Aggancia questa barra allo schermo |  Disattiva gli effetti grafici

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Slackware Linux e risoluzione di problemi, di Andrea Peluso


ChangeLog repository

Repository Rss

blender-3.0.1-x86_64-1_ap.txz:  Upgraded.

ChangeLog Slackware current

ChangeLog x86 Rss - ChangeLog x86_64 Rss

ap/mariadb-11.8.6-x86_64-2.txz:  Rebuilt.
  Patched to fix akonadiserver crash.
  Thanks to Heinz Wiesinger.
kde/wcslib-8.6-x86_64-1.txz:  Upgraded.
l/bstring-1.1.0-x86_64-1.txz:  Upgraded.
l/python-installer-1.0.0-x86_64-1.txz:  Upgraded.
l/python-numpy-2.4.4-x86_64-1.txz:  Upgraded.
l/python-pygments-2.20.0-x86_64-1.txz:  Upgraded.
n/ngtcp2-1.22.0-x86_64-1.txz:  Upgraded.
x/setxkbmap-1.3.5-x86_64-1.txz:  Upgraded.
xfce/thunar-4.20.8-x86_64-1.txz:  Upgraded.

a/tree-2.3.1-x86_64-1.txz:  Upgraded.
d/cmake-4.3.1-x86_64-1.txz:  Upgraded.
d/re2c-4.5.1-x86_64-1.txz:  Upgraded.
xap/gimp-3.2.2-x86_64-1.txz:  Upgraded.
  Disable Lua bindings as recommended by upstream. Thanks to kgha.

a/kernel-firmware-20260327_85786b4-noarch-1.txz:  Upgraded.
a/sysvinit-3.18-x86_64-1.txz:  Upgraded.
l/libjpeg-turbo-3.1.4.1-x86_64-1.txz:  Upgraded.
xfce/xfdesktop-4.20.2-x86_64-1.txz:  Upgraded.

ChangeLog Slackware arm 64 current

ChangeLog arm 64 Rss


Hello!

If you appreciate what we're doing with Slackware Linux on ARM, please consider
making a donation to support us. Your contribution helps maintain essential
hardware, cover electricity costs, and keep this longstanding open-source
project moving.

You'll find the ways you can help here:
   https://arm.slackware.com/sponsor/

Thanks for all of your support!

Stuart Winter <mozes@slackware>
Brent Earl <el0226@slackware>

a/kernel-firmware-20260323_51d2775-noarch-1.txz:  Upgraded.
a/kernel_armv8-6.18.20-aarch64-1.txz:  Upgraded.
a/sysvinit-3.17-aarch64-1.txz:  Upgraded.
d/kernel-headers-6.18.20-aarch64-1.txz:  Upgraded.
d/llvm-22.1.2-aarch64-1.txz:  Upgraded.
k/kernel-source-6.18.20-aarch64-1.txz:  Upgraded.
l/libcap-ng-0.9.2-aarch64-1.txz:  Upgraded.
l/libclc-22.1.2-aarch64-1.txz:  Upgraded.
l/nodejs-24.14.1-aarch64-1.txz:  Upgraded.
l/pygobject3-3.56.2-aarch64-1.txz:  Upgraded.
l/python-build-1.4.2-aarch64-1.txz:  Upgraded.
l/python-requests-2.33.0-aarch64-1.txz:  Upgraded.
l/wireplumber-0.5.14-aarch64-1.txz:  Upgraded.
n/bind-9.20.21-aarch64-1.txz:  Upgraded.
  This update fixes security issues:
  Fix unbounded NSEC3 iterations when validating referrals to unsigned
  delegations.
  Fix memory leaks in code preparing DNSSEC proofs of non-existence.
  Prevent a crash in code processing queries containing a TKEY record.
  Fix a stack use-after-return flaw in SIG(0) handling code.
  For more information, see:
    https://kb.isc.org/docs/cve-2026-1519
    https://kb.isc.org/docs/cve-2026-3104
    https://kb.isc.org/docs/cve-2026-3119
    https://kb.isc.org/docs/cve-2026-3591
    https://www.cve.org/CVERecord?id=CVE-2026-1519
    https://www.cve.org/CVERecord?id=CVE-2026-3104
    https://www.cve.org/CVERecord?id=CVE-2026-3119
    https://www.cve.org/CVERecord?id=CVE-2026-3591
  (* Security fix *)
x/intel-gmmlib-22.10.0-aarch64-1.txz:  Upgraded.
extra/tigervnc/tigervnc-1.16.1-aarch64-1.txz:  Upgraded.
  The bug fix release TigerVNC 1.16.1 is now available. This release is
  primarily a security release to fix an issue in x0vncserver, where other
  users can observe and manipulate the screen contents. Users of
  x0vncserver are advised to update immediately.
  The release also contains a fix for using the Plain security type with
  the new w0vncserver, as well as some translation updates.
  (* Security fix *)
installer/*:  Rebuilt.
kernels/*:  Upgraded.

a/kernel_armv8-6.18.19-aarch64-1.txz:  Upgraded.
  /boot/initrd/[load_kernel_modules.scr/platform/aarch64/]:
  Renamed:
  rpi_generic -> broadcom
  rk3399 -> rockchip
  lx2160acex7 > layerscape
  sc8280xp > snapdragon
  pine64_sbc > allwinner
  This broader categorisation helps onboard new Hardware Models more easily and
  reduces code/config duplication.
  Thanks to SCerovec for the suggestion.

  /boot/initrd/[/usr/share/hwm-configure/platform/aarch64/modprobe.d/]
  Renamed the modprobe config files in line with the above changes to the module
  loader scripts:
  sc8280xp_thinkpad-x13s.conf > snapdragon_thinkpad-x13s.conf
  rpi_rpi_generic.conf > broadcom_rpi.conf
  rk3399_opi.conf > rockchip_orangepi.conf
  rk3399_pine64_pbpro.conf > rockchip_pinebookpro.conf
  rk3399_pine64_ppp.conf > rockchip_pinephonepro.conf
  rk3399_pine64_rp64.conf > rockchip_rockpro64.conf
  rk3399_radxa_rockpi4.conf > rockchip_radxa_rockpi4.conf

d/kernel-headers-6.18.19-aarch64-1.txz:  Upgraded.
d/re2c-4.5-aarch64-1.txz:  Upgraded.
k/kernel-source-6.18.19-aarch64-1.txz:  Upgraded.
kde/krita-6.0.0-aarch64-1.txz:  Upgraded.
kde/xsimd-14.1.0-aarch64-1.txz:  Added.
  Needed by krita-6.0.0.
l/eigen3-3.4.1-aarch64-2.txz:  Rebuilt.
  Rebuilt to update cmake_policy VERSION.
l/frei0r-plugins-2.5.6-aarch64-1.txz:  Upgraded.
l/gegl-0.4.70-aarch64-1.txz:  Upgraded.
l/gtk+3-3.24.52-aarch64-1.txz:  Upgraded.
l/imagemagick-7.1.2_18-aarch64-1.txz:  Upgraded.
l/mozilla-nss-3.122-aarch64-1.txz:  Upgraded.
l/mozjs140-140.9.0esr-aarch64-1.txz:  Upgraded.
l/openblas-0.3.32-aarch64-1.txz:  Upgraded.
l/pango-1.57.1-aarch64-1.txz:  Upgraded.
l/sip-6.15.3-aarch64-1.txz:  Upgraded.
xap/mozilla-firefox-140.9.0esr-aarch64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/140.9.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2026-22/
    https://www.cve.org/CVERecord?id=CVE-2026-4684
    https://www.cve.org/CVERecord?id=CVE-2026-4685
    https://www.cve.org/CVERecord?id=CVE-2026-4686
    https://www.cve.org/CVERecord?id=CVE-2026-4687
    https://www.cve.org/CVERecord?id=CVE-2026-4688
    https://www.cve.org/CVERecord?id=CVE-2026-4689
    https://www.cve.org/CVERecord?id=CVE-2026-4690
    https://www.cve.org/CVERecord?id=CVE-2026-4691
    https://www.cve.org/CVERecord?id=CVE-2026-4692
    https://www.cve.org/CVERecord?id=CVE-2026-4693
    https://www.cve.org/CVERecord?id=CVE-2026-4694
    https://www.cve.org/CVERecord?id=CVE-2026-4695
    https://www.cve.org/CVERecord?id=CVE-2026-4696
    https://www.cve.org/CVERecord?id=CVE-2026-4697
    https://www.cve.org/CVERecord?id=CVE-2026-4698
    https://www.cve.org/CVERecord?id=CVE-2026-4699
    https://www.cve.org/CVERecord?id=CVE-2026-4700
    https://www.cve.org/CVERecord?id=CVE-2026-4701
    https://www.cve.org/CVERecord?id=CVE-2026-4702
    https://www.cve.org/CVERecord?id=CVE-2026-4704
    https://www.cve.org/CVERecord?id=CVE-2026-4705
    https://www.cve.org/CVERecord?id=CVE-2026-4706
    https://www.cve.org/CVERecord?id=CVE-2026-4707
    https://www.cve.org/CVERecord?id=CVE-2026-4708
    https://www.cve.org/CVERecord?id=CVE-2026-4709
    https://www.cve.org/CVERecord?id=CVE-2026-4710
    https://www.cve.org/CVERecord?id=CVE-2026-4711
    https://www.cve.org/CVERecord?id=CVE-2026-4712
    https://www.cve.org/CVERecord?id=CVE-2026-4713
    https://www.cve.org/CVERecord?id=CVE-2026-4714
    https://www.cve.org/CVERecord?id=CVE-2026-4715
    https://www.cve.org/CVERecord?id=CVE-2026-4716
    https://www.cve.org/CVERecord?id=CVE-2026-4717
    https://www.cve.org/CVERecord?id=CVE-2025-59375
    https://www.cve.org/CVERecord?id=CVE-2026-4718
    https://www.cve.org/CVERecord?id=CVE-2026-4719
    https://www.cve.org/CVERecord?id=CVE-2026-4720
    https://www.cve.org/CVERecord?id=CVE-2026-4721
  (* Security fix *)
xap/mozilla-thunderbird-140.9.0esr-aarch64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/140.9.0esr/releasenotes/
  (* Security fix *)
installer/*:  Rebuilt.
kernels/*:  Upgraded.

a/btrfs-progs-6.19.1-aarch64-1.txz:  Upgraded.
a/eudev-3.2.14-aarch64-3.txz:  Rebuilt.
  watchdog.conf: blacklist some additional watchdog modules:
  intel_oc_wdt, lenovo_se30_wdt, max77620_wdt, nct6694_wdt.
  Thanks to rworkman.
  Change perms on kvm and vhost-net from 666 to 660 as recommended for QEMU.
a/file-5.47-aarch64-2.txz:  Rebuilt.
  Package the ChangeLog. Thanks to slakmagik.
a/kernel-firmware-20260318_217ca6e-noarch-1.txz:  Upgraded.
a/lzip-1.26-aarch64-1.txz:  Upgraded.
a/sysvinit-3.16-aarch64-1.txz:  Upgraded.
a/sysvinit-scripts-15.1-noarch-45.txz:  Rebuilt.
a/xfsprogs-6.19.0-aarch64-1.txz:  Upgraded.
ap/ghostscript-10.07.0-aarch64-1.txz:  Upgraded.
ap/qemu-10.2.2-aarch64-1.txz:  Added.
  Support passing a custom TARGET_LIST. Thanks to henca.
  Add sparc and sparc64 targets. Thanks to jayjwa.
  Add aarch64 targets. Thanks to jtsn.
  Added additional targets: loongarch64-softmmu, loongarch64-linux-user,
  riscv32-softmmu, riscv32-linux-user, riscv64-softmmu, and riscv64-linux-user.
  Thanks to ZhaoLin1547.
  Thanks to alienBOB for the original build script.
ap/qemu-guest-agent-10.2.2-aarch64-.txz:  Added.
  Thanks to alienBOB.
ap/sqlite-3.51.3-aarch64-1.txz:  Upgraded.
d/autoconf-2.73-noarch-1.txz:  Upgraded.
d/ccache-4.13.2-aarch64-1.txz:  Upgraded.
d/cmake-4.3.0-aarch64-1.txz:  Upgraded.
d/device-tree-compiler-1.7.2-aarch64-1.txz:  Removed.
  Renamed 'dtc' in the 'l' package series, in sync with upstream Slackware.
d/ruby-4.0.2-aarch64-1.txz:  Upgraded.
kde/marble-23.08.5-aarch64-13.txz:  Rebuilt.
  Recompiled against protobuf-34.1.
l/accountsservice-26.12.8-aarch64-1.txz:  Upgraded.
l/adwaita-icon-theme-50.0-aarch64-1.txz:  Upgraded.
l/aom-3.13.2-aarch64-1.txz:  Upgraded.
l/dtc-1.7.2-aarch64-1.txz:  Added.
  This replaces the Slackware ARM addition which was named 'device-tree-compiler',
  but provides the same functionality.
  Thanks to alienBOB.
l/expat-2.7.5-aarch64-1.txz:  Upgraded.
  This update fixes security issues:
  Fix NULL function pointer dereference for empty external parameter entities;
  it takes use of both functions XML_ExternalEntityParserCreate and
  XML_SetParamEntityParsing for an application to be vulnerable.
  Protect from XML_TOK_INSTANCE_START infinite loop in function
  entityValueProcessor; it takes use of both functions
  XML_ExternalEntityParserCreate and XML_SetParamEntityParsing for an
  application to be vulnerable.
  Fix NULL dereference in function setContext on retry after an earlier
  ouf-of-memory condition; it takes use of function XML_ParserCreateNS or
  XML_ParserCreate_MM for an application to be vulnerable.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2026-32776
    https://www.cve.org/CVERecord?id=CVE-2026-32777
    https://www.cve.org/CVERecord?id=CVE-2026-32778
  (* Security fix *)
l/freetype-2.14.3-aarch64-1.txz:  Upgraded.
l/glibmm2-2.88.0-aarch64-1.txz:  Upgraded.
l/graphviz-14.1.4-aarch64-1.txz:  Upgraded.
l/gspell-1.14.3-aarch64-1.txz:  Upgraded.
l/harfbuzz-13.2.1-aarch64-1.txz:  Upgraded.
l/icu4c-78.3-aarch64-1.txz:  Upgraded.
l/libcacard-2.8.2-aarch64-1.txz:  Added.
  Needed by qemu-10.2.2.
  Thanks to Matteo Bernardini.
l/libgsf-1.14.56-aarch64-1.txz:  Upgraded.
l/librsvg-2.62.1-aarch64-1.txz:  Upgraded.
l/openjph-0.26.3-aarch64-2.txz:  Rebuilt.
  Fixed slack-desc typo. Thanks to slakmagik.
l/protobuf-34.1-aarch64-1.txz:  Upgraded.
  Shared library .so-version bump.
  (Or, at least, we've been told to always expect ABI breakage)
l/python-attrs-26.1.0-aarch64-1.txz:  Upgraded.
l/qt6-6.10.2_20260125_abfb3788-aarch64-4.txz:  Rebuilt.
  Recompiled against protobuf-34.1.
l/usbredir-0.15.0-aarch64-1.txz:  Added.
  Needed by qemu-10.2.2.
  Thanks to Matteo Bernardini.
l/vde2-2.3.3-aarch64-1.txz:  Added.
  Needed by qemu-10.2.1.
  Thanks to alienBOB.
n/getmail-6.19.12-aarch64-1.txz:  Upgraded.
n/libslirp-4.9.1-aarch64-1.txz:  Added.
  Needed by qemu-10.2.2.
  Thanks to Vijay Marcel.
n/mosh-1.4.0-aarch64-18.txz:  Rebuilt.
  Recompiled against protobuf-34.1.
n/mutt-2.3.1-aarch64-1.txz:  Upgraded.
n/nghttp2-1.68.1-aarch64-1.txz:  Upgraded.
n/samba-4.24.0-aarch64-1.txz:  Upgraded.
n/spice-0.16.0-aarch64-1.txz:  Added.
  Needed by qemu-10.2.2.
  Thanks to Matteo Bernardini.
n/spice-protocol-0.14.5-aarch64-1.txz:  Added.
  Needed by spice-0.16.0.
  Thanks to Matteo Bernardini.
x/fcitx5-5.1.19-aarch64-1.txz:  Upgraded.
x/fcitx5-anthy-5.1.10-aarch64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.1.12-aarch64-1.txz:  Upgraded.
x/fcitx5-gtk-5.1.6-aarch64-1.txz:  Upgraded.
x/fcitx5-hangul-5.1.9-aarch64-1.txz:  Upgraded.
x/fcitx5-kkc-5.1.10-aarch64-1.txz:  Upgraded.
x/fcitx5-m17n-5.1.6-aarch64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.13-aarch64-1.txz:  Upgraded.
x/fcitx5-sayura-5.1.6-aarch64-1.txz:  Upgraded.
x/fcitx5-table-extra-5.1.11-aarch64-1.txz:  Upgraded.
x/fcitx5-table-other-5.1.6-aarch64-1.txz:  Upgraded.
x/fcitx5-unikey-5.1.10-aarch64-1.txz:  Upgraded.
x/libime-1.1.14-aarch64-1.txz:  Upgraded.
x/mesa-26.0.3-aarch64-1.txz:  Upgraded.
x/virglrenderer-1.3.0-aarch64-1.txz:  Added.
  Needed by qemu-10.2.1.
  Thanks to alienBOB.
x/wayland-1.25.0-aarch64-1.txz:  Upgraded.
x/wlroots-0.19.3-aarch64-1.txz:  Upgraded.
xap/gparted-1.8.1-aarch64-1.txz:  Upgraded.

ChangeLog Slackware stable

ChangeLog x86 Rss - ChangeLog x86_64 Rss

extra/tigervnc/tigervnc-1.16.2-x86_64-1_slack15.0.txz:  Upgraded.
  Fixed missing security fixes in the 1.16.1 release.
  (* Security fix *)
patches/packages/libpng-1.6.56-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE.
  Out-of-bounds read/write in the palette expansion on ARM Neon.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2026-33416
    https://www.cve.org/CVERecord?id=CVE-2026-33636
  (* Security fix *)
testing/packages/rust-1.94.1-x86_64-1_slack15.0.txz:  Upgraded.

extra/llvm-22.1.2-x86_64-1_slack15.0.txz:  Upgraded.
extra/tigervnc/tigervnc-1.16.1-x86_64-1_slack15.0.txz:  Upgraded.
  The bug fix release TigerVNC 1.16.1 is now available. This release is
  primarily a security release to fix an issue in x0vncserver, where other
  users can observe and manipulate the screen contents. Users of
  x0vncserver are advised to update immediately.
  The release also contains a fix for using the Plain security type with
  the new w0vncserver, as well as some translation updates.
  (* Security fix *)
patches/packages/bind-9.18.47-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes a security issue:
  Fix unbounded NSEC3 iterations when validating referrals to unsigned
  delegations.
  For more information, see:
    https://kb.isc.org/docs/cve-2026-1519
    https://www.cve.org/CVERecord?id=CVE-2026-1519
  (* Security fix *)

patches/packages/mozilla-firefox-140.9.0esr-x86_64-1_slack15.0.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/140.9.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2026-22/
    https://www.cve.org/CVERecord?id=CVE-2026-4684
    https://www.cve.org/CVERecord?id=CVE-2026-4685
    https://www.cve.org/CVERecord?id=CVE-2026-4686
    https://www.cve.org/CVERecord?id=CVE-2026-4687
    https://www.cve.org/CVERecord?id=CVE-2026-4688
    https://www.cve.org/CVERecord?id=CVE-2026-4689
    https://www.cve.org/CVERecord?id=CVE-2026-4690
    https://www.cve.org/CVERecord?id=CVE-2026-4691
    https://www.cve.org/CVERecord?id=CVE-2026-4692
    https://www.cve.org/CVERecord?id=CVE-2026-4693
    https://www.cve.org/CVERecord?id=CVE-2026-4694
    https://www.cve.org/CVERecord?id=CVE-2026-4695
    https://www.cve.org/CVERecord?id=CVE-2026-4696
    https://www.cve.org/CVERecord?id=CVE-2026-4697
    https://www.cve.org/CVERecord?id=CVE-2026-4698
    https://www.cve.org/CVERecord?id=CVE-2026-4699
    https://www.cve.org/CVERecord?id=CVE-2026-4700
    https://www.cve.org/CVERecord?id=CVE-2026-4701
    https://www.cve.org/CVERecord?id=CVE-2026-4702
    https://www.cve.org/CVERecord?id=CVE-2026-4704
    https://www.cve.org/CVERecord?id=CVE-2026-4705
    https://www.cve.org/CVERecord?id=CVE-2026-4706
    https://www.cve.org/CVERecord?id=CVE-2026-4707
    https://www.cve.org/CVERecord?id=CVE-2026-4708
    https://www.cve.org/CVERecord?id=CVE-2026-4709
    https://www.cve.org/CVERecord?id=CVE-2026-4710
    https://www.cve.org/CVERecord?id=CVE-2026-4711
    https://www.cve.org/CVERecord?id=CVE-2026-4712
    https://www.cve.org/CVERecord?id=CVE-2026-4713
    https://www.cve.org/CVERecord?id=CVE-2026-4714
    https://www.cve.org/CVERecord?id=CVE-2026-4715
    https://www.cve.org/CVERecord?id=CVE-2026-4716
    https://www.cve.org/CVERecord?id=CVE-2026-4717
    https://www.cve.org/CVERecord?id=CVE-2025-59375
    https://www.cve.org/CVERecord?id=CVE-2026-4718
    https://www.cve.org/CVERecord?id=CVE-2026-4719
    https://www.cve.org/CVERecord?id=CVE-2026-4720
    https://www.cve.org/CVERecord?id=CVE-2026-4721
  (* Security fix *)
patches/packages/mozilla-thunderbird-140.9.0esr-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/140.9.0esr/releasenotes/
  (* Security fix *)

ChangeLog Slackware arm stable

ChangeLog arm Rss


If you appreciate what we're doing with Slackware Linux on ARM, please consider
making a donation to support us. Your contribution helps maintain essential
hardware, cover electricity costs, and keep this longstanding open-source
project thriving.

You'll find the ways you can help here:
   https://arm.slackware.com/sponsor/

Thanks for all of your support!

extra/tigervnc/tigervnc-1.16.1-arm-1_slack15.0.txz:  Upgraded.
  The bug fix release TigerVNC 1.16.1 is now available. This release is
  primarily a security release to fix an issue in x0vncserver, where other
  users can observe and manipulate the screen contents. Users of
  x0vncserver are advised to update immediately.
  The release also contains a fix for using the Plain security type with
  the new w0vncserver, as well as some translation updates.
  (* Security fix *)
patches/packages/bind-9.18.47-arm-1_slack15.0.txz:  Upgraded.
  This update fixes a security issue:
  Fix unbounded NSEC3 iterations when validating referrals to unsigned
  delegations.
  For more information, see:
    https://kb.isc.org/docs/cve-2026-1519
    https://www.cve.org/CVERecord?id=CVE-2026-1519
  (* Security fix *)

patches/packages/expat-2.7.5-arm-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Fix NULL function pointer dereference for empty external parameter entities;
  it takes use of both functions XML_ExternalEntityParserCreate and
  XML_SetParamEntityParsing for an application to be vulnerable.
  Protect from XML_TOK_INSTANCE_START infinite loop in function
  entityValueProcessor; it takes use of both functions
  XML_ExternalEntityParserCreate and XML_SetParamEntityParsing for an
  application to be vulnerable.
  Fix NULL dereference in function setContext on retry after an earlier
  ouf-of-memory condition; it takes use of function XML_ParserCreateNS or
  XML_ParserCreate_MM for an application to be vulnerable.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2026-32776
    https://www.cve.org/CVERecord?id=CVE-2026-32777
    https://www.cve.org/CVERecord?id=CVE-2026-32778
  (* Security fix *)

patches/packages/libarchive-3.8.6-arm-1_slack15.0.txz:  Upgraded.
  This update fixes bugs and security issues:
  libarchive: fix incompatibility with Nettle 4.x (#2858)
  libarchive: fix NULL pointer dereference in
  archive_acl_from_text_w() (#2859)
  bsdunzip: fix ISO week year and Gregorian year confusion (#2860)
  7zip: ix SEGV in check_7zip_header_in_sfx via ELF offset validation (#2864)
  7zip: fix out-of-bounds access on ELF 64-bit header (#2875)
  RAR5 reader: fix infinite loop in rar5 decompression (#2877)
  RAR5 reader: fix potential memory leak (#2892)
  RAR5: fix SIGSEGV when archive_read_support_format_rar5 is called
  twice (#2893)
  CAB reader: fix memory leak on repeated calls to
  archive_read_support_format_cab (#2895)
  mtree reader: Fix file descriptor leak in mtree parser
  cleanup (CWE-775, #2878)
  various small bugfixes in code and documentation
  (* Security fix *)
patches/packages/libxml2-2.11.9-arm-7_slack15.0.txz:  Rebuilt.
  This update fixes security issues:
  CVE-2026-1757 fix: Memory leak in xmllint Shell - shell.c
  CVE-2026-0990 fix: Prevent infinite recursion in
  xmlCatalogListXMLResolve
  CVE-2026-0992 fix: Exponential behavior when handling
  parser: Fix infinite loop in xmlCtxtParseContent
  CVE-2025-10911 libxslt related: Ignore next/prev of documents when
  traversing XPath
  CVE-2026-0989 fix: Add RelaxNG include limit
  Thanks to r1w1s1 for locating the backported patches.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2026-1757
    https://www.cve.org/CVERecord?id=CVE-2026-0990
    https://www.cve.org/CVERecord?id=CVE-2026-0992
    https://www.cve.org/CVERecord?id=CVE-2025-10911
    https://www.cve.org/CVERecord?id=CVE-2026-0989
  (* Security fix *)

Aggiornamenti

Rss

Aggiornamenti di script e guide

24/02/2022: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware
15/12/2015: Aggiornato HowTo automatizzare la compilazione del kernel
15/12/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
24/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
22/11/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
07/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
05/11/2015: Nuovo HowTo Automatizzare l'aggiornamento di Slackware current
30/10/2015: Aggiornato HowTo Automatizzare la prima configurazione di Slackware
26/05/2015: Aggiornato HowTo mini Slackware su pendrive
07/05/2015: Aggiornato HowTo automatizzare la compilazione del kernel
13/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel
02/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel



Script webRadio UniSa in bash per StudentIngegneria

Un piccolo script in bash che ho scritto per l'associazione studentesca studentIngegneria dell'università di Salerno. script

Questo script se lasciato in esecuzione, alle 13 alza il volume, riproduce un jingle e poi la webradio dell'università.
Alle 15 interrompe la radio, riproduce un altro jingle e riabbassa il volume...

Continua a leggere...

Auto-disconnesione per abbonamenti a volume

Oggi, 12/02/2009, mi sono attivato la promozione "Naviga 3" con la quale si hanno a disposizione 50MB al giorno per 30 giorni. script

com'è intuibile, oltre il raggiungimento dei 50MB verrebbe applicata la normale tariffazione svuotando il credito della sim prima di rendersene conto.
Per ovviare a questo inconveniente, anche grazie all'aiuto di Ansa89 e spina di slacky, ho scritto 2 script, che possono essere sfruttati per esempio con kppp, che killano pppd al raggiungimento dei 50MB...

Continua a leggere...

Novità importanti per wiKonf

Oggi, 16 agosto 2008, wiKonf ha introdotto l'uso di aircrack-ng. info

Questa nuova versione oltre che portare varie migliorie permette la decrittazione delle chiavi, proponendosi come front-end al noto software aircrack-ng.
Questo vuole solo semplificare operazioni di test per la sicurezza sulle proprie reti o su reti altrui solo con il consenso del leggittimo proprietario, l'autore quindi, non si ritiene responsabile di eventuali usi impropri.

Scarica

Un po' di storia non fa mai male

Le grandi invenzioni le dobbiamo alla Xerox! Interfaccia a finestre, mouse e schede ethernet. info

Nel lontano 1972 la Xerox aveva gia realizzato un personal computer chiamato Xerox Alto dotato di interfaccia grafica, mouse, disco rigido, interfaccia ethernet e molti applicativi come un word processor, un paint e un programma di gestione e-mail. Dopo ben 11 anni nel 1983, l'Apple, ...


Leggi tutto

Scrivere su ext2/ext3 da Windows

Nulla di più facile con IFS. hdd

Per aver un supporto completo in lettura e scrittura sui file system ext2 e ext3 basterà scaricare ed installare il driver IFS a questo indirizzo http://www.fs-driver.org/ e dopo aver scelto le lettere da assegnare alle unità... magia... compariranno le partizioni di linux in risorse del computer da cui sarà possibile utilizzarle come partizioni native windows. Forzando l'installazione funziona anche su vista.
 



   

Condividi sui tuoi social preferiti!

Telegram Facebook Linkedin Twitter Pinterest
.