Aggancia questa barra allo schermo |  Disattiva gli effetti grafici

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Slackware Linux e risoluzione di problemi, di Andrea Peluso


ChangeLog repository

Repository Rss

blender-3.0.1-x86_64-1_ap.txz:  Upgraded.

ChangeLog Slackware current

ChangeLog x86 Rss - ChangeLog x86_64 Rss

ap/sqlite-3.50.2-x86_64-1.txz:  Upgraded.
d/automake-1.18.1-noarch-1.txz:  Upgraded.
d/cargo-c-0.10.14-x86_64-1.txz:  Upgraded.
l/at-spi2-core-2.56.3-x86_64-1.txz:  Upgraded.
l/libproxy-0.5.10-x86_64-1.txz:  Upgraded.
l/netpbm-11.11.00-x86_64-1.txz:  Upgraded.
l/vte-0.80.3-x86_64-1.txz:  Upgraded.
n/openresolv-3.16.5-noarch-1.txz:  Upgraded.
  Revert to this version for now due to "signature mismatch" breakage.

a/kernel-firmware-20250627_f40eafe-noarch-1.txz:  Upgraded.
a/kernel-generic-6.12.35-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.12.35-x86-1.txz:  Upgraded.
d/rust-1.88.0-x86_64-1.txz:  Upgraded.
k/kernel-source-6.12.35-noarch-1.txz:  Upgraded.
l/gst-plugins-bad-free-1.26.3-x86_64-1.txz:  Upgraded.
l/gst-plugins-base-1.26.3-x86_64-1.txz:  Upgraded.
l/gst-plugins-good-1.26.3-x86_64-1.txz:  Upgraded.
l/gst-plugins-libav-1.26.3-x86_64-1.txz:  Upgraded.
l/gstreamer-1.26.3-x86_64-1.txz:  Upgraded.
l/pango-1.56.4-x86_64-1.txz:  Upgraded.
l/pipewire-1.4.6-x86_64-1.txz:  Upgraded.
n/nettle-3.10.2-x86_64-1.txz:  Upgraded.
x/adwaita-fonts-ttf-49.0-noarch-1.txz:  Upgraded.
x/fontconfig-2.17.0-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/linux-6.15.x/kernel-generic-6.15.4-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.15.x/kernel-headers-6.15.4-x86-1.txz:  Upgraded.
testing/packages/linux-6.15.x/kernel-source-6.15.4-noarch-1.txz:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.

d/pkgconf-2.5.1-x86_64-1.txz:  Upgraded.
l/python-lxml-6.0.0-x86_64-1.txz:  Upgraded.
n/openresolv-3.17.0-noarch-1.txz:  Upgraded.

ChangeLog Slackware arm 64 current

ChangeLog arm 64 Rss


Hello!

If you value the work we're doing with Slackware Linux on ARM, we invite you to
support the project with a donation. Your contribution goes directly toward
maintaining critical hardware, powering our infrastructure, and sustaining the
development of this long-running open-source effort.

To see how you can help, visit:
    https://arm.slackware.com/sponsor/

Thanks for being part of the journey.

Stuart Winter <mozes@slackware>
Brent Earl <el0226@slackware>

d/pkgconf-2.5.1-aarch64-1.txz:  Upgraded.
l/python-lxml-6.0.0-aarch64-1.txz:  Upgraded.
n/openresolv-3.17.0-aarch64-1.txz:  Upgraded.

a/shadow-4.18.0-aarch64-1.txz:  Upgraded.
a/xfsprogs-6.15.0-aarch64-1.txz:  Upgraded.
l/colord-1.4.8-aarch64-1.txz:  Upgraded.
l/mozjs128-128.12.0esr-aarch64-1.txz:  Upgraded.
l/nodejs-22.17.0-aarch64-1.txz:  Upgraded.
n/ethtool-6.15-aarch64-1.txz:  Upgraded.
x/ibus-libpinyin-1.16.4-aarch64-1.txz:  Upgraded.

a/btrfs-progs-6.15-aarch64-1.txz:  Upgraded.
a/cryptsetup-2.8.0-aarch64-1.txz:  Upgraded.
a/util-linux-2.41.1-aarch64-1.txz:  Upgraded.
l/libssh-0.11.2-aarch64-1.txz:  Upgraded.
  This update fixes security issues:
  Write beyond bounds in binary to base64 conversion.
  Use of uninitialized variable in privatekey_from_file().
  Likely read beyond bounds in sftp server handle management.
  Double free in functions exporting keys.
  ssh_kdf() returns a success code on certain failures.
  Likely read beyond bounds in sftp server message decoding.
  Invalid return code for chacha20 poly1305 with OpenSSL.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2025-4877
    https://www.cve.org/CVERecord?id=CVE-2025-4878
    https://www.cve.org/CVERecord?id=CVE-2025-5318
    https://www.cve.org/CVERecord?id=CVE-2025-5351
    https://www.cve.org/CVERecord?id=CVE-2025-5372
    https://www.cve.org/CVERecord?id=CVE-2025-5449
    https://www.cve.org/CVERecord?id=CVE-2025-5987
  (* Security fix *)
l/mujs-1.3.7-aarch64-1.txz:  Upgraded.
xap/mozilla-firefox-140.0esr-aarch64-1.txz:  Upgraded.
  This update contains security fixes and improvements, and moves to the new
  Firefox 140 ESR branch. See the release notes for details about some of the
  new features.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/140.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2025-51
    https://www.cve.org/CVERecord?id=CVE-2025-6424
    https://www.cve.org/CVERecord?id=CVE-2025-6425
    https://www.cve.org/CVERecord?id=CVE-2025-6426
    https://www.cve.org/CVERecord?id=CVE-2025-6427
    https://www.cve.org/CVERecord?id=CVE-2025-6428
    https://www.cve.org/CVERecord?id=CVE-2025-6429
    https://www.cve.org/CVERecord?id=CVE-2025-6430
    https://www.cve.org/CVERecord?id=CVE-2025-6431
    https://www.cve.org/CVERecord?id=CVE-2025-6432
    https://www.cve.org/CVERecord?id=CVE-2025-6433
    https://www.cve.org/CVERecord?id=CVE-2025-6434
    https://www.cve.org/CVERecord?id=CVE-2025-6435
    https://www.cve.org/CVERecord?id=CVE-2025-6436
  (* Security fix *)

ChangeLog Slackware stable

ChangeLog x86 Rss - ChangeLog x86_64 Rss

Here's a little something in /testing, hope you all enjoy. :-)
Please note that the llvm13-compat and llvm-20 packages in /extra are needed
to run these optional updates.
extra/rust-for-mozilla/rust-1.88.0-x86_64-1_slack15.0.txz:  Upgraded.
testing/packages/graphics-updates/cbindgen-0.29.0-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/cmake-3.31.8-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/libdrm-2.4.125-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/mesa-25.0.7-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/meson-1.8.2-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/spirv-llvm-translator-20.1.3-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/vulkan-sdk-1.4.313.0-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/wayland-1.23.1-x86_64-1_slack15.0.txz:  Added.
testing/packages/graphics-updates/wayland-protocols-1.45-noarch-1_slack15.0.txz:  Added.

patches/packages/libssh-0.11.2-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Write beyond bounds in binary to base64 conversion.
  Use of uninitialized variable in privatekey_from_file().
  Likely read beyond bounds in sftp server handle management.
  Double free in functions exporting keys.
  ssh_kdf() returns a success code on certain failures.
  Likely read beyond bounds in sftp server message decoding.
  Invalid return code for chacha20 poly1305 with OpenSSL.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2025-4877
    https://www.cve.org/CVERecord?id=CVE-2025-4878
    https://www.cve.org/CVERecord?id=CVE-2025-5318
    https://www.cve.org/CVERecord?id=CVE-2025-5351
    https://www.cve.org/CVERecord?id=CVE-2025-5372
    https://www.cve.org/CVERecord?id=CVE-2025-5449
    https://www.cve.org/CVERecord?id=CVE-2025-5987
  (* Security fix *)
patches/packages/mozilla-firefox-140.0esr-x86_64-1_slack15.0.txz:  Upgraded.
  This update contains security fixes and improvements, and moves to the new
  Firefox 140 ESR branch. See the release notes for details about some of the
  new features.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/140.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2025-51
    https://www.cve.org/CVERecord?id=CVE-2025-6424
    https://www.cve.org/CVERecord?id=CVE-2025-6425
    https://www.cve.org/CVERecord?id=CVE-2025-6426
    https://www.cve.org/CVERecord?id=CVE-2025-6427
    https://www.cve.org/CVERecord?id=CVE-2025-6428
    https://www.cve.org/CVERecord?id=CVE-2025-6429
    https://www.cve.org/CVERecord?id=CVE-2025-6430
    https://www.cve.org/CVERecord?id=CVE-2025-6431
    https://www.cve.org/CVERecord?id=CVE-2025-6432
    https://www.cve.org/CVERecord?id=CVE-2025-6433
    https://www.cve.org/CVERecord?id=CVE-2025-6434
    https://www.cve.org/CVERecord?id=CVE-2025-6435
    https://www.cve.org/CVERecord?id=CVE-2025-6436
  (* Security fix *)

patches/packages/sudo-1.9.17-x86_64-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.

ChangeLog Slackware arm stable

ChangeLog arm Rss

patches/packages/libssh-0.11.2-arm-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Write beyond bounds in binary to base64 conversion.
  Use of uninitialized variable in privatekey_from_file().
  Likely read beyond bounds in sftp server handle management.
  Double free in functions exporting keys.
  ssh_kdf() returns a success code on certain failures.
  Likely read beyond bounds in sftp server message decoding.
  Invalid return code for chacha20 poly1305 with OpenSSL.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2025-4877
    https://www.cve.org/CVERecord?id=CVE-2025-4878
    https://www.cve.org/CVERecord?id=CVE-2025-5318
    https://www.cve.org/CVERecord?id=CVE-2025-5351
    https://www.cve.org/CVERecord?id=CVE-2025-5372
    https://www.cve.org/CVERecord?id=CVE-2025-5449
    https://www.cve.org/CVERecord?id=CVE-2025-5987
  (* Security fix *)
patches/packages/sudo-1.9.17-arm-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.

patches/packages/libblockdev-2.30-arm-1_slack15.0.txz:  Upgraded.
  Don't allow suid and dev set on filesystem resize.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2025-6019
  (* Security fix *)
patches/packages/xorg-server-1.20.14-arm-17_slack15.0.txz:  Rebuilt.
  Check for another possible integer overflow once we get a complete xReq
  with BigRequest.
  For more information, see:
    https://lists.x.org/archives/xorg/2025-June/062055.html
    https://www.cve.org/CVERecord?id=CVE-2025-49176
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-arm-17_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-arm-17_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-arm-17_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-arm-10_slack15.0.txz:  Rebuilt.
  Check for another possible integer overflow once we get a complete xReq
  with BigRequest.
  For more information, see:
    https://lists.x.org/archives/xorg/2025-June/062055.html
    https://www.cve.org/CVERecord?id=CVE-2025-49176
  (* Security fix *)


This project is made possible entirely through your support!

If you appreciate our efforts and have the means to contribute to our
operational expenses, your support would be greatly appreciated.

You'll find the ways you can help here:
  https://arm.slackware.com/sponsor/

A heartfelt thank you to everyone who has supported and continues to
support the project. Your contributions mean a lot to us.

Stuart Winter <mozes@slackware>

patches/packages/xorg-server-1.20.14-arm-16_slack15.0.txz:  Rebuilt.
  This update fixes security issues:
  Out-of-bounds access in X Rendering extension (Animated cursors).
  Integer overflow in Big Requests Extension.
  Unprocessed client request via bytes to ignore.
  Integer overflow in RandR extension (RRChangeProviderProperty).
  These issues were discovered by Nils Emmerich and reported by Julian Suleder
  via ERNW Vulnerability Disclosure.
  For more information, see:
    https://lists.x.org/archives/xorg/2025-June/062055.html
    https://www.cve.org/CVERecord?id=CVE-2025-49175
    https://www.cve.org/CVERecord?id=CVE-2025-49176
    https://www.cve.org/CVERecord?id=CVE-2025-49178
    https://www.cve.org/CVERecord?id=CVE-2025-49180
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-arm-16_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-arm-16_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-arm-16_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-arm-9_slack15.0.txz:  Rebuilt.
  This update fixes security issues:
  Out-of-bounds access in X Rendering extension (Animated cursors).
  Integer overflow in Big Requests Extension.
  Unprocessed client request via bytes to ignore.
  These issues were discovered by Nils Emmerich and reported by Julian Suleder
  via ERNW Vulnerability Disclosure.
  For more information, see:
    https://lists.x.org/archives/xorg/2025-June/062055.html
    https://www.cve.org/CVERecord?id=CVE-2025-49175
    https://www.cve.org/CVERecord?id=CVE-2025-49176
    https://www.cve.org/CVERecord?id=CVE-2025-49178
  (* Security fix *)

Aggiornamenti

Rss

Aggiornamenti di script e guide

24/02/2022: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware
15/12/2015: Aggiornato HowTo automatizzare la compilazione del kernel
15/12/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
24/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
22/11/2015: Aggiornato HowTo Automatizzare l'aggiornamento di Slackware current
07/11/2015: Aggiornato HowTo automatizzare la compilazione del kernel
05/11/2015: Nuovo HowTo Automatizzare l'aggiornamento di Slackware current
30/10/2015: Aggiornato HowTo Automatizzare la prima configurazione di Slackware
26/05/2015: Aggiornato HowTo mini Slackware su pendrive
07/05/2015: Aggiornato HowTo automatizzare la compilazione del kernel
13/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel
02/04/2015: Aggiornato HowTo automatizzare la compilazione del kernel



WiFi Ralink

I driver ufficiali della ralink per gli adattatori wireless non funzionano.
hardware
Provando a compilarli con un kernel recente si ottiene un errore mentre provando con una versione più datata la compilazione va a buon fine (anche se con molti warning), ma il driver compilato non serve a nulla, collegando il dispositivo al pc, questo non viene rilevato comunque.
Per fortuna sul sito http://rt2x00.serialmonkey.com è possibile trovare dei driver modificati perfettamente funzionanti anche sulle ultimissime versioni del kernel linux.
 

Scrivere sull'NTFS

Sfruttiamo FUSE per aver un supporto completo in scrittura sui filesystem NTFS. hdd

FUSE è un modulo già presente nei kernel vanilla, è un framework per filesystem in userspace, quindi abilitiamolo nella configurazione "Filesystem in Userspace support" se non lo è già e ricompiliamo il kernel se necessario. Dopo basterà scaricare il driver ntsf-3g, installarlo e sarà possibile montare la partizione col comando ntfs-3g.

Per approfondire...

Recuperare la tabella delle partizioni

Recuperare una tabella delle partizioni danneggiata è possibile grazie a Linux e l'utilità gpart. hdd

In alcune distribuzioni è già presente, ma in altre no, quindi lo si può prelevare alla sezione download del sito, questo programma effettua una scansione grezza del disco alla ricerca di partizioni, dopo, se non sono state sovrascritte, sarà possibile ricrearle identiche con fdisk.


Per approfondire...



<< articoli precedenti   

Condividi sui tuoi social preferiti!

Telegram Facebook Linkedin Twitter Pinterest
.