Aggancia questa barra allo schermo |  Disattiva gli effetti grafici

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Slackware Linux e risoluzione di problemi, di Andrea Peluso


ChangeLog repository

Repository Rss

blender-3.0.1-x86_64-1_ap.txz:  Upgraded.

ChangeLog Slackware current

ChangeLog x86 Rss - ChangeLog x86_64 Rss

a/aaa_glibc-solibs-2.37-x86_64-1.txz:  Upgraded.
kde/akonadi-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-calendar-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-calendar-tools-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-contacts-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-import-wizard-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-mime-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-notes-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadi-search-22.12.2-x86_64-1.txz:  Upgraded.
kde/akonadiconsole-22.12.2-x86_64-1.txz:  Upgraded.
kde/akregator-22.12.2-x86_64-1.txz:  Upgraded.
kde/analitza-22.12.2-x86_64-1.txz:  Upgraded.
kde/ark-22.12.2-x86_64-1.txz:  Upgraded.
kde/artikulate-22.12.2-x86_64-1.txz:  Upgraded.
kde/audiocd-kio-22.12.2-x86_64-1.txz:  Upgraded.
kde/baloo-widgets-22.12.2-x86_64-1.txz:  Upgraded.
kde/blinken-22.12.2-x86_64-1.txz:  Upgraded.
kde/bomber-22.12.2-x86_64-1.txz:  Upgraded.
kde/bovo-22.12.2-x86_64-1.txz:  Upgraded.
kde/calendarsupport-22.12.2-x86_64-1.txz:  Upgraded.
kde/cantor-22.12.2-x86_64-1.txz:  Upgraded.
kde/cervisia-22.12.2-x86_64-1.txz:  Upgraded.
kde/dolphin-22.12.2-x86_64-1.txz:  Upgraded.
kde/dolphin-plugins-22.12.2-x86_64-1.txz:  Upgraded.
kde/dragon-22.12.2-x86_64-1.txz:  Upgraded.
kde/elisa-22.12.2-x86_64-1.txz:  Upgraded.
kde/eventviews-22.12.2-x86_64-1.txz:  Upgraded.
kde/falkon-22.12.2-x86_64-1.txz:  Upgraded.
kde/ffmpegthumbs-22.12.2-x86_64-1.txz:  Upgraded.
kde/filelight-22.12.2-x86_64-1.txz:  Upgraded.
kde/granatier-22.12.2-x86_64-1.txz:  Upgraded.
kde/grantlee-editor-22.12.2-x86_64-1.txz:  Upgraded.
kde/grantleetheme-22.12.2-x86_64-1.txz:  Upgraded.
kde/gwenview-22.12.2-x86_64-1.txz:  Upgraded.
kde/incidenceeditor-22.12.2-x86_64-1.txz:  Upgraded.
kde/itinerary-22.12.2-x86_64-1.txz:  Upgraded.
kde/juk-22.12.2-x86_64-1.txz:  Upgraded.
kde/k3b-22.12.2-x86_64-1.txz:  Upgraded.
kde/kaddressbook-22.12.2-x86_64-1.txz:  Upgraded.
kde/kalarm-22.12.2-x86_64-1.txz:  Upgraded.
kde/kalendar-22.12.2-x86_64-1.txz:  Upgraded.
kde/kalgebra-22.12.2-x86_64-1.txz:  Upgraded.
kde/kalzium-22.12.2-x86_64-1.txz:  Upgraded.
kde/kamera-22.12.2-x86_64-1.txz:  Upgraded.
kde/kamoso-22.12.2-x86_64-1.txz:  Upgraded.
kde/kanagram-22.12.2-x86_64-1.txz:  Upgraded.
kde/kapman-22.12.2-x86_64-1.txz:  Upgraded.
kde/kapptemplate-22.12.2-x86_64-1.txz:  Upgraded.
kde/kate-22.12.2-x86_64-1.txz:  Upgraded.
kde/katomic-22.12.2-x86_64-1.txz:  Upgraded.
kde/kbackup-22.12.2-x86_64-1.txz:  Upgraded.
kde/kblackbox-22.12.2-x86_64-1.txz:  Upgraded.
kde/kblocks-22.12.2-x86_64-1.txz:  Upgraded.
kde/kbounce-22.12.2-x86_64-1.txz:  Upgraded.
kde/kbreakout-22.12.2-x86_64-1.txz:  Upgraded.
kde/kbruch-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcachegrind-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcalc-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcalutils-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcharselect-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcolorchooser-22.12.2-x86_64-1.txz:  Upgraded.
kde/kcron-22.12.2-x86_64-1.txz:  Upgraded.
kde/kde-dev-scripts-22.12.2-x86_64-1.txz:  Upgraded.
kde/kde-dev-utils-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdebugsettings-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdeconnect-kde-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdeedu-data-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdegraphics-mobipocket-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdegraphics-thumbnailers-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdenetwork-filesharing-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdenlive-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdepim-addons-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdepim-runtime-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdesdk-kio-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdesdk-thumbnailers-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdev-php-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdev-python-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdevelop-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdf-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdialog-22.12.2-x86_64-1.txz:  Upgraded.
kde/kdiamond-22.12.2-x86_64-1.txz:  Upgraded.
kde/keditbookmarks-22.12.2-x86_64-1.txz:  Upgraded.
kde/kfind-22.12.2-x86_64-1.txz:  Upgraded.
kde/kfloppy-22.12.2-x86_64-1.txz:  Upgraded.
kde/kfourinline-22.12.2-x86_64-1.txz:  Upgraded.
kde/kgeography-22.12.2-x86_64-1.txz:  Upgraded.
kde/kget-22.12.2-x86_64-1.txz:  Upgraded.
kde/kgoldrunner-22.12.2-x86_64-1.txz:  Upgraded.
kde/kgpg-22.12.2-x86_64-1.txz:  Upgraded.
kde/khangman-22.12.2-x86_64-1.txz:  Upgraded.
kde/khelpcenter-22.12.2-x86_64-1.txz:  Upgraded.
kde/kidentitymanagement-22.12.2-x86_64-1.txz:  Upgraded.
kde/kig-22.12.2-x86_64-1.txz:  Upgraded.
kde/kigo-22.12.2-x86_64-1.txz:  Upgraded.
kde/killbots-22.12.2-x86_64-1.txz:  Upgraded.
kde/kimagemapeditor-22.12.2-x86_64-1.txz:  Upgraded.
kde/kimap-22.12.2-x86_64-1.txz:  Upgraded.
kde/kio-extras-22.12.2-x86_64-1.txz:  Upgraded.
kde/kio-gdrive-22.12.2-x86_64-1.txz:  Upgraded.
kde/kio-zeroconf-22.12.2-x86_64-1.txz:  Upgraded.
kde/kipi-plugins-22.12.2-x86_64-1.txz:  Upgraded.
kde/kirigami-gallery-22.12.2-x86_64-1.txz:  Upgraded.
kde/kiriki-22.12.2-x86_64-1.txz:  Upgraded.
kde/kiten-22.12.2-x86_64-1.txz:  Upgraded.
kde/kitinerary-22.12.2-x86_64-1.txz:  Upgraded.
kde/kjumpingcube-22.12.2-x86_64-1.txz:  Upgraded.
kde/kldap-22.12.2-x86_64-1.txz:  Upgraded.
kde/kleopatra-22.12.2-x86_64-1.txz:  Upgraded.
kde/klickety-22.12.2-x86_64-1.txz:  Upgraded.
kde/klines-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmag-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmahjongg-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmail-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmail-account-wizard-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmailtransport-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmbox-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmime-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmines-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmix-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmousetool-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmouth-22.12.2-x86_64-1.txz:  Upgraded.
kde/kmplot-22.12.2-x86_64-1.txz:  Upgraded.
kde/knavalbattle-22.12.2-x86_64-1.txz:  Upgraded.
kde/knetwalk-22.12.2-x86_64-1.txz:  Upgraded.
kde/knights-22.12.2-x86_64-1.txz:  Upgraded.
kde/knotes-22.12.2-x86_64-1.txz:  Upgraded.
kde/kolf-22.12.2-x86_64-1.txz:  Upgraded.
kde/kollision-22.12.2-x86_64-1.txz:  Upgraded.
kde/kolourpaint-22.12.2-x86_64-1.txz:  Upgraded.
kde/kompare-22.12.2-x86_64-1.txz:  Upgraded.
kde/konqueror-22.12.2-x86_64-1.txz:  Upgraded.
kde/konquest-22.12.2-x86_64-1.txz:  Upgraded.
kde/konsole-22.12.2-x86_64-1.txz:  Upgraded.
kde/kontact-22.12.2-x86_64-1.txz:  Upgraded.
kde/kontactinterface-22.12.2-x86_64-1.txz:  Upgraded.
kde/kontrast-22.12.2-x86_64-1.txz:  Upgraded.
kde/konversation-22.12.2-x86_64-1.txz:  Upgraded.
kde/kopeninghours-22.12.2-x86_64-1.txz:  Upgraded.
kde/kopete-22.12.2-x86_64-1.txz:  Upgraded.
kde/korganizer-22.12.2-x86_64-1.txz:  Upgraded.
kde/kosmindoormap-22.12.2-x86_64-1.txz:  Upgraded.
kde/kpat-22.12.2-x86_64-1.txz:  Upgraded.
kde/kpimtextedit-22.12.2-x86_64-1.txz:  Upgraded.
kde/kpkpass-22.12.2-x86_64-1.txz:  Upgraded.
kde/kpmcore-22.12.2-x86_64-1.txz:  Upgraded.
kde/kpublictransport-22.12.2-x86_64-1.txz:  Upgraded.
kde/kqtquickcharts-22.12.2-x86_64-1.txz:  Upgraded.
kde/krdc-22.12.2-x86_64-1.txz:  Upgraded.
kde/kreversi-22.12.2-x86_64-1.txz:  Upgraded.
kde/krfb-22.12.2-x86_64-1.txz:  Upgraded.
kde/kross-interpreters-22.12.2-x86_64-1.txz:  Upgraded.
kde/kruler-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksanecore-22.12.2-x86_64-1.txz:  Upgraded.
kde/kshisen-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksirk-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksmtp-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksnakeduel-22.12.2-x86_64-1.txz:  Upgraded.
kde/kspaceduel-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksquares-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksudoku-22.12.2-x86_64-1.txz:  Upgraded.
kde/ksystemlog-22.12.2-x86_64-1.txz:  Upgraded.
kde/kteatime-22.12.2-x86_64-1.txz:  Upgraded.
kde/ktimer-22.12.2-x86_64-1.txz:  Upgraded.
kde/ktnef-22.12.2-x86_64-1.txz:  Upgraded.
kde/ktorrent-22.12.2-x86_64-1.txz:  Upgraded.
kde/ktouch-22.12.2-x86_64-1.txz:  Upgraded.
kde/kturtle-22.12.2-x86_64-1.txz:  Upgraded.
kde/kubrick-22.12.2-x86_64-1.txz:  Upgraded.
kde/kwalletmanager-22.12.2-x86_64-1.txz:  Upgraded.
kde/kwave-22.12.2-x86_64-1.txz:  Upgraded.
kde/kwordquiz-22.12.2-x86_64-1.txz:  Upgraded.
kde/libgravatar-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkcddb-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkcompactdisc-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkdcraw-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkdegames-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkdepim-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkeduvocdocument-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkexiv2-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkgapi-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkipi-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkleo-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkmahjongg-22.12.2-x86_64-1.txz:  Upgraded.
kde/libkomparediff2-22.12.2-x86_64-1.txz:  Upgraded.
kde/libksane-22.12.2-x86_64-1.txz:  Upgraded.
kde/libksieve-22.12.2-x86_64-1.txz:  Upgraded.
kde/libktorrent-22.12.2-x86_64-1.txz:  Upgraded.
kde/lokalize-22.12.2-x86_64-1.txz:  Upgraded.
kde/lskat-22.12.2-x86_64-1.txz:  Upgraded.
kde/mailcommon-22.12.2-x86_64-1.txz:  Upgraded.
kde/mailimporter-22.12.2-x86_64-1.txz:  Upgraded.
kde/marble-22.12.2-x86_64-1.txz:  Upgraded.
kde/markdownpart-22.12.2-x86_64-1.txz:  Upgraded.
kde/mbox-importer-22.12.2-x86_64-1.txz:  Upgraded.
kde/messagelib-22.12.2-x86_64-1.txz:  Upgraded.
kde/minuet-22.12.2-x86_64-1.txz:  Upgraded.
kde/okular-22.12.2-x86_64-1.txz:  Upgraded.
kde/palapeli-22.12.2-x86_64-1.txz:  Upgraded.
kde/parley-22.12.2-x86_64-1.txz:  Upgraded.
kde/partitionmanager-22.12.2-x86_64-1.txz:  Upgraded.
kde/picmi-22.12.2-x86_64-1.txz:  Upgraded.
kde/pim-data-exporter-22.12.2-x86_64-1.txz:  Upgraded.
kde/pim-sieve-editor-22.12.2-x86_64-1.txz:  Upgraded.
kde/pimcommon-22.12.2-x86_64-1.txz:  Upgraded.
kde/poxml-22.12.2-x86_64-1.txz:  Upgraded.
kde/print-manager-22.12.2-x86_64-1.txz:  Upgraded.
kde/rocs-22.12.2-x86_64-1.txz:  Upgraded.
kde/skanlite-22.12.2-x86_64-1.txz:  Upgraded.
kde/skanpage-22.12.2-x86_64-1.txz:  Upgraded.
kde/spectacle-22.12.2-x86_64-1.txz:  Upgraded.
kde/svgpart-22.12.2-x86_64-1.txz:  Upgraded.
kde/sweeper-22.12.2-x86_64-1.txz:  Upgraded.
kde/umbrello-22.12.2-x86_64-1.txz:  Upgraded.
kde/yakuake-22.12.2-x86_64-1.txz:  Upgraded.
kde/zanshin-22.12.2-x86_64-1.txz:  Upgraded.
l/glibc-2.37-x86_64-1.txz:  Upgraded.
l/glibc-i18n-2.37-x86_64-1.txz:  Upgraded.
l/glibc-profile-2.37-x86_64-1.txz:  Upgraded.
l/nodejs-19.6.0-x86_64-1.txz:  Upgraded.
l/poppler-23.02.0-x86_64-1.txz:  Upgraded.
l/xapian-core-1.4.22-x86_64-1.txz:  Upgraded.
n/openssh-9.2p1-x86_64-1.txz:  Upgraded.
  This release contains fixes for two security problems and a memory safety
  problem. The memory safety problem is not believed to be exploitable, but
  upstream reports most network-reachable memory faults as security bugs.
  For more information, see:
    https://www.openssh.com/releasenotes.html#9.2
  (* Security fix *)

a/kernel-firmware-20230125_5c11a37-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.9-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.9-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.9-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.9-x86-1.txz:  Upgraded.
k/kernel-source-6.1.9-noarch-1.txz:  Upgraded.
l/apr-1.7.2-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Integer Overflow or Wraparound vulnerability in apr_encode functions of
  Apache Portable Runtime (APR) allows an attacker to write beyond bounds
  of a buffer. (CVE-2022-24963)
  Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
  (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
  later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-24963
    https://www.cve.org/CVERecord?id=CVE-2021-35940
    https://www.cve.org/CVERecord?id=CVE-2017-12613
  (* Security fix *)
l/apr-util-1.6.3-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  Integer Overflow or Wraparound vulnerability in apr_base64 functions
  of Apache Portable Runtime Utility (APR-util) allows an attacker to
  write beyond bounds of a buffer. (CVE-2022-25147)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-25147
  (* Security fix *)
l/libhandy-1.8.1-x86_64-1.txz:  Upgraded.
l/libjpeg-turbo-2.1.5-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-102.7.1-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.7.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-04/
    https://www.cve.org/CVERecord?id=CVE-2023-0430
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.

d/perl-5.36.0-x86_64-3.txz:  Rebuilt.
  Upgraded: IO-Socket-SSL-2.081, Moo-2.005005, Path-Tiny-0.144,
  Sub-Quote-2.006008, Template-Toolkit-3.101, URI-5.17.
  Added: JSON-4.10 (needed to build Samba with --bundled-libraries=heimdal).
kde/kstars-3.6.3-x86_64-1.txz:  Upgraded.
l/gjs-1.74.1-x86_64-1.txz:  Upgraded.
  Compiled against mozjs102-102.7.0esr.
l/mozjs102-102.7.0esr-x86_64-1.txz:  Added.
  This is required by gjs-1.74.1 and polkit-122.
l/mozjs78-78.15.0esr-x86_64-1.txz:  Removed.
l/polkit-122-x86_64-1.txz:  Upgraded.
  Compiled against mozjs102-102.7.0esr.

ChangeLog Slackware arm 64 current

ChangeLog arm 64 Rss


If you like using the ARM port and are able to help contribute to the
running costs, that'd be certainly appreciated!

There are two donation options available:
  https://www.paypal.com/paypalme/armedslack
  https://www.patreon.com/armedslack

Cheers,
Stuart <mozes@slackware>

a/bzip2-1.0.8-aarch64-5.txz:  Rebuilt.
a/kernel-firmware-20230125_5c11a37-noarch-1.txz:  Upgraded.
l/apr-1.7.2-aarch64-1.txz:  Upgraded.
  This update fixes security issues:
  Integer Overflow or Wraparound vulnerability in apr_encode functions of
  Apache Portable Runtime (APR) allows an attacker to write beyond bounds
  of a buffer. (CVE-2022-24963)
  Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
  (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
  later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-24963
    https://www.cve.org/CVERecord?id=CVE-2021-35940
    https://www.cve.org/CVERecord?id=CVE-2017-12613
  (* Security fix *)
l/apr-util-1.6.3-aarch64-1.txz:  Upgraded.
  This update fixes a security issue:
  Integer Overflow or Wraparound vulnerability in apr_base64 functions
  of Apache Portable Runtime Utility (APR-util) allows an attacker to
  write beyond bounds of a buffer. (CVE-2022-25147)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-25147
  (* Security fix *)
l/libhandy-1.8.1-aarch64-1.txz:  Upgraded.
l/libjpeg-turbo-2.1.5-aarch64-1.txz:  Upgraded.
d/slackkit-1.34-aarch64-1.txz:  Upgraded.
  Fixed pkgname matching bug when building in /patches.
xap/mozilla-thunderbird-102.7.1-aarch64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.7.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-04/
    https://www.cve.org/CVERecord?id=CVE-2023-0430
  (* Security fix *)


The mini root filesystem has been updated:
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

a/kernel-modules-armv8-6.1.9_armv8-aarch64-1.txz:  Upgraded.
a/kernel_armv8-6.1.9-aarch64-1.txz:  Upgraded.
a/sysvinit-scripts-15.1-noarch-6.txz:  Rebuilt.
  /etc/rc.d/rc.platform.conf:  Added a setting 'CPU_FAN_OFF=Yes' to disable the
  CPU fan on the RockPro64.  This is useful if you use a heatsink, as it saves
  a couple of seconds during boot.
  Thanks to unInstance on LQ for the suggestion.
ap/sysstat-12.7.2-aarch64-1.txz:  Upgraded.
d/kernel-headers-6.1.9-aarch64-1.txz:  Upgraded.
d/perl-5.36.0-aarch64-3.txz:  Rebuilt.
  Upgraded: IO-Socket-SSL-2.081, Moo-2.005005, Path-Tiny-0.144,
  Sub-Quote-2.006008, Template-Toolkit-3.101, URI-5.17.
  Added: JSON-4.10 (needed to build Samba with --bundled-libraries=heimdal).
k/kernel-source-6.1.9-aarch64-1.txz:  Upgraded.
kde/kimageformats-5.102.0-aarch64-2.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
kde/krita-5.1.5-aarch64-3.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
kde/kstars-3.6.2-aarch64-3.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
kde/libkdcraw-22.12.1-aarch64-2.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
l/LibRaw-0.21.1-aarch64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/dconf-editor-43.0-aarch64-1.txz:  Upgraded.
l/gegl-0.4.40-aarch64-3.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
l/gjs-1.74.1-aarch64-1.txz:  Upgraded.
  Compiled against mozjs102-102.7.0esr.
l/imagemagick-7.1.0_60-aarch64-1.txz:  Upgraded.
  Compiled against LibRaw-0.21.1.
l/libhandy-1.8.0-aarch64-1.txz:  Added.
  This is required by dconf-editor-43.0.
l/mozjs102-102.7.0esr-aarch64-1.txz:  Added.
  This is required by gjs-1.74.1 and polkit-122.
l/mozjs78-78.15.0esr-aarch64-1.txz:  Removed.
l/polkit-122-aarch64-1.txz:  Upgraded.
  Compiled against mozjs102-102.7.0esr.
n/c-ares-1.19.0-aarch64-1.txz:  Upgraded.
n/fetchmail-6.4.36-aarch64-1.txz:  Upgraded.
n/samba-4.17.5-aarch64-1.txz:  Upgraded.
  BUG 15240: CVE-2022-38023 [SECURITY] Samba should refuse RC4 (aka md5)
  based SChannel on NETLOGON (additional changes).
  For more information, see:
    https://www.samba.org/samba/security/CVE-2022-38023.html
    https://www.cve.org/CVERecord?id=CVE-2022-38023
  (* Security fix *)
x/beforelight-1.0.6-aarch64-1.txz:  Upgraded.
x/mesa-22.3.4-aarch64-1.txz:  Upgraded.
xap/geeqie-2.0.1-aarch64-2.txz:  Rebuilt.
  Recompiled against LibRaw-0.21.1.
xap/mozilla-firefox-109.0.1-aarch64-1.txz:  Upgraded.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/109.0.1/releasenotes/
xap/mozilla-thunderbird-102.7.0-aarch64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.7.0/releasenotes/
    https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird102.7
  (* Security fix *)
xap/seamonkey-2.53.15-aarch64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.15
  (* Security fix *)
installer/*:  Rebuilt.
kernels/*:  Upgraded.


Hello!

I've just uploaded the latest in the Slackware ARM Vlog series, where I've been
testing out a new 2 port PCI-e SATA card with the RockPro64.
So far it's working, and this and the previous batch have been built on the
build machine in that episode.  Check it out:
   https://youtu.be/sELhsMdWleo
After another few weeks of stability I'll add it to the supported hardware list
for the RockPro64.

If you like using the ARM port and are able to help contribute to the
running costs, that'd be certainly appreciated!

There are two donation options available:
  https://www.paypal.com/paypalme/armedslack
  https://www.patreon.com/armedslack

Cheers,
Stuart <mozes@slackware>

a/btrfs-progs-6.1.3-aarch64-1.txz:  Upgraded.
ap/cups-filters-1.28.17-aarch64-1.txz:  Upgraded.
ap/vim-9.0.1241-aarch64-1.txz:  Upgraded.
  Fixed a security issue:
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
  Thanks to marav for the heads-up.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0433
  (* Security fix *)
d/guile-3.0.9-aarch64-1.txz:  Upgraded.
d/poke-3.0-aarch64-1.txz:  Upgraded.
l/nodejs-19.5.0-aarch64-1.txz:  Upgraded.
l/pipewire-0.3.65-aarch64-1.txz:  Upgraded.
n/NetworkManager-1.40.12-aarch64-1.txz:  Upgraded.
n/bind-9.18.11-aarch64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An UPDATE message flood could cause :iscman:`named` to exhaust all
  available memory. This flaw was addressed by adding a new
  :any:`update-quota` option that controls the maximum number of
  outstanding DNS UPDATE messages that :iscman:`named` can hold in a
  queue at any given time (default: 100).
  :iscman:`named` could crash with an assertion failure when an RRSIG
  query was received and :any:`stale-answer-client-timeout` was set to a
  non-zero value. This has been fixed.
  :iscman:`named` running as a resolver with the
  :any:`stale-answer-client-timeout` option set to any value greater
  than ``0`` could crash with an assertion failure, when the
  :any:`recursive-clients` soft quota was reached. This has been fixed.
  For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
  (* Security fix *)
n/openvpn-2.6.0-aarch64-1.txz:  Upgraded.
xap/vim-gvim-9.0.1241-aarch64-1.txz:  Upgraded.
xap/xine-lib-1.2.13-aarch64-1.txz:  Upgraded.

ChangeLog Slackware stable

ChangeLog x86 Rss - ChangeLog x86_64 Rss

patches/packages/openssh-9.2p1-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains fixes for two security problems and a memory safety
  problem. The memory safety problem is not believed to be exploitable, but
  upstream reports most network-reachable memory faults as security bugs.
  This update contains some potentially incompatible changes regarding the
  scp utility. For more information, see:
    https://www.openssh.com/releasenotes.html#9.0
  For more information, see:
    https://www.openssh.com/releasenotes.html#9.2
  (* Security fix *)

patches/packages/apr-1.7.2-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Integer Overflow or Wraparound vulnerability in apr_encode functions of
  Apache Portable Runtime (APR) allows an attacker to write beyond bounds
  of a buffer. (CVE-2022-24963)
  Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
  (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
  later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-24963
    https://www.cve.org/CVERecord?id=CVE-2021-35940
    https://www.cve.org/CVERecord?id=CVE-2017-12613
  (* Security fix *)
patches/packages/apr-util-1.6.3-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes a security issue:
  Integer Overflow or Wraparound vulnerability in apr_base64 functions
  of Apache Portable Runtime Utility (APR-util) allows an attacker to
  write beyond bounds of a buffer. (CVE-2022-25147)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-25147
  (* Security fix *)
patches/packages/mozilla-thunderbird-102.7.1-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.7.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-04/
    https://www.cve.org/CVERecord?id=CVE-2023-0430
  (* Security fix *)

patches/packages/bind-9.16.37-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An UPDATE message flood could cause :iscman:`named` to exhaust all
  available memory. This flaw was addressed by adding a new
  :any:`update-quota` option that controls the maximum number of
  outstanding DNS UPDATE messages that :iscman:`named` can hold in a
  queue at any given time (default: 100).
  :iscman:`named` could crash with an assertion failure when an RRSIG
  query was received and :any:`stale-answer-client-timeout` was set to a
  non-zero value. This has been fixed.
  :iscman:`named` running as a resolver with the
  :any:`stale-answer-client-timeout` option set to any value greater
  than ``0`` could crash with an assertion failure, when the
  :any:`recursive-clients` soft quota was reached. This has been fixed.
  For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
  (* Security fix *)
patches/packages/vim-9.0.1241-x86_64-1_slack15.0.txz:  Upgraded.
  Fixed a security issue:
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
  Thanks to marav for the heads-up.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0433
  (* Security fix *)
patches/packages/vim-gvim-9.0.1241-x86_64-1_slack15.0.txz:  Upgraded.
testing/packages/bind-9.18.11-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An UPDATE message flood could cause :iscman:`named` to exhaust all
  available memory. This flaw was addressed by adding a new
  :any:`update-quota` option that controls the maximum number of
  outstanding DNS UPDATE messages that :iscman:`named` can hold in a
  queue at any given time (default: 100).
  :iscman:`named` could crash with an assertion failure when an RRSIG
  query was received and :any:`stale-answer-client-timeout` was set to a
  non-zero value. This has been fixed.
  :iscman:`named` running as a resolver with the
  :any:`stale-answer-client-timeout` option set to any value greater
  than ``0`` could crash with an assertion failure, when the
  :any:`recursive-clients` soft quota was reached. This has been fixed.
  For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
  (* Security fix *)

ChangeLog Slackware arm stable

ChangeLog arm Rss


If you like using the ARM port and are able to help contribute to the
running costs, that'd be certainly appreciated!

There are two donation options available:
  https://www.paypal.com/paypalme/armedslack
  https://www.patreon.com/armedslack

Thanks
Stuart <mozes@slackware>

patches/packages/openssh-9.2p1-arm-1_slack15.0.txz:  Upgraded.
  This release contains fixes for two security problems and a memory safety
  problem. The memory safety problem is not believed to be exploitable, but
  upstream reports most network-reachable memory faults as security bugs.
  This update contains some potentially incompatible changes regarding the
  scp utility. For more information, see:
    https://www.openssh.com/releasenotes.html#9.0
  For more information, see:
    https://www.openssh.com/releasenotes.html#9.2
  (* Security fix *)

patches/packages/apr-1.7.2-arm-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Integer Overflow or Wraparound vulnerability in apr_encode functions of
  Apache Portable Runtime (APR) allows an attacker to write beyond bounds
  of a buffer. (CVE-2022-24963)
  Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
  (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
  later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-24963
    https://www.cve.org/CVERecord?id=CVE-2021-35940
    https://www.cve.org/CVERecord?id=CVE-2017-12613
  (* Security fix *)
patches/packages/apr-util-1.6.3-arm-1_slack15.0.txz:  Upgraded.
  This update fixes a security issue:
  Integer Overflow or Wraparound vulnerability in apr_base64 functions
  of Apache Portable Runtime Utility (APR-util) allows an attacker to
  write beyond bounds of a buffer. (CVE-2022-25147)
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-25147
  (* Security fix *)

patches/packages/linux-5.15.91/*:  Upgraded.
patches/packages/nano-7.2-arm-1_slack15.0.txz:  Upgraded.

Aggiornamenti

Rss

Aggiornamenti di script e guide

24/02/2022: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware
15/12/2015: Aggiornato HowTo automatizzare la compilazione del kernel
15/12/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
24/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
22/11/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
07/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
05/11/2015: Nuovo HowTo Automatizzare l'aggiornamento di Slackware current
30/10/2015: Aggiornato HowTo Automatizzare la prima configurazione di Slackware
26/05/2015: Aggiornato HowTo mini Slackware su pendrive
07/05/2015: Aggiornato HowTo automatizzare la compilazione del kernel
13/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel
02/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel



WiFi Ralink

I driver ufficiali della ralink per gli adattatori wireless non funzionano.
hardware
Provando a compilarli con un kernel recente si ottiene un errore mentre provando con una versione più datata la compilazione va a buon fine (anche se con molti warning), ma il driver compilato non serve a nulla, collegando il dispositivo al pc, questo non viene rilevato comunque.
Per fortuna sul sito http://rt2x00.serialmonkey.com è possibile trovare dei driver modificati perfettamente funzionanti anche sulle ultimissime versioni del kernel linux.
 

Scrivere sull'NTFS

Sfruttiamo FUSE per aver un supporto completo in scrittura sui filesystem NTFS. hdd

FUSE è un modulo già presente nei kernel vanilla, è un framework per filesystem in userspace, quindi abilitiamolo nella configurazione "Filesystem in Userspace support" se non lo è già e ricompiliamo il kernel se necessario. Dopo basterà scaricare il driver ntsf-3g, installarlo e sarà possibile montare la partizione col comando ntfs-3g.

Per approfondire...

Recuperare la tabella delle partizioni

Recuperare una tabella delle partizioni danneggiata è possibile grazie a Linux e l'utilità gpart. hdd

In alcune distribuzioni è già presente, ma in altre no, quindi lo si può prelevare alla sezione download del sito, questo programma effettua una scansione grezza del disco alla ricerca di partizioni, dopo, se non sono state sovrascritte, sarà possibile ricrearle identiche con fdisk.


Per approfondire...



<< articoli precedenti   

Condividi sui tuoi social preferiti!

Telegram Facebook Linkedin Twitter Pinterest
.