Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

3 Febbraio 2022 - Slackware 15.0

Oggi (2 febbraio alle 22:22 orario UTC) è stata finalmente rilasciata la Slackware 15.0. Vi aspettiamo nel forum per commentare. Happy fun :)

13 Gennaio 2022 - Slackware 15 RC3

Siamo arrivati alla terza, e a meno di sorprese, l'ultima Release Candidate di Slackware 15. Da ora in poi ci saranno modifiche solo in caso di problemi seri, ma tutto lascia supporre che il 17 gennaio, come anticipato da Pat su LinuxQuestions, esca la tanto sospirata versione 15. Ti aspettiamo nel forum per parlarne.

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.


ChangeLog

Slackware Current

			
  • Wed, 05 Oct 2022 18:55:36 +0000
    Wed Oct 5 18:55:36 UTC 2022
    a/kernel-generic-5.19.14-x86_64-1.txz: Upgraded.
    a/kernel-huge-5.19.14-x86_64-1.txz: Upgraded.
    a/kernel-modules-5.19.14-x86_64-1.txz: Upgraded.
    d/kernel-headers-5.19.14-x86-1.txz: Upgraded.
    k/kernel-source-5.19.14-noarch-1.txz: Upgraded.
    n/dhcp-4.4.3_P1-x86_64-1.txz: Upgraded.
    This update fixes two security issues:
    Corrected a reference count leak that occurs when the server builds
    responses to leasequery packets.
    Corrected a memory leak that occurs when unpacking a packet that has an
    FQDN option (81) that contains a label with length greater than 63 bytes.
    Thanks to VictorV of Cyber Kunlun Lab for reporting these issues.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929
    (* Security fix *)
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
  • Wed, 05 Oct 2022 04:01:25 +0000
    Wed Oct 5 04:01:25 UTC 2022
    a/hwdata-0.363-noarch-1.txz: Upgraded.
    a/kernel-firmware-20220930_fdf1a65-noarch-1.txz: Upgraded.
    a/kernel-generic-5.19.13-x86_64-1.txz: Upgraded.
    a/kernel-huge-5.19.13-x86_64-1.txz: Upgraded.
    a/kernel-modules-5.19.13-x86_64-1.txz: Upgraded.
    ap/qpdf-11.1.1-x86_64-1.txz: Upgraded.
    d/git-2.38.0-x86_64-1.txz: Upgraded.
    d/kernel-headers-5.19.13-x86-1.txz: Upgraded.
    d/mercurial-6.2.3-x86_64-1.txz: Upgraded.
    k/kernel-source-5.19.13-noarch-1.txz: Upgraded.
    kde/calligra-3.2.1-x86_64-23.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/cantor-22.08.1-x86_64-2.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/kfilemetadata-5.98.0-x86_64-2.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/kile-2.9.93-x86_64-21.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/kitinerary-22.08.1-x86_64-2.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/krita-5.1.1-x86_64-2.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    kde/okular-22.08.1-x86_64-2.txz: Rebuilt.
    Recompiled against poppler-22.10.0.
    l/pango-1.50.11-x86_64-1.txz: Upgraded.
    l/poppler-22.10.0-x86_64-1.txz: Upgraded.
    Shared library .so-version bump.
    x/libva-2.16.0-x86_64-1.txz: Upgraded.
    xap/gnuplot-5.4.5-x86_64-1.txz: Upgraded.
    xap/mozilla-firefox-105.0.2-x86_64-1.txz: Upgraded.
    This is a bugfix release.
    For more information, see:
    https://www.mozilla.org/en-US/firefox/105.0.2/releasenotes/
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
  • Sat, 01 Oct 2022 18:38:27 +0000
    Sat Oct 1 18:38:27 UTC 2022
    a/glibc-zoneinfo-2022d-noarch-1.txz: Upgraded.
    This package provides the latest timezone updates.
    a/xz-5.2.7-x86_64-1.txz: Upgraded.
    l/glib2-2.72.4-x86_64-1.txz: Upgraded.
    n/links-2.28-x86_64-1.txz: Upgraded.

Slackware 15.0 (Stable)

			
  • Wed, 05 Oct 2022 18:55:36 +0000
    Wed Oct 5 18:55:36 UTC 2022
    patches/packages/dhcp-4.4.3_P1-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes two security issues:
    Corrected a reference count leak that occurs when the server builds
    responses to leasequery packets.
    Corrected a memory leak that occurs when unpacking a packet that has an
    FQDN option (81) that contains a label with length greater than 63 bytes.
    Thanks to VictorV of Cyber Kunlun Lab for reporting these issues.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929
    (* Security fix *)
  • Sat, 01 Oct 2022 18:38:27 +0000
    Sat Oct 1 18:38:27 UTC 2022
    patches/packages/glibc-zoneinfo-2022d-noarch-1_slack15.0.txz: Upgraded.
    This package provides the latest timezone updates.
  • Fri, 30 Sep 2022 17:52:21 +0000
    Fri Sep 30 17:52:21 UTC 2022
    extra/php80/php80-8.0.24-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and security issues:
    phar wrapper: DOS when using quine gzip file.
    Don't mangle HTTP variable names that clash with ones that have a specific
    semantic meaning.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
    (* Security fix *)
    extra/php81/php81-8.1.11-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and security issues:
    phar wrapper: DOS when using quine gzip file.
    Don't mangle HTTP variable names that clash with ones that have a specific
    semantic meaning.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
    (* Security fix *)
    patches/packages/mozilla-thunderbird-102.3.1-x86_64-1_slack15.0.txz: Upgraded.
    This release contains security fixes and improvements.
    For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.3.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-43/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236
    (* Security fix *)
    patches/packages/php-7.4.32-x86_64-1_slack15.0.txz: Upgraded.
    This update fixes bugs and security issues:
    phar wrapper: DOS when using quine gzip file.
    Don't mangle HTTP variable names that clash with ones that have a specific
    semantic meaning.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
    (* Security fix *)
    patches/packages/seamonkey-2.53.14-x86_64-1_slack15.0.txz: Upgraded.
    This update contains security fixes and improvements.
    For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.14
    (* Security fix *)
    patches/packages/vim-9.0.0623-x86_64-1_slack15.0.txz: Upgraded.
    Fixed use-after-free and stack-based buffer overflow.
    Thanks to marav for the heads-up.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3352
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3324
    (* Security fix *)
    patches/packages/vim-gvim-9.0.0623-x86_64-1_slack15.0.txz: Upgraded.