Actualizaciones de Seguridad
MGASA-2025-0242 - Updated haproxy packages fix security vulnerability & bugs
Publication date: 22 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11230 Description Haproxy has a critical, a major, few medium and few minor bugs fixed in the last upstream version 2.8.16 of branch 2.8. Fixed critical bug list: - mjson: fix possible DoS when parsing numbers Fixed major bug list: - listeners: transfer connection accounting when switching listeners Fixed medium bugs list: - check: Requeue healthchecks on I/O events to handle check timeout - check: Set SOCKERR by default when a connection error is reported - checks: fix ALPN inheritance from server - dns: Reset reconnect tempo when connection is finally established - fd: Use the provided tgid in fd_insert() to get tgroup_info - h1: Allow reception if we have early data - h1/h2/h3: reject forbidden chars in the Host header field - h2/h3: reject some forbidden chars in :authority before reassembly - hlua: Add function to change the body length of an HTTP Message - hlua: Forbid any L6/L7 sample fetche functions from lua services - hlua: Report to SC when data were consumed on a lua socket - hlua: Report to SC when output data are blocked on a lua socket - http-client: Ask for more room when request data cannot be xferred - http-client: Don't wake http-client applet if nothing was xferred - http-client: Drain the request if an early response is received - http-client: Notify applet has more data to deliver until the EOM - http-client: Properly inc input data when HTX blocks are xferred - http-client: Test HTX_FL_EOM flag before commiting the HTX buffer - httpclient: Throw an error if an lua httpclient instance is reused - mux-h2: Properly handle connection error during preface sending - server: Duplicate healthcheck's alpn inherited from default server - ssl: ca-file directory mode must read every certificates of a file - ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers - ssl: create the mux immediately on early data - ssl: Fix 0rtt to the server - ssl: fix build with AWS-LC - threads: Disable the workaround to load libgcc_s on macOS References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11230 Description Haproxy has a critical, a major, few medium and few minor bugs fixed in the last upstream version 2.8.16 of branch 2.8. Fixed critical bug list: - mjson: fix possible DoS when parsing numbers Fixed major bug list: - listeners: transfer connection accounting when switching listeners Fixed medium bugs list: - check: Requeue healthchecks on I/O events to handle check timeout - check: Set SOCKERR by default when a connection error is reported - checks: fix ALPN inheritance from server - dns: Reset reconnect tempo when connection is finally established - fd: Use the provided tgid in fd_insert() to get tgroup_info - h1: Allow reception if we have early data - h1/h2/h3: reject forbidden chars in the Host header field - h2/h3: reject some forbidden chars in :authority before reassembly - hlua: Add function to change the body length of an HTTP Message - hlua: Forbid any L6/L7 sample fetche functions from lua services - hlua: Report to SC when data were consumed on a lua socket - hlua: Report to SC when output data are blocked on a lua socket - http-client: Ask for more room when request data cannot be xferred - http-client: Don't wake http-client applet if nothing was xferred - http-client: Drain the request if an early response is received - http-client: Notify applet has more data to deliver until the EOM - http-client: Properly inc input data when HTX blocks are xferred - http-client: Test HTX_FL_EOM flag before commiting the HTX buffer - httpclient: Throw an error if an lua httpclient instance is reused - mux-h2: Properly handle connection error during preface sending - server: Duplicate healthcheck's alpn inherited from default server - ssl: ca-file directory mode must read every certificates of a file - ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers - ssl: create the mux immediately on early data - ssl: Fix 0rtt to the server - ssl: fix build with AWS-LC - threads: Disable the workaround to load libgcc_s on macOS References
- https://bugs.mageia.org/show_bug.cgi?id=34673
- https://www.haproxy.org/download/2.8/src/CHANGELOG
- https://www.haproxy.com/blog/october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230
- haproxy-2.8.16-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0241 - Updated quictls packages with two security issues and bug fixes
Publication date: 20 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9230 , CVE-2025-9232 Description Two security issues and miscellaneous minor bug fixes. Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230) Fix Out-of-bounds read in HTTP client no_proxy handling. (CVE-2025-9232) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9230 , CVE-2025-9232 Description Two security issues and miscellaneous minor bug fixes. Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230) Fix Out-of-bounds read in HTTP client no_proxy handling. (CVE-2025-9232) References
- https://bugs.mageia.org/show_bug.cgi?id=34674
- https://openssl-library.org/news/vulnerabilities/#CVE-2025-9230
- https://openssl-library.org/news/vulnerabilities/#CVE-2025-9232
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9232
- quictls-3.0.18-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0086 - Updated rust packages fix bug
Publication date: 20 Oct 2025
Type: bugfix
Affected Mageia releases : 9
Description The current version of rust in mga9 is not new enough to keep building Mozilla's applications. This update fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description The current version of rust in mga9 is not new enough to keep building Mozilla's applications. This update fixes the reported issue. References SRPMS 9/core
- rust-1.82.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0085 - Updated phpmyadmin packages fix bug
Publication date: 20 Oct 2025
Type: bugfix
Affected Mageia releases : 9
Description Fixed "Delete" button not asking for confirmation when deleting a row. Fix error 500 when simulating a SET statement. Fixed PHP 8.4 deprecations in thecodingmachine/safe. References
Type: bugfix
Affected Mageia releases : 9
Description Fixed "Delete" button not asking for confirmation when deleting a row. Fix error 500 when simulating a SET statement. Fixed PHP 8.4 deprecations in thecodingmachine/safe. References
- https://bugs.mageia.org/show_bug.cgi?id=34680
- https://www.phpmyadmin.net/news/2025/10/8/phpmyadmin-523-is-released/
- phpmyadmin-5.2.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0240 - Updated expat packages fix security vulnerabilities
Publication date: 18 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8176 , CVE-2025-59375 Description Improper restriction of xml entity expansion depth in libexpat. (CVE-2024-8176) This is an extension of the fix published in MGASA-2025-0109 that was determined by upstream to be incomplete. Libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing. (CVE-2025-59375) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8176 , CVE-2025-59375 Description Improper restriction of xml entity expansion depth in libexpat. (CVE-2024-8176) This is an extension of the fix published in MGASA-2025-0109 that was determined by upstream to be incomplete. Libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing. (CVE-2025-59375) References
- https://bugs.mageia.org/show_bug.cgi?id=34640
- https://bugs.mageia.org/show_bug.cgi?id=34111
- https://www.openwall.com/lists/oss-security/2025/09/24/11
- https://advisories.mageia.org/MGASA-2025-0109.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
- expat-2.7.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0239 - Updated varnish & lighttpd packages fix security vulnerability
Publication date: 17 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8671 Description It was discovered that a denial of service attack can be performed on cache servers that have the HTTP/2 protocol turned on. An attacker can create a large number of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the server to consume unnecessary resources processing requests for which the response will not be delivered (CVE-2025-8671). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8671 Description It was discovered that a denial of service attack can be performed on cache servers that have the HTTP/2 protocol turned on. An attacker can create a large number of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the server to consume unnecessary resources processing requests for which the response will not be delivered (CVE-2025-8671). References
- https://bugs.mageia.org/show_bug.cgi?id=34587
- https://www.openwall.com/lists/oss-security/2025/08/13/6
- https://www.openwall.com/lists/oss-security/2025/08/16/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671
- varnish-7.7.3-1.mga9
- lighttpd-1.4.80-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0238 - Updated fetchmail package fixes security vulnerability
Publication date: 14 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61962 Description It was discovered that fetchmail's SMTP client, when configured to authenticate, is susceptible to a protocol violation where, when a trusted but malicious or malfunctioning SMTP server responds to an authentication request with a "334" code but without a following blank on the line, it will attempt to start reading from memory address 0x1 to parse the server's SASL challenge. This event will usually cause a crash of fetchmail (CVE-2025-61962). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-61962 Description It was discovered that fetchmail's SMTP client, when configured to authenticate, is susceptible to a protocol violation where, when a trusted but malicious or malfunctioning SMTP server responds to an authentication request with a "334" code but without a following blank on the line, it will attempt to start reading from memory address 0x1 to parse the server's SASL challenge. This event will usually cause a crash of fetchmail (CVE-2025-61962). References
- https://bugs.mageia.org/show_bug.cgi?id=34644
- https://www.openwall.com/lists/oss-security/2025/10/03/2
- https://www.openwall.com/lists/oss-security/2025/10/04/3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61962
- fetchmail-6.5.6-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0084 - Updated viking package fix bug
Publication date: 14 Oct 2025
Type: bugfix
Affected Mageia releases : 9
Description Viking no longer downloads Open Street Maps map tiles. This update fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description Viking no longer downloads Open Street Maps map tiles. This update fixes the reported issue. References SRPMS 9/core
- viking-1.10-2.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0237 - Updated open-vm-tools package fixes security vulnerability
Publication date: 11 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-41244 Description It was discovered that open-vm-tools contains a local privilege escalation vulnerability. A malicious actor with non-administrative privileges on a guest VM may exploit this vulnerability to escalate privileges to root on the same VM (CVE-2025-41244). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-41244 Description It was discovered that open-vm-tools contains a local privilege escalation vulnerability. A malicious actor with non-administrative privileges on a guest VM may exploit this vulnerability to escalate privileges to root on the same VM (CVE-2025-41244). References
- https://bugs.mageia.org/show_bug.cgi?id=34641
- https://www.openwall.com/lists/oss-security/2025/09/29/10
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244
- open-vm-tools-12.3.5-2.2.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0083 - Updated qarte package fixes bug
Publication date: 11 Oct 2025
Type: bugfix
Affected Mageia releases : 9
Description When Qarte is started, the Arte TV window is blank. This update fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description When Qarte is started, the Arte TV window is blank. This update fixes the reported issue. References SRPMS 9/core
- qarte-5.13.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0236 - Updated microcode packages fix security vulnerabilities
Publication date: 10 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-20109 , CVE-2025-22840 , CVE-2025-22839 , CVE-2025-20053 , CVE-2025-24305 , CVE-2025-21090 , CVE-2025-26403 , CVE-2025-32086 Description The updated package updates AMD cpu microcode for processor family 19h, adds AMD cpu microcode for processor family 1ah and fixes security vulnerabilities for Intel processors: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-20109) Sequence of processor instructions leads to unexpected behavior for some Intel® Xeon® 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-22840) Insufficient granularity of access control in the OOB-MSM for some Intel® Xeon® 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. (CVE-2025-22839) Improper handling of overlap between protected memory ranges for some Intel® Xeon® 6 processor with Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-22889) Improper buffer restrictions for some Intel® Xeon® Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-20053) Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel® Xeon® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-24305) Missing reference to active allocated resource for some Intel® Xeon® processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2025-21090) Out-of-bounds write in the memory subsystem for some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-26403) Improperly implemented security check for standard in the DDRIO configuration for some Intel® Xeon® 6 Processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-32086) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-20109 , CVE-2025-22840 , CVE-2025-22839 , CVE-2025-20053 , CVE-2025-24305 , CVE-2025-21090 , CVE-2025-26403 , CVE-2025-32086 Description The updated package updates AMD cpu microcode for processor family 19h, adds AMD cpu microcode for processor family 1ah and fixes security vulnerabilities for Intel processors: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-20109) Sequence of processor instructions leads to unexpected behavior for some Intel® Xeon® 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-22840) Insufficient granularity of access control in the OOB-MSM for some Intel® Xeon® 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. (CVE-2025-22839) Improper handling of overlap between protected memory ranges for some Intel® Xeon® 6 processor with Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-22889) Improper buffer restrictions for some Intel® Xeon® Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-20053) Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel® Xeon® processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-24305) Missing reference to active allocated resource for some Intel® Xeon® processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2025-21090) Out-of-bounds write in the memory subsystem for some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-26403) Improperly implemented security check for standard in the DDRIO configuration for some Intel® Xeon® 6 Processors when using Intel® SGX or Intel® TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-32086) References
- https://bugs.mageia.org/show_bug.cgi?id=34629
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
- microcode-0.20250812-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGASA-2025-0235 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 10 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Upstream kernel version 6.6.105 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. The newer meta-task and mageia-repos packages are required to simplify the correct installation of the kernel-stable-userspace-headers (for backport kernel-stable) and back to kernel-userspace-headers (for 6.6 kernels) packages see https://bugs.mageia.org/show_bug.cgi?id=34545. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Upstream kernel version 6.6.105 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. The newer meta-task and mageia-repos packages are required to simplify the correct installation of the kernel-stable-userspace-headers (for backport kernel-stable) and back to kernel-userspace-headers (for 6.6 kernels) packages see https://bugs.mageia.org/show_bug.cgi?id=34545. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34594
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.102
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.103
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.104
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734
- kernel-6.6.105-1.mga9
- kmod-virtualbox-7.1.10-10.mga9
- kmod-xtables-addons-3.24-86.mga9
- mageia-repos-9-4.mga9
- meta-task-9-4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0234 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 09 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Vanilla upstream kernel version 6.6.105 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-38501 , CVE-2025-38553 , CVE-2025-38555 , CVE-2025-38560 , CVE-2025-38561 , CVE-2025-38562 , CVE-2025-38563 , CVE-2025-38565 , CVE-2025-38566 , CVE-2025-38568 , CVE-2025-38569 , CVE-2025-38571 , CVE-2025-38572 , CVE-2025-38574 , CVE-2025-38576 , CVE-2025-38577 , CVE-2025-38578 , CVE-2025-38579 , CVE-2025-38581 , CVE-2025-38583 , CVE-2025-38587 , CVE-2025-38588 , CVE-2025-38590 , CVE-2025-38601 , CVE-2025-38602 , CVE-2025-38604 , CVE-2025-38608 , CVE-2025-38609 , CVE-2025-38610 , CVE-2025-38611 , CVE-2025-38612 , CVE-2025-38615 , CVE-2025-38617 , CVE-2025-38618 , CVE-2025-38622 , CVE-2025-38623 , CVE-2025-38624 , CVE-2025-38625 , CVE-2025-38626 , CVE-2025-38630 , CVE-2025-38632 , CVE-2025-38634 , CVE-2025-38635 , CVE-2025-38639 , CVE-2025-38640 , CVE-2025-38644 , CVE-2025-38645 , CVE-2025-38646 , CVE-2025-38648 , CVE-2025-38650 , CVE-2025-38652 , CVE-2025-38653 , CVE-2025-38656 , CVE-2025-38659 , CVE-2025-38677 , CVE-2025-38679 , CVE-2025-38680 , CVE-2025-38681 , CVE-2025-38683 , CVE-2025-38684 , CVE-2025-38685 , CVE-2025-38687 , CVE-2025-38688 , CVE-2025-38691 , CVE-2025-38692 , CVE-2025-38693 , CVE-2025-38694 , CVE-2025-38695 , CVE-2025-38696 , CVE-2025-38697 , CVE-2025-38698 , CVE-2025-38699 , CVE-2025-38700 , CVE-2025-38701 , CVE-2025-38702 , CVE-2025-38706 , CVE-2025-38707 , CVE-2025-38708 , CVE-2025-38709 , CVE-2025-38711 , CVE-2025-38712 , CVE-2025-38713 , CVE-2025-38714 , CVE-2025-38715 , CVE-2025-38716 , CVE-2025-38718 , CVE-2025-38721 , CVE-2025-38723 , CVE-2025-38724 , CVE-2025-38725 , CVE-2025-38727 , CVE-2025-38728 , CVE-2025-38729 , CVE-2025-38730 , CVE-2025-38732 , CVE-2025-38734 , CVE-2025-38735 , CVE-2025-39673 , CVE-2025-39675 , CVE-2025-39676 , CVE-2025-39679 , CVE-2025-39681 , CVE-2025-39682 , CVE-2025-39683 , CVE-2025-39684 , CVE-2025-39685 , CVE-2025-39686 , CVE-2025-39687 , CVE-2025-39689 , CVE-2025-39691 , CVE-2025-39692 , CVE-2025-39693 , CVE-2025-39694 , CVE-2025-39701 , CVE-2025-39702 , CVE-2025-39703 , CVE-2025-39706 , CVE-2025-39709 , CVE-2025-39710 , CVE-2025-39711 , CVE-2025-39713 , CVE-2025-39714 , CVE-2025-39715 , CVE-2025-39716 , CVE-2025-39718 , CVE-2025-39719 , CVE-2025-39720 , CVE-2025-39721 , CVE-2025-39724 , CVE-2025-39730 , CVE-2025-39731 , CVE-2025-39734 Description Vanilla upstream kernel version 6.6.105 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34595
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.102
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.103
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.104
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38501
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38561
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38562
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38577
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38578
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38579
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38611
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38615
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38650
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38696
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38697
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38698
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38707
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38723
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39716
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39731
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39734
- kernel-linus-6.6.105-1.mga9
Categorías: Actualizaciones de Seguridad




