| Summary: | mbedtls new security issue CVE-2024-28960 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Nicolas Salguero <nicolas.salguero> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, dan, herman.viaene, sysadmin-bugs |
| Version: | 9 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA9-64-OK | ||
| Source RPM: | mbedtls-2.28.7-1.mga9.src.rpm | CVE: | CVE-2024-28960 |
| Status comment: | |||
|
Description
Nicolas Salguero
2024-04-22 10:24:45 CEST
Nicolas Salguero
2024-04-22 10:25:12 CEST
CVE:
(none) =>
CVE-2024-28960 Suggested advisory: ======================== The updated packages fix a security vulnerability: An issue was discovered in Mbed TLS 2.18.0 through 2.28.x before 2.28.8 and 3.x before 3.6.0, and Mbed Crypto. The PSA Crypto API mishandles shared memory. (CVE-2024-28960) References: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6UZNBMKYEV2J5DI7R4BQGL472V7X3WJY/ ======================== Updated packages in core/updates_testing: ======================== lib(64)mbedcrypto7-2.28.8-1.mga9 lib(64)mbedtls14-2.28.8-1.mga9 lib(64)mbedtls-devel-2.28.8-1.mga9 lib(64)mbedx509_1-2.28.8-1.mga9 mbedtls-2.28.8-1.mga9 from SRPM: mbedtls-2.28.8-1.mga9.src.rpm Version:
Cauldron =>
9
katnatek
2024-04-22 21:22:38 CEST
Keywords:
(none) =>
advisory MGA9-64 Plasma Wayland on HP-Pavillion. No installation issues. Repeated tests as in bug 31058 Comment 3: hiawatha runs OK and answsers with its webpage, godot let me download some demo and move an object around. OK for me. Whiteboard:
(none) =>
MGA9-64-OK
katnatek
2024-04-24 04:00:07 CEST
CC:
(none) =>
andrewsfarm Validating. Keywords:
(none) =>
validated_update This was pushed to updates while Bugzilla was down. https://advisories.mageia.org/MGASA-2024-0146.html Resolution:
(none) =>
FIXED An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0146.html |