Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

3 Febbraio 2022 - Slackware 15.0

Oggi (2 febbraio alle 22:22 orario UTC) è stata finalmente rilasciata la Slackware 15.0. Vi aspettiamo nel forum per commentare. Happy fun :)

13 Gennaio 2022 - Slackware 15 RC3

Siamo arrivati alla terza, e a meno di sorprese, l'ultima Release Candidate di Slackware 15. Da ora in poi ci saranno modifiche solo in caso di problemi seri, ma tutto lascia supporre che il 17 gennaio, come anticipato da Pat su LinuxQuestions, esca la tanto sospirata versione 15. Ti aspettiamo nel forum per parlarne.

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.


ChangeLog

Slackware Current

			
  • Wed, 07 Dec 2022 18:48:07 +0000
    Wed Dec 7 18:48:07 UTC 2022
    d/cargo-vendor-filterer-0.5.7-x86_64-1.txz: Added.
    Thanks to Heinz Wiesinger.
    d/cbindgen-0.24.3-x86_64-1.txz: Added.
    d/python3-3.9.16-x86_64-1.txz: Upgraded.
    This update fixes security issues:
    gh-98739: Updated bundled libexpat to 2.5.0 to fix CVE-2022-43680
    (heap use-after-free).
    gh-98433: The IDNA codec decoder used on DNS hostnames by socket or asyncio
    related name resolution functions no longer involves a quadratic algorithm
    to fix CVE-2022-45061. This prevents a potential CPU denial of service if an
    out-of-spec excessive length hostname involving bidirectional characters were
    decoded. Some protocols such as urllib http 3xx redirects potentially allow
    for an attacker to supply such a name.
    gh-100001: python -m http.server no longer allows terminal control characters
    sent within a garbage request to be printed to the stderr server log.
    gh-87604: Avoid publishing list of active per-interpreter audit hooks via the
    gc module.
    gh-97514: On Linux the multiprocessing module returns to using filesystem
    backed unix domain sockets for communication with the forkserver process
    instead of the Linux abstract socket namespace. Only code that chooses to use
    the "forkserver" start method is affected. This prevents Linux CVE-2022-42919
    (potential privilege escalation) as abstract sockets have no permissions and
    could allow any user on the system in the same network namespace (often the
    whole system) to inject code into the multiprocessing forkserver process.
    Filesystem based socket permissions restrict this to the forkserver process
    user as was the default in Python 3.8 and earlier.
    gh-98517: Port XKCP's fix for the buffer overflows in SHA-3 to fix
    CVE-2022-37454.
    gh-68966: The deprecated mailcap module now refuses to inject unsafe text
    (filenames, MIME types, parameters) into shell commands to address
    CVE-2015-20107. Instead of using such text, it will warn and act as if a
    match was not found (or for test commands, as if the test failed).
    For more information, see:
    https://pythoninsider.blogspot.com/2022/12/python-3111-3109-3916-3816-3716-and.html
    https://www.cve.org/CVERecord?id=CVE-2022-43680
    https://www.cve.org/CVERecord?id=CVE-2022-45061
    https://www.cve.org/CVERecord?id=CVE-2022-42919
    https://www.cve.org/CVERecord?id=CVE-2022-37454
    https://www.cve.org/CVERecord?id=CVE-2015-20107
    (* Security fix *)
    d/rust-bindgen-0.63.0-x86_64-1.txz: Added.
    Thanks to Heinz Wiesinger.
    l/pcre2-10.41-x86_64-1.txz: Upgraded.
    n/proftpd-1.3.8-x86_64-1.txz: Upgraded.
    x/mesa-22.3.0-x86_64-1.txz: Upgraded.
    Compiled with Rusticl support. Thanks to Heinz Wiesinger.
    x/xdm-1.1.14-x86_64-1.txz: Upgraded.
  • Mon, 05 Dec 2022 21:00:46 +0000
    Mon Dec 5 21:00:46 UTC 2022
    a/glibc-zoneinfo-2022g-noarch-1.txz: Upgraded.
    This package provides the latest timezone updates.
    ap/texinfo-7.0.1-x86_64-2.txz: Rebuilt.
    Rebuilt without the --disable-perl-xs option to fix a2ps failing to build
    from source. The option was added during the 15.0 development cycle to fix
    glibc failing to build from source, but that issue has been resolved.
    Thanks to nobodino and marav.
    n/ca-certificates-20221205-noarch-1.txz: Upgraded.
    This update provides the latest CA certificates to check for the
    authenticity of SSL connections.
    n/dnsmasq-2.88-x86_64-1.txz: Upgraded.
  • Mon, 05 Dec 2022 02:40:12 +0000
    Mon Dec 5 02:40:12 UTC 2022
    x/OpenCC-1.1.5-x86_64-1.txz: Upgraded.
    x/libXScrnSaver-1.2.4-x86_64-1.txz: Upgraded.
    x/libXcomposite-0.4.6-x86_64-1.txz: Upgraded.
    x/libXdamage-1.1.6-x86_64-1.txz: Upgraded.
    x/libXres-1.2.2-x86_64-1.txz: Upgraded.
    x/libXv-1.0.12-x86_64-1.txz: Upgraded.
    x/libXxf86dga-1.1.6-x86_64-1.txz: Upgraded.
    x/lndir-1.0.4-x86_64-1.txz: Upgraded.

Slackware 15.0 (Stable)

			
  • Wed, 07 Dec 2022 18:48:07 +0000
    Wed Dec 7 18:48:07 UTC 2022
    patches/packages/python3-3.9.16-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes security issues:
    gh-98739: Updated bundled libexpat to 2.5.0 to fix CVE-2022-43680
    (heap use-after-free).
    gh-98433: The IDNA codec decoder used on DNS hostnames by socket or asyncio
    related name resolution functions no longer involves a quadratic algorithm
    to fix CVE-2022-45061. This prevents a potential CPU denial of service if an
    out-of-spec excessive length hostname involving bidirectional characters were
    decoded. Some protocols such as urllib http 3xx redirects potentially allow
    for an attacker to supply such a name.
    gh-100001: python -m http.server no longer allows terminal control characters
    sent within a garbage request to be printed to the stderr server log.
    gh-87604: Avoid publishing list of active per-interpreter audit hooks via the
    gc module.
    gh-97514: On Linux the multiprocessing module returns to using filesystem
    backed unix domain sockets for communication with the forkserver process
    instead of the Linux abstract socket namespace. Only code that chooses to use
    the "forkserver" start method is affected. This prevents Linux CVE-2022-42919
    (potential privilege escalation) as abstract sockets have no permissions and
    could allow any user on the system in the same network namespace (often the
    whole system) to inject code into the multiprocessing forkserver process.
    Filesystem based socket permissions restrict this to the forkserver process
    user as was the default in Python 3.8 and earlier.
    gh-98517: Port XKCP's fix for the buffer overflows in SHA-3 to fix
    CVE-2022-37454.
    gh-68966: The deprecated mailcap module now refuses to inject unsafe text
    (filenames, MIME types, parameters) into shell commands to address
    CVE-2015-20107. Instead of using such text, it will warn and act as if a
    match was not found (or for test commands, as if the test failed).
    For more information, see:
    https://pythoninsider.blogspot.com/2022/12/python-3111-3109-3916-3816-3716-and.html
    https://www.cve.org/CVERecord?id=CVE-2022-43680
    https://www.cve.org/CVERecord?id=CVE-2022-45061
    https://www.cve.org/CVERecord?id=CVE-2022-42919
    https://www.cve.org/CVERecord?id=CVE-2022-37454
    https://www.cve.org/CVERecord?id=CVE-2015-20107
    (* Security fix *)
  • Mon, 05 Dec 2022 21:00:46 +0000
    Mon Dec 5 21:00:46 UTC 2022
    patches/packages/ca-certificates-20221205-noarch-1_slack15.0.txz: Upgraded.
    This update provides the latest CA certificates to check for the
    authenticity of SSL connections.
    patches/packages/glibc-zoneinfo-2022g-noarch-1_slack15.0.txz: Upgraded.
    This package provides the latest timezone updates.
  • Fri, 02 Dec 2022 20:58:24 +0000
    Fri Dec 2 20:58:24 UTC 2022
    patches/packages/krusader-2.8.0-x86_64-1_slack15.0.txz: Upgraded.
    This is a bugfix release.
    patches/packages/mozilla-thunderbird-102.5.1-x86_64-1_slack15.0.txz: Upgraded.
    This release contains security fixes and improvements.
    For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.5.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-50/
    https://www.cve.org/CVERecord?id=CVE-2022-45414
    (* Security fix *)