189-1: RapidJSON vulnerability

3 days 8 hours ago
It was discovered that RapidJSON did not properly protect against integer overflows in certain instances when parsing JSON text. A remote attacker could possibly use this issue to craft a malicious JSON file, that when read by RapidJSON, would lead to an elevation of privilege, resulting in the potential disclosure of sensitive information.

miniupnpd-2.3.10-1.fc44

3 days 9 hours ago
FEDORA-2026-f933979509 Packages in this update:
  • miniupnpd-2.3.10-1.fc44
Update description:

2026/03/24: fix missing fclose and potential double free in option file parsing

2026/03/23: upnphttp.c: fix removal of quotes in ParseHttpHeaders() minixml.c: fix buffer read overflow

2026/02/05: Rewrite permission line parser

2025/05/26: Fix false negative filtered STUN CGNAT test result for unsupported servers #825

2025/05/24: Fix Mac OS X 10.9 build

2025/05/15: build: teststun executable

2025/04/28: pf: fix delete_pinhole for openbsd. Was broken since miniupnpd 2.3.7

2025/04/26 Fix parsing of interfaces names starting with a digit nftables: add counter for DNAT rule (ENABLE_NFT_RULE_COUNTER in config.h) nftables: improve scripts to support already existing tables

openssh-9.9p1-14.fc42

3 days 10 hours ago
FEDORA-2026-d08c298940 Packages in this update:
  • openssh-9.9p1-14.fc42
Update description:

Fixes high severity CVE: - CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not in preserving file mode

openssh-10.2p1-8.fc44

3 days 10 hours ago
FEDORA-2026-93679cc7c2 Packages in this update:
  • openssh-10.2p1-8.fc44
Update description:
  • CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not in preserving file mode
  • CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode multiplexing sessions
  • CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms with regard to ECDSA keys
  • CVE-2026-35414: Fix mishandling of authorized_keys principals option
  • CVE-2026-35386: Add validation rules to usernames and hostnames set for ProxyJump/-J on the commandline

openssh-10.0p1-9.fc43

3 days 10 hours ago
FEDORA-2026-2cedc95af8 Packages in this update:
  • openssh-10.0p1-9.fc43
Update description:
  • CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not in preserving file mode
  • CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode multiplexing sessions
  • CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms with regard to ECDSA keys
  • CVE-2026-35414: Fix mishandling of authorized_keys principals option
  • CVE-2026-35386: Add validation rules to usernames and hostnames set for ProxyJump/-J on the commandline