Se avete problemi con l'installazione e la configurazione di Slackware postate qui. Non usate questo forum per argomenti generali... per quelli usate Gnu/Linux in genere.
Regole del forum
1) Citare sempre la versione di Slackware usata, la versione del Kernel e magari anche la versione della libreria coinvolta. Questi dati aiutano le persone che possono rispondere.
2) Per evitare confusione prego inserire in questo forum solo topic che riguardano appunto Slackware, se l'argomento è generale usate il forum Gnu/Linux in genere.
3) Leggere attentamente le risposte ricevute.
4) Scrivere i messaggi con il colore di default, evitare altri colori.
5) Scrivere in Italiano o in Inglese, se possibile grammaticalmente corretto, evitate stili di scrittura poco chiari, quindi nessuna abbreviazione tipo telegramma o scrittura stile SMS o CHAT.
6) Appena registrati è consigliato presentarsi nel forum dedicato.
La non osservanza delle regole porta a provvedimenti di vari tipo da parte dello staff, in particolare la non osservanza della regola 5 porta alla cancellazione del post e alla segnalazione dell'utente. In caso di recidività l'utente rischia il ban temporaneo.
Mon Oct 15 01:59:59 UTC 2012
patches/packages/seamonkey-2.13.1-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.13.1-i486-1.txz: Upgraded.
+--------------------------+
Sat Oct 27 01:13:00 UTC 2012
patches/packages/mozilla-firefox-16.0.2-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
+--------------------------+
Wed Oct 31 00:32:25 UTC 2012
patches/packages/mozilla-thunderbird-16.0.2-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.13.2-i486-1_slack14.0.txz: Upgraded.
patches/packages/seamonkey-2.13.2-i486-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Thu Nov 22 01:57:50 UTC 2012
patches/packages/mozilla-firefox-17.0-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-17.0-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.14-i486-1_slack14.0.txz: Upgraded.
patches/packages/seamonkey-2.14-i486-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Tue Dec 4 05:52:37 UTC 2012
patches/packages/mozilla-firefox-17.0.1-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-2.14.1-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.14.1-i486-1_slack14.0.txz: Upgraded.
+--------------------------+
Fri Dec 7 01:41:59 UTC 2012
patches/packages/bind-9.9.2_P1-i486-1_slack14.0.txz: Upgraded.
IMPORTANT NOTE: This package updates BIND from 9.7.6_P4 to
9.8.4_P1 since the 9.7 series is no longer supported. It is
possible that some changes may be required to your local
configuration.
This release addresses some denial-of-service and other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868
(* Security fix *)
patches/packages/libssh-0.5.3-i486-1_slack14.0.txz: Upgraded.
This release fixes several security bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562
(* Security fix *)
patches/packages/libxml2-2.8.0-i486-2_slack14.0.txz: Rebuilt.
Patched a heap-based buffer underflow in the xmlParseAttValueComplex
function in parser.c in libxml2 2.9.0 and earlier that could allow a
remote attacker to cause a denial of service or possibly execute
arbitrary code via crafted entities in an XML document.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
(* Security fix *)
patches/packages/ruby-1.9.3_p327-i486-1_slack14.0.txz: Upgraded.
This release fixes a hash-flooding DoS vulnerability and many other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371
(* Security fix *)
patches/packages/sqlite-3.7.14.1-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Thu Jan 10 08:17:57 UTC 2013
patches/packages/mozilla-firefox-18.0-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-17.0.2-i486-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.15-i486-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.15-i486-1_slack14.0.txz: Upgraded.
+--------------------------+
Wed Jan 16 02:54:52 UTC 2013
patches/packages/freetype-2.4.11-i486-1_slack14.0.txz: Upgraded.
This release fixes several security bugs that could cause freetype to
crash or run programs upon opening a specially crafted file.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
(* Security fix *)
+--------------------------+
Sun Jan 20 07:50:53 UTC 2013
patches/packages/mozilla-firefox-18.0.1-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Mon Jan 21 22:46:22 UTC 2013
patches/packages/seamonkey-2.15.1-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.15.1-i486-1_slack14.0.txz: Upgraded.
+--------------------------+
Tue Jan 22 23:40:16 UTC 2013
patches/packages/mysql-5.5.29-i486-1_slack14.0.txz: Upgraded.
Upgraded to the latest upstream version to fix security issues and provide
other bug fixes and improvements. Note that some of the changes may
possibly introduce incompatibilities with the previous package.
(* Security fix *)
+--------------------------+
Wed Feb 6 07:14:25 UTC 2013
patches/packages/seamonkey-2.15.2-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.15.2-i486-1_slack14.0.txz: Upgraded.
patches/packages/mozilla-firefox-18.0.2-i486-1_slack14.0.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Fri Feb 8 03:57:05 UTC 2013
patches/packages/curl-7.29.0-i486-1_slack14.0.txz: Upgraded.
When negotiating SASL DIGEST-MD5 authentication, the function
Curl_sasl_create_digest_md5_message() uses the data provided from the
server without doing the proper length checks and that data is then
appended to a local fixed-size buffer on the stack. This vulnerability
can be exploited by someone who is in control of a server that a libcurl
based program is accessing with POP3, SMTP or IMAP. For applications
that accept user provided URLs, it is also thinkable that a malicious
user would feed an application with a URL to a server hosting code
targeting this flaw.
Affected versions: curl 7.26.0 to and including 7.28.1
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
(* Security fix *)
patches/packages/sdl-1.2.14-i486-6_slack14.0.txz: Rebuilt.
Patched mouse clicking bug.
+--------------------------+
Tue Feb 12 02:34:07 UTC 2013
patches/packages/openssl-1.0.1e-i486-1_slack14.0.txz: Upgraded.
This release fixes a regression in openssl-1.0.1d, where the fix for
CVE-2013-0169 caused data corruption on CPUs with AES-NI support.
patches/packages/openssl-solibs-1.0.1e-i486-1_slack14.0.txz: Upgraded.
+--------------------------+
Tue Feb 12 21:33:16 UTC 2013
patches/packages/curl-7.29.0-i486-2_slack14.0.txz: Rebuilt.
Patched to fix a segfault when closing an unused multi.
Thanks to Willy Sudiarto Raharjo.
+--------------------------+