MGASA-2024-0364 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-21-openjdk & java-latest-openjdk packages fix security vulnerabilities

Publication date: 13 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0364.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2023-48161,
     CVE-2024-21208,
     CVE-2024-21210,
     CVE-2024-21217,
     CVE-2024-21235

giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB
Function. (CVE-2023-48161)
Array indexing integer overflow. (CVE-2024-21210)
HTTP client improper handling of maxHeaderSize. (CVE-2024-21208)
Unbounded allocation leads to out-of-memory error. (CVE-2024-21217)
Integer conversion error leads to incorrect range check.
(CVE-2024-21235)

References:
- https://bugs.mageia.org/show_bug.cgi?id=33648
- https://access.redhat.com/errata/RHSA-2024:8117
- https://access.redhat.com/errata/RHSA-2024:8121
- https://access.redhat.com/errata/RHSA-2024:8124
- https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixJAVA
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235

SRPMS:
- 9/core/java-17-openjdk-17.0.13.0.11-1.mga9
- 9/core/java-11-openjdk-11.0.25.0.9-1.mga9
- 9/core/java-1.8.0-openjdk-1.8.0.432.b06-1.mga9
- 9/core/java-latest-openjdk-23.0.1.0.11-2.rolling.1.mga9

Mageia 2024-0364: java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-21-openjdk & java-latest-openjdk Security Advisory Updates

giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function

Summary

giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function. (CVE-2023-48161) Array indexing integer overflow. (CVE-2024-21210) HTTP client improper handling of maxHeaderSize. (CVE-2024-21208) Unbounded allocation leads to out-of-memory error. (CVE-2024-21217) Integer conversion error leads to incorrect range check. (CVE-2024-21235)

References

- https://bugs.mageia.org/show_bug.cgi?id=33648

- https://access.redhat.com/errata/RHSA-2024:8117

- https://access.redhat.com/errata/RHSA-2024:8121

- https://access.redhat.com/errata/RHSA-2024:8124

- https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixJAVA

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235

Resolution

MGASA-2024-0364 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, java-21-openjdk & java-latest-openjdk packages fix security vulnerabilities

SRPMS

- 9/core/java-17-openjdk-17.0.13.0.11-1.mga9

- 9/core/java-11-openjdk-11.0.25.0.9-1.mga9

- 9/core/java-1.8.0-openjdk-1.8.0.432.b06-1.mga9

- 9/core/java-latest-openjdk-23.0.1.0.11-2.rolling.1.mga9

Severity
Publication date: 13 Nov 2024
URL: https://advisories.mageia.org/MGASA-2024-0364.html
Type: security
CVE: CVE-2023-48161, CVE-2024-21208, CVE-2024-21210, CVE-2024-21217, CVE-2024-21235

Related News