Lector de Feeds
Mageia 10 Release Notes
Using the installer to Upgrade: fix missing letter in drivers
← Older revision Revision as of 13:10, 2 May 2026 Line 594: Line 594: You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. You can use both the minimal Netinstall, and the big traditional (so, non-Live) DVD ISOs to do clean installs, but also to perform an upgrade. −* DVD '''contain a lot''' of packages. Drawback: '''some wifi could not work'''. (Due to lack of space. Drives also would need to be loaded at boot to work.)+* DVD '''contain a lot''' of packages. Drawback: '''some wifi could not work'''. (Due to lack of space. Drivers also would need to be loaded at boot to work.) * Netinstall '''downloads everything'''. The nonfree version contain a lot of drivers, '''wifi is better supported'''. * Netinstall '''downloads everything'''. The nonfree version contain a lot of drivers, '''wifi is better supported'''. Geex
Categorías: Wiki de Mageia
Another extraordinary General Assembly, May 7, 2026
As stated in a previous blog post, we held our General Assembly and an extraordinary General Assembly on April 22.
You can read the report of that meeting here.
Unfortunately, too few Association members were present to reach the required quorum, so we could not have a valid vote about the needed changes to our constitution. We will therefore hold another extraordinary General Assembly on Thursday, May 7, 2026. For this second call, no quorum is required.
Categorías: Blogs Oficiales
Mageia 10 Press
← Older revision
Revision as of 15:31, 30 April 2026
Line 13:
Line 13:
== Chinese - 中国 == == Chinese - 中国 ==
−#
−== Czech - český ==
# #
Line 39:
Line 37:
# {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}} # {{Press item|Ferramentas Linux Blogspot|https://portallinuxferramentas.blogspot.com/2026/03/mageia-10-beta-arrives-deep-dive-into.html?m{{=}}1|Mageia 10 Beta Arrives: A deep dive| 21 March 2026}}
# {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}} # {{Press item|9t05Linux|https://9to5linux.com/trinity-desktop-environment-r14-1-6-adds-support-for-fedora-44-ubuntu-26-04-lts|Trinity-desktop-environment adds support for Mageia10| April 26 2026}}
+
+== Czech - český ==
+
+#{{Press item|root.cz|https://www.root.cz/zpravicky/nova-verze-tde-r14-1-6-trinity-desktop-environment/|Trinity desktop evironment ads support for Mageia 10| April 26 2926}}
+
== German - Deutsch == == German - Deutsch ==
Marchugo
Categorías: Wiki de Mageia
Sysadmin New Release
Tools
← Older revision Revision as of 22:03, 29 April 2026 Line 5: Line 5: https://gitweb.mageia.org/software/infrastructure/release/ https://gitweb.mageia.org/software/infrastructure/release/ There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there. There is an additional checklist in the [https://gitweb.mageia.org/software/infrastructure/release/tree/README README] there. + +When updating the dosutils tools remember to do it under <code>/distrib/bootstrap/distrib/cauldron/x86_64/dosutils/autorun</code> and <code>/distrib/bootstrap/distrib/cauldron/i686/dosutils/autorun</code>. The command <code>update_mga-advisories</code> will then copy them under <code>/distrib/mirror/distrib/cauldron</code>. = Update MGA::Mirrors = = Update MGA::Mirrors = Bcornec
Categorías: Wiki de Mageia
MGAA-2026-0030 - Updated light-locker packages fix bug
Publication date: 22 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description This update fixes some systemd-related issues and also some coredumps at startup. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description This update fixes some systemd-related issues and also some coredumps at startup. References SRPMS 9/core
- light-locker-1.9.0-6.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0107 - Updated gvfs packages fix security vulnerabilities
Publication date: 22 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-28295 , CVE-2026-28296 Description Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses. (CVE-2026-28295) Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths. (CVE-2026-28296) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-28295 , CVE-2026-28296 Description Gvfs: gvfs ftp backend: information disclosure via untrusted pasv responses. (CVE-2026-28295) Gvfs: ftp gvfs backend: arbitrary ftp command injection via crlf sequences in file paths. (CVE-2026-28296) References
- https://bugs.mageia.org/show_bug.cgi?id=35171
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HQU2RBFHWZPMIUYTLU72VSQUTNQ2MUIK/
- https://ubuntu.com/security/notices/USN-8114-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28296
- gvfs-1.50.4-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0029 - Updated mga-dorsync packages fix bugs
Publication date: 21 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description mga-dorsync is QA tool to sync Mageia ISO images and transfer them to a USB stick. Now, after some updates in the code and bugs fixed, we are providing a official package for this tool. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description mga-dorsync is QA tool to sync Mageia ISO images and transfer them to a USB stick. Now, after some updates in the code and bugs fixed, we are providing a official package for this tool. References SRPMS 9/core
- mga-dorsync-3.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0106 - Updated firefox & thunderbird packages fix security vulnerabilities
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5731 , CVE-2026-5732 , CVE-2026-5734 Description Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5731) Incorrect boundary conditions, integer overflow in the Graphics: Text component. (CVE-2026-5732) Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5734) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5731 , CVE-2026-5732 , CVE-2026-5734 Description Memory safety bugs fixed in Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5731) Incorrect boundary conditions, integer overflow in the Graphics: Text component. (CVE-2026-5732) Memory safety bugs fixed in Firefox ESR 140.9.1, Thunderbird ESR 140.9.1, Firefox 149.0.2 and Thunderbird 149.0.2. (CVE-2026-5734) References
- https://bugs.mageia.org/show_bug.cgi?id=35338
- https://www.firefox.com/en-US/firefox/140.9.1/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/140.9.1esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-27/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-29/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734
- firefox-140.9.1-1.mga9
- firefox-l10n-140.9.1-1.mga9
- thunderbird-140.9.1-1.mga9
- thunderbird-l10n-140.9.1-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0105 - Updated libtiff packages fix security vulnerabilities
Publication date: 21 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61143 , CVE-2025-61144 Description libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. (CVE-2025-61143) libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. (CVE-2025-61144) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61143 , CVE-2025-61144 Description libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c. (CVE-2025-61143) libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function. (CVE-2025-61144) References
- https://bugs.mageia.org/show_bug.cgi?id=35268
- https://ubuntu.com/security/notices/USN-8113-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61144
- libtiff-4.5.1-1.7.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0104 - Updated python-cairosvg packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-31899 Description CairoSVG vulnerable to Exponential DoS via recursive element amplification. (CVE-2026-31899) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-31899 Description CairoSVG vulnerable to Exponential DoS via recursive element amplification. (CVE-2026-31899) References
- https://bugs.mageia.org/show_bug.cgi?id=35370
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBVXQHEZ24JPDMWUPRKDEZTECZLM3HVS/
- https://github.com/Kozea/CairoSVG/security/advisories/GHSA-f38f-5xpm-9r7c
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31899
- python-cairosvg-2.5.2-6.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0103 - Updated giflib packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23868 Description Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. (CVE-2026-23868) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23868 Description Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. (CVE-2026-23868) References
- https://bugs.mageia.org/show_bug.cgi?id=35264
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESPOSECITRO4QTJMS7ORKUX7NW3MWCWX/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23868
- giflib-5.2.1-7.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0102 - Updated gdk-pixbuf2.0 packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5201 Description Denial of service via heap-based buffer overflow when processing a specially crafted jpeg image. (CVE-2026-5201) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-5201 Description Denial of service via heap-based buffer overflow when processing a specially crafted jpeg image. (CVE-2026-5201) References
- https://bugs.mageia.org/show_bug.cgi?id=35356
- https://lists.debian.org/debian-security-announce/2026/msg00116.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5201
- gdk-pixbuf2.0-2.42.10-2.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0101 - Updated rsync packages fix security vulnerability
Publication date: 18 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41035 Description In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. (CVE-2026-41035) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41035 Description In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable. (CVE-2026-41035) References
- https://bugs.mageia.org/show_bug.cgi?id=35373
- https://www.openwall.com/lists/oss-security/2026/04/16/2
- https://www.openwall.com/lists/oss-security/2026/04/16/9
- https://github.com/RsyncProject/rsync/issues/871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-41035
- rsync-3.2.7-1.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0100 - Updated polkit-122 packages fix security vulnerability
Publication date: 17 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-7519 Description Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write. (CVE-2025-7519) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-7519 Description Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write. (CVE-2025-7519) References
- https://bugs.mageia.org/show_bug.cgi?id=35361
- https://ubuntu.com/security/notices/USN-8173-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7519
- polkit-122-2.2.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0028 - Updated python-astropy packages fix bug
Publication date: 17 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description python3-astropy missed the python3-configobj requirement. This update fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description python3-astropy missed the python3-configobj requirement. This update fixes the reported issue. References SRPMS 9/core
- python-astropy-5.1.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0099 - Updated cockpit-338 packages fix security vulnerability
Publication date: 16 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4631 Description Unauthenticated remote code execution due to ssh command-line argument injection. (CVE-2026-4631) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4631 Description Unauthenticated remote code execution due to ssh command-line argument injection. (CVE-2026-4631) References
- https://bugs.mageia.org/show_bug.cgi?id=35351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4631
- cockpit-338-1.7.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0026 - Updated simplescreenrecorder packages fix bug
Publication date: 16 Apr 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simplescreenrecorder package to fix OpenGL recording. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description Updated simplescreenrecorder package to fix OpenGL recording. References SRPMS 9/core
- simplescreenrecorder-0.4.4-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0098 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Vanilla upstream kernel version 6.6.130 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Vanilla upstream kernel version 6.6.130 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=35282
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.121
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.122
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.123
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.124
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.125
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.126
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.127
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.128
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.129
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71180
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71186
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71189
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71195
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71199
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71232
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71236
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71265
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71267
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71270
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22976
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22979
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22984
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22991
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22992
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23139
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23146
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23150
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23156
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23164
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23180
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23187
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23202
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23212
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23234
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23236
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23243
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23256
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23267
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23298
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23300
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23325
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23334
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23335
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23336
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23340
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23347
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23352
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23356
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23357
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23359
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23365
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23367
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23370
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23381
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23386
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23391
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23392
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23397
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31788
- kernel-linus-6.6.130-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0097 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 15 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Upstream kernel version 6.6.130 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-71160 , CVE-2025-71180 , CVE-2025-71182 , CVE-2025-71183 , CVE-2025-71185 , CVE-2025-71186 , CVE-2025-71188 , CVE-2025-71189 , CVE-2025-71190 , CVE-2025-71191 , CVE-2025-71192 , CVE-2025-71193 , CVE-2025-71194 , CVE-2025-71195 , CVE-2025-71196 , CVE-2025-71197 , CVE-2025-71198 , CVE-2025-71199 , CVE-2025-71200 , CVE-2025-71204 , CVE-2025-71220 , CVE-2025-71222 , CVE-2025-71223 , CVE-2025-71224 , CVE-2025-71228 , CVE-2025-71229 , CVE-2025-71232 , CVE-2025-71235 , CVE-2025-71236 , CVE-2025-71237 , CVE-2025-71238 , CVE-2025-71239 , CVE-2025-71265 , CVE-2025-71266 , CVE-2025-71267 , CVE-2025-71268 , CVE-2025-71270 , CVE-2026-22976 , CVE-2026-22977 , CVE-2026-22978 , CVE-2026-22979 , CVE-2026-22980 , CVE-2026-22982 , CVE-2026-22984 , CVE-2026-22988 , CVE-2026-22990 , CVE-2026-22991 , CVE-2026-22992 , CVE-2026-22994 , CVE-2026-23019 , CVE-2026-23020 , CVE-2026-23021 , CVE-2026-23025 , CVE-2026-23026 , CVE-2026-23030 , CVE-2026-23031 , CVE-2026-23032 , CVE-2026-23033 , CVE-2026-23037 , CVE-2026-23038 , CVE-2026-23047 , CVE-2026-23049 , CVE-2026-23054 , CVE-2026-23056 , CVE-2026-23058 , CVE-2026-23059 , CVE-2026-23060 , CVE-2026-23061 , CVE-2026-23062 , CVE-2026-23063 , CVE-2026-23064 , CVE-2026-23068 , CVE-2026-23069 , CVE-2026-23071 , CVE-2026-23073 , CVE-2026-23074 , CVE-2026-23075 , CVE-2026-23076 , CVE-2026-23078 , CVE-2026-23080 , CVE-2026-23083 , CVE-2026-23084 , CVE-2026-23085 , CVE-2026-23086 , CVE-2026-23087 , CVE-2026-23088 , CVE-2026-23089 , CVE-2026-23090 , CVE-2026-23091 , CVE-2026-23094 , CVE-2026-23095 , CVE-2026-23096 , CVE-2026-23097 , CVE-2026-23098 , CVE-2026-23099 , CVE-2026-23101 , CVE-2026-23103 , CVE-2026-23105 , CVE-2026-23107 , CVE-2026-23108 , CVE-2026-23110 , CVE-2026-23111 , CVE-2026-23112 , CVE-2026-23113 , CVE-2026-23116 , CVE-2026-23119 , CVE-2026-23120 , CVE-2026-23121 , CVE-2026-23123 , CVE-2026-23124 , CVE-2026-23125 , CVE-2026-23126 , CVE-2026-23128 , CVE-2026-23131 , CVE-2026-23133 , CVE-2026-23135 , CVE-2026-23136 , CVE-2026-23139 , CVE-2026-23140 , CVE-2026-23141 , CVE-2026-23142 , CVE-2026-23144 , CVE-2026-23145 , CVE-2026-23146 , CVE-2026-23150 , CVE-2026-23155 , CVE-2026-23156 , CVE-2026-23159 , CVE-2026-23160 , CVE-2026-23163 , CVE-2026-23164 , CVE-2026-23167 , CVE-2026-23168 , CVE-2026-23170 , CVE-2026-23172 , CVE-2026-23173 , CVE-2026-23176 , CVE-2026-23178 , CVE-2026-23179 , CVE-2026-23180 , CVE-2026-23182 , CVE-2026-23187 , CVE-2026-23190 , CVE-2026-23193 , CVE-2026-23198 , CVE-2026-23200 , CVE-2026-23202 , CVE-2026-23204 , CVE-2026-23205 , CVE-2026-23206 , CVE-2026-23209 , CVE-2026-23212 , CVE-2026-23216 , CVE-2026-23220 , CVE-2026-23222 , CVE-2026-23228 , CVE-2026-23229 , CVE-2026-23230 , CVE-2026-23233 , CVE-2026-23234 , CVE-2026-23235 , CVE-2026-23236 , CVE-2026-23237 , CVE-2026-23238 , CVE-2026-23241 , CVE-2026-23242 , CVE-2026-23243 , CVE-2026-23254 , CVE-2026-23256 , CVE-2026-23257 , CVE-2026-23258 , CVE-2026-23260 , CVE-2026-23261 , CVE-2026-23262 , CVE-2026-23264 , CVE-2026-23266 , CVE-2026-23267 , CVE-2026-23273 , CVE-2026-23279 , CVE-2026-23281 , CVE-2026-23284 , CVE-2026-23285 , CVE-2026-23286 , CVE-2026-23287 , CVE-2026-23289 , CVE-2026-23290 , CVE-2026-23291 , CVE-2026-23292 , CVE-2026-23293 , CVE-2026-23296 , CVE-2026-23298 , CVE-2026-23300 , CVE-2026-23303 , CVE-2026-23304 , CVE-2026-23306 , CVE-2026-23307 , CVE-2026-23308 , CVE-2026-23309 , CVE-2026-23310 , CVE-2026-23312 , CVE-2026-23315 , CVE-2026-23317 , CVE-2026-23318 , CVE-2026-23319 , CVE-2026-23321 , CVE-2026-23324 , CVE-2026-23325 , CVE-2026-23334 , CVE-2026-23335 , CVE-2026-23336 , CVE-2026-23339 , CVE-2026-23340 , CVE-2026-23343 , CVE-2026-23347 , CVE-2026-23351 , CVE-2026-23352 , CVE-2026-23356 , CVE-2026-23357 , CVE-2026-23359 , CVE-2026-23362 , CVE-2026-23364 , CVE-2026-23365 , CVE-2026-23367 , CVE-2026-23368 , CVE-2026-23370 , CVE-2026-23372 , CVE-2026-23378 , CVE-2026-23379 , CVE-2026-23381 , CVE-2026-23382 , CVE-2026-23386 , CVE-2026-23387 , CVE-2026-23388 , CVE-2026-23391 , CVE-2026-23392 , CVE-2026-23395 , CVE-2026-23396 , CVE-2026-23397 , CVE-2026-23398 , CVE-2026-31788 Description Upstream kernel version 6.6.130 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=35281
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.121
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.122
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.123
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.124
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.125
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.126
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.127
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.128
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.129
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71180
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71186
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71189
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71195
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71199
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71232
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71236
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71239
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71265
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71267
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71270
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22976
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22979
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22984
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22991
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22992
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23139
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23146
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23150
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23156
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23164
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23180
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23187
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23193
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23202
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23212
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23234
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23236
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23242
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23243
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23256
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23267
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23298
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23300
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23325
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23334
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23335
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23336
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23340
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23347
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23352
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23356
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23357
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23359
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23365
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23367
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23370
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23381
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23382
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23386
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23388
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23391
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23392
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23397
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31788
- kernel-6.6.130-1.mga9
- kmod-virtualbox-7.1.14-15.mga9
- kmod-xtables-addons-3.24-89.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0096 - Updated libpng12 packages fix security vulnerability
Publication date: 12 Apr 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description LIBPNG has a heap buffer overflow in png_set_quantize. (CVE-2026-25646) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25646 Description LIBPNG has a heap buffer overflow in png_set_quantize. (CVE-2026-25646) References
- https://bugs.mageia.org/show_bug.cgi?id=35342
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TECJI2SKV2DKMEVXPPPQ3B7AQ26QYEWB/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646
- libpng12-1.2.59-3.1.mga9
Categorías: Actualizaciones de Seguridad




