Lector de Feeds
Utiliser des applications Java dans les navigateurs Firefox et Chromium
Created page with "'''Utiliser des applications Java dans les navigateurs Firefox et Chromium''' Pour cela, il faut exécuter des scripts java sur son navigateur, avec son et image. Démarche..."
New page
'''Utiliser des applications Java dans les navigateurs Firefox et Chromium'''Pour cela, il faut exécuter des scripts java sur son navigateur, avec son et image.
Démarche :
Tout d’abord, il faut installer java-17-openjdk du CCM.
Le serveur télécharge alors un petit fichier .jnlp, qu'il faut alors éxecuter. Mais Firefox et Chromium ne soutiennent plus les formats Java.
Une alternative a été créée : OpenWebStart, il est sur github.com.
https://github.com/karakun/OpenWebStart/releases/
Ce qu'il faut faire c'est télécharger OpenWebStart_linux_1_11_1.deb
Et faire en ROOT :
dpkg -i OpenWebStart_linux_1_11_1.deb
L'installation se passe bien. Les fichiers sont installés dans /opt
Voir doc:
https://openwebstart.com/docs/OWSGuide.html#_what_is_openwebstart
Et maintenant, firefox et Chromium exécutent les fichiers .jnlp. Scroll44
Categorías: Wiki de Mageia
Documentation-fr
Logiciel
← Older revision Revision as of 09:02, 1 March 2025 Line 165: Line 165: * [[Hubic-fr|<span style="color:green;">Hubic</span>]] * [[Hubic-fr|<span style="color:green;">Hubic</span>]] * [[Contrôle à distance avec X11VNC et tunnel SSH-fr#Installation SSH|SSH, configurer le serveur]] * [[Contrôle à distance avec X11VNC et tunnel SSH-fr#Installation SSH|SSH, configurer le serveur]] +* [[Utiliser des applications Java dans les navigateurs Firefox et Chromium]] </div> </div> Scroll44
Categorías: Wiki de Mageia
MGAA-2025-0023 - Updated gnome-boxes packages fix bug
Publication date: 28 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description gnome-boxes can't redirect usb ports to guest systems, this is due missing requiriment on spice-gtk. This update fixes the issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description gnome-boxes can't redirect usb ports to guest systems, this is due missing requiriment on spice-gtk. This update fixes the issue. References SRPMS 9/core
- gnome-boxes-44.2-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0083 - Updated radare2 packages fix security vulnerabilities
Publication date: 28 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1378 Description A vulnerability, which was classified as problematic, was found in radare2. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1378 Description A vulnerability, which was classified as problematic, was found in radare2. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. References
- https://bugs.mageia.org/show_bug.cgi?id=34044
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6L3CRKPOLSYHPHW4QETC25D65CTE33EO/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1378
- radare2-5.8.8-1.5.mga9
Categorías: Actualizaciones de Seguridad
Primeiros passos com a linha de comando e exemplos úteis-pt-BR
correção em evita
← Older revision Revision as of 22:32, 27 February 2025 Line 39: Line 39: Em vez de digitar o nome completo do comando ou diretório, digite as primeiras letras e pressione a tecla TAB (tabulação). Isso: Em vez de digitar o nome completo do comando ou diretório, digite as primeiras letras e pressione a tecla TAB (tabulação). Isso: * economiza tempo; * economiza tempo; −* vita erros de digitação; +* evita erros de digitação; * atua como ajuda de memória, listando todas as possibilidades correspondentes às primeiras letras digitadas. * atua como ajuda de memória, listando todas as possibilidades correspondentes às primeiras letras digitadas. Xgrind
Categorías: Wiki de Mageia
User Forums
The Brazilian forum no longer exists.
← Older revision Revision as of 22:23, 27 February 2025 Line 17: Line 17: * Greek: http://www.mageia-gr.org/forum/ * Greek: http://www.mageia-gr.org/forum/ * Italian: http://mageiaitalia.org/forum * Italian: http://mageiaitalia.org/forum −* Portuguese: https://www.mageiadobrasil.com.br/forum/ * Russia: https://forum.mageia.org.ru/, https://linuxforum.ru/viewforum.php?id=80 * Russia: https://forum.mageia.org.ru/, https://linuxforum.ru/viewforum.php?id=80 * Spanish: https://blogdrake.net/foros * Spanish: https://blogdrake.net/foros Xgrind
Categorías: Wiki de Mageia
MGASA-2025-0082 - Updated libcap packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1390 Description pam_cap: Fix potential configuration parsing error. (CVE-2025-1390) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1390 Description pam_cap: Fix potential configuration parsing error. (CVE-2025-1390) References
- https://bugs.mageia.org/show_bug.cgi?id=34048
- https://ubuntu.com/security/notices/USN-7287-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1390
- libcap-2.52-5.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0081 - Updated proftpd packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57392 Description A buffer overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a denial of service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. (CVE-2024-57392) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57392 Description A buffer overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a denial of service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. (CVE-2024-57392) References
- https://bugs.mageia.org/show_bug.cgi?id=34042
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E36XSNXDCOSSYTPKEMAEUAZ6QVQJTSFZ/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C3HZA5IS6YXHXDULEZHLHWOVCC3IYNGP/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57392
- proftpd-1.3.8c-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0080 - Updated openssh packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26465 Description Machine-in-the-middle attack vulnerability if verifyhostkeydns is enabled. (CVE-2025-26465) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-26465 Description Machine-in-the-middle attack vulnerability if verifyhostkeydns is enabled. (CVE-2025-26465) References
- https://bugs.mageia.org/show_bug.cgi?id=34036
- https://openwall.com/lists/oss-security/2025/02/18/1
- https://openwall.com/lists/oss-security/2025/02/18/4
- https://lists.debian.org/debian-security-announce/2025/msg00030.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STTU3AYQZPT4FUMERJH7RQ3KH3TMQDUI/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GGMBNUMHNWAKKPCVKBQBXE7C4WSYOBAY/
- https://ubuntu.com/security/notices/USN-7270-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465
- openssh-9.3p1-2.4.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0079 - Updated kernel, kmod-virtualbox & kmod-xtables-addons packages fix security vulnerabilities
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Upstream kernel version 6.6.79 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Upstream kernel version 6.6.79 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34023
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.75
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.76
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.77
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.78
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.79
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701
- kernel-6.6.79-1.mga9
- kmod-virtualbox-7.0.24-67.mga9
- kmod-xtables-addons-3.24-73.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0078 - Updated kernel-linus packages fix security vulnerabilities
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Vanilla upstream kernel version 6.6.79 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-21687 , CVE-2025-21688 , CVE-2025-21689 , CVE-2025-21690 , CVE-2025-21691 , CVE-2025-21692 , CVE-2025-21699 , CVE-2025-21700 , CVE-2025-21701 Description Vanilla upstream kernel version 6.6.79 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34024
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.75
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.76
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.77
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.78
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.79
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21687
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21688
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21690
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21691
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21692
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21699
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21700
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21701
- kernel-linus-6.6.79-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0077 - Updated iniparser packages fix security vulnerability
Publication date: 26 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0633 Description A heap-based buffer overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows an attacker to read out-of-bounds memory. (CVE-2025-0633) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-0633 Description A heap-based buffer overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows an attacker to read out-of-bounds memory. (CVE-2025-0633) References
- https://bugs.mageia.org/show_bug.cgi?id=34047
- https://ubuntu.com/security/notices/USN-7286-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0633
- iniparser-4.1-4.1.mga9
Categorías: Actualizaciones de Seguridad
