Lector de Feeds
MGASA-2025-0247 - Updated thunderbird packgaes fix security vulnerabilities
Publication date: 23 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-10527 , CVE-2025-10528 , CVE-2025-10529 , CVE-2025-10532 , CVE-2025-10533 , CVE-2025-10536 , CVE-2025-10537 , CVE-2025-11708 , CVE-2025-11709 , CVE-2025-11710 , CVE-2025-11711 , CVE-2025-11712 , CVE-2025-11713 , CVE-2025-11714 , CVE-2025-11715 Description CVE-2025-11708: Use-after-free in MediaTrackGraphImpl::GetInstance() CVE-2025-11709: Out of bounds read/write in a privileged process triggered by WebGL textures CVE-2025-11710: Cross-process information leaked due to malicious IPC messages CVE-2025-11711: Some non-writable Object properties could be modified CVE-2025-11712: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type CVE-2025-11713: Potential user-assisted code execution in “Copy as cURL” command CVE-2025-11714: Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 CVE-2025-11715: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144, and other security fixes; please see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-10527 , CVE-2025-10528 , CVE-2025-10529 , CVE-2025-10532 , CVE-2025-10533 , CVE-2025-10536 , CVE-2025-10537 , CVE-2025-11708 , CVE-2025-11709 , CVE-2025-11710 , CVE-2025-11711 , CVE-2025-11712 , CVE-2025-11713 , CVE-2025-11714 , CVE-2025-11715 Description CVE-2025-11708: Use-after-free in MediaTrackGraphImpl::GetInstance() CVE-2025-11709: Out of bounds read/write in a privileged process triggered by WebGL textures CVE-2025-11710: Cross-process information leaked due to malicious IPC messages CVE-2025-11711: Some non-writable Object properties could be modified CVE-2025-11712: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type CVE-2025-11713: Potential user-assisted code execution in “Copy as cURL” command CVE-2025-11714: Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 CVE-2025-11715: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144, and other security fixes; please see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34638
- https://www.thunderbird.net/en-US/thunderbird/140.4.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-85/
- https://www.thunderbird.net/en-US/thunderbird/140.4.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-85/
- https://www.thunderbird.net/en-US/thunderbird/140.3.1esr/releasenotes/
- https://www.thunderbird.net/en-US/thunderbird/140.3.0esr/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-78/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715
- thunderbird-140.4.0-1.2.mga9
- thunderbird-l10n-140.4.0-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0246 - Updated firefox, nss & rootcerts fix security vulnerabilities
Publication date: 23 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-10527 , CVE-2025-10528 , CVE-2025-10529 , CVE-2025-10532 , CVE-2025-10533 , CVE-2025-10536 , CVE-2025-10537 , CVE-2025-11708 , CVE-2025-11709 , CVE-2025-11710 , CVE-2025-11711 , CVE-2025-11712 , CVE-2025-11713 , CVE-2025-11714 , CVE-2025-11715 Description CVE-2025-11708: Use-after-free in MediaTrackGraphImpl::GetInstance() CVE-2025-11709: Out of bounds read/write in a privileged process triggered by WebGL textures CVE-2025-11710: Cross-process information leaked due to malicious IPC messages CVE-2025-11711: Some non-writable Object properties could be modified CVE-2025-11712: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type CVE-2025-11713: Potential user-assisted code execution in “Copy as cURL” command CVE-2025-11714: Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 CVE-2025-11715: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144, and other security fixes; please see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-10527 , CVE-2025-10528 , CVE-2025-10529 , CVE-2025-10532 , CVE-2025-10533 , CVE-2025-10536 , CVE-2025-10537 , CVE-2025-11708 , CVE-2025-11709 , CVE-2025-11710 , CVE-2025-11711 , CVE-2025-11712 , CVE-2025-11713 , CVE-2025-11714 , CVE-2025-11715 Description CVE-2025-11708: Use-after-free in MediaTrackGraphImpl::GetInstance() CVE-2025-11709: Out of bounds read/write in a privileged process triggered by WebGL textures CVE-2025-11710: Cross-process information leaked due to malicious IPC messages CVE-2025-11711: Some non-writable Object properties could be modified CVE-2025-11712: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type CVE-2025-11713: Potential user-assisted code execution in “Copy as cURL” command CVE-2025-11714: Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 CVE-2025-11715: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144, and other security fixes; please see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=34637
- https://www.firefox.com/en-US/firefox/140.4.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-83/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_117.html
- https://www.firefox.com/en-US/firefox/140.3.1/releasenotes/
- https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_116.html
- https://www.firefox.com/en-US/firefox/140.3.0/releasenotes/
- https://www.mozilla.org/en-US/security/advisories/mfsa2025-75/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715
- nss-3.117.0-1.mga9
- rootcerts-20251003.00-1.mga9
- firefox-140.4.0-1.2.mga9
- firefox-l10n-140.4.0-1.mga9
Categorías: Actualizaciones de Seguridad
Enlightenment
added NL-banner
← Older revision Revision as of 14:35, 23 October 2025 Line 1: Line 1: [[Category:Documentation]] [[Category:Documentation]] −{{multi language banner|[[Enlightenment-de|Deutsch]] ; [[Enlightenment|English]] ;}}+{{multi language banner|[[Enlightenment-de|Deutsch]] ; [[Enlightenment|English]] ; [[Enlightenment-nl|Nederlands]] ;}} {{introduction|This page talks about the desktop environment Enlightenment. {{introduction|This page talks about the desktop environment Enlightenment. Marchugo
Categorías: Wiki de Mageia
Enlightenment-de
added nl-banner
← Older revision Revision as of 14:35, 23 October 2025 Line 1: Line 1: [[Category:Documentation]] [[Category:Documentation]] <!-- It would be nice to have this page extended to the form of the https://wiki.mageia.org/en/Desktop_environments#Introduction_pages --> <!-- It would be nice to have this page extended to the form of the https://wiki.mageia.org/en/Desktop_environments#Introduction_pages --> −{{multi language banner-de|[[Enlightenment-de|Deutsch]] ; [[Enlightenment|English]] ;}}+{{multi language banner-de|[[Enlightenment-de|Deutsch]] ; [[Enlightenment|English]] ; [[Enlightenment-nl|Nederlands]] ;}} {{introduction-de|Diese Seite behandelt die Desktop-Umgebung Enlightenment. {{introduction-de|Diese Seite behandelt die Desktop-Umgebung Enlightenment. Marchugo
Categorías: Wiki de Mageia
Enlightenment-nl
Created page with "Category:Documentation Category:Howtos Category:Installing Category:Nederlands Category:Documentatie-nl {{multi language banner|Duits..."
New page
[[Category:Documentation]][[Category:Howtos]]
[[Category:Installing]]
[[Category:Nederlands]]
[[Category:Documentatie-nl]]
{{multi language banner|[[Enlightenment-de|Duits]] ; [[Enlightenment|Engels]] ; [[Enlightenment-nl|Nederlands]] ; }}
{{introduction|Deze pagina gaat over de desktop-omgeving Enlightenment.
Voor andere desktop-omgevingen zie onze pagina [[Bureaublad-omgevingen_(Desktop_Environments)-nl|{{format text|your text=Desktop-omgevingen|kleur=#2397D4FF}}]].
<br> ''Dit artikel is momenteel een eerste korte tekst, die door geïnteresseerde auteurs kan worden uitgebreid.}}''
<!-- Het zou mooi zijn als deze pagina zou worden uitgebreid met de vorm https://wiki.mageia.org/en/Desktop_environments#Introduction_pages -->
== Introductie ==
Enlightenment (ook wel afgekort als E) is een van de vele desktop-omgevingen die beschikbaar zijn in Mageia.
Voor meer informatie hierover kunt u de [https://www.enlightenment.org/ Enlightenment homepage] raadplegen.
== Installeren ==
Om Enlightenment te installeren, installeert u {{prog|task-enlightenment}}. Enlightenment is dan beschikbaar in het inlogmenu op uw desktop-pc.
== In Mageia 9 ==
Het Enlightenment-takenpakket in Mageia 9 bevat E25.4 en Enlightenment Foundation Libraries (EFL) 1.26.3. De belangrijkste release 0.25 bevat een volledig nieuw, plat thema, met zowel vooraf geconfigureerde alternatieve kleurenpaletten (waaronder een licht thema), als ook de mogelijkheid om de kleuren te bewerken. Daarnaast is er nog een Mageia-thema, m-Dimensions, gebaseerd op het oudere desktopthema, bijgewerkt met alle nieuwe functies behalve het kleurenpalet. Andere belangrijke wijzigingen zijn de toevoeging van touchpad configuratie-opties, verbeteringen aan de geluidsmixer en een belangrijke wijziging in de standaardinstellingen: edge binding is nu standaard uitgeschakeld. Voor meer informatie over deze versie, zie https://www.enlightenment.org/news/2021-12-26-enlightenment-0.25.0.
Mageia bevat uiteraard E's Econnman-gebruikersinterface voor de connman-verbindingsbeheerder (indien ingeschakeld - standaard is dit systemd-networkd.service met de Netapplet), samen met vier EFL-gebaseerde toepassingen: de Terminology-terminalemulator, de Ephoto-afbeeldingsviewer, de lichtgewicht Rage-videospeler en de Evisum-systeemmonitor. Ecrire, een eenvoudige EFL-gebaseerde teksteditor, is ook beschikbaar als aanbevolen. Let op: de gebruikersinterface en lettertype-instellingen van Ecrire werken niet goed met het m-Dimensions-thema.
Voor degenen die nieuw zijn met E: opstarttoepassingen en -processen (zoals de Mageia Online-applet voor updatemeldingen) worden niet automatisch opgehaald uit {{folder|/etc/xdg/autostart}}, maar kunnen bij het opstarten worden ingeschakeld door naar {{menu|Hoofdmenu > Instellingen > Apps > Opstarttoepassingen}} te gaan en de gewenste toepassingen en systeemprocessen toe te voegen. Toepassingen die (alleen) worden geladen bij het herstarten van de Desktop-omgeving worden apart verwerkt via een lijst die beschikbaar is via {{menu|Hoofdmenu > Instellingen > Apps > Toepassingen opnieuw opstarten}}.
Het systeemvak van Enlightenment, dat SNI-app indicatormeldingen gebruikt, is een aparte module die moet worden geladen ({{menu|Hoofdmenu > Instellingen > Modules}}) en moet worden toegevoegd aan een paneel, waar het Mageia Online-applet en Netapplet (indien ingeschakeld) samen met andere worden weergegeven.
Er is momenteel één probleem bekend: het herstarten van E resulteert soms in een waarschuwing dat de Efreet-cache niet is bijgewerkt. Over het algemeen kan dit worden genegeerd, omdat het een gevolg is van een time-out die voor sommige systemen nog steeds te kort lijkt. Marchugo
Categorías: Wiki de Mageia
MGASA-2025-0245 - Updated nginx package fixes security vulnerability
Publication date: 22 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-53859 Description It was discovered that nginx contains a security issue in the ngx_mail_smtp_module which might allow an attacker to cause buffer over-read potentially resulting in sensitive information leak in a HTTP request to the authentication server (CVE-2025-53859). References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-53859 Description It was discovered that nginx contains a security issue in the ngx_mail_smtp_module which might allow an attacker to cause buffer over-read potentially resulting in sensitive information leak in a HTTP request to the authentication server (CVE-2025-53859). References
- https://bugs.mageia.org/show_bug.cgi?id=34585
- https://www.openwall.com/lists/oss-security/2025/08/13/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
- nginx-1.26.3-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0244 - Updated openssl packages fix a security vulnerability
Publication date: 22 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9230 Description Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-9230 Description Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230) References
- https://bugs.mageia.org/show_bug.cgi?id=34643
- https://www.openwall.com/lists/oss-security/2025/09/30/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230
- openssl-3.0.18-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0243 - Updated python-django packages fix a security vulnerability
Publication date: 22 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59681 , CVE-2025-59682 Description An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB). (CVE-2025-59681) An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory. (CVE-2025-59682) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-59681 , CVE-2025-59682 Description An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB). (CVE-2025-59681) An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory. (CVE-2025-59682) References
- https://bugs.mageia.org/show_bug.cgi?id=34645
- https://www.openwall.com/lists/oss-security/2025/10/01/3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59682
- python-django-4.1.13-1.7.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0242 - Updated haproxy packages fix security vulnerability & bugs
Publication date: 22 Oct 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11230 Description Haproxy has a critical, a major, few medium and few minor bugs fixed in the last upstream version 2.8.16 of branch 2.8. Fixed critical bug list: - mjson: fix possible DoS when parsing numbers Fixed major bug list: - listeners: transfer connection accounting when switching listeners Fixed medium bugs list: - check: Requeue healthchecks on I/O events to handle check timeout - check: Set SOCKERR by default when a connection error is reported - checks: fix ALPN inheritance from server - dns: Reset reconnect tempo when connection is finally established - fd: Use the provided tgid in fd_insert() to get tgroup_info - h1: Allow reception if we have early data - h1/h2/h3: reject forbidden chars in the Host header field - h2/h3: reject some forbidden chars in :authority before reassembly - hlua: Add function to change the body length of an HTTP Message - hlua: Forbid any L6/L7 sample fetche functions from lua services - hlua: Report to SC when data were consumed on a lua socket - hlua: Report to SC when output data are blocked on a lua socket - http-client: Ask for more room when request data cannot be xferred - http-client: Don't wake http-client applet if nothing was xferred - http-client: Drain the request if an early response is received - http-client: Notify applet has more data to deliver until the EOM - http-client: Properly inc input data when HTX blocks are xferred - http-client: Test HTX_FL_EOM flag before commiting the HTX buffer - httpclient: Throw an error if an lua httpclient instance is reused - mux-h2: Properly handle connection error during preface sending - server: Duplicate healthcheck's alpn inherited from default server - ssl: ca-file directory mode must read every certificates of a file - ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers - ssl: create the mux immediately on early data - ssl: Fix 0rtt to the server - ssl: fix build with AWS-LC - threads: Disable the workaround to load libgcc_s on macOS References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-11230 Description Haproxy has a critical, a major, few medium and few minor bugs fixed in the last upstream version 2.8.16 of branch 2.8. Fixed critical bug list: - mjson: fix possible DoS when parsing numbers Fixed major bug list: - listeners: transfer connection accounting when switching listeners Fixed medium bugs list: - check: Requeue healthchecks on I/O events to handle check timeout - check: Set SOCKERR by default when a connection error is reported - checks: fix ALPN inheritance from server - dns: Reset reconnect tempo when connection is finally established - fd: Use the provided tgid in fd_insert() to get tgroup_info - h1: Allow reception if we have early data - h1/h2/h3: reject forbidden chars in the Host header field - h2/h3: reject some forbidden chars in :authority before reassembly - hlua: Add function to change the body length of an HTTP Message - hlua: Forbid any L6/L7 sample fetche functions from lua services - hlua: Report to SC when data were consumed on a lua socket - hlua: Report to SC when output data are blocked on a lua socket - http-client: Ask for more room when request data cannot be xferred - http-client: Don't wake http-client applet if nothing was xferred - http-client: Drain the request if an early response is received - http-client: Notify applet has more data to deliver until the EOM - http-client: Properly inc input data when HTX blocks are xferred - http-client: Test HTX_FL_EOM flag before commiting the HTX buffer - httpclient: Throw an error if an lua httpclient instance is reused - mux-h2: Properly handle connection error during preface sending - server: Duplicate healthcheck's alpn inherited from default server - ssl: ca-file directory mode must read every certificates of a file - ssl/clienthello: ECDSA with ssl-max-ver TLSv1.2 and no ECDSA ciphers - ssl: create the mux immediately on early data - ssl: Fix 0rtt to the server - ssl: fix build with AWS-LC - threads: Disable the workaround to load libgcc_s on macOS References
- https://bugs.mageia.org/show_bug.cgi?id=34673
- https://www.haproxy.org/download/2.8/src/CHANGELOG
- https://www.haproxy.com/blog/october-2025-cve-2025-11230-haproxy-mjson-library-denial-of-service-vulnerability
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230
- haproxy-2.8.16-1.mga9
Categorías: Actualizaciones de Seguridad
Kernel-Arten-de
Zurückportierte Kernel (Backport)
← Older revision Revision as of 11:38, 22 October 2025 Line 83: Line 83: $ sudo rmmod kvm_intel ''(wenn Sie eine Intel CPU verwenden; Falls Sie eine AMD CPU verwenden, führen Sie rmmod kvm_amd aus.)''<br> $ sudo rmmod kvm_intel ''(wenn Sie eine Intel CPU verwenden; Falls Sie eine AMD CPU verwenden, führen Sie rmmod kvm_amd aus.)''<br> $ sudo rmmod kvm<br> $ sudo rmmod kvm<br> −- oder setzen Sie diese auf eine Blackliste, siehe {Bug|34408#c7}}.+- oder setzen Sie diese auf eine Blackliste, siehe {{Bug|34408#c7}}. == Kernelserien in Cauldron == == Kernelserien in Cauldron == Psyca
Categorías: Wiki de Mageia
User:Marja/Pushing updates
Assign a new advisory ID: put the note in a Note template
← Older revision Revision as of 16:19, 21 October 2025 (4 intermediate revisions by the same user not shown)Line 1: Line 1: {{Introduction|This is a short version of what currently is done when pushing updates using [[mgaadv]] to a stable release (''updates_testing'' to ''updates''). There is another page with more details on [[How to create an update advisory]] for use by the QA team.<br><br> {{Introduction|This is a short version of what currently is done when pushing updates using [[mgaadv]] to a stable release (''updates_testing'' to ''updates''). There is another page with more details on [[How to create an update advisory]] for use by the QA team.<br><br> −I here use two terminal windows, one as myself on my local machine and one as root @ duvel. If you haven't already initialized mgaadv on your local machine, do so first.}}+Tmb always used two terminal windows, one as himself on his local machine and one as root @ duvel. If you haven't already initialized mgaadv on your local machine, do so first.}} == Install mgaadv on your local machine == == Install mgaadv on your local machine == Line 28: Line 28: ===Check the advisories for potential problems=== ===Check the advisories for potential problems=== −Check whether there are potential problems for the perl advisory parser. This recreates ~/mageia-advisories/html/:+Check whether there are potential problems for the perl advisory parser. This is just a local dry-run to find YAML errors and other problems. It recreates ~/mageia-advisories/html/: <pre> <pre> [tmb@laptop advisories]$ mgaadv mksite [tmb@laptop advisories]$ mgaadv mksite Line 50: Line 50: Check at end of https://madb.mageia.org/tools/updates for advisories ready to be pushed. Check at end of https://madb.mageia.org/tools/updates for advisories ready to be pushed. −Pushing updates (using samba update (bug 12999) as an example)+Assigning an advisory ID, using a samba update (bug 12999) as an example: −Assign advisory id (note: sometimes there can be split advisories in which case you would use '''mgaadv publish 12999.mga3''' and '''mgaadv publish 12999.mga4'''). This performs some checks then updates the advisory file in svn (that the QA team created) with the next available MGASA- or MGAA- number:+{{Note| Sometimes there can be split advisories in which case you would use '''mgaadv publish 12999.mga3''' and '''mgaadv publish 12999.mga4'''}}. + +This performs some checks then updates the advisory file in svn (that the QA team created) with the next available MGASA- or MGAA- number: <pre> <pre> [tmb@laptop advisories]$ mgaadv publish 12999 [tmb@laptop advisories]$ mgaadv publish 12999 Marja
Categorías: Wiki de Mageia




