Lector de Feeds

MGASA-2025-0186 - Updated mariadb packages fix security vulnerabilities

Mageia Security - 11 Junio, 2025 - 18:43
Publication date: 11 Jun 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-52969 , CVE-2023-52970 , CVE-2023-52971 , CVE-2025-30693 , CVE-2025-30722 Description MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2 - CVE-2023-52969. MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where - CVE-2023-52970. MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan - CVE-2023-52971. Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H) - CVE-2025-30693. Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N) - CVE-2025-30722 References SRPMS 9/core
  • mariadb-11.4.7-1.mga9

Java Anwendungen im Firefox oder Chromium Browser verwenden-de

Wiki Mageia - 10 Junio, 2025 - 22:06

← Older revision Revision as of 21:06, 10 June 2025 Line 22: Line 22:  Was Sie tun müssen ist OpenWebStart_linux_1_11_1.deb herunterzuladen Was Sie tun müssen ist OpenWebStart_linux_1_11_1.deb herunterzuladen     +Alternativ können Sie, unter Mageia 9, {{prog|openwebstart}} aus dem [[Möglichkeiten_um_Anwendungen_zu_installieren-de#Mageia_enthusiasten|Blogdrake's Repository]] installieren (nur für 64-Bit Systeme)     und als root auszuführen: und als root auszuführen: Psyca
Categorías: Wiki de Mageia

MGAA-2025-0058 - Updated noip packages fix bug

Mageia Security - 10 Junio, 2025 - 05:10
Publication date: 10 Jun 2025
Type: bugfix
Affected Mageia releases : 9
Description The current version is no longer supported, and does not update the IP direction for your domain in no-ip.com. This update fixes the issue. References SRPMS 9/core
  • noip-3.3.0-1.2.mga9

Using Java applications in Firefox and Chromium browsers

Wiki Mageia - 9 Junio, 2025 - 20:56

Alternative to install

← Older revision Revision as of 19:56, 9 June 2025 Line 27: Line 27:  dpkg -i OpenWebStart_linux_1_11_1.deb   dpkg -i OpenWebStart_linux_1_11_1.deb       +As alternative, for mageia 9, you can install {{prog|openwebstart}} from the [[Ways_to_install_programs#Mageia_enthusiasts|Blogdrake's repository]] (just for 64bit systems)     Installation goes smoothly. Files are installed in /opt Installation goes smoothly. Files are installed in /opt Katnatek
Categorías: Wiki de Mageia

MGASA-2025-0184 - Updated golang packages fix security vulnerabilities

Mageia Security - 9 Junio, 2025 - 19:14
Publication date: 09 Jun 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-4673 , CVE-2025-0913 , CVE-2025-22874 Description Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information. CVE-2025-4673. os: inconsistent handling of O_CREATE|O_EXCL on Unix and Windows os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location - CVE-2025-0913. crypto/x509: usage of ExtKeyUsageAny disables policy validation. Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon - CVE-2025-22874. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink. References SRPMS 9/core
  • golang-1.24.4-1.mga9
Feed