Lector de Feeds
Primeiros passos com a linha de comando e exemplos úteis-pt-BR
correção em evita
← Older revision Revision as of 22:32, 27 February 2025 Line 39: Line 39: Em vez de digitar o nome completo do comando ou diretório, digite as primeiras letras e pressione a tecla TAB (tabulação). Isso: Em vez de digitar o nome completo do comando ou diretório, digite as primeiras letras e pressione a tecla TAB (tabulação). Isso: * economiza tempo; * economiza tempo; −* vita erros de digitação; +* evita erros de digitação; * atua como ajuda de memória, listando todas as possibilidades correspondentes às primeiras letras digitadas. * atua como ajuda de memória, listando todas as possibilidades correspondentes às primeiras letras digitadas. Xgrind
Categorías: Wiki de Mageia
User Forums
The Brazilian forum no longer exists.
← Older revision Revision as of 22:23, 27 February 2025 Line 17: Line 17: * Greek: http://www.mageia-gr.org/forum/ * Greek: http://www.mageia-gr.org/forum/ * Italian: http://mageiaitalia.org/forum * Italian: http://mageiaitalia.org/forum −* Portuguese: https://www.mageiadobrasil.com.br/forum/ * Russia: https://forum.mageia.org.ru/, https://linuxforum.ru/viewforum.php?id=80 * Russia: https://forum.mageia.org.ru/, https://linuxforum.ru/viewforum.php?id=80 * Spanish: https://blogdrake.net/foros * Spanish: https://blogdrake.net/foros Xgrind
Categorías: Wiki de Mageia
MGASA-2025-0082 - Updated libcap packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1390 Description pam_cap: Fix potential configuration parsing error. (CVE-2025-1390) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1390 Description pam_cap: Fix potential configuration parsing error. (CVE-2025-1390) References
- https://bugs.mageia.org/show_bug.cgi?id=34048
- https://ubuntu.com/security/notices/USN-7287-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1390
- libcap-2.52-5.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0081 - Updated proftpd packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57392 Description A buffer overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a denial of service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. (CVE-2024-57392) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57392 Description A buffer overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a denial of service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. (CVE-2024-57392) References
- https://bugs.mageia.org/show_bug.cgi?id=34042
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E36XSNXDCOSSYTPKEMAEUAZ6QVQJTSFZ/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C3HZA5IS6YXHXDULEZHLHWOVCC3IYNGP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57392
- proftpd-1.3.8c-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0080 - Updated openssh packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26465 Description Machine-in-the-middle attack vulnerability if verifyhostkeydns is enabled. (CVE-2025-26465) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26465 Description Machine-in-the-middle attack vulnerability if verifyhostkeydns is enabled. (CVE-2025-26465) References
- https://bugs.mageia.org/show_bug.cgi?id=34036
- https://openwall.com/lists/oss-security/2025/02/18/1
- https://openwall.com/lists/oss-security/2025/02/18/4
- https://lists.debian.org/debian-security-announce/2025/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STTU3AYQZPT4FUMERJH7RQ3KH3TMQDUI/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GGMBNUMHNWAKKPCVKBQBXE7C4WSYOBAY/
- https://ubuntu.com/security/notices/USN-7270-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465
- openssh-9.3p1-2.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0079 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Upstream kernel version 6.6.79 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Upstream kernel version 6.6.79 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34023
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.75
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.76
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.77
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.78
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.79
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701
- kernel-6.6.79-1.mga9
- kmod-virtualbox-7.0.24-67.mga9
- kmod-xtables-addons-3.24-73.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0078 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Vanilla upstream kernel version 6.6.79 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Vanilla upstream kernel version 6.6.79 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34024
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.75
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.76
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.77
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.78
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.79
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701
- kernel-linus-6.6.79-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0077 - Updated iniparser packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0633 Description A heap-based buffer overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows an attacker to read out-of-bounds memory. (CVE-2025-0633) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0633 Description A heap-based buffer overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows an attacker to read out-of-bounds memory. (CVE-2025-0633) References
- https://bugs.mageia.org/show_bug.cgi?id=34047
- https://ubuntu.com/security/notices/USN-7286-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0633
- iniparser-4.1-4.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0076 - Updated dcmtk packages fix security vulnerabilities
Publication date: 25 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-25472 , CVE-2025-25474 , CVE-2025-25475 Description A buffer overflow in DCMTK allows attackers to cause a Denial of Service (DoS) via a crafted DCM file (CVE-2025-25472). DCMTK was discovered to contain a buffer overflow via the component /dcmimgle/diinpxt.h (CVE-2025-25474). A NULL pointer dereference in the component /libsrc/dcrleccd.cc of DCMTK allows attackers to cause a Denial of Service (DoS) via a crafted DICOM file (CVE-2025-25475). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-25472 , CVE-2025-25474 , CVE-2025-25475 Description A buffer overflow in DCMTK allows attackers to cause a Denial of Service (DoS) via a crafted DCM file (CVE-2025-25472). DCMTK was discovered to contain a buffer overflow via the component /dcmimgle/diinpxt.h (CVE-2025-25474). A NULL pointer dereference in the component /libsrc/dcrleccd.cc of DCMTK allows attackers to cause a Denial of Service (DoS) via a crafted DICOM file (CVE-2025-25475). References
- https://bugs.mageia.org/show_bug.cgi?id=34043
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VEIE5K5WMSCBUU2JDXY5E576NA36I3NC/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25472
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25475
- dcmtk-3.6.7-4.4.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2025-0022 - Updated autohint-onoff, enki, pyzo & meteo-qt packages fix bug
Publication date: 25 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description These packages have a bogus requirement on python3-sip; trying to install these packages will cause conflicts if you have applications that require python3-sip6. This update fixes the issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description These packages have a bogus requirement on python3-sip; trying to install these packages will cause conflicts if you have applications that require python3-sip6. This update fixes the issue. References SRPMS 9/core
- autohint-onoff-2.0-1.1.mga9
- enki-22.08.0-1.1.mga9
- pyzo-4.12.0-2.1.mga9
- meteo-qt-3.3-2.1.mga9
Categorías: Actualizaciones de Seguridad
Mageia 9 Errata-de
← Older revision
Revision as of 21:24, 25 February 2025
Line 279:
Line 279:
{{Bug|33697}} - '''Nextcloud Client''' - Wir schaffen es nicht dieses aktuell zu halten. Verwenden Sie stattdessen das AppImage über den Upstream - siehe [[Nextcloud-client]]. {{Bug|33697}} - '''Nextcloud Client''' - Wir schaffen es nicht dieses aktuell zu halten. Verwenden Sie stattdessen das AppImage über den Upstream - siehe [[Nextcloud-client]].
−{{Bug|34028}} - '''gnome-calculator''' bleibt beim Start hängen. '''WORKAROUND:''' Führe {{cmd|gsettings set org.gnome.calculator refresh-interval 0}} aus, bevor Sie die Anwendung starten. Ansonsten können Sie eine alternative Anwendung aus unserem Repository verwenden: {{prog|galculator}}, {{prog|mate-calc}}, {{prog|kcalc}} oder das nicht so gut ausschauende {{prog|xcalc}}, oder das textbasierte {{prog|qalculate-gtk}} / {{prog|qalculate-qt}} oder {{prog|speedcrunch}}.+{{Bug|34028}} - '''gnome-calculator''' bleibt hängen, wenn versucht wird die Wechselkurse zu aktualisieren, was bei Anwendungsstart vorkonfiguriert automatisch durchführt wird. '''WORKAROUND:''' Legen Sie fest, dass die Wechselkurse nicht aktualisiert werden: Führe {{cmd|gsettings set org.gnome.calculator refresh-interval 0}} aus, bevor Sie die Anwendung starten. Die Wechselkursfunktion ist defekt: Wählen Sie den Erweiterten Modus und im Drop-Down Menü "Währung", wodurch der Auswahlbereich verschwindet. Um wieder etwas anderes auswählen zu können, wählen Sie temporär einen anderen Modus aus. Alternativ können Sie eine andere Anwendung aus unserem Repository verwenden: {{prog|galculator}}, {{prog|mate-calc}}, {{prog|kcalc}} oder das nicht so gut ausschauende {{prog|xcalc}}, oder das textbasierte {{prog|qalculate-gtk}} / {{prog|qalculate-qt}} oder {{prog|speedcrunch}}.
{{Bug|34029}} - '''grisbi''' Wir aktualisieren grisbi, um Nutzern, welche von anderen Distributionen kommen, welche die Version 3.0.4 einsetzen, eine Kompatibilität anzubieten. Allerdings kann der 1st time wizard kein benutzerdefiniertes Verzeichnis für Sicherungen auswählen. Bitte wählen Sie dieses später unter Bearbeiten -> Einstellungen aus. {{Bug|34029}} - '''grisbi''' Wir aktualisieren grisbi, um Nutzern, welche von anderen Distributionen kommen, welche die Version 3.0.4 einsetzen, eine Kompatibilität anzubieten. Allerdings kann der 1st time wizard kein benutzerdefiniertes Verzeichnis für Sicherungen auswählen. Bitte wählen Sie dieses später unter Bearbeiten -> Einstellungen aus.
Psyca
Categorías: Wiki de Mageia
MGASA-2025-0075 - Updated emacs packages fix a security vulnerability
Publication date: 25 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1244 Description A command injection flaw was found which could allow a remote, unauthenticated attacker to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1244 Description A command injection flaw was found which could allow a remote, unauthenticated attacker to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect. References
- https://bugs.mageia.org/show_bug.cgi?id=34045
- https://lwn.net/Articles/1011611/
- https://nvd.nist.gov/vuln/detail/CVE-2025-1244
- https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=820f0793f0b46448928905552726c1f1b999062f
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1244
- emacs-29.4-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0074 - Updated vim packages fix security vulnerability
Publication date: 25 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26603 Description A heap use-after-free was found in str_to_reg() in Vim < 9.1.1115. (CVE-2025-26603) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26603 Description A heap use-after-free was found in str_to_reg() in Vim < 9.1.1115. (CVE-2025-26603) References
- https://bugs.mageia.org/show_bug.cgi?id=34035
- https://openwall.com/lists/oss-security/2025/02/16/1
- https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26603
- vim-9.1.1122-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0073 - Updated libxml2 packages fix security vulnerabilities
Publication date: 25 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56171 , CVE-2025-24928 , CVE-2025-27113 Description The updated packages fix security vulnerabilities: Use-after-free in xmlSchemaIDCFillNodeTables. (CVE-2024-56171) Stack-buffer-overflow in xmlSnprintfElements. (CVE-2025-24928) Null-deref in xmlPatMatch. (CVE-2025-27113) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-56171 , CVE-2025-24928 , CVE-2025-27113 Description The updated packages fix security vulnerabilities: Use-after-free in xmlSchemaIDCFillNodeTables. (CVE-2024-56171) Stack-buffer-overflow in xmlSnprintfElements. (CVE-2025-24928) Null-deref in xmlPatMatch. (CVE-2025-27113) References
- https://bugs.mageia.org/show_bug.cgi?id=34037
- https://openwall.com/lists/oss-security/2025/02/18/2
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
- libxml2-2.10.4-1.6.mga9
Categorías: Actualizaciones de Seguridad
