Benvenuti su - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux. è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware


16 Febbraio 2021 - Slackware 15 alpha1

Come potete leggere nel ChangeLog sotto, ieri sera è stata rilasciata la versione alpha1 del prossimo ramo stabile di Slackware, che sarà il 15.0.

Provatela, segnalate bug, e commentate sul forum.

Se decidete di provarla facendo l'upgrade dalla 14.2 state attenti al cambiamento di nome di alcuni pacchetti, maggiori info nel forum. Happy Slack!

10 Dicembre 2020 - Habemus Plasma

Dopo un'attesa lunga mesi, il 7 Dicembre 2020 Pat ha finalmente introdotto Plasma5 (KDE5) nel ramo current della Slackware. I tempi sono maturi per la prossima release, la 15.0.

Vi invitiamo a commentare nel nostro forum. Happy Slack a tutti.


Slackware Current

  • Wed, 24 Feb 2021 20:34:08 GMT
    ap/nano-5.6-x86_64-1.txz:  Upgraded.
    ap/qpdf-10.2.0-x86_64-1.txz:  Upgraded.
    d/cmake-3.19.6-x86_64-1.txz:  Upgraded.
    kde/bluedevil-5.21.1-x86_64-1.txz:  Upgraded.
    kde/breeze-5.21.1-x86_64-1.txz:  Upgraded.
    kde/breeze-grub-5.21.1-x86_64-1.txz:  Upgraded.
    kde/breeze-gtk-5.21.1-x86_64-1.txz:  Upgraded.
    kde/drkonqi-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kactivitymanagerd-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kde-cli-tools-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kde-gtk-config-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kdecoration-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kdeplasma-addons-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kgamma5-5.21.1-x86_64-1.txz:  Upgraded.
    kde/khotkeys-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kinfocenter-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kmenuedit-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kscreen-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kscreenlocker-5.21.1-x86_64-1.txz:  Upgraded.
    kde/ksshaskpass-5.21.1-x86_64-1.txz:  Upgraded.
    kde/ksysguard-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kwallet-pam-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kwayland-integration-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kwayland-server-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kwin-5.21.1-x86_64-1.txz:  Upgraded.
    kde/kwrited-5.21.1-x86_64-1.txz:  Upgraded.
    kde/libkscreen-5.21.1-x86_64-1.txz:  Upgraded.
    kde/libksysguard-5.21.1-x86_64-1.txz:  Upgraded.
    kde/milou-5.21.1-x86_64-1.txz:  Upgraded.
    kde/oxygen-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-browser-integration-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-desktop-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-disks-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-firewall-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-integration-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-nm-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-pa-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-sdk-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-systemmonitor-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-vault-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-workspace-5.21.1-x86_64-1.txz:  Upgraded.
    kde/plasma-workspace-wallpapers-5.21.1-x86_64-1.txz:  Upgraded.
    kde/polkit-kde-agent-1-5.21.1-x86_64-1.txz:  Upgraded.
    kde/powerdevil-5.21.1-x86_64-1.txz:  Upgraded.
    kde/qqc2-breeze-style-5.21.1-x86_64-1.txz:  Upgraded.
    kde/sddm-kcm-5.21.1-x86_64-1.txz:  Upgraded.
    kde/systemsettings-5.21.1-x86_64-1.txz:  Upgraded.
    kde/xdg-desktop-portal-kde-5.21.1-x86_64-1.txz:  Upgraded.
    n/bind-9.16.11-x86_64-3.txz:  Rebuilt.
      Reverted to bind-9.16.11 plus a patch for CVE-2020-8625 to fix a
      regression in bind-9.16.12 that can cause the name server to crash.
      Thanks to nobodino.
    n/openvpn-2.5.1-x86_64-1.txz:  Upgraded.
    n/s-nail-14.9.22-x86_64-1.txz:  Upgraded.
    x/libinput-1.16.5-x86_64-1.txz:  Upgraded.
    x/libwacom-1.9-x86_64-1.txz:  Upgraded.
    xap/mozilla-thunderbird-78.8.0-x86_64-1.txz:  Upgraded.
      This release contains security fixes and improvements.
      For more information, see:
      (* Security fix *)
  • Tue, 23 Feb 2021 22:04:52 GMT
    a/kernel-generic-5.10.18-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.10.18-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.10.18-x86_64-1.txz:  Upgraded.
    d/kernel-headers-5.10.18-x86-1.txz:  Upgraded.
    k/kernel-source-5.10.18-noarch-1.txz:  Upgraded.
    n/bluez-5.56-x86_64-1.txz:  Upgraded.
    n/iproute2-5.11.0-x86_64-1.txz:  Upgraded.
    x/liberation-fonts-ttf-2.1.3-noarch-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    testing/packages/linux-5.11.1/kernel-generic-5.11.1-x86_64-1.txz:  Upgraded.
    testing/packages/linux-5.11.1/kernel-headers-5.11.1-x86-1.txz:  Upgraded.
    testing/packages/linux-5.11.1/kernel-huge-5.11.1-x86_64-1.txz:  Upgraded.
    testing/packages/linux-5.11.1/kernel-modules-5.11.1-x86_64-1.txz:  Upgraded.
    testing/packages/linux-5.11.1/kernel-source-5.11.1-noarch-1.txz:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
  • Mon, 22 Feb 2021 20:58:01 GMT
    ap/dash-  Upgraded.
    ap/vim-8.2.2541-x86_64-1.txz:  Upgraded.
    d/parallel-20210222-noarch-1.txz:  Upgraded.
    l/mozjs78-78.8.0esr-x86_64-1.txz:  Upgraded.
    n/libqmi-1.28.0-x86_64-1.txz:  Upgraded.
    n/rsync-3.2.3-x86_64-4.txz:  Rebuilt.
      Don't use lchmod(). Thanks to tadgy.
    x/ibus-anthy-1.5.12-x86_64-1.txz:  Upgraded.
    xap/mozilla-firefox-78.8.0esr-x86_64-1.txz:  Upgraded.
      This release contains security fixes and improvements.
      For more information, see:
      (* Security fix *)
    xap/vim-gvim-8.2.2541-x86_64-1.txz:  Upgraded.
    xfce/xfce4-panel-profiles-1.0.13-x86_64-1.txz:  Upgraded.

Slackware 14.2 (Stable)

  • Tue, 09 Feb 2021 20:43:33 GMT
    patches/packages/dnsmasq-2.84-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes bugs and remotely exploitable security issues:
        Use the values of --min-port and --max-port in outgoing
        TCP connections to upstream DNS servers.
        Fix a remote buffer overflow problem in the DNSSEC code. Any
        dnsmasq with DNSSEC compiled in and enabled is vulnerable to this,
        referenced by CVE-2020-25681, CVE-2020-25682, CVE-2020-25683
        Be sure to only accept UDP DNS query replies at the address
        from which the query was originated. This keeps as much entropy
        in the {query-ID, random-port} tuple as possible, to help defeat
        cache poisoning attacks. Refer: CVE-2020-25684.
        Use the SHA-256 hash function to verify that DNS answers
        received are for the questions originally asked. This replaces
        the slightly insecure SHA-1 (when compiled with DNSSEC) or
        the very insecure CRC32 (otherwise). Refer: CVE-2020-25685.
        Handle multiple identical near simultaneous DNS queries better.
        Previously, such queries would all be forwarded
        independently. This is, in theory, inefficent but in practise
        not a problem, _except_ that is means that an answer for any
        of the forwarded queries will be accepted and cached.
        An attacker can send a query multiple times, and for each repeat,
        another {port, ID} becomes capable of accepting the answer he is
        sending in the blind, to random IDs and ports. The chance of a
        succesful attack is therefore multiplied by the number of repeats
        of the query. The new behaviour detects repeated queries and
        merely stores the clients sending repeats so that when the
        first query completes, the answer can be sent to all the
        clients who asked. Refer: CVE-2020-25686.
      For more information, see:
      (* Security fix *)
  • Tue, 26 Jan 2021 21:20:58 GMT
    patches/packages/sudo-1.9.5p2-x86_64-1_slack14.2.txz:  Upgraded.
      When invoked as sudoedit, the same set of command line options
      are now accepted as for "sudo -e". The -H and -P options are
      now rejected for sudoedit and "sudo -e" which matches the sudo
      1.7 behavior. This is part of the fix for CVE-2021-3156.
      Fixed a potential buffer overflow when unescaping backslashes
      in the command's arguments. Normally, sudo escapes special
      characters when running a command via a shell (sudo -s or sudo
      -i). However, it was also possible to run sudoedit with the -s
      or -i flags in which case no escaping had actually been done,
      making a buffer overflow possible. This fixes CVE-2021-3156.
      For more information, see:
      (* Security fix *)
  • Mon, 25 Jan 2021 01:07:00 GMT
    patches/packages/glibc-zoneinfo-2021a-noarch-1_slack14.2.txz:  Upgraded.
      This package provides the latest timezone updates.
    patches/packages/seamonkey-2.53.6-x86_64-1_slack14.2.txz:  Upgraded.
      This update contains security fixes and improvements.
      For more information, see:
      (* Security fix *)