Actualizaciones de Seguridad

MGASA-2026-0019 - Updated haproxy packages fix bugs

Mageia Security - 27 Enero, 2026 - 19:20
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
  • haproxy-2.8.18-1.mga9

MGASA-2026-0018 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - 26 Enero, 2026 - 21:03
Publication date: 26 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.120-1.mga9

MGASA-2026-0017 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities

Mageia Security - 24 Enero, 2026 - 21:25
Publication date: 24 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References SRPMS 9/core
  • kernel-6.6.120-1.mga9
  • kmod-virtualbox-7.1.14-14.mga9
  • kmod-xtables-addons-3.24-88.mga9

MGASA-2026-0016 - Updated avahi packages fix security vulnerabilities

Mageia Security - 23 Enero, 2026 - 01:11
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References SRPMS 9/core
  • avahi-0.8-10.3.mga9

MGASA-2026-0015 - Updated harfbuzz packages fix security vulnerability

Mageia Security - 23 Enero, 2026 - 01:11
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References SRPMS 9/core
  • harfbuzz-7.0.1-1.2.mga9

MGASA-2026-0014 - Updated thunderbird packages fix security vulnerabilities

Mageia Security - 20 Enero, 2026 - 04:25
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References SRPMS 9/core
  • thunderbird-140.7.0-1.mga9
  • thunderbird-l10n-140.7.0-1.mga9

MGASA-2026-0013 - Updated nss & firefox packages fix security vulnerabilities

Mageia Security - 20 Enero, 2026 - 04:25
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References SRPMS 9/core
  • nss-3.120.0-1.mga9
  • firefox-140.7.0-1.mga9
  • firefox-l10n-140.7.0-1.mga9

MGASA-2026-0012 - Updated gimp packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References SRPMS 9/core
  • gimp-2.10.36-1.1.mga9

MGASA-2026-0011 - Updated python-urllib3 packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References SRPMS 9/core
  • python-urllib3-1.26.20-1.2.mga9

MGASA-2026-0010 - Updated libpng packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References SRPMS 9/core
  • libpng-1.6.38-1.3.mga9

MGASA-2026-0009 - Updated nodejs packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References SRPMS 9/core
  • nodejs-22.22.0-1.mga9

MGAA-2026-0006 - Updated v4l2loopback packages fix bug

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References SRPMS 9/core
  • v4l2loopback-0.15.3-1.mga9

MGASA-2026-0008 - Updated net-snmp packages fix security vulnerability

Mageia Security - 14 Enero, 2026 - 18:31
Publication date: 14 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References SRPMS 9/core
  • net-snmp-5.9.3-2.2.mga9

MGASA-2026-0007 - Updated libtasn1 packages fix security vulnerability

Mageia Security - 12 Enero, 2026 - 19:42
Publication date: 12 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13151 Description Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. (CVE-2025-13151) References SRPMS 9/core
  • libtasn1-4.21.0-1.mga9

MGAA-2026-0005 - Updated dkms-vhba, libmirage & cdemu-daemon packages fix bugs

Mageia Security - 12 Enero, 2026 - 19:42
Publication date: 12 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description We are planning make a backport for kernel 6.18. In the QA stage, we discovered the dkms-vhba, libmirage and cdemu-daemon packages don't work as they should. These updates fixes the reported issue. References SRPMS 9/core
  • dkms-vhba-20250329-1.mga9
  • libmirage-3.2.10-1.mga9
  • cdemu-daemon-3.2.7-1.2.mga9

MGASA-2026-0006 - Updated zlib packages fix security vulnerability

Mageia Security - 11 Enero, 2026 - 02:07
Publication date: 11 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22184 Description zlib <= 1.3.1.2 untgz Global Buffer Overflow in TGZfname(). (CVE-2026-22184) References SRPMS 9/core
  • zlib-1.2.13-1.3.mga9

MGAA-2026-0004 - Updated nvidia470 packages fix bug

Mageia Security - 11 Enero, 2026 - 02:07
Publication date: 11 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description This package provide a fixed/patched version for kernel modules built with dkms-nvidia470 under kernel 6.18.x available in backports References SRPMS 9/nonfree
  • nvidia470-470.256.02-4.mga9.nonfree

MGASA-2026-0005 - Updated libpcap packages fix security vulnerability

Mageia Security - 10 Enero, 2026 - 06:07
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11961 Description OOBR and OOBW in pcap_ether_aton() in libpcap. (CVE-2025-11961) References SRPMS 9/core
  • libpcap-1.10.6-1.mga9

MGASA-2026-0004 - Updated sodium packages fix security vulnerability

Mageia Security - 10 Enero, 2026 - 06:07
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-69277 Description Libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. (CVE-2025-69277) References SRPMS 9/core
  • sodium-1.0.18-3.1.mga9

MGASA-2026-0003 - Updated curl packages fix security vulnerabilities

Mageia Security - 10 Enero, 2026 - 06:07
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13034 , CVE-2025-14017 , CVE-2025-14524 , CVE-2025-14819 , CVE-2025-15079 , CVE-2025-15224 Description curl is susceptible to a number of low severity security vulnerabilities: CVE-2025-14524: bearer token leak on cross-protocol redirect CVE-2025-14819: OpenSSL partial chain store policy bypass CVE-2025-15079: libssh knownhosts file vulnerability CVE-2025-15224: libssh key passphrase bypass vulnerability This release fixes these issues. References SRPMS 9/core
  • curl-7.88.1-4.9.mga9
Feed