Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.

16 Febbraio 2021 - Slackware 15 alpha1

Come potete leggere nel ChangeLog sotto, ieri sera è stata rilasciata la versione alpha1 del prossimo ramo stabile di Slackware, che sarà il 15.0.

Provatela, segnalate bug, e commentate sul forum.

Se decidete di provarla facendo l'upgrade dalla 14.2 state attenti al cambiamento di nome di alcuni pacchetti, maggiori info nel forum. Happy Slack!

10 Dicembre 2020 - Habemus Plasma

Dopo un'attesa lunga mesi, il 7 Dicembre 2020 Pat ha finalmente introdotto Plasma5 (KDE5) nel ramo current della Slackware. I tempi sono maturi per la prossima release, la 15.0.

Vi invitiamo a commentare nel nostro forum. Happy Slack a tutti.


ChangeLog

Slackware Current

			
  • Thu, 21 Oct 2021 19:36:32 GMT
    a/lvm2-2.03.13-x86_64-1.txz:  Upgraded.
      Reverted to working version.
    d/rust-1.56.0-x86_64-1.txz:  Upgraded.
    l/pipewire-0.3.39-x86_64-1.txz:  Upgraded.
    n/krb5-1.19.2-x86_64-2.txz:  Rebuilt.
      [PATCH] Fix KDC null deref on TGS inner body null server.
      This fixes an issue where an authenticated attacker can cause a denial of
      service in the KDC by sending a FAST TGS request with no server field.
      Thanks to nobodino.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
      (* Security fix *)
    x/ibus-m17n-1.4.8-x86_64-1.txz:  Upgraded.
    x/libinput-1.19.2-x86_64-1.txz:  Upgraded.
    xap/freerdp-2.4.1-x86_64-1.txz:  Upgraded.
      This update fixes two security issues:
      Improper client input validation for gateway connections allows to overwrite
      memory.
      Improper region checks in all clients allow out of bound write to memory.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160
      (* Security fix *)
    xap/gftp-2.7.1b-x86_64-1.txz:  Upgraded.
    extra/php8/php8-8.0.12-x86_64-1.txz:  Upgraded.
      This update fixes bugs and a security issue:
      FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
      (* Security fix *)
    
  • Wed, 20 Oct 2021 19:29:55 GMT
    a/kernel-generic-5.14.14-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.14.14-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.14.14-x86_64-1.txz:  Upgraded.
    a/lvm2-2.03.14-x86_64-1.txz:  Upgraded.
    d/kernel-headers-5.14.14-x86-1.txz:  Upgraded.
    k/kernel-source-5.14.14-noarch-1.txz:  Upgraded.
    n/autofs-5.1.8-x86_64-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    
  • Tue, 19 Oct 2021 18:10:12 GMT
    kde/alkimia-8.1.0-x86_64-3.txz:  Rebuilt.
      Fixed data install location /usr/plasma -> /usr/share/plasma.
      Thanks to oneforall.
    kde/bluedevil-5.23.1-x86_64-1.txz:  Upgraded.
    kde/breeze-5.23.1-x86_64-1.txz:  Upgraded.
    kde/breeze-grub-5.23.1-x86_64-1.txz:  Upgraded.
    kde/breeze-gtk-5.23.1-x86_64-1.txz:  Upgraded.
    kde/drkonqi-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kactivitymanagerd-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kde-cli-tools-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kde-gtk-config-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kdecoration-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kdeplasma-addons-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kgamma5-5.23.1-x86_64-1.txz:  Upgraded.
    kde/khotkeys-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kinfocenter-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kmenuedit-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kscreen-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kscreenlocker-5.23.1-x86_64-1.txz:  Upgraded.
    kde/ksshaskpass-5.23.1-x86_64-1.txz:  Upgraded.
    kde/ksystemstats-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kwallet-pam-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kwayland-integration-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kwayland-server-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kwin-5.23.1-x86_64-1.txz:  Upgraded.
    kde/kwrited-5.23.1-x86_64-1.txz:  Upgraded.
    kde/layer-shell-qt-5.23.1-x86_64-1.txz:  Upgraded.
    kde/libkscreen-5.23.1-x86_64-1.txz:  Upgraded.
    kde/libksysguard-5.23.1-x86_64-1.txz:  Upgraded.
    kde/milou-5.23.1-x86_64-1.txz:  Upgraded.
    kde/oxygen-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-browser-integration-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-desktop-5.23.1-x86_64-1.txz:  Upgraded.
      Applied upstream patch:
      [PATCH] Desktop as folder: restore functionality of the "delete" action.
      Thanks to ctrlaltca.
    kde/plasma-disks-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-firewall-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-integration-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-nm-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-pa-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-sdk-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-systemmonitor-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-vault-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-workspace-5.23.1-x86_64-1.txz:  Upgraded.
    kde/plasma-workspace-wallpapers-5.23.1-x86_64-1.txz:  Upgraded.
    kde/polkit-kde-agent-1-5.23.1-x86_64-1.txz:  Upgraded.
    kde/powerdevil-5.23.1-x86_64-1.txz:  Upgraded.
    kde/qqc2-breeze-style-5.23.1-x86_64-1.txz:  Upgraded.
    kde/sddm-kcm-5.23.1-x86_64-1.txz:  Upgraded.
    kde/systemsettings-5.23.1-x86_64-1.txz:  Upgraded.
    kde/xdg-desktop-portal-kde-5.23.1-x86_64-1.txz:  Upgraded.
    l/gdbm-1.22-x86_64-1.txz:  Upgraded.
    n/nghttp2-1.46.0-x86_64-1.txz:  Upgraded.
    x/ttf-tlwg-0.7.3-noarch-1.txz:  Upgraded.
    

Slackware 14.2 (Stable)

			
  • Sun, 17 Oct 2021 18:52:33 GMT
    patches/packages/glibc-zoneinfo-2021d-noarch-1_slack14.2.txz:  Upgraded.
      This package provides the latest timezone updates.
    
  • Fri, 08 Oct 2021 03:23:28 GMT
    patches/packages/httpd-2.4.51-x86_64-1_slack14.2.txz:  Upgraded.
      SECURITY: CVE-2021-42013: Path Traversal and Remote Code
      Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
      fix of CVE-2021-41773) (cve.mitre.org)
      It was found that the fix for CVE-2021-41773 in Apache HTTP
      Server 2.4.50 was insufficient.  An attacker could use a path
      traversal attack to map URLs to files outside the directories
      configured by Alias-like directives.
      If files outside of these directories are not protected by the
      usual default configuration "require all denied", these requests
      can succeed. If CGI scripts are also enabled for these aliased
      pathes, this could allow for remote code execution.
      This issue only affects Apache 2.4.49 and Apache 2.4.50 and not
      earlier versions.
      Credits: Reported by Juan Escobar from Dreamlab Technologies,
      Fernando MuA+-oz from NULL Life CTF Team, and Shungo Kumasaka
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013
      (* Security fix *)
    
  • Wed, 06 Oct 2021 01:11:07 GMT
    patches/packages/httpd-2.4.50-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains security fixes and improvements.
      Fixed null pointer dereference in h2 fuzzing.
      Fixed path traversal and file disclosure vulnerability.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41524
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773
      (* Security fix *)