Forum |  HardWare.fr | News | Articles | PC | S'identifier | S'inscrire | Shop Recherche
2610 connectés 

 

 

La 15.0 est là (en vrai !)




Attention si vous cliquez sur "voir les résultats" vous ne pourrez plus voter
Les invités peuvent voter

 Mot :   Pseudo :  
  Aller à la page :
 
 Page :   1  2  3  4  5  ..  70  71  72  ..  107  108  109  110  111  112
Auteur Sujet :

[SLACKWARE] du présent - 15.0

n°1393918
cycojesus
Mèo Lười
Posté le 25-08-2016 à 07:00:58  profilanswer
 

Reprise du message précédent :
et ça aussi

Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-x86_64-1.txz:  Upgraded.
+--------------------------+


ainsi que

Wed Aug 24 01:02:03 UTC 2016
 
Hello!
 
Slackware ARM -current and onwards is now a hard float OS!
 
To those of you whom are reading this after having let an automated tool
upgrade a soft float "-current" installation, and have found their system
has been destroyed:-
I did think of several ways to mitigate this by patching slackpkg, but it's not
fool proof so I've tried to mitigate such issues by deliberately wiping the soft
float port contents >2 months ahead of time in order to break your tools and cause
you to read the Change Log and take action.
Slackware is not designed to have automated packaging upgrade tools, so there's
no 100% fool proof way.
 
Like a phoenix rising from the ashes, and after several weeks of development
flavoured with other appropriate but overused marketing metaphors, the
Slackware ARM hard float port has landed! (see what I did there? ;-) )
 
What's important is that this port is built from the same soft float port source
tree, so is already based upon its success and stability over the last 10 years.
A few bugs have been fixed along the way, and the source tree updated to abstract
out as much architecture-specific stuff as possible (removing armv5 CFLAGS from
almost 1000 build scripts was not a lot of fun!).
 
The OS has been rebuilt over ~25 passes, so the core OS has been well excercised.
I've been testing as much as I can for the last few weeks and everything
looks in good order.  I cannot test everything though, so expect breakages.
Please report anything in the usual place:
  http://www.linuxquestions.org/questions/slackware-arm-108/
 
The currently supported systems that have been tested are:
  Trimslice Pro
  Banana Pi
  Versatile (QEMU emulation)
 
This is Day Zero of the release - the community projects will need their time
to update images, documentation and so on.
 
The mini root filesystem for -current is also available:
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
 
If you were previously using the Mozilla suite: these were moved out of tree
for the soft float port (since they only supported hard float), but are now
present once again in the 'xap' series.
 
Thanks to everyone who has made donations.  As well as being an encouragement,
it's enabled the purchase of two new Banana Pi's to support maintenance of
stable release.  Please also know that whilst within the Slackware team, I
do contribute back to the x86 project with enhancements and fixes that benefit
both ARM and x86, from a volume point of view Slackware ARM is chiefly a
downstream consumer and would not exist without the work of the small and
dedicated Slackware team, and of course Patrick.  We love working on Slackware,
and donations encourage us particulatly when it becomes an uphill slog for
periods of time.
 
Please help support the project to keep it alive in the public domain!
 
Cheers and enjoy.  Apparently people have been waiting for a hard float port
for some time! ;-)
 
 
 Stuart.

surtout


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
mood
Publicité
Posté le 25-08-2016 à 07:00:58  profilanswer
 

n°1394114
cycojesus
Mèo Lười
Posté le 30-08-2016 à 07:08:02  profilanswer
 

La paye est là!!!!!!!!!!!!! [:maman_de_galles:4]

Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-x86_64-1.txz:  Upgraded.
l/gsl-2.2-x86_64-1.txz:  Upgraded.
+--------------------------+

aussi


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394142
cycojesus
Mèo Lười
Posté le 31-08-2016 à 06:54:54  profilanswer
 

Gentlemen, start your testing.

Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-x86_64-1.txz:  Added.
testing/packages/gcc-g++-6.2.0-x86_64-1.txz:  Added.
testing/packages/gcc-gfortran-6.2.0-x86_64-1.txz:  Added.
testing/packages/gcc-gnat-6.2.0-x86_64-1.txz:  Added.
testing/packages/gcc-go-6.2.0-x86_64-1.txz:  Added.
testing/packages/gcc-java-6.2.0-x86_64-1.txz:  Added.
  Please note that if you install this package, gettext (specifically the
  gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-x86_64-1.txz:  Added.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394175
cycojesus
Mèo Lười
Posté le 01-09-2016 à 06:47:33  profilanswer
 

sécurité du matin

Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-45.3.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394521
cycojesus
Mèo Lười
Posté le 09-09-2016 à 07:05:14  profilanswer
 

AÏ...

Thu Sep  8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.4.20-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.4.20-x86_64-1.txz:  Upgraded.
a/kmod-23-x86_64-2.txz:  Rebuilt.
a/util-linux-2.28.2-x86_64-1.txz:  Upgraded.
ap/hplip-3.16.8-x86_64-1.txz:  Upgraded.
ap/nano-2.7.0-x86_64-1.txz:  Upgraded.
ap/pamixer-1.3.1-x86_64-2.txz:  Rebuilt.
ap/rpm-4.12.0.1-x86_64-2.txz:  Rebuilt.
ap/vim-7.4.2342-x86_64-1.txz:  Upgraded.
d/Cython-0.24.1-x86_64-1.txz:  Upgraded.
d/gdb-7.11.1-x86_64-2.txz:  Rebuilt.
d/kernel-headers-4.4.20-x86-1.txz:  Upgraded.
d/mercurial-3.9.1-x86_64-1.txz:  Upgraded.
d/python-2.7.12-x86_64-1.txz:  Upgraded.
  Compiled using --enable-unicode=ucs4.
  The upstream default for Python Unicode is ucs2, but ucs4 is more widely
  used and recommended now.  Any Python scripts or binaries that use UCS-2
  will need to be recompiled.  These can be identified with the following
  grep command:  grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20-noarch-1.txz:  Upgraded.
kde/calligra-2.9.11-x86_64-6.txz:  Rebuilt.
kde/kate-4.14.3-x86_64-3.txz:  Rebuilt.
kde/kdev-python-1.7.2-x86_64-2.txz:  Rebuilt.
kde/kig-4.14.3-x86_64-4.txz:  Rebuilt.
kde/kross-interpreters-4.14.3-x86_64-3.txz:  Rebuilt.
kde/pykde4-4.14.3-x86_64-4.txz:  Rebuilt.
kde/superkaramba-4.14.3-x86_64-3.txz:  Rebuilt.
l/PyQt-4.11.4-x86_64-2.txz:  Rebuilt.
l/akonadi-1.13.0-x86_64-3.txz:  Rebuilt.
l/boost-1.61.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/dbus-python-1.2.4-x86_64-2.txz:  Rebuilt.
l/gdbm-1.12-x86_64-2.txz:  Rebuilt.
l/glib2-2.46.2-x86_64-4.txz:  Rebuilt.
l/gobject-introspection-1.46.0-x86_64-2.txz:  Rebuilt.
l/libxml2-2.9.4-x86_64-3.txz:  Rebuilt.
l/pilot-link-0.12.5-x86_64-11.txz:  Rebuilt.
l/pycups-1.9.73-x86_64-2.txz:  Rebuilt.
l/pycurl-7.43.0-x86_64-2.txz:  Rebuilt.
l/pygobject-2.28.6-x86_64-3.txz:  Rebuilt.
l/pygobject3-3.18.2-x86_64-2.txz:  Rebuilt.
l/pygtk-2.24.0-x86_64-3.txz:  Rebuilt.
l/python-pillow-3.0.0-x86_64-2.txz:  Rebuilt.
l/sip-4.18.1-x86_64-1.txz:  Upgraded.
n/php-5.6.25-x86_64-1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.25
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
  (* Security fix *)
n/samba-4.5.0-x86_64-1.txz:  Upgraded.
xap/blueman-2.0.4-x86_64-2.txz:  Rebuilt.
xap/gimp-2.8.18-x86_64-2.txz:  Rebuilt.
xap/vim-gvim-7.4.2342-x86_64-1.txz:  Upgraded.
extra/brltty/brltty-5.4-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

...EUX !!!!!!!!!!!


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394582
cycojesus
Mèo Lười
Posté le 11-09-2016 à 09:05:43  profilanswer
 

Ton gtk et ton gnutls sont pas à jour

Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:  Integer overflow in the
  gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
  attackers to cause a denial of service (crash) via a large image file,
  which triggers a large memory allocation.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
  (* Security fix *)
n/gnutls-3.4.15-x86_64-1.txz:  Upgraded.
  libgnutls: Corrected the comparison of the serial size in OCSP response.
  Previously the OCSP certificate check wouldn't verify the serial length
  and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
  Reported by Stefan Buehler.
  For more information, see:
    https://www.gnutls.org/security.html
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394681
cycojesus
Mèo Lười
Posté le 13-09-2016 à 06:37:55  profilanswer
 

Mon Sep 12 18:39:03 UTC 2016
ap/texinfo-6.3-x86_64-1.txz:  Upgraded.
d/guile-2.0.12-x86_64-2.txz:  Rebuilt.
  Match timestamps across all $ARCH on *.go and *.scm files, otherwise
  on multilib systems the compiled (go) files may be detected as older
  than the source (scm) files, causing guile to attempt to recompile
  itself with every use.
l/sdl-1.2.15-x86_64-5.txz:  Rebuilt.
  Fixed a regression that broke MOD support.  Thanks to B Watson.
x/libXfont-1.5.2-x86_64-1.txz:  Upgraded.
x/mesa-12.0.2-x86_64-1.txz:  Upgraded.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394712
cycojesus
Mèo Lười
Posté le 14-09-2016 à 07:01:00  profilanswer
 

Tu upgrade MariaDB tout de suite (vim aussi)

Tue Sep 13 18:13:32 UTC 2016
ap/mariadb-10.0.27-x86_64-1.txz:  Upgraded.
  This update fixes a critical vulnerability which can allow local and
  remote attackers to inject malicious settings into MySQL configuration
  files (my.cnf).  A successful exploitation could allow attackers to
  execute arbitrary code with root privileges which would then allow them
  to fully compromise the server.  
  This issue was discovered and reported by Dawid Golunski.
  For more information, see:
    http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
    https://jira.mariadb.org/browse/MDEV-10465
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
  (* Security fix *)
ap/vim-8.0.0003-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.0.0003-x86_64-1.txz:  Upgraded.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1394809
cycojesus
Mèo Lười
Posté le 16-09-2016 à 07:08:22  profilanswer
 

curl a un trou et removepkg encore amélioré

Thu Sep 15 22:54:52 UTC 2016
a/bash-4.4.0-x86_64-1.txz:  Upgraded.
a/btrfs-progs-v4.7.2-x86_64-1.txz:  Upgraded.
a/e2fsprogs-1.43.3-x86_64-1.txz:  Upgraded.
a/pkgtools-14.2-noarch-12.txz:  Rebuilt.
  removepkg:  Fixed removing packages with >= 3 hyphens in the package name
  when using just the package name rather than the full name including
  version, arch, and build.
  Thanks to coralfang for the bug report, Jim Hawkins and Stuart Winter for
  the patch, and SeB for testing and feedback.
  removepkg:  Handle filenames that contain backslashes.
  Thanks to aaazen for the bug report and patch.
ap/vim-8.0.0005-x86_64-1.txz:  Upgraded.
n/curl-7.50.3-x86_64-1.txz:  Upgraded.
  Fixed heap overflows in four libcurl functions: curl_escape(),
  curl_easy_escape(), curl_unescape() and curl_easy_unescape().
  For more information, see:
    https://curl.haxx.se/docs/adv_20160914.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
  (* Security fix *)
xap/vim-gvim-8.0.0005-x86_64-1.txz:  Upgraded.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395132
cycojesus
Mèo Lười
Posté le 22-09-2016 à 06:53:54  profilanswer
 

2 barils d'update contre 1 baril d'insecte

Wed Sep 21 21:10:52 UTC 2016
n/irssi-0.8.20-x86_64-1.txz:  Upgraded.
  This update fixes two remote crash and heap corruption vulnerabilites
  in Irssi's format parsing code.  Impact:  Remote crash and heap
  corruption.  Remote code execution seems difficult since only Nuls are
  written.  Bugs discovered by, and patches provided by Gabriel Campana
  and Adrien Guinet from Quarkslab.
  For more information, see:
    https://irssi.org/security/irssi_sa_2016.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045
  (* Security fix *)
+--------------------------+
Wed Sep 21 15:54:06 UTC 2016
a/mkinitrd-1.4.8-x86_64-9.txz:  Rebuilt.
  When generating the initrd, include dmsetup whenever LUKS is requested.
  Thanks to TracyTiger for the bug report and Eric Hameleers for the patch.
e/emacs-25.1-x86_64-1.txz:  Upgraded.
l/qt-4.8.7-x86_64-5.txz:  Rebuilt.
  In the .prl files, make sure to use -L/usr/X11R6/lib64 on 64-bit to avoid
  ld warnings when using qmake on a multilib system.
  Thanks to Jonathan Woithe for the bug report and fix.
n/network-scripts-14.2-noarch-4.txz:  Rebuilt.
  rc.inet1.new:  Use return (not continue) to leave the if_up() function.
  Thanks to Tim Thomas for the bug report.
xap/mozilla-firefox-49.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/pidgin-2.11.0-x86_64-1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    https://www.pidgin.im/news/security/
  (* Security fix *)
+--------------------------+

et Emacs en prime


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
mood
Publicité
Posté le 22-09-2016 à 06:53:54  profilanswer
 

n°1395162
cycojesus
Mèo Lười
Posté le 23-09-2016 à 07:06:08  profilanswer
 

Ça en fait du trou !

Thu Sep 22 18:38:07 UTC 2016
a/openssl-solibs-1.0.2i-x86_64-1.txz:  Upgraded.
n/openssl-1.0.2i-x86_64-1.txz:  Upgraded.
  This update fixes denial-of-service and other security issues.
  For more information, see:
    https://www.openssl.org/news/secadv/20160922.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395228
cycojesus
Mèo Lười
Posté le 24-09-2016 à 07:36:24  profilanswer
 

Fri Sep 23 23:30:53 UTC 2016
n/php-5.6.26-x86_64-1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    https://php.net/ChangeLog-5.php#5.6.26
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395284
cycojesus
Mèo Lười
Posté le 25-09-2016 à 09:23:00  profilanswer
 

bienvenue à sshfs

Sun Sep 25 02:32:25 UTC 2016
a/kernel-firmware-20160924git-noarch-1.txz:  Upgraded.
a/kernel-generic-4.4.22-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.4.22-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.4.22-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.4.22-x86-1.txz:  Upgraded.
k/kernel-source-4.4.22-noarch-1.txz:  Upgraded.
n/sshfs-2.8-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395375
cycojesus
Mèo Lười
Posté le 27-09-2016 à 06:44:13  profilanswer
 

Quand tu chantes,
Quand tu danses,
Quand tu chantes Wizard !

Mon Sep 26 18:14:08 UTC 2016
a/openssl-solibs-1.0.2j-x86_64-1.txz:  Upgraded.
a/pkgtools-14.2-noarch-13.txz:  Rebuilt.
  removepkg:  Fixed removing filenames containing "%".
  Thanks to SeB for the bug report, and to Jim Hawkins for the patch.
n/openssl-1.0.2j-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  Missing CRL sanity check (CVE-2016-7052)
  For more information, see:
    https://www.openssl.org/news/secadv/20160926.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052
  (* Security fix *)
+--------------------------+

[:maman_de_galles:5]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395424
cycojesus
Mèo Lười
Posté le 28-09-2016 à 06:52:39  profilanswer
 

GNUChess est à jour, plus 2 3 petits autres choses

Tue Sep 27 19:16:56 UTC 2016
ap/hplip-3.16.9-x86_64-1.txz:  Upgraded.
  Reenabled parallel port support.  Thanks to Jas for the bug report.
n/bind-9.10.4_P3-x86_64-1.txz:  Upgraded.
  This update fixes a denial-of-service vulnerability.  Testing by ISC has
  uncovered a critical error condition which can occur when a nameserver is
  constructing a response.  A defect in the rendering of messages into
  packets can cause named to exit with an assertion failure in buffer.c while
  constructing a response to a query that meets certain criteria.
  For more information, see:
    https://kb.isc.org/article/AA-01419/0
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776
  (* Security fix *)
xap/gnuchess-6.2.3-x86_64-1.txz:  Upgraded.
  Upgraded to gnuchess-6.2.3 and xboard-4.9.1.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395489
cycojesus
Mèo Lười
Posté le 29-09-2016 à 10:30:50  profilanswer
 

pop

Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz:  Upgraded.
  This package provides the latest timezone updates.
l/mpfr-3.1.5-x86_64-1.txz:  Upgraded.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1395591
cycojesus
Mèo Lười
Posté le 01-10-2016 à 23:51:19  profilanswer
 

Sat Oct  1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz:  Upgraded.
a/kernel-generic-4.4.23-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.4.23-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.4.23-x86_64-1.txz:  Upgraded.
a/lvm2-2.02.166-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.4.23-x86-1.txz:  Upgraded.
k/kernel-source-4.4.23-noarch-1.txz:  Upgraded.
n/mutt-1.7.0-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-45.4.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1396838
cycojesus
Mèo Lười
Posté le 01-11-2016 à 08:44:55  profilanswer
 

Défi d'octobre !

Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-x86_64-1.txz:  Upgraded.
a/kernel-generic-4.4.29-x86_64-1.txz:  Upgraded.
  Fixes a security issue (Dirty COW).
  (* Security fix *)
a/kernel-huge-4.4.29-x86_64-1.txz:  Upgraded.
  Fixes a security issue (Dirty COW).
  (* Security fix *)
a/kernel-modules-4.4.29-x86_64-1.txz:  Upgraded.
ap/mariadb-10.0.28-x86_64-1.txz:  Upgraded.
  This update fixes several security issues.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
  (* Security fix *)
d/gdb-7.12-x86_64-1.txz:  Upgraded.
d/guile-2.0.13-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.4.29-x86-1.txz:  Upgraded.
k/kernel-source-4.4.29-noarch-1.txz:  Upgraded.
  This kernel fixes a security issue known as "Dirty COW".  A race
  condition was found in the way the Linux kernel's memory subsystem
  handled the copy-on-write (COW) breakage of private read-only
  memory mappings.  An unprivileged local user could use this flaw to
  gain write access to otherwise read-only memory mappings and thus
  increase their privileges on the system.
  For more information, see:
    https://dirtycow.ninja/
    https://www.kb.cert.org/vuls/id/243144
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
  (* Security fix *)
l/libcdio-0.94-x86_64-1.txz:  Upgraded.
n/nmap-7.30-x86_64-1.txz:  Upgraded.
n/php-5.6.27-x86_64-1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    https://php.net/ChangeLog-5.php#5.6.27
  (* Security fix *)
x/libX11-1.6.4-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory read in XGetImage() or write in XListFonts().
  Affected versions libX11 <= 1.6.3.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
  (* Security fix *)
x/libXfixes-5.0.3-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause an integer
  overflow on 32 bit architectures.
  Affected versions : libXfixes <= 5.0.2.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
  (* Security fix *)
x/libXi-1.7.8-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory access or endless loops (Denial of Service).
  Affected versions libXi <= 1.7.6.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
  (* Security fix *)
x/libXrandr-1.5.1-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory writes.
  Affected versions: libXrandr <= 1.5.0.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
  (* Security fix *)
x/libXrender-0.9.10-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory writes.
  Affected version: libXrender <= 0.9.9.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
  (* Security fix *)
x/libXtst-1.2.3-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory access or endless loops (Denial of Service).
  Affected version libXtst <= 1.2.2.  
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
  (* Security fix *)
x/libXv-1.0.11-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause out of boundary
  memory and memory corruption.
  Affected version libXv <= 1.0.10.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
  (* Security fix *)
x/libXvMC-1.0.10-x86_64-1.txz:  Upgraded.
  Insufficient validation of data from the X server can cause a one byte buffer
  read underrun.
  Affected version: libXvMC <= 1.0.9.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953  
  (* Security fix *)
xap/mozilla-firefox-49.0.2-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/xscreensaver-5.36-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1396958
cycojesus
Mèo Lười
Posté le 04-11-2016 à 09:07:01  profilanswer
 

BONDAGE!!!!!!!!!!

Fri Nov  4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz:  Upgraded.
ap/nano-2.7.1-x86_64-1.txz:  Upgraded.
ap/vim-8.0.0055-x86_64-1.txz:  Upgraded.
l/libcdio-paranoia-10.2+0.93+1-x86_64-2.txz:  Rebuilt.
n/bind-9.10.4_P4-x86_64-1.txz:  Upgraded.
  This update fixes a denial-of-service vulnerability.  A defect in BIND's
  handling of responses containing a DNAME answer can cause a resolver to exit
  after encountering an assertion failure in db.c or resolver.c.  A server
  encountering either of these error conditions will stop, resulting in denial
  of service to clients.  The risk to authoritative servers is minimal;
  recursive servers are chiefly at risk.
  For more information, see:
    https://kb.isc.org/article/AA-01434
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
  (* Security fix *)
n/curl-7.51.0-x86_64-1.txz:  Upgraded.
  This release fixes security issues:
  CVE-2016-8615: cookie injection for other servers
  CVE-2016-8616: case insensitive password comparison
  CVE-2016-8617: OOB write via unchecked multiplication
  CVE-2016-8618: double-free in curl_maprintf
  CVE-2016-8619: double-free in krb5 code
  CVE-2016-8620: glob parser write/read out of bounds
  CVE-2016-8621: curl_getdate read out of bounds
  CVE-2016-8622: URL unescape heap overflow via integer truncation
  CVE-2016-8623: Use-after-free via shared cookies
  CVE-2016-8624: invalid URL parsing with '#'
  CVE-2016-8625: IDNA 2003 makes curl use wrong host
  For more information, see:
    https://curl.haxx.se/docs/adv_20161102A.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
    https://curl.haxx.se/docs/adv_20161102B.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
    https://curl.haxx.se/docs/adv_20161102C.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
    https://curl.haxx.se/docs/adv_20161102D.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
    https://curl.haxx.se/docs/adv_20161102E.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
    https://curl.haxx.se/docs/adv_20161102F.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
    https://curl.haxx.se/docs/adv_20161102G.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
    https://curl.haxx.se/docs/adv_20161102H.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
    https://curl.haxx.se/docs/adv_20161102I.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
    https://curl.haxx.se/docs/adv_20161102J.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
    https://curl.haxx.se/docs/adv_20161102K.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
  (* Security fix *)
xap/gnuchess-6.2.4-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.0.0055-x86_64-1.txz:  Upgraded.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1397533
cycojesus
Mèo Lười
Posté le 19-11-2016 à 20:03:41  profilanswer
 

mon petit cri dans le désert, merci P.at de continuer ainsi pour moi tout seul [:iorhael:4]

Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz:  Upgraded.
a/kernel-generic-4.4.32-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.4.32-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.4.32-x86_64-1.txz:  Upgraded.
ap/ghostscript-9.20-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.4.32-x86-1.txz:  Upgraded.
k/kernel-source-4.4.32-noarch-1.txz:  Upgraded.
n/nmap-7.31-x86_64-1.txz:  Upgraded.
n/samba-4.5.1-x86_64-1.txz:  Upgraded.
x/freeglut-3.0.0-x86_64-1.txz:  Upgraded.
x/libXfont2-2.0.1-x86_64-1.txz:  Added.
x/libdrm-2.4.73-x86_64-1.txz:  Upgraded.
x/libxcb-1.12-x86_64-1.txz:  Upgraded.
x/mesa-13.0.1-x86_64-1.txz:  Upgraded.
x/xcb-proto-1.12-x86_64-1.txz:  Upgraded.
x/xcb-util-cursor-0.1.3-x86_64-1.txz:  Upgraded.
x/xf86-input-acecad-1.5.0-x86_64-10.txz:  Rebuilt.
x/xf86-input-evdev-2.10.4-x86_64-1.txz:  Upgraded.
x/xf86-input-joystick-1.6.3-x86_64-1.txz:  Upgraded.
x/xf86-input-keyboard-1.9.0-x86_64-1.txz:  Upgraded.
x/xf86-input-mouse-1.9.2-x86_64-1.txz:  Upgraded.
x/xf86-input-penmount-1.5.0-x86_64-10.txz:  Rebuilt.
x/xf86-input-synaptics-1.9.0-x86_64-1.txz:  Upgraded.
x/xf86-input-vmmouse-13.1.0-x86_64-5.txz:  Rebuilt.
x/xf86-input-void-1.4.0-x86_64-10.txz:  Rebuilt.
x/xf86-input-wacom-0.33.0-x86_64-2.txz:  Rebuilt.
x/xf86-video-amdgpu-1.2.0-x86_64-1.txz:  Upgraded.
x/xf86-video-apm-1.2.5-x86_64-9.txz:  Rebuilt.
x/xf86-video-ark-0.7.5-x86_64-9.txz:  Rebuilt.
x/xf86-video-ast-1.1.5-x86_64-3.txz:  Rebuilt.
x/xf86-video-ati-7.8.0-x86_64-1.txz:  Upgraded.
x/xf86-video-chips-1.2.6-x86_64-2.txz:  Removed.
x/xf86-video-cirrus-1.5.3-x86_64-3.txz:  Rebuilt.
x/xf86-video-dummy-0.3.7-x86_64-6.txz:  Rebuilt.
x/xf86-video-glint-1.2.8-x86_64-8.txz:  Removed.
x/xf86-video-i128-1.3.6-x86_64-9.txz:  Rebuilt.
x/xf86-video-i740-1.3.5-x86_64-3.txz:  Removed.
x/xf86-video-intel-git_20161115_a1a0f76-x86_64-1.txz:  Upgraded.
x/xf86-video-mach64-6.9.5-x86_64-3.txz:  Rebuilt.
x/xf86-video-mga-1.6.4-x86_64-3.txz:  Removed.
x/xf86-video-neomagic-1.2.9-x86_64-3.txz:  Rebuilt.
x/xf86-video-nouveau-1.0.13-x86_64-1.txz:  Upgraded.
x/xf86-video-nv-2.1.20-x86_64-9.txz:  Removed.
x/xf86-video-openchrome-0.5.0-x86_64-2.txz:  Rebuilt.
x/xf86-video-r128-6.10.1-x86_64-1.txz:  Removed.
x/xf86-video-rendition-4.2.6-x86_64-2.txz:  Rebuilt.
x/xf86-video-s3-0.6.5-x86_64-9.txz:  Rebuilt.
x/xf86-video-s3virge-1.10.7-x86_64-3.txz:  Rebuilt.
x/xf86-video-savage-2.3.8-x86_64-2.txz:  Removed.
x/xf86-video-siliconmotion-1.7.8-x86_64-2.txz:  Removed.
x/xf86-video-sis-0.10.8-x86_64-2.txz:  Removed.
x/xf86-video-sisusb-0.9.6-x86_64-9.txz:  Rebuilt.
x/xf86-video-tdfx-1.4.6-x86_64-3.txz:  Removed.
x/xf86-video-tga-1.2.2-x86_64-9.txz:  Rebuilt.
x/xf86-video-trident-1.3.7-x86_64-3.txz:  Removed.
x/xf86-video-tseng-1.2.5-x86_64-9.txz:  Rebuilt.
x/xf86-video-v4l-0.2.0-x86_64-14.txz:  Rebuilt.
x/xf86-video-vesa-2.3.4-x86_64-3.txz:  Rebuilt.
x/xf86-video-vmware-13.2.1-x86_64-1.txz:  Upgraded.
x/xf86-video-voodoo-1.2.5-x86_64-10.txz:  Rebuilt.
x/xf86-video-xgi-1.6.1-x86_64-2.txz:  Removed.
x/xf86-video-xgixp-1.8.1-x86_64-8.txz:  Removed.
x/xorg-server-1.19.0-x86_64-1.txz:  Upgraded.
x/xorg-server-xephyr-1.19.0-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-1.19.0-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-1.19.0-x86_64-1.txz:  Upgraded.
x/xproto-7.0.31-noarch-1.txz:  Upgraded.
x/xterm-326-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-50.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
extra/tigervnc/tigervnc-1.7.0-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:master-trav]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1397601
regdub
Posté le 21-11-2016 à 10:38:20  profilanswer
 

Meuh non, je suis toujours là.  [:aj styles]  
 
Je suis en retard sur le planning par contre, pas encore migré sur stable.  [:eugne]


---------------
Legalize it @HFR
n°1397602
cycojesus
Mèo Lười
Posté le 21-11-2016 à 10:44:17  profilanswer
 

Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-x86_64-2.txz:  Rebuilt.
  Reverted a speedup patch that is causing regressions when output is directed
  to /dev/null.  Thanks to SeB.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1397603
cycojesus
Mèo Lười
Posté le 21-11-2016 à 10:44:58  profilanswer
 

regdub a écrit :

Meuh non, je suis toujours là.  [:aj styles]  
 
Je suis en retard sur le planning par contre, pas encore migré sur stable.  [:eugne]


 :love:


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1397664
cycojesus
Mèo Lười
Posté le 22-11-2016 à 07:00:55  profilanswer
 

ntp a des trous

Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-x86_64-1.txz:  Upgraded.
  In addition to bug fixes and enhancements, this release fixes the
  following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
  5 low-severity vulnerabilities, and provides 28 other non-security
  fixes and improvements.
  CVE-2016-9311: Trap crash
  CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
  CVE-2016-7427: Broadcast Mode Replay Prevention DoS
  CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
  CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
  CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
  CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
  CVE-2016-7429: Interface selection attack
  CVE-2016-7426: Client rate limiting and server responses
  CVE-2016-7433: Reboot sync calculation problem
  For more information, see:
    https://www.kb.cert.org/vuls/id/633847
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1398061
cycojesus
Mèo Lười
Posté le 01-12-2016 à 18:38:39  profilanswer
 

avent 1

Thu Dec  1 08:49:20 UTC 2016
d/intltool-0.51.0-x86_64-3.txz:  Rebuilt.
  Added a patch to fix issues when $(builddir) != $(srcdir).  This avoids
  possible build failures when intltool is used with automake >= 1.15.
  Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefox.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
  (* Security fix *)
xap/mozilla-thunderbird-45.5.1-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1398063
newic11
Posté le 01-12-2016 à 18:43:15  profilanswer
 

Salut, qu'est ce que la "testing", s'agit il de la futur version 14.2 de Slackware ? Il y a beaucoups de nouveautés par rapport a la 14.1 ?


---------------
http://forum.hardware.fr/hfr/Achat [...] 4818_1.htm
n°1398068
regdub
Posté le 01-12-2016 à 20:49:24  profilanswer
 

newic11 a écrit :

Salut, qu'est ce que la "testing", s'agit il de la futur version 14.2 de Slackware ? Il y a beaucoups de nouveautés par rapport a la 14.1 ?


 
C'est bien la future version, mais la 14.2 est sortie le 1er juillet.
Il semble que W ait oublié son bébé.  [:hu jintao:5]  
 
La liste complète des changements :
http://www.slackware.com/changelog [...] cpu=x86_64
 
Edit: le dossier "testing", c'est juste un sous répertoire de la version contenant des packages de test.


Message édité par regdub le 01-12-2016 à 20:53:49

---------------
Legalize it @HFR
n°1398070
newic11
Posté le 01-12-2016 à 21:13:19  profilanswer
 

Intéressant, merci!


---------------
http://forum.hardware.fr/hfr/Achat [...] 4818_1.htm
n°1398528
cycojesus
Mèo Lười
Posté le 13-12-2016 à 07:04:21  profilanswer
 

piou piou piou
Le jour se lève, petits packages
 [:jerome38]

Mon Dec 12 21:25:50 UTC 2016
a/coreutils-8.26-x86_64-1.txz:  Upgraded.
a/grep-2.27-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20161211git-noarch-1.txz:  Upgraded.
a/kernel-generic-4.4.38-x86_64-1.txz:  Upgraded.
  This kernel fixes a security issue with a race condition in
  net/packet/af_packet.c that can be exploited to gain kernel code execution
  from unprivileged processes.
  Thanks to Philip Pettersson for discovering the bug and providing a patch.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
    https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
  (* Security fix *)
a/kernel-huge-4.4.38-x86_64-1.txz:  Upgraded.
  (* Security fix *)
a/kernel-modules-4.4.38-x86_64-1.txz:  Upgraded.
ap/nano-2.7.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.4.38-x86-1.txz:  Upgraded.
k/kernel-source-4.4.38-noarch-1.txz:  Upgraded.
  (* Security fix *)
l/gsl-2.3-x86_64-1.txz:  Upgraded.
l/loudmouth-1.5.3-x86_64-1.txz:  Upgraded.
n/mcabber-1.0.4-x86_64-1.txz:  Upgraded.
  This update fixes a security issue which can lead to a malicious actor
  MITMing a conversation, or adding themselves as an entity on a third
  parties roster (thereby granting themselves the associated priviledges
  such as observing when the user is online).
  For more information, see:
    https://gultsch.de/gajim_roster_push_and_message_interception.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
  (* Security fix *)
n/php-5.6.29-x86_64-1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    https://php.net/ChangeLog-5.php#5.6.29
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
+--------------------------+

[:oriane:5]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1398591
cycojesus
Mèo Lười
Posté le 14-12-2016 à 14:52:37  profilanswer
 

Tue Dec 13 22:14:13 UTC 2016
Thanks to Robby Workman for most of these updates.
a/acpid-2.0.28-x86_64-1.txz:  Upgraded.
a/cryptsetup-1.7.3-x86_64-1.txz:  Upgraded.
a/dbus-1.10.14-x86_64-1.txz:  Upgraded.
a/lvm2-2.02.168-x86_64-1.txz:  Upgraded.
ap/alsa-utils-1.1.2-x86_64-1.txz:  Upgraded.
ap/man-pages-4.09-noarch-1.txz:  Upgraded.
d/git-2.11.0-x86_64-1.txz:  Upgraded.
l/alsa-lib-1.1.2-x86_64-1.txz:  Upgraded.
l/dbus-glib-0.108-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.2.6-x86_64-1.txz:  Upgraded.
n/bluez-5.42-x86_64-1.txz:  Upgraded.
n/conntrack-tools-1.4.4-x86_64-1.txz:  Upgraded.
n/libnetfilter_acct-1.0.3-x86_64-1.txz:  Upgraded.
n/libnetfilter_conntrack-1.0.6-x86_64-1.txz:  Upgraded.
n/nfacct-1.0.2-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-50.1.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/network-manager-applet-1.2.6-x86_64-1.txz:  Upgraded.
extra/source/flashplayer-plugin/flashplayer-plugin.SlackBuild:  Updated.
  Fixed filename and URL for new version 24.  Thanks to alienBOB.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1398846
cycojesus
Mèo Lười
Posté le 19-12-2016 à 17:44:16  profilanswer
 

Sun Dec 18 05:20:25 UTC 2016
a/glibc-zoneinfo-2016j-noarch-1.txz:  Upgraded.
+--------------------------+

biop


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399077
macomboh
Posté le 24-12-2016 à 18:32:25  profilanswer
 

Du boulot ! :)  
 
Mais pas encore de Seamonkey 2.46 qui est sorti hier ! :sleep:  
 

Citation :

Sat Dec 24 02:36:05 UTC 2016
a/aaa_elflibs-14.2-x86_64-24.txz:  Rebuilt.
  Added libform.so.6.0, libformw.so.6.0, libhistory.so.7.0, libmenu.so.6.0,
  libmenuw.so.6.0, libncurses.so.6.0, libncursesw.so.6.0, libpanel.so.6.0,
  libpanelw.so.6.0, libreadline.so.7.0, and libtinfo.so.6.0.
l/libtermcap-1.2.3-x86_64-7.txz:  Removed.
  Replaced by equivalent functionality in the ncurses package.
l/ncurses-6.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Rebuild of linked binaries pending, but the old library versions are
  in the aaa_elflibs package.
l/readline-7.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Rebuild of linked binaries pending, but the old library versions are
  in the aaa_elflibs package.
n/curl-7.52.1-x86_64-1.txz:  Upgraded.
n/gpa-0.9.10-x86_64-1.txz:  Upgraded.
n/gpgme-1.7.1-x86_64-1.txz:  Upgraded.
n/httpd-2.4.25-x86_64-1.txz:  Upgraded.
  This update fixes the following security issues:
  * CVE-2016-8740: mod_http2: Mitigate DoS memory exhaustion via endless
    CONTINUATION frames.
  * CVE-2016-5387: core: Mitigate [f]cgi "httpoxy" issues.
  * CVE-2016-2161: mod_auth_digest: Prevent segfaults during client entry
    allocation when the shared memory space is exhausted.
  * CVE-2016-0736: mod_session_crypto: Authenticate the session data/cookie
    with a MAC (SipHash) to prevent deciphering or tampering with a padding
    oracle attack.
  * CVE-2016-8743: Enforce HTTP request grammar corresponding to RFC7230 for
    request lines and request headers, to prevent response splitting and
    cache pollution by malicious clients or downstream proxies.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvena [...] -2016-8740
    https://cve.mitre.org/cgi-bin/cvena [...] -2016-5387
    https://cve.mitre.org/cgi-bin/cvena [...] -2016-2161
    https://cve.mitre.org/cgi-bin/cvena [...] -2016-0736
    https://cve.mitre.org/cgi-bin/cvena [...] -2016-8743
  (* Security fix *)
n/lftp-4.7.4-x86_64-1.txz:  Upgraded.
n/libassuan-2.4.3-x86_64-1.txz:  Upgraded.
n/libgcrypt-1.7.5-x86_64-1.txz:  Upgraded.
n/libksba-1.3.5-x86_64-1.txz:  Upgraded.
n/nettle-3.3-x86_64-1.txz:  Upgraded.
n/nmap-7.40-x86_64-1.txz:  Upgraded.
n/openssh-7.4p1-x86_64-1.txz:  Upgraded.
  This is primarily a bugfix release, and also addresses security issues.
  ssh-agent(1): Will now refuse to load PKCS#11 modules from paths outside
    a trusted whitelist.
  sshd(8): When privilege separation is disabled, forwarded Unix-domain
    sockets would be created by sshd(8) with the privileges of 'root'.
  sshd(8): Avoid theoretical leak of host private key material to
    privilege-separated child processes via realloc().
  sshd(8): The shared memory manager used by pre-authentication compression
    support had a bounds checks that could be elided by some optimising
    compilers to potentially allow attacks against the privileged monitor.
    process from the sandboxed privilege-separation process.
  sshd(8): Validate address ranges for AllowUser and DenyUsers directives at
    configuration load time and refuse to accept invalid ones.  It was
    previously possible to specify invalid CIDR address ranges
    (e.g. user@127.1.2.3/55) and these would always match, possibly resulting
    in granting access where it was not intended.
  For more information, see:
    https://www.openssh.com/txt/release-7.4
    https://cve.mitre.org/cgi-bin/cvena [...] 2016-10009
    https://cve.mitre.org/cgi-bin/cvena [...] 2016-10010
    https://cve.mitre.org/cgi-bin/cvena [...] 2016-10011
    https://cve.mitre.org/cgi-bin/cvena [...] 2016-10012
  (* Security fix *)
n/pinentry-1.0.0-x86_64-1.txz:  Upgraded.
xfce/xfce4-weather-plugin-0.8.8-x86_64-1.txz:  Upgraded.
  Package upgraded to fix the API used to fetch weather data.
  Thanks to Robby Workman.
testing/packages/gcc-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-g++-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-gfortran-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-gnat-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-go-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-java-6.3.0-x86_64-1.txz:  Upgraded.
testing/packages/gcc-objc-6.3.0-x86_64-1.txz:  Upgraded.
+--------------------------+

n°1399081
cycojesus
Mèo Lười
Posté le 25-12-2016 à 09:15:11  profilanswer
 

pansement

Sat Dec 24 18:14:51 UTC 2016
a/aaa_elflibs-14.2-x86_64-25.txz:  Upgraded.
l/expat-2.2.0-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues:
  Multiple integer overflows in XML_GetBuffer.
  Fix crash on malformed input.
  Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716.
  Use more entropy for hash initialization.
  Resolve troublesome internal call to srand.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
  (* Security fix *)
l/ncurses-6.0-x86_64-2.txz:  Rebuilt.
  Fixed install script to correctly remove "lint" from the 5.x package.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399185
cycojesus
Mèo Lười
Posté le 29-12-2016 à 16:59:20  profilanswer
 

temps du miam

Wed Dec 28 21:05:19 UTC 2016
ap/nano-2.7.3-x86_64-1.txz:  Upgraded.
d/python-2.7.13-x86_64-1.txz:  Upgraded.
  This release fixes security issues:
  Issue #27850: Remove 3DES from ssl module's default cipher list to counter
  measure sweet32 attack (CVE-2016-2183).
  Issue #27568: Prevent HTTPoxy attack (CVE-2016-1000110). Ignore the
  HTTP_PROXY variable when REQUEST_METHOD environment is set, which indicates
  that the script is in CGI mode.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
  (* Security fix *)
n/samba-4.5.3-x86_64-1.txz:  Upgraded.
  This release fixes security issues:
  CVE-2016-2123 (Samba NDR Parsing ndr_pull_dnsp_name Heap-based Buffer
    Overflow Remote Code Execution Vulnerability).
  CVE-2016-2125 (Unconditional privilege delegation to Kerberos servers
    in trusted realms).
  CVE-2016-2126 (Flaws in Kerberos PAC validation can trigger privilege
    elevation).
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399232
cycojesus
Mèo Lười
Posté le 31-12-2016 à 14:56:29  profilanswer
 

sortez couvert, c'est l'hiver

Fri Dec 30 19:29:13 UTC 2016
a/aaa_elflibs-14.2-x86_64-26.txz:  Rebuilt.
a/btrfs-progs-v4.9-x86_64-1.txz:  Upgraded.
ap/hplip-3.16.11-x86_64-1.txz:  Upgraded.
ap/tmux-2.3-x86_64-1.txz:  Upgraded.
l/elfutils-0.168-x86_64-1.txz:  Upgraded.
l/libpng-1.6.27-x86_64-1.txz:  Upgraded.
  This release fixes an old NULL pointer dereference bug in png_set_text_2()
  discovered and patched by Patrick Keshishian.  The potential "NULL
  dereference" bug has existed in libpng since version 0.71 of June 26, 1995.
  To be vulnerable, an application has to load a text chunk into the png
  structure, then delete all text, then add another text chunk to the same
  png structure, which seems to be an unlikely sequence, but it has happened.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
  (* Security fix *)
l/seamonkey-solibs-2.46-x86_64-1.txz:  Upgraded.
n/openvpn-2.4.0-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.12-x86_64-1.txz:  Upgraded.
x/libdrm-2.4.74-x86_64-1.txz:  Upgraded.
x/mesa-13.0.2-x86_64-1.txz:  Upgraded.
x/xf86-video-dummy-0.3.8-x86_64-1.txz:  Upgraded.
x/xf86-video-intel-git_20161117_169c74fa-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-45.6.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899
  (* Security fix *)
xap/seamonkey-2.46-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.seamonkey-project.org/releases/seamonkey2.46
  (* Security fix *)
xfce/xfce4-panel-4.12.1-x86_64-1.txz:  Upgraded.
xfce/xfce4-settings-4.12.1-x86_64-1.txz:  Upgraded.
xfce/xfconf-4.12.1-x86_64-1.txz:  Upgraded.
+--------------------------+

[:mervinside:2]


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399589
cycojesus
Mèo Lười
Posté le 13-01-2017 à 07:12:54  profilanswer
 

P.ar golri ap avec mon anniversaire ! [:flclsd]

Fri Jan 13 01:10:05 UTC 2017
a/grub-2.02_beta3-x86_64-2.txz:  Rebuilt.
  Make the package version number more sane.
+--------------------------+
Thu Jan 12 21:07:23 UTC 2017
ap/cups-filters-1.13.2-x86_64-1.txz:  Upgraded.
ap/nano-2.7.4-x86_64-2.txz:  Rebuilt.
  Fixed /etc/nanorc.new.  Thanks to SeB.
kde/calligra-2.9.11-x86_64-8.txz:  Rebuilt.
l/poppler-0.50.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xfce/tumbler-0.1.31-x86_64-9.txz:  Rebuilt.
+--------------------------+
Thu Jan 12 01:15:52 UTC 2017
a/aaa_elflibs-14.2-x86_64-27.txz:  Rebuilt.
  Upgraded libcap.so.2.25, liblzma.so.5.2.3, and libz.so.1.2.10.
a/bash-4.4.005-x86_64-2.txz:  Rebuilt.
a/dialog-1.3_20160828-x86_64-1.txz:  Upgraded.
a/ed-1.14.1-x86_64-1.txz:  Upgraded.
a/elvis-2.2_0-x86_64-3.txz:  Rebuilt.
a/file-5.29-x86_64-1.txz:  Upgraded.
a/gawk-4.1.4-x86_64-2.txz:  Rebuilt.
a/gettext-0.19.8.1-x86_64-2.txz:  Rebuilt.
a/getty-ps-2.1.0b-x86_64-3.txz:  Rebuilt.
a/gpm-1.20.7-x86_64-4.txz:  Rebuilt.
a/gptfdisk-1.0.1-x86_64-1.txz:  Upgraded.
a/grub-2.02~beta3-x86_64-1.txz:  Upgraded.
  Thanks to Heinz Wiesinger.
  Thanks to ReaperX7 for the updated dejavusansmono patch.
a/hwdata-0.291-noarch-1.txz:  Upgraded.
a/less-481-x86_64-2.txz:  Rebuilt.
a/minicom-2.7-x86_64-1.txz:  Upgraded.
a/procps-ng-3.3.12-x86_64-1.txz:  Upgraded.
a/sed-4.3-x86_64-1.txz:  Upgraded.
a/splitvt-1.6.6-x86_64-1.txz:  Upgraded.
a/tcsh-6.20.00-x86_64-1.txz:  Upgraded.
a/util-linux-2.29-x86_64-1.txz:  Upgraded.
a/xfsprogs-4.8.0-x86_64-1.txz:  Upgraded.
a/xz-5.2.3-x86_64-1.txz:  Upgraded.
ap/alsa-utils-1.1.3-x86_64-1.txz:  Upgraded.
ap/bc-1.06.95-x86_64-4.txz:  Rebuilt.
ap/bpe-2.01.00-x86_64-3.txz:  Rebuilt.
ap/ghostscript-9.20-x86_64-2.txz:  Rebuilt.
  Restored /usr/bin/ijs-config.
ap/gphoto2-2.5.11-x86_64-1.txz:  Upgraded.
ap/gutenprint-5.2.11-x86_64-3.txz:  Rebuilt.
ap/htop-2.0.2-x86_64-1.txz:  Upgraded.
ap/ispell-3.4.00-x86_64-1.txz:  Upgraded.
ap/joe-4.3-x86_64-1.txz:  Upgraded.
ap/jove-4.16.0.73-x86_64-2.txz:  Rebuilt.
ap/mariadb-10.0.28-x86_64-2.txz:  Rebuilt.
ap/mc-4.8.18-x86_64-1.txz:  Upgraded.
ap/moc-2.5.2-x86_64-1.txz:  Upgraded.
ap/nano-2.7.4-x86_64-1.txz:  Upgraded.
ap/pamixer-1.3.1-x86_64-3.txz:  Rebuilt.
ap/powertop-2.8-x86_64-2.txz:  Rebuilt.
ap/sc-7.16-x86_64-5.txz:  Rebuilt.
ap/screen-4.4.0-x86_64-3.txz:  Rebuilt.
ap/sqlite-3.16.1-x86_64-1.txz:  Upgraded.
ap/texinfo-6.3-x86_64-2.txz:  Rebuilt.
ap/vim-8.0.0161-x86_64-1.txz:  Upgraded.
ap/xfsdump-3.1.6-x86_64-2.txz:  Rebuilt.
ap/zsh-5.3.1-x86_64-1.txz:  Upgraded.
d/clisp-2.49.20161111-x86_64-1.txz:  Upgraded.
d/cmake-3.7.1-x86_64-1.txz:  Upgraded.
d/cscope-15.8b-x86_64-2.txz:  Rebuilt.
d/flex-2.6.3-x86_64-1.txz:  Upgraded.
d/gdb-7.12-x86_64-2.txz:  Rebuilt.
d/gettext-tools-0.19.8.1-x86_64-2.txz:  Rebuilt.
d/gnu-cobol-1.1-x86_64-2.txz:  Rebuilt.
d/gperf-3.1-x86_64-1.txz:  Upgraded.
d/guile-2.0.13-x86_64-2.txz:  Rebuilt.
d/m4-1.4.18-x86_64-1.txz:  Upgraded.
d/make-4.2.1-x86_64-1.txz:  Upgraded.
d/perl-5.24.0-x86_64-1.txz:  Upgraded.
  Also upgraded to DBD-mysql-4.041 and TermReadKey-2.37.
d/ruby-2.4.0-x86_64-1.txz:  Upgraded.
d/subversion-1.9.5-x86_64-1.txz:  Upgraded.
e/emacs-25.1-x86_64-2.txz:  Rebuilt.
kde/analitza-4.14.3-x86_64-3.txz:  Rebuilt.
kde/calligra-2.9.11-x86_64-7.txz:  Rebuilt.
kde/kdelibs-4.14.27-x86_64-1.txz:  Upgraded.
kde/kig-4.14.3-x86_64-5.txz:  Rebuilt.
kde/korundum-4.14.3-x86_64-4.txz:  Rebuilt.
kde/lokalize-4.14.3-x86_64-3.txz:  Rebuilt.
kde/perlkde-4.14.3-x86_64-3.txz:  Rebuilt.
kde/perlqt-4.14.3-x86_64-3.txz:  Rebuilt.
kde/qtruby-4.14.3-x86_64-5.txz:  Rebuilt.
l/akonadi-1.13.0-x86_64-4.txz:  Rebuilt.
l/alsa-lib-1.1.3-x86_64-1.txz:  Upgraded.
l/aspell-0.60.6.1-x86_64-2.txz:  Rebuilt.
l/boost-1.63.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/enchant-1.6.0-x86_64-2.txz:  Rebuilt.
l/hunspell-1.6.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/libcaca-0.99.beta19-x86_64-1.txz:  Upgraded.
l/libcap-2.25-x86_64-1.txz:  Upgraded.
l/libcdio-0.94-x86_64-2.txz:  Rebuilt.
l/libgphoto2-2.5.11-x86_64-1.txz:  Upgraded.
l/libnjb-2.2.7-x86_64-1.txz:  Upgraded.
l/libproxy-0.4.13-x86_64-1.txz:  Upgraded.
l/parted-3.2-x86_64-3.txz:  Rebuilt.
l/pilot-link-0.12.5-x86_64-12.txz:  Rebuilt.
l/taglib-1.11.1-x86_64-1.txz:  Upgraded.
l/virtuoso-ose-6.1.8-x86_64-4.txz:  Rebuilt.
l/vte-0.28.2-x86_64-5.txz:  Rebuilt.
l/wavpack-5.0.0-x86_64-1.txz:  Upgraded.
l/zlib-1.2.10-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.2.6-x86_64-2.txz:  Rebuilt.
n/alpine-2.20-x86_64-3.txz:  Rebuilt.
n/bind-9.11.0_P2-x86_64-1.txz:  Upgraded.
  This update fixes a denial-of-service vulnerability.  An error in handling
  certain queries can cause an assertion failure when a server is using the
  nxdomain-redirect feature to cover a zone for which it is also providing
  authoritative service.  A vulnerable server could be intentionally stopped
  by an attacker if it was using a configuration that met the criteria for
  the vulnerability and if the attacker could cause it to accept a query
  that possessed the required attributes.
  Please note: This vulnerability affects the "nxdomain-redirect" feature,
  which is one of two methods of handling NXDOMAIN redirection, and is only
  available in certain versions of BIND.  Redirection using zones of type
  "redirect" is not affected by this vulnerability.
  For more information, see:
    https://kb.isc.org/article/AA-01442
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9778
  (* Security fix *)
n/bluez-5.43-x86_64-1.txz:  Upgraded.
n/elm-2.5.8-x86_64-4.txz:  Rebuilt.
n/epic5-2.0.1-x86_64-1.txz:  Upgraded.
n/gnupg-1.4.21-x86_64-2.txz:  Rebuilt.
n/gnupg2-2.0.30-x86_64-2.txz:  Rebuilt.
n/gnutls-3.5.8-x86_64-1.txz:  Upgraded.
  This update fixes some bugs and security issues.
  For more information, see:
    https://gnutls.org/security.html#GNUTLS-SA-2017-1
    https://gnutls.org/security.html#GNUTLS-SA-2017-2
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
  (* Security fix *)
n/iftop-1.0pre4-x86_64-1.txz:  Upgraded.
n/imapd-2.20-x86_64-3.txz:  Rebuilt.
n/iptraf-ng-1.1.4-x86_64-2.txz:  Rebuilt.
n/irssi-0.8.21-x86_64-1.txz:  Upgraded.
  Fixed security issues that may result in a denial of service.
  For more information, see:
    https://irssi.org/security/irssi_sa_2017_01.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196
  (* Security fix *)
n/lftp-4.7.5-x86_64-1.txz:  Upgraded.
n/libnftnl-1.0.7-x86_64-1.txz:  Upgraded.
n/links-2.14-x86_64-1.txz:  Upgraded.
n/lynx-2.8.8rel.2-x86_64-2.txz:  Rebuilt.
n/mcabber-1.0.4-x86_64-2.txz:  Rebuilt.
n/metamail-2.7-x86_64-6.txz:  Rebuilt.
n/mtr-0.87-x86_64-1.txz:  Upgraded.
n/mutt-1.7.2-x86_64-1.txz:  Upgraded.
n/ncftp-3.2.6-x86_64-1.txz:  Upgraded.
n/net-snmp-5.7.3-x86_64-4.txz:  Rebuilt.
n/netkit-ftp-0.17-x86_64-3.txz:  Rebuilt.
n/netkit-ntalk-0.17-x86_64-4.txz:  Rebuilt.
n/netwatch-1.3.1_2-x86_64-2.txz:  Rebuilt.
n/nftables-0.7-x86_64-1.txz:  Upgraded.
n/nn-6.7.3-x86_64-4.txz:  Rebuilt.
n/ntp-4.2.8p9-x86_64-2.txz:  Rebuilt.
n/obexftp-0.24.2-x86_64-1.txz:  Upgraded.
n/openobex-1.7.2-x86_64-1.txz:  Upgraded.
n/pinentry-1.0.0-x86_64-2.txz:  Rebuilt.
n/proftpd-1.3.5b-x86_64-2.txz:  Rebuilt.
n/snownews-1.5.12-x86_64-3.txz:  Rebuilt.
n/telnet-0.17-x86_64-3.txz:  Rebuilt.
n/tftp-hpa-5.2-x86_64-3.txz:  Rebuilt.
n/tin-2.4.1-x86_64-1.txz:  Upgraded.
n/trn-3.6-x86_64-2.txz:  Removed.
n/wpa_supplicant-2.6-x86_64-1.txz:  Upgraded.
n/ytalk-3.3.0-x86_64-3.txz:  Rebuilt.
x/xf86-video-intel-git_20170103_028c946d-x86_64-1.txz:  Upgraded.
x/xorg-server-1.19.1-x86_64-1.txz:  Upgraded.
x/xorg-server-xephyr-1.19.1-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-1.19.1-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-1.19.1-x86_64-1.txz:  Upgraded.
x/xterm-327-x86_64-1.txz:  Upgraded.
xap/MPlayer-1.2_20160125-x86_64-4.txz:  Rebuilt.
  Upgraded to ffmpeg-2.8.10.
xap/ddd-3.3.12-x86_64-5.txz:  Rebuilt.
xap/fvwm-2.6.7-x86_64-1.txz:  Upgraded.
xap/gftp-2.0.19-x86_64-5.txz:  Rebuilt.
xap/gnuchess-6.2.4-x86_64-2.txz:  Rebuilt.
xap/gparted-0.27.0-x86_64-1.txz:  Upgraded.
xap/hexchat-2.12.4-x86_64-1.txz:  Upgraded.
xap/imagemagick-6.9.7_3-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xap/pidgin-2.11.0-x86_64-2.txz:  Rebuilt.
xap/vim-gvim-8.0.0161-x86_64-1.txz:  Upgraded.
xap/xine-lib-1.2.6-x86_64-9.txz:  Rebuilt.
  Upgraded to ffmpeg-2.8.10.
xap/xine-ui-0.99.9-x86_64-2.txz:  Rebuilt.
xap/xlockmore-5.50-x86_64-1.txz:  Upgraded.
extra/brltty/brltty-5.4-x86_64-2.txz:  Rebuilt.
  Patched /lib/udev/rules.d/40-usb-brltty.rules to fix a syntax error.
  Thanks to Willy Sudiarto Raharjo.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399624
cycojesus
Mèo Lười
Posté le 14-01-2017 à 13:10:51  profilanswer
 

Sat Jan 14 05:34:32 UTC 2017
a/util-linux-2.29-x86_64-2.txz:  Rebuilt.
  Restored support for /etc/mtab.
n/iw-4.9-x86_64-1.txz:  Upgraded.
x/scim-1.4.17-x86_64-1.txz:  Upgraded.
extra/tigervnc/tigervnc-1.7.0-x86_64-2.txz:  Rebuilt.
  Recompiled for xorg-server-1.19.1.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399786
cycojesus
Mèo Lười
Posté le 18-01-2017 à 20:51:15  profilanswer
 

libinput !

Wed Jan 18 02:33:18 UTC 2017
a/cryptsetup-1.7.3-x86_64-2.txz:  Rebuilt.
  Recompiled with --enable-cryptsetup-reencrypt option.
  Thanks to Jakub Jankowski for the suggestion.
ap/screen-4.5.0-x86_64-1.txz:  Upgraded.
l/libtasn1-4.10-x86_64-1.txz:  Upgraded.
l/seamonkey-solibs-2.46-x86_64-2.txz:  Rebuilt.
x/libinput-1.5.4-x86_64-1.txz:  Added.
x/libwacom-0.22-x86_64-1.txz:  Added.
  This is needed for libinput.
x/xf86-input-libinput-0.23.0-x86_64-1.txz:  Added.
  This is the new generic X.Org input driver which replaces evdev for most
  purposes.  It does not (for now) replace xf86-input-synaptics or
  xf86-input-vmmouse.  If this driver package is missing then X will fall
  back to using xf86-input-evdev as before.
  Thanks to Robby Workman.
x/xorg-server-1.19.1-x86_64-2.txz:  Rebuilt.
  Rename 90-keyboard-layout.conf to 90-keyboard-layout-evdev.conf.
x/xorg-server-xephyr-1.19.1-x86_64-2.txz:  Rebuilt.
x/xorg-server-xnest-1.19.1-x86_64-2.txz:  Rebuilt.
x/xorg-server-xvfb-1.19.1-x86_64-2.txz:  Rebuilt.
xap/seamonkey-2.46-x86_64-2.txz:  Rebuilt.
  Restored missing nspr/obsolete headers.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399813
cycojesus
Mèo Lười
Posté le 19-01-2017 à 09:15:34  profilanswer
 

danse sur le feu

Wed Jan 18 20:39:17 UTC 2017
ap/mariadb-10.0.29-x86_64-1.txz:  Upgraded.
  This update fixes several security issues.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1399949
cycojesus
Mèo Lười
Posté le 22-01-2017 à 09:45:25  profilanswer
 

Fri Jan 20 04:18:02 UTC 2017
l/seamonkey-solibs-2.46-x86_64-3.txz:  Rebuilt.
xap/fvwm-2.6.7-x86_64-2.txz:  Rebuilt.
  Reverted an upstream patch that causes some broken symlinks to be installed.
  Thanks to GazL.
xap/seamonkey-2.46-x86_64-3.txz:  Rebuilt.
  Recompiled with less aggressive optimization (-Os) to fix crashes.
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
n°1400034
cycojesus
Mèo Lười
Posté le 24-01-2017 à 20:40:23  profilanswer
 

tiens

Mon Jan 23 21:30:13 UTC 2017
d/gdb-7.12.1-x86_64-1.txz:  Upgraded.
xap/fvwm-2.6.7-x86_64-3.txz:  Rebuilt.
  Fixed the broken symlinks in a better way.  Thanks to GazL for the patch.
xap/mozilla-firefox-51.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
+--------------------------+


---------------
Chết rồi ! ✍ ⌥⌘ http://github.com/gwenhael-le-moine/slackbuilds/
mood
Publicité
Posté le   profilanswer
 

 Page :   1  2  3  4  5  ..  70  71  72  ..  107  108  109  110  111  112

Aller à :
Ajouter une réponse
 

Sujets relatifs
Slackware 9.0[slackware] Suppression de terminaux virtuels ?
!! Configuration reseaux, slackware 9 !!Installer slackware 9.0 par ftp (boot disquette)
[Pb] Installation new HDD sous slackware 8.0[RESOLU] Pb d'execution mysql sur slackware ...
Slackware 9 du pur bonheurMonter une partition NTFS sous linux (slackware 9.0)
Slackware 9.0 Finale OUTJe sens que je vais quitter Slackware (pas en serv)
Plus de sujets relatifs à : [SLACKWARE] du présent - 15.0


Copyright © 1997-2022 Hardware.fr SARL (Signaler un contenu illicite / Données personnelles) / Groupe LDLC / Shop HFR