Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

Slackware Current

			
  • Thu, 02 Apr 2020 06:07:52 GMT
    a/hwdata-0.334-noarch-1.txz:  Upgraded.
    a/kernel-generic-5.4.29-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.4.29-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.4.29-x86_64-1.txz:  Upgraded.
    a/pkgtools-15.0-noarch-32.txz:  Rebuilt.
      installpkg: handle the uninstall script packaged as /install/douninst.sh.
      removepkg: add --skip-douninst option to skip running the uninstall script.
        Save removed douninst.sh in /var/log/pkgtools/removed_uninstall_scripts.
    ap/groff-1.22.4-x86_64-2.txz:  Rebuilt.
      Fixed docdir. Thanks to Xsane.
    d/gcc-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-brig-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-g++-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-gdc-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-gfortran-9.3.0-x86_64-2.txz:  Rebuilt.
      Patched a compiler bug concerning assumed-shape vs. deferred-shape arrays.
      Thanks to Lockywolf.
    d/gcc-gnat-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-go-9.3.0-x86_64-2.txz:  Rebuilt.
    d/gcc-objc-9.3.0-x86_64-2.txz:  Rebuilt.
    d/kernel-headers-5.4.29-x86-1.txz:  Upgraded.
    d/ruby-2.7.1-x86_64-1.txz:  Upgraded.
      This update fixes security issues:
      Unsafe Object Creation Vulnerability in JSON (Additional fix).
      Heap exposure vulnerability in the socket library.
      For more information, see:
        https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/
        https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10933
      (* Security fix *)
    k/kernel-source-5.4.29-noarch-1.txz:  Upgraded.
    l/graphite2-1.3.14-x86_64-1.txz:  Upgraded.
    l/librsvg-2.48.2-x86_64-1.txz:  Upgraded.
    l/utf8proc-2.5.0-x86_64-1.txz:  Upgraded.
    x/libva-2.7.0-x86_64-1.txz:  Upgraded.
    x/libva-utils-2.7.1-x86_64-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    
  • Tue, 31 Mar 2020 19:01:17 GMT
    a/dialog-1.3_20200327-x86_64-1.txz:  Upgraded.
    a/openssl-solibs-1.1.1f-x86_64-1.txz:  Upgraded.
    ap/nano-4.9.1-x86_64-1.txz:  Upgraded.
    l/elfutils-0.179-x86_64-1.txz:  Upgraded.
    n/gnutls-3.6.13-x86_64-1.txz:  Upgraded.
      This update fixes a security issue:
      libgnutls: Fix a DTLS-protocol regression (caused by TLS1.3 support),
      since 3.6.3. The DTLS client would not contribute any randomness to the
      DTLS negotiation, breaking the security guarantees of the DTLS protocol.
      [GNUTLS-SA-2020-03-31, CVSS: high]
      (* Security fix *)
    n/httpd-2.4.43-x86_64-1.txz:  Upgraded.
    n/openssl-1.1.1f-x86_64-1.txz:  Upgraded.
    
  • Tue, 31 Mar 2020 04:00:43 GMT
    a/pkgtools-15.0-noarch-31.txz:  Rebuilt.
      removepkg: support an uninstall script. See removepkg(8).
    d/meson-0.54.0-x86_64-1.txz:  Upgraded.
    

Slackware 14.2 (Stable)

			
  • Tue, 31 Mar 2020 19:01:17 GMT
    patches/packages/gnutls-3.6.13-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes a security issue:
      libgnutls: Fix a DTLS-protocol regression (caused by TLS1.3 support),
      since 3.6.3. The DTLS client would not contribute any randomness to the
      DTLS negotiation, breaking the security guarantees of the DTLS protocol.
      [GNUTLS-SA-2020-03-31, CVSS: high]
      (* Security fix *)
    patches/packages/httpd-2.4.43-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains security fixes (since 2.4.39) and improvements.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
      (* Security fix *)
    
  • Thu, 26 Mar 2020 22:37:06 GMT
    patches/packages/linux-4.4.217/*:  Upgraded.
      These updates fix various bugs and security issues.
      Be sure to upgrade your initrd after upgrading the kernel packages.
      If you use lilo to boot your machine, be sure lilo.conf points to the correct
      kernel and initrd and run lilo as root to update the bootloader.
      If you use elilo to boot your machine, you should run eliloconfig to copy the
      kernel and initrd to the EFI System Partition.
      For more information, see:
        Fixed in 4.4.209:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
        Fixed in 4.4.210:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
        Fixed in 4.4.211:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21008
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15220
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
        Fixed in 4.4.212:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897
        Fixed in 4.4.215:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0009
        Fixed in 4.4.216:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
        Fixed in 4.4.217:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
      (* Security fix *)
  • Mon, 23 Mar 2020 20:03:39 GMT
    patches/packages/gd-2.3.0-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes bugs and security issues:
      Potential double-free in gdImage*Ptr().
      gdImageColorMatch() out of bounds write on heap.
      Uninitialized read in gdImageCreateFromXbm().
      Double-free in gdImageBmp.
      Potential NULL pointer dereference in gdImageClone().
      Potential infinite loop in gdImageCreateFromGifCtx().
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6977
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11038
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000222
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14553
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
      (* Security fix *)