SUSE has issued an advisory on March 31: https://lists.suse.com/pipermail/sle-security-updates/2023-March/014292.html Mageia 8 is also affected.
Whiteboard: (none) => MGA8TOO
disputed upstream: https://sourceware.org/bugzilla/show_bug.cgi?id=29444#c9
Fixed in Cauldron since 2.36-36.mga9 I wont push to mga8 as upstream has disputed it and reported it to mitre, and pointed out that: " My point is that this step above needs specific knowledge of the address space *and* control over execution to make this happen. Without such control, there's no exploitation vector. " so basically impossible to exploit in reality... I've queued the fix in svn for mga8 if there is something else that needs fixing
QA Contact: security => (none)Resolution: (none) => FIXEDSeverity: major => normalWhiteboard: MGA8TOO => (none)Status: NEW => RESOLVEDComponent: Security => RPM Packages