Lector de Feeds

Mageia ISO auf ein USB Laufwerk dumpen - Alternative Werkzeuge-de

Wiki Mageia - 15 Febrero, 2025 - 23:51

Add pt-BR

← Older revision Revision as of 22:51, 15 February 2025 Line 1: Line 1:  [[Category:Dokumentation]] [[Category:Dokumentation]]    −{{Multi_language_banner-de|[[Mageia_ISO_auf_ein_USB_Laufwerk_dumpen_-_Alternative_Werkzeuge-de|Deutsch]] ; [[Dump_Mageia_ISO_on_a_USB_flash_drive_-_Alternative_tools|English]] ; [[Copier_un_ISO_de_Mageia_sur_une_cl%C3%A9_USB_-_outils_alternatifs-fr|Français]] ; [[Dump_Mageia_ISO_op_een_usb_stick_-_alternatieve_gereedschappen|Nederlands]] ; [[Colocar_ISO_do_Mageia_numa_unidade_de_pen_USB_-_Ferramentas_alternativas|Português (Portugal)]] ;}}+{{Multi_language_banner-de|[[Mageia_ISO_auf_ein_USB_Laufwerk_dumpen_-_Alternative_Werkzeuge-de|Deutsch]] ; [[Dump_Mageia_ISO_on_a_USB_flash_drive_-_Alternative_tools|English]] ; [[Copier_un_ISO_de_Mageia_sur_une_cl%C3%A9_USB_-_outils_alternatifs-fr|Français]] ; [[Dump_Mageia_ISO_op_een_usb_stick_-_alternatieve_gereedschappen|Nederlands]] ; [[Colocar_ISO_do_Mageia_numa_unidade_de_pen_USB_-_Ferramentas_alternativas|Português (Portugal)]] ; [[Gravar a ISO do Mageia em um pen drive - Ferramentas alternativas-pt-BR|português brasileiro]] ;}}     * Für Linux siehe: [[Installationsmedien-de#Eine_Mageia_ISO_auf_ein_USB_Laufwerk_übertragen|Eine Mageia ISO auf ein USB Laufwerk übertragen]] * Für Linux siehe: [[Installationsmedien-de#Eine_Mageia_ISO_auf_ein_USB_Laufwerk_übertragen|Eine Mageia ISO auf ein USB Laufwerk übertragen]] Xgrind
Categorías: Wiki de Mageia

Gravar a ISO do Mageia em um pen drive - Ferramentas alternativas-pt-BR

Wiki Mageia - 15 Febrero, 2025 - 23:50

Criando a página Gravar a ISO do Mageia em um pen drive-pt-BR

New page

[[Category:Documentation]]

{{multi language banner|[[Mageia_ISO_auf_ein_USB_Laufwerk_dumpen_-_Alternative_Werkzeuge-de|Deutsch]] ; [[Dump_Mageia_ISO_on_a_USB_flash_drive_-_Alternative_tools|English]] ; [[Copier_un_ISO_de_Mageia_sur_une_clé_USB_-_outils_alternatifs-fr|Français]] ; [[Dump_Mageia_ISO_op_een_usb_stick_-_alternatieve_gereedschappen-nl|Nederlands]] ; [[Colocar_ISO_do_Mageia_numa_unidade_de_pen_USB_-_Ferramentas_alternativas|Português (Portugal)]] ; [[Gravar a ISO do Mageia em um pen drive - Ferramentas alternativas-pt-BR|português brasileiro]] ;}}

* Para Linux, veja… [[Mídias de instalação#Gravar a ISO do Mageia_em_um_pen_drive-pt-BR|Gravar a ISO do Mageia em um pen drive]].

* Para o Microsoft Windows, você pode escolher uma das seguintes ferramentas:
**[https://rufus.akeo.ie/ Rufus]. Para versões mais antigas do Rufus (v2.x e abaixo), você deve usar a opção "DD Image" - isso também é mencionado no [https://github.com/pbatard/rufus/wiki/FAQ#Live_media_issues FAQ do rufus]. As versões atuais do Rufus devem detectar isso automaticamente.<br>
**[https://sourceforge.net/projects/win32diskimager/ Win32 Disk Imager], para versões recentes do Windows. Você precisará mudar para "todos os arquivos" quando tentar abrir o .iso, pois ele só permite .img por padrão.<br>
**O [https://www.winimage.com/ WinImage] funciona bem em sistemas com restrições, como o Microsoft Windows 7 Starter. Veja uma página dedicada no wiki atual, sobre como usá-lo: [[Dump Mageia ISO on a USB flash drive - WinImage]].<br>
**[https://www.balena.io/etcher/ Etcher] Xgrind
Categorías: Wiki de Mageia

Vendored dependencies

Wiki Mageia - 15 Febrero, 2025 - 20:42

‎Go: Proposed workflow

← Older revision Revision as of 19:42, 15 February 2025 Line 99: Line 99:  The [https://vuln.go.dev/ Go Vulnerability Database] can be used on an ongoing basis to find security issues in Go packages from the SBOMs of those packages. The [https://vuln.go.dev/ Go Vulnerability Database] can be used on an ongoing basis to find security issues in Go packages from the SBOMs of those packages.    −''details TBD''+A possible workflow:  +   +# After the RPM %install step, run the following:  +#: <pre>syft scan --output spdx-tag-value="%{NAME}-%{VERSION}.%{RELEASE}.%{ARCH}.spdx" dir:%{buildroot}</pre>  +#: ''syft'' scans the installed binaries and generates a SBOM including the Go dependencies embedded therein (including Go's stdlib version). The resulting SBOM file can be stored in a permanent location for later scans.  +# Periodically, scan all the SBOM files to see if any of them show dependencies that have reported vulnerabilities by running on each file:  +#: <pre>grype --output json sbom:"%{NAME}-%{VERSION}.%{RELEASE}.%{ARCH}.spdx"</pre>  +# If any new vulnerabilities are found, open a bug so the package can be rebuilt.     == See Also == == See Also == Danf
Categorías: Wiki de Mageia

MGASA-2025-0067 - Updated ffmpeg packages fix security vulnerabilities

Mageia Security - 14 Febrero, 2025 - 23:55
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-49502 , CVE-2024-31578 Description A buffer overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. (CVE-2023-49502) FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function. (CVE-2024-31578) References SRPMS 9/core
  • ffmpeg-5.1.6-1.2.mga9
9/tainted
  • ffmpeg-5.1.6-1.2.mga9.tainted

MGASA-2025-0066 - Updated python-zipp packages fix security vulnerabilitiy

Mageia Security - 14 Febrero, 2025 - 23:55
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-5569 Description Denial of Service via crafted zip file in jaraco/zipp. (CVE-2024-5569) References SRPMS 9/core
  • python-zipp-3.8.1-3.1.mga9

MGAA-2025-0015 - Updated texstudio packages fix bugs

Mageia Security - 14 Febrero, 2025 - 23:55
Publication date: 14 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description The application crashed and the package needed additional requirements to make it work well once installed. This update fixes the issues. References SRPMS 9/core
  • texstudio-4.5.1-2.1.mga9

MGASA-2025-0065 - Updated golang packages fix security vulnerability

Mageia Security - 14 Febrero, 2025 - 21:36
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22866 Description Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec. (CVE-2025-22866) References SRPMS 9/core
  • golang-1.22.12-1.mga9

MGASA-2025-0064 - Updated postgresql15 & postgresql13 packages fix security vulnerability

Mageia Security - 14 Febrero, 2025 - 21:36
Publication date: 14 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-1094 Description PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation. (CVE-2025-1094) References SRPMS 9/core
  • postgresql15-15.11-1.mga9
  • postgresql13-13.19-1.mga9

MGAA-2025-0014 - Updated ffmulticonverter packages fix bug

Mageia Security - 14 Febrero, 2025 - 21:36
Publication date: 14 Feb 2025
Type: bugfix
Affected Mageia releases : 9
Description Issues with the conversions and the progress bar have been reported. This update fixes the issues and removes python3-sip as a requirement as is no longer needed References SRPMS 9/core
  • ffmulticonverter-1.8.0-10.1.mga9

Becoming a Mageia Packager

Wiki Mageia - 14 Febrero, 2025 - 10:56

‎Apprenticeship in progress

← Older revision Revision as of 09:56, 14 February 2025 Line 224: Line 224:  | pol4n || neoclust || [https://ml.mageia.org/l/arc/dev/2022-03/msg00117.html 2022-03-11] || {{yes|Done}} || {{yes|Done}} || {{yes|Done}} || {{yes|Done}} || rpcbind/sitecopy/spamassassin/ssdeep/sslsplit || {{yes|Done}} || {{yes|Done}} || tap<br>woff2<br>shairplay<br>ntpsec<br>clusterscripts<br>nagios-plugins<br>xymons<br>zathuras<br>rizins<br>vnstat || 2022-08-18 | pol4n || neoclust || [https://ml.mageia.org/l/arc/dev/2022-03/msg00117.html 2022-03-11] || {{yes|Done}} || {{yes|Done}} || {{yes|Done}} || {{yes|Done}} || rpcbind/sitecopy/spamassassin/ssdeep/sslsplit || {{yes|Done}} || {{yes|Done}} || tap<br>woff2<br>shairplay<br>ntpsec<br>clusterscripts<br>nagios-plugins<br>xymons<br>zathuras<br>rizins<br>vnstat || 2022-08-18  |- |- −| joselp || papoteur,mokraemer || {{yes|Done}} ||  || {{yes|Done}} ||  ||  ||  ||  || ||  ||  +| joselp || papoteur,mokraemer || {{yes|Done}} ||  || {{yes|Done}} ||  ||  ||  ||  || photomontage ||  ||    |- |-  | zekemx || kekepower || {{yes|Done}} ||  || ||  ||  || 1. conky ||  ||  ||  || | zekemx || kekepower || {{yes|Done}} ||  || ||  ||  || 1. conky ||  ||  ||  || Papoteur
Categorías: Wiki de Mageia

MGASA-2025-0063 - Updated ofono packages fix security vulnerabilities

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-2794 , CVE-2023-4232 , CVE-2023-4233 , CVE-2023-4234 , CVE-2023-4235 Description Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver() function. (CVE-2023-2794) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_status_report() function. (CVE-2023-4232) Sms decoder stack-based buffer overflow remote code execution vulnerability within the sms_decode_address_field(). (CVE-2023-4233) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_submit_report() function. (CVE-2023-4234) Sms decoder stack-based buffer overflow remote code execution vulnerability within the decode_deliver_report() function. (CVE-2023-4235) References SRPMS 9/core
  • ofono-2.1-1.1.mga9

MGASA-2025-0062 - Updated perl-Net-OAuth, perl-Crypt-URandom & perl-Module-Build packages fix security vulnerability

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-22376 Description In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong. (CVE-2025-22376) References SRPMS 9/core
  • perl-Net-OAuth-0.300.0-1.mga9
  • perl-Crypt-URandom-0.370.0-1.mga9
  • perl-Module-Build-0.423.400-1.mga9

MGASA-2025-0061 - Updated ark packages fix security vulnerability

Mageia Security - 13 Febrero, 2025 - 20:09
Publication date: 13 Feb 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-57966 Description A security issue exists in Ark where a maliciously crafted archive containing file paths beginning with "/" allows files to be extracted to locations outside the intended directory. References SRPMS 9/core
  • ark-23.04.3-1.1.mga9
Feed