Actualizaciones de Seguridad
MGASA-2025-0325 - Updated webkit2 packages fix security vulnerabilities
Publication date: 09 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13947 , CVE-2025-43421 , CVE-2025-43458 , CVE-2025-66287 Description A website may be able to exfiltrate sensitive system information. Description: The issue was addressed through improved state checks - CVE-2025-13947. Processing maliciously crafted web content may lead to an unexpected process crash. Description: Multiple issues were addressed by disabling array allocation sinking - CVE-2025-43421. Processing maliciously crafted web content may lead to an unexpected process crash. Description: This issue was addressed through improved state management - CVE-2025-43458. Processing maliciously crafted web content may lead to an unexpected process crash. Description: The issue was addressed with improved memory handling - CVE-2025-66287. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13947 , CVE-2025-43421 , CVE-2025-43458 , CVE-2025-66287 Description A website may be able to exfiltrate sensitive system information. Description: The issue was addressed through improved state checks - CVE-2025-13947. Processing maliciously crafted web content may lead to an unexpected process crash. Description: Multiple issues were addressed by disabling array allocation sinking - CVE-2025-43421. Processing maliciously crafted web content may lead to an unexpected process crash. Description: This issue was addressed through improved state management - CVE-2025-43458. Processing maliciously crafted web content may lead to an unexpected process crash. Description: The issue was addressed with improved memory handling - CVE-2025-66287. References
- https://bugs.mageia.org/show_bug.cgi?id=34802
- https://webkitgtk.org/security/WSA-2025-0009.html
- https://webkitgtk.org/2025/12/04/webkitgtk2.50.3-released.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
- webkit2-2.50.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0324 - Updated python3 packages fix security vulnerabilities
Publication date: 09 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13836 , CVE-2025-13837 , CVE-2025-12084 Description Excessive read buffering DoS in http.client. (CVE-2025-13836) Out-of-memory when loading Plist. (CVE-2025-13837) Quadratic complexity in node ID cache clearing. (CVE-2025-12084) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13836 , CVE-2025-13837 , CVE-2025-12084 Description Excessive read buffering DoS in http.client. (CVE-2025-13836) Out-of-memory when loading Plist. (CVE-2025-13837) Quadratic complexity in node ID cache clearing. (CVE-2025-12084) References
- https://bugs.mageia.org/show_bug.cgi?id=34808
- https://www.openwall.com/lists/oss-security/2025/12/05/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084
- python3-3.10.18-1.5.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0323 - Updated libpng packages fix security vulnerability
Publication date: 08 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66293 Description LIBPNG has an out-of-bounds read in png_image_read_composite. (CVE-2025-66293) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66293 Description LIBPNG has an out-of-bounds read in png_image_read_composite. (CVE-2025-66293) References
- https://bugs.mageia.org/show_bug.cgi?id=34799
- https://www.openwall.com/lists/oss-security/2025/12/03/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293
- libpng-1.6.38-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0322 - Updated apache packages fix security vulnerabilities
Publication date: 08 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-55753 , CVE-2025-58098 , CVE-2025-65082 , CVE-2025-66200 Description Apache HTTP Server: mod_md (ACME), unintended retry intervals. (CVE-2025-55753) Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. (CVE-2025-58098) Apache HTTP Server: CGI environment variable override. (CVE-2025-65082) Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo. (CVE-2025-66200) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-55753 , CVE-2025-58098 , CVE-2025-65082 , CVE-2025-66200 Description Apache HTTP Server: mod_md (ACME), unintended retry intervals. (CVE-2025-55753) Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. (CVE-2025-58098) Apache HTTP Server: CGI environment variable override. (CVE-2025-65082) Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo. (CVE-2025-66200) References
- https://bugs.mageia.org/show_bug.cgi?id=34803
- https://www.openwall.com/lists/oss-security/2025/12/04/4
- https://www.openwall.com/lists/oss-security/2025/12/04/5
- https://www.openwall.com/lists/oss-security/2025/12/04/7
- https://www.openwall.com/lists/oss-security/2025/12/04/8
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
- apache-2.4.66-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0321 - Updated xkbcomp packages fix security vulnerabilities
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2018-15853 , CVE-2018-15859 , CVE-2018-15861 , CVE-2018-15863 Description Endless recursion in xkbcomp/expr.c resulting in a crash. (CVE-2018-15853) NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash. (CVE-2018-15859) NULL pointer dereference in ExprResolveLhs resulting in a crash. (CVE-2018-15861) NULL pointer dereference in ResolveStateAndPredicate resulting in a crash. (CVE-2018-15863) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2018-15853 , CVE-2018-15859 , CVE-2018-15861 , CVE-2018-15863 Description Endless recursion in xkbcomp/expr.c resulting in a crash. (CVE-2018-15853) NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash. (CVE-2018-15859) NULL pointer dereference in ExprResolveLhs resulting in a crash. (CVE-2018-15861) NULL pointer dereference in ResolveStateAndPredicate resulting in a crash. (CVE-2018-15863) References
- https://bugs.mageia.org/show_bug.cgi?id=34796
- https://www.openwall.com/lists/oss-security/2025/12/03/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863
- xkbcomp-1.4.6-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0320 - Updated python-django packages fix security vulnerabilities
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13372 , CVE-2025-64460 Description Potential SQL injection in FilteredRelation column aliases on PostgreSQL. (CVE-2025-13372) Potential denial-of-service vulnerability in XML serializer text extraction. (CVE-2025-64460) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13372 , CVE-2025-64460 Description Potential SQL injection in FilteredRelation column aliases on PostgreSQL. (CVE-2025-13372) Potential denial-of-service vulnerability in XML serializer text extraction. (CVE-2025-64460) References
- https://bugs.mageia.org/show_bug.cgi?id=34795
- https://www.openwall.com/lists/oss-security/2025/12/02/3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13372
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64460
- python-django-4.1.13-1.9.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0319 - Updated webkit2 packages fix security vulnerabilities
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-43392 , CVE-2025-43419 , CVE-2025-43425 , CVE-2025-43427 , CVE-2025-43429 , CVE-2025-43430 , CVE-2025-43431 , CVE-2025-43432 , CVE-2025-43434 , CVE-2025-43440 , CVE-2025-43443 , CVE-2025-43421 Description The updated packages fix security vulnerabilities: CVE-2025-43392, CVE-2025-43419, CVE-2025-43425, CVE-2025-43427, CVE-2025-43429, CVE-2025-43430, CVE-2025-43431, CVE-2025-43432, CVE-2025-43434, CVE-2025-43440, CVE-2025-43443, CVE-2025-43421. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-43392 , CVE-2025-43419 , CVE-2025-43425 , CVE-2025-43427 , CVE-2025-43429 , CVE-2025-43430 , CVE-2025-43431 , CVE-2025-43432 , CVE-2025-43434 , CVE-2025-43440 , CVE-2025-43443 , CVE-2025-43421 Description The updated packages fix security vulnerabilities: CVE-2025-43392, CVE-2025-43419, CVE-2025-43425, CVE-2025-43427, CVE-2025-43429, CVE-2025-43430, CVE-2025-43431, CVE-2025-43432, CVE-2025-43434, CVE-2025-43440, CVE-2025-43443, CVE-2025-43421. References
- https://bugs.mageia.org/show_bug.cgi?id=34792
- https://webkitgtk.org/security/WSA-2025-0008.html
- https://webkitgtk.org/2025/11/19/webkitgtk2.50.2-released.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
- webkit2-2.50.2-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0318 - Updated unbound packages fix security vulnerabilities
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11411 Description Possible domain hijacking via promiscuous records in the authority section. (CVE-2025-11411). Previous fixes for CVE-2025-11411 released with Unbound 1.24.1 were not complete. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11411 Description Possible domain hijacking via promiscuous records in the authority section. (CVE-2025-11411). Previous fixes for CVE-2025-11411 released with Unbound 1.24.1 were not complete. References
- https://bugs.mageia.org/show_bug.cgi?id=34785
- https://advisories.mageia.org/MGASA-2025-0273.html
- https://www.openwall.com/lists/oss-security/2025/11/26/4
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11411
- unbound-1.24.2-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0317 - Updated gnutls packages fix security vulnerability
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9820 Description Stack write buffer overflow. (CVE-2025-9820) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9820 Description Stack write buffer overflow. (CVE-2025-9820) References
- https://bugs.mageia.org/show_bug.cgi?id=34760
- https://www.openwall.com/lists/oss-security/2025/11/20/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
- gnutls-3.8.4-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0316 - Updated libraw, digikam & darktable packages fix security vulnerabilities
Publication date: 04 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-43961 , CVE-2025-43962 , CVE-2025-43963 , CVE-2025-43964 Description In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser. (CVE-2025-43961) In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp has out-of-bounds reads for tag 0x412 processing, related to large w0 or w1 values or the frac and mult calculations. (CVE-2025-43962) In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not checked in 0x041f tag processing. (CVE-2025-43963) In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values. (CVE-2025-43964) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-43961 , CVE-2025-43962 , CVE-2025-43963 , CVE-2025-43964 Description In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser. (CVE-2025-43961) In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp has out-of-bounds reads for tag 0x412 processing, related to large w0 or w1 values or the frac and mult calculations. (CVE-2025-43962) In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not checked in 0x041f tag processing. (CVE-2025-43963) In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values. (CVE-2025-43964) References
- https://bugs.mageia.org/show_bug.cgi?id=34221
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDAIVZ4BSSDOYXE25CJ6Z7KXPOF4A6GL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMNI4GAUYVWHWJ2MPCIEMWUBTIM32E2H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3I3BWKSTHKFJDS7ZRYZSMCPXZLSPJKIW/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43962
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43963
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43964
- libraw-0.20.2-5.1.mga9
- digikam-8.4.0-1.1.mga9
- darktable-4.6.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0315 - Updated cups packages fix security vulnerabilities
Publication date: 03 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-58436 , CVE-2025-61915 Description The updated packages fix security vulnerabilities and a regression with GTK+ apps caused by the fix for CVE-2025-58436: OpenPrinting CUPS slow client can halt cupsd, leading to a possible DoS attack. (CVE-2025-58436) OpenPrinting CUPS vulnerable to stack based out-of-bound write. (CVE-2025-61915) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-58436 , CVE-2025-61915 Description The updated packages fix security vulnerabilities and a regression with GTK+ apps caused by the fix for CVE-2025-58436: OpenPrinting CUPS slow client can halt cupsd, leading to a possible DoS attack. (CVE-2025-58436) OpenPrinting CUPS vulnerable to stack based out-of-bound write. (CVE-2025-61915) References
- https://bugs.mageia.org/show_bug.cgi?id=34786
- https://www.openwall.com/lists/oss-security/2025/11/27/4
- https://www.openwall.com/lists/oss-security/2025/11/27/5
- https://github.com/OpenPrinting/cups/issues/1429
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915
- cups-2.4.6-1.5.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0314 - Updated libpng packages fix security vulnerabilities
Publication date: 01 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64505 , CVE-2025-64506 , CVE-2025-64720 , CVE-2025-65018 Description LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index. (CVE-2025-64505) LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images. (CVE-2025-64506) LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication. (CVE-2025-64720) LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read`. (CVE-2025-65018) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64505 , CVE-2025-64506 , CVE-2025-64720 , CVE-2025-65018 Description LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index. (CVE-2025-64505) LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images. (CVE-2025-64506) LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication. (CVE-2025-64720) LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read`. (CVE-2025-65018) References
- https://bugs.mageia.org/show_bug.cgi?id=34766
- https://www.openwall.com/lists/oss-security/2025/11/22/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018
- libpng-1.6.38-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0103 - Updated guayadeque packages fix bug
Publication date: 01 Dec 2025
Type: bugfix
Affected Mageia releases : 9
Description This package corrects several minor bugs that appeared since version 0.7.0 (must of these bugs only appeared when using particular settings, not for default settings). References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description This package corrects several minor bugs that appeared since version 0.7.0 (must of these bugs only appeared when using particular settings, not for default settings). References SRPMS 9/core
- guayadeque-0.7.4-0.git20251129.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0102 - Updated python-sslyze & python-nassl packages fix bug
Publication date: 01 Dec 2025
Type: bugfix
Affected Mageia releases : 9
Description The current version of python3-sslyze crash, these packages fixes the reported issue References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description The current version of python3-sslyze crash, these packages fixes the reported issue References SRPMS 9/core
- python-sslyze-5.1.0-1.mga9
- python-nassl-5.3.1-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0101 - Updated microcode packages fix bugs
Publication date: 28 Nov 2025
Type: bugfix
Affected Mageia releases : 9
Description This package updates Intel and AMD CPU microcode. References
Type: bugfix
Affected Mageia releases : 9
Description This package updates Intel and AMD CPU microcode. References
- https://bugs.mageia.org/show_bug.cgi?id=34768
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20251111
- https://web.git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/amd-ucode?id=6167e5566900cf236f7a69704e8f4c441bc7212a
- microcode-0.20251111-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2025-0313 - Updated webkit2 packages fix security vulnerabilities
Publication date: 25 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-23271 , CVE-2024-27808 , CVE-2024-27820 , CVE-2024-27833 , CVE-2024-40866 , CVE-2024-44187 , CVE-2024-44185 , CVE-2024-44244 , CVE-2024-44296 , CVE-2024-44308 , CVE-2024-54479 , CVE-2024-54502 , CVE-2024-54505 , CVE-2024-54534 , CVE-2024-27856 , CVE-2024-54543 , CVE-2025-24143 , CVE-2025-24150 , CVE-2025-24158 , CVE-2025-24162 , CVE-2024-44192 , CVE-2024-54467 , CVE-2025-24201 , CVE-2024-54551 , CVE-2025-24208 , CVE-2025-24209 , CVE-2025-24213 , CVE-2025-24216 , CVE-2025-24264 , CVE-2025-30427 , CVE-2025-24223 , CVE-2025-31204 , CVE-2025-31205 , CVE-2025-31206 , CVE-2025-31215 , CVE-2025-31257 , CVE-2025-24189 , CVE-2025-31273 , CVE-2025-31278 , CVE-2025-43211 , CVE-2025-43212 , CVE-2025-43216 , CVE-2025-43227 , CVE-2025-43228 , CVE-2025-43240 , CVE-2025-43265 , CVE-2025-6558 , CVE-2025-43272 , CVE-2025-43342 , CVE-2025-43356 , CVE-2025-43368 , CVE-2025-43343 Description We are updating webkit2 to version 2.50.1 that has many security fixes since our current version. Please see the links for additional information References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-23271 , CVE-2024-27808 , CVE-2024-27820 , CVE-2024-27833 , CVE-2024-40866 , CVE-2024-44187 , CVE-2024-44185 , CVE-2024-44244 , CVE-2024-44296 , CVE-2024-44308 , CVE-2024-54479 , CVE-2024-54502 , CVE-2024-54505 , CVE-2024-54534 , CVE-2024-27856 , CVE-2024-54543 , CVE-2025-24143 , CVE-2025-24150 , CVE-2025-24158 , CVE-2025-24162 , CVE-2024-44192 , CVE-2024-54467 , CVE-2025-24201 , CVE-2024-54551 , CVE-2025-24208 , CVE-2025-24209 , CVE-2025-24213 , CVE-2025-24216 , CVE-2025-24264 , CVE-2025-30427 , CVE-2025-24223 , CVE-2025-31204 , CVE-2025-31205 , CVE-2025-31206 , CVE-2025-31215 , CVE-2025-31257 , CVE-2025-24189 , CVE-2025-31273 , CVE-2025-31278 , CVE-2025-43211 , CVE-2025-43212 , CVE-2025-43216 , CVE-2025-43227 , CVE-2025-43228 , CVE-2025-43240 , CVE-2025-43265 , CVE-2025-6558 , CVE-2025-43272 , CVE-2025-43342 , CVE-2025-43356 , CVE-2025-43368 , CVE-2025-43343 Description We are updating webkit2 to version 2.50.1 that has many security fixes since our current version. Please see the links for additional information References
- https://bugs.mageia.org/show_bug.cgi?id=34747
- https://webkitgtk.org/2025/10/10/webkitgtk2.50.1-released.html
- https://webkitgtk.org/security/WSA-2025-0007.html
- https://webkitgtk.org/2025/09/17/webkitgtk2.50.0-released.html
- https://webkitgtk.org/security/WSA-2025-0006.html
- https://webkitgtk.org/2025/07/31/webkitgtk2.49.4-released.html
- https://webkitgtk.org/2025/09/03/webkitgtk2.48.6-released.html
- https://webkitgtk.org/2025/08/01/webkitgtk2.48.5-released.html
- https://webkitgtk.org/security/WSA-2025-0005.html
- https://webkitgtk.org/2025/05/28/webkitgtk2.48.3-released.html
- https://webkitgtk.org/2025/05/14/webkitgtk2.48.2-released.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
- webkit2-2.50.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0312 - Updated cups-filters packages fix security vulnerability
Publication date: 24 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64524 Description CUPS rastertopclx Filter Vulnerable to Heap Buffer Overflow Leading to Potential Arbitrary Code Execution. (CVE-2025-64524) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64524 Description CUPS rastertopclx Filter Vulnerable to Heap Buffer Overflow Leading to Potential Arbitrary Code Execution. (CVE-2025-64524) References
- https://bugs.mageia.org/show_bug.cgi?id=34761
- https://www.openwall.com/lists/oss-security/2025/11/20/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
- cups-filters-1.28.16-6.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0311 - Updated ruby-rack packages fix security vulnerabilities
Publication date: 24 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-25184 , CVE-2025-27111 , CVE-2025-27610 Description Possible Log Injection in Rack::CommonLogger. (CVE-2025-25184) Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection. (CVE-2025-27111) Local File Inclusion in Rack::Static. (CVE-2025-27610) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-25184 , CVE-2025-27111 , CVE-2025-27610 Description Possible Log Injection in Rack::CommonLogger. (CVE-2025-25184) Escape Sequence Injection vulnerability in Rack lead to Possible Log Injection. (CVE-2025-27111) Local File Inclusion in Rack::Static. (CVE-2025-27610) References
- https://bugs.mageia.org/show_bug.cgi?id=34135
- https://ubuntu.com/security/notices/USN-7366-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27610
- ruby-rack-2.2.13-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0310 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 22 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Vanilla upstream kernel version 6.6.116 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Vanilla upstream kernel version 6.6.116 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34721
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.106
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.107
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.108
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.109
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.110
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.111
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.112
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.113
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.114
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.115
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39914
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39942
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39951
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39998
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40092
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300
- kernel-linus-6.6.116-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0309 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
Publication date: 22 Nov 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Upstream kernel version 6.6.116 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-39869 , CVE-2025-39870 , CVE-2025-39871 , CVE-2025-39873 , CVE-2025-39876 , CVE-2025-39877 , CVE-2025-39880 , CVE-2025-39881 , CVE-2025-39882 , CVE-2025-39883 , CVE-2025-39885 , CVE-2025-39886 , CVE-2025-39907 , CVE-2025-39909 , CVE-2025-39911 , CVE-2025-39913 , CVE-2025-39914 , CVE-2025-39916 , CVE-2025-39923 , CVE-2025-39929 , CVE-2025-39931 , CVE-2025-39934 , CVE-2025-39937 , CVE-2025-39938 , CVE-2025-39942 , CVE-2025-39943 , CVE-2025-39944 , CVE-2025-39945 , CVE-2025-39946 , CVE-2025-39947 , CVE-2025-39949 , CVE-2025-39951 , CVE-2025-39952 , CVE-2025-39953 , CVE-2025-39955 , CVE-2025-39957 , CVE-2025-39961 , CVE-2025-39964 , CVE-2025-39965 , CVE-2025-39967 , CVE-2025-39968 , CVE-2025-39969 , CVE-2025-39970 , CVE-2025-39971 , CVE-2025-39972 , CVE-2025-39973 , CVE-2025-39975 , CVE-2025-39977 , CVE-2025-39978 , CVE-2025-39980 , CVE-2025-39982 , CVE-2025-39985 , CVE-2025-39986 , CVE-2025-39987 , CVE-2025-39988 , CVE-2025-39993 , CVE-2025-39994 , CVE-2025-39995 , CVE-2025-39996 , CVE-2025-39998 , CVE-2025-40006 , CVE-2025-40008 , CVE-2025-40010 , CVE-2025-40011 , CVE-2025-40013 , CVE-2025-40016 , CVE-2025-40018 , CVE-2025-40019 , CVE-2025-40020 , CVE-2025-40021 , CVE-2025-40022 , CVE-2025-40024 , CVE-2025-40026 , CVE-2025-40027 , CVE-2025-40029 , CVE-2025-40030 , CVE-2025-40032 , CVE-2025-40033 , CVE-2025-40035 , CVE-2025-40036 , CVE-2025-40038 , CVE-2025-40040 , CVE-2025-40042 , CVE-2025-40043 , CVE-2025-40044 , CVE-2025-40048 , CVE-2025-40049 , CVE-2025-40051 , CVE-2025-40052 , CVE-2025-40053 , CVE-2025-40055 , CVE-2025-40056 , CVE-2025-40060 , CVE-2025-40061 , CVE-2025-40062 , CVE-2025-40067 , CVE-2025-40068 , CVE-2025-40070 , CVE-2025-40071 , CVE-2025-40078 , CVE-2025-40080 , CVE-2025-40081 , CVE-2025-40084 , CVE-2025-40085 , CVE-2025-40087 , CVE-2025-40088 , CVE-2025-40092 , CVE-2025-40093 , CVE-2025-40094 , CVE-2025-40095 , CVE-2025-40096 , CVE-2025-40099 , CVE-2025-40100 , CVE-2025-40103 , CVE-2025-40104 , CVE-2025-40105 , CVE-2025-40106 , CVE-2025-40107 , CVE-2025-40300 Description Upstream kernel version 6.6.116 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=34713
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.106
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.107
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.108
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.109
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.110
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.111
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.112
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.113
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.114
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.115
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39914
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39929
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39942
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39951
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39998
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40008
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40010
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40026
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40092
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300
- kernel-6.6.116-1.mga9
- kmod-xtables-addons-3.24-87.mga9
- kmod-virtualbox-7.1.14-13.mga9
Categorías: Actualizaciones de Seguridad
- « primera
- ‹ anterior
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- siguiente ›
- última »




