Lector de Feeds
MGASA-2026-0038 - Updated libpng packages fix security vulnerability
Publication date: 12 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors. (CVE-2026-25646) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description Heap buffer overflow in png_set_quantize when called with no histogram and a palette larger than twice the requested maximum number of colors. (CVE-2026-25646) References
- https://bugs.mageia.org/show_bug.cgi?id=35115
- https://www.openwall.com/lists/oss-security/2026/02/09/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646
- libpng-1.6.38-1.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0037 - Updated xrdp packages fix security vulnerability
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68670 Description xrdp improperly checks bounds of domain string length, which leads to Stack-based Buffer Overflow. (CVE-2025-68670) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68670 Description xrdp improperly checks bounds of domain string length, which leads to Stack-based Buffer Overflow. (CVE-2025-68670) References
- https://bugs.mageia.org/show_bug.cgi?id=35111
- https://lists.debian.org/debian-security-announce/2026/msg00032.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68670
- xrdp-0.9.23.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0036 - Updated thunderbird packages fix security vulnerability
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0818 Description CSS-based exfiltration of the content from partially encrypted emails when allowing remote content. (CVE-2026-0818) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0818 Description CSS-based exfiltration of the content from partially encrypted emails when allowing remote content. (CVE-2026-0818) References
- https://bugs.mageia.org/show_bug.cgi?id=35100
- https://www.thunderbird.net/en-US/thunderbird/140.7.1esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-08/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0818
- thunderbird-140.7.1-1.mga9
- thunderbird-l10n-140.7.1-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0035 - Updated golang packages fix security vulnerabilities
Publication date: 11 Feb 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61726 , CVE-2025-61728 , CVE-2025-61730 , CVE-2025-61731 , CVE-2025-61732 , CVE-2025-68119 , CVE-2025-68121 Description net/http: memory exhaustion in Request.ParseForm. (CVE-2025-61726) archive/zip: denial of service when parsing arbitrary ZIP archives. (CVE-2025-61728) crypto/tls: handshake messages may be processed at the incorrect encryption level. (CVE-2025-61730) cmd/go: bypass of flag sanitization can lead to arbitrary code execution. (CVE-2025-61731) Potential code smuggling via doc comments in cmd/cgo. (CVE-2025-61732) cmd/go: unexpected code execution when invoking toolchain. (CVE-2025-68119) crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain. (CVE-2025-68121) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61726 , CVE-2025-61728 , CVE-2025-61730 , CVE-2025-61731 , CVE-2025-61732 , CVE-2025-68119 , CVE-2025-68121 Description net/http: memory exhaustion in Request.ParseForm. (CVE-2025-61726) archive/zip: denial of service when parsing arbitrary ZIP archives. (CVE-2025-61728) crypto/tls: handshake messages may be processed at the incorrect encryption level. (CVE-2025-61730) cmd/go: bypass of flag sanitization can lead to arbitrary code execution. (CVE-2025-61731) Potential code smuggling via doc comments in cmd/cgo. (CVE-2025-61732) cmd/go: unexpected code execution when invoking toolchain. (CVE-2025-68119) crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain. (CVE-2025-68121) References
- https://bugs.mageia.org/show_bug.cgi?id=35007
- https://www.openwall.com/lists/oss-security/2026/01/15/3
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc
- https://openwall.com/lists/oss-security/2026/01/17/2
- https://openwall.com/lists/oss-security/2026/01/17/3
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NH2ETRY5I4475P2G36TA426YNBGAZLJM/
- https://www.openwall.com/lists/oss-security/2026/02/07/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121
- golang-1.24.13-1.mga9
Categorías: Actualizaciones de Seguridad
Talk:Persistent live systems
← Older revision
Revision as of 09:38, 11 February 2026
Line 14:
Line 14:
[[User:Nikos5446]] [[User:Nikos5446]]
+----
+Interesting. If Firejail have a forum, I think that is a good place to discuss how to solve the issue of containing an app from "disk" storage, but still save (and read) files user specify.
+
+Another thing, not related to firejail, I have been thinking about regarding minimising write and read bandwidh to the USB, is to somehow make the storage compressed. The Live ISO itself is.
+
+Myself have no time to investigate, I just air ideas :-)
+
+[[User:Morgano]]
---- ----
Morgano
Categorías: Wiki de Mageia
File:Commands.txt
Nikos5446 uploaded File:Commands.txt various commands
New page
== Summary ==various commands Nikos5446
Categorías: Wiki de Mageia
Talk:Persistent live systems
"firejail --private", how to save files
← Older revision Revision as of 07:14, 11 February 2026 Line 3: Line 3: /Morgan /Morgan +---- +More on firejail... +I don't know if this is a bug, or a feature, but I have managed to save files while in {{cmd|firejail --private}} mode: + ++ As root, using your file manager, create a directory in /opt/. For example... + /opt/temp ++ Again as root, set the owner and group of this "/temp" directory to be your USERNAME (not root) under which you run firejail. Now you should be able to save something there. + + +[[User:Nikos5446]] ---- ---- Nikos5446
Categorías: Wiki de Mageia




