Lector de Feeds

Use Mageia to play Windows Games

Wiki Mageia - 1 Diciembre, 2024 - 10:51

← Older revision Revision as of 09:51, 1 December 2024 Line 190: Line 190:  | works very well with steam and Proton 8.0-4. | works very well with steam and Proton 8.0-4.  Launch option : DXVK_FRAME_RATE=60 PROTON_USE_WINED3D=1 %command% Launch option : DXVK_FRAME_RATE=60 PROTON_USE_WINED3D=1 %command%  +  +|-  +| style="width: 5%"| [[File:App-accessories.png|25px|center]]  +| The Witcher 2 - Assassins of kings  +| works very well with steam avec proton 9.0-3  +Launch option : PROTON_USE_WINED3D11=1 %command%     |- |- Scroll44
Categorías: Wiki de Mageia

Utiliser Mageia pour jouer à des jeux windows-fr

Wiki Mageia - 1 Diciembre, 2024 - 09:49

← Older revision Revision as of 08:49, 1 December 2024 Line 188: Line 188:  | marchent très bien avec steam and Proton 8.0-4. | marchent très bien avec steam and Proton 8.0-4.  Option de lancement : DXVK_FRAME_RATE=60 PROTON_USE_WINED3D=1 %command% Option de lancement : DXVK_FRAME_RATE=60 PROTON_USE_WINED3D=1 %command%  +  +|-  +| style="width: 5%"| [[File:App-accessories.png|25px|center]]  +| The Witcher 2 - Assassins of kings  +| marche très bien sur steam avec proton 9.0-3  +Option de lancement : PROTON_USE_WINED3D11=1 %command%     |- |- Scroll44
Categorías: Wiki de Mageia

MGASA-2024-0382 - Updated libsoup3 & libsoup packages fix security vulnerabilities

Mageia Security - 30 Noviembre, 2024 - 00:36
Publication date: 29 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52530 , CVE-2024-52531 , CVE-2024-52532 Description GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header. (CVE-2024-52530) GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this. (CVE-2024-52531) GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients. (CVE-2024-52532) References SRPMS 9/core
  • libsoup3-3.4.2-1.1.mga9
  • libsoup-2.74.3-1.1.mga9

MGAA-2024-0233 - Updated lxqt-menu-data packages fix bug

Mageia Security - 30 Noviembre, 2024 - 00:36
Publication date: 29 Nov 2024
Type: bugfix
Affected Mageia releases : 9
Description This update fixes a file conflict on installation between lxqt-menu-data and lxqt-panel. References SRPMS 9/core
  • lxqt-menu-data-1.4.1-1.1.mga9

MGASA-2024-0381 - Updated iptraf-ng packages fix security vulnerability

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52949 Description The updated package fixes a security vulnerability: CVE-2024-52949. References SRPMS 9/core
  • iptraf-ng-1.2.2-1.mga9

MGASA-2024-0380 - Updated dcmtk packages fix security vulnerability

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-27628 Description A buffer overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component. (CVE-2024-27628) References SRPMS 9/core
  • dcmtk-3.6.7-4.2.mga9

MGASA-2024-0379 - Updated tomcat packages fix security vulnerabilities

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-52316 , CVE-2024-52318 Description Authentication bypass when using Jakarta Authentication API. (CVE-2024-52316) Incorrect JSP tag recycling leads to XSS. (CVE-2024-52318) References SRPMS 9/core
  • tomcat-9.0.97-1.mga9

MGASA-2024-0378 - Updated wget packages fix security vulnerability

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-10524 Description Applications that use Wget to access a remote resource using shorthand URLs and pass arbitrary user credentials in the URL are vulnerable. In these cases attackers can enter crafted credentials which will cause Wget to access an arbitrary host. (CVE-2024-10524) References SRPMS 9/core
  • wget-1.21.4-1.2.mga9

MGASA-2024-0377 - Updated microcode packages fix security vulnerabilities

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-21853 , CVE-2024-23918 , CVE-2024-21820 Description Improper Finite State Machines (FSMs) in the Hardware logic in some 4th and 5th Generation Intel® Xeon® Processors may allow an authorized user to potentially enable denial of service via local access. (CVE-2024-21853) Improper conditions check in some Intel® Xeon® processor memory controller configurations when using Intel® SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-23918) Incorrect default permissions in some Intel® Xeon® processor memory controller configurations when using Intel® SGX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-21820) References SRPMS 9/nonfree
  • microcode-0.20241112-1.mga9.nonfree

MGASA-2024-0376 - Updated golang packages fix security vulnerabilities

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-34155 , CVE-2024-34156 , CVE-2024-34158 Description Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. CVE-2024-34155 Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion CVE-2024-34156 Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.CVE-2024-34158 References SRPMS 9/core
  • golang-1.22.9-1.mga9

MGASA-2024-0374 - Updated zbar packages fix security vulnerabilities

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-40889 , CVE-2023-40890 Description A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. CVE-2023-40889 A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. CVE-2023-40890 References SRPMS 9/core
  • zbar-0.23.93-1.mga9

MGASA-2024-0373 - Updated libsndfile packages fix security vulnerability

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-50612 Description libsndfile suffers from an out-of-bounds read in ogg_vorbis.c vorbis_analysis_wrote. References SRPMS 9/core
  • libsndfile-1.2.0-3.2.mga9

MGASA-2024-0372 - Updated postgresql15 & postgresql13 packages fix security vulnerabilities

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-10976 , CVE-2024-10977 , CVE-2024-10978 , CVE-2024-10979 Description PostgreSQL row security below e.g. subqueries disregards user ID changes. (CVE-2024-10976) PostgreSQL libpq retains an error message from man-in-the-middle. (CVE-2024-10977) PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID. (CVE-2024-10978) PostgreSQL PL/Perl environment variable changes execute arbitrary code. (CVE-2024-10979) References SRPMS 9/core
  • postgresql15-15.10-1.mga9
  • postgresql13-13.18-1.mga9

MGASA-2024-0371 - Updated rapidjson packages fix security vulnerability

Mageia Security - 27 Noviembre, 2024 - 20:59
Publication date: 27 Nov 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-38517 Description Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. (CVE-2024-38517) References SRPMS 9/core
  • rapidjson-1.1.0-6.1.mga9

Flatpak

Wiki Mageia - 27 Noviembre, 2024 - 18:39

Add pt-BR

← Older revision Revision as of 17:39, 27 November 2024 Line 2: Line 2:  [[Category:Howtos]] [[Category:Howtos]]    −{{multi_language_banner|[[Flatpak-de|Deutsch]] ; [[Flatpak|English]] ; [[Flatpak-es|Español]]; [[Flatpak-fr|Français]] ; [[Flatpak-nl|Nederlands]] ;}}+{{multi_language_banner|[[Flatpak-de|Deutsch]] ; [[Flatpak|English]] ; [[Flatpak-es|Español]]; [[Flatpak-fr|Français]] ; [[Flatpak-nl|Nederlands]] ; [[Flatpak_pt-BR|Português (Brasil)]] ;}}     {{introduction|{{prog|Flatpak}} is one way to get access to many more applications than are packaged by Mageia - even though we have quite a few already.  For even more ways, see [[Ways to install programs]].}} {{introduction|{{prog|Flatpak}} is one way to get access to many more applications than are packaged by Mageia - even though we have quite a few already.  For even more ways, see [[Ways to install programs]].}} Xgrind
Categorías: Wiki de Mageia
Feed