Lector de Feeds
DaVinci Resolve
How to install and use DaVinci Resolve 18.6.6 on Mageia Linux 9: Update DaVinci version
← Older revision Revision as of 03:30, 27 September 2024 (One intermediate revision by the same user not shown)Line 1: Line 1: −= How to install and use DaVinci Resolve 18.6.6 on Mageia Linux 9 =+= How to install and use DaVinci Resolve 19.0.1 on Mageia Linux 9 = −I've spent the last 3 years using kdenlive to edit my videos and decided it was time to up my game. In comes [https://www.blackmagicdesign.com/products/davinciresolve/ DaVinci Resolve].+I've spent the past few years using kdenlive to edit my videos and decided it was time to up my game. In comes [https://www.blackmagicdesign.com/products/davinciresolve/ DaVinci Resolve]. It wasn't easy to get it to work and that's why I'm writing this guide. It wasn't easy to get it to work and that's why I'm writing this guide. Line 11: Line 11: # [https://www.blackmagicdesign.com/products/davinciresolve/ Download DaVinci Resolve] # [https://www.blackmagicdesign.com/products/davinciresolve/ Download DaVinci Resolve] # Unzip the file # Unzip the file −## <code>unzip DaVinci_Resolve_18.6.6_Linux.zip</code>+## <code>unzip DaVinci_Resolve_19.0.1_Linux.zip</code> −# This gives us the binary installation file - '''DaVinci_Resolve_18.6.6_Linux.run'''+# This gives us the binary installation file - '''DaVinci_Resolve_19.0.1_Linux.run''' ## Make it executable ## Make it executable −## <code>chmod 755 DaVinci_Resolve_18.6.5_Linux.run</code><br />+## <code>chmod 755 DaVinci_Resolve_19.0.1_Linux.run</code><br /> # To install this file, we have to skip some checks. # To install this file, we have to skip some checks. −## <code>sudo SKIP_PACKAGE_CHECK=1 ./DaVinci_Resolve_18.6.6_Linux.run</code>+## <code>sudo SKIP_PACKAGE_CHECK=1 ./DaVinci_Resolve_19.0.1_Linux.run</code> # Follow the installation guide and click '''Finish''' when it appears. # Follow the installation guide and click '''Finish''' when it appears. −# Before launching DaVinci Resolve, you can delete a few libraries. This way, Resolve uses the system libraries instead.<br />+# Before launching DaVinci Resolve, do the following. This way, Resolve uses the system libraries instead.<br /> −## <code>sudo rm -f /opt/resolve/libs/libglib-2.0.so*</code><br />+## Taken from this [https://github.com/H3rz3n/Davinci-Resolve-Fedora-38-39-40-Fix guide for Fedora]: +### cd /opt/resolve/libs +### sudo mkdir disabled-libraries +### sudo mv libglib* disabled-libraries +### sudo mv libgio* disabled-libraries +### sudo mv libgmodule* disabled-libraries # The next step is to move an internal library from the '''libs''' folder to the '''bin''' folder. # The next step is to move an internal library from the '''libs''' folder to the '''bin''' folder. ## <code>sudo mv /opt/resolve/libs/libBlackmagicRawAPI.so /opt/resolve/bin/</code> ## <code>sudo mv /opt/resolve/libs/libBlackmagicRawAPI.so /opt/resolve/bin/</code> −I've experienced that DaVinci Resolve doesn't start right after installation and that a reboot was necessary. Do not know why, but it does work if everything else fails.+I've experienced that DaVinci Resolve doesn't always start right after installation and that a reboot was necessary. Do not know why, but it does work if everything else fails. − −You can also try this [https://github.com/H3rz3n/Davinci-Resolve-Fedora-38-39-40-Fix guide for Fedora] that I can confirm also works. == Converting mp4 to ProRes format == == Converting mp4 to ProRes format == Kekepower
Categorías: Wiki de Mageia
MGASA-2024-0318 - Updated kernel-linus packages fixes security vulnerabilities
Publication date: 27 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46713 , CVE-2024-46734 , CVE-2024-46735 , CVE-2024-46736 , CVE-2024-46737 , CVE-2024-46738 , CVE-2024-46739 , CVE-2024-46740 , CVE-2024-46741 , CVE-2024-46742 , CVE-2024-46743 , CVE-2024-46744 , CVE-2024-46745 , CVE-2024-46746 , CVE-2024-46747 , CVE-2024-46749 , CVE-2024-46750 , CVE-2024-46752 , CVE-2024-46755 , CVE-2024-46756 , CVE-2024-46757 , CVE-2024-46758 , CVE-2024-46759 , CVE-2024-46760 , CVE-2024-46761 , CVE-2024-46762 , CVE-2024-46763 , CVE-2024-46765 , CVE-2024-46767 , CVE-2024-46768 , CVE-2024-46770 , CVE-2024-46771 , CVE-2024-46773 , CVE-2024-46776 , CVE-2024-46777 , CVE-2024-46780 , CVE-2024-46781 , CVE-2024-46782 , CVE-2024-46783 , CVE-2024-46784 , CVE-2024-46785 , CVE-2024-46786 , CVE-2024-46787 , CVE-2024-46788 , CVE-2024-46791 , CVE-2024-46794 , CVE-2024-46795 , CVE-2024-46796 , CVE-2024-46797 , CVE-2024-46798 , CVE-2024-46800 Description Vanilla upstream kernel version 6.6.52 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46713 , CVE-2024-46734 , CVE-2024-46735 , CVE-2024-46736 , CVE-2024-46737 , CVE-2024-46738 , CVE-2024-46739 , CVE-2024-46740 , CVE-2024-46741 , CVE-2024-46742 , CVE-2024-46743 , CVE-2024-46744 , CVE-2024-46745 , CVE-2024-46746 , CVE-2024-46747 , CVE-2024-46749 , CVE-2024-46750 , CVE-2024-46752 , CVE-2024-46755 , CVE-2024-46756 , CVE-2024-46757 , CVE-2024-46758 , CVE-2024-46759 , CVE-2024-46760 , CVE-2024-46761 , CVE-2024-46762 , CVE-2024-46763 , CVE-2024-46765 , CVE-2024-46767 , CVE-2024-46768 , CVE-2024-46770 , CVE-2024-46771 , CVE-2024-46773 , CVE-2024-46776 , CVE-2024-46777 , CVE-2024-46780 , CVE-2024-46781 , CVE-2024-46782 , CVE-2024-46783 , CVE-2024-46784 , CVE-2024-46785 , CVE-2024-46786 , CVE-2024-46787 , CVE-2024-46788 , CVE-2024-46791 , CVE-2024-46794 , CVE-2024-46795 , CVE-2024-46796 , CVE-2024-46797 , CVE-2024-46798 , CVE-2024-46800 Description Vanilla upstream kernel version 6.6.52 fixes bugs and vulnerabilities. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33579
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.52
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
- kernel-linus-6.6.52-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0317 - Updated python3 packages fix security vulnerabilities
Publication date: 27 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-0397 , CVE-2024-4032 , CVE-2024-6923 , CVE-2024-8088 , CVE-2024-6232 , CVE-2024-7592 , CVE-2015-2104 , CVE-2023-27043 Description A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. (CVE-2024-0397) The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. (CVE-2024-4032) The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. (CVE-2024-6923) When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. (CVE-2024-8088) Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. (CVE-2024-6232) When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value. (CVE-2024-7592) Urlparse insufficient validation leads to open redirect. (CVE-2015-2104) The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. (CVE-2023-27043) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-0397 , CVE-2024-4032 , CVE-2024-6923 , CVE-2024-8088 , CVE-2024-6232 , CVE-2024-7592 , CVE-2015-2104 , CVE-2023-27043 Description A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “get_ca_certs()”. The race condition can be triggered if the methods are called at the same time as certificates are loaded into the SSLContext, such as during the TLS handshake with a certificate directory configured. (CVE-2024-0397) The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. (CVE-2024-4032) The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. (CVE-2024-6923) When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. (CVE-2024-8088) Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives. (CVE-2024-6232) When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value. (CVE-2024-7592) Urlparse insufficient validation leads to open redirect. (CVE-2015-2104) The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. (CVE-2023-27043) References
- https://bugs.mageia.org/show_bug.cgi?id=33436
- https://www.openwall.com/lists/oss-security/2024/06/17/2
- https://www.openwall.com/lists/oss-security/2024/06/17/3
- https://lwn.net/Articles/983060/
- https://www.openwall.com/lists/oss-security/2024/08/01/3
- https://www.openwall.com/lists/oss-security/2024/08/22/1
- https://www.openwall.com/lists/oss-security/2024/09/03/5
- https://www.openwall.com/lists/oss-security/2024/09/07/3
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2104
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
- python3-3.10.11-1.3.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0316 - Updated kernel, kmod-xtables-addons & kmod-virtualbox packages fix security vulnerabilities
Publication date: 27 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46713 , CVE-2024-46734 , CVE-2024-46735 , CVE-2024-46736 , CVE-2024-46737 , CVE-2024-46738 , CVE-2024-46739 , CVE-2024-46740 , CVE-2024-46741 , CVE-2024-46742 , CVE-2024-46743 , CVE-2024-46744 , CVE-2024-46745 , CVE-2024-46746 , CVE-2024-46747 , CVE-2024-46749 , CVE-2024-46750 , CVE-2024-46752 , CVE-2024-46755 , CVE-2024-46756 , CVE-2024-46757 , CVE-2024-46758 , CVE-2024-46759 , CVE-2024-46760 , CVE-2024-46761 , CVE-2024-46762 , CVE-2024-46763 , CVE-2024-46765 , CVE-2024-46767 , CVE-2024-46768 , CVE-2024-46770 , CVE-2024-46771 , CVE-2024-46773 , CVE-2024-46776 , CVE-2024-46777 , CVE-2024-46780 , CVE-2024-46781 , CVE-2024-46782 , CVE-2024-46783 , CVE-2024-46784 , CVE-2024-46785 , CVE-2024-46786 , CVE-2024-46787 , CVE-2024-46788 , CVE-2024-46791 , CVE-2024-46794 , CVE-2024-46795 , CVE-2024-46796 , CVE-2024-46797 , CVE-2024-46798 , CVE-2024-46800 Description Upstream kernel version 6.6.52 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46713 , CVE-2024-46734 , CVE-2024-46735 , CVE-2024-46736 , CVE-2024-46737 , CVE-2024-46738 , CVE-2024-46739 , CVE-2024-46740 , CVE-2024-46741 , CVE-2024-46742 , CVE-2024-46743 , CVE-2024-46744 , CVE-2024-46745 , CVE-2024-46746 , CVE-2024-46747 , CVE-2024-46749 , CVE-2024-46750 , CVE-2024-46752 , CVE-2024-46755 , CVE-2024-46756 , CVE-2024-46757 , CVE-2024-46758 , CVE-2024-46759 , CVE-2024-46760 , CVE-2024-46761 , CVE-2024-46762 , CVE-2024-46763 , CVE-2024-46765 , CVE-2024-46767 , CVE-2024-46768 , CVE-2024-46770 , CVE-2024-46771 , CVE-2024-46773 , CVE-2024-46776 , CVE-2024-46777 , CVE-2024-46780 , CVE-2024-46781 , CVE-2024-46782 , CVE-2024-46783 , CVE-2024-46784 , CVE-2024-46785 , CVE-2024-46786 , CVE-2024-46787 , CVE-2024-46788 , CVE-2024-46791 , CVE-2024-46794 , CVE-2024-46795 , CVE-2024-46796 , CVE-2024-46797 , CVE-2024-46798 , CVE-2024-46800 Description Upstream kernel version 6.6.52 fixes bugs and vulnerabilities. The kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links. References
- https://bugs.mageia.org/show_bug.cgi?id=33574
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.51
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.52
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
- kernel-6.6.52-1.mga9
- kmod-xtables-addons-3.24-62.mga9
- kmod-virtualbox-7.0.20-54.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0315 - Updated apache-mod_jk packages fix security vulnerability
Publication date: 27 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46544 Description Incorrect Default Permissions vulnerability in Apache Tomcat Connectors allows local users to view and modify shared memory containing mod_jk configuration which may lead to information disclosure and/or denial of service. (CVE-2024-46544) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-46544 Description Incorrect Default Permissions vulnerability in Apache Tomcat Connectors allows local users to view and modify shared memory containing mod_jk configuration which may lead to information disclosure and/or denial of service. (CVE-2024-46544) References
- https://bugs.mageia.org/show_bug.cgi?id=33586
- https://www.openwall.com/lists/oss-security/2024/09/23/1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46544
- apache-mod_jk-1.2.50-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2024-0314 - Updated gnome-shell packages fix security vulnerability
Publication date: 27 Sep 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-36472 Description In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code's behavior. (CVE-2024-36472) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-36472 Description In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code's behavior. (CVE-2024-36472) References
- https://bugs.mageia.org/show_bug.cgi?id=33434
- https://lists.suse.com/pipermail/sle-updates/2024-July/036098.html
- https://ubuntu.com/security/notices/USN-6963-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36472
- gnome-shell-44.2-1.2.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0201 - Updated nvidia-current packages fix bugs
Publication date: 27 Sep 2024
Type: bugfix
Affected Mageia releases : 9
Description Fixed a bug that could cause kernel crashes upon attempting KMS operations through DRM when nvidia_drm was loaded with modeset=0. Fixed a bug that caused the nvidia-powerd service to fail on some ADA notebooks with the error message "Error in getting the NvPCF static configuration". Fixed a bug that caused driver build failure when using separate kernel source and output directories on Linux v6.6 and later. References SRPMS 9/nonfree
Type: bugfix
Affected Mageia releases : 9
Description Fixed a bug that could cause kernel crashes upon attempting KMS operations through DRM when nvidia_drm was loaded with modeset=0. Fixed a bug that caused the nvidia-powerd service to fail on some ADA notebooks with the error message "Error in getting the NvPCF static configuration". Fixed a bug that caused driver build failure when using separate kernel source and output directories on Linux v6.6 and later. References SRPMS 9/nonfree
- nvidia-current-550.120-1.mga9.nonfree
Categorías: Actualizaciones de Seguridad
MGAA-2024-0200 - Updated wxglade package fixes bug
Publication date: 27 Sep 2024
Type: bugfix
Affected Mageia releases : 9
Description The current version fails to start. This update fixes the reported issue. References SRPMS 9/core
Type: bugfix
Affected Mageia releases : 9
Description The current version fails to start. This update fixes the reported issue. References SRPMS 9/core
- wxglade-1.0.5-1.1.mga9
Categorías: Actualizaciones de Seguridad
MGAA-2024-0199 - Updated sxiv packages fix bugs
Publication date: 27 Sep 2024
Type: bugfix
Affected Mageia releases : 9
Description Support font fallback for missing glyphs Fix busy loop when built without inotify Use background/foreground colors from X resource database Automatically reload the current image whenever it changes Support embedding into other X windows with -e (e.g. tabbed) New option -p prevents sxiv from creating cache and temporary files Simpler mouse mappings, the most basic features are accessible with the mouse only (navigate, zoom, pan) And more bugs fixed by upstream since the current version in mageia. References
Type: bugfix
Affected Mageia releases : 9
Description Support font fallback for missing glyphs Fix busy loop when built without inotify Use background/foreground colors from X resource database Automatically reload the current image whenever it changes Support embedding into other X windows with -e (e.g. tabbed) New option -p prevents sxiv from creating cache and temporary files Simpler mouse mappings, the most basic features are accessible with the mouse only (navigate, zoom, pan) And more bugs fixed by upstream since the current version in mageia. References
- https://bugs.mageia.org/show_bug.cgi?id=33590
- https://github.com/xyb3rt/sxiv/tree/v26#download--changelog
- sxiv-26-1.mga9
Categorías: Actualizaciones de Seguridad
mingw-libglade2-2.6.4-23.mga10.src.rpm
In Mageia/cauldron/x86_64:
MinGW Windows Libglade2 library.
Categorías: RPMs
mingw-libglade2-2.6.4-23.mga10.src.rpm
In Mageia/cauldron/i586:
MinGW Windows Libglade2 library.
Categorías: RPMs
chirp-20240919-1.mga10.src.rpm
In Mageia/cauldron/i586:
CHIRP is an open-source tool for programming radio transceivers.
It supports a large number of manufacturers and models, as well as providing
a way to interface with multiple data sources and formats.
This version is built from the chirp-next sources.
Categorías: RPMs
chirp-20240919-1.mga10.src.rpm
In Mageia/cauldron/x86_64:
CHIRP is an open-source tool for programming radio transceivers.
It supports a large number of manufacturers and models, as well as providing
a way to interface with multiple data sources and formats.
This version is built from the chirp-next sources.
Categorías: RPMs
zh-autoconvert-0.3.16-15.mga10.src.rpm
In Mageia/cauldron/x86_64:
AutoConvert is an intelligent Chinese Encoding converter. It uses built-in
functions to judge the type of the input file's Chinese Encoding (such as
GB/Big5/HZ), then converts the input file to any type of Chinese Encoding
you want. You can use autoconvert to automatically convert incoming e-mail
messages. It can also optionally handle the UNI/UTF7/UTF8 encoding.
Categorías: RPMs
zh-autoconvert-0.3.16-15.mga10.src.rpm
In Mageia/cauldron/i586:
AutoConvert is an intelligent Chinese Encoding converter. It uses built-in
functions to judge the type of the input file's Chinese Encoding (such as
GB/Big5/HZ), then converts the input file to any type of Chinese Encoding
you want. You can use autoconvert to automatically convert incoming e-mail
messages. It can also optionally handle the UNI/UTF7/UTF8 encoding.
Categorías: RPMs
xli-20061110-17.mga10.src.rpm
In Mageia/cauldron/x86_64:
This utility will view several types of images under X11, or load
images onto the X11 root window. Can view the following image types
under X11:
FBM Image, Sun Rasterfile, CMU WM Raster, Portable Bit Map (PBM, PGM,
PPM), Faces Project, GIF Image, JFIF style jpeg Image, Utah RLE Image,
Windows, OS/2 RLE Image, Photograph on CD Image, X Window Dump, Targa
Image, McIDAS areafile, G3 FAX Image, PC Paintbrush Image, GEM Bit Image,
MacPaint Image, X Pixmap (.xpm), XBitmap
Categorías: RPMs
xli-20061110-17.mga10.src.rpm
In Mageia/cauldron/i586:
This utility will view several types of images under X11, or load
images onto the X11 root window. Can view the following image types
under X11:
FBM Image, Sun Rasterfile, CMU WM Raster, Portable Bit Map (PBM, PGM,
PPM), Faces Project, GIF Image, JFIF style jpeg Image, Utah RLE Image,
Windows, OS/2 RLE Image, Photograph on CD Image, X Window Dump, Targa
Image, McIDAS areafile, G3 FAX Image, PC Paintbrush Image, GEM Bit Image,
MacPaint Image, X Pixmap (.xpm), XBitmap
Categorías: RPMs
gutenprint-5.3.4-5.mga10.src.rpm
In Mageia/cauldron/x86_64:
Gutenprint is a high quality printer driver suite for photo-quality
printing on inkjet printers, especially Epson. There are also some
Canon, HP, and Lexmark inkjets (older models) and PCL bw laser
printers supported (PCL 5e and earlier). If your printer is supported
by Gutenprint and not an HP printer supported by HPIJS, this is the
best choice of a free software printer driver.
Keep in mind that the leader of this project is hobby photographer and
wanted to get his 6-ink Epson Stylus Photo EX working in its best
quality without necessity of proprietary software.
Categorías: RPMs
gutenprint-5.3.4-5.mga10.src.rpm
In Mageia/cauldron/i586:
Gutenprint is a high quality printer driver suite for photo-quality
printing on inkjet printers, especially Epson. There are also some
Canon, HP, and Lexmark inkjets (older models) and PCL bw laser
printers supported (PCL 5e and earlier). If your printer is supported
by Gutenprint and not an HP printer supported by HPIJS, this is the
best choice of a free software printer driver.
Keep in mind that the leader of this project is hobby photographer and
wanted to get his 6-ink Epson Stylus Photo EX working in its best
quality without necessity of proprietary software.
Categorías: RPMs
gtk-chtheme-0.3.1-18.mga10.src.rpm
In Mageia/cauldron/x86_64:
Gtk-chtheme allows you to change the Gtk+ 2.0 theme when not using GNOME.
Categorías: RPMs