Mageia Security
MGASA-2025-0069 - Updated python-cryptography & openssl packages fix security vulnerabilities
Publication date: 17 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49083 , CVE-2023-50782 , CVE-2024-26130 Description Cryptography vulnerable to NULL-dereference when loading PKCS7 certificates. (CVE-2023-49083) Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659. (CVE-2023-50782) Cryptography NULL pointer deference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override. (CVE-2024-26130) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49083 , CVE-2023-50782 , CVE-2024-26130 Description Cryptography vulnerable to NULL-dereference when loading PKCS7 certificates. (CVE-2023-49083) Python-cryptography: bleichenbacher timing oracle attack against rsa decryption - incomplete fix for cve-2020-25659. (CVE-2023-50782) Cryptography NULL pointer deference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override. (CVE-2024-26130) References
- https://bugs.mageia.org/show_bug.cgi?id=32584
- https://www.openwall.com/lists/oss-security/2023/11/29/2
- https://ubuntu.com/security/notices/USN-6673-1
- https://ubuntu.com/security/notices/USN-6673-3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26130
- openssl-3.0.15-1.3.mga9
- python-cryptography-39.0.1-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0068 - Updated microcode packages fix security vulnerabilities
Publication date: 17 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-31068 , CVE-2024-36293 , CVE-2023-43758 , CVE-2024-39355 , CVE-2024-37020 Description Improper Finite State Machines (FSMs) in Hardware Logic for some Intel® Processors may allow privileged user to potentially enable denial of service via local access. (CVE-2024-31068) Improper access control in the EDECCSSA user leaf function for some Intel® Processors with Intel® SGX may allow an authenticated user to potentially enable denial of service via local access. (CVE-2024-36293) Improper input validation in UEFI firmware for some Intel® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2023-43758) Improper handling of physical or environmental conditions in some Intel® Processors may allow an authenticated user to enable denial of service via local access. (CVE-2024-39355) Sequence of processor instructions leads to unexpected behavior in the Intel® DSA V1.0 for some Intel® Xeon® Processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2024-37020) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-31068 , CVE-2024-36293 , CVE-2023-43758 , CVE-2024-39355 , CVE-2024-37020 Description Improper Finite State Machines (FSMs) in Hardware Logic for some Intel® Processors may allow privileged user to potentially enable denial of service via local access. (CVE-2024-31068) Improper access control in the EDECCSSA user leaf function for some Intel® Processors with Intel® SGX may allow an authenticated user to potentially enable denial of service via local access. (CVE-2024-36293) Improper input validation in UEFI firmware for some Intel® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2023-43758) Improper handling of physical or environmental conditions in some Intel® Processors may allow an authenticated user to enable denial of service via local access. (CVE-2024-39355) Sequence of processor instructions leads to unexpected behavior in the Intel® DSA V1.0 for some Intel® Xeon® Processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2024-37020) References
- https://bugs.mageia.org/show_bug.cgi?id=34020
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
- microcode-0.20250211-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2025-0067 - Updated ffmpeg packages fix security vulnerabilities
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49502 , CVE-2024-31578 Description A buffer overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. (CVE-2023-49502) FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. (CVE-2024-31578) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49502 , CVE-2024-31578 Description A buffer overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. (CVE-2023-49502) FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. (CVE-2024-31578) References
- https://bugs.mageia.org/show_bug.cgi?id=34015
- https://lists.suse.com/pipermail/sle-updates/2024-April/035125.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31578
- ffmpeg-5.1.6-1.2.mga9
- ffmpeg-5.1.6-1.2.mga9.tainted
Categorías: Actualizaciones de Seguridad
MGASA-2025-0066 - Updated python-zipp packages fix security vulnerabilitiy
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-5569 Description Denial of Service via crafted zip file in jaraco/zipp. (CVE-2024-5569) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-5569 Description Denial of Service via crafted zip file in jaraco/zipp. (CVE-2024-5569) References
- https://bugs.mageia.org/show_bug.cgi?id=33395
- https://lists.suse.com/pipermail/sle-updates/2024-July/035932.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5569
- python-zipp-3.8.1-3.1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0015 - Updated texstudio packages fix bugs
Publication date: 14 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description The application crashed and the package needed additional requirements to make it work well once installed. This update fixes the issues. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description The application crashed and the package needed additional requirements to make it work well once installed. This update fixes the issues. References SRPMS 9/core
- texstudio-4.5.1-2.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0065 - Updated golang packages fix security vulnerability
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22866 Description Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec. (CVE-2025-22866) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22866 Description Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec. (CVE-2025-22866) References
- https://bugs.mageia.org/show_bug.cgi?id=34009
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3TLTJ366QWWXT5LOMCQMCAWW4WSJRVJG/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866
- golang-1.22.12-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0064 - Updated postgresql15 & postgresql13 packages fix security vulnerability
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1094 Description PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation. (CVE-2025-1094) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1094 Description PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation. (CVE-2025-1094) References
- https://bugs.mageia.org/show_bug.cgi?id=34018
- https://www.postgresql.org/about/news/postgresql-173-167-1511-1416-and-1319-released-3015/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094
- postgresql15-15.11-1.mga9
- postgresql13-13.19-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0014 - Updated ffmulticonverter packages fix bug
Publication date: 14 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description Issues with the conversions and the progress bar have been reported. This update fixes the issues and removes python3-sip as a requirement as is no longer needed References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description Issues with the conversions and the progress bar have been reported. This update fixes the issues and removes python3-sip as a requirement as is no longer needed References SRPMS 9/core
- ffmulticonverter-1.8.0-10.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0063 - Updated ofono packages fix security vulnerabilities
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-2794 , CVE-2023-4232 , CVE-2023-4233 , CVE-2023-4234 , CVE-2023-4235 Description Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver() function. (CVE-2023-2794) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_status_report() function. (CVE-2023-4232) Sms decoder stack-based buffer overflow remote code execution vulnerability within the sms_decode_address_field(). (CVE-2023-4233) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_submit_report() function. (CVE-2023-4234) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver_report() function. (CVE-2023-4235) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-2794 , CVE-2023-4232 , CVE-2023-4233 , CVE-2023-4234 , CVE-2023-4235 Description Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver() function. (CVE-2023-2794) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_status_report() function. (CVE-2023-4232) Sms decoder stack-based buffer overflow remote code execution vulnerability within the sms_decode_address_field(). (CVE-2023-4233) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_submit_report() function. (CVE-2023-4234) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver_report() function. (CVE-2023-4235) References
- https://bugs.mageia.org/show_bug.cgi?id=33841
- https://ubuntu.com/security/notices/USN-7141-1
- https://ubuntu.com/security/notices/USN-7151-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4232
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4234
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4235
- ofono-2.1-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0062 - Updated perl-Net-OAuth, perl-Crypt-URandom & perl-Module-Build packages fix security vulnerability
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22376 Description In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. (CVE-2025-22376) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22376 Description In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. (CVE-2025-22376) References
- https://bugs.mageia.org/show_bug.cgi?id=33923
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLAEBHWU2NBVEDHXVVKYY4Y2XLNJX2VX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22376
- perl-Net-OAuth-0.300.0-1.mga9
- perl-Crypt-URandom-0.370.0-1.mga9
- perl-Module-Build-0.423.400-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0061 - Updated ark packages fix security vulnerability
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57966 Description A security issue exists in Ark where a maliciously crafted archive containing file paths beginning with "/" allows files to be extracted to locations outside the intended directory. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57966 Description A security issue exists in Ark where a maliciously crafted archive containing file paths beginning with "/" allows files to be extracted to locations outside the intended directory. References
- https://bugs.mageia.org/show_bug.cgi?id=34013
- https://kde.org/info/security/advisory-20250207-1.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57966
- ark-23.04.3-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0060 - Updated python-tornado packages fix security vulnerability
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52804 Description Tornado has an HTTP cookie parsing DoS vulnerability. (CVE-2024-52804) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52804 Description Tornado has an HTTP cookie parsing DoS vulnerability. (CVE-2024-52804) References
- https://bugs.mageia.org/show_bug.cgi?id=33816
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KECEA6QVDQMKX34TWO73YYIDDQZZ476N/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52804
- python-tornado-6.3.2-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0059 - Updated php-tcpdf packages fix security vulnerabilities
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56519 , CVE-2024-56521 , CVE-2024-56522 , CVE-2024-56527 Description An issue was discovered in TCPDF before 6.8.0. setSVGStyles does not sanitize the SVG font-family attribute. (CVE-2024-56519) An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely. (CVE-2024-56521) An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes. (CVE-2024-56522) An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message. (CVE-2024-56527) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56519 , CVE-2024-56521 , CVE-2024-56522 , CVE-2024-56527 Description An issue was discovered in TCPDF before 6.8.0. setSVGStyles does not sanitize the SVG font-family attribute. (CVE-2024-56519) An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely. (CVE-2024-56521) An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes. (CVE-2024-56522) An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message. (CVE-2024-56527) References
- https://bugs.mageia.org/show_bug.cgi?id=33898
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZX3ABLKKEVGN4M4BBUJFPBNWW5SHP7J3/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56519
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56521
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56522
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56527
- php-tcpdf-6.5.0-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0058 - Updated subversion packages fix security vulnerability
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46901 Description Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. (CVE-2024-46901) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46901 Description Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. (CVE-2024-46901) References
- https://bugs.mageia.org/show_bug.cgi?id=33838
- https://www.openwall.com/lists/oss-security/2024/12/09/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46901
- subversion-1.14.2-2.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0057 - Updated ffmpeg packages fix security vulnerability
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49528 Description A buffer overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via af_dialoguenhance.c:261:5 in the de_stereo component. (CVE-2023-49528) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49528 Description A buffer overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via af_dialoguenhance.c:261:5 in the de_stereo component. (CVE-2023-49528) References
- https://bugs.mageia.org/show_bug.cgi?id=33430
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3BMDGSJN6WOKM5DG6WR4ITFVPI77UHH/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49528
- ffmpeg-5.1.6-1.1.mga9.tainted
- ffmpeg-5.1.6-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0056 - Updated python-setuptools packages fix security vulnerability
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-6345 Description Remote Code Execution in pypa/setuptools. (CVE-2024-6345) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-6345 Description Remote Code Execution in pypa/setuptools. (CVE-2024-6345) References
- https://bugs.mageia.org/show_bug.cgi?id=33536
- https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345
- python-setuptools-65.5.0-3.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0055 - Updated python-pip packages fix security vulnerability
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-5752 Description Mercurial configuration injectable in repo revision when installing via pip. (CVE-2023-5752) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-5752 Description Mercurial configuration injectable in repo revision when installing via pip. (CVE-2023-5752) References
- https://bugs.mageia.org/show_bug.cgi?id=33542
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LNQOIWP4YVW27J2PSFKW5GCWPMU7ZATV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5752
- python-pip-23.0.1-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0054 - Updated python-twisted packages fix security vulnerabilities
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46137 , CVE-2024-41671 , CVE-2024-41810 Description Twisted.web has disordered HTTP pipeline response. (CVE-2023-46137) Twisted.web has disordered HTTP pipeline response. (CVE-2024-41671) HTML injection in HTTP redirect body. (CVE-2024-41810) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46137 , CVE-2024-41671 , CVE-2024-41810 Description Twisted.web has disordered HTTP pipeline response. (CVE-2023-46137) Twisted.web has disordered HTTP pipeline response. (CVE-2024-41671) HTML injection in HTTP redirect body. (CVE-2024-41810) References
- https://bugs.mageia.org/show_bug.cgi?id=33807
- https://ubuntu.com/security/notices/USN-6575-1
- https://ubuntu.com/security/notices/USN-6988-1
- https://ubuntu.com/security/notices/USN-6988-2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41671
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41810
- python-twisted-22.10.0-2.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0053 - Updated python-waitress packages fix security vulnerabilities
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-49768 , CVE-2024-49769 Description Waitress has a request processing race condition in HTTP pipelining with an invalid first request. (CVE-2024-49768) Waitress has a denial of service leading to high CPU usage/resource exhaustion. (CVE-2024-49769) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-49768 , CVE-2024-49769 Description Waitress has a request processing race condition in HTTP pipelining with an invalid first request. (CVE-2024-49768) Waitress has a denial of service leading to high CPU usage/resource exhaustion. (CVE-2024-49769) References
- https://bugs.mageia.org/show_bug.cgi?id=33819
- https://lists.suse.com/pipermail/sle-security-updates/2024-November/019754.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49769
- python-waitress-2.1.2-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0052 - Updated python-ansible-core packages fix security vulnerabilities
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-8775 , CVE-2024-9902 , CVE-2024-11079 Description Exposure of sensitive information in Ansible vault files due to improper logging. (CVE-2024-8775) Ansible-core user may read/write unauthorized content. (CVE-2024-9902) Unsafe tagging bypass via hostvars object in ansible-core. (CVE-2024-11079) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-8775 , CVE-2024-9902 , CVE-2024-11079 Description Exposure of sensitive information in Ansible vault files due to improper logging. (CVE-2024-8775) Ansible-core user may read/write unauthorized content. (CVE-2024-9902) Unsafe tagging bypass via hostvars object in ansible-core. (CVE-2024-11079) References
- https://bugs.mageia.org/show_bug.cgi?id=33828
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2Y6RFLPB54N7XR7AP7A2DEXGLBEDEQJU/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9902
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11079
- python-ansible-core-2.14.18-1.mga9
Categorías: Actualizaciones de Seguridad