Forum |  HardWare.fr | News | Articles | PC | S'identifier | S'inscrire | Shop Recherche
1923 connectés 

 

 

La 15.0 est là (en vrai !)




Attention si vous cliquez sur "voir les résultats" vous ne pourrez plus voter
Les invités peuvent voter

 Mot :   Pseudo :  
  Aller à la page :
 
 Page :   1  2  3  4  5  ..  63  64  65  ..  108  109  110  111  112  113
Auteur Sujet :

[SLACKWARE] du présent - 15.0

n°1358198
cycojesus
Mèo Lười
Posté le 12-05-2014 à 11:35:29  profilanswer
 

Reprise du message précédent :
A
Mais fais A
AAAAAAAAAAAAaaaa [:ex-floodeur:1]

Mon May 12 02:24:36 UTC 2014
l/seamonkey-solibs-2.26-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-29.0.1-x86_64-1.txz:  Upgraded.
xap/seamonkey-2.26-x86_64-1.tx:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+

[:a03hegaz:5]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
mood
Publicité
Posté le 12-05-2014 à 11:35:29  profilanswer
 

n°1358214
wedgeant
Da penguin inside
Posté le 12-05-2014 à 14:26:01  profilanswer
 

[:wark0]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1358320
cycojesus
Mèo Lười
Posté le 14-05-2014 à 08:27:10  profilanswer
 

fg  trukkhg dfgssss  fghdgggioyui ? [:efle_errant:1]

Tue May 13 22:31:28 UTC 2014
l/libelf-0.8.13-x86_64-4.txz:  Rebuilt.
  Use -D_FILE_OFFSET_BITS=64 on 32-bit x86 (needed for Chromium).
  Requested by alienBOB.  :-)
+--------------------------+
Tue May 13 20:25:35 UTC 2014
a/kernel-generic-3.14.4-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.4-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.4-x86_64-1.txz:  Upgraded.
d/gdb-7.7.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.4-x86-1.txz:  Upgraded.
k/kernel-source-3.14.4-noarch-1.txz:  Upgraded.
  Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
  other kernel debugging options.  Besides fixing the nVidia issues, I wonder
  if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-x86_64-3.txz:  Rebuilt.
  Symlink headers to /usr/include, since Mesa wants them there.
  Thanks to Robby Workman.
xap/ddd-3.3.12-x86_64-2.txz:  Rebuilt.
  Patched to fix the machine code view.  Thanks to Christopher Oliver.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:implosion de troll]  [:donkey']


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1358329
wedgeant
Da penguin inside
Posté le 14-05-2014 à 10:47:45  profilanswer
 

[:am73]  [:dr_doak]  [:sarah palin]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1359092
cycojesus
Mèo Lười
Posté le 02-06-2014 à 06:39:37  profilanswer
 

Aujourd'huiHieur c'est dimnche et P.atrick est content
 [:kissu kissu:2]
Y'a du p'grab [:kryptos:3]  

Sun Jun  1 19:48:54 UTC 2014
a/gawk-4.1.1-x86_64-2.txz:  Rebuilt.
  Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
  Compressed the man pages in man3.
a/kernel-generic-3.14.5-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.5-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.5-x86_64-1.txz:  Upgraded.
ap/mariadb-5.5.37-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
  (* Security fix *)
ap/nano-2.3.3-x86_64-1.txz:  Upgraded.
d/gcc-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-g++-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-gfortran-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-gnat-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-go-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-java-4.8.3-x86_64-1.txz:  Upgraded.
d/gcc-objc-4.8.3-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.5-x86-1.txz:  Upgraded.
d/make-3.82-x86_64-5.txz:  Rebuilt.
  Patched to fix a bug with parallel builds.
  Thanks to Danny Schmarsel.
k/kernel-source-3.14.5-noarch-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:kissu kissu:3]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1359319
cycojesus
Mèo Lười
Posté le 06-06-2014 à 18:17:07  profilanswer
 

[:xavierniel:1] on the phone

Fri Jun  6 04:27:01 UTC 2014
a/openssl-solibs-1.0.1h-x86_64-1.txz:  Upgraded.
  (* Security fix *)
ap/nano-2.3.4-x86_64-1.txz:  Upgraded.
l/libtasn1-3.6-x86_64-1.txz:  Upgraded.
  Multiple security issues have been corrected in the libtasn1 library.
  These errors allow a remote attacker to cause a denial of service, or
  possibly to execute arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
  (* Security fix *)
n/gnutls-3.2.15-x86_64-1.txz:  Upgraded.
  A security issue has been corrected in gnutls.  This vulnerability
  affects the client side of the gnutls library.  A server that sends
  a specially crafted ServerHello could corrupt the memory of a requesting
  client.  This may allow a remote attacker to execute arbitrary code.
  Additional vulnerabilities in the embedded libtasn1 library have also
  been patched.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
  (* Security fix *)
n/irssi-0.8.16-x86_64-1.txz:  Upgraded.
n/openssl-1.0.1h-x86_64-1.txz:  Upgraded.
  Multiple security issues have been corrected, including a possible
  man-in-the-middle attack where weak keying material is forced, denial
  of service, and the execution of arbitrary code.
  For more information, see:
    http://www.openssl.org/news/secadv_20140605.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
  (* Security fix *)
n/sendmail-8.14.9-x86_64-1.txz:  Upgraded.
  This release fixes one security related bug by properly closing file
  descriptors (except stdin, stdout, and stderr) before executing programs.
  This bug could enable local users to interfere with an open SMTP
  connection if they can execute their own program for mail delivery
  (e.g., via procmail or the prog mailer).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
  (* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz:  Upgraded.
+--------------------------+


Message édité par cycojesus le 06-06-2014 à 21:11:07

---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1359408
cycojesus
Mèo Lười
Posté le 10-06-2014 à 06:59:25  profilanswer
 

Mange ton php [:x-httpd-php]  
péhachpé
peucheupeu
pfhfpf
blerg [:xixix]  

Mon Jun  9 20:16:02 UTC 2014
n/php-5.4.29-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues, including a possible denial
  of service, and an issue where insecure default permissions on the FPM
  socket may allow local users to run arbitrary code as the apache user.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
  (* Security fix *)
+--------------------------+

[:gernouille is back:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1359417
wedgeant
Da penguin inside
Posté le 10-06-2014 à 10:17:53  profilanswer
 

[:wark0]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1359534
cycojesus
Mèo Lười
Posté le 12-06-2014 à 12:26:04  profilanswer
 

ô inspiration, [:dupondavec1d]  
Ô Muse unijambiste, [:vali103:1]  
Prends-moi sur ton sein que je me repaisse de ton lait [:ammal:4]  

Thu Jun 12 05:11:52 UTC 2014
ap/ddrescue-1.18.1-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-30.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-24.6.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
+--------------------------+

[:couscous_jambon_beur]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1359661
wedgeant
Da penguin inside
Posté le 16-06-2014 à 11:40:29  profilanswer
 

[:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
mood
Publicité
Posté le 16-06-2014 à 11:40:29  profilanswer
 

n°1359721
cycojesus
Mèo Lười
Posté le 18-06-2014 à 06:55:36  profilanswer
 

Des pas update de sécurité [:frozen_face:5]  
Uppgrayyed [:frozen_face:3]  

Tue Jun 17 22:19:30 UTC 2014
l/ncurses-5.9-x86_64-3.txz:  Rebuilt.
  Applied upstream patch ncurses-5.9-20140308-patch.sh.
  Thanks to comet.berkeley.
n/yptools-2.14-x86_64-3.txz:  Rebuilt.
  Corrected yppasswd patch that was causing password changes to fail.
  Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-x86_64-1.txz:  Upgraded.
+--------------------------+

[:argv23]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1359728
wedgeant
Da penguin inside
Posté le 18-06-2014 à 10:54:53  profilanswer
 

[:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1359991
cycojesus
Mèo Lười
Posté le 25-06-2014 à 06:56:44  profilanswer
 

You write, where, what?! [:elwe calafalas:3] [:elwe calafalas:3]  
LA PORTEEUUUUUUUUUUUUU [:inek]

Tue Jun 24 22:35:07 UTC 2014
ap/man-1.6g-x86_64-2.txz:  Rebuilt.
  Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz:  Upgraded.
l/seamonkey-solibs-2.26.1-x86_64-1.txz:  Upgraded.
n/bind-9.9.5_P1-x86_64-1.txz:  Upgraded.
  This fixes security issues and other bugs.  Please note that the first
  CVE only affects Windows, and the second one was claimed to be fixed by
  an earlier version of BIND.  But we'll update anyway just in case.  :-)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
  (* Security fix *)
n/gnupg-1.4.17-x86_64-1.txz:  Upgraded.
  This release includes a security fix to stop a denial of service using
  garbled compressed data packets which can be used to put gpg into an
  infinite loop.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
  (* Security fix *)
n/gnupg2-2.0.24-x86_64-1.txz:  Upgraded.
  This release includes a security fix to stop a denial of service using
  garbled compressed data packets which can be used to put gpg into an
  infinite loop.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
  (* Security fix *)
n/samba-4.1.9-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues, including a flaw in Samba's
  internal DNS server which can be exploited to cause a denial of service,
  a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
  configurations that use shadow_copy* for vfs objects to reveal potentially
  private server information, a denial of service on the nmbd NetBIOS name
  services daemon, and a denial of service crash involving overwriting
  memory on an authenticated connection to the smbd file server.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
  (* Security fix *)
xap/seamonkey-2.26.1-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
testing/packages/bind-9.10.0_P2-x86_64-1.txz:  Added.
+--------------------------+

[:jack torrance]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1360836
cycojesus
Mèo Lười
Posté le 12-07-2014 à 07:32:31  profilanswer
 

J'ai rempli ton (co)bol, baffre ! [:mexican0]  
Y'a des pépites, gares à tes dents [:jpcheck:5]  

Sat Jul 12 02:24:10 UTC 2014
a/bash-4.3.018-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20140710git-noarch-1.txz:  Upgraded.
a/kernel-generic-3.14.12-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.12-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.12-x86_64-1.txz:  Upgraded.
a/shadow-4.2.1-x86_64-1.txz:  Upgraded.
  This adds support for subuid and subgid needed for unprivileged containers.
  Thanks to Christoph Willing.
ap/cgmanager-20140710_986cd44-x86_64-1.txz:  Added.
  Thanks to Matteo Bernardini.
ap/linuxdoc-tools-0.9.69-x86_64-1.txz:  Upgraded.
  Thanks to Stuart Winter.
ap/lxc-1.0.3-x86_64-1.txz:  Upgraded.
  This adds a template for for lxc-create to create a minimal Slackware
  container using slackpkg.  For example, this will create a container
  named "current":
    lxc-create -n current -t slackware
  There's an rc.lxc init script added to autorun/autostop containers, but it's
  not currently hooked in to the main init scripts, so if you want to use it
  you'll need to add it to your rc.local and rc.local_shutdown (and make it
  executable).  The script will look for "lxc.start.auto = 1" in the container
  config file to determine if a container should be autostarted (1) or not (0).
  Thanks to Matteo Bernardini.
ap/lzip-1.15-x86_64-1.txz:  Added.
ap/nano-2.3.5-x86_64-1.txz:  Upgraded.
ap/slackpkg-2.82.0-noarch-13.tgz:  Rebuilt.
   Patched to support $ROOT and $CONF environment variables.
   Thanks to Matteo Bernardini.
d/gnu-cobol-1.1-x86_64-1.txz:  Added.
d/kernel-headers-3.14.12-x86-1.txz:  Upgraded.
d/open-cobol-1.1-x86_64-2.txz:  Removed.
  This project has been renamed GNU Cobol.
d/slacktrack-2.16-x86_64-1.txz:  Upgraded.
  Thanks to Stuart Winter.
k/kernel-source-3.14.12-noarch-1.txz:  Upgraded.
  Added back CONFIG_USER_NS=y now that it no longer conflicts with XFS.
  Thanks to Christoph Willing.
l/libnih-1.0.3-x86_64-1.txz:  Added.
  Thanks to Matteo Bernardini.
l/taglib-1.9.1-x86_64-1.txz:  Upgraded.
  Linked with -lstdc++.  Thanks to comet.berkeley.
n/php-5.4.30-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/source/config-testing-3.15.5/*:  Added.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:dovakor:2]  [:dovakor:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1360858
cycojesus
Mèo Lười
Posté le 13-07-2014 à 07:38:13  profilanswer
 

ôpala ! [:rosette1]

Sat Jul 12 17:34:47 UTC 2014
ap/nano-2.3.5-x86_64-2.txz:  Rebuilt.
  Provide --datadir to ./configure to work around a bug that installed the
  locale files in the wrong directory.
  Thanks to Wim Speekenbrink.
+--------------------------+

[:c-lia]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1360868
l-info
Posté le 13-07-2014 à 14:17:49  profilanswer
 

:bounce: ma distribution préférée


Message édité par l-info le 13-07-2014 à 14:18:22
n°1360941
cycojesus
Mèo Lười
Posté le 16-07-2014 à 07:06:20  profilanswer
 

Ouvrez la bouche monsieur [:bebe fraise]  [:bebe fraise]  
Grand, ouvrez grand [:dipterolyse]
OU
VREZ
!
 [:benkebab:2]

Tue Jul 15 23:53:10 UTC 2014
Enjoy some new X related updates!  Thanks to Robby Workman for lots of help
on the X.Org upgrades, and to alienBOB for an earlier SlackBuild for Motif
that I used as a reference for configure options and other fixes.
You can blame me for picking xorg-server-1.15.2 over xorg-server-1.14.7.  ;-)
If you're using a proprietary video driver you'll probably need to recompile it
for the new X server...  if you can.
ap/linuxdoc-tools-0.9.69-x86_64-2.txz:  Rebuilt.
  Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl.
  Thanks to Matteo Bernardini for the report.
ap/lxc-1.0.5-x86_64-1.txz:  Upgraded.
d/automake-1.14.1-noarch-1.txz:  Upgraded.
d/llvm-3.4.2-x86_64-1.txz:  Upgraded.
kde/calligra-2.8.5-x86_64-1.txz:  Upgraded.
kdei/calligra-l10n-bs-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-ca-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-ca\@valencia-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-cs-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-da-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-de-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-el-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-en_GB-2.8.5-noarch-1.txz:  Added.
kdei/calligra-l10n-es-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-et-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz:  Added.
kdei/calligra-l10n-fi-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-fr-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-gl-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-hu-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-ia-2.7.5-noarch-1.txz:  Removed.
kdei/calligra-l10n-it-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-ja-2.8.5-noarch-1.txz:  Added.
kdei/calligra-l10n-kk-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-nb-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-nl-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-pl-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-pt-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-ru-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-sk-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-sl-2.7.5-noarch-1.txz:  Removed.
kdei/calligra-l10n-sv-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-tr-2.7.5-noarch-1.txz:  Removed.
kdei/calligra-l10n-uk-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.8.5-noarch-1.txz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.8.5-noarch-1.txz:  Upgraded.
l/lesstif-0.95.2-x86_64-1.txz:  Removed.
  LessTif is making way for real Motif.
  Thanks to the Hungry Programmers for a great run.  :-)
t/tetex-3.0-x86_64-9.txz:  Rebuilt.
  Recompiled /usr/bin/xdvi-motif.bin against Motif.
x/dri3proto-1.0-x86_64-1.txz:  Added.
x/fontconfig-2.11.1-x86_64-1.txz:  Upgraded.
x/freeglut-2.8.1-x86_64-1.txz:  Upgraded.
x/gccmakedep-1.0.3-noarch-1.txz:  Upgraded.
x/glamor-egl-0.6.0-x86_64-1.txz:  Added.
x/glew-1.10.0-x86_64-1.txz:  Upgraded.
x/glproto-1.4.17-noarch-1.txz:  Upgraded.
x/imake-1.0.7-x86_64-1.txz:  Upgraded.
x/inputproto-2.3.1-noarch-1.txz:  Upgraded.
x/libFS-1.0.6-x86_64-1.txz:  Upgraded.
x/libICE-1.0.9-x86_64-1.txz:  Upgraded.
x/libXfont-1.4.8-x86_64-1.txz:  Upgraded.
x/libXft-2.3.2-x86_64-1.txz:  Upgraded.
x/libXi-1.7.3-x86_64-1.txz:  Upgraded.
x/libdrm-2.4.54-x86_64-1.txz:  Upgraded.
x/libevdev-1.2-x86_64-1.txz:  Added.
x/libxcb-1.10-x86_64-1.txz:  Upgraded.
x/libxshmfence-1.1-x86_64-1.txz:  Added.
x/makedepend-1.0.5-x86_64-1.txz:  Upgraded.
x/mesa-10.1.5-x86_64-1.txz:  Upgraded.
x/motif-2.3.4-x86_64-1.txz:  Added.
x/mtdev-1.1.5-x86_64-1.txz:  Upgraded.
x/pixman-0.32.6-x86_64-1.txz:  Upgraded.
x/presentproto-1.0-x86_64-1.txz:  Added.
x/util-macros-1.19.0-noarch-1.txz:  Upgraded.
x/xauth-1.0.9-x86_64-1.txz:  Upgraded.
x/xcb-proto-1.10-x86_64-1.txz:  Upgraded.
x/xcb-util-cursor-0.1.1-x86_64-1.txz:  Upgraded.
x/xcb-util-renderutil-0.3.9-x86_64-1.txz:  Upgraded.
x/xcb-util-wm-0.4.1-x86_64-1.txz:  Upgraded.
x/xcursorgen-1.0.6-x86_64-1.txz:  Upgraded.
x/xdg-user-dirs-0.15-x86_64-1.txz:  Upgraded.
x/xextproto-7.3.0-x86_64-1.txz:  Upgraded.
x/xf86-input-acecad-1.5.0-x86_64-6.txz:  Rebuilt.
x/xf86-input-aiptek-1.4.1-x86_64-6.txz:  Rebuilt.
x/xf86-input-evdev-2.9.0-x86_64-1.txz:  Upgraded.
x/xf86-input-joystick-1.6.1-x86_64-6.txz:  Rebuilt.
x/xf86-input-keyboard-1.8.0-x86_64-1.txz:  Upgraded.
x/xf86-input-mouse-1.9.0-x86_64-4.txz:  Rebuilt.
x/xf86-input-penmount-1.5.0-x86_64-6.txz:  Rebuilt.
x/xf86-input-synaptics-1.8.0-x86_64-1.txz:  Upgraded.
x/xf86-input-vmmouse-13.0.0-x86_64-5.txz:  Rebuilt.
x/xf86-input-void-1.4.0-x86_64-6.txz:  Rebuilt.
x/xf86-input-wacom-0.19.0-x86_64-5.txz:  Rebuilt.
x/xf86-video-apm-1.2.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-ark-0.7.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-ast-0.99.9-x86_64-1.txz:  Upgraded.
x/xf86-video-ati-7.4.0-x86_64-1.txz:  Upgraded.
x/xf86-video-chips-1.2.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-cirrus-1.5.2-x86_64-5.txz:  Rebuilt.
x/xf86-video-dummy-0.3.7-x86_64-2.txz:  Rebuilt.
x/xf86-video-glint-1.2.8-x86_64-5.txz:  Rebuilt.
x/xf86-video-i128-1.3.6-x86_64-5.txz:  Rebuilt.
x/xf86-video-i740-1.3.4-x86_64-5.txz:  Rebuilt.
x/xf86-video-mach64-6.9.4-x86_64-5.txz:  Rebuilt.
x/xf86-video-mga-1.6.3-x86_64-1.txz:  Upgraded.
x/xf86-video-modesetting-0.9.0-x86_64-1.txz:  Upgraded.
x/xf86-video-neomagic-1.2.8-x86_64-3.txz:  Rebuilt.
x/xf86-video-nouveau-1.0.10-x86_64-1.txz:  Upgraded.
x/xf86-video-nv-2.1.20-x86_64-6.txz:  Rebuilt.
x/xf86-video-openchrome-0.3.3-x86_64-3.txz:  Rebuilt.
x/xf86-video-r128-6.9.2-x86_64-2.txz:  Rebuilt.
x/xf86-video-rendition-4.2.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-s3-0.6.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-s3virge-1.10.6-x86_64-6.txz:  Rebuilt.
x/xf86-video-savage-2.3.7-x86_64-2.txz:  Rebuilt.
x/xf86-video-siliconmotion-1.7.7-x86_64-6.txz:  Rebuilt.
x/xf86-video-sis-0.10.7-x86_64-5.txz:  Rebuilt.
x/xf86-video-sisusb-0.9.6-x86_64-5.txz:  Rebuilt.
x/xf86-video-tdfx-1.4.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-tga-1.2.2-x86_64-5.txz:  Rebuilt.
x/xf86-video-trident-1.3.6-x86_64-5.txz:  Rebuilt.
x/xf86-video-tseng-1.2.5-x86_64-5.txz:  Rebuilt.
x/xf86-video-v4l-0.2.0-x86_64-10.txz:  Rebuilt.
x/xf86-video-vesa-2.3.3-x86_64-2.txz:  Rebuilt.
x/xf86-video-vmware-13.0.2-x86_64-1.txz:  Upgraded.
x/xf86-video-voodoo-1.2.5-x86_64-6.txz:  Rebuilt.
x/xf86-video-xgi-git_be3abf8570a-x86_64-5.txz:  Rebuilt.
x/xf86-video-xgixp-1.8.1-x86_64-5.txz:  Rebuilt.
x/xkeyboard-config-2.11-noarch-1.txz:  Upgraded.
x/xorg-cf-files-1.0.5-noarch-1.txz:  Upgraded.
x/xorg-server-1.15.2-x86_64-1.txz:  Upgraded.
x/xorg-server-xephyr-1.15.2-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-1.15.2-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-1.15.2-x86_64-1.txz:  Upgraded.
x/xproto-7.0.26-noarch-1.txz:  Upgraded.
x/xrandr-1.4.2-x86_64-1.txz:  Upgraded.
x/xscope-1.4.1-x86_64-1.txz:  Upgraded.
x/xterm-309-x86_64-1.txz:  Upgraded.
x/xtrans-1.3.4-noarch-1.txz:  Upgraded.
xap/ddd-3.3.12-x86_64-3.txz:  Rebuilt.
  Recompiled against Motif.
xap/xpdf-3.04-x86_64-1.txz:  Upgraded.
+--------------------------+

[:mac87:1]  [:mac87:1]  [:tombig]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1360954
wedgeant
Da penguin inside
Posté le 16-07-2014 à 11:10:34  profilanswer
 

Niam [:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1360957
cycojesus
Mèo Lười
Posté le 16-07-2014 à 12:58:25  profilanswer
 

et si que
des foies cuits [:cheukleu:3]

Wed Jul 16 05:31:30 UTC 2014
x/xf86-video-intel-2.99.912-x86_64-1.txz:  Upgraded.
  Looks like the stable driver won't compile with the new xorg-server, so
  we'll try this one.
+--------------------------+

[:yiipaa:4]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361129
cycojesus
Mèo Lười
Posté le 20-07-2014 à 11:23:00  profilanswer
 

Mézo, za, r'sot [:kryptos:5] !

Sun Jul 20 05:00:36 UTC 2014
x/mesa-10.2.4-x86_64-1.txz:  Upgraded.
  Added --with-egl-platforms="drm,x11".  Without this, the EGL support for drm
  is not built leading to crashes with newer radeon hardware.
  Thanks to sberthelot and Robby Workman.
+--------------------------+


[:petitjambon:4]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361152
wedgeant
Da penguin inside
Posté le 21-07-2014 à 10:10:07  profilanswer
 

[:zedlefou:1]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1361372
cycojesus
Mèo Lười
Posté le 24-07-2014 à 07:36:00  profilanswer
 

Le Bien, gros, demi-gros, détail [:data error]  

Wed Jul 23 23:00:34 UTC 2014
a/kernel-generic-3.14.13-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.13-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.13-x86_64-1.txz:  Upgraded.
ap/nano-2.3.6-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.13-x86-1.txz:  Upgraded.
e/emacs-24.3-x86_64-4.txz:  Rebuilt.
  Renamed ctags manpage that conflicts with Exuberant Ctags.  Thanks to Jim.
k/kernel-source-3.14.13-noarch-1.txz:  Upgraded.
n/httpd-2.4.10-x86_64-1.txz:  Upgraded.
  This update fixes the following security issues:
  *) SECURITY: CVE-2014-0117 (cve.mitre.org)
     mod_proxy: Fix crash in Connection header handling which
     allowed a denial of service attack against a reverse proxy
     with a threaded MPM.  [Ben Reser]
  *) SECURITY: CVE-2014-0118 (cve.mitre.org)
     mod_deflate: The DEFLATE input filter (inflates request bodies) now
     limits the length and compression ratio of inflated request bodies to
     avoid denial of sevice via highly compressed bodies.  See directives
     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
     and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
  *) SECURITY: CVE-2014-0226 (cve.mitre.org)
     Fix a race condition in scoreboard handling, which could lead to
     a heap buffer overflow.  [Joe Orton, Eric Covener]
  *) SECURITY: CVE-2014-0231 (cve.mitre.org)
     mod_cgid: Fix a denial of service against CGI scripts that do
     not consume stdin that could lead to lingering HTTPD child processes
     filling up the scoreboard and eventually hanging the server.  By
     default, the client I/O timeout (Timeout directive) now applies to
     communication with scripts.  The CGIDScriptTimeout directive can be
     used to set a different timeout for communication with scripts.
     [Rainer Jung, Eric Covener, Yann Ylavic]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
  (* Security fix *)
xap/mozilla-firefox-31.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-31.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:chatoo]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361376
el_barbone
too old for this shit ...
Posté le 24-07-2014 à 08:06:58  profilanswer
 

[:koukouille:3]


---------------
En théorie, la théorie et la pratique sont identiques, en pratique, non.
n°1361380
wedgeant
Da penguin inside
Posté le 24-07-2014 à 10:06:03  profilanswer
 

[:koukouille:3] [:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1361382
el_barbone
too old for this shit ...
Posté le 24-07-2014 à 10:08:31  profilanswer
 

[:koukouille:3][:koukouille:3][:koukouille:3]


---------------
En théorie, la théorie et la pratique sont identiques, en pratique, non.
n°1361383
el_barbone
too old for this shit ...
Posté le 24-07-2014 à 10:08:37  profilanswer
 

[:koukouille:3][:koukouille:3][:koukouille:3][:koukouille:3]


---------------
En théorie, la théorie et la pratique sont identiques, en pratique, non.
n°1361384
el_barbone
too old for this shit ...
Posté le 24-07-2014 à 10:08:44  profilanswer
 

[:koukouille:3][:koukouille:3][:koukouille:3][:koukouille:3][:koukouille:3]


---------------
En théorie, la théorie et la pratique sont identiques, en pratique, non.
n°1361663
cycojesus
Mèo Lười
Posté le 30-07-2014 à 09:58:39  profilanswer
 

Kodé dans un K.ayak [:jobi joba_]  
Ya.kari Krake et Komitt [:fab76]  

Wed Jul 30 00:08:00 UTC 2014
d/gdb-7.8-x86_64-1.txz:  Upgraded.
d/guile-2.0.11-x86_64-1.txz:  Upgraded.
x/libXext-1.3.3-x86_64-1.txz:  Upgraded.
x/libXi-1.7.4-x86_64-1.txz:  Upgraded.
x/xf86-video-intel-2.99.914-x86_64-1.txz:  Upgraded.
x/xterm-310-x86_64-1.txz:  Upgraded.
+--------------------------+

[:syr01]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361779
cycojesus
Mèo Lười
Posté le 02-08-2014 à 08:47:39  profilanswer
 

Y avéré des trous,  tout va très
Des Vosges du Nord des nouvelles technologies des troubles  [:jacquesmartin:2]

Fri Aug  1 21:13:18 UTC 2014
n/dhcpcd-6.0.5-x86_64-3.txz:  Rebuilt.
  This update fixes a security issue where a specially crafted packet
  received from a malicious DHCP server causes dhcpcd to enter an infinite
  loop causing a denial of service.
  Thanks to Tobias Stoeckmann for the bug report.
  (* Security fix *)
n/samba-4.1.11-x86_64-1.txz:  Upgraded.
  This update fixes a remote code execution attack on unauthenticated nmbd
  NetBIOS name services.  A malicious browser can send packets that may
  overwrite the heap of the target nmbd NetBIOS name services daemon.
  It may be possible to use this to generate a remote code execution
  vulnerability as the superuser (root).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
  (* Security fix *)
xap/xscreensaver-5.29-x86_64-2.txz:  Rebuilt.
  Disabled nag screen that says "This version of XScreenSaver is very old!
  Please upgrade!" when the age of the software exceeds 12 months.
+--------------------------+

[:jacquesmartin:2]  [:jambier:3]  [:jambier:4]


Message édité par cycojesus le 02-08-2014 à 09:31:54

---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361847
kisscoolz
Posté le 04-08-2014 à 13:18:44  profilanswer
 

Bonjour ici,
 
Est ce que quelqu'un pourrait me dire pourquoi les modifs que je met dans le fichier /etc/sysctl.conf ne sont pas prises en compte au boot de la machine depuis le script /etc/rc.d/rc.S ?  
 
Je fonctionne avec une slackware 14.1 et si je lance sysctl manuellement ou si je place la partie du code censé exécuter sysctl dans /etc/rc.d/rc.local, la ca marche sans problème.  
 
Le bout de script en question:

Code :
  1. # Configure runtime kernel parameters:
  2. if [ -x /sbin/sysctl -a -r /etc/sysctl.conf ]; then
  3.   echo -e "${BOLDWHITE}Setting kernel runtime parameters:${COLOR_RESET}"
  4.   /sbin/sysctl -e -p /etc/sysctl.conf
  5. fi


 
Merci très


---------------
http://lacabanedeladmin.trickip.net/
n°1361862
kisscoolz
Posté le 05-08-2014 à 00:22:28  profilanswer
 

En poussant un peu plus les tests, il semblerait que les conditions sont respectées et la commande sysctl exécutée.  
 
J'en viens à me dire que c'est les modifs que je veux faire qui ne passe pas à ce stade du démarrage de la machine. D'où ma question, qu'est ce qui ferait que la désactivation de l'ipv6 via le fichier sysctl.conf ne marche pas à ce moment ?


---------------
http://lacabanedeladmin.trickip.net/
n°1361867
cycojesus
Mèo Lười
Posté le 05-08-2014 à 10:20:12  profilanswer
 

Les invités arrivent [:oriane:4]  
Ô joisse [:exhortae]

Mon Aug  4 20:55:26 UTC 2014
a/gpm-1.20.7-x86_64-3.txz:  Rebuilt.
  Removed the mouse-t.el file, which is older than the version in Emacs.
  Thanks to Richard Cranium.
+--------------------------+

[:magnets:3]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1361873
regdub
Posté le 05-08-2014 à 11:43:35  profilanswer
 

kisscoolz a écrit :

D'où ma question, qu'est ce qui ferait que la désactivation de l'ipv6 via le fichier sysctl.conf ne marche pas à ce moment ?


 
Ou c'est écrasé par la suite par une autre commande, initialisation du réseau, rc.ip_forward, firewall...


---------------
Legalize it @HFR
n°1361884
kisscoolz
Posté le 05-08-2014 à 14:20:17  profilanswer
 

J'ai pas pensé à ca en effet mais bon ca me parait gros. Pour en être sûr j'ai vérifier dans le dossier /etc si il n'y avait pas quelque chose qui lançait un sysctl autre que dans le rc.S. Et rien.  
 
J'ai fait le test sur une installation fraiche pour éviter l'influence de toute modification ultérieur, donc pas de firewall, ni de nat/routage d'activé. Bah ca prends pas au moment de l'exécution. :/
 
Je peux bien sur mettre dans le rc.local mais pour ma culture perso, si y'a une explication quelque part, je suis preneur.
 
 
Edit:
Je rajouterai que l'éxécution manuelle ou via le fichier rc.local de sysctl renvoi à l'écran les valeurs modifiées alors que l'exécution de ce même fichier via le fichier rc.S ne renvoi rien du tout. Pourtant il rentre dans les conditions et "serait" exécuter parce que la commande echo juste avant la commande sysctl est bien affichée.  
 
Je me prends peut être la tête pour rien mais j'arrive pas à comprendre.


Message édité par kisscoolz le 05-08-2014 à 16:02:09

---------------
http://lacabanedeladmin.trickip.net/
n°1362064
cycojesus
Mèo Lười
Posté le 09-08-2014 à 08:40:36  profilanswer
 

Tarte aux épis de maïs aujourd'hui, sort les cure-dents [:molmock]

Fri Aug  8 19:02:50 UTC 2014
Welcome pi kernel!  Unless we reach kernel 3.14.159, this is probably the best
approximation we're going to get.  :-)
a/kernel-firmware-20140807git-noarch-1.txz:  Upgraded.
a/kernel-generic-3.14.16-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.16-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.16-x86_64-1.txz:  Upgraded.
a/openssl-solibs-1.0.1i-x86_64-1.txz:  Upgraded.
  (* Security fix *)
d/kernel-headers-3.14.16-x86-1.txz:  Upgraded.
k/kernel-source-3.14.16-noarch-1.txz:  Upgraded.
n/openssl-1.0.1i-x86_64-1.txz:  Upgraded.
  This update fixes several security issues:
  Double Free when processing DTLS packets (CVE-2014-3505)
  DTLS memory exhaustion (CVE-2014-3506)
  DTLS memory leak from zero-length fragments (CVE-2014-3507)
  Information leak in pretty printing functions (CVE-2014-3508)
  Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
  OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
  OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
  SRP buffer overrun (CVE-2014-3512)
  Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
  For more information, see:
    https://www.openssl.org/news/secadv_20140806.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:incodreamer:1]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1363045
cycojesus
Mèo Lười
Posté le 26-08-2014 à 06:52:07  profilanswer
 

C'est la rentrée et tu t'ennuies ; t'en est au point où tu restaure le Vaio de Madame qui a passé 1 heure au téléphone à se faire hacker ? [:jovalise:1]  
Soit Joie [:mika_18]  
Soit Alégresse [:mika_18]  
La pitance est venue [:andvari:2]

Mon Aug 25 22:02:08 UTC 2014
a/kernel-generic-3.14.17-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.17-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.17-x86_64-1.txz:  Upgraded.
a/libcgroup-0.41-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.17-x86-1.txz:  Upgraded.
k/kernel-source-3.14.17-noarch-1.txz:  Upgraded.
  Changed these kernel options:
    CONNECTOR m -> y
   +PROC_EVENTS y
  Thanks to linuxxer.
l/freetype-2.5.3-x86_64-1.txz:  Upgraded.
n/tin-2.2.1-x86_64-1.txz:  Upgraded.
x/libxcb-1.11-x86_64-1.txz:  Upgraded.
x/mesa-10.2.6-x86_64-1.txz:  Upgraded.
  Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
x/xcb-proto-1.11-x86_64-1.txz:  Upgraded.
x/xf86-input-mouse-1.9.1-x86_64-1.txz:  Upgraded.
x/xf86-video-ast-1.0.1-x86_64-1.txz:  Upgraded.
x/xfs-1.1.4-x86_64-1.txz:  Upgraded.
x/xorg-server-1.15.2-x86_64-2.txz:  Rebuilt.
  Added these explicit options for all X servers:
  --enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
  Thanks to Dinithion.
x/xorg-server-xephyr-1.15.2-x86_64-2.txz:  Rebuilt.
x/xorg-server-xnest-1.15.2-x86_64-2.txz:  Rebuilt.
x/xorg-server-xvfb-1.15.2-x86_64-2.txz:  Rebuilt.
x/xrandr-1.4.3-x86_64-1.txz:  Upgraded.
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-x86_64-2.txz:  Rebuilt.
  Fix ABI mismatch.  Thanks to dr.s.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.

[:penis_de_castor]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1363054
wedgeant
Da penguin inside
Posté le 26-08-2014 à 09:24:17  profilanswer
 

[:wark0]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1363330
cycojesus
Mèo Lười
Posté le 29-08-2014 à 06:56:56  profilanswer
 

Tada [:tell the king]

Thu Aug 28 23:17:47 UTC 2014
l/mozilla-nss-3.16.4-x86_64-1.txz:  Upgraded.
  Upgraded to nss-3.16.4 and nspr-4.10.7.
+--------------------------+

[:metos:1]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1363962
cycojesus
Mèo Lười
Posté le 05-09-2014 à 06:47:14  profilanswer
 

La rentrée du Moz [:shit hahat:5]

Thu Sep  4 19:43:25 UTC 2014
xap/mozilla-firefox-32.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-31.1.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
n/php-5.4.32-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
  (* Security fix *)
+--------------------------+

phpschit [:guilz]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1363984
wedgeant
Da penguin inside
Posté le 05-09-2014 à 14:38:43  profilanswer
 

[:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1364015
gui42
Posté le 06-09-2014 à 14:25:45  profilanswer
 

Salut
J'ai voulu upgradé Firefox (j'avais la 29 je crois).
Depuis il me détecte plus les plugins (about:plugins = Aucun plugin installé n'a été trouvé), notamment flash.
Alors je sais, çapuçaipalibre mais y'a des sites qui marchent qu'avec ça.
Ca fait pareil chez vous ?
Je trouve des infos parlant de Shumway mais est-ce que c'est intégré maintenant ?

Honte sur moi, dans la précipitation, j'ai pris les paquets dans le rép current et non dans le 64-current, et comme j'ai les compat-libs, le 32*32bits (!) démarrait quand même.
Bon week-end à tous


Message édité par gui42 le 06-09-2014 à 15:34:52
mood
Publicité
Posté le   profilanswer
 

 Page :   1  2  3  4  5  ..  63  64  65  ..  108  109  110  111  112  113

Aller à :
Ajouter une réponse
 

Sujets relatifs
Slackware 9.0[slackware] Suppression de terminaux virtuels ?
!! Configuration reseaux, slackware 9 !!Installer slackware 9.0 par ftp (boot disquette)
[Pb] Installation new HDD sous slackware 8.0[RESOLU] Pb d'execution mysql sur slackware ...
Slackware 9 du pur bonheurMonter une partition NTFS sous linux (slackware 9.0)
Slackware 9.0 Finale OUTJe sens que je vais quitter Slackware (pas en serv)
Plus de sujets relatifs à : [SLACKWARE] du présent - 15.0


Copyright © 1997-2022 Hardware.fr SARL (Signaler un contenu illicite / Données personnelles) / Groupe LDLC / Shop HFR