Benvenuti su Slacky.eu - Italian Slackware Community

Community dedicata alla distribuzione Slackware Linux.

Slacky.eu è un progetto che offre un Forum in italiano per Slackware Linux, leggi la nostra storia.

Aggiornamenti dal mondo Slackware

News

15 Aprile 2021 - Slackware 15 beta

Qualche giorno fa Pat ha rilasciato un corposo aggiornamento definendolo beta. La data dell'uscita di Slackware 15 si fa sempre più vicina.

16 Febbraio 2021 - Slackware 15 alpha1

Come potete leggere nel ChangeLog sotto, ieri sera è stata rilasciata la versione alpha1 del prossimo ramo stabile di Slackware, che sarà il 15.0.

Provatela, segnalate bug, e commentate sul forum.

Se decidete di provarla facendo l'upgrade dalla 14.2 state attenti al cambiamento di nome di alcuni pacchetti, maggiori info nel forum. Happy Slack!

10 Dicembre 2020 - Habemus Plasma

Dopo un'attesa lunga mesi, il 7 Dicembre 2020 Pat ha finalmente introdotto Plasma5 (KDE5) nel ramo current della Slackware. I tempi sono maturi per la prossima release, la 15.0.

Vi invitiamo a commentare nel nostro forum. Happy Slack a tutti.


ChangeLog

Slackware Current

			
  • Sat, 31 Jul 2021 17:52:38 GMT
    a/btrfs-progs-5.13.1-x86_64-1.txz:  Upgraded.
    a/kernel-generic-5.13.7-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.13.7-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.13.7-x86_64-1.txz:  Upgraded.
    d/kernel-headers-5.13.7-x86-1.txz:  Upgraded.
    d/python-pip-21.2.2-x86_64-1.txz:  Upgraded.
    k/kernel-source-5.13.7-noarch-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    
  • Fri, 30 Jul 2021 18:19:26 GMT
    d/rust-1.54.0-x86_64-1.txz:  Upgraded.
    n/fetchmail-6.4.20-x86_64-1.txz:  Upgraded.
    n/php-7.4.22-x86_64-1.txz:  Upgraded.
    x/mesa-21.1.6-x86_64-1.txz:  Upgraded.
    x/xf86-video-amdgpu-21.0.0-x86_64-1.txz:  Upgraded.
    x/xorg-server-1.20.13-x86_64-1.txz:  Upgraded.
    x/xorg-server-xephyr-1.20.13-x86_64-1.txz:  Upgraded.
    x/xorg-server-xnest-1.20.13-x86_64-1.txz:  Upgraded.
    x/xorg-server-xvfb-1.20.13-x86_64-1.txz:  Upgraded.
    extra/php8/php8-8.0.9-x86_64-1.txz:  Upgraded.
    
  • Wed, 28 Jul 2021 22:48:44 GMT
    a/e2fsprogs-1.46.3-x86_64-1.txz:  Upgraded.
    a/kernel-generic-5.13.6-x86_64-1.txz:  Upgraded.
    a/kernel-huge-5.13.6-x86_64-1.txz:  Upgraded.
    a/kernel-modules-5.13.6-x86_64-1.txz:  Upgraded.
    a/libblockdev-2.26-x86_64-1.txz:  Upgraded.
    ap/vim-8.2.3238-x86_64-1.txz:  Upgraded.
    d/kernel-headers-5.13.6-x86-1.txz:  Upgraded.
    k/kernel-source-5.13.6-noarch-1.txz:  Upgraded.
    l/libgnt-2.14.2-x86_64-1.txz:  Upgraded.
    l/pulseaudio-15.0-x86_64-1.txz:  Upgraded.
    n/ipset-7.14-x86_64-1.txz:  Upgraded.
    xap/vim-gvim-8.2.3238-x86_64-1.txz:  Upgraded.
    isolinux/initrd.img:  Rebuilt.
    kernels/*:  Upgraded.
    usb-and-pxe-installers/usbboot.img:  Rebuilt.
    

Slackware 14.2 (Stable)

			
  • Wed, 21 Jul 2021 18:16:58 GMT
    patches/packages/curl-7.78.0-x86_64-1_slack14.2.txz:  Upgraded.
      This update fixes security issues:
      CURLOPT_SSLCERT mixup with Secure Transport
      TELNET stack contents disclosure again
      Bad connection reuse due to flawed path name checks
      Metalink download sends credentials
      Wrong content via metalink not discarded
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
      (* Security fix *)
    
  • Wed, 21 Jul 2021 05:30:44 GMT
    patches/packages/linux-4.4.276/*:  Upgraded.
      These updates fix various bugs and security issues, including the recently
      announced local privilege escalation vulnerability in the filesystem layer
      (CVE-2021-33909).
      Be sure to upgrade your initrd after upgrading the kernel packages.
      If you use lilo to boot your machine, be sure lilo.conf points to the correct
      kernel and initrd and run lilo as root to update the bootloader.
      If you use elilo to boot your machine, you should run eliloconfig to copy the
      kernel and initrd to the EFI System Partition.
      For more information, see:
        https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
        Fixed in 4.4.262:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
        Fixed in 4.4.263:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
        Fixed in 4.4.264:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688
        Fixed in 4.4.265:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483
        Fixed in 4.4.266:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154
        Fixed in 4.4.267:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671
        Fixed in 4.4.269:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0605
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
        Fixed in 4.4.270:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
        Fixed in 4.4.271:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399
        Fixed in 4.4.272:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3587
        Fixed in 4.4.274:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
        Fixed in 4.4.276:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
      (* Security fix *)
  • Mon, 07 Jun 2021 18:53:49 GMT
    patches/packages/httpd-2.4.48-x86_64-1_slack14.2.txz:  Upgraded.
      This release contains security fixes and improvements.
      mod_http2: Fix a potential NULL pointer dereference.
      Unexpected <Location> section matching with 'MergeSlashes OFF'.
      mod_auth_digest: possible stack overflow by one nul byte while validating
      the Digest nonce.
      mod_session: Fix possible crash due to NULL pointer dereference, which
      could be used to cause a Denial of Service with a malicious backend
      server and SessionHeader.
      mod_session: Fix possible crash due to NULL pointer dereference, which
      could be used to cause a Denial of Service.
      mod_proxy_http: Fix possible crash due to NULL pointer dereference, which
      could be used to cause a Denial of Service.
      mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end
      negotiation.
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
      (* Security fix *)
    patches/packages/libX11-1.7.2-x86_64-1_slack14.2.txz:  Upgraded.
      This is a bug fix release, correcting a regression introduced by and
      improving the checks from the fix for CVE-2021-31535.
    patches/packages/polkit-0.113-x86_64-3_slack14.2.txz:  Rebuilt.
      This update includes a mitigation for local privilege escalation using
      polkit_system_bus_name_get_creds_sync().
      For more information, see:
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560
      (* Security fix *)