Post by Markus Robert Kesslerhttps://access.redhat.com/security/cve/cve-2023-4911
Latest core/updates: glibc-2.36-50.mga9.src.rpm
Even cauldron still has the vulnerable version
The version number doesn't matter.
https://svnweb.mageia.org/advisories/32357.adv?view=markup shows it's fixed.
Mageia doesn't update to new versions in stable releases, as a new version
may drop features or change how things are used. When there's a fix, whether
it's for a security bug or a bug that doesn't obviously impact security, it's
done by applying a patch to the existing version and increasing the sub release
number. Exceptions are made when the patch can not be back ported, but that's
rare, and it's tested to ensure it either doesn't affect current usage or that
everyone is warned as clearly as possible.
I'm no longer an active member of Mageia, but still use it.
Regards, Dave Hodgins