Lector de Feeds
MGASA-2025-0310 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 22 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Vanilla upstream kernel version 6.6.116 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Vanilla upstream kernel version 6.6.116 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34721
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.106
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.107
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.108
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.109
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.110
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.111
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.112
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.113
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.114
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.115
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39914
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39942
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39951
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39998
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40092
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300
- kernel-linus-6.6.116-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0309 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
Publication date: 22 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Upstream kernel version 6.6.116 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Upstream kernel version 6.6.116 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=34713
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.106
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.107
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.108
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.109
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.110
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.111
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.112
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.113
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.114
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.115
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39914
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39942
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39951
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39998
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40092
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300
- kernel-6.6.116-1.mga9
- kmod-xtables-addons-3.24-87.mga9
- kmod-virtualbox-7.1.14-13.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0308 - Updated konsole packages fix security vulnerability
Publication date: 21 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49091 Description KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code. (CVE-2025-49091) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49091 Description KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code. (CVE-2025-49091) References
- https://bugs.mageia.org/show_bug.cgi?id=34364
- https://www.openwall.com/lists/oss-security/2025/06/10/5
- https://lists.debian.org/debian-security-announce/2025/msg00109.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49091
- konsole-23.04.3-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0307 - Updated redis packages fix security vulnerabilities
Publication date: 21 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49844 , CVE-2025-46817 , CVE-2025-46818 , CVE-2025-46819 Description A Lua script may lead to remote code execution. (CVE-2025-49844) A Lua script may lead to integer overflow and potential RCE. (CVE-2025-46817) A Lua script can be executed in the context of another user. (CVE-2025-46818) LUA out-of-bound read. (CVE-2025-46819) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49844 , CVE-2025-46817 , CVE-2025-46818 , CVE-2025-46819 Description A Lua script may lead to remote code execution. (CVE-2025-49844) A Lua script may lead to integer overflow and potential RCE. (CVE-2025-46817) A Lua script can be executed in the context of another user. (CVE-2025-46818) LUA out-of-bound read. (CVE-2025-46819) References
- https://bugs.mageia.org/show_bug.cgi?id=34650
- https://www.openwall.com/lists/oss-security/2025/10/07/2
- https://github.com/redis/redis/releases/tag/7.2.11
- https://github.com/redis/redis/releases/tag/7.2.12
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819
- redis-7.2.12-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0306 - Updated ffmpeg packages fix security vulnerabilities
Publication date: 21 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-50007 , CVE-2023-50008 , CVE-2023-6602 , CVE-2023-6604 , CVE-2023-6605 , CVE-2024-31582 , CVE-2024-35367 , CVE-2025-59728 , CVE-2025-59731 , CVE-2025-59732 , CVE-2025-59733 , CVE-2025-7700 Description FFmpeg v.n6.1-3-g466799d4f5 allows an attacker to trigger use of a parameter of negative size in the av_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component. (CVE-2023-50007) FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component. (CVE-2023-50008) Improper handling of input format in tty demuxer of ffmpeg. (CVE-2023-6602) Hls xbin demuxer dos amplification in ffmpeg. (CVE-2023-6604) Dash playlist ssrf vulnerability in ffmpeg. (CVE-2023-6605) FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. (CVE-2024-31582) FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer. (CVE-2024-35367) Heap-buffer-overflow write in FFmpeg MDASH resolve_content_path. (CVE-2025-59728) Heap-buffer-overflow write in FFmpeg EXR dwa_uncompress. (CVE-2025-59731, CVE-2025-59732, CVE-2025-59733) Null pointer dereference in ffmpeg als decoder (libavcodec/alsdec.c). (CVE-2025-7700) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-50007 , CVE-2023-50008 , CVE-2023-6602 , CVE-2023-6604 , CVE-2023-6605 , CVE-2024-31582 , CVE-2024-35367 , CVE-2025-59728 , CVE-2025-59731 , CVE-2025-59732 , CVE-2025-59733 , CVE-2025-7700 Description FFmpeg v.n6.1-3-g466799d4f5 allows an attacker to trigger use of a parameter of negative size in the av_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component. (CVE-2023-50007) FFmpeg v.n6.1-3-g466799d4f5 allows memory consumption when using the colorcorrect filter, in the av_malloc function in libavutil/mem.c:105:9 component. (CVE-2023-50008) Improper handling of input format in tty demuxer of ffmpeg. (CVE-2023-6602) Hls xbin demuxer dos amplification in ffmpeg. (CVE-2023-6604) Dash playlist ssrf vulnerability in ffmpeg. (CVE-2023-6605) FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. (CVE-2024-31582) FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer. (CVE-2024-35367) Heap-buffer-overflow write in FFmpeg MDASH resolve_content_path. (CVE-2025-59728) Heap-buffer-overflow write in FFmpeg EXR dwa_uncompress. (CVE-2025-59731, CVE-2025-59732, CVE-2025-59733) Null pointer dereference in ffmpeg als decoder (libavcodec/alsdec.c). (CVE-2025-7700) References
- https://bugs.mageia.org/show_bug.cgi?id=34757
- https://ffmpeg.org/security.html
- https://lists.debian.org/debian-security-announce/2025/msg00149.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50007
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6604
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6605
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31582
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35367
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7700
- ffmpeg-5.1.7-1.mga9
- ffmpeg-5.1.7-1.mga9.tainted
Categorías: Actualizaciones de Seguridad




