Lector de Feeds
MGASA-2025-0236 - Updated microcode packages fix security vulnerabilities
Publication date: 10 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-20109 , CVE-2025-22840 , CVE-2025-22839 , CVE-2025-20053 , CVE-2025-24305 , CVE-2025-21090 , CVE-2025-26403 , CVE-2025-32086 Description The updated package updates AMD cpu microcode for processor family 19h, adds AMD cpu microcode for processor family 1ah and fixes security vulnerabilities for Intel processors: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-20109) Sequence of processor instructions leads to unexpected behavior for some Intel® Xeon® 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-22840) Insufficient granularity of access control in the OOB-MSM for some Intel® Xeon® 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. (CVE-2025-22839) Improper handling of overlap between protected memory ranges for some Intel® Xeon® 6 processor with Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-22889) Improper buffer restrictions for some Intel® Xeon® Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-20053) Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel® Xeon® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-24305) Missing reference to active allocated resource for some Intel® Xeon® processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2025-21090) Out-of-bounds write in the memory subsystem for some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-26403) Improperly implemented security check for standard in the DDRIO configuration for some Intel® Xeon® 6 Processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-32086) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-20109 , CVE-2025-22840 , CVE-2025-22839 , CVE-2025-20053 , CVE-2025-24305 , CVE-2025-21090 , CVE-2025-26403 , CVE-2025-32086 Description The updated package updates AMD cpu microcode for processor family 19h, adds AMD cpu microcode for processor family 1ah and fixes security vulnerabilities for Intel processors: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-20109) Sequence of processor instructions leads to unexpected behavior for some Intel® Xeon® 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-22840) Insufficient granularity of access control in the OOB-MSM for some Intel® Xeon® 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. (CVE-2025-22839) Improper handling of overlap between protected memory ranges for some Intel® Xeon® 6 processor with Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-22889) Improper buffer restrictions for some Intel® Xeon® Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-20053) Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel® Xeon® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-24305) Missing reference to active allocated resource for some Intel® Xeon® processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2025-21090) Out-of-bounds write in the memory subsystem for some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-26403) Improperly implemented security check for standard in the DDRIO configuration for some Intel® Xeon® 6 Processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-32086) References
- https://bugs.mageia.org/show_bug.cgi?id=34629
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
- microcode-0.20250812-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2025-0235 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 10 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Upstream kernel version 6.6.105 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. The newer meta-task and mageia-repos packages are required to simplify the correct installation of the kernel-stable-userspace-headers (for backport kernel-stable) and back to kernel-userspace-headers (for 6.6 kernels) packages see https://bugs.mageia.org/show_bug.cgi?id=34545. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Upstream kernel version 6.6.105 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. The newer meta-task and mageia-repos packages are required to simplify the correct installation of the kernel-stable-userspace-headers (for backport kernel-stable) and back to kernel-userspace-headers (for 6.6 kernels) packages see https://bugs.mageia.org/show_bug.cgi?id=34545. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34594
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.102
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.103
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.104
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734
- kernel-6.6.105-1.mga9
- kmod-virtualbox-7.1.10-10.mga9
- kmod-xtables-addons-3.24-86.mga9
- mageia-repos-9-4.mga9
- meta-task-9-4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0234 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 09 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Vanilla upstream kernel version 6.6.105 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Vanilla upstream kernel version 6.6.105 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34595
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.102
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.103
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.104
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734
- kernel-linus-6.6.105-1.mga9
Categorías: Actualizaciones de Seguridad
mesa-24.2.3-1.mga9.tainted.src.rpm
In Mageia/9/x86_64:
Mesa is an OpenGL 4.6 compatible 3D graphics library.
Categorías: RPMs
mesa-24.2.3-1.mga9.tainted.src.rpm
In Mageia/9/aarch64:
Mesa is an OpenGL 4.6 compatible 3D graphics library.
Categorías: RPMs
mesa-24.2.3-1.mga9.tainted.src.rpm
In Mageia/9/armv7hl:
Mesa is an OpenGL 4.6 compatible 3D graphics library.
Categorías: RPMs
mesa-24.2.3-1.mga9.tainted.src.rpm
In Mageia/9/i586:
Mesa is an OpenGL 4.6 compatible 3D graphics library.
Categorías: RPMs
rachota-2.4-0.602hg.1.mga10.src.rpm
In Mageia/cauldron/x86_64:
Rachota is a portable application for timetracking different projects. It runs
everywhere. It displays time data in diagram form, creates customized reports
and invoices or analyses measured data and suggests hints to improve user's
time usage. The totally portable yet personal timetracker.
Categorías: RPMs
rachota-2.4-0.602hg.1.mga10.src.rpm
In Mageia/cauldron/i586:
Rachota is a portable application for timetracking different projects. It runs
everywhere. It displays time data in diagram form, creates customized reports
and invoices or analyses measured data and suggests hints to improve user's
time usage. The totally portable yet personal timetracker.
Categorías: RPMs
ppmtomd-1.6-9.mga10.src.rpm
In Mageia/cauldron/i586:
A program to convert images from PPM format into the control language for the
Alps Micro-Dry printers, at various times sold by Citizen, Alps and Okidata.
This program drives the Alps Micro-Dry series of printers, including the
Citizen Printiva series, Alps MD series, and Oki DP series (but not yet the
DP-7000).
In the current release, the program drives the standard mode fairly well; the
dye sublimation mode very well; and the VPhoto mode reasonably well.
It supports all the colours available up to the DP-5000, including the foil
colours.
Categorías: RPMs
ppmtomd-1.6-9.mga10.src.rpm
In Mageia/cauldron/x86_64:
A program to convert images from PPM format into the control language for the
Alps Micro-Dry printers, at various times sold by Citizen, Alps and Okidata.
This program drives the Alps Micro-Dry series of printers, including the
Citizen Printiva series, Alps MD series, and Oki DP series (but not yet the
DP-7000).
In the current release, the program drives the standard mode fairly well; the
dye sublimation mode very well; and the VPhoto mode reasonably well.
It supports all the colours available up to the DP-5000, including the foil
colours.
Categorías: RPMs
recoverjpeg-2.6.3-4.mga10.src.rpm
In Mageia/cauldron/x86_64:
This tool tries to recover JFIF (JPEG) pictures and MOV movies (using
recovermov) from a peripheral. This may be useful if you mistakenly overwrite
a partition or if a device such as a digital camera memory card is bogus.
Categorías: RPMs




