Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

3 Febbraio 2022 - Slackware 15.0

Oggi (2 febbraio alle 22:22 orario UTC) è stata finalmente rilasciata la Slackware 15.0. Vi aspettiamo nel forum per commentare. Happy fun :)

13 Gennaio 2022 - Slackware 15 RC3

Siamo arrivati alla terza, e a meno di sorprese, l'ultima Release Candidate di Slackware 15. Da ora in poi ci saranno modifiche solo in caso di problemi seri, ma tutto lascia supporre che il 17 gennaio, come anticipato da Pat su LinuxQuestions, esca la tanto sospirata versione 15. Ti aspettiamo nel forum per parlarne.

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.


ChangeLog

Slackware Current

			
  • Thu, 21 Sep 2023 19:32:42 +0000
    Thu Sep 21 19:32:42 UTC 2023
    a/gettext-0.22.2-x86_64-1.txz: Upgraded.
    ap/cups-2.4.7-x86_64-1.txz: Upgraded.
    This update fixes bugs and a security issue:
    Fixed Heap-based buffer overflow when reading Postscript in PPD files.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-4504
    (* Security fix *)
    d/cmake-3.27.6-x86_64-1.txz: Upgraded.
    d/gettext-tools-0.22.2-x86_64-1.txz: Upgraded.
    l/dconf-editor-45.0.1-x86_64-1.txz: Upgraded.
    l/gst-plugins-bad-free-1.22.6-x86_64-1.txz: Upgraded.
    l/gst-plugins-base-1.22.6-x86_64-1.txz: Upgraded.
    l/gst-plugins-good-1.22.6-x86_64-1.txz: Upgraded.
    l/gst-plugins-libav-1.22.6-x86_64-1.txz: Upgraded.
    l/gstreamer-1.22.6-x86_64-1.txz: Upgraded.
    l/gtk4-4.12.2-x86_64-1.txz: Upgraded.
    l/imagemagick-7.1.1_17-x86_64-1.txz: Upgraded.
    n/bind-9.18.19-x86_64-1.txz: Upgraded.
    This update fixes bugs and security issues:
    Limit the amount of recursion that can be performed by isccc_cc_fromwire.
    Fix use-after-free error in TLS DNS code when sending data.
    For more information, see:
    https://kb.isc.org/docs/cve-2023-3341
    https://www.cve.org/CVERecord?id=CVE-2023-3341
    https://kb.isc.org/docs/cve-2023-4236
    https://www.cve.org/CVERecord?id=CVE-2023-4236
    (* Security fix *)
    n/stunnel-5.71-x86_64-1.txz: Upgraded.
    x/mesa-23.1.8-x86_64-1.txz: Upgraded.
    x/xorg-server-xwayland-23.2.1-x86_64-1.txz: Upgraded.
    xap/freerdp-2.11.2-x86_64-1.txz: Upgraded.
    xap/mozilla-thunderbird-115.2.3-x86_64-1.txz: Upgraded.
    This is a bugfix release.
    For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.2.3/releasenotes/
    xap/seamonkey-2.53.17.1-x86_64-1.txz: Upgraded.
    This update contains security fixes and improvements.
    For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.17.1
    https://www.cve.org/CVERecord?id=CVE-2023-4863
    (* Security fix *)
  • Wed, 20 Sep 2023 00:08:45 +0000
    Wed Sep 20 00:08:45 UTC 2023
    a/gettext-0.22.1-x86_64-1.txz: Upgraded.
    a/kernel-firmware-20230918_3672cca-noarch-1.txz: Upgraded.
    a/kernel-generic-6.1.54-x86_64-1.txz: Upgraded.
    a/kernel-huge-6.1.54-x86_64-1.txz: Upgraded.
    a/kernel-modules-6.1.54-x86_64-1.txz: Upgraded.
    a/openssl-solibs-3.1.3-x86_64-1.txz: Upgraded.
    ap/ghostscript-10.02.0-x86_64-2.txz: Rebuilt.
    [PATCH] PDF interpreter - fix PageList processing.
    Thanks to denydias.
    d/gettext-tools-0.22.1-x86_64-1.txz: Upgraded.
    d/kernel-headers-6.1.54-x86-1.txz: Upgraded.
    k/kernel-source-6.1.54-noarch-1.txz: Upgraded.
    l/dconf-editor-45.0-x86_64-1.txz: Upgraded.
    l/harfbuzz-8.2.1-x86_64-1.txz: Upgraded.
    l/nodejs-20.7.0-x86_64-1.txz: Upgraded.
    n/openssl-3.1.3-x86_64-1.txz: Upgraded.
    This update fixes bugs and a security issue that does not affect Linux:
    Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-4807
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    testing/packages/rust-1.72.1-x86_64-1.txz: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
  • Mon, 18 Sep 2023 18:40:04 +0000
    Mon Sep 18 18:40:04 UTC 2023
    a/sysklogd-2.5.2-x86_64-1.txz: Upgraded.
    d/cargo-vendor-filterer-0.5.11-x86_64-1.txz: Upgraded.
    l/adwaita-icon-theme-45.0-noarch-1.txz: Upgraded.
    l/gsettings-desktop-schemas-45.0-x86_64-1.txz: Upgraded.
    l/imagemagick-7.1.1_16-x86_64-1.txz: Upgraded.
    l/libdeflate-1.19-x86_64-1.txz: Upgraded.
    l/libqalculate-4.8.1-x86_64-1.txz: Upgraded.
    l/vte-0.74.0-x86_64-1.txz: Upgraded.
    n/netatalk-3.1.17-x86_64-1.txz: Upgraded.
    This update fixes bugs and a security issue:
    Validate data type in dalloc_value_for_key(). This flaw could allow a
    malicious actor to cause Netatalk's afpd daemon to crash, or possibly to
    execute arbitrary code.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-42464
    (* Security fix *)

Slackware 15.0 (Stable)

			
  • Thu, 21 Sep 2023 19:32:42 +0000
    Thu Sep 21 19:32:42 UTC 2023
    patches/packages/bind-9.16.44-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and a security issue:
    Limit the amount of recursion that can be performed by isccc_cc_fromwire.
    For more information, see:
    https://kb.isc.org/docs/cve-2023-3341
    https://www.cve.org/CVERecord?id=CVE-2023-3341
    (* Security fix *)
    patches/packages/cups-2.4.7-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and a security issue:
    Fixed Heap-based buffer overflow when reading Postscript in PPD files.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-4504
    (* Security fix *)
    patches/packages/mozilla-thunderbird-115.2.3-x86_64-1_slack15.0.txz: Upgraded.
    This is a bugfix release.
    For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.2.3/releasenotes/
    patches/packages/seamonkey-2.53.17.1-x86_64-1_slack15.0.txz: Upgraded.
    This update contains security fixes and improvements.
    For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.17.1
    https://www.cve.org/CVERecord?id=CVE-2023-4863
    (* Security fix *)
    testing/packages/bind-9.18.19-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and security issues:
    Limit the amount of recursion that can be performed by isccc_cc_fromwire.
    Fix use-after-free error in TLS DNS code when sending data.
    For more information, see:
    https://kb.isc.org/docs/cve-2023-3341
    https://www.cve.org/CVERecord?id=CVE-2023-3341
    https://kb.isc.org/docs/cve-2023-4236
    https://www.cve.org/CVERecord?id=CVE-2023-4236
    (* Security fix *)
  • Mon, 18 Sep 2023 18:40:04 +0000
    Mon Sep 18 18:40:04 UTC 2023
    patches/packages/netatalk-3.1.17-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and a security issue:
    Validate data type in dalloc_value_for_key(). This flaw could allow a
    malicious actor to cause Netatalk's afpd daemon to crash, or possibly to
    execute arbitrary code.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-42464
    (* Security fix *)
  • Fri, 15 Sep 2023 19:48:39 +0000
    Fri Sep 15 19:48:39 UTC 2023
    patches/packages/python3-3.9.18-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes a security issue:
    Fixed an issue where instances of ssl.SSLSocket were vulnerable to a bypass
    of the TLS handshake and included protections (like certificate verification)
    and treating sent unencrypted data as if it were post-handshake TLS encrypted
    data. Security issue reported by Aapo Oksman; patch by Gregory P. Smith.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-40217
    (* Security fix *)