Lector de Feeds

Mageia 10 Release Notes

Wiki Mageia - 2 Mayo, 2026 - 14:10

‎Using the installer to Upgrade: fix missing letter in drivers

← Older revision Revision as of 13:10, 2 May 2026 Line 594: Line 594:     You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. −* DVD '''contain a lot''' of packages.  Drawback: '''some wifi could not work'''. (Due to lack of space. Drives also would need to be loaded at boot to work.)+* DVD '''contain a lot''' of packages.  Drawback: '''some wifi could not work'''. (Due to lack of space. Drivers also would need to be loaded at boot to work.)  * Netinstall '''downloads everything'''.  The nonfree version contain a lot of drivers, '''wifi is better supported'''. * Netinstall '''downloads everything'''.  The nonfree version contain a lot of drivers, '''wifi is better supported'''.    Geex
Categorías: Wiki de Mageia

Another extraordinary General Assembly, May 7, 2026

Blog de Mageia (English) - 30 Abril, 2026 - 17:01

As stated in a previous blog post, we held our General Assembly and an extraordinary General Assembly on April 22.

You can read the report of that meeting here.

Unfortunately, too few Association members were present to reach the required quorum, so we could not have a valid vote about the needed changes to our constitution. We will therefore hold another extraordinary General Assembly on Thursday, May 7, 2026. For this second call, no quorum is required.

Categorías: Blogs Oficiales

Mageia 10 Press

Wiki Mageia - 30 Abril, 2026 - 16:31

← Older revision Revision as of 15:31, 30 April 2026 Line 13: Line 13:  == Chinese - 中国 == == Chinese - 中国 ==    −#      −== Czech - český ==      #   #   Line 39: Line 37:  # {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}} # {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}}  # {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}} # {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}}  +  +== Czech - český ==  +  +#{{Press item|root.cz|https://www.root.cz/zpravicky/nova-verze-tde-r14-1-6-trinity-desktop-environment/|Trinity desktop evironment ads support for Mageia 10| April 26 2926}}  +     == German - Deutsch == == German - Deutsch == Marchugo
Categorías: Wiki de Mageia

Sysadmin New Release

Wiki Mageia - 29 Abril, 2026 - 23:03

‎Tools

← Older revision Revision as of 22:03, 29 April 2026 Line 5: Line 5:  https://gitweb.mageia.org/software/infrastructure/release/ https://gitweb.mageia.org/software/infrastructure/release/  There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there. There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there.  +  +When updating the dosutils tools remember to do it under <code>/distrib/bootstrap/distrib/cauldron/x86_64/dosutils/autorun</code> and <code>/distrib/bootstrap/distrib/cauldron/i686/dosutils/autorun</code>. The command <code>update_mga-advisories</code> will then copy them under <code>/distrib/mirror/distrib/cauldron</code>.     = Update MGA::Mirrors = = Update MGA::Mirrors = Bcornec
Categorías: Wiki de Mageia

MGAA-2026-0030 - Updated light-locker packages fix bug

Mageia Security - 23 Abril, 2026 - 00:41
Publication date: 22 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description This update fixes some systemd-related issues and also some coredumps at startup. References SRPMS 9/core
  • light-locker-1.9.0-6.1.mga9

MGASA-2026-0107 - Updated gvfs packages fix security vulnerabilities

Mageia Security - 22 Abril, 2026 - 23:08
Publication date: 22 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-28295 , CVE-2026-28296 Description Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses. (CVE-2026-28295) Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths. (CVE-2026-28296) References SRPMS 9/core
  • gvfs-1.50.4-1.1.mga9

MGAA-2026-0029 - Updated mga-dorsync packages fix bugs

Mageia Security - 21 Abril, 2026 - 05:04
Publication date: 21 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description mga-dorsync is QA tool to sync Mageia ISO images and transfer them to a USB stick. Now, after some updates in the code and bugs fixed, we are providing a official package for this tool. References SRPMS 9/core
  • mga-dorsync-3.3-1.mga9

MGASA-2026-0106 - Updated firefox & thunderbird packages fix security vulnerabilities

Mageia Security - 21 Abril, 2026 - 03:11
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5731 , CVE-2026-5732 , CVE-2026-5734 Description Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5731) Incorrect boundary conditions, integer overflow in the Graphics: Text component. (CVE-2026-5732) Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5734) References SRPMS 9/core
  • firefox-140.9.1-1.mga9
  • firefox-l10n-140.9.1-1.mga9
  • thunderbird-140.9.1-1.mga9
  • thunderbird-l10n-140.9.1-1.mga9

MGASA-2026-0105 - Updated libtiff packages fix security vulnerabilities

Mageia Security - 21 Abril, 2026 - 03:11
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61143 , CVE-2025-61144 Description libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. (CVE-2025-61143) libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. (CVE-2025-61144) References SRPMS 9/core
  • libtiff-4.5.1-1.7.mga9

MGASA-2026-0103 - Updated giflib packages fix security vulnerability

Mageia Security - 18 Abril, 2026 - 17:43
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23868 Description Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. (CVE-2026-23868) References SRPMS 9/core
  • giflib-5.2.1-7.3.mga9

MGASA-2026-0102 - Updated gdk-pixbuf2.0 packages fix security vulnerability

Mageia Security - 18 Abril, 2026 - 17:43
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5201 Description Denial of service via heap-based buffer overflow when processing a specially crafted jpeg image. (CVE-2026-5201) References SRPMS 9/core
  • gdk-pixbuf2.0-2.42.10-2.3.mga9

MGASA-2026-0101 - Updated rsync packages fix security vulnerability

Mageia Security - 18 Abril, 2026 - 03:40
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41035 Description In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. (CVE-2026-41035) References SRPMS 9/core
  • rsync-3.2.7-1.4.mga9

MGASA-2026-0100 - Updated polkit-122 packages fix security vulnerability

Mageia Security - 17 Abril, 2026 - 20:56
Publication date: 17 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-7519 Description Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write. (CVE-2025-7519) References SRPMS 9/core
  • polkit-122-2.2.mga9

MGAA-2026-0028 - Updated python-astropy packages fix bug

Mageia Security - 17 Abril, 2026 - 20:56
Publication date: 17 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description python3-astropy missed the python3-configobj requirement. This update fixes the reported issue. References SRPMS 9/core
  • python-astropy-5.1.1-1.2.mga9

MGASA-2026-0099 - Updated cockpit-338 packages fix security vulnerability

Mageia Security - 16 Abril, 2026 - 18:53
Publication date: 16 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4631 Description Unauthenticated remote code execution due to ssh command-line argument injection. (CVE-2026-4631) References SRPMS 9/core
  • cockpit-338-1.7.mga9

MGAA-2026-0026 - Updated simplescreenrecorder packages fix bug

Mageia Security - 16 Abril, 2026 - 18:53
Publication date: 16 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simplescreenrecorder package to fix OpenGL recording. References SRPMS 9/core
  • simplescreenrecorder-0.4.4-1.1.mga9

MGASA-2026-0098 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - 15 Abril, 2026 - 17:42
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Vanilla upstream kernel version 6.6.130 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.130-1.mga9

MGASA-2026-0097 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities

Mageia Security - 15 Abril, 2026 - 17:42
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Upstream kernel version 6.6.130 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References SRPMS 9/core
  • kernel-6.6.130-1.mga9
  • kmod-virtualbox-7.1.14-15.mga9
  • kmod-xtables-addons-3.24-89.mga9

MGASA-2026-0096 - Updated libpng12 packages fix security vulnerability

Mageia Security - 12 Abril, 2026 - 06:23
Publication date: 12 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description LIBPNG has a heap buffer overflow in png_set_quantize. (CVE-2026-25646) References SRPMS 9/core
  • libpng12-1.2.59-3.1.mga9
Feed