Actualizaciones de Seguridad
MGASA-2026-0019 - Updated haproxy packages fix bugs
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
- haproxy-2.8.18-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0018 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 26 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=35022
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.117
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.118
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.119
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40341
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40358
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68369
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68769
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68772
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68774
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68809
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71144
- kernel-linus-6.6.120-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0017 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 24 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=35021
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.117
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.118
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.119
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40341
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40358
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68369
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68769
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68772
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68774
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68809
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71144
- kernel-6.6.120-1.mga9
- kmod-virtualbox-7.1.14-14.mga9
- kmod-xtables-addons-3.24-88.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0016 - Updated avahi packages fix security vulnerabilities
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References
- https://bugs.mageia.org/show_bug.cgi?id=34887
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DR2CTF5XR6GVX3JYIAAO3ULJNUZDGBVS/
- https://ubuntu.com/security/notices/USN-7967-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471
- avahi-0.8-10.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0015 - Updated harfbuzz packages fix security vulnerability
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References
- https://bugs.mageia.org/show_bug.cgi?id=35042
- https://www.openwall.com/lists/oss-security/2026/01/11/1
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QJUDZGUEVHTL26NPJUIGPHUOUKLUMCFB/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22693
- harfbuzz-7.0.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0014 - Updated thunderbird packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34993
- https://www.thunderbird.net/en-US/thunderbird/140.7.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- thunderbird-140.7.0-1.mga9
- thunderbird-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0013 - Updated nss & firefox packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34987
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html
- https://www.firefox.com/en-US/firefox/140.7.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- nss-3.120.0-1.mga9
- firefox-140.7.0-1.mga9
- firefox-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0012 - Updated gimp packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
- https://bugs.mageia.org/show_bug.cgi?id=34363
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DVVZTOVQSBY5ON5P7HYQIXK2OLMSUEH5/
- https://lists.debian.org/debian-lts-announce/2025/11/msg00005.html
- https://lists.debian.org/debian-security-announce/2025/msg00103.html
- https://lists.debian.org/debian-security-announce/2026/msg00001.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425
- gimp-2.10.36-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0011 - Updated python-urllib3 packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
- https://bugs.mageia.org/show_bug.cgi?id=34809
- https://www.openwall.com/lists/oss-security/2025/12/05/4
- https://ubuntu.com/security/notices/USN-7955-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441
- python-urllib3-1.26.20-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0010 - Updated libpng packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
- https://bugs.mageia.org/show_bug.cgi?id=34986
- https://www.openwall.com/lists/oss-security/2026/01/12/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801
- libpng-1.6.38-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0009 - Updated nodejs packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
- https://bugs.mageia.org/show_bug.cgi?id=34995
- https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
- https://nodejs.org/en/blog/release/v22.22.0
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637
- nodejs-22.22.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0006 - Updated v4l2loopback packages fix bug
Publication date: 17 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
- https://bugs.mageia.org/show_bug.cgi?id=34980
- https://github.com/v4l2loopback/v4l2loopback/issues/653
- v4l2loopback-0.15.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0008 - Updated net-snmp packages fix security vulnerability
Publication date: 14 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References
- https://bugs.mageia.org/show_bug.cgi?id=34979
- https://www.openwall.com/lists/oss-security/2026/01/09/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615
- net-snmp-5.9.3-2.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0007 - Updated libtasn1 packages fix security vulnerability
Publication date: 12 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13151 Description Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. (CVE-2025-13151) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13151 Description Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. (CVE-2025-13151) References
- https://bugs.mageia.org/show_bug.cgi?id=34957
- https://www.openwall.com/lists/oss-security/2026/01/08/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13151
- libtasn1-4.21.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0005 - Updated dkms-vhba, libmirage & cdemu-daemon packages fix bugs
Publication date: 12 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description We are planning make a backport for kernel 6.18. In the QA stage, we discovered the dkms-vhba, libmirage and cdemu-daemon packages don't work as they should. These updates fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description We are planning make a backport for kernel 6.18. In the QA stage, we discovered the dkms-vhba, libmirage and cdemu-daemon packages don't work as they should. These updates fixes the reported issue. References SRPMS 9/core
- dkms-vhba-20250329-1.mga9
- libmirage-3.2.10-1.mga9
- cdemu-daemon-3.2.7-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0006 - Updated zlib packages fix security vulnerability
Publication date: 11 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22184 Description zlib <= 1.3.1.2 untgz Global Buffer Overflow in TGZfname(). (CVE-2026-22184) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22184 Description zlib <= 1.3.1.2 untgz Global Buffer Overflow in TGZfname(). (CVE-2026-22184) References
- https://bugs.mageia.org/show_bug.cgi?id=34954
- https://www.openwall.com/lists/oss-security/2026/01/06/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184
- zlib-1.2.13-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0004 - Updated nvidia470 packages fix bug
Publication date: 11 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description This package provide a fixed/patched version for kernel modules built with dkms-nvidia470 under kernel 6.18.x available in backports References SRPMS 9/nonfree
Type: bugfix
Affected Mageia releases : 9
Description This package provide a fixed/patched version for kernel modules built with dkms-nvidia470 under kernel 6.18.x available in backports References SRPMS 9/nonfree
- nvidia470-470.256.02-4.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2026-0005 - Updated libpcap packages fix security vulnerability
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11961 Description OOBR and OOBW in pcap_ether_aton() in libpcap. (CVE-2025-11961) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11961 Description OOBR and OOBW in pcap_ether_aton() in libpcap. (CVE-2025-11961) References
- https://bugs.mageia.org/show_bug.cgi?id=34939
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2026&m=slackware-security.355202
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11961
- libpcap-1.10.6-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0004 - Updated sodium packages fix security vulnerability
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-69277 Description Libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. (CVE-2025-69277) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-69277 Description Libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. (CVE-2025-69277) References
- https://bugs.mageia.org/show_bug.cgi?id=34940
- https://lists.debian.org/debian-security-announce/2026/msg00002.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69277
- sodium-1.0.18-3.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0003 - Updated curl packages fix security vulnerabilities
Publication date: 10 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13034 , CVE-2025-14017 , CVE-2025-14524 , CVE-2025-14819 , CVE-2025-15079 , CVE-2025-15224 Description curl is susceptible to a number of low severity security vulnerabilities: CVE-2025-14524: bearer token leak on cross-protocol redirect CVE-2025-14819: OpenSSL partial chain store policy bypass CVE-2025-15079: libssh knownhosts file vulnerability CVE-2025-15224: libssh key passphrase bypass vulnerability This release fixes these issues. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13034 , CVE-2025-14017 , CVE-2025-14524 , CVE-2025-14819 , CVE-2025-15079 , CVE-2025-15224 Description curl is susceptible to a number of low severity security vulnerabilities: CVE-2025-14524: bearer token leak on cross-protocol redirect CVE-2025-14819: OpenSSL partial chain store policy bypass CVE-2025-15079: libssh knownhosts file vulnerability CVE-2025-15224: libssh key passphrase bypass vulnerability This release fixes these issues. References
- https://bugs.mageia.org/show_bug.cgi?id=34944
- https://curl.se/docs/vuln-7.88.1.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
- curl-7.88.1-4.9.mga9
Categorías: Actualizaciones de Seguridad




