Lector de Feeds
Kernel-Arten-de
Nuestros sitios están intermitentemente fuera de servicio por una avalancha de robots IA
Siempre hemos tenido visitas de robots en nuestros sitios. Normalmente, son inofensivos, como los rastreadores, que mantienen actualizados los motores de búsqueda. Esos robots comienzan por revisar nuestros archivos robots.txt, antes de hacer nada y respetan las restricciones contenidas en esos archivos.
Pero las cosas han cambiado, al igual que otros sitios, hemos sido visitados cada vez más frecuentemente por escarbadores IA, robots que indagan en el internet por cualquier cosa que puedan encontrar para entrenar aplicaciones IA. Estos son extremadamente hambrientos de información, así que descargan mucho más de lo que cualquier usuario podría hacer. Peor aún, muchos de ellos son mal educados y no respetan las reglas de nuestros archivos robots.txt, esconden su identidad, y no hacen pausas entre peticiones – al contrario, golpean nuestros servidores con peticiones desde montones de direcciones IP diferentes al mismo tiempo.
Incluso si nuestra actualización de infraestructura ya hubiera terminado, esto sería realmente difícil de mitigar.
Bloquear las direcciones IP es inútil, ya que constantemente están cambiando por otras. Uno de nuestros administradores apunta a un gran problema: “proxis móviles”, los robots dirigen sus peticiones desde teléfonos sin que los usuarios sospechen. Esto hace que las peticiones parezcan legítimas y las hace difíciles de bloquear sin bloquear al usuario real. Mucho de esto pasa sin que los usuarios sepan que sus teléfonos son usados de esta forma, algunos proxis son incluidos en juegos u otras aplicaciones y lo ocultan en las letras pequeñas de los términos de servicio.
Traducido por katnatek de la publicación original de marja
Alien-de
MGASA-2025-0158 - Updated dropbear packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-47203 Description dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used. References
- https://bugs.mageia.org/show_bug.cgi?id=34264
- https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q2/002385.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47203
- dropbear-2022.83-2.2.mga9
MGASA-2025-0157 - Updated openssh packages fix security vulnerability
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-32728 Description In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. (CVE-2025-32728) References
- https://bugs.mageia.org/show_bug.cgi?id=34224
- https://ubuntu.com/security/notices/USN-7457-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32728
- openssh-9.3p1-2.5.mga9
Kernel flavours
Other kernels: Add section about the kernel series in cauldron
← Older revision Revision as of 14:02, 16 May 2025 (One intermediate revision by the same user not shown)Line 54: Line 54: This kernel is for processors with a unique core like pentium I (i586 architecture) and is able to address till 4 Gb memory. This kernel is for processors with a unique core like pentium I (i586 architecture) and is able to address till 4 Gb memory. −This kernel is proposed with the same version as kernel-desktop+This kernel is proposed with the same version as kernel-desktop. + +This package will not be available in Mageia 10 and later. With the transition from i586 to i686+SSE2, this architecture now supports PAE (Physical Address Extension), enabling support for up to 64 GB of memory as in standard -desktop flavor. == Other kernels == == Other kernels == Line 63: Line 65: The release follows the up-to-date "release candidates" from kernel.org and can provide support for recent features if not available in standard kernels. The release follows the up-to-date "release candidates" from kernel.org and can provide support for recent features if not available in standard kernels. + +==Kernel series in Cauldron== + +In cauldron we now have -lts, -mainline, and -stable kernel series. These series are (at least for now) intended for Cauldron only and provide opportunities to test newer hardware, as well as aligning the packages required for building stable kernels (e.g.: newer Rust, newer LLVM, missing libraries, etc.). + +The -lts series also allows testing compatibility with the "previous" latest working LTS series, which could be useful in many cases, e.g. for proprietary drivers (e.g., NVIDIA) when they won't build anymore on newer kernels or for verifying different hardware behavior of older hardware with respect to newer kernels. + +Note that it is not guaranteed that all series cover all architectures and flavors. For some series, the build may be limited to a single architecture (e.g., x86_64) and single flavor (e.g., desktop), or new flavors may emerge (e.g., desktop-tunedv3 for x86_64-v3). MarjaAlien
deb to rpm: Minor fix
← Older revision Revision as of 01:38, 15 May 2025 Line 86: Line 86: {{code|cd schildichat-desktop-alpha-1.11.97~sc.0.test.0}} {{code|cd schildichat-desktop-alpha-1.11.97~sc.0.test.0}} −Edit the spec file, put some information in summary, save the change.+Edit the spec file, put some information after the '''Summary:''' string, save the change. {{code|<nowiki>rpmbuild -bb schildichat-desktop-alpha-1.11.97~sc.0.test.0-2.spec --define "_topdir $(pwd)"</nowiki>}} {{code|<nowiki>rpmbuild -bb schildichat-desktop-alpha-1.11.97~sc.0.test.0-2.spec --define "_topdir $(pwd)"</nowiki>}} KatnatekTalk:Alien-de
Created page with "The Summary word should not be translated as is a Special tag in a spec file --~~~~"
New page
The Summary word should not be translated as is a Special tag in a spec file--[[User:Katnatek|katnatek]] ([[User talk:Katnatek|talk]]) 01:33, 15 May 2025 (UTC) Katnatek
Org Council
2025
← Older revision Revision as of 23:48, 14 May 2025 (One intermediate revision by the same user not shown)Line 30: Line 30: * [[Internationalisation_Team_(i18n)|I18n]]: Yuri Chornoivan (yurchor), Filip Komar (filip) * [[Internationalisation_Team_(i18n)|I18n]]: Yuri Chornoivan (yurchor), Filip Komar (filip) * [[Packagers]]: Nicolas Lécureuil (neoclust) * [[Packagers]]: Nicolas Lécureuil (neoclust) −* [[QA_Team|QA]]: Thomas J Andrews (TJ)+* [[QA_Team|QA]]: Thomas J Andrews (TJ), Jose López (joselp) * [[Packages_Security_Team|Security Team]]: David Walser (luigiwalser), Nicolas Salguero (ns80) * [[Packages_Security_Team|Security Team]]: David Walser (luigiwalser), Nicolas Salguero (ns80) * [[Sysadmin_Team|Sysadmins]]: Pascal Vilarem (Maât) * [[Sysadmin_Team|Sysadmins]]: Pascal Vilarem (Maât) − ==2024== ==2024== Line 44: Line 43: * [[Internationalisation_Team_(i18n)|I18n]]: Yuri Chornoivan (yurchor), Filip Komar (filip) * [[Internationalisation_Team_(i18n)|I18n]]: Yuri Chornoivan (yurchor), Filip Komar (filip) * [[Packagers]]: Nicolas Lécureuil (neoclust) * [[Packagers]]: Nicolas Lécureuil (neoclust) −* [[QA_Team|QA]]: Thomas J Andrews (TJ)+* [[QA_Team|QA]]: Thomas J Andrews (TJ), Jose López (joselp) * [[Packages_Security_Team|Security Team]]: David Walser (luigiwalser), Nicolas Salguero (ns80) * [[Packages_Security_Team|Security Team]]: David Walser (luigiwalser), Nicolas Salguero (ns80) * [[Sysadmin_Team|Sysadmins]]: Pascal Vilarem (Maât) * [[Sysadmin_Team|Sysadmins]]: Pascal Vilarem (Maât) Tandrews16Möglichkeiten um Anwendungen zu installieren-de
