Lector de Feeds
MGASA-2025-0251 - Updated poppler packages fix security vulnerability
Publication date: 29 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-52885 Description Use After Free (UAF) in Poppler. (CVE-2025-52885) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-52885 Description Use After Free (UAF) in Poppler. (CVE-2025-52885) References
- https://bugs.mageia.org/show_bug.cgi?id=34668
- https://www.openwall.com/lists/oss-security/2025/10/13/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52885
- poppler-23.02.0-1.8.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0250 - Updated tomcat packages fix security vulnerabilities
Publication date: 29 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-55752 , CVE-2025-55754 , CVE-2025-61795 Description Directory traversal via rewrite with possible RCE if PUT is enabled. (CVE-2025-55752) Console manipulation via escape sequences in log messages. (CVE-2025-55754) Delayed cleaning of multi-part upload temporary files may lead to DoS. (CVE-2025-61795) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-55752 , CVE-2025-55754 , CVE-2025-61795 Description Directory traversal via rewrite with possible RCE if PUT is enabled. (CVE-2025-55752) Console manipulation via escape sequences in log messages. (CVE-2025-55754) Delayed cleaning of multi-part upload temporary files may lead to DoS. (CVE-2025-61795) References
- https://bugs.mageia.org/show_bug.cgi?id=34699
- https://www.openwall.com/lists/oss-security/2025/10/27/4
- https://www.openwall.com/lists/oss-security/2025/10/27/5
- https://www.openwall.com/lists/oss-security/2025/10/27/6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795
- tomcat-9.0.111-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0249 - Updated icu packages fix security vulnerability
Publication date: 27 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-5222 Description A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-5222 Description A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution. References
- https://bugs.mageia.org/show_bug.cgi?id=34442
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB5WTHV4QSRRUVG6KMSV4Z2FIQKSWR54/
- https://lists.debian.org/debian-security-announce/2025/msg00115.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222
- icu-73.2-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0248 - Updated libtpms package fixes security vulnerability
Publication date: 27 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49133 Description It was discovered that libtpms had a potential out-of-bound access & abort due to HMAC signing issue (CVE-2025-49133). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-49133 Description It was discovered that libtpms had a potential out-of-bound access & abort due to HMAC signing issue (CVE-2025-49133). References
- https://bugs.mageia.org/show_bug.cgi?id=34396
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XITIPFJQFQIYBAV5Y3UA5AL6T5ATFDFX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49133
- libtpms-0.9.6-1.1.mga9
Categorías: Actualizaciones de Seguridad




