Lector de Feeds
Mageia 10 First Alpha ISO Validated by Council
We’re delighted to announce that the Mageia Council has officially validated the publication of the first Alpha ISO for Mageia 10! This marks a major milestone in the Mageia 10 release cycle and opens the door for broad community testing and early feedback.
Mageia 10 continues to be built in Cauldron — our beloved development branch — where all upcoming release work happens. With the Council’s validation, the infrastructure team is now ready to publish the Alpha ISO images for download and testing.
What This MeansAlpha ISOs are the first public snapshots of the upcoming release. They are not ready for production use, but they are perfect for developers, testers, and curious users who want to explore what’s cooking in Mageia 10 and help improve it by reporting bugs, testing installs, and confirming hardware compatibility.
These ISOs represent the initial build of Mageia 10 as the distribution begins its formal release countdown, ahead of Beta and Release Candidate milestones, and a final release currently targeted for April 2026.
The Mageia 10 Alpha set includes a comprehensive collection of installation formats:
- Classical Installation ISOs for traditional installs on 32-bit (i686) and 64-bit systems
- Live Desktop Images featuring popular desktops such as Plasma, GNOME, and Xfce
To get involved and test Mageia 10 Alpha:
- Download the Alpha ISOs (look for Mageia-10-alpha1 images).
- Write the ISO image to a USB drive using IsoDumper on Mageia (Rufus on Windows), or boot in a virtual machine and explore the installer and live environments.
- Report bugs you encounter with as much detail as possible.
- Help with translations or documentation updates, such as our Release Notes — early contributions make a big difference.
Mageia’s release model relies on active community involvement. During the Alpha phase, testers help uncover issues early, before they reach later stages of the release cycle. Bug reports contribute directly to improved stability and overall quality, while translation updates, documentation improvements, and installer refinements can be addressed at an early and impactful stage.
Every piece of feedback — from “it boots!” to detailed log entries — helps ensure Mageia 10 meets our quality standards.
Thank You to the CommunityA huge thanks goes out to everyone who contributes to Mageia — from developers and packagers to testers, translators, and documentation writers. This release is the result of the tireless work of our contributors.
Mageia remains a 100% community-driven project, and it is the passion of our volunteers that makes milestones like this possible.
Stay tuned to the Mageia Blog and release channels for future updates as Mageia 10 continues its journey toward a stable release.
Let’s make Mageia 10 the best one yet!
MGASA-2026-0005 - Updated libpcap packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11961 Description OOBR and OOBW in pcap_ether_aton() in libpcap. (CVE-2025-11961) References
- https://bugs.mageia.org/show_bug.cgi?id=34939
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2026&m=slackware-security.355202
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11961
- libpcap-1.10.6-1.mga9
MGASA-2026-0004 - Updated sodium packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-69277 Description Libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. (CVE-2025-69277) References
- https://bugs.mageia.org/show_bug.cgi?id=34940
- https://lists.debian.org/debian-security-announce/2026/msg00002.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69277
- sodium-1.0.18-3.1.mga9
MGASA-2026-0003 - Updated curl packages fix security vulnerabilities
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13034 , CVE-2025-14017 , CVE-2025-14524 , CVE-2025-14819 , CVE-2025-15079 , CVE-2025-15224 Description curl is susceptible to a number of low severity security vulnerabilities: CVE-2025-14524: bearer token leak on cross-protocol redirect CVE-2025-14819: OpenSSL partial chain store policy bypass CVE-2025-15079: libssh knownhosts file vulnerability CVE-2025-15224: libssh key passphrase bypass vulnerability This release fixes these issues. References
- https://bugs.mageia.org/show_bug.cgi?id=34944
- https://curl.se/docs/vuln-7.88.1.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
- curl-7.88.1-4.9.mga9
MGASA-2026-0002 - Updated wget2 packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-69194 Description Arbitrary File Write via Metalink Path Traversal in GNU Wget2. (CVE-2025-69194) References
- https://bugs.mageia.org/show_bug.cgi?id=34947
- https://www.openwall.com/lists/oss-security/2026/01/07/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69194
- wget2-2.0.1-1.1.mga9
Kernel-Arten-de
Kernel flavours
Backport kernels: bug number updated
← Older revision Revision as of 21:51, 9 January 2026 Line 73: Line 73: Kernel 6.12.60+ and 6.18.3+ are provided in Backport repository for all architectures '''in desktop flavour, and for 6.18 also in server flavour''' ''- no other flavour.''<br> Kernel 6.12.60+ and 6.18.3+ are provided in Backport repository for all architectures '''in desktop flavour, and for 6.18 also in server flavour''' ''- no other flavour.''<br> −''('''In progress''' {{Bug|34545}} January 2026; kernels are currently in backport_testing repo)''<br>+''('''In progress''' {{Bug|34962}} January 2026; kernels are currently in backport_testing repo)''<br> '''<br> '''<br> Only two packages to install per kernel''' (from Backport): <br> Only two packages to install per kernel''' (from Backport): <br> Morgano



