Lector de Feeds

MGASA-2026-0038 - Updated libpng packages fix security vulnerability

Mageia Security - Hace 7 horas 6 minutos
Publication date: 12 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors. (CVE-2026-25646) References SRPMS 9/core
  • libpng-1.6.38-1.4.mga9

MGASA-2026-0037 - Updated xrdp packages fix security vulnerability

Mageia Security - 11 Febrero, 2026 - 18:56
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68670 Description xrdp improperly checks bounds of domain string length, which leads to Stack-based Buffer Overflow. (CVE-2025-68670) References SRPMS 9/core
  • xrdp-0.9.23.1-1.2.mga9

MGASA-2026-0036 - Updated thunderbird packages fix security vulnerability

Mageia Security - 11 Febrero, 2026 - 18:56
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0818 Description CSS-based exfiltration of the content from partially encrypted emails when allowing remote content. (CVE-2026-0818) References SRPMS 9/core
  • thunderbird-140.7.1-1.mga9
  • thunderbird-l10n-140.7.1-1.mga9

MGASA-2026-0035 - Updated golang packages fix security vulnerabilities

Mageia Security - 11 Febrero, 2026 - 18:56
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61726 , CVE-2025-61728 , CVE-2025-61730 , CVE-2025-61731 , CVE-2025-61732 , CVE-2025-68119 , CVE-2025-68121 Description net/http: memory exhaustion in Request.ParseForm. (CVE-2025-61726) archive/zip: denial of service when parsing arbitrary ZIP archives. (CVE-2025-61728) crypto/tls: handshake messages may be processed at the incorrect encryption level. (CVE-2025-61730) cmd/go: bypass of flag sanitization can lead to arbitrary code execution. (CVE-2025-61731) Potential code smuggling via doc comments in cmd/cgo. (CVE-2025-61732) cmd/go: unexpected code execution when invoking toolchain. (CVE-2025-68119) crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain. (CVE-2025-68121) References SRPMS 9/core
  • golang-1.24.13-1.mga9

Talk:Persistent live systems

Wiki Mageia - 11 Febrero, 2026 - 10:38

← Older revision Revision as of 09:38, 11 February 2026 Line 14: Line 14:     [[User:Nikos5446]] [[User:Nikos5446]]  +----  +Interesting.  If Firejail have a forum, I think that is a good place to discuss how to solve the issue of containing an app from "disk" storage, but still save (and read) files user specify.  +  +Another thing, not related to firejail, I have been thinking about regarding minimising write and read bandwidh to the USB, is to somehow make the storage compressed.  The Live ISO itself is.  +  +Myself have no time to investigate, I just air ideas :-)  +  +[[User:Morgano]]  ---- ----    Morgano
Categorías: Wiki de Mageia

File:Commands.txt

Wiki Mageia - 11 Febrero, 2026 - 09:33

Nikos5446 uploaded File:Commands.txt various commands

New page

== Summary ==
various commands Nikos5446
Categorías: Wiki de Mageia

Talk:Persistent live systems

Wiki Mageia - 11 Febrero, 2026 - 08:14

"firejail --private", how to save files

← Older revision Revision as of 07:14, 11 February 2026 Line 3: Line 3:     /Morgan /Morgan  +----  +More on firejail...     +I don't know if this is a bug, or a feature, but I have managed to save files while in {{cmd|firejail --private}} mode:  +  ++ As root, using your file manager, create a directory in /opt/. For example...  + /opt/temp  ++ Again as root, set the owner and group of this "/temp" directory to be your USERNAME (not root) under which you run firejail. Now you should be able to save something there.  +  +  +[[User:Nikos5446]]  ---- ----    Nikos5446
Categorías: Wiki de Mageia
Feed