Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

Slackware Current

			
  • Sun, 05 Apr 2020 01:33:45 GMT
    kde/calligra-2.9.11-x86_64-34.txz:  Rebuilt.
      Recompiled against glew-2.2.0.
      The libGLEW.so.2.2 .soname (rather than libGLEW.so.2) gets me every time.
      Thanks to marrowsuck for the bug report.
    l/libdvdread-6.1.1-x86_64-1.txz:  Upgraded.
    x/mesa-20.0.4-x86_64-2.txz:  Rebuilt.
      Recompiled against glew-2.2.0.
    
  • Sat, 04 Apr 2020 19:22:23 GMT
    ap/sc-7.16-x86_64-8.txz:  Rebuilt.
      Fixed permissions on installed binaries. Thanks to mats_b_tegner.
    ap/sc-im-20200210_862c273-x86_64-1.txz:  Upgraded.
      Switched to pulling from git to fix various crashes.
    x/glew-2.2.0-x86_64-1.txz:  Upgraded.
      Shared library .so-version bump.
    
  • Fri, 03 Apr 2020 23:07:16 GMT
    ap/lsof-4.93.2-x86_64-2.txz:  Rebuilt.
      Fixed the manpage. Thanks to kaott.
    ap/sc-7.16-x86_64-7.txz:  Rebuilt.
      Brought back the classic SC. Thanks to dive.
    d/Cython-0.29.16-x86_64-1.txz:  Upgraded.
    d/mercurial-5.3.2-x86_64-1.txz:  Upgraded.
    l/gtk+3-3.24.17-x86_64-1.txz:  Upgraded.
    n/dhcpcd-8.1.7-x86_64-1.txz:  Upgraded.
    n/iproute2-5.6.0-x86_64-1.txz:  Upgraded.
    x/libdrm-2.4.101-x86_64-1.txz:  Upgraded.
    x/mesa-20.0.4-x86_64-1.txz:  Upgraded.
    xap/mozilla-firefox-68.6.1esr-x86_64-1.txz:  Upgraded.
      This release contains critical security fixes and improvements.
      "Under certain conditions, when running the nsDocShell destructor, a race
      condition can cause a use-after-free. We are aware of targeted attacks in
      the wild abusing this flaw."
      "Under certain conditions, when handling a ReadableStream, a race condition
      can cause a use-after-free. We are aware of targeted attacks in the wild
      abusing this flaw."
      For more information, see:
        https://www.mozilla.org/en-US/firefox/68.6.1/releasenotes/
        https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820
      (* Security fix *)
    

Slackware 14.2 (Stable)

			
  • Fri, 03 Apr 2020 23:07:16 GMT
    patches/packages/mozilla-firefox-68.6.1esr-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains critical security fixes and improvements.
      "Under certain conditions, when running the nsDocShell destructor, a race
      condition can cause a use-after-free. We are aware of targeted attacks in
      the wild abusing this flaw."
      "Under certain conditions, when handling a ReadableStream, a race condition
      can cause a use-after-free. We are aware of targeted attacks in the wild
      abusing this flaw."
      For more information, see:
        https://www.mozilla.org/en-US/firefox/68.6.1/releasenotes/
        https://www.mozilla.org/en-US/security/advisories/mfsa2020-11/
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820
      (* Security fix *)
    
  • Tue, 31 Mar 2020 19:01:17 GMT
    patches/packages/gnutls-3.6.13-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes a security issue:
      libgnutls: Fix a DTLS-protocol regression (caused by TLS1.3 support),
      since 3.6.3. The DTLS client would not contribute any randomness to the
      DTLS negotiation, breaking the security guarantees of the DTLS protocol.
      [GNUTLS-SA-2020-03-31, CVSS: high]
      (* Security fix *)
    patches/packages/httpd-2.4.43-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains security fixes (since 2.4.39) and improvements.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
      (* Security fix *)
    
  • Thu, 26 Mar 2020 22:37:06 GMT
    patches/packages/linux-4.4.217/*:  Upgraded.
      These updates fix various bugs and security issues.
      Be sure to upgrade your initrd after upgrading the kernel packages.
      If you use lilo to boot your machine, be sure lilo.conf points to the correct
      kernel and initrd and run lilo as root to update the bootloader.
      If you use elilo to boot your machine, you should run eliloconfig to copy the
      kernel and initrd to the EFI System Partition.
      For more information, see:
        Fixed in 4.4.209:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
        Fixed in 4.4.210:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
        Fixed in 4.4.211:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21008
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15220
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108
        Fixed in 4.4.212:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897
        Fixed in 4.4.215:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0009
        Fixed in 4.4.216:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648
        Fixed in 4.4.217:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901
      (* Security fix *)