Lector de Feeds

Speel Windows spellen met Mageia-nl

Wiki Mageia - 30 Enero, 2026 - 15:41

← Older revision Revision as of 14:41, 30 January 2026 Line 195: Line 195:  | Monument Valley 1 | Monument Valley 1  | werkt erg goed met Heroic Game Launcher en Proton-GE-proton10-17 | werkt erg goed met Heroic Game Launcher en Proton-GE-proton10-17  +  +|-  +| style="width: 5%"| [[File:App-accessories.png|25px|center]]  +| Monument Valley 2  +| werkt heel goed met Heroic Game Launcher en Proton-GE-Proton 10-17     |- |- Scroll44
Categorías: Wiki de Mageia

Utiliser Mageia pour jouer à des jeux windows-fr

Wiki Mageia - 30 Enero, 2026 - 15:39

← Older revision Revision as of 14:39, 30 January 2026 Line 189: Line 189:  | Monument Valley 1 | Monument Valley 1  | marche très bien avec Heroic Game Launcher et Proton-GE-proton10-17 | marche très bien avec Heroic Game Launcher et Proton-GE-proton10-17  +  +  +|-  +| style="width: 5%"| [[File:App-accessories.png|25px|center]]  +| Monument Valley 2  +| marche très bien avec Heroic Game Launcher and Proton-GE-Proton 10.17     |- |- Scroll44
Categorías: Wiki de Mageia

Use Mageia to play Windows Games

Wiki Mageia - 30 Enero, 2026 - 15:38

← Older revision Revision as of 14:38, 30 January 2026 Line 191: Line 191:  | Monument Valley 1 | Monument Valley 1  | works very well with Heroic Game Launcher and Proton-GE-proton10-17. | works very well with Heroic Game Launcher and Proton-GE-proton10-17.  +  +|-  +| style="width: 5%"| [[File:App-accessories.png|25px|center]]  +| Monument Valley 2  +| works very well with Heroic Game Launcher and Proton-GE-Proton 10-17     |- |- Scroll44
Categorías: Wiki de Mageia

MGASA-2026-0029 - Updated openssl packages fix security vulnerabilities

Mageia Security - 30 Enero, 2026 - 01:39
Publication date: 30 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-15467 , CVE-2025-68160 , CVE-2025-69418 , CVE-2025-69419 , CVE-2025-69420 , CVE-2025-69421 , CVE-2026-22795 , CVE-2026-22796 Description Stack buffer overflow in CMS AuthEnvelopedData parsing. (CVE-2025-15467) Heap out-of-bounds write in BIO_f_linebuffer on short writes. (CVE-2025-68160) Unauthenticated/unencrypted trailing bytes with low-level OCB function calls. (CVE-2025-69418) Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion. (CVE-2025-69419) Missing ASN1_TYPE validation in TS_RESP_verify_response() function. (CVE-2025-69420) NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function. (CVE-2025-69421) Missing ASN1_TYPE validation in PKCS#12 parsing. (CVE-2026-22795) ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function. (CVE-2026-22796) References SRPMS 9/core
  • openssl-3.0.19-1.mga9

MGASA-2026-0028 - Updated gpsd packages fix security vulnerabilities

Mageia Security - 30 Enero, 2026 - 01:39
Publication date: 30 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-67268 , CVE-2025-67269 Description gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution. (CVE-2025-67268) An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition. (CVE-2025-67269) References SRPMS 9/core
  • gpsd-3.25-1.1.mga9

MGASA-2026-0027 - Updated libxml2 packages fix security vulnerabilities

Mageia Security - 30 Enero, 2026 - 01:39
Publication date: 30 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-8732 , CVE-2026-0989 , CVE-2026-0990 , CVE-2026-0992 Description xmlcatalog xmlParseSGMLCatalog recursion. (CVE-2025-8732) Unbounded relaxng include recursion leading to stack overflow. (CVE-2026-0989) Denial of service via uncontrolled recursion in xml catalog processing. (CVE-2026-0990) Denial of service via crafted xml catalogs. (CVE-2026-0992) References SRPMS 9/core
  • libxml2-2.10.4-1.9.mga9

MGASA-2026-0026 - Updated xen packages fix security vulnerabilities

Mageia Security - 30 Enero, 2026 - 01:39
Publication date: 30 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-58150 , CVE-2026-23553 Description x86: buffer overrun with shadow paging + tracing. (CVE-2025-58150) x86: incomplete IBPB for vCPU isolation. (CVE-2026-23553) References SRPMS 9/core
  • xen-4.17.5-1.git20251028.2.mga9

User:Geiadrivalinux30

Wiki Mageia - 30 Enero, 2026 - 01:01

Created page with "Mageia Linux: My friends. I'm from Brazil, and a former Mandriva Linux user. I have about 20 years of experience with Linux. And I will contribute as much as possible."

New page

Mageia Linux: My friends. I'm from Brazil, and a former Mandriva Linux user. I have about 20 years of experience with Linux. And I will contribute as much as possible. Geiadrivalinux30
Categorías: Wiki de Mageia

QA ISO testers

Wiki Mageia - 30 Enero, 2026 - 00:37

← Older revision Revision as of 23:37, 29 January 2026 Line 123: Line 123:     * LpSolit - Frédéric Buclin - lpsolit at gmail dot com * LpSolit - Frédéric Buclin - lpsolit at gmail dot com  +  +* geiadrivalinux30 - geiadrivalinux30 - geiadrivalinux30 at gmail dot com Geiadrivalinux30
Categorías: Wiki de Mageia
Feed