CVE-2024-2169 was announced here: https://www.openwall.com/lists/oss-security/2024/09/04/1
Whiteboard: (none) => MGA9TOOSource RPM: (none) => webmin-2.105-1.mga10.src.rpmCVE: (none) => CVE-2024-2169Status comment: (none) => Fixed upstream in 2.202
@ Stig There is no registered maintainer for webmin, but you are the de facto maintainer, so assigning to you. If you don't agree, then please re-assign to all packagers collectively or to bugsquad.
CC: (none) => marja11URL: (none) => https://www.openwall.com/lists/oss-security/2024/09/04/1Assignee: bugsquad => smelror
Advisory ======== Webmin has been updated to the latest version to fix CVE-2024-2169. CVE-2024-2169: Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources. References ========== https://www.openwall.com/lists/oss-security/2024/09/04/1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-2169 Files ===== Uploaded to core/updates_testing webmin-2.202-1.mga9 from webmin-2.202-1.mga9.src.rpm
Assignee: smelror => qa-bugsVersion: Cauldron => 9Whiteboard: MGA9TOO => (none)
Cauldron has been updated as well.
CC: (none) => smelror
Keywords: (none) => advisory
MGA9-64 server Plasma Wayland on HP-Pavillion No installation issues. Checked a number of modules mainly checking info like wifi printer, all looks OK.
Whiteboard: (none) => MGA9-64-OKCC: (none) => herman.viaene
Validating.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0290.html
Status: NEW => RESOLVEDResolution: (none) => FIXED