Se avete problemi con l'installazione e la configurazione di Slackware64 postate qui. Non usate questo forum per argomenti che trattano la Slackware32 o generali... per quelli usate rispettivamente il forum Slackware e Gnu/Linux in genere.
Regole del forum
1) Citare sempre la versione di Slackware64 usata, la versione del Kernel e magari anche la versione della libreria coinvolta. Questi dati aiutano le persone che possono rispondere.
2) Per evitare confusione prego inserire in questo forum solo topic che riguardano appunto Slackware64, se l'argomento è Slackware32 o generale usate rispettivamente il forum Slackware o Gnu/Linux in genere.
3) Leggere attentamente le risposte ricevute
4) Scrivere i messaggi con il colore di default, evitare altri colori.
5) Scrivere in Italiano o in Inglese, se possibile grammaticalmente corretto, evitate stili di scrittura poco chiari, quindi nessuna abbreviazione tipo telegramma o scrittura stile SMS o CHAT.
6) Appena registrati è consigliato presentarsi nel forum dedicato.
La non osservanza delle regole porta a provvedimenti di vari tipo da parte dello staff, in particolare la non osservanza della regola 5 porta alla cancellazione del post e alla segnalazione dell'utente. In caso di recidività l'utente rischia il ban temporaneo.
Thu Aug 30 23:35:53 UTC 2012
patches/packages/glibc-2.13-x86_64-6_slack13.37.txz: Rebuilt.
Patched multiple integer overflows in the strtod, strtof, strtold, and
strtod_l functions in stdlib in the GNU C Library allow local users to
cause a denial of service (application crash) and possibly execute
arbitrary code via a long string, which triggers a stack-based buffer
overflow.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480
(* Security fix *)
patches/packages/glibc-i18n-2.13-x86_64-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-profile-2.13-x86_64-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-solibs-2.13-x86_64-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2.13-noarch-6_slack13.37.txz: Rebuilt.
patches/packages/mozilla-firefox-15.0-x86_64-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-15.0-x86_64-1_slack13.37.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.12-x86_64-1_slack13.37.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.12-x86_64-1_slack13.37.txz: Upgraded.
patches/packages/slocate-3.1-x86_64-4_slack13.37.txz: Rebuilt.
Patched to use lstat64 and -D_LARGEFILE64_SOURCE. Thanks to Mancha+.
Patched to fix information leak of filenames in protected directories.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0227
(* Security fix *)
+--------------------------+
Fri Sep 7 20:27:46 UTC 2012
patches/packages/mozilla-firefox-15.0.1-x86_64-1_slack13.37.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Mon Sep 10 20:26:44 UTC 2012
patches/packages/seamonkey-2.12.1-x86_64-1_slack13.37.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.12.1-x86_64-1_slack13.37.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Sun Sep 9 19:11:35 UTC 2012
patches/packages/mozilla-thunderbird-15.0.1-x86_64-1_slack13.37.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Fri Sep 14 02:16:53 UTC 2012
patches/packages/bind-9.7.6_P3-x86_64-1_slack13.37.txz: Upgraded.
This update fixes a security issue where named could crash on a specially
crafted record. [RT #30416]
(* Security fix *)
patches/packages/patch-2.7-x86_64-1_slack13.37.txz: Upgraded.
This version of patch ignores destination filenames that are absolute or
that contain a component of "..", unless such a filename is provided as
an argument.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
(* Security fix *)
+--------------------------+
Fri Sep 14 20:29:40 UTC 2012
patches/packages/dhcp-4.2.4_P2-x86_64-1_slack13.37.txz: Upgraded.
An issue with the use of lease times was found and fixed. Making certain
changes to the end time of an IPv6 lease could cause the server to abort.
Thanks to Glen Eustace of Massey University, New Zealand for finding this
issue. [ISC-Bugs #30281]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955
(* Security fix *)
patches/packages/php-5.3.17-x86_64-1_slack13.37.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Wed Sep 19 23:52:16 UTC 2012
patches/packages/patch-2.7-x86_64-2_slack13.37.txz: Upgraded.
Applied two upstream git commits to fix bugs which could cause target
files to be removed or truncated. Thanks to Qun-Ying.
+--------------------------+
Wed Oct 10 03:06:03 UTC 2012
patches/packages/mozilla-firefox-16.0-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
+--------------------------+
Thu Oct 11 01:14:57 UTC 2012
patches/packages/bind-9.9.1_P4-x86_64-1_slack14.0.txz: Upgraded.
This update fixes a security issue where a certain combination of records
in the RBT could cause named to hang while populating the additional
section of a response. [RT #31090]
(* Security fix *)
patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txz: Rebuilt.
Patched to fix a compiler related bug in iptables-restore.
Thanks to linuxxer for the report and David Somero for a link to the patch.
+--------------------------+
Thu Oct 11 21:25:20 UTC 2012
patches/packages/mozilla-firefox-16.0.1-x86_64-1_slack14.0.txz: Upgraded.
This update fixes a security vulnerability that could allow a malicious
site to potentially determine which websites users have visited and have
access to the URL or URL parameters.
(* Security fix *)
patches/packages/mozilla-thunderbird-16.0.1-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
+--------------------------+
Mon Oct 15 01:59:59 UTC 2012
patches/packages/seamonkey-2.13.1-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.13.1-x86_64-1.txz: Upgraded.
+--------------------------+
Sat Oct 27 01:13:00 UTC 2012
patches/packages/mozilla-firefox-16.0.2-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
+--------------------------+
Wed Oct 31 00:32:25 UTC 2012
patches/packages/mozilla-thunderbird-16.0.2-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.13.2-x86_64-1_slack14.0.txz: Upgraded.
patches/packages/seamonkey-2.13.2-x86_64-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Thu Nov 22 01:57:50 UTC 2012
patches/packages/mozilla-firefox-17.0-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
patches/packages/mozilla-thunderbird-17.0-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.14-x86_64-1_slack14.0.txz: Upgraded.
patches/packages/seamonkey-2.14-x86_64-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Tue Dec 4 05:52:37 UTC 2012
patches/packages/mozilla-firefox-17.0.1-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-2.14.1-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/seamonkey-solibs-2.14.1-x86_64-1_slack14.0.txz: Upgraded.
+--------------------------+
Fri Dec 7 01:41:59 UTC 2012
patches/packages/bind-9.9.2_P1-x86_64-1_slack14.0.txz: Upgraded.
IMPORTANT NOTE: This package updates BIND from 9.7.6_P4 to
9.8.4_P1 since the 9.7 series is no longer supported. It is
possible that some changes may be required to your local
configuration.
This release addresses some denial-of-service and other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868
(* Security fix *)
patches/packages/libssh-0.5.3-x86_64-1_slack14.0.txz: Upgraded.
This release fixes several security bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562
(* Security fix *)
patches/packages/libxml2-2.8.0-x86_64-2_slack14.0.txz: Rebuilt.
Patched a heap-based buffer underflow in the xmlParseAttValueComplex
function in parser.c in libxml2 2.9.0 and earlier that could allow a
remote attacker to cause a denial of service or possibly execute
arbitrary code via crafted entities in an XML document.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
(* Security fix *)
patches/packages/ruby-1.9.3_p327-x86_64-1_slack14.0.txz: Upgraded.
This release fixes a hash-flooding DoS vulnerability and many other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371
(* Security fix *)
patches/packages/sqlite-3.7.14.1-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release.
+--------------------------+