Aggancia questa barra allo schermo |  Disattiva gli effetti grafici

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Slackware Linux e risoluzione di problemi, di Andrea Peluso


ChangeLog repository

Repository Rss

blender-3.0.1-x86_64-1_ap.txz:  Upgraded.

ChangeLog Slackware current

ChangeLog x86 Rss - ChangeLog x86_64 Rss

l/SDL2_image-2.8.0-x86_64-1.txz:  Upgraded.
l/netpbm-11.04.05-x86_64-1.txz:  Upgraded.
n/curl-8.5.0-x86_64-1.txz:  Upgraded.

a/aaa_libraries-15.1-x86_64-23.txz:  Rebuilt.
  Upgraded:  libelf-0.190.so, libcares.so.2.9.0, libglib-2.0.so.0.7800.2,
  libgmodule-2.0.so.0.7800.2, libgobject-2.0.so.0.7800.2,
  libgthread-2.0.so.0.7800.2.
  Added:  libtiff.so.6.0.2, libtiffxx.so.6.0.2.
a/util-linux-2.39.3-x86_64-1.txz:  Upgraded.
ap/cups-filters-1.28.17-x86_64-3.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
ap/ghostscript-10.02.1-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
ap/rpm-4.19.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
e/emacs-29.1-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
kde/bluedevil-5.27.10-x86_64-1.txz:  Upgraded.
kde/breeze-5.27.10-x86_64-1.txz:  Upgraded.
kde/breeze-grub-5.27.10-x86_64-1.txz:  Upgraded.
kde/breeze-gtk-5.27.10-x86_64-1.txz:  Upgraded.
kde/digikam-8.2.0-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
kde/drkonqi-5.27.10-x86_64-1.txz:  Upgraded.
kde/gwenview-23.08.3-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
kde/kactivitymanagerd-5.27.10-x86_64-1.txz:  Upgraded.
kde/kde-cli-tools-5.27.10-x86_64-1.txz:  Upgraded.
kde/kde-gtk-config-5.27.10-x86_64-1.txz:  Upgraded.
kde/kdecoration-5.27.10-x86_64-1.txz:  Upgraded.
kde/kdeplasma-addons-5.27.10-x86_64-1.txz:  Upgraded.
kde/kgamma5-5.27.10-x86_64-1.txz:  Upgraded.
kde/khotkeys-5.27.10-x86_64-1.txz:  Upgraded.
kde/kinfocenter-5.27.10-x86_64-1.txz:  Upgraded.
kde/kmenuedit-5.27.10-x86_64-1.txz:  Upgraded.
kde/kpipewire-5.27.10-x86_64-1.txz:  Upgraded.
kde/krita-5.2.1-x86_64-3.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
kde/kscreen-5.27.10-x86_64-1.txz:  Upgraded.
kde/kscreenlocker-5.27.10-x86_64-1.txz:  Upgraded.
kde/ksshaskpass-5.27.10-x86_64-1.txz:  Upgraded.
kde/ksystemstats-5.27.10-x86_64-1.txz:  Upgraded.
kde/kwallet-pam-5.27.10-x86_64-1.txz:  Upgraded.
kde/kwayland-integration-5.27.10-x86_64-1.txz:  Upgraded.
kde/kwin-5.27.10-x86_64-1.txz:  Upgraded.
kde/kwrited-5.27.10-x86_64-1.txz:  Upgraded.
kde/layer-shell-qt-5.27.10-x86_64-1.txz:  Upgraded.
kde/libkscreen-5.27.10-x86_64-1.txz:  Upgraded.
kde/libksysguard-5.27.10-x86_64-1.txz:  Upgraded.
kde/milou-5.27.10-x86_64-1.txz:  Upgraded.
kde/okular-23.08.3-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
kde/oxygen-5.27.10-x86_64-1.txz:  Upgraded.
kde/oxygen-sounds-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-browser-integration-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-desktop-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-disks-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-firewall-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-integration-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-nm-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-pa-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-sdk-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-systemmonitor-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-vault-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-5.27.10-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-wallpapers-5.27.10-noarch-1.txz:  Upgraded.
kde/polkit-kde-agent-1-5.27.10-x86_64-1.txz:  Upgraded.
kde/powerdevil-5.27.10-x86_64-1.txz:  Upgraded.
kde/qqc2-breeze-style-5.27.10-x86_64-1.txz:  Upgraded.
kde/sddm-kcm-5.27.10-x86_64-1.txz:  Upgraded.
kde/systemsettings-5.27.10-x86_64-1.txz:  Upgraded.
kde/xdg-desktop-portal-kde-5.27.10-x86_64-1.txz:  Upgraded.
l/SDL2_image-2.6.3-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/djvulibre-3.5.28-x86_64-4.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/gd-2.3.3-x86_64-3.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/gdk-pixbuf2-2.42.10-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/gegl-0.4.46-x86_64-3.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/glib2-2.78.2-x86_64-1.txz:  Upgraded.
l/gtk4-4.12.4-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/imagemagick-7.1.1_22-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/lcms-1.19-x86_64-7.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/lcms2-2.16-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/libtiff-4.6.0-x86_64-1.txz:  Upgraded.
  Probably best to get this one out of the way...
  From the release announcement:
  Pay attention to the following warning:
  This version removes a big number of utilities that have suffered from lack
  of maintenance over the years and were the source of various reported
  security issues. See "Removed functionality" below for the list of removed
  utilities. Starting with libtiff v4.6.0, their source code, at this time,
  will still be available in the source distribution, but they will no longer
  be built by default, and issues related to them will no longer be accepted
  in the libtiff bug tracker. The only remaining supported TIFF tools are
  tiffinfo, tiffdump, tiffcp, tiffset and tiffsplit.
  Shared library .so-version bump.
l/libwebp-1.3.2-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/netpbm-11.04.04-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/opencv-4.8.1-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/poppler-23.12.0-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/python-pillow-8.4.0-x86_64-3.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
l/qt5-5.15.11_20231125_4765fa1d-x86_64-1.txz:  Upgraded.
  Compiled against libtiff-4.6.0.
l/sdl-1.2.15-x86_64-15.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
n/links-2.29-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
t/xfig-3.2.9-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/geeqie-2.1-x86_64-4.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/gimp-2.10.36-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/sane-1.2.1-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/windowmaker-0.96.0-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/xpaint-3.1.4-x86_64-2.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.
xap/xsane-0.999-x86_64-6.txz:  Rebuilt.
  Recompiled against libtiff-4.6.0.

a/hwdata-0.377_2-noarch-1.txz:  Upgraded.
l/imagemagick-7.1.1_22-x86_64-1.txz:  Upgraded.
l/lcms2-2.16-x86_64-1.txz:  Upgraded.
l/libnl3-3.9.0-x86_64-1.txz:  Upgraded.

ChangeLog Slackware arm 64 current

ChangeLog arm 64 Rss

a/cryptsetup-2.6.1-aarch64-4.txz:  Rebuilt.
  Added /etc/rc.d/rc.luks, which had been absent due to a build error.
  Thanks to Sergio Chersovani.

a/kernel-firmware-20231130_f63dd70-noarch-1.txz:  Upgraded.
a/kernel-modules-armv8-6.1.65_armv8-aarch64-1.txz:  Upgraded.
a/kernel_armv8-6.1.65-aarch64-1.txz:  Upgraded.
  Kernel configuration change to support crypto accelerators on the rk3399
  Hardware Models:
  +CONFIG_CRYPTO_DEV_ROCKCHIP=m
  /boot/initrd/[load_kernel_modules.scr/platform/aarch64/rk3399]:
  Load 'rk_crypto' module.
  Thanks to Sergio Chersovani.
d/gdb-14.1-aarch64-1.txz:  Upgraded.
d/kernel-headers-6.1.65-aarch64-1.txz:  Upgraded.
k/kernel-source-6.1.65-aarch64-1.txz:  Upgraded.
l/enchant-2.6.3-aarch64-1.txz:  Upgraded.
l/imagemagick-7.1.1_21-aarch64-1.txz:  Upgraded.
l/v4l-utils-1.26.0-aarch64-3.txz:  Rebuilt.
  Make sure ARIB-STD-B24.so is properly linked. Thanks to GazL.
installer/*:  Rebuilt.
kernels/*:  Upgraded.

a/upower-1.90.1-aarch64-2.txz:  Rebuilt.
  Recompiled against libplist-2.3.0.
ap/usbmuxd-20231011_360619c-aarch64-1.txz:  Upgraded.
  Compiled against libplist-2.3.0.
kde/kio-extras-23.08.3-aarch64-2.txz:  Rebuilt.
  Recompiled against libplist-2.3.0.
kde/libindi-2.0.5-aarch64-1.txz:  Upgraded.
kde/solid-5.112.0-aarch64-2.txz:  Rebuilt.
  Recompiled against libplist-2.3.0.
l/gvfs-1.52.1-aarch64-2.txz:  Rebuilt.
  Recompiled against libplist-2.3.0.
l/libgpod-0.8.3-aarch64-12.txz:  Rebuilt.
  Recompiled against libplist-2.3.0.
l/libimobiledevice-20231007_04c0233-aarch64-1.txz:  Upgraded.
  Compiled against libplist-2.3.0.
l/libimobiledevice-glue-20231110_e314faa-aarch64-1.txz:  Upgraded.
  Compiled against libplist-2.3.0.
l/libplist-2.3.0-aarch64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/libseccomp-2.5.5-aarch64-1.txz:  Upgraded.
l/libusbmuxd-20230901_30e678d-aarch64-1.txz:  Upgraded.
  Compiled against libplist-2.3.0.
l/poppler-23.12.0-aarch64-1.txz:  Upgraded.
xfce/tumbler-4.18.2-aarch64-1.txz:  Upgraded.

ChangeLog Slackware stable

ChangeLog x86 Rss - ChangeLog x86_64 Rss

patches/packages/rdfind-1.6.0-x86_64-1_slack15.0.txz:  Upgraded.
  Redundant data finder utility, needed to build the kernel-firmware package.

patches/packages/samba-4.18.9-x86_64-1_slack15.0.txz:  Upgraded.
  This is a security release in order to address the following defect:
  An information leak vulnerability was discovered in Samba's LDAP server.
  Due to missing access control checks, an authenticated but unprivileged
  attacker could discover the names and preserved attributes of deleted objects
  in the LDAP store. Upgrading to this package will not prevent this
  information leak - if you are using Samba as an Active Directory Domain
  Controller, you will need to follow the instructions in the samba.org link
  given below.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2018-14628.html
    https://www.cve.org/CVERecord?id=CVE-2018-14628
  (* Security fix *)

patches/packages/mozilla-thunderbird-115.5.1-x86_64-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.5.1/releasenotes/

ChangeLog Slackware arm stable

ChangeLog arm Rss

patches/packages/samba-4.18.9-arm-1_slack15.0.txz:  Upgraded.
  This is a security release in order to address the following defect:
  An information leak vulnerability was discovered in Samba's LDAP server.
  Due to missing access control checks, an authenticated but unprivileged
  attacker could discover the names and preserved attributes of deleted objects
  in the LDAP store. Upgrading to this package will not prevent this
  information leak - if you are using Samba as an Active Directory Domain
  Controller, you will need to follow the instructions in the samba.org link
  given below.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2018-14628.html
    https://www.cve.org/CVERecord?id=CVE-2018-14628
  (* Security fix *)

patches/packages/vim-9.0.2127-arm-1_slack15.0.txz:  Upgraded.
  Fixed security issues.
  Thanks to marav for the heads-up.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-48231
    https://www.cve.org/CVERecord?id=CVE-2023-48232
    https://www.cve.org/CVERecord?id=CVE-2023-48233
    https://www.cve.org/CVERecord?id=CVE-2023-48234
    https://www.cve.org/CVERecord?id=CVE-2023-48235
    https://www.cve.org/CVERecord?id=CVE-2023-48236
    https://www.cve.org/CVERecord?id=CVE-2023-48237
  (* Security fix *)
patches/packages/vim-gvim-9.0.2127-arm-1_slack15.0.txz:  Upgraded.


This project is made possible entirely through your support!

If you like using Slackware on the ARM platform and are able to help contribute
to the running costs, that'd be certainly appreciated!
You'll find the ways you can help here:
  https://arm.slackware.com/sponsor/

Thanks to all of you who have and continue to support the project.

Enjoy!

Stuart <mozes@slackware>

patches/packages/linux-5.15.139/*:  Upgraded.
  These updates fix various bugs and security issues.
  For more information, see:
    Fixed in 5.15.117:
    https://www.cve.org/CVERecord?id=CVE-2023-2124
    https://www.cve.org/CVERecord?id=CVE-2023-34255
    Fixed in 5.15.118:
    https://www.cve.org/CVERecord?id=CVE-2023-3609
    https://www.cve.org/CVERecord?id=CVE-2023-3117
    https://www.cve.org/CVERecord?id=CVE-2023-3390
    https://www.cve.org/CVERecord?id=CVE-2023-3338
    Fixed in 5.15.119:
    https://www.cve.org/CVERecord?id=CVE-2023-3610
    Fixed in 5.15.121:
    https://www.cve.org/CVERecord?id=CVE-2023-31248
    https://www.cve.org/CVERecord?id=CVE-2023-38432
    https://www.cve.org/CVERecord?id=CVE-2023-3866
    https://www.cve.org/CVERecord?id=CVE-2023-2898
    https://www.cve.org/CVERecord?id=CVE-2023-44466
    https://www.cve.org/CVERecord?id=CVE-2023-4132
    https://www.cve.org/CVERecord?id=CVE-2023-3611
    https://www.cve.org/CVERecord?id=CVE-2022-48502
    https://www.cve.org/CVERecord?id=CVE-2023-3865
    https://www.cve.org/CVERecord?id=CVE-2023-35001
    https://www.cve.org/CVERecord?id=CVE-2023-3776
    https://www.cve.org/CVERecord?id=CVE-2023-3863
    Fixed in 5.15.122:
    https://www.cve.org/CVERecord?id=CVE-2023-20593
    Fixed in 5.15.123:
    https://www.cve.org/CVERecord?id=CVE-2023-3777
    https://www.cve.org/CVERecord?id=CVE-2023-4004
    Fixed in 5.15.124:
    https://www.cve.org/CVERecord?id=CVE-2023-4015
    https://www.cve.org/CVERecord?id=CVE-2023-4147
    https://www.cve.org/CVERecord?id=CVE-2023-1206
    Fixed in 5.15.125:
    https://www.cve.org/CVERecord?id=CVE-2022-40982
    https://www.cve.org/CVERecord?id=CVE-2023-20569
    Fixed in 5.15.126:
    https://www.cve.org/CVERecord?id=CVE-2023-20588
    https://www.cve.org/CVERecord?id=CVE-2023-4128
    https://www.cve.org/CVERecord?id=CVE-2023-4208
    https://www.cve.org/CVERecord?id=CVE-2023-4206
    https://www.cve.org/CVERecord?id=CVE-2023-4207
    https://www.cve.org/CVERecord?id=CVE-2023-40283
    Fixed in 5.15.128:
    https://www.cve.org/CVERecord?id=CVE-2023-4569
    https://www.cve.org/CVERecord?id=CVE-2023-39194
    https://www.cve.org/CVERecord?id=CVE-2023-4273
    https://www.cve.org/CVERecord?id=CVE-2023-3772
    Fixed in 5.15.132:
    https://www.cve.org/CVERecord?id=CVE-2023-4921
    https://www.cve.org/CVERecord?id=CVE-2023-4623
    https://www.cve.org/CVERecord?id=CVE-2023-42753
    https://www.cve.org/CVERecord?id=CVE-2023-42752
    https://www.cve.org/CVERecord?id=CVE-2023-39189
    https://www.cve.org/CVERecord?id=CVE-2023-4881
    https://www.cve.org/CVERecord?id=CVE-2023-45871
    https://www.cve.org/CVERecord?id=CVE-2023-39193
    https://www.cve.org/CVERecord?id=CVE-2023-39192
    Fixed in 5.15.133:
    https://www.cve.org/CVERecord?id=CVE-2023-42755
    Fixed in 5.15.134:
    https://www.cve.org/CVERecord?id=CVE-2023-42754
    https://www.cve.org/CVERecord?id=CVE-2023-4563
    https://www.cve.org/CVERecord?id=CVE-2023-4244
    https://www.cve.org/CVERecord?id=CVE-2023-5197
    Fixed in 5.15.135:
    https://www.cve.org/CVERecord?id=CVE-2023-34324
    https://www.cve.org/CVERecord?id=CVE-2023-31085
    https://www.cve.org/CVERecord?id=CVE-2023-5158
    Fixed in 5.15.136:
    https://www.cve.org/CVERecord?id=CVE-2023-35827
    Fixed in 5.15.137:
    https://www.cve.org/CVERecord?id=CVE-2023-46813
    https://www.cve.org/CVERecord?id=CVE-2023-5717
    https://www.cve.org/CVERecord?id=CVE-2023-5178
  (* Security fix *)

Aggiornamenti

Rss

Aggiornamenti di script e guide

24/02/2022: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware
15/12/2015: Aggiornato HowTo automatizzare la compilazione del kernel
15/12/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
24/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
22/11/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
07/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
05/11/2015: Nuovo HowTo Automatizzare l'aggiornamento di Slackware current
30/10/2015: Aggiornato HowTo Automatizzare la prima configurazione di Slackware
26/05/2015: Aggiornato HowTo mini Slackware su pendrive
07/05/2015: Aggiornato HowTo automatizzare la compilazione del kernel
13/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel
02/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel



Automatizzare l'aggiornamento di Slackware current

Questo script provvede ad aggiornare Slackware o Slackware64 all'ultima current in maniera del tutto autonoma, dalla ricerca di aggiornamenti all'aggiornamento del bootloader.

script

Scarica la lista dei pacchetti e la confronta con quelli installati, dopodiché controlla se i nuovi pacchetti sono presenti in un eventuale DVD già montato altrimenti li scarica da internet.

Lo script può gestire anche un sistema multilib, infatti se...

Leggi tutto...

Automatizzare la prima configurazione di Slackware

Uno script da eseguire al primo avvio di Slackware.

script

Mi capita spesso di fare nuove installazioni di Slackware e di ripetere sempre le stesse operazioni atte ad una prima configurazione di base, come ad esempio l'italianizzazione o l'impostazione della corretta risoluzione framebuffer.

Per cui ho deciso di raggruppare tutte queste operazioni di base, che possono...

Leggi tutto...

Semplice sistema di sorveglianza

Ecco che la bash ci viene in aiuto anche per realizzare un semplice sistema di video sorveglianza molto economico. script

Questo script scatta una foto dalla webcam impostata nella variabile DEV con mplayer, ne fa una copia con la data corrente come nome del file per conservare una copia di tutte le foto scattate e per sapere a prima vista a quando risalgono. Dopodiché carica entrambe le copie della foto sul server ftp...

Leggi tutto...

Logitech RX1000 pulsante 5

Spesso i produttori di hardware ottengono costi di produzione più bassi utilizzando componenti con capacità superiori in dispositivi non progettati per sfruttarle piuttosto che utilizzando componenti su misura, questo è anche il caso del mio mouse Logitech RX1000. hardware

Aprendo il mouse e guardando le piste stampate sul retro della scheda si nota che il controller ha un pin inutilizzato, quindi leggendo il codice (CY7C63813) sul chip e trovandone il...

Leggi tutto...

Automatizzare la compilazione del kernel

Compilare il kernel Linux non è certamente cosa difficile, ma chi è alle prime armi spesso è spaventato da questa procedura e anche per chi è pratico a volte diventa scocciante aggiornare ad ogni release. info

Dunque ho scritto questo script bash che automatizza la procedura: rileva quanti core ha il proprio processore per decidere in quanti processi paralleli eseguire la compilazione in modo da ottimizzarne i tempi, poi controlla se la versione scelta...

Leggi tutto...



   articoli più recenti >>

Condividi sui tuoi social preferiti!

Telegram Facebook Linkedin Twitter Pinterest
.