Lector de Feeds
Commercial vendors
Hardware vendors
← Older revision Revision as of 20:22, 18 October 2025 (4 intermediate revisions by the same user not shown)Line 7: Line 7: == Consulting, training, development services == == Consulting, training, development services == − −=== France === − −* '''hupstream''' - http://hupstream.com - We help businesses and people make the most out of Open Source: kernel expertise, packaging, build system, all base system components. We help our client to industrialise their use of Open Source. We are also part of some Open Source projects like Mageia, kernel, debian, ... We provide support on many distributions including Mageia. − −* '''Open Source Software Assurance''' - https://www.linagora.com/ - From Open Source Leader company ! Our mission : bug hunting, support, assistance and Open Source lifecycle management from Open Source experts ! − −* '''SIVEO''' - http://www.siveo.net/ - SIVEO is an infrastructure automation software company; it is a young company creates innovative in November 2008. First French company labelled in the INTEL CLOUD Builder initiative for its eVA solution, SIVEO works with publishers, SSII, public and private accounts. [https://blog.mageia.org/en/2015/11/17/siveo-joins-mageia/ SIVEO joins Mageia <!--is first official sponsor of the Mageia project (To be discussed, this is ambiguous - Stormi). (Commenting that part out for now, to avoid that companies feel offended who have donated in whichever way to Mageia and were earlier in time to do that marja, 2016-04-21)-->] [https://twitter.com/eVPlanet Follow us on twitter.] − −=== USA === − −* '''Remy Services, LLC''' - https://community.spiceworks.com/service-providers/975-remy-services-llc - We offer remote and onsite computer maintenance and repair to help you with all your computer needs. Everything from virus or malware removal, data recovery, network installations, hardware installation, laptop repairs and general cleanup. Our recent work: Mageia Package QA Testing. <!--- * '''Name''' - url or contact - City, Country <!--- * '''Name''' - url or contact - City, Country Line 24: Line 12: == Hosting == == Hosting == −* '''GigaTux''' - http://www.gigatux.com/distro/mageia_vps Gigatux supports the latest Mageia stable version on demand <!--- * '''Name''' - url, city --> <!--- * '''Name''' - url, city --> == Hardware vendors == == Hardware vendors == −=== United Kingdom === −* '''Ministry of Freedom''' - https://minifree.org/ (website in English) - Essex - Selling laptop, desktop and server computers with Mageia preinstalled, along with a free/opensource BIOS called [https://libreboot.org/ Libreboot] − −=== Belgium === −* '''PC-Fixer.be''' - http://www.pc-fixer.be/ (website in French) - Brussels - Selling laptop and desktop computers with Mageia preinstalled === Germany === === Germany === Yuusha
Categorías: Wiki de Mageia
Iurt
ulri: Fix grammar
← Older revision Revision as of 19:08, 18 October 2025 (One intermediate revision by the same user not shown)Line 75: Line 75: {{file|/some/path/cauldron/$arch/media/main}} {{file|/some/path/cauldron/$arch/media/main}} + +== ulri == + +ulri checks the queue every minute (in cron) and if there are packages to build, finds a build node where there is no build in progress, scps the src.rpm, then sshes to the build machine to run iurt. It then periodically checks if the build is finished, then scps back the results and cleans things up. + +ulri is configured with the files {{file|/etc/iurt/upload.conf}} and {{file|~/.upload.conf}} The list of available build nodes, among other things, are configured there. Any special ssh configuration needed to reach a build node (e.g. a nonstandard port number) can be configured in the appropriate ''Host'' entry in {{file|~/.ssh/config}} Danf
Categorías: Wiki de Mageia
Google Earth
Links: add another bugzilla link and add the summary and number of the first one
← Older revision Revision as of 19:04, 18 October 2025 Line 65: Line 65: [https://forums.mageia.org/en/viewtopic.php?f=29&t=3101&p=23278&hilit=google+earth#p23278 Mageia forums - Add Google Apps repositories in Mageia] [https://forums.mageia.org/en/viewtopic.php?f=29&t=3101&p=23278&hilit=google+earth#p23278 Mageia forums - Add Google Apps repositories in Mageia] −[https://bugs.mageia.org/show_bug.cgi?id=28018 Mageia Bugzilla]+[https://bugs.mageia.org/show_bug.cgi?id=28018 Bug 28018 - Google Earth: how to run it on Mageia 8] + +[https://bugs.mageia.org/show_bug.cgi?id=32220 Bug 32220 - nouveau and google-earth-pro] Marja
Categorías: Wiki de Mageia
MGASA-2025-0240 - Updated expat packages fix security vulnerabilities
Publication date: 18 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8176 , CVE-2025-59375 Description Improper restriction of xml entity expansion depth in libexpat. (CVE-2024-8176) This is an extension of the fix published in MGASA-2025-0109 that was determined by upstream to be incomplete. Libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing. (CVE-2025-59375) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8176 , CVE-2025-59375 Description Improper restriction of xml entity expansion depth in libexpat. (CVE-2024-8176) This is an extension of the fix published in MGASA-2025-0109 that was determined by upstream to be incomplete. Libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing. (CVE-2025-59375) References
- https://bugs.mageia.org/show_bug.cgi?id=34640
- https://bugs.mageia.org/show_bug.cgi?id=34111
- https://www.openwall.com/lists/oss-security/2025/09/24/11
- https://advisories.mageia.org/MGASA-2025-0109.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375
- expat-2.7.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0239 - Updated varnish & lighttpd packages fix security vulnerability
Publication date: 17 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8671 Description It was discovered that a denial of service attack can be performed on cache servers that have the HTTP/2 protocol turned on. An attacker can create a large number of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the server to consume unnecessary resources processing requests for which the response will not be delivered (CVE-2025-8671). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8671 Description It was discovered that a denial of service attack can be performed on cache servers that have the HTTP/2 protocol turned on. An attacker can create a large number of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the server to consume unnecessary resources processing requests for which the response will not be delivered (CVE-2025-8671). References
- https://bugs.mageia.org/show_bug.cgi?id=34587
- https://www.openwall.com/lists/oss-security/2025/08/13/6
- https://www.openwall.com/lists/oss-security/2025/08/16/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671
- varnish-7.7.3-1.mga9
- lighttpd-1.4.80-1.3.mga9
Categorías: Actualizaciones de Seguridad
