Actualizaciones de Seguridad
MGASA-2026-0025 - Updated ceph packages fix security vulnerability
Publication date: 29 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-31884 Description Updated ceph packages fix a security issue allowing an attacker to make Ceph accept any certificate. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-31884 Description Updated ceph packages fix a security issue allowing an attacker to make Ceph accept any certificate. References
- https://bugs.mageia.org/show_bug.cgi?id=35051
- https://www.openwall.com/lists/oss-security/2026/01/21/6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31884
- ceph-18.2.7-2.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0024 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, and java-latest-openjdk packages fix security vulnerabilities
Publication date: 29 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64720 , CVE-2025-65018 , CVE-2026-21925 , CVE-2026-21933 , CVE-2026-21945 Description LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication. (CVE-2025-64720) LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read`. (CVE-2025-65018) Improve JMX connections. (CVE-2026-21925) Improve HttpServer Request handling. (CVE-2026-21933) Enhance Certificate Checking. (CVE-2026-21945) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64720 , CVE-2025-65018 , CVE-2026-21925 , CVE-2026-21933 , CVE-2026-21945 Description LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication. (CVE-2025-64720) LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read`. (CVE-2025-65018) Improve JMX connections. (CVE-2026-21925) Improve HttpServer Request handling. (CVE-2026-21933) Enhance Certificate Checking. (CVE-2026-21945) References
- https://bugs.mageia.org/show_bug.cgi?id=35045
- https://access.redhat.com/errata/RHSA-2026:0848
- https://access.redhat.com/errata/RHSA-2026:0927
- https://www.oracle.com/security-alerts/cpujan2026.html#AppendixJAVA
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945
- java-11-openjdk-11.0.30.0.7-1.mga9
- java-17-openjdk-17.0.18.0.8-1.mga9
- java-1.8.0-openjdk-1.8.0.482.b08-1.mga9
- java-latest-openjdk-25.0.2.0.10-1.rolling.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0023 - Updated glib2.0 packages fix security vulnerabilities
Publication date: 28 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-3360 , CVE-2025-7039 , CVE-2025-13601 , CVE-2025-14087 , CVE-2025-14512 , CVE-2026-0988 Description Glib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid iso 8601 timestamp with g_date_time_new_from_iso8601(). (CVE-2025-3360) Buffer under-read on glib through glib/gfileutils.c via get_tmp_file(). (CVE-2025-7039) Integer overflow in in g_escape_uri_string(). (CVE-2025-13601) Buffer underflow in gvariant parser leads to heap corruption. (CVE-2025-14087) Integer overflow in glib gio attribute escaping causes heap buffer overflow. (CVE-2025-14512) Denial of service via integer overflow in g_buffered_input_stream_peek(). (CVE-2026-0988) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-3360 , CVE-2025-7039 , CVE-2025-13601 , CVE-2025-14087 , CVE-2025-14512 , CVE-2026-0988 Description Glib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid iso 8601 timestamp with g_date_time_new_from_iso8601(). (CVE-2025-3360) Buffer under-read on glib through glib/gfileutils.c via get_tmp_file(). (CVE-2025-7039) Integer overflow in in g_escape_uri_string(). (CVE-2025-13601) Buffer underflow in gvariant parser leads to heap corruption. (CVE-2025-14087) Integer overflow in glib gio attribute escaping causes heap buffer overflow. (CVE-2025-14512) Denial of service via integer overflow in g_buffered_input_stream_peek(). (CVE-2026-0988) References
- https://bugs.mageia.org/show_bug.cgi?id=35052
- https://ubuntu.com/security/notices/USN-7971-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988
- glib2.0-2.76.3-1.6.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0007 - Updated flightgear,simgear & flightgear-data packages fix bug
Publication date: 28 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simgear, flightgear and flightgear-data packages to new stable release version 2024.1.4 References
Type: bugfix
Affected Mageia releases : 9
Description Updated simgear, flightgear and flightgear-data packages to new stable release version 2024.1.4 References
- https://bugs.mageia.org/show_bug.cgi?id=35055
- https://www.flightgear.org/download/releases/2024-1-4/
- flightgear-2024.1.4-1.mga9
- simgear-2024.1.4-1.mga9
- flightgear-data-2024.1.4-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0022 - Updated glibc packages fix security vulnerabilities
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0861 , CVE-2026-0915 , CVE-2025-15281 Description Integer overflow in memalign leads to heap corruption. (CVE-2026-0861) getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler. (CVE-2026-0915) wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory. (CVE-2025-15281) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0861 , CVE-2026-0915 , CVE-2025-15281 Description Integer overflow in memalign leads to heap corruption. (CVE-2026-0861) getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler. (CVE-2026-0915) wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory. (CVE-2025-15281) References
- https://bugs.mageia.org/show_bug.cgi?id=35036
- https://www.openwall.com/lists/oss-security/2026/01/16/5
- https://www.openwall.com/lists/oss-security/2026/01/16/6
- https://www.openwall.com/lists/oss-security/2026/01/20/3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281
- glibc-2.36-59.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0021 - Updated iperf packages fix security vulnerabilities
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-54349 , CVE-2025-54350 Description In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow. (CVE-2025-54349) In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt. (CVE-2025-54350) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-54349 , CVE-2025-54350 Description In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow. (CVE-2025-54349) In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt. (CVE-2025-54350) References
- https://bugs.mageia.org/show_bug.cgi?id=35047
- https://ubuntu.com/security/notices/USN-7970-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54350
- iperf-3.18-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0020 - Updated python-pyasn1 packages fix security vulnerability
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23490 Description pyasn1 has a DoS vulnerability in decoder. (CVE-2026-23490) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23490 Description pyasn1 has a DoS vulnerability in decoder. (CVE-2026-23490) References
- https://bugs.mageia.org/show_bug.cgi?id=35057
- https://ubuntu.com/security/notices/USN-7975-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490
- python-pyasn1-0.4.8-6.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0019 - Updated haproxy packages fix bugs
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
- haproxy-2.8.18-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0018 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 26 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=35022
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.117
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.118
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.119
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40341
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40358
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68369
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68769
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68772
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68774
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68809
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71144
- kernel-linus-6.6.120-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0017 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 24 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References
- https://bugs.mageia.org/show_bug.cgi?id=35021
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.117
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.118
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.119
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40281
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40306
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40313
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40333
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40341
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40358
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68168
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68177
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68179
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68191
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68219
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68224
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68229
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68246
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68291
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68310
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68369
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68769
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68772
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68774
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68806
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68809
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71065
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71067
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71075
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71102
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71105
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71107
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71121
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71140
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71144
- kernel-6.6.120-1.mga9
- kmod-virtualbox-7.1.14-14.mga9
- kmod-xtables-addons-3.24-88.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0016 - Updated avahi packages fix security vulnerabilities
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References
- https://bugs.mageia.org/show_bug.cgi?id=34887
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DR2CTF5XR6GVX3JYIAAO3ULJNUZDGBVS/
- https://ubuntu.com/security/notices/USN-7967-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471
- avahi-0.8-10.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0015 - Updated harfbuzz packages fix security vulnerability
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References
- https://bugs.mageia.org/show_bug.cgi?id=35042
- https://www.openwall.com/lists/oss-security/2026/01/11/1
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QJUDZGUEVHTL26NPJUIGPHUOUKLUMCFB/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22693
- harfbuzz-7.0.1-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0014 - Updated thunderbird packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34993
- https://www.thunderbird.net/en-US/thunderbird/140.7.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- thunderbird-140.7.0-1.mga9
- thunderbird-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0013 - Updated nss & firefox packages fix security vulnerabilities
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References
- https://bugs.mageia.org/show_bug.cgi?id=34987
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_120.html
- https://www.firefox.com/en-US/firefox/140.7.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891
- nss-3.120.0-1.mga9
- firefox-140.7.0-1.mga9
- firefox-l10n-140.7.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0012 - Updated gimp packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References
- https://bugs.mageia.org/show_bug.cgi?id=34363
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DVVZTOVQSBY5ON5P7HYQIXK2OLMSUEH5/
- https://lists.debian.org/debian-lts-announce/2025/11/msg00005.html
- https://lists.debian.org/debian-security-announce/2025/msg00103.html
- https://lists.debian.org/debian-security-announce/2026/msg00001.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425
- gimp-2.10.36-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0011 - Updated python-urllib3 packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References
- https://bugs.mageia.org/show_bug.cgi?id=34809
- https://www.openwall.com/lists/oss-security/2025/12/05/4
- https://ubuntu.com/security/notices/USN-7955-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441
- python-urllib3-1.26.20-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0010 - Updated libpng packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References
- https://bugs.mageia.org/show_bug.cgi?id=34986
- https://www.openwall.com/lists/oss-security/2026/01/12/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801
- libpng-1.6.38-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0009 - Updated nodejs packages fix security vulnerabilities
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References
- https://bugs.mageia.org/show_bug.cgi?id=34995
- https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
- https://nodejs.org/en/blog/release/v22.22.0
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637
- nodejs-22.22.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2026-0006 - Updated v4l2loopback packages fix bug
Publication date: 17 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References
- https://bugs.mageia.org/show_bug.cgi?id=34980
- https://github.com/v4l2loopback/v4l2loopback/issues/653
- v4l2loopback-0.15.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2026-0008 - Updated net-snmp packages fix security vulnerability
Publication date: 14 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References
- https://bugs.mageia.org/show_bug.cgi?id=34979
- https://www.openwall.com/lists/oss-security/2026/01/09/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615
- net-snmp-5.9.3-2.2.mga9
Categorías: Actualizaciones de Seguridad




