Lector de Feeds

MGASA-2026-0122 - Updated krb5-appl packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-32746 Description telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full. (CVE-2026-32746) References SRPMS 9/core
  • krb5-appl-1.0.3-16.1.mga9

MGASA-2026-0121 - Updated nano packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-6842 , CVE-2026-6843 Description Local attacker can inject malicious .desktop launcher due to insecure directory permissions. (CVE-2026-6842) Format string vulnerability leads to denial of service. (CVE-2026-6843) References SRPMS 9/core
  • nano-7.2-1.2.mga9

MGASA-2026-0120 - Updated perl-Starlet packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-40561 Description Starlet versions through 0.31 for Perl allow HTTP Request Smuggling via Improper Header Precedence. (CVE-2026-40561) References SRPMS 9/core
  • perl-Starlet-0.310.0-4.1.mga9

MGASA-2026-0119 - Updated perl-Starman packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-40560 Description Starman versions before 0.4018 for Perl allow HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy. References SRPMS 9/core
  • perl-Starman-0.401.800-1.mga9

MGASA-2026-0118 - Updated ntfs-3g packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-40706 Description In NTFS-3G 2022.10.3 before 2026.2.25, a heap buffer overflow exists in ntfs_build_permissions_posix() in acls.c that allows an attacker to corrupt heap memory in the SUID-root ntfs-3g binary by crafting a malicious NTFS image. The overflow is triggered on the READ path (stat, readdir, open) when processing a security descriptor with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs. (CVE-2026-40706) References SRPMS 9/core
  • ntfs-3g-2022.10.3-1.2.mga9

MGASA-2026-0117 - Updated graphicsmagick packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-26284 , CVE-2026-33535 Description ImageMagick has a heap overflow in the pcd decoder that leads to an out of bounds read. (CVE-2026-26284) ImageMagick has an Out-of-Bounds write of a zero byte in its X11 display interaction. (CVE-2026-33535) References SRPMS 9/core
  • graphicsmagick-1.3.40-1.5.mga9
9/tainted
  • graphicsmagick-1.3.40-1.5.mga9.tainted

MGASA-2026-0116 - Updated opam packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-41082 Description In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory. (CVE-2026-41082) References SRPMS 9/core
  • opam-2.1.3-1.1.mga9

MGASA-2026-0115 - Updated perl-Net-CIDR-Lite packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-40198 , CVE-2026-40199 Description Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass. (CVE-2026-40198) Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypass. (CVE-2026-40199) References SRPMS 9/core
  • perl-Net-CIDR-Lite-0.230.0-1.mga9

MGASA-2026-0114 - Updated libtiff packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-4775 Description Arbitrary code execution or denial of service via signed integer overflow in tiff file processing. (CVE-2026-4775) References SRPMS 9/core
  • libtiff-4.5.1-1.8.mga9

MGASA-2026-0113 - Updated tcpflow packages fix security vulnerability

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-25061 Description tcpflow has TIM Element OOB Write in wifipcap. (CVE-2026-25061) References SRPMS 9/core
  • tcpflow-1.6.1-3.1.mga9

MGASA-2026-0112 - Updated libexif packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-32775 , CVE-2026-40385 , CVE-2026-40386 Description CVE-2026-32775: libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow. CVE-2026-40385: In libexif through 0.6.25, an unsigned 32bit integer overflow in Nikon MakerNote handling could be used by local attackers to cause crashes or information leaks. This only affects 32bit systems. CVE-2026-40386: In libexif through 0.6.25, an integer underflow in size checking for Fuji and Olympus MakerNote decoding could be used by attackers to crash or leak information out of libexif-using programs. References SRPMS 9/core
  • libexif-0.6.26-1.mga9

MGASA-2026-0111 - Updated nginx packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-27654 , CVE-2026-27784 , CVE-2026-32647 , CVE-2026-27651 , CVE-2026-28753 , CVE-2026-28755 Description Buffer overflow in ngx_http_dav_module (CVE-2026-27654) Buffer overflow in the ngx_http_mp4_module (CVE-2026-27784) Buffer overflow in the ngx_http_mp4_module (CVE-2026-32647) NULL pointer dereference while using CRAM-MD5 or APOP (CVE-2026-27651) Injection in auth_http and XCLIENT (CVE-2026-28753) OCSP result bypass in stream (CVE-2026-28755) References SRPMS 9/core
  • nginx-1.29.7-1.mga9

MGASA-2026-0110 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - Hace 12 horas 10 minutos
Publication date: 07 May 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23414 , CVE-2026-31408 , CVE-2026-31414 , CVE-2026-31415 , CVE-2026-31416 , CVE-2026-31417 , CVE-2026-31418 , CVE-2026-31421 , CVE-2026-31422 , CVE-2026-31423 , CVE-2026-31424 , CVE-2026-31425 , CVE-2026-31426 , CVE-2026-31427 , CVE-2026-31428 , CVE-2026-31430 , CVE-2026-31431 , CVE-2026-31433 , CVE-2026-31434 , CVE-2026-31439 , CVE-2026-31441 , CVE-2026-31444 , CVE-2026-31446 , CVE-2026-31447 , CVE-2026-31448 , CVE-2026-31450 , CVE-2026-31451 , CVE-2026-31452 , CVE-2026-31453 , CVE-2026-31454 , CVE-2026-31455 , CVE-2026-31458 , CVE-2026-31464 , CVE-2026-31466 , CVE-2026-31467 , CVE-2026-31469 , CVE-2026-31473 , CVE-2026-31474 , CVE-2026-31476 , CVE-2026-31477 , CVE-2026-31478 , CVE-2026-31480 , CVE-2026-31482 , CVE-2026-31483 , CVE-2026-31485 , CVE-2026-31492 , CVE-2026-31494 , CVE-2026-31495 , CVE-2026-31496 , CVE-2026-31497 , CVE-2026-31498 , CVE-2026-31500 , CVE-2026-31503 , CVE-2026-31504 , CVE-2026-31507 , CVE-2026-31508 , CVE-2026-31509 , CVE-2026-31510 , CVE-2026-31512 , CVE-2026-31515 , CVE-2026-31518 , CVE-2026-31519 , CVE-2026-31520 , CVE-2026-31521 , CVE-2026-31522 , CVE-2026-31523 , CVE-2026-31524 , CVE-2026-31525 , CVE-2026-31528 , CVE-2026-31533 , CVE-2026-31555 , CVE-2026-31563 , CVE-2026-31565 , CVE-2026-31566 , CVE-2026-31570 , CVE-2026-31628 , CVE-2026-31634 , CVE-2026-31637 , CVE-2026-31638 , CVE-2026-31639 , CVE-2026-31642 , CVE-2026-31646 , CVE-2026-31648 , CVE-2026-31649 , CVE-2026-31651 , CVE-2026-31655 , CVE-2026-31656 , CVE-2026-31657 , CVE-2026-31658 , CVE-2026-31659 , CVE-2026-31660 , CVE-2026-31661 , CVE-2026-31662 , CVE-2026-31664 , CVE-2026-31665 , CVE-2026-31667 , CVE-2026-31668 , CVE-2026-31669 , CVE-2026-31670 , CVE-2026-31671 , CVE-2026-31672 , CVE-2026-31674 , CVE-2026-31675 , CVE-2026-31678 , CVE-2026-31679 , CVE-2026-31680 , CVE-2026-31682 , CVE-2026-31686 , CVE-2026-31689 , CVE-2026-31694 , CVE-2026-31695 , CVE-2026-31696 , CVE-2026-31697 , CVE-2026-31698 , CVE-2026-31699 , CVE-2026-31700 , CVE-2026-31701 , CVE-2026-31702 , CVE-2026-31704 , CVE-2026-31705 , CVE-2026-31708 , CVE-2026-31711 , CVE-2026-31714 , CVE-2026-31716 , CVE-2026-31720 , CVE-2026-31721 , CVE-2026-31726 , CVE-2026-31728 , CVE-2026-31730 , CVE-2026-31737 , CVE-2026-31738 , CVE-2026-31740 , CVE-2026-31741 , CVE-2026-31747 , CVE-2026-31748 , CVE-2026-31749 , CVE-2026-31751 , CVE-2026-31752 , CVE-2026-31754 , CVE-2026-31755 , CVE-2026-31756 , CVE-2026-31758 , CVE-2026-31759 , CVE-2026-31761 , CVE-2026-31762 , CVE-2026-31763 , CVE-2026-31768 , CVE-2026-31770 , CVE-2026-31773 , CVE-2026-31776 , CVE-2026-31778 , CVE-2026-31779 , CVE-2026-31780 , CVE-2026-31781 , CVE-2026-31786 , CVE-2026-31787 , CVE-2026-43007 , CVE-2026-43011 , CVE-2026-43013 , CVE-2026-43014 , CVE-2026-43015 , CVE-2026-43016 , CVE-2026-43017 , CVE-2026-43018 , CVE-2026-43020 , CVE-2026-43023 , CVE-2026-43024 , CVE-2026-43025 , CVE-2026-43026 , CVE-2026-43027 , CVE-2026-43028 , CVE-2026-43030 , CVE-2026-43032 , CVE-2026-43033 , CVE-2026-43035 , CVE-2026-43037 , CVE-2026-43038 , CVE-2026-43040 , CVE-2026-43041 , CVE-2026-43043 , CVE-2026-43044 , CVE-2026-43046 , CVE-2026-43047 , CVE-2026-43050 , CVE-2026-43051 , CVE-2026-43054 , CVE-2026-43056 , CVE-2026-43057 , CVE-2026-43058 Description Vanilla upstream kernel version 6.6.137 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.137-1.mga9
Feed