Actualizaciones de Seguridad
MGASA-2025-0017 - Updated dcmtk packages fix security vulnerabilities
Publication date: 20 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-47796 , CVE-2024-52333 Description An improper array index validation vulnerability exists in the nowindow functionality of OFFIS. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability, CVE-2024-47796. An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability, CVE-2024-52333. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-47796 , CVE-2024-52333 Description An improper array index validation vulnerability exists in the nowindow functionality of OFFIS. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability, CVE-2024-47796. An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability, CVE-2024-52333. References
- https://bugs.mageia.org/show_bug.cgi?id=33930
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JUKUCNFPV6HQLIZ5S6NYRJ4LAZYRZSXJ/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52333
- dcmtk-3.6.7-4.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0016 - Updated git packages fix security vulnerabilities
Publication date: 20 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-50349 , CVE-2024-52006 Description Git does not sanitize URLs when asking for credentials interactively. (CVE-2024-50349) Newline confusion in credential helpers can lead to credential exfiltration in git. (CVE-2024-52006) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-50349 , CVE-2024-52006 Description Git does not sanitize URLs when asking for credentials interactively. (CVE-2024-50349) Newline confusion in credential helpers can lead to credential exfiltration in git. (CVE-2024-52006) References
- https://bugs.mageia.org/show_bug.cgi?id=33921
- https://www.openwall.com/lists/oss-security/2025/01/14/4
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52006
- git-2.41.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0015 - Updated proftpd packages fix security vulnerability
Publication date: 20 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-48651 Description In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql. (CVE-2024-48651) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-48651 Description In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql. (CVE-2024-48651) References
- https://bugs.mageia.org/show_bug.cgi?id=33922
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVHALJQJ6EOQ3LXU5PV576XZHRQTOZGI/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48651
- proftpd-1.3.8c-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0005 - Updated kio packages fix bug
Publication date: 20 Jan 2025
Type: bugfix
Affected Mageia releases : 9
Description Applications that rely on kio can't expand subfolders on tree view. This update fixes the issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description Applications that rely on kio can't expand subfolders on tree view. This update fixes the issue. References SRPMS 9/core
- kio-5.114.0-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0014 - Updated vim packages fix security vulnerability
Publication date: 18 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22134 Description Heap-buffer-overflow with visual mode in Vim < 9.1.1003. (CVE-2025-22134) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22134 Description Heap-buffer-overflow with visual mode in Vim < 9.1.1003. (CVE-2025-22134) References
- https://bugs.mageia.org/show_bug.cgi?id=33911
- https://openwall.com/lists/oss-security/2025/01/11/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22134
- vim-9.1.1012-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0013 - Updated openafs packages fix security vulnerabilities
Publication date: 18 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-10394 , CVE-2024-10396 , CVE-2024-10397 Description A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client. (CVE-2024-10394) An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash. (CVE-2024-10396) A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code. (CVE-2024-10397) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-10394 , CVE-2024-10396 , CVE-2024-10397 Description A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client. (CVE-2024-10394) An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash. (CVE-2024-10396) A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code. (CVE-2024-10397) References
- https://bugs.mageia.org/show_bug.cgi?id=33916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397
- openafs-1.8.13.1-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0012 - Updated openjpeg2 packages fix security vulnerabilities
Publication date: 16 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56826 , CVE-2024-56827 Description Heap buffer overflow in bin/common/color.c. (CVE-2024-56826) Heap buffer overflow in lib/openjp2/j2k.c. (CVE-2024-56827) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56826 , CVE-2024-56827 Description Heap buffer overflow in bin/common/color.c. (CVE-2024-56826) Heap buffer overflow in lib/openjp2/j2k.c. (CVE-2024-56827) References
- https://bugs.mageia.org/show_bug.cgi?id=33905
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWMGURRKWFOTMCKEBHYWF7HHDJSY7BTR/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XKBM37J7PMJ763EKO4IP3FLOLF4U26HW/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827
- openjpeg2-2.5.0-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0004 - Updated curl packages fix bug
Publication date: 16 Jan 2025
Type: bugfix
Affected Mageia releases : 9
Description curl update that addresses a .netrc related issue that breaks git. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description curl update that addresses a .netrc related issue that breaks git. References SRPMS 9/core
- curl-7.88.1-4.6.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0003 - Updated nvidia-cuda-toolkit-samples-bins & nvidia-cuda-toolkit packages fix bug
Publication date: 16 Jan 2025
Type: bugfix
Affected Mageia releases : 9
Description Performances enhancements and other changes since our current version, References
Type: bugfix
Affected Mageia releases : 9
Description Performances enhancements and other changes since our current version, References
- https://bugs.mageia.org/show_bug.cgi?id=33887
- https://developer.nvidia.com/blog/nvidia-cuda-toolkit-12-2-unleashes-powerful-features-for-boosting-applications/
- https://developer.nvidia.com/blog/cuda-toolkit-12-4-enhances-support-for-nvidia-grace-hopper-and-confidential-computing/
- nvidia-cuda-toolkit-samples-bins-12.4.1-1.mga9.nonfree
- nvidia-cuda-toolkit-12.4.1-1.mga9.nonfree
- cuda-z-0.11.291-11.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2025-0011 - Updated ceph packages fix security vulnerability
Publication date: 14 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-48916 Description Authentication bypass in CEPH RadosGW. (CVE-2024-48916) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-48916 Description Authentication bypass in CEPH RadosGW. (CVE-2024-48916) References
- https://bugs.mageia.org/show_bug.cgi?id=33896
- https://ubuntu.com/security/notices/USN-7182-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48916
- ceph-18.1.1-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0010 - Updated thunderbird packages fix security vulnerabilities
Publication date: 14 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
- https://bugs.mageia.org/show_bug.cgi?id=33900
- https://www.thunderbird.net/en-US/thunderbird/128.6.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243
- thunderbird-128.6.0-1.mga9
- thunderbird-l10n-128.6.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0009 - Updated firefox packages fix security vulnerabilities
Publication date: 14 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
- https://bugs.mageia.org/show_bug.cgi?id=33897
- https://www.mozilla.org/en-US/firefox/128.6.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243
- firefox-128.6.0-1.mga9
- firefox-l10n-128.6.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0008 - Updated libjxl packages fix security vulnerabilities
Publication date: 12 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-11403 , CVE-2024-11498 Description Out of Bounds Memory Read/Write in libjxl. (CVE-2024-11403) Resource exhaustion via Stack overflow in libjxl. (CVE-2024-11498) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-11403 , CVE-2024-11498 Description Out of Bounds Memory Read/Write in libjxl. (CVE-2024-11403) Resource exhaustion via Stack overflow in libjxl. (CVE-2024-11498) References
- https://bugs.mageia.org/show_bug.cgi?id=33818
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MKE5FX6CYNU67TGCF7WUASGPHZHN5WQC/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11403
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11498
- libjxl-0.7.2-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0007 - Updated avahi packages fix security vulnerabilities
Publication date: 12 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52615 , CVE-2024-52616 Description Avahi wide-area dns uses constant source port. (CVE-2024-52615) Avahi wide-area dns predictable transaction ids. (CVE-2024-52616) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52615 , CVE-2024-52616 Description Avahi wide-area dns uses constant source port. (CVE-2024-52615) Avahi wide-area dns predictable transaction ids. (CVE-2024-52616) References
- https://bugs.mageia.org/show_bug.cgi?id=33829
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/G3ABDXZMFN73MQ62ZJOBQIVUE3HAEKVL/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616
- avahi-0.8-10.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0006 - Updated radare2 packages fix security vulnerability
Publication date: 12 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-29645 Description Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. (CVE-2024-29645) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-29645 Description Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. (CVE-2024-29645) References
- https://bugs.mageia.org/show_bug.cgi?id=33853
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VM7ZHZ5AWQKW4RJJZ5LN6TSZLENLQ2GZ/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29645
- radare2-5.8.8-1.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0005 - Updated rizin packages fix security vulnerability
Publication date: 12 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2022-1207 Description Command injection via RzBinInfo bclass due legacy code. (CVE-2022-1207) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2022-1207 Description Command injection via RzBinInfo bclass due legacy code. (CVE-2022-1207) References
- https://bugs.mageia.org/show_bug.cgi?id=33895
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNDCM5TGWRLSMIJ74ZI6LMNSCCH5DBPL/
- https://github.com/rizinorg/rizin/security/advisories/GHSA-5jhc-frm4-p8v9
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1207
- rizin-0.5.2-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0004 - Updated opencontainers-runc packages fix security vulnerability
Publication date: 10 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-45310 Description runc 1.1.13 and earlier as well as 1.2.0-rc2 and earlier can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with os.MkdirAll. While this can be used to create empty files, existing files **will not** be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-45310 Description runc 1.1.13 and earlier as well as 1.2.0-rc2 and earlier can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with os.MkdirAll. While this can be used to create empty files, existing files **will not** be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. References
- https://bugs.mageia.org/show_bug.cgi?id=33519
- https://www.openwall.com/lists/oss-security/2024/09/03/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310
- opencontainers-runc-1.1.14-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0003 - Updated tinyproxy packages fix security vulnerabilities
Publication date: 10 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2022-40468 , CVE-2023-49606 Description Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.. (CVE-2022-40468) A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. (CVE-2023-49606) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2022-40468 , CVE-2023-49606 Description Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.. (CVE-2022-40468) A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. (CVE-2023-49606) References
- https://bugs.mageia.org/show_bug.cgi?id=33206
- https://www.openwall.com/lists/oss-security/2024/05/07/1
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OM62U7F2OTTTTR4PTM6RV3UAOCUHRC75/
- https://lwn.net/Articles/990818/
- https://ubuntu.com/security/notices/USN-7140-1
- https://ubuntu.com/security/notices/USN-7190-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49606
- tinyproxy-1.10.0-3.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0002 - Updated virtualbox & kmod-virtualbox packages fix security vulnerabilities
Publication date: 04 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-21259 , CVE-2024-21263 , CVE-2024-21273 , CVE-2024-21248 , CVE-2024-21253 Description Vulnerabilities were found in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are prior to 7.0.22 and prior to 7.1.2. A difficult to exploit vulnerability allows a high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise an Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VirtualBox VMs. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-21259 , CVE-2024-21263 , CVE-2024-21273 , CVE-2024-21248 , CVE-2024-21253 Description Vulnerabilities were found in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are prior to 7.0.22 and prior to 7.1.2. A difficult to exploit vulnerability allows a high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise an Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VirtualBox VMs. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). References
- https://bugs.mageia.org/show_bug.cgi?id=33754
- https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixOVIR
- https://www.virtualbox.org/wiki/Changelog-7.0#v22
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21253
- virtualbox-7.0.22-1.mga9
- kmod-virtualbox-7.0.22-62.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0001 - Updated ruby packages fix security vulnerabilities
Publication date: 04 Jan 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-35176 , CVE-2024-39908 , CVE-2024-41123 , CVE-2024-41946 , CVE-2024-43398 , CVE-2024-49761 Description The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. (CVE-2024-35176) The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. (CVE-2024-39908) The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. (CVE-2024-41123) The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. (CVE-2024-41946) The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. (CVE-2024-43398) The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). (CVE-2024-49761) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-35176 , CVE-2024-39908 , CVE-2024-41123 , CVE-2024-41946 , CVE-2024-43398 , CVE-2024-49761 Description The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. (CVE-2024-35176) The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. (CVE-2024-39908) The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. (CVE-2024-41123) The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. (CVE-2024-41946) The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. (CVE-2024-43398) The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). (CVE-2024-49761) References
- https://bugs.mageia.org/show_bug.cgi?id=33576
- https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/
- https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/
- https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQWXWS2GDTKX4LYWHQOZ2PWXDEICDX2W/
- https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/
- https://ubuntu.com/security/notices/USN-7091-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39908
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49761
- ruby-3.1.5-46.mga9
Categorías: Actualizaciones de Seguridad
![BlogDRAKE aggregator - Actualizaciones de Seguridad Feed](/misc/feed.png)