Lector de Feeds
MGASA-2024-0296 - Updated microcode package fix security vulnerabilities
Publication date: 11 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-42667 , CVE-2023-49141 , CVE-2024-24853 , CVE-2024-24980 , CVE-2024-25939 Description Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2023-42667) Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2023-49141) Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24853) Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24980) Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access. (CVE-2024-25939) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-42667 , CVE-2023-49141 , CVE-2024-24853 , CVE-2024-24980 , CVE-2024-25939 Description Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2023-42667) Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2023-49141) Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24853) Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24980) Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access. (CVE-2024-25939) References
- https://bugs.mageia.org/show_bug.cgi?id=33511
- https://openwall.com/lists/oss-security/2024/08/16/3
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939
- microcode-0.20240813-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2024-0295 - Updated libpcap packages fix security vulnerabilities
Publication date: 11 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-7256 , CVE-2024-8006 Description In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. (CVE-2023-7256) Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence. (CVE-2024-8006) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-7256 , CVE-2024-8006 Description In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. (CVE-2023-7256) Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence. (CVE-2024-8006) References
- https://bugs.mageia.org/show_bug.cgi?id=33537
- https://lwn.net/Articles/988357/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7256
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8006
- libpcap-1.10.5-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0294 - Updated expat packages fix security vulnerabilities
Publication date: 11 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-45490 , CVE-2024-45491 , CVE-2024-45492 Description An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. (CVE-2024-45490) An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). (CVE-2024-45491) An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). (CVE-2024-45492) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-45490 , CVE-2024-45491 , CVE-2024-45492 Description An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. (CVE-2024-45490) An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX). (CVE-2024-45491) An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX). (CVE-2024-45492) References
- https://bugs.mageia.org/show_bug.cgi?id=33547
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.351556
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
- expat-2.6.3-1.mga9
Categorías: Actualizaciones de Seguridad
opencpn-o-charts-plugin-2.0.10.0-1.mga10.nonfree.src.rpm
In Mageia/cauldron/i586:
This is a plugin for OpenCPN [1] providing support for encrypted charts
available from o-charts.org [2]. The plugin supports purchase, downloading
and rendering of these charts.
-[1] https://www.opencpn.org
-[2] http://o-charts.org
This package is in the nonfree repository as it contains a proprietary binary.
See README.md in the package doc directory for the license information.
Categorías: RPMs
opencpn-o-charts-plugin-2.0.10.0-1.mga10.nonfree.src.rpm
In Mageia/cauldron/x86_64:
This is a plugin for OpenCPN [1] providing support for encrypted charts
available from o-charts.org [2]. The plugin supports purchase, downloading
and rendering of these charts.
-[1] https://www.opencpn.org
-[2] http://o-charts.org
This package is in the nonfree repository as it contains a proprietary binary.
See README.md in the package doc directory for the license information.
Categorías: RPMs
microcode-0.20240813-1.mga10.nonfree.src.rpm
In Mageia/cauldron/i586:
Since PentiumPro, Intel CPU are made of a RISC chip and of a microcode whose
purpose is to decompose "old" ia32 instruction into new RISC ones.
P6 family is concerned: PPro, PII, Celeron, PIII, Celeron2.
Recent kernels have the ability to update this microcode.
The microcode update is volatile and needs to be uploaded on each system
boot, i.e. it doesn't reflash your cpu permanently.
Reboot and it reverts back to the old microcode.
This package contains microcode for Intel and Amd CPUs.
Categorías: RPMs
microcode-0.20240813-1.mga10.nonfree.src.rpm
In Mageia/cauldron/x86_64:
Since PentiumPro, Intel CPU are made of a RISC chip and of a microcode whose
purpose is to decompose "old" ia32 instruction into new RISC ones.
P6 family is concerned: PPro, PII, Celeron, PIII, Celeron2.
Recent kernels have the ability to update this microcode.
The microcode update is volatile and needs to be uploaded on each system
boot, i.e. it doesn't reflash your cpu permanently.
Reboot and it reverts back to the old microcode.
This package contains microcode for Intel and Amd CPUs.
Categorías: RPMs
alsa-sof-firmware-2024.06-1.mga10.nonfree.src.rpm
In Mageia/cauldron/x86_64:
This package contains the firmware binaries for the Sound Open Firmware project.
Categorías: RPMs
alsa-sof-firmware-2024.06-1.mga10.nonfree.src.rpm
In Mageia/cauldron/i586:
This package contains the firmware binaries for the Sound Open Firmware project.
Categorías: RPMs
nvidia-newfeature-560.35.03-1.mga10.nonfree.src.rpm
In Mageia/cauldron/i586:
Source package of the current NVIDIA proprietary driver. Binary
packages are named x11-driver-video-nvidia-newfeature.
Categorías: RPMs
nvidia-newfeature-560.35.03-1.mga10.nonfree.src.rpm
In Mageia/cauldron/x86_64:
Source package of the current NVIDIA proprietary driver. Binary
packages are named x11-driver-video-nvidia-newfeature.
Categorías: RPMs
nvidia-current-550.107.02-2.mga10.nonfree.src.rpm
In Mageia/cauldron/i586:
Source package of the current NVIDIA proprietary driver. Binary
packages are named x11-driver-video-nvidia-current.
Categorías: RPMs
nvidia-current-550.107.02-2.mga10.nonfree.src.rpm
In Mageia/cauldron/x86_64:
Source package of the current NVIDIA proprietary driver. Binary
packages are named x11-driver-video-nvidia-current.
Categorías: RPMs
spirv-tools-2024.3-2.mga10.src.rpm
In Mageia/cauldron/x86_64:
The package includes an assembler, binary module parser,
disassembler, and validator for SPIR-V.
Categorías: RPMs
spirv-tools-2024.3-2.mga10.src.rpm
In Mageia/cauldron/i586:
The package includes an assembler, binary module parser,
disassembler, and validator for SPIR-V.
Categorías: RPMs