Lector de Feeds

MGASA-2025-0164 - Updated glibc packages fix security vulnerability

Mageia Security - 25 Mayo, 2025 - 00:25
Publication date: 24 May 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-4802 Description An untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library versions 2.27 to 2.38 allows attacker-controlled loading of dynamically shared libraries in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo). (CVE-2025-4802) References SRPMS 9/core
  • glibc-2.36-56.mga9

MGASA-2025-0163 - Updated iputils packages fix security vulnerability

Mageia Security - 25 Mayo, 2025 - 00:25
Publication date: 24 May 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-47268 Description ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication. (CVE-2025-47268 References SRPMS 9/core
  • iputils-20221126-1.1.mga9

MGASA-2025-0161 - Updated nodejs packages fix security vulnerabilities

Mageia Security - 25 Mayo, 2025 - 00:25
Publication date: 24 May 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-23165 , CVE-2025-23166 , CVE-2025-23167 Description Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo& args) when args[0] is a string. (CVE-2025-23165) Improper error handling in async cryptographic operations crashes process. (CVE-2025-23166) Improper HTTP header block termination in llhttp. (CVE-2025-23167) References SRPMS 9/core
  • nodejs-22.16.0-1.mga9
Feed