MGASA-2024-0295

Source
https://advisories.mageia.org/MGASA-2024-0295.html
Import Source
https://advisories.mageia.org/MGASA-2024-0295.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0295
Related
Published
2024-09-11T20:42:44Z
Modified
2024-09-11T20:20:58Z
Summary
Updated libpcap packages fix security vulnerabilities
Details

In affected libpcap versions during the setup of a remote packet capture the internal function sockinitaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. (CVE-2023-7256) Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcapfindalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence. (CVE-2024-8006)

References
Credits

Affected packages

Mageia:9 / libpcap

Package

Name
libpcap
Purl
pkg:rpm/mageia/libpcap?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.5-1.mga9

Ecosystem specific

{
    "section": "core"
}