Mageia Linux Distribution - Security Advisories - Page 16 - Results...

Mageia Linux Distribution - Page 16

Mageia 2022-0378: firefox security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via performance.getEntries() (CVE-2022-42927). Certain types of allocations were missing annotations that, if the Garbage

Mageia 2022-0377: golang security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715) archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879) net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)

Mageia 2022-0375: python-joblib security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Arbitrary Code Execution in joblib (CVE-2022-21797) References: - https://bugs.mageia.org/show_bug.cgi?id=30956 - https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it. document.getElementById('cloakab5715f4ccee395d7eb6acb7443cfe83').innerHTML = ''; var prefix = 'ma' + 'il' + 'to'; var path = 'hr' + 'ef' + '='; var addyab5715f4ccee395d7eb6acb7443cfe83 = 'package-announce' + '@'; addyab5715f4ccee395d7eb6acb7443cfe83 = addyab5715f4ccee395d7eb6acb7443cfe83 + 'lists' + '.' + 'fedoraproject' + '.' + 'org'; var addy_textab5715f4ccee395d7eb6acb7443cfe83 = 'package-announce' + '@' + 'lists' + '.' + 'fedoraproject' + '.' + 'org';document.getElementById('cloakab5715f4ccee395d7eb6acb7443cfe83').innerHTML += ''+addy_textab5715f4ccee395d7eb6acb7443cfe83+''; /thread/BVOMMW37OXZWU2EV5ONAAS462IQEHZOF/

Mageia 2022-0374: dhcp security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to

Mageia 2022-0371: unzip security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution. (CVE-2021-4217) Conversion of a wide string to a local string that leads to a heap of

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.