Lector de Feeds

MGAA-2026-0028 - Updated python-astropy packages fix bug

Mageia Security - 17 Abril, 2026 - 20:56
Publication date: 17 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description python3-astropy missed the python3-configobj requirement. This update fixes the reported issue. References SRPMS 9/core
  • python-astropy-5.1.1-1.2.mga9

MGASA-2026-0099 - Updated cockpit-338 packages fix security vulnerability

Mageia Security - 16 Abril, 2026 - 18:53
Publication date: 16 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4631 Description Unauthenticated remote code execution due to ssh command-line argument injection. (CVE-2026-4631) References SRPMS 9/core
  • cockpit-338-1.7.mga9

MGAA-2026-0026 - Updated simplescreenrecorder packages fix bug

Mageia Security - 16 Abril, 2026 - 18:53
Publication date: 16 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simplescreenrecorder package to fix OpenGL recording. References SRPMS 9/core
  • simplescreenrecorder-0.4.4-1.1.mga9

MGASA-2026-0098 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - 15 Abril, 2026 - 17:42
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Vanilla upstream kernel version 6.6.130 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.130-1.mga9

MGASA-2026-0097 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities

Mageia Security - 15 Abril, 2026 - 17:42
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Upstream kernel version 6.6.130 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References SRPMS 9/core
  • kernel-6.6.130-1.mga9
  • kmod-virtualbox-7.1.14-15.mga9
  • kmod-xtables-addons-3.24-89.mga9

MGASA-2026-0096 - Updated libpng12 packages fix security vulnerability

Mageia Security - 12 Abril, 2026 - 06:23
Publication date: 12 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description LIBPNG has a heap buffer overflow in png_set_quantize. (CVE-2026-25646) References SRPMS 9/core
  • libpng12-1.2.59-3.1.mga9

MGASA-2026-0095 - Updated tomcat packages fix security vulnerabilities

Mageia Security - 12 Abril, 2026 - 06:23
Publication date: 12 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-24880 , CVE-2026-25854 , CVE-2026-29129 , CVE-2026-29145 , CVE-2026-29146 , CVE-2026-32990 , CVE-2026-34483 , CVE-2026-34486 , CVE-2026-34487 , CVE-2026-34500 Description Request smuggling via invalid chunk extension. (CVE-2026-24880) Occasionally open redirect. (CVE-2026-25854) TLS cipher order is not preserved. (CVE-2026-29129) OCSP checks sometimes soft-fail even when soft-fail is disabled. (CVE-2026-29145) EncryptInterceptor vulnerable to padding oracle attack by default. (CVE-2026-29146) Fix for CVE-2025-66614 is incomplete. (CVE-2026-32990) Incomplete escaping of JSON access logs. (CVE-2026-34483) Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor. (CVE-2026-34486) Cloud membership for clustering component exposed the Kubernetes bearer token. (CVE-2026-34487) OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled. (CVE-2026-34500) References SRPMS 9/core
  • tomcat-9.0.117-1.mga9

MGASA-2026-0094 - Updated squid packages fix security vulnerabilities

Mageia Security - 12 Abril, 2026 - 06:23
Publication date: 12 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59362 , CVE-2025-62168 , CVE-2026-33526 , CVE-2026-32748 , CVE-2026-33515 Description Squid mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c. (CVE-2025-59362) Squid vulnerable to information disclosure via authentication credential leakage in error handling. (CVE-2025-62168) Squid vulnerable to Denial of Service in ICP Request handling. (CVE-2026-33526) Squid has Denial of Service in ICP Response handling. (CVE-2026-32748) Squid has issues in ICP message handling. (CVE-2026-33515) References SRPMS 9/core
  • squid-5.9-1.5.mga9

MGASA-2026-0093 - Updated python-django packages fix security vulnerabilities

Mageia Security - 12 Abril, 2026 - 00:02
Publication date: 11 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-3902 , CVE-2026-4277 , CVE-2026-4292 , CVE-2026-33033 , CVE-2026-33034 Description ASGI header spoofing via underscore/hyphen conflation. (CVE-2026-3902) Privilege abuse in ``GenericInlineModelAdmin``. (CVE-2026-4277) Privilege abuse in ``ModelAdmin.list_editable``. (CVE-2026-4292) Potential denial-of-service vulnerability in ``MultiPartParser`` via base64-encoded file upload. (CVE-2026-33033) Potential denial-of-service vulnerability in ASGI requests via memory upload limit bypass. (CVE-2026-33034) References SRPMS 9/core
  • python-django-4.1.13-1.12.mga9

MGASA-2026-0092 - Updated python-tornado packages fix security vulnerabilities

Mageia Security - 10 Abril, 2026 - 18:11
Publication date: 10 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-67724 , CVE-2025-67725 , CVE-2025-67726 Description Tornado vulnerable to Header Injection and XSS via reason argument. (CVE-2025-67724) Tornado is Vulnerable to Quadratic DoS via Repeated Header Coalescing. (CVE-2025-67725) Tornado is Vulnerable to Quadratic DoS via Crafted Multipart Parameters. (CVE-2025-67726) References SRPMS 9/core
  • python-tornado-6.3.2-1.3.mga9

MGASA-2026-0091 - Updated openssl packages fix security vulnerabilities

Mageia Security - 10 Abril, 2026 - 18:11
Publication date: 10 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-31790 , CVE-2026-28387 , CVE-2026-28388 , CVE-2026-28389 , CVE-2026-28390 , CVE-2026-31789 Description Incorrect Failure Handling in RSA KEM RSASVE Encapsulation. (CVE-2026-31790) Potential Use-after-free in DANE Client Code. (CVE-2026-28387) NULL Pointer Dereference When Processing a Delta CRL. (CVE-2026-28388) Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo. (CVE-2026-28389) Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo. (CVE-2026-28390) Heap Buffer Overflow in Hexadecimal Conversion. (CVE-2026-31789) References SRPMS 9/core
  • openssl-3.0.20-1.mga9

La próxima Asamblea General de Mageia tendrá lugar el 22 de abril de 2026

Blog de Mageia-ES - 8 Abril, 2026 - 13:27

La próxima Asamblea General de Mageia se celebrará en línea el miércoles 22 de abril de 2026 a las 17:00 UTC (19:00 CEST).

También será una Asamblea General Extraordinaria, siempre que al menos un tercio de los miembros de la Asociación estén presentes o representados.

Orden del día:

  1. Palabras de apertura del presidente.
  2. Informe financiero del tesorero y aprobaciones.
  3. Informe de gestión del comité ejecutivo.
  4. Votación sobre la asignación presupuestaria.

Como parte de la Asamblea Extraordinaria, se votará sobre:

  1. La redefinición de los miembros en los estatutos, con aplicación inmediata.
  2. La corrección de un error tipográfico en los estatutos.
  3. La numeración de los párrafos en los estatutos.
  4. La actualización de una dirección en los estatutos.

Solo los miembros de la Asociación tienen derecho a voto.

Si el número de miembros presentes o representados es insuficiente, la Asamblea General Extraordinaria se aplazará al menos dos semanas.

Puede encontrar más información en una copia de la invitación original enviada a los miembros de la Asociación.

Si es colaborador de Mageia, también puede unirse a la reunión. Solo tiene que enviar un correo electrónico a la lista de correo de debate de su equipo y le indicaremos dónde nos reunimos.

Categorías: Blogs Oficiales

Presentamos a nuestro ganador del Concurso de Arte!

Blog de Mageia-ES - 8 Abril, 2026 - 08:24

Una vez terminadas las votaciones del concurso de arte para Mageia 10, tenemos el honor de presentaros el que será el fondo de escritorio oficial para nuestra nueva versión. Gracias a nuestro colaborador Davide Dallara, por este gran trabajo.

En sus palabras, nuestro nuevo fondo de escritorio representa «a nuestra querida Mageia nacida de todo el equipo que hace posible esta gran distro, junto con Tux la mascota de Linux, y el caldero en ebullición que representa la rama de desarrollo de Mageia».

Como se indicó en el anuncio del Concurso de Arte, tendremos una mención especial a nuestro ganador en nuestra «Pantalla de Bienvenida» de Mageia 10.

Desde aquí queremos también dar las gracias al resto de nuestros colaboradores que han aportado su trabajo para que Mageia 10 luzca tan original!

También tenemos unos hermosos screensavers que podrás ver cuando se publique nuestra nueva versión!

Todas estas imágenes y nuestro nuevo fondo de escritorio forman parte desde hoy del exclusivo diseño de Mageia 10 para el disfrute de todos nuestros usuarios!

Saludos comunidad!

Categorías: Blogs Oficiales

Introducing our Art Contest winner!

Blog de Mageia (English) - 8 Abril, 2026 - 08:19

Now that voting for the Mageia 10 art competition has closed, we are delighted to present what will be the official desktop wallpaper for our new release. Many thanks to our contributor Davide Dallara for this excellent work.

In his words, our new desktop background depicts “our beloved Mageia, born of the entire team that makes this great distro possible, alongside Tux, the Linux mascot, and the bubbling cauldron that represents the Mageia development branch”.

As mentioned in the Art Contest announcement, we will be giving our winner a special mention on the Mageia 10 “Welcome Screen”.

We would also like to take this opportunity to thank the rest of our contributors who have contributed their work to make Mageia 10 look so unique!

We also have some lovely screensavers that you’ll be able to see when our new version is released!

All these images and our new desktop wallpaper are now part of the exclusive Mageia 10 design, for all our users to enjoy!

Greetings, community!

Categorías: Blogs Oficiales

MGASA-2026-0090 - Updated python-pygments packages fix security vulnerability

Mageia Security - 8 Abril, 2026 - 03:49
Publication date: 08 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4539 Description A security flaw in Pygments function AdlLexer in archetype.py stems from a regular expression having an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles. (CVE-2026-4539) References SRPMS 9/core
  • python-pygments-2.15.1-1.1.mga9

MGAA-2026-0025 - Updated simgear, flightgear & flightgear-data packages fix bugs

Mageia Security - 8 Abril, 2026 - 03:49
Publication date: 08 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simgear, flightgear and flightgear-data packages to new stable release version 2024.1.5 References SRPMS 9/core
  • flightgear-2024.1.5-1.mga9
  • simgear-2024.1.5-1.mga9
  • flightgear-data-2024.1.5-1.mga9

MGASA-2026-0089 - Updated roundcubemail packages fix security vulnerability

Mageia Security - 7 Abril, 2026 - 22:50
Publication date: 07 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-35545 Description SVG Animate FUNCIRI Attribute Bypass — Remote Image Loading via fill/filter/stroke And some regressions from the last fix are fixed. References SRPMS 9/core
  • roundcubemail-1.6.15-1.mga9

MGASA-2026-0088 - Updated tigervnc packages fix security vulnerability

Mageia Security - 7 Abril, 2026 - 22:50
Publication date: 07 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-34352 Description In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions. (CVE-2026-34352) References SRPMS 9/core
  • tigervnc-1.13.1-2.10.mga9

MGASA-2026-0086 - Updated freerdp packages fix security vulnerabilities

Mageia Security - 6 Abril, 2026 - 18:35
Publication date: 06 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22852 , CVE-2026-22854 , CVE-2026-22855 , CVE-2026-22856 , CVE-2026-22857 , CVE-2026-22859 , CVE-2026-23732 , CVE-2026-23883 , CVE-2026-23884 , CVE-2026-24491 , CVE-2026-26271 , CVE-2026-26955 , CVE-2026-26965 , CVE-2026-31806 , CVE-2026-31883 , CVE-2026-31885 Description FreeRDP has a heap-buffer-overflow in audin_process_formats. (CVE-2026-22852) FreeRDP has a heap-buffer-overflow in drive_process_irp_read. (CVE-2026-22854) FreeRDP has a heap-buffer-overflow in smartcard_unpack_set_attrib_call. (CVE-2026-22855) FreeRDP has a heap-use-after-free in create_irp_thread. (CVE-2026-22856) FreeRDP has a heap-use-after-free in irp_thread_func. (CVE-2026-22857) FreeRDP has a heap-buffer-overflow in urb_select_configuration. (CVE-2026-22859) FreeRDP has heap-buffer-overflow in Glyph_Alloc. (CVE-2026-23732) Heap-use-after-free in update_pointer_new. (CVE-2026-23883) Heap-use-after-free in gdi_set_bounds. (CVE-2026-23884) FreeRDP has a heap-use-after-free in video_timer. (CVE-2026-24491) Buffer Overread in FreeRDP Icon Processing. (CVE-2026-26271) FreeRDP has Out-of-bounds Write. (CVE-2026-26955, CVE-2026-26965) FreeRDP has a Heap Buffer Overflow in nsc_process_message() via Unchecked SURFACE_BITS_COMMAND Bitmap Dimensions. (CVE-2026-31806) FreeRDP has a `size_t` underflow in ADPCM decoder leads to heap-buffer-overflow write. (CVE-2026-31883) FreeRDP has an out-of-bounds read in ADPCM decoders due to missing predictor/step_index bounds checks. (CVE-2026-31885) References SRPMS 9/core
  • freerdp-2.11.7-1.3.mga9
Feed