Lector de Feeds
python-structlog-24.4.0-1.mga10.src.rpm
In Mageia/cauldron/i586:
Structlog makes structured logging in Python easy by augmenting your existing
logger. It allows you to split your log entries up into key/value pairs and
build them incrementally without annoying boilerplate code.
Categorías: RPMs
python-sentry-sdk-2.12.0-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
Python client for Sentry (https://sentry.io).
Categorías: RPMs
python-sentry-sdk-2.12.0-1.mga10.src.rpm
In Mageia/cauldron/i586:
Python client for Sentry (https://sentry.io).
Categorías: RPMs
python-scikit-build-core-0.9.10-1.mga10.src.rpm
In Mageia/cauldron/i586:
A next generation Python CMake adapter and Python API for plugins.
Categorías: RPMs
python-scikit-build-core-0.9.10-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
A next generation Python CMake adapter and Python API for plugins.
Categorías: RPMs
MGASA-2024-0278 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 07 Aug 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Vanilla upstream kernel version 6.6.43 fix bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Vanilla upstream kernel version 6.6.43 fix bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33447
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
- kernel-linus-6.6.43-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0277 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
Publication date: 07 Aug 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Upstream kernel version 6.6.43 fix bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-42068 , CVE-2024-42067 , CVE-2024-42145 , CVE-2024-42154 , CVE-2024-42153 , CVE-2024-42152 , CVE-2024-42148 , CVE-2024-42230 , CVE-2024-42229 , CVE-2024-42228 , CVE-2024-42226 , CVE-2024-42225 , CVE-2024-42147 , CVE-2024-42224 , CVE-2024-42223 , CVE-2024-42161 , CVE-2024-42160 , CVE-2024-42159 , CVE-2024-42157 , CVE-2024-42110 , CVE-2024-42119 , CVE-2024-42116 , CVE-2024-42115 , CVE-2024-42144 , CVE-2024-42143 , CVE-2024-42142 , CVE-2024-42141 , CVE-2024-42140 , CVE-2024-42113 , CVE-2024-42138 , CVE-2024-42137 , CVE-2024-42136 , CVE-2024-42135 , CVE-2024-42133 , CVE-2024-42132 , CVE-2024-42131 , CVE-2024-42130 , CVE-2024-42128 , CVE-2024-42127 , CVE-2024-42126 , CVE-2024-42124 , CVE-2024-42121 , CVE-2024-42120 , CVE-2023-52888 , CVE-2024-42106 , CVE-2024-42105 , CVE-2024-42104 , CVE-2024-42103 , CVE-2024-42102 , CVE-2024-42101 , CVE-2024-42100 , CVE-2024-42109 , CVE-2024-40947 , CVE-2024-42226 , CVE-2024-41056 , CVE-2024-41053 , CVE-2024-41055 , CVE-2024-41054 , CVE-2024-41032 , CVE-2024-41031 , CVE-2024-41030 , CVE-2024-41028 , CVE-2024-41027 , CVE-2024-41052 , CVE-2024-41051 , CVE-2024-41050 , CVE-2024-41049 , CVE-2024-41048 , CVE-2024-41047 , CVE-2024-41046 , CVE-2024-41044 , CVE-2024-41025 , CVE-2024-41041 , CVE-2024-41040 , CVE-2024-41039 , CVE-2024-41038 , CVE-2024-41037 , CVE-2024-41036 , CVE-2024-41035 , CVE-2024-41034 , CVE-2024-41024 , CVE-2024-41081 , CVE-2024-41078 , CVE-2024-41079 , CVE-2024-41076 , CVE-2024-41075 , CVE-2024-41074 , CVE-2024-41073 , CVE-2024-41072 , CVE-2024-41070 , CVE-2024-41069 , CVE-2024-41077 , CVE-2024-41068 , CVE-2024-41066 , CVE-2024-41065 , CVE-2024-41064 , CVE-2024-41063 , CVE-2024-41062 , CVE-2024-41060 , CVE-2024-41059 , CVE-2024-41057 , CVE-2024-41058 , CVE-2024-41022 , CVE-2024-41020 , CVE-2024-41019 , CVE-2024-41018 , CVE-2024-41017 , CVE-2024-41015 , CVE-2024-41090 , CVE-2024-41091 Description Upstream kernel version 6.6.43 fix bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33446
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.38
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.39
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.40
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.41
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.42
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091
- kernel-6.6.43-1.mga9
- kmod-xtables-addons-3.24-60.mga9
- kmod-virtualbox-7.0.20-52.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0178 - Updated sddm package provides bugfixes and improvements
Publication date: 07 Aug 2024
Type: bugfix
Affected Mageia releases : 9
Description This update provides several bugfixes and improved Qt6/Wayland support. References
Type: bugfix
Affected Mageia releases : 9
Description This update provides several bugfixes and improved Qt6/Wayland support. References
- https://bugs.mageia.org/show_bug.cgi?id=33453
- https://github.com/sddm/sddm/blob/v0.21.0/ChangeLog
- https://github.com/sddm/sddm/releases/tag/v0.20.0
- https://github.com/sddm/sddm/releases/tag/v0.21.0
- sddm-0.21.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0177 - Updated x11-driver-video-amdgpu packages improve stability and performance with latest kernels
Publication date: 07 Aug 2024
Type: bugfix
Affected Mageia releases : 9
Description This is an update for x11-driver-video-amdgpu that improves stability and performance of the 'amdgpu' x11 driver with the latest kernels. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description This is an update for x11-driver-video-amdgpu that improves stability and performance of the 'amdgpu' x11 driver with the latest kernels. References SRPMS 9/core
- x11-driver-video-amdgpu-23.0.0-2.mga9
Categorías: Actualizaciones de Seguridad
mscore-4.3.2-1.mga9.src.rpm
In Mageia/9/aarch64:
MuseScore stands for Linux MusE Score Typesetter.
Features:
- WYSIWYG design, notes are entered on a "virtual notepaper"
- TrueType font(s) for printing & display allows for high quality
scaling to all sizes
- easy & fast note entry
- many editing functions
- MusicXML import/export
- Midi (SMF) import/export
- MuseData import
- Midi input for note entry
- integrated sequencer and software synthesizer to
play the score
- print or create pdf files
Categorías: RPMs
mscore-4.3.2-1.mga9.src.rpm
In Mageia/9/x86_64:
MuseScore stands for Linux MusE Score Typesetter.
Features:
- WYSIWYG design, notes are entered on a "virtual notepaper"
- TrueType font(s) for printing & display allows for high quality
scaling to all sizes
- easy & fast note entry
- many editing functions
- MusicXML import/export
- Midi (SMF) import/export
- MuseData import
- Midi input for note entry
- integrated sequencer and software synthesizer to
play the score
- print or create pdf files
Categorías: RPMs
mscore-4.3.2-1.mga9.src.rpm
In Mageia/9/armv7hl:
MuseScore stands for Linux MusE Score Typesetter.
Features:
- WYSIWYG design, notes are entered on a "virtual notepaper"
- TrueType font(s) for printing & display allows for high quality
scaling to all sizes
- easy & fast note entry
- many editing functions
- MusicXML import/export
- Midi (SMF) import/export
- MuseData import
- Midi input for note entry
- integrated sequencer and software synthesizer to
play the score
- print or create pdf files
Categorías: RPMs
mscore-4.3.2-1.mga9.src.rpm
In Mageia/9/i586:
MuseScore stands for Linux MusE Score Typesetter.
Features:
- WYSIWYG design, notes are entered on a "virtual notepaper"
- TrueType font(s) for printing & display allows for high quality
scaling to all sizes
- easy & fast note entry
- many editing functions
- MusicXML import/export
- Midi (SMF) import/export
- MuseData import
- Midi input for note entry
- integrated sequencer and software synthesizer to
play the score
- print or create pdf files
Categorías: RPMs
python-lastversion-3.5.4-1.mga10.src.rpm
In Mageia/cauldron/i586:
A tiny command-line utility that helps to answer a simple question:
What is the latest stable version for a project?
Categorías: RPMs
python-lastversion-3.5.4-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
A tiny command-line utility that helps to answer a simple question:
What is the latest stable version for a project?
Categorías: RPMs
php-8.3.10-2.mga10.src.rpm
In Mageia/cauldron/i586:
PHP is an HTML-embeddable scripting language. PHP offers built-in database
integration for several commercial and non-commercial database management
systems, so writing a database-enabled script with PHP is fairly simple. The
most common use of PHP coding is probably as a replacement for CGI scripts.
Categorías: RPMs
php-8.3.10-2.mga10.src.rpm
In Mageia/cauldron/x86_64:
PHP is an HTML-embeddable scripting language. PHP offers built-in database
integration for several commercial and non-commercial database management
systems, so writing a database-enabled script with PHP is fairly simple. The
most common use of PHP coding is probably as a replacement for CGI scripts.
Categorías: RPMs
roundcubemail-1.6.8-1.mga10.src.rpm
In Mageia/cauldron/i586:
RoundCube Webmail is a browser-based multilingual IMAP client with an
application-like user interface. It provides full functionality you
expect from an e-mail client, including MIME support, address book,
folder manipulation, message searching and spell checking.
RoundCube Webmail is written in PHP and requires a database: MariaDB,
PostgreSQL and SQLite are known to work.
The user interface is fully skinnable using XHTML and CSS 2.
Categorías: RPMs
roundcubemail-1.6.8-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
RoundCube Webmail is a browser-based multilingual IMAP client with an
application-like user interface. It provides full functionality you
expect from an e-mail client, including MIME support, address book,
folder manipulation, message searching and spell checking.
RoundCube Webmail is written in PHP and requires a database: MariaDB,
PostgreSQL and SQLite are known to work.
The user interface is fully skinnable using XHTML and CSS 2.
Categorías: RPMs
python-pyzstd-0.16.1-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
Pyzstd module provides classes and functions for compressing and decompressing
data, using Facebookâs Zstandard (or zstd as short name) algorithm.
Categorías: RPMs