Critical security flaws (CVE-2025-31162 to CVE-2025-31164) found in Mageia 9's Transfig package. Learn how to patch fig2dev vulnerabilities, prevent local exploits, and secure Linux systems. Updated fixes available now.
High-Severity Security Flaws Discovered in fig2dev 3.2.9a
A series of critical vulnerabilities have been identified in fig2dev (v3.2.9a), a key component of the Transfig package in Mageia Linux 9. These flaws could allow local attackers to execute denial-of-service (DoS) attacks or potentially escalate privileges via carefully crafted input manipulation.
Detailed Vulnerability Breakdown
The following high-risk security issues have been confirmed:
CVE-2025-31162 – Floating Point Exception in
get_slopefunction, leading to application crashes.CVE-2025-31163 – Segmentation Fault via
put_patternarc, enabling system instability.CVE-2025-31164 – Heap-Buffer Overflow in
create_line_with_spline, posing potential arbitrary code execution risks.
These vulnerabilities primarily affect local users but could be exploited in multi-user environments or shared hosting setups.
Immediate Resolution: Updated Transfig Packages
Mageia has released MGASA-2025-0152, a security update patching all three flaws. Users are strongly advised to apply the patch immediately.
Affected Package:
transfig-3.2.9a-1.mga9 (Updated version available in Mageia 9 Core Repository)
Why This Matters for Linux Administrators & Enterprises
Security Compliance: Unpatched systems may violate enterprise security policies.
System Stability: Exploits can lead to service disruptions in development environments.
Reputation Risk: Vulnerable servers could be flagged in automated security scans.
How to Protect Your System
Update Immediately: Run
sudo urpmi --auto-update transfigMonitor Logs: Check for unusual local user activity.
Apply Defense-in-Depth: Use SELinux/AppArmor to restrict fig2dev execution.
Additional Resources
Final Recommendations
For sysadmins managing Mageia servers, this update should be treated as urgent. Delaying patches increases exposure to local privilege escalation and service downtime.

Nenhum comentário:
Postar um comentário