Lector de Feeds
Mailing lists
System Administration
← Older revision Revision as of 16:08, 4 May 2026 Line 132: Line 132: * [https://ml.mageia.org/l/info/sysadmin-reports sysadmin-reports]: Automated reports from various pieces of infrastructure * [https://ml.mageia.org/l/info/sysadmin-reports sysadmin-reports]: Automated reports from various pieces of infrastructure + +* [https://ml.mageia.org/l/info/test test]: Test mailing list for sysadmin team Bcornec
Categorías: Wiki de Mageia
MGASA-2026-0108 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 04 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23414 , CVE-2026-31408 , CVE-2026-31414 , CVE-2026-31415 , CVE-2026-31416 , CVE-2026-31417 , CVE-2026-31418 , CVE-2026-31421 , CVE-2026-31422 , CVE-2026-31423 , CVE-2026-31424 , CVE-2026-31425 , CVE-2026-31426 , CVE-2026-31427 , CVE-2026-31428 , CVE-2026-31430 , CVE-2026-31431 , CVE-2026-31433 , CVE-2026-31434 , CVE-2026-31439 , CVE-2026-31441 , CVE-2026-31444 , CVE-2026-31446 , CVE-2026-31447 , CVE-2026-31448 , CVE-2026-31450 , CVE-2026-31451 , CVE-2026-31452 , CVE-2026-31453 , CVE-2026-31454 , CVE-2026-31455 , CVE-2026-31458 , CVE-2026-31464 , CVE-2026-31466 , CVE-2026-31467 , CVE-2026-31469 , CVE-2026-31473 , CVE-2026-31474 , CVE-2026-31476 , CVE-2026-31477 , CVE-2026-31478 , CVE-2026-31480 , CVE-2026-31482 , CVE-2026-31483 , CVE-2026-31485 , CVE-2026-31492 , CVE-2026-31494 , CVE-2026-31495 , CVE-2026-31496 , CVE-2026-31497 , CVE-2026-31498 , CVE-2026-31500 , CVE-2026-31503 , CVE-2026-31504 , CVE-2026-31507 , CVE-2026-31508 , CVE-2026-31509 , CVE-2026-31510 , CVE-2026-31512 , CVE-2026-31515 , CVE-2026-31518 , CVE-2026-31519 , CVE-2026-31520 , CVE-2026-31521 , CVE-2026-31522 , CVE-2026-31523 , CVE-2026-31524 , CVE-2026-31525 , CVE-2026-31528 , CVE-2026-31533 , CVE-2026-31555 , CVE-2026-31563 , CVE-2026-31565 , CVE-2026-31566 , CVE-2026-31570 , CVE-2026-31628 , CVE-2026-31634 , CVE-2026-31637 , CVE-2026-31638 , CVE-2026-31639 , CVE-2026-31642 , CVE-2026-31646 , CVE-2026-31648 , CVE-2026-31649 , CVE-2026-31651 , CVE-2026-31655 , CVE-2026-31656 , CVE-2026-31657 , CVE-2026-31658 , CVE-2026-31659 , CVE-2026-31660 , CVE-2026-31661 , CVE-2026-31662 , CVE-2026-31664 , CVE-2026-31665 , CVE-2026-31667 , CVE-2026-31668 , CVE-2026-31669 , CVE-2026-31670 , CVE-2026-31671 , CVE-2026-31672 , CVE-2026-31674 , CVE-2026-31675 , CVE-2026-31678 , CVE-2026-31679 , CVE-2026-31680 , CVE-2026-31682 , CVE-2026-31686 , CVE-2026-31689 , CVE-2026-31694 , CVE-2026-31695 , CVE-2026-31696 , CVE-2026-31697 , CVE-2026-31698 , CVE-2026-31699 , CVE-2026-31700 , CVE-2026-31701 , CVE-2026-31702 , CVE-2026-31704 , CVE-2026-31705 , CVE-2026-31708 , CVE-2026-31711 , CVE-2026-31714 , CVE-2026-31716 , CVE-2026-31720 , CVE-2026-31721 , CVE-2026-31726 , CVE-2026-31728 , CVE-2026-31730 , CVE-2026-31737 , CVE-2026-31738 , CVE-2026-31740 , CVE-2026-31741 , CVE-2026-31747 , CVE-2026-31748 , CVE-2026-31749 , CVE-2026-31751 , CVE-2026-31752 , CVE-2026-31754 , CVE-2026-31755 , CVE-2026-31756 , CVE-2026-31758 , CVE-2026-31759 , CVE-2026-31761 , CVE-2026-31762 , CVE-2026-31763 , CVE-2026-31768 , CVE-2026-31770 , CVE-2026-31773 , CVE-2026-31776 , CVE-2026-31778 , CVE-2026-31779 , CVE-2026-31780 , CVE-2026-31781 , CVE-2026-31786 , CVE-2026-31787 , CVE-2026-43007 , CVE-2026-43011 , CVE-2026-43013 , CVE-2026-43014 , CVE-2026-43015 , CVE-2026-43016 , CVE-2026-43017 , CVE-2026-43018 , CVE-2026-43020 , CVE-2026-43023 , CVE-2026-43024 , CVE-2026-43025 , CVE-2026-43026 , CVE-2026-43027 , CVE-2026-43028 , CVE-2026-43030 , CVE-2026-43032 , CVE-2026-43033 , CVE-2026-43035 , CVE-2026-43037 , CVE-2026-43038 , CVE-2026-43040 , CVE-2026-43041 , CVE-2026-43043 , CVE-2026-43044 , CVE-2026-43046 , CVE-2026-43047 , CVE-2026-43050 , CVE-2026-43051 , CVE-2026-43054 , CVE-2026-43056 , CVE-2026-43057 , CVE-2026-43058 Description Upstream kernel version 6.6.137 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23414 , CVE-2026-31408 , CVE-2026-31414 , CVE-2026-31415 , CVE-2026-31416 , CVE-2026-31417 , CVE-2026-31418 , CVE-2026-31421 , CVE-2026-31422 , CVE-2026-31423 , CVE-2026-31424 , CVE-2026-31425 , CVE-2026-31426 , CVE-2026-31427 , CVE-2026-31428 , CVE-2026-31430 , CVE-2026-31431 , CVE-2026-31433 , CVE-2026-31434 , CVE-2026-31439 , CVE-2026-31441 , CVE-2026-31444 , CVE-2026-31446 , CVE-2026-31447 , CVE-2026-31448 , CVE-2026-31450 , CVE-2026-31451 , CVE-2026-31452 , CVE-2026-31453 , CVE-2026-31454 , CVE-2026-31455 , CVE-2026-31458 , CVE-2026-31464 , CVE-2026-31466 , CVE-2026-31467 , CVE-2026-31469 , CVE-2026-31473 , CVE-2026-31474 , CVE-2026-31476 , CVE-2026-31477 , CVE-2026-31478 , CVE-2026-31480 , CVE-2026-31482 , CVE-2026-31483 , CVE-2026-31485 , CVE-2026-31492 , CVE-2026-31494 , CVE-2026-31495 , CVE-2026-31496 , CVE-2026-31497 , CVE-2026-31498 , CVE-2026-31500 , CVE-2026-31503 , CVE-2026-31504 , CVE-2026-31507 , CVE-2026-31508 , CVE-2026-31509 , CVE-2026-31510 , CVE-2026-31512 , CVE-2026-31515 , CVE-2026-31518 , CVE-2026-31519 , CVE-2026-31520 , CVE-2026-31521 , CVE-2026-31522 , CVE-2026-31523 , CVE-2026-31524 , CVE-2026-31525 , CVE-2026-31528 , CVE-2026-31533 , CVE-2026-31555 , CVE-2026-31563 , CVE-2026-31565 , CVE-2026-31566 , CVE-2026-31570 , CVE-2026-31628 , CVE-2026-31634 , CVE-2026-31637 , CVE-2026-31638 , CVE-2026-31639 , CVE-2026-31642 , CVE-2026-31646 , CVE-2026-31648 , CVE-2026-31649 , CVE-2026-31651 , CVE-2026-31655 , CVE-2026-31656 , CVE-2026-31657 , CVE-2026-31658 , CVE-2026-31659 , CVE-2026-31660 , CVE-2026-31661 , CVE-2026-31662 , CVE-2026-31664 , CVE-2026-31665 , CVE-2026-31667 , CVE-2026-31668 , CVE-2026-31669 , CVE-2026-31670 , CVE-2026-31671 , CVE-2026-31672 , CVE-2026-31674 , CVE-2026-31675 , CVE-2026-31678 , CVE-2026-31679 , CVE-2026-31680 , CVE-2026-31682 , CVE-2026-31686 , CVE-2026-31689 , CVE-2026-31694 , CVE-2026-31695 , CVE-2026-31696 , CVE-2026-31697 , CVE-2026-31698 , CVE-2026-31699 , CVE-2026-31700 , CVE-2026-31701 , CVE-2026-31702 , CVE-2026-31704 , CVE-2026-31705 , CVE-2026-31708 , CVE-2026-31711 , CVE-2026-31714 , CVE-2026-31716 , CVE-2026-31720 , CVE-2026-31721 , CVE-2026-31726 , CVE-2026-31728 , CVE-2026-31730 , CVE-2026-31737 , CVE-2026-31738 , CVE-2026-31740 , CVE-2026-31741 , CVE-2026-31747 , CVE-2026-31748 , CVE-2026-31749 , CVE-2026-31751 , CVE-2026-31752 , CVE-2026-31754 , CVE-2026-31755 , CVE-2026-31756 , CVE-2026-31758 , CVE-2026-31759 , CVE-2026-31761 , CVE-2026-31762 , CVE-2026-31763 , CVE-2026-31768 , CVE-2026-31770 , CVE-2026-31773 , CVE-2026-31776 , CVE-2026-31778 , CVE-2026-31779 , CVE-2026-31780 , CVE-2026-31781 , CVE-2026-31786 , CVE-2026-31787 , CVE-2026-43007 , CVE-2026-43011 , CVE-2026-43013 , CVE-2026-43014 , CVE-2026-43015 , CVE-2026-43016 , CVE-2026-43017 , CVE-2026-43018 , CVE-2026-43020 , CVE-2026-43023 , CVE-2026-43024 , CVE-2026-43025 , CVE-2026-43026 , CVE-2026-43027 , CVE-2026-43028 , CVE-2026-43030 , CVE-2026-43032 , CVE-2026-43033 , CVE-2026-43035 , CVE-2026-43037 , CVE-2026-43038 , CVE-2026-43040 , CVE-2026-43041 , CVE-2026-43043 , CVE-2026-43044 , CVE-2026-43046 , CVE-2026-43047 , CVE-2026-43050 , CVE-2026-43051 , CVE-2026-43054 , CVE-2026-43056 , CVE-2026-43057 , CVE-2026-43058 Description Upstream kernel version 6.6.137 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=35459
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.131
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.132
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.133
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.134
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.135
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.136
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23414
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31408
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31414
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31415
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31416
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31417
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31421
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31422
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31423
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31424
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31425
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31426
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31427
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31428
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31430
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31431
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31433
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31434
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31441
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31444
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31446
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31447
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31448
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31450
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31451
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31452
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31453
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31454
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31455
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31458
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31464
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31466
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31469
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31473
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31480
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31482
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31483
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31485
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31492
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31494
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31495
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31496
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31497
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31498
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31500
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31503
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31504
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31507
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31509
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31510
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31512
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31515
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31519
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31520
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31521
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31522
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31523
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31525
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31528
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31533
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31570
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31628
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31637
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31638
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31642
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31646
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31649
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31651
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31655
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31657
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31658
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31660
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31661
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31662
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31664
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31665
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31667
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31669
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31670
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31671
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31674
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31675
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31678
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31680
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31686
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31698
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31704
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31705
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31726
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31738
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31747
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31748
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31749
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31751
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31754
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31762
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31778
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31779
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43007
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43014
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43023
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43058
- kernel-6.6.137-1.mga9
- kmod-virtualbox-7.1.18-18.mga9
- kmod-xtables-addons-3.24-90.mga9
Categorías: Actualizaciones de Seguridad
VirtualBox
Oracle extension pack (optional)
← Older revision Revision as of 12:02, 4 May 2026 (One intermediate revision by the same user not shown)Line 18: Line 18: ==== Oracle extension pack (optional) ==== ==== Oracle extension pack (optional) ==== −''In VirtualBox '''version 7''', in current Mageia, '''you do not need the Oracle extension pack''' to get USB2, USB3, EHCI or XHCI support, as all of the USB support is integrated in the free version. For VirtualBox 7, you only need it for: VirtualBox RDP, disk encryption, NVMe and PXE boot for Intel cards.''+'''For VirtualBoxversion 7, in current Mageia, you do not need the Oracle extension pack''' to get USB2, USB3, EHCI or XHCI support, as all of the USB support is integrated in the free version. For VirtualBox 7, you only need it for: VirtualBox RDP, disk encryption, NVMe and PXE boot for Intel cards.'' −VirtualBox extension pack from Oracle is required if you need support for i.e USB2 & USB3 (before VirtualBox 7), PXE, multiple vCPUs, and a number of other features. However, this pack comes with a [https://www.virtualbox.org/wiki/VirtualBox_PUEL license agreement] and is not shipped as part of Mageia.+For VirtualBox before version 7, (in Mageia 8 and earlier) you need the extension pack from Oracle if you need support for i.e USB2 & USB3, PXE, multiple vCPUs, and a number of other features. However, this pack comes with a [https://www.virtualbox.org/wiki/VirtualBox_PUEL license agreement] and is not shipped as part of Mageia. You must find an extension pack with the same version number as VirtualBox. You must find an extension pack with the same version number as VirtualBox. Morgano
Categorías: Wiki de Mageia
Mirror Contacts
← Older revision
Revision as of 06:33, 3 May 2026
Line 16:
Line 16:
{| class="wikitable" style="margin:auto" {| class="wikitable" style="margin:auto"
−|+ Mirror sites+|+ 1st Tier mirror sites
−! Mirror address !! Short name !! Location !! Contact !! E-mail address || Additional info+! Mirror address !! Short name !! Location !! Contact !! E-mail address || Sync interval
+|-
+| [https://mirror.accum.se/mirror/mageia/ https://mirror.accum.se/] || ACC || Umeå || ftp-adm || ftp-adm [AT] accum [DOT] se || 1 hour, at minute 47.
+|-
+| [https://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/ https://distrib-coffee.ipsl.jussieu.fr/] || Distrib Coffee || Paris || Olivier Thauvin || olivier [DOT] thauvin [AT] aerov [DOT] jussieu [DOT] fr || ≈20–35 min.
|- |-
−| [https://mirror.accum.se/mirror/mageia/ https://mirror.accum.se/] || ACC || Umeå || ftp-adm || ftp-adm [AT] accum [DOT] se || 1st tier mirror+| [https://distro.ibiblio.org/mageia/ https://distro.ibiblio.org/] || Ibiblio || || Don Sizemore || dls [AT] ibiblio [DOT] org || 4 hours, at minute 36.
|- |-
−| [https://distrib-coffee.ipsl.jussieu.fr/pub/linux/Mageia/ https://distrib-coffee.ipsl.jussieu.fr/] || Distrib Coffee || Paris || Olivier Thauvin || olivier [DOT] thauvin [AT] aerov [DOT] jussieu [DOT] fr || 1st tier mirror+| [https://mirrors.kernel.org/mageia/ https://mirrors.kernel.org/] || Kernel.org || || || || 1 hours, at minute 19.
|- |-
−| [https://distro.ibiblio.org/mageia/ https://distro.ibiblio.org/] || Ibiblio || || Don Sizemore || dls [AT] ibiblio [DOT] org || 1st tier mirror+| [https://mirror.math.princeton.edu/pub/mageia/ https://mirror.math.princeton.edu/]|| Princeton || Princeton || Benjamin Rose || benrose [AT] math [DOT] princeton [DOT] edu ||
+|}
+
+
+{| class="wikitable" style="margin:auto"
+|+ Mirror sites
+! Mirror address !! Short name !! Location !! Contact !! E-mail address || Additional info
|- |-
| [http://ftp.nluug.nl/pub/os/Linux/distr/mageia/ https://ftp.nluug.nl/]|| NLUUG || Groningen || ftp-admin || ftp-admin [AT] nluug [DOT] nl || | [http://ftp.nluug.nl/pub/os/Linux/distr/mageia/ https://ftp.nluug.nl/]|| NLUUG || Groningen || ftp-admin || ftp-admin [AT] nluug [DOT] nl ||
−|-
−| [https://mirror.math.princeton.edu/pub/mageia/ https://mirror.math.princeton.edu/]|| Princeton || Princeton || Benjamin Rose || benrose [AT] math [DOT] princeton [DOT] edu || 1st tier mirror
|- |-
| [https://ftp.snt.utwente.nl/pub/os/linux/mageia/ https://ftp.snt.utwente.nl/] || Twente || Twente ||ftpcom || ftpcom [AT] snt [DOT] utwente [DOT] nl || | [https://ftp.snt.utwente.nl/pub/os/linux/mageia/ https://ftp.snt.utwente.nl/] || Twente || Twente ||ftpcom || ftpcom [AT] snt [DOT] utwente [DOT] nl ||
Line 34:
Line 42:
|- |-
| [https://geex.freeboxos.fr/ https://geex.freeboxos.fr/] || geex's || France || Guillaume B. || mirror AT geex DOT ovh || 3rd tier, geex.ovh for ipv6 | [https://geex.freeboxos.fr/ https://geex.freeboxos.fr/] || geex's || France || Guillaume B. || mirror AT geex DOT ovh || 3rd tier, geex.ovh for ipv6
−|-+|}
Wally
Categorías: Wiki de Mageia
Mageia IRC Channels Liberachat
Channels in other languages: and these links, too
← Older revision Revision as of 17:44, 2 May 2026 (2 intermediate revisions by the same user not shown)Line 26: Line 26: == Project-wide channels: == == Project-wide channels: == −* [ircs://irc.libera.chat:6697/#mageia #mageia] (main project)+* [https://web.libera.chat/#mageia #mageia] (main project) −* [ircs://irc.libera.chat:6697/#mageia-board #mageia-board]+* [https://web.libera.chat/#mageia-board #mageia-board] −* [ircs://irc.libera.chat:6697/#mageia-chat #mageia-chat] (General chat and Mageia community building)+* [https://web.libera.chat/#mageia-chat #mageia-chat] (General chat and Mageia community building) −* [ircs://irc.libera.chat:6697/#mageia-council #mageia-council]+* [https://web.libera.chat/#mageia-council #mageia-council] −* [ircs://irc.libera.chat:6697/#mageia-meeting #mageia-meeting]+* [https://web.libera.chat/#mageia-meeting #mageia-meeting] −* [ircs://irc.libera.chat:6697/#mageia-next #mageia-next] (Chat about anything that helps Mageia's bright future)+* [https://web.libera.chat/#mageia-next #mageia-next] (Chat about anything that helps Mageia's bright future) −* The #mageia-social channel we had on Freenode, for General chat and Mageia community building, has become [ircs://irc.libera.chat:6697/#mageia-chat #mageia-chat] on Liberachat.+* The #mageia-social channel we had on Freenode, for General chat and Mageia community building, has become [https://web.libera.chat/#mageia-chat #mageia-chat] on Liberachat. == Team specific: == == Team specific: == −* [ircs://irc.libera.chat:6697/#mageia-atelier #mageia-atelier] ([[Atelier team|atelier team]])+* [https://web.libera.chat/#mageia-atelier #mageia-atelier] ([[Atelier team|atelier team]]) −* [ircs://irc.libera.chat:6697/#mageia-arm #mageia-arm] (A place where you help to further develop the Mageia ARM-build for ARM-supported devices)+* [https://web.libera.chat/#mageia-arm #mageia-arm] (A place where you help to further develop the Mageia ARM-build for ARM-supported devices) −* [ircs://irc.libera.chat:6697/#mageia-bugsquad #mageia-bugsquad] ([[Bugsquad|Bug Squad]])+* [https://web.libera.chat/#mageia-bugsquad #mageia-bugsquad] ([[Bugsquad|Bug Squad]]) −* [ircs://irc.libera.chat:6697/#mageia-dev #mageia-dev] ([[Developers team|developers]], [[packaging|packagers]], [[Bug_Squad|Bug Squad]] teams)+* [https://web.libera.chat/#mageia-dev #mageia-dev] ([[Developers team|developers]], [[packaging|packagers]], [[Bug_Squad|Bug Squad]] teams) −* [ircs://irc.libera.chat:6697/#mageia-doc #mageia-doc] ([[Documentation team|documentation]] team)+* [https://web.libera.chat/#mageia-doc #mageia-doc] ([[Documentation team|documentation]] team) −* [ircs://irc.libera.chat:6697/#mageia-forums #mageia-forums] ([[Forums team|Forums team]])+* [https://web.libera.chat/#mageia-forums #mageia-forums] ([[Forums team|Forums team]]) −* [ircs://irc.libera.chat:6697/#mageia-i18n #mageia-i18n] ([[Internationalisation Team (i18n)|translators]] team)+* [https://web.libera.chat/#mageia-i18n #mageia-i18n] ([[Internationalisation Team (i18n)|translators]] team) −* [ircs://irc.libera.chat:6697/#mageia-kde #mageia-kde] (KDE-specific)+* [https://web.libera.chat/#mageia-kde #mageia-kde] (KDE-specific) −* [ircs://irc.libera.chat:6697/#mageia-mentoring #mageia-mentoring] (Packaging-specific for mentors and apprentices)+* [https://web.libera.chat/#mageia-mentoring #mageia-mentoring] (Packaging-specific for mentors and apprentices) −* [ircs://irc.libera.chat:6697/#mageia-qa #mageia-qa] ([[QA Team|QA]] team)+* [https://web.libera.chat/#mageia-qa #mageia-qa] ([[QA Team|QA]] team) −* [ircs://irc.libera.chat:6697/#mageia-sysadm #mageia-sysadm] ([[Sysadmin Team|sysadmin]] team)+* [https://web.libera.chat/#mageia-sysadm #mageia-sysadm] ([[Sysadmin Team|sysadmin]] team) −* [ircs://irc.libera.chat:6697/#mageia-urpmi #mageia-urpmi] (A chan for urpmi development)+* [https://web.libera.chat/#mageia-urpmi #mageia-urpmi] (A chan for urpmi development) == Channels in other languages == == Channels in other languages == Only the channels, for which the Freenode twin was populated when this was written, are shown below: Only the channels, for which the Freenode twin was populated when this was written, are shown below: −<!--* [ircs://irc.libera.chat:6697/#mageia-br #mageia-br] (Português do Brasil)+<!--* [https://web.libera.chat/#mageia-br #mageia-br] (Português do Brasil) −* [ircs://irc.libera.chat:6697/#mageia-cn #mageia-cn] (简体中文)-->+* [https://web.libera.chat/#mageia-cn #mageia-cn] (简体中文)--> −* [ircs://irc.libera.chat:6697/#mageia-de #mageia-de] (Deutsch)+* [https://web.libera.chat/#mageia-de #mageia-de] (Deutsch) −<!--* [ircs://irc.libera.chat:6697/#mageia-eo #mageia-eo] (Esperanto)+<!--* [https://web.libera.chat/#mageia-eo #mageia-eo] (Esperanto) −* [ircs://irc.libera.chat:6697/#mageia-es #mageia-es] (Español)-->+* [https://web.libera.chat/#mageia-es #mageia-es] (Español)--> −* [ircs://irc.libera.chat:6697/#mageia-et #mageia-et] (Estonian)+* [https://web.libera.chat/#mageia-et #mageia-et] (Estonian) −<!--* [ircs://irc.libera.chat:6697/#mageia-el #mageia-el] (Greek)-->+<!--* [https://web.libera.chat/#mageia-el #mageia-el] (Greek)--> −* [ircs://irc.libera.chat:6697/#mageia-fi #mageia-fi] (Finnish)+* [https://web.libera.chat/#mageia-fi #mageia-fi] (Finnish) −* [ircs://irc.libera.chat:6697/#mageia-fr #mageia-fr] (français)+* [https://web.libera.chat/#mageia-fr #mageia-fr] (français) −<!--* [ircs://irc.libera.chat:6697/#mageia-hu #mageia-hu] (Hungarian)-->+<!--* [https://web.libera.chat/#mageia-hu #mageia-hu] (Hungarian)--> −* [ircs://irc.libera.chat:6697/#mageia-it #mageia-it] (Italiano)+* [https://web.libera.chat/#mageia-it #mageia-it] (Italiano) −<!--* [ircs://irc.libera.chat:6697/#mageia-no #mageia-no] (Norsk)+<!--* [https://web.libera.chat/#mageia-no #mageia-no] (Norsk) −* [ircs://irc.libera.chat:6697/#mageia-pl #mageia-pl] (Polski)+* [https://web.libera.chat/#mageia-pl #mageia-pl] (Polski) −* [ircs://irc.libera.chat:6697/#mageia-ru #mageia-ru] (Русский)+* [https://web.libera.chat/#mageia-ru #mageia-ru] (Русский) −* [ircs://irc.libera.chat:6697/#mageia-se #mageia-se] (Svenska)+* [https://web.libera.chat/#mageia-se #mageia-se] (Svenska) −* [ircs://irc.libera.chat:6697/#mageia-tr #mageia-tr] (Türkiye)-->+* [https://web.libera.chat/#mageia-tr #mageia-tr] (Türkiye)--> == Channels for specific location/area == == Channels for specific location/area == Marja
Categorías: Wiki de Mageia
Mageia 10 Release Notes
Using the installer to Upgrade: fix missing letter in drivers
← Older revision Revision as of 13:10, 2 May 2026 Line 594: Line 594: You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. −* DVD '''contain a lot''' of packages. Drawback: '''some wifi could not work'''. (Due to lack of space. Drives also would need to be loaded at boot to work.)+* DVD '''contain a lot''' of packages. Drawback: '''some wifi could not work'''. (Due to lack of space. Drivers also would need to be loaded at boot to work.) * Netinstall '''downloads everything'''. The nonfree version contain a lot of drivers, '''wifi is better supported'''. * Netinstall '''downloads everything'''. The nonfree version contain a lot of drivers, '''wifi is better supported'''. Geex
Categorías: Wiki de Mageia
Another extraordinary General Assembly, May 7, 2026
As stated in a previous blog post, we held our General Assembly and an extraordinary General Assembly on April 22.
You can read the report of that meeting here.
Unfortunately, too few Association members were present to reach the required quorum, so we could not have a valid vote about the needed changes to our constitution. We will therefore hold another extraordinary General Assembly on Thursday, May 7, 2026. For this second call, no quorum is required.
Categorías: Blogs Oficiales
Mageia 10 Press
← Older revision
Revision as of 15:31, 30 April 2026
Line 13:
Line 13:
== Chinese - 中国 == == Chinese - 中国 ==
−#
−== Czech - český ==
# #
Line 39:
Line 37:
# {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}} # {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}}
# {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}} # {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}}
+
+== Czech - český ==
+
+#{{Press item|root.cz|https://www.root.cz/zpravicky/nova-verze-tde-r14-1-6-trinity-desktop-environment/|Trinity desktop evironment ads support for Mageia 10| April 26 2926}}
+
== German - Deutsch == == German - Deutsch ==
Marchugo
Categorías: Wiki de Mageia
Sysadmin New Release
Tools
← Older revision Revision as of 22:03, 29 April 2026 Line 5: Line 5: https://gitweb.mageia.org/software/infrastructure/release/ https://gitweb.mageia.org/software/infrastructure/release/ There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there. There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there. + +When updating the dosutils tools remember to do it under <code>/distrib/bootstrap/distrib/cauldron/x86_64/dosutils/autorun</code> and <code>/distrib/bootstrap/distrib/cauldron/i686/dosutils/autorun</code>. The command <code>update_mga-advisories</code> will then copy them under <code>/distrib/mirror/distrib/cauldron</code>. = Update MGA::Mirrors = = Update MGA::Mirrors = Bcornec
Categorías: Wiki de Mageia
MGAA-2026-0030 - Updated light-locker packages fix bug
Publication date: 22 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description This update fixes some systemd-related issues and also some coredumps at startup. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description This update fixes some systemd-related issues and also some coredumps at startup. References SRPMS 9/core
- light-locker-1.9.0-6.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0107 - Updated gvfs packages fix security vulnerabilities
Publication date: 22 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-28295 , CVE-2026-28296 Description Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses. (CVE-2026-28295) Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths. (CVE-2026-28296) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-28295 , CVE-2026-28296 Description Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses. (CVE-2026-28295) Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths. (CVE-2026-28296) References
- https://bugs.mageia.org/show_bug.cgi?id=35171
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HQU2RBFHWZPMIUYTLU72VSQUTNQ2MUIK/
- https://ubuntu.com/security/notices/USN-8114-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28296
- gvfs-1.50.4-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0029 - Updated mga-dorsync packages fix bugs
Publication date: 21 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description mga-dorsync is QA tool to sync Mageia ISO images and transfer them to a USB stick. Now, after some updates in the code and bugs fixed, we are providing a official package for this tool. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description mga-dorsync is QA tool to sync Mageia ISO images and transfer them to a USB stick. Now, after some updates in the code and bugs fixed, we are providing a official package for this tool. References SRPMS 9/core
- mga-dorsync-3.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0106 - Updated firefox & thunderbird packages fix security vulnerabilities
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5731 , CVE-2026-5732 , CVE-2026-5734 Description Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5731) Incorrect boundary conditions, integer overflow in the Graphics: Text component. (CVE-2026-5732) Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5734) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5731 , CVE-2026-5732 , CVE-2026-5734 Description Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5731) Incorrect boundary conditions, integer overflow in the Graphics: Text component. (CVE-2026-5732) Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5734) References
- https://bugs.mageia.org/show_bug.cgi?id=35338
- https://www.firefox.com/en-US/firefox/140.9.1/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/140.9.1esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-27/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-29/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
- firefox-140.9.1-1.mga9
- firefox-l10n-140.9.1-1.mga9
- thunderbird-140.9.1-1.mga9
- thunderbird-l10n-140.9.1-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0105 - Updated libtiff packages fix security vulnerabilities
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61143 , CVE-2025-61144 Description libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. (CVE-2025-61143) libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. (CVE-2025-61144) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61143 , CVE-2025-61144 Description libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. (CVE-2025-61143) libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. (CVE-2025-61144) References
- https://bugs.mageia.org/show_bug.cgi?id=35268
- https://ubuntu.com/security/notices/USN-8113-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61144
- libtiff-4.5.1-1.7.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0104 - Updated python-cairosvg packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-31899 Description CairoSVG vulnerable to Exponential DoS via recursive element amplification. (CVE-2026-31899) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-31899 Description CairoSVG vulnerable to Exponential DoS via recursive element amplification. (CVE-2026-31899) References
- https://bugs.mageia.org/show_bug.cgi?id=35370
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBVXQHEZ24JPDMWUPRKDEZTECZLM3HVS/
- https://github.com/Kozea/CairoSVG/security/advisories/GHSA-f38f-5xpm-9r7c
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31899
- python-cairosvg-2.5.2-6.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0103 - Updated giflib packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23868 Description Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. (CVE-2026-23868) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23868 Description Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. (CVE-2026-23868) References
- https://bugs.mageia.org/show_bug.cgi?id=35264
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESPOSECITRO4QTJMS7ORKUX7NW3MWCWX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23868
- giflib-5.2.1-7.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0102 - Updated gdk-pixbuf2.0 packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5201 Description Denial of service via heap-based buffer overflow when processing a specially crafted jpeg image. (CVE-2026-5201) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5201 Description Denial of service via heap-based buffer overflow when processing a specially crafted jpeg image. (CVE-2026-5201) References
- https://bugs.mageia.org/show_bug.cgi?id=35356
- https://lists.debian.org/debian-security-announce/2026/msg00116.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5201
- gdk-pixbuf2.0-2.42.10-2.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0101 - Updated rsync packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41035 Description In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. (CVE-2026-41035) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41035 Description In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. (CVE-2026-41035) References
- https://bugs.mageia.org/show_bug.cgi?id=35373
- https://www.openwall.com/lists/oss-security/2026/04/16/2
- https://www.openwall.com/lists/oss-security/2026/04/16/9
- https://github.com/RsyncProject/rsync/issues/871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41035
- rsync-3.2.7-1.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0100 - Updated polkit-122 packages fix security vulnerability
Publication date: 17 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-7519 Description Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write. (CVE-2025-7519) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-7519 Description Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write. (CVE-2025-7519) References
- https://bugs.mageia.org/show_bug.cgi?id=35361
- https://ubuntu.com/security/notices/USN-8173-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7519
- polkit-122-2.2.mga9
Categorías: Actualizaciones de Seguridad




