Se avete problemi con l'installazione e la configurazione di Slackware postate qui. Non usate questo forum per argomenti generali... per quelli usate Gnu/Linux in genere.
Regole del forum
1) Citare sempre la versione di Slackware usata, la versione del Kernel e magari anche la versione della libreria coinvolta. Questi dati aiutano le persone che possono rispondere.
2) Per evitare confusione prego inserire in questo forum solo topic che riguardano appunto Slackware, se l'argomento è generale usate il forum Gnu/Linux in genere.
3) Leggere attentamente le risposte ricevute.
4) Scrivere i messaggi con il colore di default, evitare altri colori.
5) Scrivere in Italiano o in Inglese, se possibile grammaticalmente corretto, evitate stili di scrittura poco chiari, quindi nessuna abbreviazione tipo telegramma o scrittura stile SMS o CHAT.
6) Appena registrati è consigliato presentarsi nel forum dedicato.
La non osservanza delle regole porta a provvedimenti di vari tipo da parte dello staff, in particolare la non osservanza della regola 5 porta alla cancellazione del post e alla segnalazione dell'utente. In caso di recidività l'utente rischia il ban temporaneo.
Wed Mar 14 22:27:52 UTC 2012
patches/packages/mozilla-firefox-11.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-11.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.8-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.8-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Sat Apr 7 21:48:42 UTC 2012
patches/packages/libtiff-3.9.6-i486-1_slack13.37.txz: Upgraded.
Patched overflows that could lead to arbitrary code execution when parsing
a malformed image file.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173
(* Security fix *)
+--------------------------+
Wed Apr 11 17:16:32 UTC 2012
patches/packages/pidgin-2.10.3-i486-1_slack13.37.txz: Upgraded.
This update fixes several remotely triggerable crash bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2943
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4939
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178
(* Security fix *)
patches/packages/samba-3.5.14-i486-1_slack13.37.txz: Upgraded.
This is a security release in order to address a vulnerability that allows
remote code execution as the "root" user. All sites running a Samba
server should update to the new Samba package and restart Samba.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
(* Security fix *)
+--------------------------+
Mon Apr 23 18:18:31 UTC 2012
patches/packages/openssl-0.9.8v-i486-1_slack13.37.txz: Upgraded.
Fixes some potentially exploitable buffer overflows.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
(* Security fix *)
patches/packages/openssl-solibs-0.9.8v-i486-1_slack13.37.txz: Upgraded.
Fixes some potentially exploitable buffer overflows.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
(* Security fix *)
extra/wicd/wicd-1.7.2.1-i486-1_slack13.37.txz: Upgraded.
This fixes a local privilege escalation that allows a user to set arbitrary
pre/post-connection scripts through D-Bus which are then executed as the
wicd user (generally root).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2095
Thanks to dapal for the workaround allowing us to skip the pybabel
requirement (for now), and to Robby Workman for the script update.
(* Security fix *)
+--------------------------+
Fri Apr 27 01:07:23 UTC 2012
patches/packages/mozilla-firefox-12.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-12.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/openssl-0.9.8w-i486-1_slack13.37.txz: Upgraded.
Fixes some potentially exploitable buffer overflows.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
(* Security fix *)
patches/packages/openssl-solibs-0.9.8w-i486-1_slack13.37.txz: Upgraded.
Fixes some potentially exploitable buffer overflows.
Thanks to Tavis Ormandy, Google Security Team, for discovering this
issue and to Adam Langley <agl@chromium.org> for fixing it.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
(* Security fix *)
patches/packages/seamonkey-2.9-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.9-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Mon Apr 30 22:24:10 UTC 2012
patches/packages/mozilla-thunderbird-12.0.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release.
Fixed POP3 filters that move mail to IMAP folders.
Fixed loading message body in sub-folders that use fetch headers only.
Addressed mail notification issues.
Fixed crash in nMsgDatabase.
patches/packages/seamonkey-2.9.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release.
Fixed POP3 filters that move mail to IMAP folders.
Fixed loading message body in sub-folders that use fetch headers only.
Addressed mail notification issues.
Fixed crash in nMsgDatabase.
Also, the build script and seamonkey-nss.pc were adjusted to fix issues
with compiling against Seamonkey NSS. Thanks to zerouno on LQ.
patches/packages/seamonkey-solibs-2.9.1-i486-1_slack13.37.txz: Upgraded.
patches/packages/wicd-1.7.2.4-i486-1_slack13.37.txz: Upgraded.
Correct the fix for CVE-2012-2095 (and fix other new bugs).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2095
(* Security fix *)
+--------------------------+
Wed May 9 20:16:40 UTC 2012
patches/packages/wicd-1.7.2.4-i486-2_slack13.37.txz: Rebuilt.
Fixed an input sanitization bug that breaks accepting a passphrase for a new
password protected access point. Patch from upstream.
Thanks to Willy Sudiarto Raharjo for the notice.
+--------------------------+
Tue May 8 21:21:10 UTC 2012
patches/packages/php-5.3.13-i486-1_slack13.37.txz: Upgraded.
This release completes a fix for a vulnerability in CGI-based setups.
Note: mod_php and php-fpm are not vulnerable to this attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311
(* Security fix *)
+--------------------------+
Sat May 19 19:03:37 UTC 2012
patches/packages/openssl-0.9.8x-i486-1_slack13.37.txz: Upgraded.
This is a very minor security fix:
o Fix DTLS record length checking bug CVE-2012-2333
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
(* Security fix *)
patches/packages/openssl-solibs-0.9.8x-i486-1_slack13.37.txz: Upgraded.
This is a very minor security fix:
o Fix DTLS record length checking bug CVE-2012-2333
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
(* Security fix *)
+--------------------------+
Wed May 23 00:14:52 UTC 2012
patches/packages/libxml2-2.7.8-i486-4_slack13.37.txz: Upgraded.
Patched an off-by-one error in XPointer that could lead to a crash or
possibly the execution of arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102
(* Security fix *)
+--------------------------+
Thu Jun 14 05:02:39 UTC 2012
patches/packages/bind-9.7.6_P1-i486-1_slack13.37.txz: Upgraded.
This release fixes an issue that could crash BIND, leading to a denial of
service. It also fixes the so-called "ghost names attack" whereby a
remote attacker may trigger continued resolvability of revoked domain names.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
(* Security fix *)
patches/packages/mozilla-firefox-13.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-13.0-i486-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.10-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.10-i486-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Sat Jun 16 16:19:36 UTC 2012
patches/packages/mozilla-firefox-13.0.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release, addressing issues with recent versions of Flash,
Hotmail, and rendering of Hebrew text.
patches/packages/mozilla-thunderbird-13.0.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release, addressing issues with the new Filelink feature,
and miscellaneous other stability and display updates.
+--------------------------+
Mon Jun 25 02:32:37 UTC 2012
patches/packages/freetype-2.4.10-i486-1_slack13.37.txz: Upgraded.
Since freetype-2.4.8 many fixes were made to better handle invalid fonts.
Many of them are vulnerabilities (see CVE-2012-1126 up to CVE-2012-1144
and SA48320) so all users should upgrade.
(* Security fix *)
patches/packages/seamonkey-2.10.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.10.1-i486-1_slack13.37.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Fri Jul 13 23:14:15 UTC 2012
patches/packages/php-5.3.14-i486-1_slack13.37.txz: Upgraded.
This release fixes a weakness in the DES implementation of crypt
and a heap overflow issue in the phar extension.
(* Security fix *)
patches/packages/pidgin-2.10.6-i486-1_slack13.37.txz: Upgraded.
Fixes a security issue for users of MXit: Incorrect handing of inline
images in incoming instant messages can cause a buffer overflow and in
some cases can be exploited to execute arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374
(* Security fix *)
+--------------------------+