Official patches for Slackware64-14.2

Se avete problemi con l'installazione e la configurazione di Slackware64 postate qui. Non usate questo forum per argomenti che trattano la Slackware32 o generali... per quelli usate rispettivamente il forum Slackware e Gnu/Linux in genere.

Moderatore: Staff

Regole del forum
1) Citare sempre la versione di Slackware64 usata, la versione del Kernel e magari anche la versione della libreria coinvolta. Questi dati aiutano le persone che possono rispondere.
2) Per evitare confusione prego inserire in questo forum solo topic che riguardano appunto Slackware64, se l'argomento è Slackware32 o generale usate rispettivamente il forum Slackware o Gnu/Linux in genere.
3) Leggere attentamente le risposte ricevute
4) Scrivere i messaggi con il colore di default, evitare altri colori.
5) Scrivere in Italiano o in Inglese, se possibile grammaticalmente corretto, evitate stili di scrittura poco chiari, quindi nessuna abbreviazione tipo telegramma o scrittura stile SMS o CHAT.
6) Appena registrati è consigliato presentarsi nel forum dedicato.

La non osservanza delle regole porta a provvedimenti di vari tipo da parte dello staff, in particolare la non osservanza della regola 5 porta alla cancellazione del post e alla segnalazione dell'utente. In caso di recidività l'utente rischia il ban temporaneo.
Spina-BOT

New patches for slackware64-13.37 on Tue, 01 May 2012 00:24:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Mon Apr 30 22:24:10 UTC 2012
patches/packages/mozilla-thunderbird-12.0.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release.
  Fixed POP3 filters that move mail to IMAP folders.
  Fixed loading message body in sub-folders that use fetch headers only.
  Addressed mail notification issues.
  Fixed crash in nMsgDatabase.
patches/packages/seamonkey-2.9.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release.
  Fixed POP3 filters that move mail to IMAP folders.
  Fixed loading message body in sub-folders that use fetch headers only.
  Addressed mail notification issues.
  Fixed crash in nMsgDatabase.
  Also, the build script and seamonkey-nss.pc were adjusted to fix issues
  with compiling against Seamonkey NSS.  Thanks to zerouno on LQ.
patches/packages/seamonkey-solibs-2.9.1-x86_64-1_slack13.37.txz:  Upgraded.
patches/packages/wicd-1.7.2.4-x86_64-1_slack13.37.txz:  Upgraded.
  Correct the fix for CVE-2012-2095 (and fix other new bugs).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2095
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Mon, 07 May 2012 20:54:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Mon May  7 18:54:03 UTC 2012
patches/packages/pidgin-2.10.4-x86_64-1_slack13.37.txz:  Upgraded.
  Fixed possible MSN remote crash.
  Fixed XMPP remote crash.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Wed, 09 May 2012 22:16:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Wed May  9 20:16:40 UTC 2012
patches/packages/wicd-1.7.2.4-x86_64-2_slack13.37.txz:  Rebuilt.
  Fixed an input sanitization bug that breaks accepting a passphrase for a new
  password protected access point.  Patch from upstream.
  Thanks to Willy Sudiarto Raharjo for the notice.
+--------------------------+
Tue May  8 21:21:10 UTC 2012
patches/packages/php-5.3.13-x86_64-1_slack13.37.txz:  Upgraded.
  This release completes a fix for a vulnerability in CGI-based setups.
  Note: mod_php and php-fpm are not vulnerable to this attack.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Sat, 19 May 2012 21:03:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Sat May 19 19:03:37 UTC 2012
patches/packages/openssl-0.9.8x-x86_64-1_slack13.37.txz:  Upgraded.
  This is a very minor security fix:
  o Fix DTLS record length checking bug CVE-2012-2333
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
  (* Security fix *)
patches/packages/openssl-solibs-0.9.8x-x86_64-1_slack13.37.txz:  Upgraded.
  This is a very minor security fix:
  o Fix DTLS record length checking bug CVE-2012-2333
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Wed, 23 May 2012 02:14:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Wed May 23 00:14:52 UTC 2012
patches/packages/libxml2-2.7.8-x86_64-4_slack13.37.txz:  Upgraded.
  Patched an off-by-one error in XPointer that could lead to a crash or
  possibly the execution of arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Thu, 14 Jun 2012 07:49:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Thu Jun 14 05:02:39 UTC 2012
patches/packages/bind-9.7.6_P1-x86_64-1_slack13.37.txz:  Upgraded.
  This release fixes an issue that could crash BIND, leading to a denial of
  service.  It also fixes the so-called "ghost names attack" whereby a
  remote attacker may trigger continued resolvability of revoked domain names.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1033
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
  (* Security fix *)
patches/packages/mozilla-firefox-13.0-x86_64-1_slack13.37.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
patches/packages/mozilla-thunderbird-13.0-x86_64-1_slack13.37.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
patches/packages/seamonkey-2.10-x86_64-1_slack13.37.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
patches/packages/seamonkey-solibs-2.10-x86_64-1_slack13.37.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+
Have fun,
Spina-BOT

Spina-BOT

New patches for slackware64-13.37 on Sat, 16 Jun 2012 18:19:

Messaggio da Spina-BOT »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Sat Jun 16 16:19:36 UTC 2012
patches/packages/mozilla-firefox-13.0.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release, addressing issues with recent versions of Flash,
  Hotmail, and rendering of Hebrew text.
patches/packages/mozilla-thunderbird-13.0.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release, addressing issues with the new Filelink feature,
  and miscellaneous other stability and display updates.
+--------------------------+
Have fun,
Spina-BOT

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Mon, 25 Jun 2012 04:32:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Mon Jun 25 02:32:37 UTC 2012
patches/packages/freetype-2.4.10-x86_64-1_slack13.37.txz:  Upgraded.
  Since freetype-2.4.8 many fixes were made to better handle invalid fonts.
  Many of them are vulnerabilities (see CVE-2012-1126 up to CVE-2012-1144
  and SA48320) so all users should upgrade.
  (* Security fix *)
patches/packages/seamonkey-2.10.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release.
patches/packages/seamonkey-solibs-2.10.1-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release.
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Sat, 14 Jul 2012 01:14:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Fri Jul 13 23:14:15 UTC 2012
patches/packages/php-5.3.14-x86_64-1_slack13.37.txz:  Upgraded.
  This release fixes a weakness in the DES implementation of crypt
  and a heap overflow issue in the phar extension.
  (* Security fix *)
patches/packages/pidgin-2.10.6-x86_64-1_slack13.37.txz:  Upgraded.
  Fixes a security issue for users of MXit:  Incorrect handing of inline
  images in incoming instant messages can cause a buffer overflow and in
  some cases can be exploited to execute arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Wed, 18 Jul 2012 07:35:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Wed Jul 18 05:35:26 UTC 2012
patches/packages/libexif-0.6.21-x86_64-1_slack13.37.txz:  Upgraded.
  This update fixes a number of remotely exploitable issues in libexif
   with effects ranging from information leakage to potential remote
   code execution.
  For more information, see:
    http://sourceforge.net/mailarchive/message.php?messaggio_id=29534027
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2845
  (* Security fix *)
patches/packages/mozilla-firefox-14.0.1-x86_64-1_slack13.37.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
patches/packages/mozilla-thunderbird-14.0-x86_64-1_slack13.37.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
patches/packages/seamonkey-2.11-x86_64-1_slack13.37.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
patches/packages/seamonkey-solibs-2.11-x86_64-1_slack13.37.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Sun, 22 Jul 2012 21:45:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Sun Jul 22 19:45:25 UTC 2012
patches/packages/php-5.3.15-x86_64-1_slack13.37.txz:  Upgraded.
  Fixed potential overflow in _php_stream_scandir (CVE-2012-2688).
  (Thanks to Jason Powell, Stas)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Wed, 25 Jul 2012 04:02:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Wed Jul 25 02:02:40 UTC 2012
patches/packages/libpng-1.4.12-x86_64-1_slack13.37.txz:  Upgraded.
  Fixed incorrect type (int copy should be png_size_t copy) in png_inflate()
  (fixes CVE-2011-3045).
  Revised png_set_text_2() to avoid potential memory corruption (fixes
    CVE-2011-3048).
  Changed "a+w" to "u+w" in Makefile.in to fix CVE-2012-3386.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Fri, 27 Jul 2012 19:15:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Fri Jul 27 17:15:24 UTC 2012
patches/packages/bind-9.7.6_P2-x86_64-1_slack13.37.txz:  Upgraded.
  Prevents a named assert (crash) when validating caused by using
  "Bad cache" data before it has been initialized.  [RT #30025]
  ISC_QUEUE handling for recursive clients was updated to address a
  race condition that could cause a memory leak.  This rarely occurred
  with UDP clients, but could be a significant problem for a server
  handling a steady rate of TCP queries.  [RT #29539 & #30233]
  Under heavy incoming TCP query loads named could experience a
  memory leak which could lead to significant reductions in query
  response or cause the server to be terminated on systems with
  "out of memory" killers. [RT #29539]
  A condition has been corrected where improper handling of zero-length
  RDATA could cause undesirable behavior, including termination of
  the named process.  [RT #29644]
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Thu, 16 Aug 2012 06:01:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Thu Aug 16 04:01:31 UTC 2012
patches/packages/emacs-23.3-x86_64-2_slack13.37.txz:  Rebuilt.
  Patched to fix a security flaw in the file-local variables code.
  When the Emacs user option `enable-local-variables' is set to `:safe'
  (the default value is t), Emacs should automatically refuse to evaluate
  `eval' forms in file-local variable sections.  Due to the bug, Emacs
  instead automatically evaluates such `eval' forms.  Thus, if the user
  changes the value of `enable-local-variables' to `:safe', visiting a
  malicious file can cause automatic execution of arbitrary Emacs Lisp
  code with the permissions of the user.  Bug discovered by Paul Ling.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3479
  (* Security fix *)
patches/packages/t1lib-5.1.2-x86_64-3_slack13.37.txz:  Rebuilt.
  Patched various overflows, crashes, and pointer bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Slacky BOT Packager
Linux 3.x
Linux 3.x
Messaggi: 812
Iscritto il: mar 19 giu 2012, 11:18

New patches for slackware64-13.37 on Fri, 24 Aug 2012 22:08:

Messaggio da Slacky BOT Packager »

Hey guys,
new patches have been released for slackware64-13.37. Follows the relevant part of ChangeLog.txt:

Codice: Seleziona tutto

Fri Aug 24 20:08:37 UTC 2012
patches/packages/php-5.3.16-x86_64-1_slack13.37.txz:  Upgraded.
  This is a bugfix release.
patches/packages/dhcp-4.2.4_P1-x86_64-1_slack13.37.txz:  Upgraded.
  This fixes memory leaks, denial of service vulnerabilities, and
  disallows packets with zero length client ids (not valid according to
  RFC 2132 section 9.14).
  For more information, see:
    https://kb.isc.org/article/AA-00736
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954
  (* Security fix *)
+--------------------------+
Have fun,
Slacky BOT Packager

Rispondi