Se avete problemi con l'installazione e la configurazione di Slackware64 postate qui. Non usate questo forum per argomenti che trattano la Slackware32 o generali... per quelli usate rispettivamente il forum Slackware e Gnu/Linux in genere.
Regole del forum
1) Citare sempre la versione di Slackware64 usata, la versione del Kernel e magari anche la versione della libreria coinvolta. Questi dati aiutano le persone che possono rispondere.
2) Per evitare confusione prego inserire in questo forum solo topic che riguardano appunto Slackware64, se l'argomento è Slackware32 o generale usate rispettivamente il forum Slackware o Gnu/Linux in genere.
3) Leggere attentamente le risposte ricevute
4) Scrivere i messaggi con il colore di default, evitare altri colori.
5) Scrivere in Italiano o in Inglese, se possibile grammaticalmente corretto, evitate stili di scrittura poco chiari, quindi nessuna abbreviazione tipo telegramma o scrittura stile SMS o CHAT.
6) Appena registrati è consigliato presentarsi nel forum dedicato.
La non osservanza delle regole porta a provvedimenti di vari tipo da parte dello staff, in particolare la non osservanza della regola 5 porta alla cancellazione del post e alla segnalazione dell'utente. In caso di recidività l'utente rischia il ban temporaneo.
Mon Jun 10 21:51:54 UTC 2013
patches/packages/php-5.4.16-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release. It also fixes a security issue -- a heap-based
overflow in the quoted_printable_encode() function, which could be used by
a remote attacker to crash PHP or execute code as the 'apache' user.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
(* Security fix *)
+--------------------------+
Sun Jun 23 21:00:00 UTC 2013
patches/packages/curl-7.29.0-x86_64-3_slack14.0.txz: Rebuilt.
This fixes a minor security issue where a decode buffer boundary flaw in
libcurl could lead to heap corruption.
For more information, see:
http://curl.haxx.se/docs/adv_20130622.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
(* Security fix *)
+--------------------------+
Thu Jun 27 23:56:34 UTC 2013
patches/packages/ruby-1.9.3_p448-x86_64-1_slack14.0.txz: Upgraded.
This update patches a vulnerability in Ruby's SSL client that could allow
man-in-the-middle attackers to spoof SSL servers via a valid certificate
issued by a trusted certification authority.
For more information, see:
http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
(* Security fix *)
+--------------------------+
Sat Jun 29 22:08:25 UTC 2013
patches/packages/mozilla-firefox-17.0.7esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *)
We had to switch to ESR here as well, as there's a problem running Firefox
22.0 on Slackware 14.0 under KDE (crash when oxygen-gtk2 is installed).
Forcing people to uninstall oxygen-gtk2 isn't really an option for a
security fix, and upgrading to the latest oxygen-gtk2 did not help.
It's possible that future Firefox/Thunderbird security updates will always
come from the ESR branch.
patches/packages/mozilla-thunderbird-17.0.7-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
+--------------------------+
Wed Jul 10 07:15:30 UTC 2013
patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txz: Rebuilt.
This update fixes a security issue where misuse of va_list could be used to
cause a denial of service for system services.
Vulnerability reported by Alexandru Cornea.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
(* Security fix *)
+--------------------------+
Tue Jul 16 21:18:56 UTC 2013
patches/packages/php-5.4.17-x86_64-1_slack14.0.txz: Upgraded.
This update fixes an issue where XML in PHP does not properly consider
parsing depth, which allows remote attackers to cause a denial of service
(heap memory corruption) or possibly have unspecified other impact via a
crafted document that is processed by the xml_parse_into_struct function.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113
(* Security fix *)
+--------------------------+
Sat Aug 3 20:36:53 UTC 2013
patches/packages/gnupg-1.4.14-x86_64-1_slack14.0.txz: Upgraded.
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
secret keys.
For more information, see:
http://eprint.iacr.org/2013/448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
(* Security fix *)
patches/packages/libgcrypt-1.5.3-x86_64-1_slack14.0.txz: Upgraded.
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
secret keys.
For more information, see:
http://eprint.iacr.org/2013/448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
(* Security fix *)
+--------------------------+
Tue Aug 6 05:23:34 UTC 2013
patches/packages/bind-9.9.3_P2-x86_64-1_slack14.0.txz: Upgraded.
This update fixes a security issue where a specially crafted query can cause
BIND to terminate abnormally, resulting in a denial of service.
For more information, see:
https://kb.isc.org/article/AA-01015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
(* Security fix *)
patches/packages/httpd-2.4.6-x86_64-1_slack14.0.txz: Upgraded.
This update addresses two security issues:
* SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against
a URI handled by mod_dav_svn with the source href (sent as part of the
request body as XML) pointing to a URI that is not configured for DAV
will trigger a segfault.
* SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that
dirty flag is respected when saving sessions, and ensure the session ID
is changed each time the session changes. This changes the format of the
updatesession SQL statement. Existing configurations must be changed.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
(* Security fix *)
patches/packages/samba-3.6.17-x86_64-1_slack14.0.txz: Upgraded.
This update fixes missing integer wrap protection in an EA list reading
that can allow authenticated or guest connections to cause the server to
loop, resulting in a denial of service.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
(* Security fix *)
+--------------------------+
Thu Aug 8 02:22:40 UTC 2013
patches/packages/mozilla-firefox-17.0.8esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *)
patches/packages/mozilla-thunderbird-17.0.8-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.20-x86_64-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.20-x86_64-1_slack14.0.txz: Upgraded.
+--------------------------+
Thu Aug 15 03:46:12 UTC 2013
patches/packages/seamonkey-2.20-x86_64-2_slack14.0.txz: Rebuilt.
Recompiled without the --enable-shared-js option to fix the Mozilla
Lightning plugin. This removes libmozjs.so, but there's a standalone js
package now anyway.
Thanks to ljb643.
patches/packages/seamonkey-solibs-2.20-x86_64-2_slack14.0.txz: Rebuilt.
Recompiled without the --enable-shared-js option to fix the Mozilla
Lightning plugin. This removes libmozjs.so, but there's a standalone js
package now anyway.
Thanks to ljb643.
+--------------------------+
Wed Aug 21 18:27:33 UTC 2013
patches/packages/hplip-3.12.9-x86_64-2_slack14.0.txz: Rebuilt.
This update fixes a stack-based buffer overflow in the hpmud_get_pml
function that can allow remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted SNMP response
with a large length value.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
(* Security fix *)
patches/packages/poppler-0.20.2-x86_64-2_slack14.0.txz: Rebuilt.
Sanitize error messages to remove escape sequences that could be used to
exploit vulnerable terminal emulators.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
(* Security fix *)
patches/packages/xpdf-3.03-x86_64-1_slack14.0.txz: Upgraded.
Sanitize error messages to remove escape sequences that could be used to
exploit vulnerable terminal emulators.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
Thanks to mancha.
(* Security fix *)
+--------------------------+
Fri Aug 30 19:39:38 UTC 2013
patches/packages/gnutls-3.0.31-x86_64-1_slack14.0.txz: Upgraded.
[Updated to the correct version to fix fetching the "latest" from gnu.org]
This update prevents a side-channel attack which may allow remote attackers
to conduct distinguishing attacks and plaintext recovery attacks using
statistical analysis of timing data for crafted packets.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
(* Security fix *)
patches/packages/samba-3.6.18-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Fri Aug 30 06:26:06 UTC 2013
patches/packages/gnutls-3.0.26-x86_64-1_slack14.0.txz: Upgraded.
This update prevents a side-channel attack which may allow remote attackers
to conduct distinguishing attacks and plaintext recovery attacks using
statistical analysis of timing data for crafted packets.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
(* Security fix *)
patches/packages/php-5.4.19-x86_64-1_slack14.0.txz: Upgraded.
Fixed handling null bytes in subjectAltName (CVE-2013-4248).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
(* Security fix *)
+--------------------------+
Mon Sep 9 03:34:59 UTC 2013
patches/packages/subversion-1.7.13-x86_64-1_slack14.0.txz: Upgraded.
This update fixes a local privilege escalation vulnerability via
symlink attack.
For more information, see:
http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277
(* Security fix *)
+--------------------------+
Wed Sep 18 02:56:19 UTC 2013
patches/packages/glibc-2.15-x86_64-8_slack14.0.txz: Rebuilt.
Patched to fix integer overflows in pvalloc, valloc, and
posix_memalign/memalign/aligned_alloc.
Thanks to mancha for the backported patch.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2013-4332
(* Security fix *)
Also, as long as these packages were being respun anyway, I added a patch
to fix the check for AVX opcodes. This was causing crashes on Xen.
Thanks to Dale Gallagher.
patches/packages/glibc-i18n-2.15-x86_64-8_slack14.0.txz: Rebuilt.
patches/packages/glibc-profile-2.15-x86_64-8_slack14.0.txz: Rebuilt.
patches/packages/glibc-solibs-2.15-x86_64-8_slack14.0.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2013d_2013d-noarch-8_slack14.0.txz: Rebuilt.
patches/packages/mozilla-firefox-17.0.9esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *)
patches/packages/mozilla-thunderbird-17.0.9esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
(* Security fix *)
+--------------------------+