| Summary: | libgsasl new security issue CVE-2022-2469 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | libgsasl-1.8.1-2.mga8.src.rpm | CVE: | CVE-2022-2469 |
| Status comment: | |||
|
Description
David Walser
2022-07-25 17:25:09 CEST
David Walser
2022-07-25 17:25:19 CEST
Status comment:
(none) =>
Fixed upstream in 2.0.1 Assigning this update globally since 'libgsasl' is a pkg seldom touched, and with no particular associated packager. Assignee:
bugsquad =>
pkg-bugs Suggested advisory: ======================== The updated packages fix a security vulnerability: GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client. (CVE-2022-2469) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2469 https://www.debian.org/security/2022/dsa-5189 ======================== Updated packages in core/updates_testing: ======================== lib(64)gsasl7-1.8.1-2.1.mga8 lib(64)gsasl-devel-1.8.1-2.1.mga8 libgsasl-1.8.1-2.1.mga8 from SRPM: libgsasl-1.8.1-2.1.mga8.src.rpm Version:
Cauldron =>
8 MGA8-64 Plasma o, Acer Aspire 5253 No installation issues, no previous updates. # urpmq --whatrequires libgsasl libgsasl [root@mach7 ~]# urpmq --whatrequires lib64gsasl7 lib64gsasl-devel lib64gsasl-devel lib64gsasl7 lib64infinity0.7_0 lib64jreen-qt5_1 lib64jreen1 lib64vmime0 pokerth pokerth-server So installed and lauched pokerth and pushe some buttons in the game. $ strace -o libgsasl.txt pokerth found ref. in trace file: openat(AT_FDCWD, "/lib64/libgsasl.so.7", O_RDONLY|O_CLOEXEC) = 3 That'a as far as I go. CC:
(none) =>
herman.viaene Validating. Advisory in Comment 2. CC:
(none) =>
andrewsfarm, sysadmin-bugs
Dave Hodgins
2022-08-24 23:12:46 CEST
Keywords:
(none) =>
advisory An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0298.html Resolution:
(none) =>
FIXED |