Lector de Feeds
Mageia 10 Press
← Older revision
Revision as of 14:59, 20 January 2026
(One intermediate revision by the same user not shown)Line 35:
Line 35:
# {{Press item|TheNewStack|https://thenewstack.io/mageia-harkens-back-to-the-days-of-mandrake-linux/|mageia-harkens-back-to-the-days-of-mandrake-linux Mageia 9|2026-01-18}} # {{Press item|TheNewStack|https://thenewstack.io/mageia-harkens-back-to-the-days-of-mandrake-linux/|mageia-harkens-back-to-the-days-of-mandrake-linux Mageia 9|2026-01-18}}
# {{Press item|DevOpsChat|https://www.devopschat.co/articles/mageia-harkens-back-to-the-glory-days-of-mandrake-linux|https://www.devopschat.co/articles/mageia-harkens-back-to-the-glory-days-of-mandrake-linux Mageia 9|2026-01-18}} # {{Press item|DevOpsChat|https://www.devopschat.co/articles/mageia-harkens-back-to-the-glory-days-of-mandrake-linux|https://www.devopschat.co/articles/mageia-harkens-back-to-the-glory-days-of-mandrake-linux Mageia 9|2026-01-18}}
+# {{Press item|app.daily.dev|https://app.daily.dev/posts/mageia-harkens-back-to-the-glory-days-of-mandrake-linux-og6uxhfog|https://app.daily.dev/posts/mageia-harkens-back-to-the-glory-days-of-mandrake-linux-og6uxhfog-Mageia 9|2026-01-19}}
== French – Français == == French – Français ==
# {{Press item|Adrien Linuxtricks on YouTube|https://www.youtube.com/watch?v{{=}}w1AWo7D-BJY|MAGEIA 10 ARRIVE BIENTÔT !!! Lancement test longue durée !|2025-12-19}} # {{Press item|Adrien Linuxtricks on YouTube|https://www.youtube.com/watch?v{{=}}w1AWo7D-BJY|MAGEIA 10 ARRIVE BIENTÔT !!! Lancement test longue durée !|2025-12-19}}
+# {{Press item|nest.ink|https://next.ink/brief_article/mageia-10-les-iso-de-la-version-alpha-sont-disponibles-en-32-et-64-bits/|https://next.ink/brief_article/mageia-10-les-iso-de-la-version-alpha-sont-disponibles-en-32-et-64-bits/|2026-01-12}}
<!-- <!--
== German - Deutsch == == German - Deutsch ==
Marchugo
Categorías: Wiki de Mageia
Re: [dev] [changelog] [RPM] cauldron core/release dnf5-5.3.0.0-1.mga10 - geiger.david68210@gmail.com
MGASA-2026-0014 - Updated thunderbird packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34993
- https://www.thunderbird.net/en-US/thunderbird/140.7.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- thunderbird-140.7.0-1.mga9
- thunderbird-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0013 - Updated nss & firefox packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34987
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html
- https://www.firefox.com/en-US/firefox/140.7.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- nss-3.120.0-1.mga9
- firefox-140.7.0-1.mga9
- firefox-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad




