Lector de Feeds

MGASA-2025-0063 - Updated ofono packages fix security vulnerabilities

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-2794 , CVE-2023-4232 , CVE-2023-4233 , CVE-2023-4234 , CVE-2023-4235 Description Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver() function. (CVE-2023-2794) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_status_report() function. (CVE-2023-4232) Sms decoder stack-based buffer overflow remote code execution vulnerability within the sms_decode_address_field(). (CVE-2023-4233) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_submit_report() function. (CVE-2023-4234) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver_report() function. (CVE-2023-4235) References SRPMS 9/core
  • ofono-2.1-1.1.mga9

MGASA-2025-0062 - Updated perl-Net-OAuth, perl-Crypt-URandom & perl-Module-Build packages fix security vulnerability

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22376 Description In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. (CVE-2025-22376) References SRPMS 9/core
  • perl-Net-OAuth-0.300.0-1.mga9
  • perl-Crypt-URandom-0.370.0-1.mga9
  • perl-Module-Build-0.423.400-1.mga9

MGASA-2025-0061 - Updated ark packages fix security vulnerability

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57966 Description A security issue exists in Ark where a maliciously crafted archive containing file paths beginning with "/" allows files to be extracted to locations outside the intended directory. References SRPMS 9/core
  • ark-23.04.3-1.1.mga9

Security Updates

Wiki Mageia - 13 Febrero, 2025 - 09:21

‎Releasing the update: Mention advisories.mageia.org

← Older revision Revision as of 08:21, 13 February 2025 Line 399: Line 399:  Once the update candidate has been validated (i.e., approved) by the QA Team, a member of the Once the update candidate has been validated (i.e., approved) by the QA Team, a member of the  Sysadmin Team [[#42|[42]]] will see that the updated packages get pushed to the mirrors and that the advisory is Sysadmin Team [[#42|[42]]] will see that the updated packages get pushed to the mirrors and that the advisory is −posted to the website and e-mailed to the updates-announce mailing list [[#43|[43]]] . Every Linux distribution has+posted to https://advisories.mageia.org/ and e-mailed to the updates-announce mailing list [[#43|[43]]] . Every Linux distribution has −a similar mailing list for update announcements. Varying amounts of automation and manual work are+a similar mailing list for update announcements. The advisories will also be picked eventually up by aggregators like https://osv.dev/. −involved in this last stage of the process for different Linux distributions.+Varying amounts of automation and manual work are involved in this last stage of the process for each separate Linux distributions.     == Other considerations == == Other considerations == Danf
Categorías: Wiki de Mageia

MGASA-2025-0060 - Updated python-tornado packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 22:31
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52804 Description Tornado has an HTTP cookie parsing DoS vulnerability. (CVE-2024-52804) References SRPMS 9/core
  • python-tornado-6.3.2-1.1.mga9

MGASA-2025-0059 - Updated php-tcpdf packages fix security vulnerabilities

Mageia Security - 12 Febrero, 2025 - 22:31
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56519 , CVE-2024-56521 , CVE-2024-56522 , CVE-2024-56527 Description An issue was discovered in TCPDF before 6.8.0. setSVGStyles does not sanitize the SVG font-family attribute. (CVE-2024-56519) An issue was discovered in TCPDF before 6.8.0. If libcurl is used, CURLOPT_SSL_VERIFYHOST and CURLOPT_SSL_VERIFYPEER are set unsafely. (CVE-2024-56521) An issue was discovered in TCPDF before 6.8.0. unserializeTCPDFtag uses != (aka loose comparison) and does not use a constant-time function to compare TCPDF tag hashes. (CVE-2024-56522) An issue was discovered in TCPDF before 6.8.0. The Error function lacks an htmlspecialchars call for the error message. (CVE-2024-56527) References SRPMS 9/core
  • php-tcpdf-6.5.0-1.3.mga9

SOP Adding user to group

Wiki Mageia - 12 Febrero, 2025 - 20:55

‎See also: Link to LDAP_Groups

← Older revision Revision as of 19:55, 12 February 2025 (One intermediate revision by the same user not shown)Line 37: Line 37:        [root@duvel ~]# ldapmodify -H ldaps://ldap.mageia.org -D uid=$USER,ou=People,dc=mageia,dc=org -W -f removeowner.ldif    [root@duvel ~]# ldapmodify -H ldaps://ldap.mageia.org -D uid=$USER,ou=People,dc=mageia,dc=org -W -f removeowner.ldif  +  += See also =  +* [https://people.mageia.org/g/ Active groups]  +* [[LDAP Groups]] needed for different roles     [[Category:Sysadmin]] [[Category:Sysadmin]] Danf
Categorías: Wiki de Mageia

Sysadmin Tasks

Wiki Mageia - 12 Febrero, 2025 - 20:43

‎Access/Identity: Bugzilla admins

← Older revision Revision as of 19:43, 12 February 2025 Line 23: Line 23:  * [[SOP Sysadmin access revocation]] * [[SOP Sysadmin access revocation]]  * [[SOP Adding groups]] * [[SOP Adding groups]] −* Blocking users in Bugzilla due to spammy behaviour+* Blocking users in Bugzilla due to spammy behaviour ''(this is currently done by Bugzilla admins, not Sysadmins)''  * Unlock user account * Unlock user account  * [[SOP robot credentials renewal]] * [[SOP robot credentials renewal]] Danf
Categorías: Wiki de Mageia

MGASA-2025-0058 - Updated subversion packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 19:29
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46901 Description Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. (CVE-2024-46901) References SRPMS 9/core
  • subversion-1.14.2-2.1.mga9

MGASA-2025-0057 - Updated ffmpeg packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 19:29
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49528 Description A buffer overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via af_dialoguenhance.c:261:5 in the de_stereo component. (CVE-2023-49528) References SRPMS 9/core
  • ffmpeg-5.1.6-1.1.mga9
9/tainted
  • ffmpeg-5.1.6-1.1.mga9.tainted

MGASA-2025-0056 - Updated python-setuptools packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-6345 Description Remote Code Execution in pypa/setuptools. (CVE-2024-6345) References SRPMS 9/core
  • python-setuptools-65.5.0-3.1.mga9

MGASA-2025-0055 - Updated python-pip packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-5752 Description Mercurial configuration injectable in repo revision when installing via pip. (CVE-2023-5752) References SRPMS 9/core
  • python-pip-23.0.1-1.1.mga9

MGASA-2025-0054 - Updated python-twisted packages fix security vulnerabilities

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46137 , CVE-2024-41671 , CVE-2024-41810 Description Twisted.web has disordered HTTP pipeline response. (CVE-2023-46137) Twisted.web has disordered HTTP pipeline response. (CVE-2024-41671) HTML injection in HTTP redirect body. (CVE-2024-41810) References SRPMS 9/core
  • python-twisted-22.10.0-2.1.mga9

MGASA-2025-0053 - Updated python-waitress packages fix security vulnerabilities

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-49768 , CVE-2024-49769 Description Waitress has a request processing race condition in HTTP pipelining with an invalid first request. (CVE-2024-49768) Waitress has a denial of service leading to high CPU usage/resource exhaustion. (CVE-2024-49769) References SRPMS 9/core
  • python-waitress-2.1.2-1.1.mga9

MGASA-2025-0052 - Updated python-ansible-core packages fix security vulnerabilities

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-8775 , CVE-2024-9902 , CVE-2024-11079 Description Exposure of sensitive information in Ansible vault files due to improper logging. (CVE-2024-8775) Ansible-core user may read/write unauthorized content. (CVE-2024-9902) Unsafe tagging bypass via hostvars object in ansible-core. (CVE-2024-11079) References SRPMS 9/core
  • python-ansible-core-2.14.18-1.mga9

MGASA-2025-0051 - Updated nginx packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-23419 Description TLS Session Resumption Vulnerability. (CVE-2025-23419) References SRPMS 9/core
  • nginx-1.26.3-1.mga9

MGASA-2025-0050 - Updated python-jinja2 packages fix security vulnerability

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56326 Description Jinja has a sandbox breakout through an indirect reference to a format method. (CVE-2024-56326) References SRPMS 9/core
  • python-jinja2-3.1.5-1.mga9

MGASA-2025-0049 - Updated calibre packages fix security vulnerabilities

Mageia Security - 12 Febrero, 2025 - 07:37
Publication date: 12 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-46303 , CVE-2024-6781 , CVE-2024-6782 , CVE-2024-7008 , CVE-2024-7009 Description link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root. (CVE-2023-46303) Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read. (CVE-2024-6781) Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. (CVE-2024-6782) Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting. (CVE-2024-7008) Unsanitized user-input in Calibre <= 7.15.0 allow users with permissions to perform full-text searches to achieve SQL injection on the SQLite database. (CVE-2024-7009) References SRPMS 9/core
  • calibre-6.17.0-1.1.mga9
Feed