Mageia Linux Distribution - Security Advisories - Page 11 - Results...

Mageia Linux Distribution - Page 11

Mageia 2023-0027: netatalk security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Heap overflow leading to arbitrary code execution. (CVE-2021-31439) Buffer overflow leading to remote code execution (CVE-2022-0194) Improper length validation leading to remote code execution (CVE-2022-23121) Buffer overflow leading to remote code execution (CVE-2022-23122)

Mageia 2023-0025: sudo security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because

Mageia 2023-0022: phoronix-test-suite security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

XSS in phoromatic_r_add_test_details.php (CVE-2022-40704) References: - https://bugs.mageia.org/show_bug.cgi?id=31423 - https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it. document.getElementById('cloak7a5b832282f4500cf30bad42194eb00d').innerHTML = ''; var prefix = 'ma' + 'il' + 'to'; var path = 'hr' + 'ef' + '='; var addy7a5b832282f4500cf30bad42194eb00d = 'package-announce' + '@'; addy7a5b832282f4500cf30bad42194eb00d = addy7a5b832282f4500cf30bad42194eb00d + 'lists' + '.' + 'fedoraproject' + '.' + 'org'; var addy_text7a5b832282f4500cf30bad42194eb00d = 'package-announce' + '@' + 'lists' + '.' + 'fedoraproject' + '.' + 'org';document.getElementById('cloak7a5b832282f4500cf30bad42194eb00d').innerHTML += ''+addy_text7a5b832282f4500cf30bad42194eb00d+''; /thread/ETFF53AECMDP6PTNUVVCOODN3HMOETUU/

Mageia 2023-0019: viewvc security update

data:image/svg+xml,%3Csvg%20xmlns=%22https://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ViewVC is vulnerable to cross-site scripting. The impact of these vulnerabilities is mitigated by the need for an attacker to have commit privileges to a Subversion repository exposed by an otherwise trusted ViewVC instance. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.