Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

16 Agosto 2021 - Slackware 15 RC1

È uscita stanotte la prima Release Candidate di Slackware 15. Come ha scritto Pat si tratta di un "congelamento", a meno di bugfix. Questo significa che la 15.0 sarà rilasciata con i software nella versione presente in questa RC1, a meno appunto di bug trovati, o aggiornamenti di sicurezza.

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.

16 Febbraio 2021 - Slackware 15 alpha1

Come potete leggere nel ChangeLog sotto, ieri sera è stata rilasciata la versione alpha1 del prossimo ramo stabile di Slackware, che sarà il 15.0.

Provatela, segnalate bug, e commentate sul forum.

Se decidete di provarla facendo l'upgrade dalla 14.2 state attenti al cambiamento di nome di alcuni pacchetti, maggiori info nel forum. Happy Slack!

10 Dicembre 2020 - Habemus Plasma

Dopo un'attesa lunga mesi, il 7 Dicembre 2020 Pat ha finalmente introdotto Plasma5 (KDE5) nel ramo current della Slackware. I tempi sono maturi per la prossima release, la 15.0.

Vi invitiamo a commentare nel nostro forum. Happy Slack a tutti.


ChangeLog

Slackware Current

			
  • Fri, 17 Sep 2021 17:22:57 GMT
    kde/plasma-workspace-5.22.5-x86_64-2.txz:  Rebuilt.
      Patched to fix USB storage devices detected only once per session.
      Thanks to ctrlaltca.
    n/NetworkManager-1.32.10-x86_64-4.txz:  Rebuilt.
      Patched to shut down dhcpcd gracefully, and restored dhcpcd as the default
      client when using NetworkManager on Slackware. In this case I'll swim
      upstream if it means better security. Who knows what your DHCP server might
      attempt when it comes to public WiFi? :-)
      Thanks to Roy Marples and marav.
    n/gnupg2-2.2.31-x86_64-1.txz:  Upgraded.
    xap/pidgin-2.14.7-x86_64-1.txz:  Upgraded.
    
  • Fri, 17 Sep 2021 04:17:57 GMT
    a/cryptsetup-2.4.1-x86_64-1.txz:  Upgraded.
    a/sysvinit-scripts-15.0-noarch-5.txz:  Rebuilt.
      Stop D-Bus after NFS partitions are unmounted to avoid a hang.
      Thanks to vulcan59 and bassmadrigal.
    ap/sudo-1.9.8p1-x86_64-1.txz:  Upgraded.
    l/fftw-3.3.10-x86_64-1.txz:  Upgraded.
    l/libxkbcommon-1.3.1-x86_64-1.txz:  Upgraded.
    l/pipewire-0.3.36-x86_64-1.txz:  Upgraded.
    n/dhcpcd-9.4.0-x86_64-2.txz:  Rebuilt.
      Applied upstream patch:
      DHCP6: Only send FQDN for SOLICIT, REQUEST, RENEW, or REBIND messages.
      Thanks to marav.
    n/httpd-2.4.49-x86_64-1.txz:  Upgraded.
      This release contains security fixes and improvements.
      mod_proxy: Server Side Request Forgery (SSRF) vulnerabilty [Yann Ylavic]
      core: ap_escape_quotes buffer overflow
      mod_proxy_uwsgi: Out of bound read vulnerability [Yann Ylavic]
      core: null pointer dereference on malformed request
      mod_http2: Request splitting vulnerability with mod_proxy [Stefan Eissing]
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
      (* Security fix *)
    x/ibus-libpinyin-1.12.1-x86_64-1.txz:  Upgraded.
    x/libpinyin-2.6.1-x86_64-1.txz:  Upgraded.
    xap/mozilla-thunderbird-91.1.1-x86_64-1.txz:  Upgraded.
      This is a bugfix release.
      For more information, see:
        https://www.mozilla.org/en-US/thunderbird/91.1.1/releasenotes/
    
  • Thu, 16 Sep 2021 18:33:01 GMT
    a/kernel-generic-5.14.5-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.14.5-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.14.5-x86_64-1.txz:  Upgraded.
    d/kernel-headers-5.14.5-x86-1.txz:  Upgraded.
    k/kernel-source-5.14.5-noarch-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    

Slackware 14.2 (Stable)

			
  • Fri, 17 Sep 2021 04:17:57 GMT
    patches/packages/httpd-2.4.49-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains security fixes and improvements.
      mod_proxy: Server Side Request Forgery (SSRF) vulnerabilty [Yann Ylavic]
      core: ap_escape_quotes buffer overflow
      mod_proxy_uwsgi: Out of bound read vulnerability [Yann Ylavic]
      core: null pointer dereference on malformed request
      mod_http2: Request splitting vulnerability with mod_proxy [Stefan Eissing]
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
      (* Security fix *)
    
  • Thu, 16 Sep 2021 02:52:54 GMT
    patches/packages/curl-7.79.0-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes security issues:
      clear the leftovers pointer when sending succeeds.
      do not ignore --ssl-reqd.
      reject STARTTLS server response pipelining.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
      (* Security fix *)
    
  • Tue, 31 Aug 2021 20:58:13 GMT
    patches/packages/ntfs-3g-2021.8.22-x86_64-1_slack14.2.txz:  Upgraded.
      Shared library .so-version bump.
      Fixed vulnerabilities that may allow an attacker using a maliciously
      crafted NTFS-formatted image file or external storage to potentially
      execute arbitrary privileged code.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263
      (* Security fix *)