Bug 2442706 - CVE-2026-25554 opensips: OpenSIPS: Authentication bypass due to SQL injection in JWT processing [fedora-all]
Summary: CVE-2026-25554 opensips: OpenSIPS: Authentication bypass due to SQL injection...
Keywords:
Status: ON_QA
Alias: None
Product: Fedora
Classification: Fedora
Component: opensips
Version: rawhide
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Peter Lemenkov
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["a0557e55-116f-4efa-aed2-b...
Depends On:
Blocks: CVE-2026-25554
TreeView+ depends on / blocked
 
Reported: 2026-02-25 18:32 UTC by Keith Grant
Modified: 2026-02-26 02:16 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Keith Grant 2026-02-25 18:32:02 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Fedora Update System 2026-02-25 21:22:13 UTC
FEDORA-2026-1a199d8524 (opensips-3.5.9-2.fc42) has been submitted as an update to Fedora 42.
https://bodhi.fedoraproject.org/updates/FEDORA-2026-1a199d8524

Comment 2 Fedora Update System 2026-02-26 02:16:17 UTC
FEDORA-2026-1a199d8524 has been pushed to the Fedora 42 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2026-1a199d8524`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2026-1a199d8524

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.


Note You need to log in before you can comment on or make changes to this bug.