Lector de Feeds
Mageia 9 Errata
Notes: Some translations of this page lag in being updated.
← Older revision Revision as of 13:16, 18 January 2025 Line 19: Line 19: '' Note that we will be updating issues from the bugtracker, i.e [https://bugs.mageia.org/buglist.cgi?keywords=FOR_ERRATA9 FOR_ERRATA9], [https://bugs.mageia.org/buglist.cgi?keywords=IN_ERRATA9 IN_ERRATA9], [https://bugs.mageia.org/buglist.cgi?keywords=FOR_RELEASENOTES9 FOR_RELEASENOTES9] as they are decided. We try to keep it rather relaxed, but notorious even so, and each issue must be short and effectively described to not make the whole page too big. So, to-the-point descriptions of symptom and possible remedy. Sometime a link directly to a bug comment where a good workaround is described, or other resource that may help.'' '' Note that we will be updating issues from the bugtracker, i.e [https://bugs.mageia.org/buglist.cgi?keywords=FOR_ERRATA9 FOR_ERRATA9], [https://bugs.mageia.org/buglist.cgi?keywords=IN_ERRATA9 IN_ERRATA9], [https://bugs.mageia.org/buglist.cgi?keywords=FOR_RELEASENOTES9 FOR_RELEASENOTES9] as they are decided. We try to keep it rather relaxed, but notorious even so, and each issue must be short and effectively described to not make the whole page too big. So, to-the-point descriptions of symptom and possible remedy. Sometime a link directly to a bug comment where a good workaround is described, or other resource that may help.'' + +This English version errata is the master, German version usually kept updated, other languages often lag and miss being kept updated. <br> <br> + == Boot == == Boot == MorganoQA-Team-de
Mageia 9 Errata-de
Verwenden von DNF-de
MGASA-2025-0013 - Updated openafs packages fix security vulnerabilities
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-10394 , CVE-2024-10396 , CVE-2024-10397 Description A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix client. (CVE-2024-10394) An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash. (CVE-2024-10396) A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code. (CVE-2024-10397) References
- https://bugs.mageia.org/show_bug.cgi?id=33916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397
- openafs-1.8.13.1-1.mga9
QA Team
Contact the team: IRC howto sentence
← Older revision Revision as of 09:14, 17 January 2025 Line 16: Line 16: * Subscribing to the [https://ml.mageia.org/l/info/qa-discuss QA-Discuss] mailing list and then send a mail message to it, to introduce yourself * Subscribing to the [https://ml.mageia.org/l/info/qa-discuss QA-Discuss] mailing list and then send a mail message to it, to introduce yourself −* By joining the [irc://irc.libera.chat/#mageia-qa #mageia-qa] IRC channel on libera.chat+* By joining the [irc://irc.libera.chat/#mageia-qa #mageia-qa] IRC channel on libera.chat. How: web browser using https://web.libera.chat/, or an IRC client such as for example {{prog|hexchat}} : choose network Libera.Chat, and menu Server > Join a channel > #mageia-qa * Team leader : Thomas J Andrews (MageiaTJ) - andrewsfarm AT gmail dot com * Team leader : Thomas J Andrews (MageiaTJ) - andrewsfarm AT gmail dot com MorganoMGASA-2025-0012 - Updated openjpeg2 packages fix security vulnerabilities
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56826 , CVE-2024-56827 Description Heap buffer overflow in bin/common/color.c. (CVE-2024-56826) Heap buffer overflow in lib/openjp2/j2k.c. (CVE-2024-56827) References
- https://bugs.mageia.org/show_bug.cgi?id=33905
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWMGURRKWFOTMCKEBHYWF7HHDJSY7BTR/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XKBM37J7PMJ763EKO4IP3FLOLF4U26HW/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827
- openjpeg2-2.5.0-1.2.mga9
MGAA-2025-0004 - Updated curl packages fix bug
Type: bugfix
Affected Mageia releases : 9
Description curl update that addresses a .netrc related issue that breaks git. References SRPMS 9/core
- curl-7.88.1-4.6.mga9
MGAA-2025-0003 - Updated nvidia-cuda-toolkit-samples-bins & nvidia-cuda-toolkit packages fix bug
Type: bugfix
Affected Mageia releases : 9
Description Performances enhancements and other changes since our current version, References
- https://bugs.mageia.org/show_bug.cgi?id=33887
- https://developer.nvidia.com/blog/nvidia-cuda-toolkit-12-2-unleashes-powerful-features-for-boosting-applications/
- https://developer.nvidia.com/blog/cuda-toolkit-12-4-enhances-support-for-nvidia-grace-hopper-and-confidential-computing/
- nvidia-cuda-toolkit-samples-bins-12.4.1-1.mga9.nonfree
- nvidia-cuda-toolkit-12.4.1-1.mga9.nonfree
- cuda-z-0.11.291-11.mga9.nonfree
New laptop and Silverblue update
Figured I'd post an update on how things are going with the new laptop (HP Omnibook Ultra 14, AMD Ryzen AI 9 365 "Strix Point", for the searchers) and with Silverblue.
I managed to work around the hub issue by swapping out the fancy $300 Thunderbolt hub for a $40 USB-C hub off Amazon. This comes with limitations - you're only going to get a single 4k 60Hz external display, and limited bandwidth for anything else - but it's sufficient for my needs, and makes me regret buying the fancy hub in the first place. It seems to work 100% reliably on startup, reboot and across suspend/resume. There's still clearly something wrong with Thunderbolt handling in the kernel, but it's not my problem any more.
The poor performance of some sites in Firefox turned out to be tied to the hanging problem - I'd disabled graphics acceleration in Firefox, which helped with the hanging, but was causing the appalling performance on Google sites and others. I've now cargo-culted a set of kernel args - amdgpu.dcdebugmask=0x800 amdgpu.lockup_timeout=100000 drm.vblankoffdelay=0 - which seem to be helping; I turned graphics acceleration back on in Firefox and it hasn't started hanging again. At least, I haven't had random hangs for the last few days, and this morning I played a video on youtube and the system has not hung since then. I've no idea how bad they are for battery life, but hey, they seem to be keeping things stable. So, the system is pretty workable at this point. I've been using it full-time, haven't had to go back to the old one.
I'm also feeling better about Silverblue as a main OS this time. A lot of things seem to have got better. The toolbox container experience is pretty smooth now. I managed to get adb working inside a container by putting these udev rules in /etc/udev/rules.d. It seems like I have to kill and re-start the adb server any time the phone disconnects or reboots - usually adb would keep seeing the phone just fine across those events - but it's a minor inconvenience. I had to print something yesterday, was worried for a moment that I'd have to figure out how to get hp-setup to do its thing, but then...Silverblue saw my ancient HP printer on the network, let me print to it, and it worked, all without any manual setup at all. It seems to be working over IPP, but I'm a bit surprised, as the printer is from 2010 or 2011 and I don't think it worked before. But I'm not complaining!
I haven't had any real issues with app availability so far. All the desktop apps I need to use are available as flatpaks, and the toolbox container handles CLI stuff. I'm running Firefox (baked-in version), Evolution, gedit, ptyxis (built-in), liferea, nheko, slack and vesktop (for discord) without any trouble. LibreOffice and GIMP flatpaks also work fine. Everything's really been pretty smooth.
I do have a couple of tweaks in my bashrc (I put them in a file in ~/.bashrc.d, which is a neat invention) that other Atomic users might find useful...
if [ -n "$container" ] then alias gedit="flatpak-spawn --host /var/lib/flatpak/exports/bin/org.gnome.gedit" alias xdg-open=flatpak-xdg-open else alias gedit=/var/lib/flatpak/exports/bin/org.gnome.gedit fithe gedit aliases let me do gedit somefile either inside or outside a container, and the file just opens in my existing gedit instance. Can't really live without that. You can adapt it for anything that's a flatpak app on the host. The xdg-open alias within containers similar makes xdg-open somefile within the container do the same as it would outside the container.
So it's still early days, but I'm optimistic I'll keep this setup this time. I might try rebasing to the bootc build soon.
MGASA-2025-0011 - Updated ceph packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-48916 Description Authentication bypass in CEPH RadosGW. (CVE-2024-48916) References
- https://bugs.mageia.org/show_bug.cgi?id=33896
- https://ubuntu.com/security/notices/USN-7182-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48916
- ceph-18.1.1-1.1.mga9
MGASA-2025-0010 - Updated thunderbird packages fix security vulnerabilities
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
- https://bugs.mageia.org/show_bug.cgi?id=33900
- https://www.thunderbird.net/en-US/thunderbird/128.6.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243
- thunderbird-128.6.0-1.mga9
- thunderbird-l10n-128.6.0-1.mga9
MGASA-2025-0009 - Updated firefox packages fix security vulnerabilities
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0237 , CVE-2025-0238 , CVE-2025-0239 , CVE-2025-0240 , CVE-2025-0241 , CVE-2025-0242 , CVE-2025-0243 Description WebChannel APIs susceptible to confused deputy attack. (CVE-2025-0237) Use-after-free when breaking lines in text. (CVE-2025-0238) Alt-Svc ALPN validation failure when redirected. (CVE-2025-0239) Compartment mismatch when parsing JavaScript JSON module. (CVE-2025-0240) Memory corruption when using JavaScript Text Segmentation. (CVE-2025-0241) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. (CVE-2025-0242) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. (CVE-2025-0243) References
- https://bugs.mageia.org/show_bug.cgi?id=33897
- https://www.mozilla.org/en-US/firefox/128.6.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243
- firefox-128.6.0-1.mga9
- firefox-l10n-128.6.0-1.mga9
