Forum |  HardWare.fr | News | Articles | PC | S'identifier | S'inscrire | Shop Recherche
1597 connectés 

 

 

La 15.0 est là (en vrai !)




Attention si vous cliquez sur "voir les résultats" vous ne pourrez plus voter
Les invités peuvent voter

 Mot :   Pseudo :  
  Aller à la page :
 
 Page :   1  2  3  4  5  ..  64  65  66  ..  107  108  109  110  111  112
Auteur Sujet :

[SLACKWARE] du présent - 15.0

n°1364015
gui42
Posté le 06-09-2014 à 14:25:45  profilanswer
 

Reprise du message précédent :
Salut
J'ai voulu upgradé Firefox (j'avais la 29 je crois).
Depuis il me détecte plus les plugins (about:plugins = Aucun plugin installé n'a été trouvé), notamment flash.
Alors je sais, çapuçaipalibre mais y'a des sites qui marchent qu'avec ça.
Ca fait pareil chez vous ?
Je trouve des infos parlant de Shumway mais est-ce que c'est intégré maintenant ?

Honte sur moi, dans la précipitation, j'ai pris les paquets dans le rép current et non dans le 64-current, et comme j'ai les compat-libs, le 32*32bits (!) démarrait quand même.
Bon week-end à tous


Message édité par gui42 le 06-09-2014 à 15:34:52
mood
Publicité
Posté le 06-09-2014 à 14:25:45  profilanswer
 

n°1364020
nh3xus
Posté le 06-09-2014 à 15:38:08  profilanswer
 

Je suis un utilisateur de la Slack mais uniquement en 32 bits.
 
Mon portable supporte le 64 bits mais mon BIOS limite la RAM à 3,33 Go.
 
Du coup, ça me permet de pas (encore) me prendre la tête avec le multilib :o
 
A ce propos, je me demande combien d'entre vous utilisent du pure x64 [:transparency]

n°1364022
gui42
Posté le 06-09-2014 à 17:10:24  profilanswer
 

Je l'utilisais jusqu'à il y a peu, je l'ai ajouté pour tester DraftSight.
Et Firefox 32 aujourd'hui :o :ange: :lol:  
:hello:

n°1364114
wedgeant
Da penguin inside
Posté le 08-09-2014 à 11:38:39  profilanswer
 

nh3xus a écrit :

Je suis un utilisateur de la Slack mais uniquement en 32 bits.
 
Mon portable supporte le 64 bits mais mon BIOS limite la RAM à 3,33 Go.
 
Du coup, ça me permet de pas (encore) me prendre la tête avec le multilib :o
 
A ce propos, je me demande combien d'entre vous utilisent du pure x64 [:transparency]


Moi :spamafote:


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1364117
nh3xus
Posté le 08-09-2014 à 12:26:48  profilanswer
 


 
Le truc, c'est que j'aimerais bien y passer mais VirtualBox n'est pas dispo en pure x64.
 
Et j'ai pas vraiment le temps de me pencher sur KVM :o

n°1364119
wedgeant
Da penguin inside
Posté le 08-09-2014 à 14:33:17  profilanswer
 

Sinon t'installes ton système pour de bon sur ta machine [:prodigy]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1364125
nh3xus
Posté le 08-09-2014 à 19:37:36  profilanswer
 

wedgeant a écrit :

Sinon t'installes ton système pour de bon sur ta machine [:prodigy]


 
Désolé, je me suis mal exprimé.
 
Ma Slackware est bien installée "en dur".
 
J'ai simplement besoin d'un hyperviseur basique pour mes VM de test (Windows,Arch ou autres).
 
Et j'ai choisi VirtualBox parce que je suis fainéant. :o
 
Au passage, ya un nouveau wrapper de gestion de mises à jours qui vient de sortir pour la Slack. [:albanulle:2]

n°1364214
cycojesus
Mèo Lười
Posté le 10-09-2014 à 07:00:17  profilanswer
 

Cas Fée : L'Étrange Apparition Des Choses [:appleaddict1]

Tue Sep  9 22:48:58 UTC 2014
a/btrfs-progs-20140909-x86_64-1.txz:  Upgraded.
n/net-snmp-5.7.2.1-x86_64-1.txz:  Upgraded.
  Patched to properly report Btrfs mounts in hrFS/hrStorage tables.
  Thanks to Jakub Jankowski.
+--------------------------+
Tue Sep  9 18:01:05 UTC 2014
a/kernel-firmware-20140909git-noarch-1.txz:  Upgraded.
a/kernel-generic-3.14.18-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.18-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.18-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.18-x86-1.txz:  Upgraded.
k/kernel-source-3.14.18-noarch-1.txz:  Upgraded.
l/seamonkey-solibs-2.29-x86_64-1.txz:  Upgraded.
xap/rdesktop-1.8.2-x86_64-1.txz:  Upgraded.
xap/seamonkey-2.29-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
  Use syslinux-nomtools on the installer.  Thanks to Didier Spaier.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
  Use syslinux-nomtools on the installer.  Thanks to Didier Spaier.
+--------------------------+

[:me gusta:5]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1364226
wedgeant
Da penguin inside
Posté le 10-09-2014 à 10:35:07  profilanswer
 

[:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365014
cycojesus
Mèo Lười
Posté le 25-09-2014 à 06:50:14  profilanswer
 

Au lit, Crap ! [:fullraymond:5]

Wed Sep 24 22:52:53 UTC 2014
a/bash-4.3.025-x86_64-1.txz:  Upgraded.
  This update fixes a vulnerability in bash related to how environment
  variables are processed:  trailing code in function definitions was
  executed, independent of the variable name.  In many common configurations
  (such as the use of CGI scripts), this vulnerability is exploitable over
  the network.  Thanks to Stephane Chazelas for discovering this issue.
  For more information, see:
    http://seclists.org/oss-sec/2014/q3/650
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
  (* Security fix *)
l/mozilla-nss-3.16.5-x86_64-1.txz:  Upgraded.
  Fixed an RSA Signature Forgery vulnerability.
  For more information, see:
    https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
  (* Security fix *)
+--------------------------+

[:agit lit:3]  [:agit lit:2]  [:agit lit:1]  [:agit lit]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
mood
Publicité
Posté le 25-09-2014 à 06:50:14  profilanswer
 

n°1365071
wedgeant
Da penguin inside
Posté le 25-09-2014 à 16:22:21  profilanswer
 

Bash il est tout cassééééééé [:islord]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365104
cycojesus
Mèo Lười
Posté le 26-09-2014 à 07:08:04  profilanswer
 

[:winning:4] bash [:domen1]

Thu Sep 25 19:55:13 UTC 2014
a/bash-4.3.025-x86_64-2.txz:  Rebuilt.
  Patched an additional trailing string processing vulnerability discovered
  by Tavis Ormandy.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
  (* Security fix *)
ap/lxc-1.0.6-x86_64-1.txz:  Upgraded.
  Fixed bash completion file.  Thanks to dunric.
+--------------------------+

[:domen2]  [:domen3]


Message édité par cycojesus le 26-09-2014 à 07:08:25

---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1365152
Col Hanzap​last
Jurassic geek. Vive le cobol !
Posté le 26-09-2014 à 13:15:58  profilanswer
 

Sur AIX c'est ksh par défaut.
 
[:julm3]


---------------
" Il n'y a aucune chance pour que l'iPhone s'attribue une part de marché significative. Aucune chance. " (Steve Ballmer 2007)
n°1365154
wedgeant
Da penguin inside
Posté le 26-09-2014 à 14:20:09  profilanswer
 

Va ouvrir un topic AIX  [:yoakhaz]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365156
el_barbone
too old for this shit ...
Posté le 26-09-2014 à 14:30:30  profilanswer
 

wedgeant a écrit :

Va ouvrir un topic AIX  [:yoakhaz]


en provence [:dawak]


---------------
En théorie, la théorie et la pratique sont identiques, en pratique, non.
n°1365157
wedgeant
Da penguin inside
Posté le 26-09-2014 à 14:33:27  profilanswer
 

[:koukouille:3]


Message édité par wedgeant le 26-09-2014 à 14:33:57

---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365158
Magicpanda
Pushing the envelope
Posté le 26-09-2014 à 14:34:45  profilanswer
 

grosse pub chez bsd après le bug de bash :D

n°1365185
nh3xus
Posté le 26-09-2014 à 20:13:15  profilanswer
 

Théo de Raadt, on t'as reconnu :D

n°1365208
cycojesus
Mèo Lười
Posté le 27-09-2014 à 07:37:37  profilanswer
 

[:douchebag forever:2]

Fri Sep 26 22:23:32 UTC 2014
a/bash-4.3.026-x86_64-1.txz:  Upgraded.
  This is essentially a rebuild as the preliminary patch for CVE-2014-7169
  has been accepted by upstream and is now signed.  This also bumps the
  patchlevel, making it easy to tell this is the fixed version.
  Possibly more changes to come, given the ongoing discussions on oss-sec.
+--------------------------+

[:cyberjo:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1365216
Col Hanzap​last
Jurassic geek. Vive le cobol !
Posté le 27-09-2014 à 10:58:36  profilanswer
 

wedgeant a écrit :

Va ouvrir un topic AIX  [:yoakhaz]


Et les gars c'était pour rire, hein... Quand bash est directement appelé, le shell par défaut ne compte pas...
 
 [:adagio_for_strings:4]


---------------
" Il n'y a aucune chance pour que l'iPhone s'attribue une part de marché significative. Aucune chance. " (Steve Ballmer 2007)
n°1365294
cycojesus
Mèo Lười
Posté le 29-09-2014 à 07:38:57  profilanswer
 

Alors que  [:mariocompiegne]

Sun Sep 28 23:07:39 UTC 2014
l/seamonkey-solibs-2.29.1-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-32.0.3-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-31.1.2-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
xap/seamonkey-2.29.1-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+

[:bereszczynskithomas]  [:voltazeplon]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1365301
wedgeant
Da penguin inside
Posté le 29-09-2014 à 10:07:09  profilanswer
 

[:wark0]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365362
cycojesus
Mèo Lười
Posté le 30-09-2014 à 07:24:52  profilanswer
 

0 votes blancs [:mystiko:1]

Mon Sep 29 18:41:23 UTC 2014
a/bash-4.3.027-x86_64-1.txz:  Upgraded.
  Another bash update.  Here's some information included with the patch:
    "This patch changes the encoding bash uses for exported functions to avoid
    clashes with shell variables and to avoid depending only on an environment
    variable's contents to determine whether or not to interpret it as a shell
    function."
  After this update, an environment variable will not go through the parser
  unless it follows this naming structure:  BASH_FUNC_*%%
  Most scripts never expected to import functions from environment variables,
  so this change (although not backwards compatible) is not likely to break
  many existing scripts.  It will, however, close off access to the parser as
  an attack surface in the vast majority of cases.  There's already another
  vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
  but this hardening patch prevents it (and likely many more similar ones).
  Thanks to Florian Weimer and Chet Ramey.
  (* Security fix *)
+--------------------------+

[:ali-pacha:1]  [:beau mec:5]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1365367
wedgeant
Da penguin inside
Posté le 30-09-2014 à 09:27:32  profilanswer
 

[:chatte de garde]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1365681
cycojesus
Mèo Lười
Posté le 05-10-2014 à 08:10:03  profilanswer
 

Moultipasse [:le multi a trolls:5] [:multi-pseudo:1]  
 

Sun Oct  5 00:38:31 UTC 2014
a/elilo-3.16-x86_64-1.txz:  Upgraded.
  Thanks to fsLeg for the extra bit of sed that was needed to build the
  latest version.
+--------------------------+


 
[:doak82] [:multi-pseudo:1]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1365742
wedgeant
Da penguin inside
Posté le 06-10-2014 à 10:34:18  profilanswer
 

[:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1366322
cycojesus
Mèo Lười
Posté le 15-10-2014 à 06:56:07  profilanswer
 

[:merlin l'enchanteur:1] Groar du mi-mois

Tue Oct 14 23:45:01 UTC 2014
xap/mozilla-firefox-33.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-31.2.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
+--------------------------+

émoi [:merlin l'enchanteur:2]  [:merlin l'enchanteur:3]  [:merlin l'enchanteur]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1366349
wedgeant
Da penguin inside
Posté le 15-10-2014 à 14:54:47  profilanswer
 

[:crapulax]  [:the_rainmaker:1]  [:lefab:5]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1366388
cycojesus
Mèo Lười
Posté le 16-10-2014 à 07:04:01  profilanswer
 

N'écartes plus les doigts [:juliano66:2] , raccommode tes accros [:grande greluche:4]

Wed Oct 15 17:28:59 UTC 2014
a/openssl-solibs-1.0.1j-x86_64-1.txz:  Upgraded.
  (* Security fix *)
n/openssl-1.0.1j-x86_64-1.tx:  Upgraded.
  This update fixes several security issues:
  SRTP Memory Leak (CVE-2014-3513):
    A flaw in the DTLS SRTP extension parsing code allows an attacker, who
    sends a carefully crafted handshake message, to cause OpenSSL to fail
    to free up to 64k of memory causing a memory leak. This could be
    exploited in a Denial Of Service attack.
  Session Ticket Memory Leak (CVE-2014-3567):
    When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
    integrity of that ticket is first verified. In the event of a session
    ticket integrity check failing, OpenSSL will fail to free memory
    causing a memory leak. By sending a large number of invalid session
    tickets an attacker could exploit this issue in a Denial Of Service
    attack.
  SSL 3.0 Fallback protection:
    OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
    to block the ability for a MITM attacker to force a protocol
    downgrade.
    Some client applications (such as browsers) will reconnect using a
    downgraded protocol to work around interoperability bugs in older
    servers. This could be exploited by an active man-in-the-middle to
    downgrade connections to SSL 3.0 even if both sides of the connection
    support higher protocols. SSL 3.0 contains a number of weaknesses
    including POODLE (CVE-2014-3566).
  Build option no-ssl3 is incomplete (CVE-2014-3568):
    When OpenSSL is configured with "no-ssl3" as a build option, servers
    could accept and complete a SSL 3.0 handshake, and clients could be
    configured to send them.
  For more information, see:
    https://www.openssl.org/news/secadv_20141015.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
  (* Security fix *)
+--------------------------+

[:grande greluche]  [:grande greluche:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1366429
wedgeant
Da penguin inside
Posté le 16-10-2014 à 15:47:52  profilanswer
 

Memory leak  [:max evans]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1366659
cycojesus
Mèo Lười
Posté le 21-10-2014 à 07:03:53  profilanswer
 

Notre Pa.t qui êtes au Wisconsin
Que ton N.om soit sanctifié
Que ton Emacs vienne et que ta volonté soit faite
Sur le desktop comme le laptop [:neldor]

Tue Oct 21 02:10:33 UTC 2014
e/emacs-24.4-x86_64-1.txz:  Upgraded.
+--------------------------+
Mon Oct 20 22:21:45 UTC 2014
n/openssh-6.7p1-x86_64-1.txz:  Upgraded.
  This update fixes a security issue that allows remote servers to trigger
  the skipping of SSHFP DNS RR checking by presenting an unacceptable
  HostCertificate.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
  (* Security fix *)
+--------------------------+

[:jfken:4]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1366676
wedgeant
Da penguin inside
Posté le 21-10-2014 à 10:17:27  profilanswer
 

Pis c'était son anniverswaire  [:alexmagnus]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1366824
cycojesus
Mèo Lười
Posté le 24-10-2014 à 13:29:04  profilanswer
 

[:crazybiscuit78:2]  [:aaaabe:1]  [:frozen_face:1]

Fri Oct 24 04:55:44 UTC 2014
a/glibc-solibs-2.20-x86_64-1.txz:  Upgraded.
a/glibc-zoneinfo-2014i-noarch-1.txz:  Upgraded.
  Upgraded to tzcode2014i and tzdata2014i.
l/glibc-2.20-x86_64-1.txz:  Upgraded.
  This update fixes several security issues, and adds an extra security
  hardening patch from Florian Weimer.  Thanks to mancha for help with
  tracking and backporting patches.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
  (* Security fix *)
l/glibc-i18n-2.20-x86_64-1.txz:  Upgraded.
l/glibc-profile-2.20-x86_64-1.txz:  Upgraded.
xap/pidgin-2.10.10-x86_64-1.txz:  Upgraded.
  This update fixes several security issues:
  Insufficient SSL certificate validation (CVE-2014-3694)
  Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
  Remote crash parsing malformed Groupwise message (CVE-2014-3696)
  Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
  Potential information leak from XMPP (CVE-2014-3698)
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
  (* Security fix *)
+--------------------------+

[:what has been seen]  [:benkebab:1]  [:bezacrider:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1366859
cycojesus
Mèo Lười
Posté le 25-10-2014 à 07:36:20  profilanswer
 

Al etius, sed scurt [:noradii:2]  

Sat Oct 25 04:30:31 UTC 2014
xap/gimp-2.8.14-x86_64-1.txz:  Upgraded.
+--------------------------+
Fri Oct 24 21:11:15 UTC 2014
a/glibc-solibs-2.20-x86_64-2.txz:  Rebuilt.
d/gcc-4.8.3-x86_64-2.txz:  Rebuilt.
  Patched bug pr61801, which caused some failures with glibc-2.20.
d/gcc-g++-4.8.3-x86_64-2.txz:  Rebuilt.
d/gcc-gfortran-4.8.3-x86_64-2.txz:  Rebuilt.
d/gcc-gnat-4.8.3-x86_64-2.txz:  Rebuilt.
d/gcc-go-4.8.3-x86_64-2.txz:  Rebuilt.
d/gcc-java-4.8.3-x86_64-2.txz:  Rebuilt.
d/gcc-objc-4.8.3-x86_64-2.txz:  Rebuilt.
l/glibc-2.20-x86_64-2.txz:  Rebuilt.
  Recompiled with patched gcc.
l/glibc-i18n-2.20-x86_64-2.txz:  Rebuilt.
l/glibc-profile-2.20-x86_64-2.txz:  Rebuilt.
+--------------------------+

[:sunnycat:3]  [:rober_le_perver:1]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1366909
nh3xus
Posté le 26-10-2014 à 00:42:04  profilanswer
 

Mhh, des mises à jours pour glibc...
 
Je vais d'abord faire une sauvegarde du système avant de me lancer.
J'ai pas envie que mon portable me pète dans les mains. [:kwak]
J'en ai besoin pour mes cours et pour le moment, je touche du bois avec la Slack. [:phearsw]


Message édité par nh3xus le 26-10-2014 à 00:44:38
n°1366947
wedgeant
Da penguin inside
Posté le 27-10-2014 à 09:38:56  profilanswer
 

J'ai jamais eu le moindre souci de màj, même avec la glibc :spamafote:
 
Quota [:koukouille:3]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
n°1367259
cycojesus
Mèo Lười
Posté le 30-10-2014 à 06:58:49  profilanswer
 

MAJ aveugle [:baragor:1] MAJie Noire [:djall:2]

Wed Oct 29 18:21:12 UTC 2014
ap/moc-2.5.0-x86_64-1.txz:  Upgraded.
n/wget-1.16-x86_64-1.txz:  Upgraded.
  This update fixes a symlink vulnerability that could allow an attacker
  to write outside of the expected directory.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
  (* Security fix *)
+--------------------------+

[:gerbille putrefiee:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1368161
cycojesus
Mèo Lười
Posté le 08-11-2014 à 18:14:36  profilanswer
 

[:dust]  [:walter white:5]

Fri Nov  7 21:02:55 UTC 2014
a/bash-4.3.030-x86_64-1.txz:  Upgraded.
  Applied all upstream patches.  The previously applied patch requiring
  a specific prefix/suffix in order to parse variables for functions
  closed all of the known vulnerabilities anyway, but it's clear that
  until all the patches were applied that the "is this still vulnerable"
  questions were not going to end...
a/btrfs-progs-20141107-x86_64-1.txz:  Upgraded.
  Added the header files to the package.  Thanks to Vincent Batts.
a/kernel-firmware-20141106git-noarch-1.txz:  Upgraded.
a/kernel-generic-3.14.23-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.14.23-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.14.23-x86_64-1.txz:  Upgraded.
ap/mpg123-1.21.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.14.23-x86-1.txz:  Upgraded.
k/kernel-source-3.14.23-noarch-1.txz:  Upgraded.
xfce/xfce4-weather-plugin-0.8.4-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+
Tue Nov  4 00:05:23 UTC 2014
ap/mariadb-5.5.40-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
  (* Security fix *)
l/seamonkey-solibs-2.30-x86_64-1.txz:  Upgraded.
n/php-5.4.34-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues.
  #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
  #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
  #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
  (* Security fix *)
xap/mozilla-firefox-33.0.2-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/seamonkey-2.30-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+

[:apges:1]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1368411
cycojesus
Mèo Lười
Posté le 12-11-2014 à 11:52:03  profilanswer
 

Sympathy for the Dev. Ed. [:c3llu1337:1]  

Tue Nov 11 04:53:57 UTC 2014
xap/mozilla-firefox-33.1-x86_64-1.txz:  Upgraded.
+--------------------------+

[:rougesoie:1]  [:zero pm]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1368652
cycojesus
Mèo Lười
Posté le 14-11-2014 à 12:31:43  profilanswer
 

Tu manges ! [:babook:1]  
AAAAAAAAAAHhhhhhhhh [:mickounet]

Thu Nov 13 20:45:54 UTC 2014
ap/mariadb-5.5.40-x86_64-2.txz:  Rebuilt.
  Reverted change to my_config.h that breaks compiling many applications
  that link against the MariaDB libraries.
  Thanks to Willy Sudiarto Raharjo.
xap/pidgin-2.10.10-x86_64-2.txz:  Rebuilt.
  Fix Gadu-Gadu protocol when GnuTLS is not used.  Thanks to mancha.
+--------------------------+

[:manolito john]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1368662
wedgeant
Da penguin inside
Posté le 14-11-2014 à 14:26:25  profilanswer
 

Gloup [:neuf]


---------------
Wedge#2487 @HS -#- PW: +∞ -#- Khaz-Modan/Boltiz @WoW
mood
Publicité
Posté le   profilanswer
 

 Page :   1  2  3  4  5  ..  64  65  66  ..  107  108  109  110  111  112

Aller à :
Ajouter une réponse
 

Sujets relatifs
Slackware 9.0[slackware] Suppression de terminaux virtuels ?
!! Configuration reseaux, slackware 9 !!Installer slackware 9.0 par ftp (boot disquette)
[Pb] Installation new HDD sous slackware 8.0[RESOLU] Pb d'execution mysql sur slackware ...
Slackware 9 du pur bonheurMonter une partition NTFS sous linux (slackware 9.0)
Slackware 9.0 Finale OUTJe sens que je vais quitter Slackware (pas en serv)
Plus de sujets relatifs à : [SLACKWARE] du présent - 15.0


Copyright © 1997-2022 Hardware.fr SARL (Signaler un contenu illicite / Données personnelles) / Groupe LDLC / Shop HFR