Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

13 Gennaio 2022 - Slackware 15 RC3

Siamo arrivati alla terza, e a meno di sorprese, l'ultima Release Candidate di Slackware 15. Da ora in poi ci saranno modifiche solo in caso di problemi seri, ma tutto lascia supporre che il 17 gennaio, come anticipato da Pat su LinuxQuestions, esca la tanto sospirata versione 15. Ti aspettiamo nel forum per parlarne.

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.

16 Febbraio 2021 - Slackware 15 alpha1

Come potete leggere nel ChangeLog sotto, ieri sera è stata rilasciata la versione alpha1 del prossimo ramo stabile di Slackware, che sarà il 15.0.

Provatela, segnalate bug, e commentate sul forum.

Se decidete di provarla facendo l'upgrade dalla 14.2 state attenti al cambiamento di nome di alcuni pacchetti, maggiori info nel forum. Happy Slack!


ChangeLog

Slackware Current

			
  • Fri, 28 Jan 2022 21:01:03 GMT
    a/plzip-1.10-x86_64-1.txz:  Upgraded.
    ap/sudo-1.9.9-x86_64-1.txz:  Upgraded.
    d/Cython-0.29.27-x86_64-1.txz:  Upgraded.
    d/poke-2.0-x86_64-1.txz:  Upgraded.
    l/python-charset-normalizer-2.0.10-x86_64-1.txz:  Upgraded.
    x/mesa-21.3.5-x86_64-2.txz:  Rebuilt.
      Include eglinfo utility. Thanks to LuckyCyborg.
    x/wayland-protocols-1.25-noarch-1.txz:  Upgraded.
    
  • Thu, 27 Jan 2022 22:43:13 GMT
    a/aaa_libraries-15.0-x86_64-18.txz:  Rebuilt.
      Rebuilt to pick up the patched libexpat.so.1.8.3.
    a/kernel-generic-5.15.17-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.15.17-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.15.17-x86_64-1.txz:  Upgraded.
    a/lzlib-1.13-x86_64-1.txz:  Upgraded.
    a/sysvinit-scripts-15.0-noarch-8.txz:  Rebuilt.
      rc.S: clear /var/lock/subsys before starting libcgroup services.
      Thanks to pyllyukko.
    ap/pamixer-1.5-x86_64-2.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    d/kernel-headers-5.15.17-x86-1.txz:  Upgraded.
    k/kernel-source-5.15.17-noarch-1.txz:  Upgraded.
    kde/kig-21.12.1-x86_64-2.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    kde/kopeninghours-21.12.1-x86_64-2.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    kde/krita-5.0.2-x86_64-2.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    l/boost-1.78.0-x86_64-1.txz:  Upgraded.
      I hadn't planned to update this at such a late stage, but POV-Ray needs it
      and everything we ship builds fine against it. Thanks to bender647.
      Shared library .so-version bump.
    l/cryfs-0.10.3-x86_64-4.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    l/expat-2.4.3-x86_64-3.txz:  Rebuilt.
      Prevent integer overflow in doProlog.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
      (* Security fix *)
    l/netpbm-10.97.03-x86_64-1.txz:  Upgraded.
    l/openexr-2.5.7-x86_64-5.txz:  Rebuilt.
      Recompiled against boost-1.78.0.
    l/pipewire-0.3.44-x86_64-1.txz:  Upgraded.
    n/fetchmail-6.4.27-x86_64-1.txz:  Upgraded.
    n/libgpg-error-1.44-x86_64-1.txz:  Upgraded.
    x/mesa-21.3.5-x86_64-1.txz:  Upgraded.
    xap/mozilla-firefox-91.5.1esr-x86_64-1.txz:  Upgraded.
      This is a bugfix release.
      For more information, see:
        https://www.mozilla.org/en-US/firefox/91.5.1/releasenotes/
      (* Security fix *)
    extra/rust-for-mozilla/rust-1.54.0-x86_64-4.txz:  Rebuilt.
      Removed duplicated libLLVM shared library.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    
  • Wed, 26 Jan 2022 20:46:44 GMT
    a/aaa_libraries-15.0-x86_64-17.txz:  Rebuilt.
      Upgraded: libcap.so.2.63, libglib-2.0.so.0.7000.3,
      libgmodule-2.0.so.0.7000.3, libgobject-2.0.so.0.7000.3,
      libgthread-2.0.so.0.7000.3, libtdb.so.1.4.6.
    a/mkinitrd-1.4.11-x86_64-28.txz:  Rebuilt.
      Support kernel modules compressed with xz. Thanks to baldzhang.
    l/glib2-2.70.3-x86_64-1.txz:  Upgraded.
    l/libcap-2.63-x86_64-1.txz:  Upgraded.
    n/bluez-5.63-x86_64-2.txz:  Rebuilt.
      rc.bluetooth: use #!/bin/bash shebang.
      Filter commented and empty lines when parsing uart.conf.
      Thanks to atelszewski.
    

Slackware 14.2 (Stable)

			
  • Thu, 27 Jan 2022 22:54:57 GMT
    patches/packages/expat-2.4.3-x86_64-3_slack14.2.txz:  Rebuilt.
      Prevent integer overflow in doProlog.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
      (* Security fix *)
    
  • Wed, 26 Jan 2022 04:37:35 GMT
    patches/packages/polkit-0.113-x86_64-4_slack14.2.txz:  Rebuilt.
      [PATCH] pkexec: local privilege escalation.
      Thanks to Qualys Research Labs for reporting this issue.
      For more information, see:
        https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
      (* Security fix *)
    
  • Tue, 25 Jan 2022 06:16:36 GMT
    patches/packages/expat-2.4.3-x86_64-2_slack14.2.txz:  Rebuilt.
      Fix signed integer overflow in function XML_GetBuffer for when
      XML_CONTEXT_BYTES is defined to >0 (which is both common and
      default). Impact is denial of service or other undefined behavior.
      While we're here, also patch a memory leak on output file opening error.
      Thanks to marav.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
      (* Security fix *)