Lector de Feeds
Mageia 9 Errata
remove bogus information
← Older revision Revision as of 01:09, 18 January 2026 Line 400: Line 400: === Renewal of gpg package signing key === === Renewal of gpg package signing key === −The GPG key we used to sign our packages expires on December 31, 2025. We updated the key in Cauldron some time ago, which caused [[Cauldron#Upgrade_from_the_latest_stable_release_to_Cauldron_using_urpmi|conflicts when upgrading from Mageia 9 to Cauldron.]] We are now switching to using the new key in the Mageia 9 repositories and signing all current and future packages for Mageia 9 with the updated key.+The GPG key we used to sign our packages did expire on December 31, 2025. We updated the key in Cauldron some time ago, which caused [[Cauldron#Upgrade_from_the_latest_stable_release_to_Cauldron_using_urpmi|conflicts when upgrading from Mageia 9 to Cauldron.]] We are now switching to using the new key in the Mageia 9 repositories. We are taking the necessary measures to make the transition smooth for our users. Please restart your computer after receiving the relevant updates. For further informations see {{bug|34918}} & {{bug|34920}}. We are taking the necessary measures to make the transition smooth for our users. Please restart your computer after receiving the relevant updates. For further informations see {{bug|34918}} & {{bug|34920}}. Katnatek
Categorías: Wiki de Mageia
Notas sobre Mageia 9-es
Sync with English version
← Older revision Revision as of 22:49, 17 January 2026 Line 4: Line 4: <!-- disable this so it's not in release note of isos medias--> <!-- disable this so it's not in release note of isos medias--> −{{TranslationOverview-es|Mageia 9 Release Notes|21/02/2024|61596}}+{{TranslationOverview-es|Mageia 9 Release Notes|17/01/2026|64553}} −{{multi language banner-es|[[Mageia 9 Veröffentlichungshinweise-de|Deutsch]] ; [[Mageia 9 Release Notes|English]] ; [[Notas_sobre_Mageia_9-es|Español]] ; [[Mageia_9_Notes_de_version-fr|Français]] ; [[Mageia 9 uitgave-opmerkingen-nl|Nederlands]] ; [[Mageia 9 Notas de Lançamento pt-PT|Português (Portugal)]]; [[Notas de lançamento do Mageia 9-pt-BR|português brasileiro]] ;}}+{{multi language banner-es|[[Mageia 9 Veröffentlichungshinweise-de|Deutsch]] ; [[Mageia 9 Release Notes|English]] ; [[Notas_sobre_Mageia_9-es|Español]] ; [[Mageia_9_Notes_de_version-fr|Français]] ; [[Mageia 9 uitgave-opmerkingen-nl|Nederlands]] ; [[Notas de lançamento do Mageia 9-pt-BR|português brasileiro]] ; [[Mageia 9 Notas de Lançamento pt-PT|Português (Portugal)]] ;}} {{introduction-es|Presentación de la evolución, nuevas características, problemas conocidos y cambios recientes en la distribución Mageia.}} {{introduction-es|Presentación de la evolución, nuevas características, problemas conocidos y cambios recientes en la distribución Mageia.}} Line 225: Line 225: * El controlador propietario AMDGPU-PRO actualmente sólo funciona con X.org 1.1xx, por lo que no puede ser usado en Mageia 9... <!-- "Amd-gpu pro driver" in dev mail list June & July --> * El controlador propietario AMDGPU-PRO actualmente sólo funciona con X.org 1.1xx, por lo que no puede ser usado en Mageia 9... <!-- "Amd-gpu pro driver" in dev mail list June & July --> −'''ACTUALIZACIÓN:''' Hemos dado un paso adelante, ofreciendo una forma de descargar e instalar fácilmente dos paquetes para tarjetas gráficas AMD, que ofrecen algunas características avanzadas como la activación de opencl para la mejora de rendimiento en procesos como el renderizado en Blender y otras herramientas 3D como CAD y herramientas PCB, y módulos de procesamiento en Darktable, juegos de Steam, Gimp, Libreoffice y cualquier otra aplicación que requiera de estas características avanzadas.+Vea AMD-GPU [https://en.wikipedia.org/wiki/Radeon_Pro Radeon Pro] , y [https://www.amd.com/en/graphics/servers-solutions-rocm ROCm]. − + −Debes tener en cuenta:+'''ACTUALIZACIÓN:''' Hemos dado un paso adelante, ofreciendo una forma de descargar e instalar fácilmente dos paquetes para tarjetas gráficas AMD, que ofrecen algunas características avanzadas como la activación de opencl para la mejora de rendimiento en procesos como el renderizado en Blender y otras herramientas 3D como CAD y herramientas PCB, y módulos de procesamiento en Darktable, juegos de Steam, Gimp, Libreoffice y cualquier otra aplicación que requiera de estas características avanzadas. Para informaciíon adicional vea [[Setup the graphical_server#AMD proprietary drivers|AMD proprietary drivers]] − −* El paquete amdgpupro-opencl-orca [https://advisories.mageia.org/MGAA-2023-0101.html (Más información aquí!)] descarga librerías de AMD para ie. Grenada XT, Carrizo and Polaris. − −* El paquete amdgpupro-opencl-pal [https://advisories.mageia.org/MGAA-2023-0102.html (Más información aquí!)] descarga librerías de AMD para i.e Banded Kestrel, Picasso and Vega. − −Para instalarlo tienes dos opciones: − −* Desde el «Centro de Control de Mageia > Instalar y quitar aplicaciones». Debes cambiar los filtros a «Todos» y buscar los paquetes «amdgpupro-opencl-pal» o «amdgpupro-opencl-orca» e instalar. − −* Desde una terminal como usuario «root» escribiendo: «urpmi amdgpuypro-opencl-pal» o «urpmi amdgpupro-opencl-orca». − −Pensando en todos los usuarios que trabajan en estos apartados o quieren tener una buena experiencia de juego con Mageia, ofrecemos con esta implementación soporte completo en las dos principales opciones en rendimiento gráfico del momento. − −Esperamos que esto contribuya a mejorar la experiencia de uso con nuestro gran sistema operativo de código abierto!! ===== Controladores NVIDIA ===== ===== Controladores NVIDIA ===== Line 462: Line 448: libvirt ha sido actualizado a 9.1.0, virt-manager ha sido actualizado a 4.1.0, libguestfs ha sido actualizado a 1.49. libvirt ha sido actualizado a 9.1.0, virt-manager ha sido actualizado a 4.1.0, libguestfs ha sido actualizado a 1.49. −Algunos subpauetes de libguestfs se construyen a partir de guestfs-tools 1.49.+Algunos subpqauetes de libguestfs se construyen a partir de guestfs-tools 1.49. Xen ha sido actualizado a 4.17.0. Xen ha sido actualizado a 4.17.0. Line 506: Line 492: === Preparativos === === Preparativos === +{{warning-es|Para instalaciones y migraciones realizadas a partir de 2026. + + +Hemos tenido que renovar la llave gpg que utilizamos para firmar los paquetes rpm. + + +Por favor habilite [https://doc.mageia.org/installer/9/es/content/software.html repositorios adicionales] o [https://doc.mageia.org/installer/9/es/content/installUpdates.html actualice el sistema], y seleccione un servidor personalizado y asegúrese de que este [https://mirrors.mageia.org/status en buen estado].}} + * Lea cuidadosamente esta notas y las [[Erratas_de_Mageia_9-es|Erratas]] para informarse si existe algo para lo que necesita estar preparado. * Lea cuidadosamente esta notas y las [[Erratas_de_Mageia_9-es|Erratas]] para informarse si existe algo para lo que necesita estar preparado. * '''Respalde''' cualquier información importante. * '''Respalde''' cualquier información importante. Katnatek
Categorías: Wiki de Mageia
Mageia 9 Release Notes
Preparations: remove bogus information, thanks Jani
← Older revision Revision as of 22:47, 17 January 2026 Line 480: Line 480: === Preparations === === Preparations === {{warning|For installations & upgrades made in 2026. {{warning|For installations & upgrades made in 2026. −We have to renew the gpg key used to sign rpm packages, and all packages have been resigned with the new key.+We have to renew the gpg key used to sign rpm packages. Please enable [https://doc.mageia.org/installer/9/en/content/software.html remote repositories] or [https://doc.mageia.org/installer/9/en/content/installUpdates.html update the system], and select a custom mirror and be sure of [https://mirrors.mageia.org/status select one in good shape].}} Please enable [https://doc.mageia.org/installer/9/en/content/software.html remote repositories] or [https://doc.mageia.org/installer/9/en/content/installUpdates.html update the system], and select a custom mirror and be sure of [https://mirrors.mageia.org/status select one in good shape].}} Katnatek
Categorías: Wiki de Mageia
Mageia 10 Release Notes
Available installation media: typo
← Older revision Revision as of 21:03, 17 January 2026 (One intermediate revision by the same user not shown)Line 30: Line 30: The different download options can be found on the [https://www.mageia.org/downloads/ download page]. Both direct (FTP and HTTP) and BitTorrent downloads are available. The different download options can be found on the [https://www.mageia.org/downloads/ download page]. Both direct (FTP and HTTP) and BitTorrent downloads are available. + +{{warning|'''Classic Installer''' and '''Live ISOs''' no longer fit in single layer DVD, you should use Dual Layer DVD or USB devices with 8 Gb or more space.}} About choosing ISOs: see the first chapter, "Select and use ISOs", in the installer manual. About choosing ISOs: see the first chapter, "Select and use ISOs", in the installer manual. Katnatek
Categorías: Wiki de Mageia
MGASA-2026-0012 - Updated gimp packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
- https://bugs.mageia.org/show_bug.cgi?id=34363
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DVVZTOVQSBY5ON5P7HYQIXK2OLMSUEH5/
- https://lists.debian.org/debian-lts-announce/2025/11/msg00005.html
- https://lists.debian.org/debian-security-announce/2025/msg00103.html
- https://lists.debian.org/debian-security-announce/2026/msg00001.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425
- gimp-2.10.36-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0011 - Updated python-urllib3 packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
- https://bugs.mageia.org/show_bug.cgi?id=34809
- https://www.openwall.com/lists/oss-security/2025/12/05/4
- https://ubuntu.com/security/notices/USN-7955-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441
- python-urllib3-1.26.20-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0010 - Updated libpng packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
- https://bugs.mageia.org/show_bug.cgi?id=34986
- https://www.openwall.com/lists/oss-security/2026/01/12/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801
- libpng-1.6.38-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0009 - Updated nodejs packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
- https://bugs.mageia.org/show_bug.cgi?id=34995
- https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
- https://nodejs.org/en/blog/release/v22.22.0
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637
- nodejs-22.22.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0006 - Updated v4l2loopback packages fix bug
Publication date: 17 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
- https://bugs.mageia.org/show_bug.cgi?id=34980
- https://github.com/v4l2loopback/v4l2loopback/issues/653
- v4l2loopback-0.15.3-1.mga9
Categorías: Actualizaciones de Seguridad




