Reference: https://www.openwall.com/lists/oss-security/2026/01/08/5
Whiteboard: (none) => MGA9TOOCVE: (none) => CVE-2025-13151Flags: (none) => affects_mga9+Status comment: (none) => Fixed upstream in 4.21.0Source RPM: (none) => libtasn1-4.20.0-2.mga10.src.rpm, libtasn1-4.20.0-1.mga9.src.rpm
Suggested advisory: ======================== The updated packages fix a security vulnerability: Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. (CVE-2025-13151) References: https://www.openwall.com/lists/oss-security/2026/01/08/5 ======================== Updated packages in core/updates_testing: ======================== lib(64)tasn1_6-4.21.0-1.mga9 lib(64)tasn1-devel-4.21.0-1.mga9 libtasn1-tools-4.21.0-1.mga9 from SRPM: libtasn1-4.21.0-1.mga9.src.rpm
Status comment: Fixed upstream in 4.21.0 => (none)Flags: affects_mga9+ => (none)Version: Cauldron => 9Status: NEW => ASSIGNEDSource RPM: libtasn1-4.20.0-2.mga10.src.rpm, libtasn1-4.20.0-1.mga9.src.rpm => libtasn1-4.20.0-1.mga9.src.rpmWhiteboard: MGA9TOO => (none)
Assignee: bugsquad => qa-bugs
Keywords: (none) => advisory
RH x86_64 installing lib64tasn1_6-4.21.0-1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ##################################################################################### 1/1: lib64tasn1_6 ##################################################################################### 1/1: removing lib64tasn1_6-4.20.0-1.mga9.x86_64 ##################################################################################### strace gnome-boxes shows openat(AT_FDCWD, "/usr/lib64/libtasn1.so.6", O_RDONLY|O_CLOEXEC) = 3
Flags: (none) => test_passed_mga9_64+
MGA9-64 server Plasma Wayland on Compaq H000SB No installation issues. Ref bug 31039 Comment 6. Muddled a bit around in blender, creating and moving some objects around. It's a job way over my head, but it looks OK.
CC: (none) => herman.viaeneWhiteboard: (none) => MGA9-64-OK
Validating.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2026-0007.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED