Mageia Linux Distribution - Security Advisories - Page 5 - Results ...

Mageia Linux Distribution - Page 5

Mageia 2023-0158: avahi security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fixes crash on some invalid DBus calls. (CVE-2023-1981) References: - https://bugs.mageia.org/show_bug.cgi?id=31811 - https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it. document.getElementById('cloak9aa1c1623f06978ee342ab58eeabea6c').innerHTML = ''; var prefix = 'ma' + 'il' + 'to'; var path = 'hr' + 'ef' + '='; var addy9aa1c1623f06978ee342ab58eeabea6c = 'package-announce' + '@'; addy9aa1c1623f06978ee342ab58eeabea6c = addy9aa1c1623f06978ee342ab58eeabea6c + 'lists' + '.' + 'fedoraproject' + '.' + 'org'; var addy_text9aa1c1623f06978ee342ab58eeabea6c = 'package-announce' + '@' + 'lists' + '.' + 'fedoraproject' + '.' + 'org';document.getElementById('cloak9aa1c1623f06978ee342ab58eeabea6c').innerHTML += ''+addy_text9aa1c1623f06978ee342ab58eeabea6c+''; /thread/VCTAFULPERZVYFFVHM7IEYXYRNHQDJAU/

Mageia 2023-0157: libxml2 security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the

Mageia 2023-0151: openimageio security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A heap out-of-bounds read vulnerability exists in the RLA format parser of OpenImageIO master-branch-9aeece7a and v2.3.19.0. More specifically, in the way run-length encoded byte spans are handled. A malformed RLA file can lead to an out-of-bounds read of heap metadata which can result in sensitive information leak. (CVE-2022-36354)

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.