Actualizaciones de Seguridad

MGASA-2026-0025 - Updated ceph packages fix security vulnerability

Mageia Security - 29 Enero, 2026 - 20:22
Publication date: 29 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-31884 Description Updated ceph packages fix a security issue allowing an attacker to make Ceph accept any certificate. References SRPMS 9/core
  • ceph-18.2.7-2.2.mga9

MGASA-2026-0024 - Updated java-1.8.0-openjdk, java-11-openjdk, java-17-openjdk, and java-latest-openjdk packages fix security vulnerabilities

Mageia Security - 29 Enero, 2026 - 20:22
Publication date: 29 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-64720 , CVE-2025-65018 , CVE-2026-21925 , CVE-2026-21933 , CVE-2026-21945 Description LIBPNG is vulnerable to a buffer overflow in `png_image_read_composite` via incorrect palette premultiplication. (CVE-2025-64720) LIBPNG is vulnerable to a heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read`. (CVE-2025-65018) Improve JMX connections. (CVE-2026-21925) Improve HttpServer Request handling. (CVE-2026-21933) Enhance Certificate Checking. (CVE-2026-21945) References SRPMS 9/core
  • java-11-openjdk-11.0.30.0.7-1.mga9
  • java-17-openjdk-17.0.18.0.8-1.mga9
  • java-1.8.0-openjdk-1.8.0.482.b08-1.mga9
  • java-latest-openjdk-25.0.2.0.10-1.rolling.1.mga9

MGASA-2026-0023 - Updated glib2.0 packages fix security vulnerabilities

Mageia Security - 28 Enero, 2026 - 23:42
Publication date: 28 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-3360 , CVE-2025-7039 , CVE-2025-13601 , CVE-2025-14087 , CVE-2025-14512 , CVE-2026-0988 Description Glib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid iso 8601 timestamp with g_date_time_new_from_iso8601(). (CVE-2025-3360) Buffer under-read on glib through glib/gfileutils.c via get_tmp_file(). (CVE-2025-7039) Integer overflow in in g_escape_uri_string(). (CVE-2025-13601) Buffer underflow in gvariant parser leads to heap corruption. (CVE-2025-14087) Integer overflow in glib gio attribute escaping causes heap buffer overflow. (CVE-2025-14512) Denial of service via integer overflow in g_buffered_input_stream_peek(). (CVE-2026-0988) References SRPMS 9/core
  • glib2.0-2.76.3-1.6.mga9

MGAA-2026-0007 - Updated flightgear,simgear & flightgear-data packages fix bug

Mageia Security - 28 Enero, 2026 - 23:42
Publication date: 28 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Updated simgear, flightgear and flightgear-data packages to new stable release version 2024.1.4 References SRPMS 9/core
  • flightgear-2024.1.4-1.mga9
  • simgear-2024.1.4-1.mga9
  • flightgear-data-2024.1.4-1.mga9

MGASA-2026-0022 - Updated glibc packages fix security vulnerabilities

Mageia Security - 27 Enero, 2026 - 19:20
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0861 , CVE-2026-0915 , CVE-2025-15281 Description Integer overflow in memalign leads to heap corruption. (CVE-2026-0861) getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler. (CVE-2026-0915) wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory. (CVE-2025-15281) References SRPMS 9/core
  • glibc-2.36-59.mga9

MGASA-2026-0021 - Updated iperf packages fix security vulnerabilities

Mageia Security - 27 Enero, 2026 - 19:20
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-54349 , CVE-2025-54350 Description In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow. (CVE-2025-54349) In iperf before 3.19.1, iperf_auth.c has a Base64Decode assertion failure and application exit upon a malformed authentication attempt. (CVE-2025-54350) References SRPMS 9/core
  • iperf-3.18-1.1.mga9

MGASA-2026-0020 - Updated python-pyasn1 packages fix security vulnerability

Mageia Security - 27 Enero, 2026 - 19:20
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-23490 Description pyasn1 has a DoS vulnerability in decoder. (CVE-2026-23490) References SRPMS 9/core
  • python-pyasn1-0.4.8-6.1.mga9

MGASA-2026-0019 - Updated haproxy packages fix bugs

Mageia Security - 27 Enero, 2026 - 19:20
Publication date: 27 Jan 2026
Type: security
Affected Mageia releases : 9
Description Haproxy has two major, a few medium and a few minor bugs fixed in the last upstream version 2.8.18 of branch 2.8. Fixed major bugs list: - quic: use ncbmbuf for CRYPTO handling - stream: Force channel analysis on successful synchronous send Fixed medium bugs list: - dns: bind the nameserver sockets to the initiating thread - h1: prevent a crash on HTTP/2 upgrade - h3: do not overwrite interim with final response - h3: handle interim response properly on FE side - h3: properly encode response after interim one in same buf - http-ana: Don't close server connection on read0 in TUNNEL mode - mux-quic: adjust wakeup behavior - mux-quic: ensure Early-data header is set - quic: CRYPTO frame freeing without eb_delete() - resolvers: make the process_resolvers() task single-threaded - ssl: Crash because of dangling ckch_store reference in a ckch instance - ssl: take care of second client hello - stick-tables: Always return the good stksess from stktable_set_entry - stick-tables: Don't forget to dec count on failure. References SRPMS 9/core
  • haproxy-2.8.18-1.mga9

MGASA-2026-0018 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - 26 Enero, 2026 - 21:03
Publication date: 26 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.120-1.mga9

MGASA-2026-0017 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities

Mageia Security - 24 Enero, 2026 - 21:25
Publication date: 24 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Upstream kernel version 6.6.120 fixes bugs and vulnerabilities. The kmod-virtualbox & kmod-xtables-addons packages have been updated to work with this new kernel. References SRPMS 9/core
  • kernel-6.6.120-1.mga9
  • kmod-virtualbox-7.1.14-14.mga9
  • kmod-xtables-addons-3.24-88.mga9

MGASA-2026-0016 - Updated avahi packages fix security vulnerabilities

Mageia Security - 23 Enero, 2026 - 01:11
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68276 , CVE-2025-68468 , CVE-2025-68471 Description Avahi has a reachable assertion in avahi_wide_area_scan_cache. (CVE-2025-68276) Avahi has a reachable assertion in lookup_multicast_callback. (CVE-2025-68468) Avahi has a reachable assertion in lookup_start. (CVE-2025-68471) References SRPMS 9/core
  • avahi-0.8-10.3.mga9

MGASA-2026-0015 - Updated harfbuzz packages fix security vulnerability

Mageia Security - 23 Enero, 2026 - 01:11
Publication date: 23 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22693 Description Null Pointer Dereference in SubtableUnicodesCache::create leading to DoS. (CVE-2026-22693) References SRPMS 9/core
  • harfbuzz-7.0.1-1.2.mga9

MGASA-2026-0014 - Updated thunderbird packages fix security vulnerabilities

Mageia Security - 20 Enero, 2026 - 04:25
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References SRPMS 9/core
  • thunderbird-140.7.0-1.mga9
  • thunderbird-l10n-140.7.0-1.mga9

MGASA-2026-0013 - Updated nss & firefox packages fix security vulnerabilities

Mageia Security - 20 Enero, 2026 - 04:25
Publication date: 20 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-0877 , CVE-2026-0878 , CVE-2026-0879 , CVE-2026-0880 , CVE-2026-0882 , CVE-2025-14327 , CVE-2026-0883 , CVE-2026-0884 , CVE-2026-0885 , CVE-2026-0886 , CVE-2026-0887 , CVE-2026-0890 , CVE-2026-0891 Description Mitigation bypass in the DOM: Security component. (CVE-2026-0877) Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. (CVE-2026-0878) Sandbox escape due to incorrect boundary conditions in the Graphics component. (CVE-2026-0879) Sandbox escape due to integer overflow in the Graphics component. (CVE-2026-0880) Use-after-free in the IPC component. (CVE-2026-0882) Spoofing issue in the Downloads Panel component. (CVE-2025-14327) Information disclosure in the Networking component. (CVE-2026-0883) Use-after-free in the JavaScript Engine component. (CVE-2026-0884) Use-after-free in the JavaScript: GC component. (CVE-2026-0885) Incorrect boundary conditions in the Graphics component. (CVE-2026-0886) Clickjacking issue, information disclosure in the PDF Viewer component. (CVE-2026-0887) Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. (CVE-2026-0890) Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. (CVE-2026-0891) References SRPMS 9/core
  • nss-3.120.0-1.mga9
  • firefox-140.7.0-1.mga9
  • firefox-l10n-140.7.0-1.mga9

MGASA-2026-0012 - Updated gimp packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-2760 , CVE-2025-2761 , CVE-2025-48797 , CVE-2025-48798 , CVE-2025-10934 , CVE-2025-14422 , CVE-2025-14425 Description XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-2760) FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. (CVE-2025-2761) Multiple heap buffer overflows in tga parser. (CVE-2025-48797) Multiple use after free in xcf parser. (CVE-2025-48798) XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-10934) PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. (CVE-2025-14422) JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. (CVE-2025-14425) References SRPMS 9/core
  • gimp-2.10.36-1.1.mga9

MGASA-2026-0011 - Updated python-urllib3 packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-66418 , CVE-2026-21441 Description urllib3 allows an unbounded number of links in the decompression chain. (CVE-2025-66418) urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API). (CVE-2026-21441) References SRPMS 9/core
  • python-urllib3-1.26.20-1.2.mga9

MGASA-2026-0010 - Updated libpng packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2026-22695 , CVE-2026-22801 Description LIBPNG has a heap buffer over-read in png_image_read_direct_scaled (regression from CVE-2025-65018 fix). (CVE-2026-22695) LIBPNG has an integer truncation causing heap buffer over-read in png_image_write_*. (CVE-2026-22801) References SRPMS 9/core
  • libpng-1.6.38-1.3.mga9

MGASA-2026-0009 - Updated nodejs packages fix security vulnerabilities

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59465 , CVE-2025-59466 , CVE-2025-55130 , CVE-2025-55131 , CVE-2025-55132 , CVE-2026-21637 Description Node.js HTTP/2 server crashes with unhandled error when receiving malformed HEADERS frame. (CVE-2025-59465) Uncatchable "Maximum call stack size exceeded" error on Node.js via async_hooks leads to process crashes bypassing error handlers. (CVE-2025-59466) Bypass File System Permissions using crafted symlinks. (CVE-2025-55130) Timeout-based race conditions make Uint8Array/Buffer.alloc non-zerofilled. (CVE-2025-55131) fs.futimes() Bypasses Read-Only Permission Model. (CVE-2025-55132) TLS PSK/ALPN Callback Exceptions Bypass Error Handlers, Causing DoS and FD Leak. (CVE-2026-21637) References SRPMS 9/core
  • nodejs-22.22.0-1.mga9

MGAA-2026-0006 - Updated v4l2loopback packages fix bug

Mageia Security - 17 Enero, 2026 - 03:48
Publication date: 17 Jan 2026
Type: bugfix
Affected Mageia releases : 9
Description Backported kernel 6.18 requires an updated version (mga#34962). Additionally some bugs and issues have been fixed. References SRPMS 9/core
  • v4l2loopback-0.15.3-1.mga9

MGASA-2026-0008 - Updated net-snmp packages fix security vulnerability

Mageia Security - 14 Enero, 2026 - 18:31
Publication date: 14 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-68615 Description Net-SNMP snmptrapd crash. (CVE-2025-68615) References SRPMS 9/core
  • net-snmp-5.9.3-2.2.mga9
Feed