https://bugzilla.redhat.com/show_bug.cgi?id=2210464
Bug ID: 2210464
Summary: python-nbxmpp-4.3.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: python-nbxmpp
Keywords: FutureFeature, Triaged
Assignee: mschmidt(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
mschmidt(a)redhat.com, suraia(a)ikkoku.de
Target Milestone: ---
Classification: Fedora
Releases retrieved: 4.3.0
Upstream release that is considered latest: 4.3.0
Current version/release in rawhide: 4.2.2-1.fc39
URL: https://dev.gajim.org/gajim/python-nbxmpp/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/12980/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/python-nbxmpp
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2210464
https://bugzilla.redhat.com/show_bug.cgi?id=2210415
Bug ID: 2210415
Summary: gajim-1.8.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: gajim
Keywords: FutureFeature, Triaged
Assignee: mschmidt(a)redhat.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: epel-packagers-sig(a)lists.fedoraproject.org,
lemenkov(a)gmail.com, mschmidt(a)redhat.com,
redhat-bugzilla(a)linuxnetz.de, suraia(a)ikkoku.de
Target Milestone: ---
Classification: Fedora
Releases retrieved: 1.8.0
Upstream release that is considered latest: 1.8.0
Current version/release in rawhide: 1.7.3-2.fc39
URL: https://gajim.org/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/870/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/gajim
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2210415
https://bugzilla.redhat.com/show_bug.cgi?id=2283798
Bug ID: 2283798
Summary: Location of unix socket is hardcoded in
/etc/sysconfig/valkey
Product: Fedora
Version: 39
Hardware: x86_64
OS: Linux
Status: NEW
Component: valkey
Severity: high
Assignee: jonathan(a)almalinux.org
Reporter: fedora(a)joshuanoeske.de
CC: epel-packagers-sig(a)lists.fedoraproject.org,
fedora(a)famillecollet.com, jonathan(a)almalinux.org,
nathans(a)redhat.com, ngompa13(a)gmail.com
Target Milestone: ---
Classification: Fedora
Changing the location of the unixsocket in /etc/valkey/valkey.conf does not
actually change its location as it is hardcoded in /etc/sysconfig/valkey. It
took me quite some time to figure out why the location of my socket was not
changing although I changed it. Either inform users about that or remove the
hardcoded location of the socket, please
Reproducible: Always
Steps to Reproduce:
1. Change location of unix socket in /etc/valkey/valkey.conf
2. Restart valkey
Actual Results:
Unix socket still at /var/run/valkey/valkey.conf
Expected Results:
Change the location of the unixsocket.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2283798
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2303150
Bug ID: 2303150
Summary: asio-1.31.0 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: asio
Keywords: FutureFeature, Triaged
Assignee: belegdol(a)gmail.com
Reporter: upstream-release-monitoring(a)fedoraproject.org
QA Contact: extras-qa(a)fedoraproject.org
CC: belegdol(a)gmail.com, davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
me(a)fale.io, uwog(a)uwog.net
Target Milestone: ---
Classification: Fedora
Releases retrieved: 1.31.0
Upstream release that is considered latest: 1.31.0
Current version/release in rawhide: 1.30.2-3.fc41
URL: https://think-async.com/Asio/
Please consult the package updates policy before you issue an update to a
stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/
More information about the service that created this bug can be found at:
https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_M…
Please keep in mind that with any upstream change, there may also be packaging
changes that need to be made. Specifically, please remember that it is your
responsibility to review the new version to ensure that the licensing is still
correct and that no non-free or legally problematic items have been added
upstream.
Based on the information from Anitya:
https://release-monitoring.org/project/117/
To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/asio
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2303150
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2310294
Bug ID: 2310294
Summary: CVE-2024-42491 asterisk: A malformed Contact or
Record-Route URI in an incoming SIP request can cause
crash [fedora-40]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["b43ba178-910d-4466-8ab5-39e9c901317b"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2310279 (CVE-2024-42491)
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
[Bug 2310279] CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI
in an incoming SIP request can cause crash
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2310294
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2310293
Bug ID: 2310293
Summary: CVE-2024-42491 asterisk: A malformed Contact or
Record-Route URI in an incoming SIP request can cause
crash [fedora-39]
Product: Fedora
Version: 39
Status: NEW
Whiteboard: {"flaws": ["b43ba178-910d-4466-8ab5-39e9c901317b"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2310279 (CVE-2024-42491)
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2310279
[Bug 2310279] CVE-2024-42491 asterisk: A malformed Contact or Record-Route URI
in an incoming SIP request can cause crash
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2310293
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2303919
Bug ID: 2303919
Summary: CVE-2024-42365 asterisk: Write=originate, is
sufficient permissions for code execution / System()
dialplan [fedora-all]
Product: Fedora
Version: 40
Status: NEW
Whiteboard: {"flaws": ["2962b812-edb6-4ab1-b6f2-23cedc7f313d"]}
Component: asterisk
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: jsmith.fedora(a)gmail.com
Reporter: pdelbell(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com
Blocks: 2303740
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
https://bugzilla.redhat.com/show_bug.cgi?id=2303740
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2303919
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2281497
Bug ID: 2281497
Summary: CVE-2024-35190 asterisk: wrongly matches ALL
unauthorized SIP requests [fedora-all]
Product: Fedora
Version: 40
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: ybuenos(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2281495
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2281497
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2254635
Bug ID: 2254635
Summary: TRIAGE CVE-2023-49786 asterisk: race condition in the
hello handshake phase of the DTLS protocol triggers
denial of service [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2254633
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2254635
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…
https://bugzilla.redhat.com/show_bug.cgi?id=2254632
Bug ID: 2254632
Summary: TRIAGE CVE-2023-49294 asterisk: access to arbitrary
files via directory traversal [fedora-all]
Product: Fedora
Version: 38
Status: NEW
Component: asterisk
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: jsmith.fedora(a)gmail.com
Reporter: rgatica(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: bennie.joubert(a)jsdaav.com,
epel-packagers-sig(a)lists.fedoraproject.org,
jsmith.fedora(a)gmail.com, rbryant(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2254630
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2254632
Report this comment as SPAM: https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=report-sp…