Mageia Linux Distribution - Security Advisories - Results from #63 ...

Mageia Linux Distribution

Mageia 2022-0406: php security update


GD - Fixed bug #81739: OOB read due to insufficient input validation in imageloadfont(). Hash - Fixed bug #81738: buffer overflow in hash_update() on long parameter. Session - Fixed bug GH-9583 (session_create_id() fails with user defined

Mageia 2022-0405: curl security update


When doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request which used that callback. (CVE-2022-32221)

Mageia 2022-0403: nbd security update


It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495).

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.