Lector de Feeds

Desktop environments

Wiki Mageia - 27 Enero, 2026 - 16:16

‎TDE Trinity Desktop Environment

← Older revision Revision as of 15:16, 27 January 2026 Line 119: Line 119:     [https://wiki.trinitydesktop.org/Mageia_Trinity_Repository_Installation_Instructions Mageia Trinity Repository Installation Instructions] [https://wiki.trinitydesktop.org/Mageia_Trinity_Repository_Installation_Instructions Mageia Trinity Repository Installation Instructions]  +  +In addition the the instructions there, you may want to tell our tools to look for '''updates''' in case they are released there. To do so, execute {{cmd|drakrpm-editmedia --expert}} and put check marks in the "Updates" column before the Trinity repositories.     == Logging in to other desktop environments == == Logging in to other desktop environments == Morgano
Categorías: Wiki de Mageia

Official pre-release testing

Wiki Mageia - 27 Enero, 2026 - 16:06

‎Testing: Updating

← Older revision Revision as of 15:06, 27 January 2026 (2 intermediate revisions by the same user not shown)Line 67: Line 67:  * Your favourite software we have in our repositories. * Your favourite software we have in our repositories.  * [[Ways_to_install_programs|Other software of interest]] - But do not "bug" us of issues not related to Mageia. * [[Ways_to_install_programs|Other software of interest]] - But do not "bug" us of issues not related to Mageia.  +  +==== Updating ===  +  +Now during development, packages are updated directly over elder packages in release repositories, and our updater tools look for updates there.     ==== Upgrading from Mageia 9 ==== ==== Upgrading from Mageia 9 ==== Line 75: Line 79:  * Follow normal [[Mageia_10_Release_Notes#Upgrading_from_Mageia_9|upgrade procedures]]. * Follow normal [[Mageia_10_Release_Notes#Upgrading_from_Mageia_9|upgrade procedures]].  * And account for: [[#Release_repositories_do_change|Release repositories do change]]. * And account for: [[#Release_repositories_do_change|Release repositories do change]].  +* Notable problems (read for workaround) at time of writing this:  +** {{Bug|34966}} - kwin_x11 not installed anymore after an upgrade  +** {{Bug|35063}} - Unable to upgrade Mageia10-alpha1 due to certificate error     ''Alternatively you may like to upgrade to [[Cauldron|Cauldron]]. Note that you would shortly after Mageia 10 release probably want to switch repositories from Cauldron to Mageia 10.'' ''Alternatively you may like to upgrade to [[Cauldron|Cauldron]]. Note that you would shortly after Mageia 10 release probably want to switch repositories from Cauldron to Mageia 10.'' −<!--  −==== Updating an installed system ====     −To get updates, you must set your system to get updates from the release repository. -[[Release_repositories_do_change|Release repositories do change]] during this development phase!  −  −# Like normal, you need to have set up repositories.  −# Then one way is to add a checkmark in updates column for release repositories using our tool {{prog|drakrpm-editmedia}}. -But to be able to change updates repository, you need to launch it in expert mode like so:  {{cmd|drakrpm-editmedia --expert}}.  −  −Then after Mageia is finally released, unset release repositories from being update repositories.   −-->   ==== Found a problem? ==== ==== Found a problem? ==== − +* Do the problem go away after updating the system?  * See [[#Current_status|Current status]], [[#Current_notes|Current notes]], and [[#Expected_problems|Expected problems]] below. * See [[#Current_status|Current status]], [[#Current_notes|Current notes]], and [[#Expected_problems|Expected problems]] below.  * Search for if it is already described in [[Mageia_10_Errata|the Errata]] or if it is told in [[Mageia_10_Release_Notes|Release Notes]]. * Search for if it is already described in [[Mageia_10_Errata|the Errata]] or if it is told in [[Mageia_10_Release_Notes|Release Notes]]. Line 103: Line 101:  == Current notes == == Current notes ==  '' To be revised at each pre-release release (remove old stuff), and updated any time needed.''<br> '' To be revised at each pre-release release (remove old stuff), and updated any time needed.''<br> −''' ''Revised 2026-01-11'' '''<br>+''' ''Revised 2026-01-27'' '''<br>  Current version of ISOs: '''10alpha1''' ''(from internal round 2)''<br> Current version of ISOs: '''10alpha1''' ''(from internal round 2)''<br>  === Prominent enhancements comparing to Mageia 9 === === Prominent enhancements comparing to Mageia 9 ===  +* Updated applications, desktops, basesystems, drivers, kernel...<br>  ''For more complete list see Release Notes.'' ''For more complete list see Release Notes.'' −* Kernel series: default is 6.12.63 LTS (so used in Live ISOs). Available in repos: 6.18.4 LTS+==== 10alpha1 ==== −* Updated desktops and other software of course.+* Kernel series: default is 6.12.63 LTS (so used in Live ISOs). ''Available in repos: '''6.18.7+''' LTS'' −==== Upcoming next pre-release ====+==== Upcoming next pre-release - 10beta1 ====  * Classic installer wifi support {{Bug|32125}} * Classic installer wifi support {{Bug|32125}}  * Updated hardware detection * Updated hardware detection Morgano
Categorías: Wiki de Mageia

Persistent live systems

Wiki Mageia - 27 Enero, 2026 - 09:48

‎Running Live on weak computers: Trinity (KDE3)

← Older revision Revision as of 08:48, 27 January 2026 Line 508: Line 508:    Mozilla/5.0 (Android 15; Mobile; rv:145.0) Gecko/145.0 Firefox/145.0   Mozilla/5.0 (Android 15; Mobile; rv:145.0) Gecko/145.0 Firefox/145.0  Unfortunately some browsers currently do not have such working extensions (e.g. Falkon, SeaMonkey). Unfortunately some browsers currently do not have such working extensions (e.g. Falkon, SeaMonkey).  +* [[Desktop_environments#TDE_Trinity_Desktop_Environment | Trinity (KDE3)]] has a plethora of relatively lightweight programs. You will need to enable Trinity's rpm repositories, in order to access their applications. Tip in a tip: Using Mageia's tools (<code>drakrpm-edit-media</code>) will help you mark Trinity's software media as update media.     == Caution == == Caution == Nikos5446
Categorías: Wiki de Mageia

MGASA-2026-0018 - Updated kernel-linus packages fix security vulnerabilities

Mageia Security - 26 Enero, 2026 - 21:03
Publication date: 26 Jan 2026
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-40214 , CVE-2025-40248 , CVE-2025-40250 , CVE-2025-40251 , CVE-2025-40252 , CVE-2025-40253 , CVE-2025-40254 , CVE-2025-40257 , CVE-2025-40258 , CVE-2025-40259 , CVE-2025-40261 , CVE-2025-40262 , CVE-2025-40263 , CVE-2025-40264 , CVE-2025-40266 , CVE-2025-40268 , CVE-2025-40269 , CVE-2025-40271 , CVE-2025-40272 , CVE-2025-40273 , CVE-2025-40275 , CVE-2025-40277 , CVE-2025-40278 , CVE-2025-40279 , CVE-2025-40280 , CVE-2025-40281 , CVE-2025-40282 , CVE-2025-40283 , CVE-2025-40284 , CVE-2025-40285 , CVE-2025-40286 , CVE-2025-40288 , CVE-2025-40292 , CVE-2025-40293 , CVE-2025-40294 , CVE-2025-40297 , CVE-2025-40301 , CVE-2025-40303 , CVE-2025-40304 , CVE-2025-40306 , CVE-2025-40308 , CVE-2025-40309 , CVE-2025-40310 , CVE-2025-40311 , CVE-2025-40312 , CVE-2025-40313 , CVE-2025-40314 , CVE-2025-40315 , CVE-2025-40316 , CVE-2025-40317 , CVE-2025-40318 , CVE-2025-40319 , CVE-2025-40320 , CVE-2025-40321 , CVE-2025-40322 , CVE-2025-40323 , CVE-2025-40324 , CVE-2025-40328 , CVE-2025-40329 , CVE-2025-40331 , CVE-2025-40333 , CVE-2025-40337 , CVE-2025-40341 , CVE-2025-40342 , CVE-2025-40343 , CVE-2025-40345 , CVE-2025-40358 , CVE-2025-40360 , CVE-2025-40361 , CVE-2025-40363 , CVE-2025-68168 , CVE-2025-68171 , CVE-2025-68172 , CVE-2025-68173 , CVE-2025-68176 , CVE-2025-68177 , CVE-2025-68178 , CVE-2025-68179 , CVE-2025-68183 , CVE-2025-68184 , CVE-2025-68185 , CVE-2025-68191 , CVE-2025-68192 , CVE-2025-68194 , CVE-2025-68198 , CVE-2025-68200 , CVE-2025-68204 , CVE-2025-68208 , CVE-2025-68214 , CVE-2025-68217 , CVE-2025-68218 , CVE-2025-68219 , CVE-2025-68220 , CVE-2025-68222 , CVE-2025-68224 , CVE-2025-68227 , CVE-2025-68229 , CVE-2025-68231 , CVE-2025-68233 , CVE-2025-68235 , CVE-2025-68237 , CVE-2025-68238 , CVE-2025-68241 , CVE-2025-68244 , CVE-2025-68245 , CVE-2025-68246 , CVE-2025-68282 , CVE-2025-68283 , CVE-2025-68284 , CVE-2025-68285 , CVE-2025-68286 , CVE-2025-68287 , CVE-2025-68288 , CVE-2025-68289 , CVE-2025-68290 , CVE-2025-68291 , CVE-2025-68295 , CVE-2025-68297 , CVE-2025-68301 , CVE-2025-68302 , CVE-2025-68303 , CVE-2025-68305 , CVE-2025-68307 , CVE-2025-68308 , CVE-2025-68310 , CVE-2025-68312 , CVE-2025-68320 , CVE-2025-68321 , CVE-2025-68327 , CVE-2025-68328 , CVE-2025-68330 , CVE-2025-68331 , CVE-2025-68339 , CVE-2025-68342 , CVE-2025-68343 , CVE-2025-68369 , CVE-2025-68734 , CVE-2025-68767 , CVE-2025-68769 , CVE-2025-68771 , CVE-2025-68772 , CVE-2025-68773 , CVE-2025-68774 , CVE-2025-68775 , CVE-2025-68776 , CVE-2025-68777 , CVE-2025-68778 , CVE-2025-68780 , CVE-2025-68781 , CVE-2025-68782 , CVE-2025-68783 , CVE-2025-68785 , CVE-2025-68786 , CVE-2025-68787 , CVE-2025-68788 , CVE-2025-68789 , CVE-2025-68794 , CVE-2025-68795 , CVE-2025-68796 , CVE-2025-68797 , CVE-2025-68798 , CVE-2025-68799 , CVE-2025-68800 , CVE-2025-68801 , CVE-2025-68804 , CVE-2025-68806 , CVE-2025-68808 , CVE-2025-68809 , CVE-2025-68813 , CVE-2025-68814 , CVE-2025-68815 , CVE-2025-68816 , CVE-2025-68817 , CVE-2025-68818 , CVE-2025-68819 , CVE-2025-68820 , CVE-2025-68821 , CVE-2025-71064 , CVE-2025-71065 , CVE-2025-71066 , CVE-2025-71067 , CVE-2025-71068 , CVE-2025-71069 , CVE-2025-71071 , CVE-2025-71075 , CVE-2025-71077 , CVE-2025-71078 , CVE-2025-71079 , CVE-2025-71081 , CVE-2025-71082 , CVE-2025-71083 , CVE-2025-71084 , CVE-2025-71085 , CVE-2025-71086 , CVE-2025-71087 , CVE-2025-71088 , CVE-2025-71089 , CVE-2025-71091 , CVE-2025-71093 , CVE-2025-71094 , CVE-2025-71095 , CVE-2025-71096 , CVE-2025-71097 , CVE-2025-71098 , CVE-2025-71101 , CVE-2025-71102 , CVE-2025-71104 , CVE-2025-71105 , CVE-2025-71107 , CVE-2025-71108 , CVE-2025-71111 , CVE-2025-71112 , CVE-2025-71113 , CVE-2025-71114 , CVE-2025-71116 , CVE-2025-71118 , CVE-2025-71119 , CVE-2025-71120 , CVE-2025-71121 , CVE-2025-71122 , CVE-2025-71123 , CVE-2025-71125 , CVE-2025-71126 , CVE-2025-71127 , CVE-2025-71129 , CVE-2025-71130 , CVE-2025-71131 , CVE-2025-71132 , CVE-2025-71133 , CVE-2025-71136 , CVE-2025-71137 , CVE-2025-71138 , CVE-2025-71140 , CVE-2025-71141 , CVE-2025-71143 , CVE-2025-71144 Description Vanilla upstream kernel version 6.6.120 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References SRPMS 9/core
  • kernel-linus-6.6.120-1.mga9
Feed