Mageia Linux Distribution - Security Advisories - Page 24 - Results...

Mageia Linux Distribution - Page 24

Mageia 2022-0469: python-slixmpp security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fixes missing certificate hostname validation References: - https://bugs.mageia.org/show_bug.cgi?id=31200 - https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it. document.getElementById('cloakf9e350465633a7a072f5f4a3916d8188').innerHTML = ''; var prefix = 'ma' + 'il' + 'to'; var path = 'hr' + 'ef' + '='; var addyf9e350465633a7a072f5f4a3916d8188 = 'package-announce' + '@'; addyf9e350465633a7a072f5f4a3916d8188 = addyf9e350465633a7a072f5f4a3916d8188 + 'lists' + '.' + 'fedoraproject' + '.' + 'org'; var addy_textf9e350465633a7a072f5f4a3916d8188 = 'package-announce' + '@' + 'lists' + '.' + 'fedoraproject' + '.' + 'org';document.getElementById('cloakf9e350465633a7a072f5f4a3916d8188').innerHTML += ''+addy_textf9e350465633a7a072f5f4a3916d8188+''; /thread/RDCGUJ5VBYUCDAXSHYA5NX2THU2RYIXE/

Mageia 2022-0468: heimdal security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Isaac Boukris reported that the Heimdal KDC before 7.7.1 does not apply delegation_not_allowed (aka not-delegated) user attributes for S4U2Self. Instead the forwardable flag is set even if the impersonated client has the not-delegated flag set. (CVE-2019-14870)

Mageia 2022-0467: krb5 security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Greg Hudson discovered integer overflow flaws in the PAC parsing in krb5, the MIT implementation of Kerberos, which may result in remote code execution (in a KDC, kadmin, or GSS or Kerberos application server process), information exposure (to a cross-realm KDC acting maliciously), or denial of service (KDC or kadmind process crash).

Mageia 2022-0466: couchdb security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations. (CVE-2022-24706)

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.