<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.slackwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erik</id>
	<title>SlackWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.slackwiki.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erik"/>
	<link rel="alternate" type="text/html" href="https://www.slackwiki.com/Special:Contributions/Erik"/>
	<updated>2026-05-02T01:21:33Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3317</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3317"/>
		<updated>2023-07-06T22:03:37Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.40.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 22:03, 6 July 2023 (UTC)&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed wikitable&amp;quot;&lt;br /&gt;
|+ style=white-space:nowrap | Previous upgrades.&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.38.4. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:30, 1 October 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.4. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:40, 9 July 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 05:14, 2 April 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:02, 25 November 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=3316</id>
		<title>User:Erik</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=3316"/>
		<updated>2022-12-15T17:00:38Z</updated>

		<summary type="html">&lt;p&gt;Erik: http to https&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Name: [mailto:erik@sl1200.org Erik Hanson]&amp;lt;br&amp;gt;&lt;br /&gt;
Web: [https://sl1200.org/ https://sl1200s.org/]&amp;lt;br&amp;gt;&lt;br /&gt;
IRC: [ircs://irc.libera.chat:6697 Libera Chat]&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3315</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3315"/>
		<updated>2022-10-01T19:30:17Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.38.4. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:30, 1 October 2022 (UTC)&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed wikitable&amp;quot;&lt;br /&gt;
|+ style=white-space:nowrap | Previous upgrades.&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.4. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:40, 9 July 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 05:14, 2 April 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:02, 25 November 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3292</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3292"/>
		<updated>2022-07-09T19:40:52Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.37.4. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:40, 9 July 2022 (UTC)&lt;br /&gt;
{| class=&amp;quot;mw-collapsible mw-collapsed wikitable&amp;quot;&lt;br /&gt;
|+ style=white-space:nowrap | Previous upgrades.&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 05:14, 2 April 2022 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.37.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:02, 25 November 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
|-&lt;br /&gt;
|MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3291</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3291"/>
		<updated>2022-04-02T05:14:34Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.37.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 05:14, 2 April 2022 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.37.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:02, 25 November 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3285</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3285"/>
		<updated>2021-11-25T18:02:36Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.37.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:02, 25 November 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3283</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3283"/>
		<updated>2021-10-02T15:55:11Z</updated>

		<summary type="html">&lt;p&gt;Erik: Software Update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.36.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 15:55, 2 October 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=3280</id>
		<title>User:Erik</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=3280"/>
		<updated>2021-09-25T00:36:48Z</updated>

		<summary type="html">&lt;p&gt;Erik: Freenode is dead.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Name: [mailto:erik@sl1200.org Erik Hanson]&amp;lt;br&amp;gt;&lt;br /&gt;
Web: [http://sl1200.org/~erik/ http://sl1200s.org/~erik/]&amp;lt;br&amp;gt;&lt;br /&gt;
IRC: [ircs://irc.libera.chat:6697 Libera Chat]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\phi_n(\kappa) = \frac{1}{4\pi^2\kappa^2} \int_0^\infty \frac{\sin(\kappa R)}{\kappa R} \frac{\partial}{\partial R}\left[R^2\frac{\partial D_n(R)}{\partial R}\right]\,dR&amp;lt;/math&amp;gt;&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Irssi&amp;diff=3279</id>
		<title>Irssi</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Irssi&amp;diff=3279"/>
		<updated>2021-09-23T13:53:50Z</updated>

		<summary type="html">&lt;p&gt;Erik: Freenode is dead.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Irssi Quick tutorial - Based on http://www.irssi.org/documentation&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
If you did a full install of Slackware, you may already have irssi, and you can skip to the next section of this guide. However, if typing 'irssi' at the command line returns nothing, you will need to install the program. Irssi is located in the 'n' folder of Slackware mirrors - and once you have downloaded it, you only need to run 'installpkg irssi[tab]' as root to install it.&lt;br /&gt;
&lt;br /&gt;
== Usage ==&lt;br /&gt;
To start the client, &amp;quot;irssi&amp;quot; is entered from either the console or any xterm.&lt;br /&gt;
&lt;br /&gt;
Connecting is done by the /server command&lt;br /&gt;
/server irc.libera.chat:6697 , would connect to the libera chat server&lt;br /&gt;
/connect does the same thing but is used to open a new connection in a new window&lt;br /&gt;
/disconnect is to leave that server.&lt;br /&gt;
&lt;br /&gt;
If the nick or handle is already chosen, just issue /nick somenewhandle , this will change to a new name.&lt;br /&gt;
&lt;br /&gt;
Names that are registered on NickServ must be identified by /msg NickServ IDENTIFY &amp;lt;password&amp;gt;&lt;br /&gt;
Or you can select window #2 by the alt key and number 2 and enter IDENTIFY &amp;lt;password&amp;gt;.&lt;br /&gt;
N.B alt key 0-10 is for  windows 0-10, Alt-q through Alt-o is for 11-19.&lt;br /&gt;
&lt;br /&gt;
To join a channel, issue /j #slackware, that will bring you to the wonderful people on Slackware's official channel on the Libera Chat IRC network.&lt;br /&gt;
&lt;br /&gt;
Ctrl-X is used to switch between network connections, if you are connected to multiple servers, e.g. irc.libera.chat and another server.&lt;br /&gt;
&lt;br /&gt;
/query and /q are used to initiate private convesationa with people. eg. /query linus would open a private chat window with the user 'linus'.&lt;br /&gt;
&lt;br /&gt;
/set in the first window, shows all the settings, where by help is found by issuing the command. e.g. /help dcc would bring up information on the dcc commmand.&lt;br /&gt;
&lt;br /&gt;
Window management&lt;br /&gt;
&lt;br /&gt;
/WINDOW NEW , splits the screen in half&lt;br /&gt;
this new window will have a number assigned to it, to access just type alt 4, if the window is number 4.&lt;br /&gt;
/WINDOW CLOSE   , this closes the current window.&lt;br /&gt;
/WINDOW BALANCE , this i am constantly using to keep the windows the same size.&lt;br /&gt;
/window name hilight, whenever someone types your name in the channel, the line is highlighted in another colour.&lt;br /&gt;
&lt;br /&gt;
Don't forget to run the /save command, so that next time irssi loads, all the windows will be there.&lt;br /&gt;
&lt;br /&gt;
SET term_force_colors ON, is a very useful command, as certain xterms need this to display the colours correctly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Tutorials]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3278</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3278"/>
		<updated>2021-09-23T13:51:47Z</updated>

		<summary type="html">&lt;p&gt;Erik: Freenode is dead.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on [ircs://irc.libera.chat:6697 Libera Chat]. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Libera Chat ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3277</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3277"/>
		<updated>2021-09-23T13:46:22Z</updated>

		<summary type="html">&lt;p&gt;Erik: Update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.36.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:46, 23 September 2021 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User_talk:Erik&amp;diff=3253</id>
		<title>User talk:Erik</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User_talk:Erik&amp;diff=3253"/>
		<updated>2021-03-08T13:39:05Z</updated>

		<summary type="html">&lt;p&gt;Erik: reply&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is it possible you could make available the wiki logo image so people (such as me) could link to it graphically from their public homepages?--[[User:Dchmelik|Dchmelik]] ([[User talk:Dchmelik|talk]]) 00:01, 8 March 2021 (UTC)&lt;br /&gt;
: The logo URL is [https://slackwiki.com/images/logo.png https://slackwiki.com/images/logo.png] --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 13:39, 8 March 2021 (UTC)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3220</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3220"/>
		<updated>2020-03-27T02:15:34Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.31.7. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:15, 27 March 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3207</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3207"/>
		<updated>2019-06-07T17:06:12Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.31.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:06, 7 June 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3176</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3176"/>
		<updated>2018-10-27T18:42:37Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.31.1. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 18:42, 27 October 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3173</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3173"/>
		<updated>2018-06-16T17:59:02Z</updated>

		<summary type="html">&lt;p&gt;Erik: /* News */  Version update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.31.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 17:59, 16 June 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3166</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=3166"/>
		<updated>2018-03-11T20:21:30Z</updated>

		<summary type="html">&lt;p&gt;Erik: Upgraded MediaWiki&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.30.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 20:21, 11 March 2018 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=989</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=989"/>
		<updated>2017-05-12T02:00:40Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki upgraded&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.28.2. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 02:00, 12 May 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=SSL&amp;diff=988</id>
		<title>SSL</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=SSL&amp;diff=988"/>
		<updated>2017-05-09T00:44:06Z</updated>

		<summary type="html">&lt;p&gt;Erik: Info from Xesco&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Tutorials]]&lt;br /&gt;
= openSSL 0.9.8e =&lt;br /&gt;
'''IMPORTANT: Since this version has a [http://www.mail-archive.com/openssl-users@openssl.org/msg48671.html bug in the blowfish encryption] it is recommended not to use blowfish since it is incompatible with all other openSSL versions!'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Everything you read here was tested on Slackware 12&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; wikipedia says about openSSL:&lt;br /&gt;
: ''OpenSSL is an open source implementation of the SSL and TLS protocols. The core library (written in the C programming language) implements the basic cryptographic functions and provides various utility functions. Wrappers allowing the use of the OpenSSL library in a variety of computer languages are available.''&lt;br /&gt;
&lt;br /&gt;
There are many ways to use openSSL. This just covers certificates for use with httpd. You can also use easy-rsa that comes with the openVPN package and can be found in ''/usr/doc/openvpn-2.0.9/easy-rsa/''. For more information read the included ''README'' or look here: [http://openvpn.net/easyrsa.html A Guide to basic RSA Key Management].&lt;br /&gt;
Normally you will make a ''Certificate Signing Request (CSR)'' and send this one to a ''Certifying Authority (CA)'' to be signed. But since we don't wanna pay for this and only want to use it for our own special purpose, we don't need to do that and sign everything ourself.&lt;br /&gt;
&lt;br /&gt;
= openSSL + httpd =&lt;br /&gt;
Switch to ''/etc/ssl''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /etc/ssl&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this directory you should see the following listing.  One some non-Slackware linuxes, or if OpenSSL was installed from source, the appropriate directory might be ''/etc/openssl''.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
root@pecan:/etc/ssl# ls -l&lt;br /&gt;
total 24&lt;br /&gt;
drwxr-xr-x 2 root root 4096 2007-06-13 12:40 certs/&lt;br /&gt;
drwxr-xr-x 2 root root 4096 2007-06-13 12:40 misc/&lt;br /&gt;
-rw-r--r-- 1 root root 9374 2007-06-13 12:40 openssl.cnf&lt;br /&gt;
drwxr-xr-x 2 root root 4096 2007-06-13 12:40 private/&lt;br /&gt;
root@pecan:/etc/ssl# &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We need to generate a private and public RSA key file.&lt;br /&gt;
The public key is used to encrypt messages to you and is distributed with your certificate.&lt;br /&gt;
&lt;br /&gt;
== Creating a Self-Signed ''Certificate'' (CRT) ==&lt;br /&gt;
&lt;br /&gt;
=== openssl.cnf + openSSL DB ===&lt;br /&gt;
(You should still do this step even if you are buying a commercial certificate.) First things first, so we gotta edit this file, mainly the ''[ CA_default ]'' section.&lt;br /&gt;
The &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[ CA_default ]&lt;br /&gt;
&lt;br /&gt;
dir		= ./demoCA		# Where everything is kept&lt;br /&gt;
...&lt;br /&gt;
certificate	= $dir/cacert.pem 	# The CA certificate&lt;br /&gt;
...&lt;br /&gt;
crl		= $dir/crl.pem 		# The current CRL&lt;br /&gt;
private_key	= $dir/private/cakey.pem# The private key&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[ CA_default ]&lt;br /&gt;
&lt;br /&gt;
dir		= /etc/ssl		# Where everything is kept&lt;br /&gt;
...&lt;br /&gt;
certificate	= $dir/certs/ca.crt   	# The CA certificate&lt;br /&gt;
...&lt;br /&gt;
crl		= $dir/crl/ca.crl	# The current CRL&lt;br /&gt;
private_key	= $dir/private/ca.key   # The private key&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
You can even change more options in this file but be aware what you are doing.&amp;lt;br&amp;gt;&lt;br /&gt;
openSSL has a database for storing information such as ''Certificate Revocation Lists'' (CRL). Since these files don't exist on startup and we don't use the ''CA.sh'' or ''CA.pl'' scripts we got to create them ourself:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir newcerts certs crl private&lt;br /&gt;
touch serial index.txt crlnumber crl/ca.crl&lt;br /&gt;
echo 01 | tee serial | tee crlnumber | Tee crl/ca.crl&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Thanks to ''alienBOB''. Hail to tee king! :p&lt;br /&gt;
&lt;br /&gt;
=== Becoming a ''Certification Authority'' (CA) ===&lt;br /&gt;
(Skip this step if you are buying a certificate from a commercial certificate authority such as GoDaddy.) Before you can create and sign your own certificates, you first have to establish yourself as a &amp;quot;Certificate Authority&amp;quot;.&lt;br /&gt;
To do so, we first create our key file (with a public and a private key) and use it to create our &amp;quot;master certificate&amp;quot; to use when signing other certificates.&lt;br /&gt;
&lt;br /&gt;
; Generate the CA RSA Key (Triple-DES encrypted and PEM formatted)&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl genrsa -des3 -out private/ca.key 4096&amp;lt;/pre&amp;gt;&lt;br /&gt;
; Create the CA CRT with the CA RSA Key&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl req -new -x509 -days 3650 -key private/ca.key -out certs/ca.crt&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Create Server CRT ===&lt;br /&gt;
A CRT contains your RSA public key, your name, the name of the CA, and is digitally signed by the CA. Browsers that know the CA can verify the signature on that CRT, thereby obtaining your RSA public key. That enables them to send messages which only you can decrypt.&lt;br /&gt;
The next step is to create a Server RSA key, generate a ''Certificate Signing Request'' (CSR) out of it and sign it with our CA CRT to get a working SSL CRT for our server.&lt;br /&gt;
A CSR is a digital file which contains your public key and your name. Normally you would send the CSR to a CA, who will convert it into a real certificate, by signing it.&lt;br /&gt;
&lt;br /&gt;
; Generate the Server RSA Key (Triple-DES encrypted and PEM formatted)&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl genrsa -des3 -out private/server.key 1024&amp;lt;/pre&amp;gt;&lt;br /&gt;
; Create the Server CSR using the Server RSA Key&lt;br /&gt;
: '''When asked for the CommonName (CN) enter your domain!'''&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl req -new -key private/server.key -out private/server.csr&amp;lt;/pre&amp;gt;&lt;br /&gt;
; Sign the CSR with our CA CRT&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl ca -in private/server.csr -out certs/server.crt&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can now delete ''server.csr'' if you want, because it is no longer needed.&lt;br /&gt;
&lt;br /&gt;
(If you are using a commercially signed certificate from a place such as GoDaddy, do the first two commands above but not the last.  Then do ''cat private/server.csr'' to get the text of the certificate request, which you will paste into GoDaddy's web interface to get the certificate.  GoDaddy will then email the email address listed in the ''whois'' information for that domain (Make sure you haven't put in a fake address there to avoid spam!), and after the link in that email is clicked, GoDaddy will email another link to you from which you download a zip file.&lt;br /&gt;
&lt;br /&gt;
The zip file will contain two .crt files, and you should put both of them in /etc/ssl/certs.  Other commerical certificate authorities follow a very similar procedure.)&lt;br /&gt;
&lt;br /&gt;
== Setup httpd ==&lt;br /&gt;
=== Edit httpd.conf ===&lt;br /&gt;
The whole httpd config is located in ''/etc/httpd''. Fire up your preferred text editor and simply change this at Line 459:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Secure (SSL/TLS) connections&lt;br /&gt;
#Include /etc/httpd/extra/httpd-ssl.conf&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to this&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Secure (SSL/TLS) connections&lt;br /&gt;
Include /etc/httpd/extra/httpd-ssl.conf&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
to enable SSL support.&lt;br /&gt;
&lt;br /&gt;
You may also have to uncomment the line that starts ''LoadModule ssl_module''.&lt;br /&gt;
&lt;br /&gt;
=== Edit extra/httpd-ssl.conf ===&lt;br /&gt;
Now we're going into the guts of the httpd SSL config. Search for ''SSLCertificateFile'' and ''SSLCertificateKeyFile'' change the path to our newly created CRT:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
...&lt;br /&gt;
SSLCertificateFile /etc/ssl/certs/server.crt&lt;br /&gt;
...&lt;br /&gt;
SSLCertificateKeyFile /etc/ssl/private/server.key&lt;br /&gt;
...&lt;br /&gt;
SSLCertificateChainFile /etc/ssl/certs/server.crt&lt;br /&gt;
...&lt;br /&gt;
SSLCACertificatePath /etc/ssl/certs&lt;br /&gt;
SSLCACertificateFile /etc/ssl/certs/ca.crt&lt;br /&gt;
...&lt;br /&gt;
SSLCARevocationPath /etc/ssl/crl&lt;br /&gt;
SSLCARevocationFile /etc/ssl/crl/ca.crl&lt;br /&gt;
...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(If you have purchased a certificate from a commercial authority, the SSLCertificateFile will be one of the two files you receive from the CA (GoDaddy or VeriSign or whomever), and the SSLCACertificateFile will be the other.  The files will be named such that you can tell which is which -- the SSLCertificateFile will probably be something like ''www.yourdomainname.com.crt'' and the SSLCACertificateFile will be something like ''nameofca-bundle.crt''.)&lt;br /&gt;
&lt;br /&gt;
== Pass-phrase on httpd startup ==&lt;br /&gt;
The reason this dialog pops up at startup and every re-start is that the RSA private key inside your ''server.key'' file is stored in encrypted format for security reasons. The pass-phrase is needed decrypt this file, so it can be read and parsed. Removing the pass-phrase removes a layer of security from your server - proceed with caution!&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Remove the encryption from the RSA private key (while keeping a backup copy of the original file):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /etc/ssl&lt;br /&gt;
mv private/server.key private/server.key.org&lt;br /&gt;
cd private&lt;br /&gt;
openssl rsa -in server.key.org -out server.key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Make sure the server.key file is only readable by root since it is decrypted:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /etc/ssl&lt;br /&gt;
chmod 0400 private/server.key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&amp;lt;/ol&amp;gt;&lt;br /&gt;
Now server.key contains an unencrypted copy of the key. If you point your server at this file, it will not prompt you for a pass-phrase. HOWEVER, if anyone gets this key they will be able to impersonate you on the net. PLEASE make sure that the permissions on this file are such that only root or the web server user can read it (preferably get your web server to start as root but run as another user, and have the key readable only by root).&lt;br /&gt;
&lt;br /&gt;
As an alternative approach you can use the ''SSLPassPhraseDialog exec:/path/to/program'' facility. Bear in mind that this is neither more nor less secure, of course.&lt;br /&gt;
&lt;br /&gt;
== Verifying and debugging ==&lt;br /&gt;
If you simply want to see every information on a CRT:&lt;br /&gt;
&amp;lt;pre&amp;gt;openssl x509 -noout -text -in XXX.crt&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Verifying ===&lt;br /&gt;
; Verify that a private key matches its Certificate&lt;br /&gt;
: Generate a MD5 out of the public key/CRT and compare&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl x509 -noout -modulus -in private/XXX.crt | openssl md5 &amp;amp;&amp;amp; openssl rsa -noout -modulus -in private/XXX.key | openssl md5&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Debugging ===&lt;br /&gt;
; s_server - Debugging clients&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl s_server -accept 443 -www&amp;lt;/pre&amp;gt;&lt;br /&gt;
; s_client - Debugging servers&lt;br /&gt;
: &amp;lt;pre&amp;gt;openssl s_client -connect localhost:443&amp;lt;/pre&amp;gt; or &amp;lt;pre&amp;gt;openssl s_client -connect localhost:443 -state -debug&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Security ==&lt;br /&gt;
All the files expect the CRTs are only for your eyes, so we change the permissons:&lt;br /&gt;
&amp;lt;pre&amp;gt;chmod 0400 private/*.key&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Client Revokation ===&lt;br /&gt;
This is only needed if your server certificate is compromised (eg. someone hacked your server and stole your server.key).&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl ca -gencrl -keyfile private/ca.key -cert certs/ca.crt -out crl/ca.crl&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
That generated us the needed files which we use when we want to revoke a CRT.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Now that we got a compromised CRT, we got to get rid of it:&lt;br /&gt;
&amp;lt;pre&amp;gt;openssl ca -revoke certs/server.crt -keyfile private/ca.key -cert certs/ca.crt&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other ==&lt;br /&gt;
&lt;br /&gt;
=== Change the pass-phrase ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl rsa -des3 -in server.key -out server.key.new&lt;br /&gt;
mv server.key.new server.key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The first time you're asked for a PEM pass-phrase, you should enter the old pass-phrase. After that, you'll be asked again to enter a pass-phrase - this time, use the new pass-phrase. If you are asked to verify the pass-phrase, you'll need to enter the new pass-phrase a second time.&lt;br /&gt;
&lt;br /&gt;
=== CRT for Clients ===&lt;br /&gt;
Ok.. i won't write anything on this, and simply just C/P:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
openssl genrsa -des3 -out private/client1_priv.key 2048&lt;br /&gt;
openssl genrsa -des3 -out private/client2_priv.key 2048&lt;br /&gt;
# and so on... depends on how much clients you wanna serv...&lt;br /&gt;
openssl req -new -key private/client1_priv.key -out private/client1.csr&lt;br /&gt;
openssl req -new -key private/client2_priv.key -out private/client2.csr&lt;br /&gt;
# and so on...&lt;br /&gt;
openssl ca -in private/client1.csr -out private/client1.crt&lt;br /&gt;
openssl ca -in private/client2.csr -out private/client2.crt&lt;br /&gt;
cp private/client1.crt private/client1_preconv.crt &lt;br /&gt;
cat private/client1.key &amp;gt;&amp;gt; private/client1_preconv.crt&lt;br /&gt;
openssl pkcs12 -export -in private/client1_preconv.crt -out private/client1_postconv.p12 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Install in the clients browser... and change httpd.conf:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SSLCACertificateFile PATH/TO/server.crt&lt;br /&gt;
SSLVerifyClient require&lt;br /&gt;
SSLVerifyDepth 1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Convert CRT from PEM to DER format ===&lt;br /&gt;
Normally all CRTs are stored in the PEM format.&lt;br /&gt;
&amp;lt;pre&amp;gt;openssl x509 -in ca.crt -out ca.crt.der -outform DER&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Testing the CRT ==&lt;br /&gt;
If you have live web sites, you might wish to test your configuration before restarting apache, to avoid having that panicy few minutes of downtime while you scramble to see what you can do faster, fix the problem or copy back your backup configs.  Test like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;httpd -t&amp;lt;/pre&amp;gt;&lt;br /&gt;
Look at the error messages it prints out, or the error_log as explained below, if it doesn't work.&lt;br /&gt;
&lt;br /&gt;
Restart your httpd:&lt;br /&gt;
&amp;lt;pre&amp;gt;/etc/rc.d/rc.httpd restart&amp;lt;/pre&amp;gt;&lt;br /&gt;
Take a look at the httpd ''error_log'' and scroll to the end of the file:&lt;br /&gt;
&amp;lt;pre&amp;gt;jed /var/log/httpd/error_log&amp;lt;/pre&amp;gt;&lt;br /&gt;
If your getting an error like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;[error] Init: Unable to read pass phrase [Hint: key introduced or changed before restart?]&amp;lt;/pre&amp;gt;&lt;br /&gt;
... then you should take a look at ''Pass-phrase on httpd startup'' ...&lt;br /&gt;
&lt;br /&gt;
= openSSL + openVPN =&lt;br /&gt;
$foo ... maybe next month...&lt;br /&gt;
&lt;br /&gt;
= External Links =&lt;br /&gt;
* [http://httpd.apache.org/docs/2.2/ssl/ssl_faq.html SSL/TLS Strong Encryption: FAQ @ httpd.apache.org]&lt;br /&gt;
* [http://www.tc.umn.edu/~brams006/selfsign.html Creating a self-signed SSL certificate]&lt;br /&gt;
* [http://www.madboa.com/geek/openssl/ OpenSSL Command-Line HOWTO]&lt;br /&gt;
* [http://www.5dollarwhitebox.org/wiki/index.php/Howtos_Self_Signed_SSL_Certificates OpenSSL Quick Reference]&lt;br /&gt;
* [http://www.opensourcehowto.org/how-to/apache/setup-apache2-with-openssl.html Setup Apache2 with OpenSSL]&lt;br /&gt;
* [http://www.marschke.info/admin/ap_opssl_https.html Apache2, OpenSSL und HTTPS: Server- und Client-Authentifizierung mit Zertifikaten über verschlüsselte Internet-Verbindungen]&lt;br /&gt;
* [http://www.online-tutorials.net/security/openssl-tutorial/tutorials-t-69-207.html openSSL / openVPN.. comming soon]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=949</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=949"/>
		<updated>2014-10-26T23:34:54Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki upgraded&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.23.5. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 19:34, 26 October 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Multilib&amp;diff=818</id>
		<title>Multilib</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Multilib&amp;diff=818"/>
		<updated>2012-12-18T13:58:01Z</updated>

		<summary type="html">&lt;p&gt;Erik: Reverted edits by RonaldCole (talk) to last revision by Merge-delete&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There's a good tutorial (and packages) on how to set up multilib support (32-bit programs on Slackware64) at&lt;br /&gt;
[http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:multilib AlienBOB's site]. You'd do well to go there next.&lt;br /&gt;
&lt;br /&gt;
''However'', as that's not complete and clear on all points, here are some details:&lt;br /&gt;
&lt;br /&gt;
==Binary display drivers==&lt;br /&gt;
&lt;br /&gt;
You need to reinstall binary drivers. ATI and Nvidia driver packages contain both 64bit and 32bit libraries to be maximally useful on a 64bit multilib OS. However, the slackbuild scripts available at slackbuilds.org are not up to this task, so if you already installed 64-bit binary drivers from slackbuilds.org, you should remove these and then use ATI's or Nvidia's driver installer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Tutorials]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Google_Earth&amp;diff=816</id>
		<title>Google Earth</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Google_Earth&amp;diff=816"/>
		<updated>2012-12-17T15:20:26Z</updated>

		<summary type="html">&lt;p&gt;Erik: Reverted edits by Tonyguards (talk) to last revision by Erik&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Tips]]&lt;br /&gt;
&lt;br /&gt;
You can download Google Earth from http://earth.google.com/&lt;br /&gt;
&lt;br /&gt;
You have to set the .bin file that you download to be executatable, and then run it, to install.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
chmod a+x GoogleEarthLinux.bin&lt;br /&gt;
./GoogleEarthLinux.bin&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By default it installs itself in /opt/google-earth/ .  It offers to make a link from /usr/local/bin/googleearth to the right executable, I recommend allowing it to do this.&lt;br /&gt;
&lt;br /&gt;
Once it is done, to run it you just type &amp;quot;googleearth&amp;quot; in an xterm (X must be running).  You can make the appropriate desktop icon or menu item depending on what window manager you are using.&lt;br /&gt;
&lt;br /&gt;
If the splash screen shows up for some amount of time, and then all of X (the entire graphical environment) crashes (if you have graphical login set up, it will give you a login screen again, otherwise you will go back to the console), some people have found this to be solved by downloading the libGL.so library.  It should be put in the /opt/google-earth/ directory:&lt;br /&gt;
&lt;br /&gt;
(as root)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /opt/google-earth/&lt;br /&gt;
wget http://librarian.launchpad.net/7037027/libGL.so.1 -O libGL.so.1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some places on the web also refer to downloading it from http://www.ground-impact.com/libGL.so.1.2 .  Here are links to a few discussions of the issue:&lt;br /&gt;
&lt;br /&gt;
http://www.linuxquestions.org/questions/slackware-14/google-earth-crashes-x-598569/?s=3ff14bc2cdec277267c5547b7dee84d9&lt;br /&gt;
http://forum.mandriva.com/viewtopic.php?t=71691&amp;amp;highlight=googleearth&lt;br /&gt;
&lt;br /&gt;
'''Performance Issue with Google Earth:'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
if google earth is slow in slackware Linux, check whether DRI is enabled or not, if Direct Rendering is enabled then&lt;br /&gt;
disable &amp;quot;Atmosphere&amp;quot; effect from View menu -&amp;gt; [x] Atmosphere for smoother functioning of the graphics in Google Earth window.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=704</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Main_Page&amp;diff=704"/>
		<updated>2012-06-01T04:30:56Z</updated>

		<summary type="html">&lt;p&gt;Erik: MediaWiki Upgrade&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to slackwiki! Feel free to [[Special:Userlogin|Create an account or log in]] and edit any of the pages, or add your own (see [http://meta.wikimedia.org/wiki/Help:Starting_a_new_page Starting A New Page]). Come talk to some of us in ##slackware on irc.freenode.net. When saving changes, please provide a brief summary of your changes in the box provided - it's nice for those sad people who follow [[Special:Recentchanges|RecentChanges]] via RSS. Any questions about the wiki? See the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User's Guide].&lt;br /&gt;
&lt;br /&gt;
==Main Sections==&lt;br /&gt;
Please [[Special:Userlogin|LOG IN]] before adding/editing pages.&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Information|Information]]&lt;br /&gt;
* [[:Category:Tutorials|Tutorials]]&lt;br /&gt;
* [[:Category:Tips|Tips]]&lt;br /&gt;
* [[:Category:Security|Security]]&lt;br /&gt;
* [[:Category:Hardware|Hardware]]&lt;br /&gt;
* [[Links]]&lt;br /&gt;
&amp;lt;hr style=&amp;quot;width:20em&amp;quot;/&amp;gt;&lt;br /&gt;
* [[The Regulars|Regulars of Freenode ##slackware]]&lt;br /&gt;
* [[Contest|Logo Contest]] (Finished)&lt;br /&gt;
&lt;br /&gt;
==Thanks==&lt;br /&gt;
* '''Anyone who contributes to the wiki :)'''&lt;br /&gt;
&lt;br /&gt;
==News==&lt;br /&gt;
MediaWiki was upgraded to 1.19.0. --[[User:Erik|Erik]] ([[User talk:Erik|talk]]) 00:30, 1 June 2012 (EDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.18.0. --[[User:Erik|Erik]] 03:44, 17 December 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.16.2. --[[User:Erik|Erik]] 18:53, 1 February 2011 (EST) | Patched to 1.16.5. --[[User:Erik|Erik]] 17:55, 13 June 2011 (CDT)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.16.1. --[[User:Erik|Erik]] 11:43, 5 January 2011 (CST)&lt;br /&gt;
&lt;br /&gt;
Patched to 1.15.3. --[[User:Erik|Erik]] 09:33, 7 April 2010 (UTC) | Patched to 1.15.4. --[[User:Erik|Erik]] 08:31, 30 May 2010 (UTC)&lt;br /&gt;
| Patched to 1.15.5. --[[User:Erik|Erik]] 23:12, 28 July 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.15.2. --[[User:Erik|Erik]] 00:25, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sorry for the temporary downtime - we forgot to renew the domain name registration.   --[[User:rworkman|rworkman]] 0006, 3 November 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
There has been a reset of the wiki. The database was corrupted. A few pages, all Talk/Discussion pages and all user accounts were lost. --[[User:Erik|Erik]] 23:44, 6 June 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
MediaWiki was upgraded to 1.14.0 --[[User:Erik|Erik]] 16:49, 16 March 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
We've moved! We're now hosted by [http://onyxlight.net/ http://onyxlight.net/] with an upgrade to MediaWiki 1.6.6 and&lt;br /&gt;
spambot prevention in place. --[[User:Erik|Erik]] 11:33, 22 May 2006 (GMT)&lt;br /&gt;
&lt;br /&gt;
The contest has been won by [[User:Marcus|Marcus]]. Admire the logo :) --[[User:FredEmmott|FredEmmott]] 12:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Updated SlackWiki to MediaWiki 1.4.7 --[[User:FredEmmott|FredEmmott]] 12:01, 21 Jul 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're now sharing [http://cardinal.lizella.net cardinal.lizella.net] with several other Slackware projects such as [http://www.slacksec.org SlackSec], the [http://www.slackbook.org Slackware Book Project], and [http://www.slamd64.com Slamd64]. Hopefully this will mean a more reliable and faster wiki --[[User:FredEmmott|FredEmmott]] 19:42, 2 May 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
We're back onto my little UML temporarily, but I've finally judged the contest,&lt;br /&gt;
congratulations to [[User:Marcus|Marcus]]. Next artwork contest comming soon, please use the [[Talk:Main_Page|main talk page]] for suggestions on more technical contests --[[User:FredEmmott|FredEmmott]] 18:36, 24 Feb 2005 (GMT)&lt;br /&gt;
&lt;br /&gt;
Thanks to RackSpace and Michael Shuler - they've generously donated a dedicated server to http://www.slacksec.org, which slackwiki is sharing --[[User:FredEmmott|FredEmmott]] 15:06, 1 Dec 2004 (CST)&lt;br /&gt;
&lt;br /&gt;
We are now sharing this server with http://www.slacksec.info - security updates in Pat's absence --[[User:FredEmmott|FredEmmott]] 22:22, 19 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
We should not have as many problems with server now - I have no choice but to run debian on this server, and apparantly they missed backporting a security patch, so it's now on traditional non-debianified apache 1.3.33 :) --[[User:FredEmmott|FredEmmott]] 18:03, 2 Nov 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Please feel free to bring our old pages over from [http://slackwiki.org/old/index.php?pagename=HomePage the old site] --[[User:FredEmmott|FredEmmott]] 21:23, 31 Oct 2004 (GMT)&lt;br /&gt;
&lt;br /&gt;
Swapped wiki software again because PHPWiki is too buggy --[[User:FredEmmott|FredEmmott]] 21:11, 31 Oct 2004 (GMT)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Chromium_browser&amp;diff=663</id>
		<title>Chromium browser</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Chromium_browser&amp;diff=663"/>
		<updated>2012-03-29T14:08:01Z</updated>

		<summary type="html">&lt;p&gt;Erik: Reverted edits by Perlna (talk) to last revision by Klickback&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Tutorials]]&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Chromium is an open source web browser from Google. It is based on the WebKit rendering engine and is the upstream project for Google's popular Chrome Web Browser.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that Chromium is the '''testing''' branch of the Chrome web browser, and is not recommended for mission-critical systems. Consider using [http://www.google.com/chrome Google Chrome] or [http://www.mozilla.org/en-US/firefox/ Mozilla Firefox] for production systems.&lt;br /&gt;
&lt;br /&gt;
=== Use Case ===&lt;br /&gt;
&lt;br /&gt;
This tutorial explains how to install the latest Chromium build on Slackware and automate the process of updating it regularly. It is aimed at users on a personal desktop or laptop, especially on a single-user system.&lt;br /&gt;
&lt;br /&gt;
While the [http://slackbuilds.org slackbuilds.org] project provides excellent quality build scripts for Chromium, downloading 140MB+ source code and doing compilations that often take more than a couple of hours to complete is generally not feasible for people with laptops, slower computers or slow internet connections.&lt;br /&gt;
&lt;br /&gt;
Therefore, this guide aims on how to automate the process of installing and updating Chromium using daily binary builds that are much smaller in size and take up negligible resources for the install and update process, thus helping the user always run the latest and greatest builds without the hassle of downloading and compiling the source code.&lt;br /&gt;
&lt;br /&gt;
== Getting started ==&lt;br /&gt;
&lt;br /&gt;
Chromium depends on &amp;lt;code&amp;gt;GConf&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;ORBit2&amp;lt;/code&amp;gt;, and these should be installed first. Newer versions may also need the PAM library.&lt;br /&gt;
&lt;br /&gt;
=== Slackware 13.37 ===&lt;br /&gt;
&lt;br /&gt;
The above mentioned dependencies are included in the '''extra/''' tree of Slackware 13.37, so these can be simply installed by :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# slackpkg install GConf ORBit2 google-chrome-pam-solibs&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slackware 13.1 ===&lt;br /&gt;
&lt;br /&gt;
GConf and ORBit2 are availabe at the [http://slackbuilds.org slackbuilds.org] repository. These can be installed manually or using [http://sbopkg.org Sbopkg] :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# sbopkg -i 'ORBit2 GConf'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Get the &amp;lt;code&amp;gt;google-chrome-pam-solibs&amp;lt;/code&amp;gt; package [http://slackware.osuosl.org/slackware-13.37/extra/google-chrome/google-chrome-pam-solibs-1.1.3-i486-1.txz 32-bit] [http://slackware.osuosl.org/slackware64-13.37/extra/google-chrome/google-chrome-pam-solibs-1.1.3-x86_64-1.txz 64-bit] and install it :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# installpkg ./google-chrome-pam-solibs-1.1.3-x86_64-1.txz&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Getting and installing the latest Chromium build ==&lt;br /&gt;
&lt;br /&gt;
Google maintains a repository of daily chromium builds that you can get from [http://commondatastorage.googleapis.com/chromium-browser-continuous/index.html?path=Linux/ here] (32bit) or [http://commondatastorage.googleapis.com/chromium-browser-continuous/index.html?path=Linux_x64/ here] for 64 bit. Scroll down to the bottom and navigate to the latest build directory, and download the 'chrome-linux.zip' file there.&lt;br /&gt;
&lt;br /&gt;
Extract the zip file to a place of your liking (I like to keep mine in /home/username/soft), and run the 'chrome-wrapper' binary that will run Chromium and also generate a 'chromium-dev.desktop' file in /home/user/.local/share/applications/ and a Chromium entry will appear in your KDE or Xfce menu. Copy that file to your desktop if you prefer a desktop shortcut.&lt;br /&gt;
&lt;br /&gt;
To upgrade Chromium, just download the latest zip file and extract it where you previously did, overwriting the previous files.&lt;br /&gt;
&lt;br /&gt;
== Automating the Process ==&lt;br /&gt;
&lt;br /&gt;
The following script helps to automate the process of installing and upgrading Chromium. Edit the &amp;lt;code&amp;gt;INSTALLDIR&amp;lt;/code&amp;gt; variable to your liking - that is the place where chromium will be installed. Its recommended to keep it in a folder in your home directory to make it easy to manage. make sure the folder exists before running the script, or the script will fail.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
# Installation directory - change this to a directory of your choice&lt;br /&gt;
# Please make sure the directory exists first, or the script won't work&lt;br /&gt;
INSTALLDIR=$HOME/soft&lt;br /&gt;
&lt;br /&gt;
# Determine the architecture of the machine in use and set variables accordingly&lt;br /&gt;
if [ -z &amp;quot;$ARCH&amp;quot; ]; then&lt;br /&gt;
  case &amp;quot;$( uname -m )&amp;quot; in&lt;br /&gt;
    i686) ARCH=i686 ;;&lt;br /&gt;
       *) ARCH=$( uname -m ) ;;&lt;br /&gt;
  esac&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
if [ &amp;quot;$ARCH&amp;quot; = &amp;quot;i686&amp;quot; ];then&lt;br /&gt;
  DIRSUFFIX=&amp;quot;&amp;quot;&lt;br /&gt;
elif [ &amp;quot;$ARCH&amp;quot; = &amp;quot;x86_64&amp;quot; ]; then&lt;br /&gt;
  DIRSUFFIX=&amp;quot;_x64&amp;quot;&lt;br /&gt;
else&lt;br /&gt;
  echo &amp;quot;The ARCH should be either i686 or x86_64. Exiting.&amp;quot;&lt;br /&gt;
  exit&lt;br /&gt;
fi&lt;br /&gt;
&lt;br /&gt;
# Determine the build number of the latest build&lt;br /&gt;
LATESTBUILD=$(curl http://commondatastorage.googleapis.com/chromium-browser-continuous/Linux/LAST_CHANGE)&lt;br /&gt;
&lt;br /&gt;
# The URL to download from&lt;br /&gt;
CHROMEURL=&amp;quot;http://commondatastorage.googleapis.com/chromium-browser-continuous/Linux&amp;quot;$DIRSUFFIX/$LATESTBUILD/&amp;quot;chrome-linux.zip&amp;quot;&lt;br /&gt;
&lt;br /&gt;
cd $INSTALLDIR&lt;br /&gt;
if [ -e chrome-linux.zip ]; then                    # Check to see if `chrome-linux.zip` already exists&lt;br /&gt;
        mv chrome-linux.zip chrome-linux.zip.old    # if it does, rename it to chrome-linux.zip.old as backup&lt;br /&gt;
fi                                                  # in case the current build has problems&lt;br /&gt;
wget -O chrome-linux.zip $CHROMEURL&lt;br /&gt;
unzip -u -o ./chrome-linux.zip&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To automate the process, first save the script as '''chromium-update.sh''' and add it to your users's cron jobs. Here is an example on how to set it up :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ cd $HOME&lt;br /&gt;
$ mkdir .cron&lt;br /&gt;
$ cp ./chromium-update.sh ./.cron/&lt;br /&gt;
$ chmod a+x ./.cron/chromium-update.sh&lt;br /&gt;
$ crontab -e&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add the following to your crontab :&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Run daily cron job at 13:20 every day:&lt;br /&gt;
20 13 * * * ~/.cron/chromium-update.sh 1&amp;gt; /dev/null&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This will run the script at 13:20 every day. See &amp;lt;code&amp;gt;man crontab&amp;lt;/code&amp;gt; for more on how to customize your cron jobs.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
[http://www.chromium.org/Home Chromium home page]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Chromium_(web_browser)#Differences_from_Google_Chrome Differences from Google Chrome]&lt;br /&gt;
&lt;br /&gt;
[https://wiki.archlinux.org/index.php/Chromium#Configuration Tips on configuration and customization from Archwiki]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Third_Party_Package_Managers&amp;diff=659</id>
		<title>Third Party Package Managers</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Third_Party_Package_Managers&amp;diff=659"/>
		<updated>2012-03-17T18:24:51Z</updated>

		<summary type="html">&lt;p&gt;Erik: Reverted edits by Vegasseo (talk) to last revision by Erik&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Purpose =&lt;br /&gt;
&lt;br /&gt;
The mere mention of third party package managers (such as [http://software.jaos.org/#slapt-get slapt-get] and [http://swaret.sourceforge.net/ swaret]) often results in a quick admonishment from Slackware users, and unfortunately, the only reason given in most cases is something along the lines of &amp;quot;they'll break your system.&amp;quot;  This leaves users in a state of confusion, as the respective web sites of these third party tools tout them as an improvement.  The purpose of this page is to explain why and how these tools will often result in system breakage.&lt;br /&gt;
&lt;br /&gt;
= Overview of Slackware's Native Package Tools =&lt;br /&gt;
&lt;br /&gt;
Slackware's native package management utilities (&amp;lt;tt&amp;gt;pkgtool(8)&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;installpkg(8)&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;removepkg(8)&amp;lt;/tt&amp;gt;, and &amp;lt;tt&amp;gt;upgradepkg(8)&amp;lt;/tt&amp;gt;) do not support any form of dependency checking.  A Slackware package is essentially a compressed tarball of the files associated with an application, a file containing a short description of the application (&amp;lt;tt&amp;gt;./install/slack-desc&amp;lt;/tt&amp;gt;), and a script that performs some essential post-installation tasks (&amp;lt;tt&amp;gt;./install/doinst.sh&amp;lt;/tt&amp;gt;).  Installing a Slackware package simply copies those files to the filesystem and then executes the post-install script, while removing the package removes the files and reverses the post-install script.  As result, there is no guarantee that libraries and other files needed by a particular package are already present on the system when that particular package is installed.&lt;br /&gt;
&lt;br /&gt;
= Overview of Selected Third Party Tools =&lt;br /&gt;
&lt;br /&gt;
As stated above, Slackware's native package management suite neither has nor supports dependency resolution.  Because the third-party add-ons all use Slackware's native package tools, they are bound by this same limitation, at least to some extent, but some of them try to mitigate this in various ways; the following is an overview.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== swaret ==&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
&lt;br /&gt;
Swaret makes use of an unofficial file that tries to list all package dependencies based on output of &amp;lt;tt&amp;gt;ldd(1)&amp;lt;/tt&amp;gt;.  The idea is that by running &amp;lt;tt&amp;gt;ldd(1)&amp;lt;/tt&amp;gt; on some binary or shared object, you can see what that file is linked to, and then see what package(s) contain those files, and then install those packages.  &lt;br /&gt;
&lt;br /&gt;
=== Potential Problems ===&lt;br /&gt;
&lt;br /&gt;
Since some library developers don't see the need to update their shared object version strings when making changes that are incompatible with the previous release, it's easy to need a newer release of some package but for swaret to not be able to determine this.&lt;br /&gt;
Since swaret is meant for upgrading packages, it will fail to roll back a package's version number if this occurs in the upstream Slackware tree for some reason.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== slapt-get ==&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
&lt;br /&gt;
Slapt-get makes use of additional files (&amp;lt;tt&amp;gt;slack-required&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;slack-suggests&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;slack-conflicts&amp;lt;/tt&amp;gt;) inside a Slackware package.  Essentially, if a package is listed in &amp;lt;tt&amp;gt;slack-required&amp;lt;/tt&amp;gt;, then slapt-get will install or upgrade it first; if a package is listed in &amp;lt;tt&amp;gt;slack-conflicts&amp;lt;/tt&amp;gt;, then slapt-get will remove it first; if a package is listed in &amp;lt;tt&amp;gt;slack-suggests&amp;lt;/tt&amp;gt;, then slapt-get will offer to install it in addition to the packages noted in &amp;lt;tt&amp;gt;slack-required&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Potential Problems ===&lt;br /&gt;
&lt;br /&gt;
Since official Slackware packages do not have the &amp;lt;tt&amp;gt;slack-required&amp;lt;/tt&amp;gt; and other files needed for slapt-get to determine dependencies, it is not able to resolve dependencies for them.  Therefore, slapt-get's perceived usefulness is in keeping unofficial third-party packages (or at least those which do contain the necessary files) up to date.  See the discussion below for more information on unofficial third-party packages.&lt;br /&gt;
Also, slapt-get, like swaret, will not &amp;quot;downgrade&amp;quot; a package to a previous version if it occurs in the upstream Slackware tree.&lt;br /&gt;
&lt;br /&gt;
== sbopkg ==&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
&lt;br /&gt;
[http://www.sbopkg.org/ SBopkg] is a tool for automating the download, compile and package build for SBo projects hosted in the [http://www.slackbuilds.org SlackBuilds.org ] repository.  SBo packages are reviewed by team members for completeness as well as applicability to each Slackware release.  SBo package documentation includes information regarding dependencies.&lt;br /&gt;
&lt;br /&gt;
= Third Party (Unofficial) Packages =&lt;br /&gt;
&lt;br /&gt;
This subject can elicit opinions just as strong as the topic of third-party package managers, and there are knowledgeable people on both sides of the issue.  Third party packages can obviously present a security risk, as there's no way to know what's really in them, but for the average user, there are (amazingly enough) bigger concerns.  On one hand, the user wants a package of some application that's not included with Slackware, but he doesn't want it to create other problems.  Oftentimes, third party packages are not built on &amp;quot;clean&amp;quot; systems -- that is, the computer on which they're built has quite a few other non-official packages installed -- so the resulting package needs those other things to work properly.  If the packager doesn't make note of all the different packages that this one depends on, the user installs it only to find that it still doesn't work.  Even worse, those other dependencies are often not even necessary if the package is built on a clean system - if the other package had not been present, the new one obviously wouldn't have linked against it.  &lt;br /&gt;
Installing third party packages from two different packagers can cause problems.  Package A might depend on Package B, which depends on Package C and optionally Package D.  If the person who built Package B only linked it against Package C (not D), but the Package A expects Package B to have both Package C and Package D dependencies, then Package A may not work, even though you (think you) have everything it needs installed.&lt;br /&gt;
Another frequent problem with third party packages is encountered by replacing stock (official) packages with unofficial ones.  In addition to the library version issues mentioned in the swaret discussion, newer package versions often require newer versions of other packages, which might require newer versions of still other packages, and before you know it, you have replaced a sizable portion of the official Slackware packages.  If/when something breaks, you will find it very difficult to find someone willing to help you, as there's no way to know how much effect the unofficial packages are having.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Slackware -current =&lt;br /&gt;
&lt;br /&gt;
Slackware -current is *not* a stable release of Slackware.  It is intended for advanced users who are familiar with how Slackware works to test (and report success/failure, find and fix bugs, etcetera) the new packages leading to the next stable release of Slackware.  Packages are constantly being added, removed, split up, merged, and otherwise mangled, and third party package managers (swaret/slapt-get/et al) should not be expected to know how to deal with this.  If you use one of those tools while trying to run Slackware -current and you don't understand how they work and their limitations, you *will* break your system and you will *not* have much luck finding someone who is sympathetic.  You have been warned.&lt;br /&gt;
&lt;br /&gt;
You may be wondering why these tools have trouble with -current.  I won't even attempt to detail all of the potential issues, but here are a couple:&lt;br /&gt;
1. When upgrading to -current with one of these tools, the package sets are upgraded in alphabetical order (and the packages therein also in alphabetical order).  This means that a/bash will be upgraded before a/glibc-solibs.  If bash has been recompiled against newer glibc, and you upgrade to that new version, it will promptly stop working due to the fact that the needed version of glibc has not been upgraded yet; at that point, you are stuck with a &amp;quot;chicken and egg&amp;quot; problem.&lt;br /&gt;
2. Third party package tools will not install *new* packages that have been added in Slackware -current.  This is not a bug - it's a feature; if you purposefully didn't install something, then you don't want your automatic package updater reinstalling it.  However, when a package depends on something else that has been added or split out of an existing package, and your add-on package manager upgrades the existing package but doesn't install the added one, then the (upgraded) existing package will not work any more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Solutions and Suggestions =&lt;br /&gt;
&lt;br /&gt;
For upgrading to Slackware -current, there is only *one* supported method: &amp;lt;tt&amp;gt;UPGRADE.TXT&amp;lt;/tt&amp;gt;  --  you can find this file on any Slackware mirror.  Note that this is also the only supported method to upgrade from one stable release of Slackware to another.&lt;br /&gt;
&lt;br /&gt;
For keeping up to date on post-release patches added to a stable release of Slackware, you will *usually* be okay to use one of the third party package managers.  You should still read the &amp;lt;tt&amp;gt;ChangeLog.txt&amp;lt;/tt&amp;gt; before doing any upgrades, though, as new packages are occasionally added in /patches when circumstances require it.&lt;br /&gt;
&lt;br /&gt;
For software not included in official Slackware, consider building it yourself or using a SlackBuild script from one of the projects which provides them.&lt;br /&gt;
&lt;br /&gt;
One of the regular Slackware contributors, PiterPUNK, wrote and maintains a third-party package manager that minimizes all of the risks mentioned above.  [http://slackpkg.org Slackpkg] does not support downloading or installing unofficial packages, and it has provisions to install any added packages and uninstall any removed packages as well as the normal install/upgrade/remove routines.&lt;br /&gt;
&lt;br /&gt;
Another third party package manager that promotes good practices is [http://slackroll.sourceforge.net/ SlackRoll] (see [[SlackRoll Tutorial|tutorial]]). Its philosophy is similar to that of Slackpkg but it is not included as part of Slackware. Programmed in Python, it is faster, has more features and detects more events from Slackware -current. However, the initial setup and workflow are a bit more complex.&lt;br /&gt;
&lt;br /&gt;
= See Also =&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;tt&amp;gt;pkgtool(8)&amp;lt;/tt&amp;gt; -- man 8 pkgtool&lt;br /&gt;
* &amp;lt;tt&amp;gt;installpkg(8)&amp;lt;/tt&amp;gt; -- man 8 installpkg&lt;br /&gt;
* &amp;lt;tt&amp;gt;removepkg(8)&amp;lt;/tt&amp;gt; -- man 8 removepkg&lt;br /&gt;
* &amp;lt;tt&amp;gt;upgradepkg(8)&amp;lt;/tt&amp;gt; -- man 8 upgradepkg&lt;br /&gt;
* &amp;lt;tt&amp;gt;makepkg(8)&amp;lt;/tt&amp;gt; -- man 8 makepkg&lt;br /&gt;
* &amp;lt;tt&amp;gt;explodepkg(8)&amp;lt;/tt&amp;gt; -- man 8 explodepkg&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= TODO =&lt;br /&gt;
&lt;br /&gt;
* Add links to other wiki pages that are related to this topic (add to &amp;quot;See Also&amp;quot; above)&lt;br /&gt;
* Add hyperlinks to slapt-get, swaret, and other projects mentioned on this page&lt;br /&gt;
* Others?&lt;br /&gt;
&lt;br /&gt;
[[Category:Information]]&lt;br /&gt;
[[Category:Tutorials]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=653</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=653"/>
		<updated>2012-02-10T14:30:07Z</updated>

		<summary type="html">&lt;p&gt;Erik: mozilla-* up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] (PRNG weakness) affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.&lt;br /&gt;
&lt;br /&gt;
=== curl ===&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124.html CVE-2012-0036] (Execute Code) affected: current, and all before ====&lt;br /&gt;
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.&lt;br /&gt;
&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124B.html CVE-2011-3389] (man-in-the-middle attacks) affected: current, 13.37 ====&lt;br /&gt;
curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=652</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=652"/>
		<updated>2012-02-10T14:29:23Z</updated>

		<summary type="html">&lt;p&gt;Erik: php up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] (PRNG weakness) affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.&lt;br /&gt;
&lt;br /&gt;
=== curl ===&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124.html CVE-2012-0036] (Execute Code) affected: current, and all before ====&lt;br /&gt;
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.&lt;br /&gt;
&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124B.html CVE-2011-3389] (man-in-the-middle attacks) affected: current, 13.37 ====&lt;br /&gt;
curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;br /&gt;
&lt;br /&gt;
=== mozilla-firefox (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Firefox 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== mozilla-thunderbird (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Thunderbird 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== seamonkey (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.6, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in SeaMonkey 2.6:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=651</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=651"/>
		<updated>2012-02-10T14:28:47Z</updated>

		<summary type="html">&lt;p&gt;Erik: proftpd up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] (PRNG weakness) affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.&lt;br /&gt;
&lt;br /&gt;
=== curl ===&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124.html CVE-2012-0036] (Execute Code) affected: current, and all before ====&lt;br /&gt;
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.&lt;br /&gt;
&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124B.html CVE-2011-3389] (man-in-the-middle attacks) affected: current, 13.37 ====&lt;br /&gt;
curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;br /&gt;
&lt;br /&gt;
=== mozilla-firefox (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Firefox 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== mozilla-thunderbird (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Thunderbird 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== seamonkey (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.6, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in SeaMonkey 2.6:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=650</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=650"/>
		<updated>2012-02-10T14:28:17Z</updated>

		<summary type="html">&lt;p&gt;Erik: httpd up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] (PRNG weakness) affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code) affected: current, 13.37, and all before ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.&lt;br /&gt;
&lt;br /&gt;
=== curl ===&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124.html CVE-2012-0036] (Execute Code) affected: current, and all before ====&lt;br /&gt;
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.&lt;br /&gt;
&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124B.html CVE-2011-3389] (man-in-the-middle attacks) affected: current, 13.37 ====&lt;br /&gt;
curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;br /&gt;
&lt;br /&gt;
=== mozilla-firefox (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Firefox 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== mozilla-thunderbird (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Thunderbird 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== seamonkey (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.6, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in SeaMonkey 2.6:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=649</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=649"/>
		<updated>2012-02-04T02:34:56Z</updated>

		<summary type="html">&lt;p&gt;Erik: freetype2 up to date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] (PRNG weakness) affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] affected: current, 13.37 and all before ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code) affected: current, 13.37, and all before ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.&lt;br /&gt;
&lt;br /&gt;
=== curl ===&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124.html CVE-2012-0036] (Execute Code) affected: current, and all before ====&lt;br /&gt;
curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs.&lt;br /&gt;
&lt;br /&gt;
==== [http://curl.haxx.se/docs/adv_20120124B.html CVE-2011-3389] (man-in-the-middle attacks) affected: current, 13.37 ====&lt;br /&gt;
curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;br /&gt;
&lt;br /&gt;
=== mozilla-firefox (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Firefox 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== mozilla-thunderbird (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html#thunderbird9, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in Thunderbird 9:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;br /&gt;
&lt;br /&gt;
=== seamonkey (various issues, all versions impacted) ===&lt;br /&gt;
From http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html#seamonkey2.6, at LEAST:&lt;br /&gt;
&lt;br /&gt;
Fixed in SeaMonkey 2.6:&lt;br /&gt;
*MFSA 2011-58 Crash scaling &amp;lt;video&amp;gt; to extreme sizes&lt;br /&gt;
*MFSA 2011-57 Crash when plugin removes itself on Mac OS X&lt;br /&gt;
*MFSA 2011-56 Key detection without JavaScript via SVG animation&lt;br /&gt;
*MFSA 2011-55 nsSVGValue out-of-bounds access&lt;br /&gt;
*MFSA 2011-54 Potentially exploitable crash in the YARR regular expression library&lt;br /&gt;
*MFSA 2011-53 Miscellaneous memory safety hazards (rv:9.0)&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=640</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=640"/>
		<updated>2012-01-30T22:58:14Z</updated>

		<summary type="html">&lt;p&gt;Erik: minor changes for consistency&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected: current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705] affected: current, 13.37 and all before ====&lt;br /&gt;
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188] (Denial Of Service, Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an &amp;quot;integer truncation issue.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected: current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges) affected: current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] affected: current, 13.37 and all before ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected: current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619] (Denial Of Service) affected: current, 13.37, and all before ====&lt;br /&gt;
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576] (Obtain Information) affected: current, 13.37, and all before ====&lt;br /&gt;
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109] affected: current, 13.37 through 11.0 ====&lt;br /&gt;
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108] affected: current, 13.37, and all before ====&lt;br /&gt;
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210] (Denial Of Service) affected: current, 13.37 through 11.0 ====&lt;br /&gt;
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code) affected: current, 13.37, and all before ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected: current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected: current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected: current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=637</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=637"/>
		<updated>2012-01-30T19:26:27Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected : current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected : current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576] (Obtain Information) affected : current, 13.37, and all before ====&lt;br /&gt;
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109] affected : current, 13.37 through 11.0 ====&lt;br /&gt;
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108] affected : current, 13.37, and all before ====&lt;br /&gt;
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210] (Denial Of Service) affected : current, 13.37 through 11.0 ====&lt;br /&gt;
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current, 13.37 through 12.0 ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=636</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=636"/>
		<updated>2012-01-30T19:04:49Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (Denial Of Service, Overflow, Memory corruption) affected : current, 13.37 through 10.0 ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected : current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576] (Obtain Information) affected : current, 13.37, and all before ====&lt;br /&gt;
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109] affected : current, 13.37 through 11.0 ====&lt;br /&gt;
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108] affected : current, 13.37, and all before ====&lt;br /&gt;
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210] (Denial Of Service) affected : current, 13.37 through 11.0 ====&lt;br /&gt;
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=635</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=635"/>
		<updated>2012-01-30T18:59:23Z</updated>

		<summary type="html">&lt;p&gt;Erik: added dhcp details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539] (Denial Of Service) affected : current, 13.37, 13.1 ====&lt;br /&gt;
dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576] (Obtain Information) affected : current, 13.37, and all before ====&lt;br /&gt;
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109] affected : current, 13.37 through 11.0 ====&lt;br /&gt;
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108] affected : current, 13.37, and all before ====&lt;br /&gt;
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210] (Denial Of Service) affected : current, 13.37 through 11.0 ====&lt;br /&gt;
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=634</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=634"/>
		<updated>2012-01-30T18:43:53Z</updated>

		<summary type="html">&lt;p&gt;Erik: added openssl details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619] (Denial Of Service) affected : current, 13.37, and all before ====&lt;br /&gt;
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576] (Obtain Information) affected : current, 13.37, and all before ====&lt;br /&gt;
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109] affected : current, 13.37 through 11.0 ====&lt;br /&gt;
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108] affected : current, 13.37, and all before ====&lt;br /&gt;
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210] (Denial Of Service) affected : current, 13.37 through 11.0 ====&lt;br /&gt;
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=633</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=633"/>
		<updated>2012-01-30T18:25:18Z</updated>

		<summary type="html">&lt;p&gt;Erik: added t1lib details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764] (Execute Code) affected : current, 13.37 and all before ====&lt;br /&gt;
t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6 and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210]&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=632</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=632"/>
		<updated>2012-01-30T18:15:00Z</updated>

		<summary type="html">&lt;p&gt;Erik: added cups details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896] (Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895. &lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== k ==&lt;br /&gt;
=== kernel ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764]&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210]&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=631</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=631"/>
		<updated>2012-01-30T18:07:24Z</updated>

		<summary type="html">&lt;p&gt;Erik: added libxml2 details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== linux ===&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896]&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764]&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944] (Denial Of Service, Execute Code, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions. &lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210]&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=630</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=630"/>
		<updated>2012-01-30T18:04:41Z</updated>

		<summary type="html">&lt;p&gt;Erik: added freetype2 details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== linux ===&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896]&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764]&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226] (Denial Of Service, Execute Code, Memory corruption) affected : current, 13.37 and all before ====&lt;br /&gt;
Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944]&lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210]&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=629</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=629"/>
		<updated>2012-01-30T18:00:36Z</updated>

		<summary type="html">&lt;p&gt;Erik: make more CVEs into links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
=== linux ===&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
=== cups ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3170 CVE-2011-3170]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2896 CVE-2011-2896]&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2939 CVE-2011-2939] (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2705 CVE-2011-2705]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1004 CVE-2011-1004]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0188 CVE-2011-0188]&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
=== emacs ===&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
=== t1lib ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1554 CVE-2011-1554]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1553 CVE-2011-1553]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1552 CVE-2011-1552]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0764 CVE-2011-0764]&lt;br /&gt;
&lt;br /&gt;
=== freetype2 ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-0226 CVE-2011-0226]&lt;br /&gt;
&lt;br /&gt;
=== libxml2 ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-1944 CVE-2011-1944]&lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4868 CVE-2011-4868]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4539 CVE-2011-4539]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2749 CVE-2011-2749]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-2748 CVE-2011-2748]&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2012-0027 CVE-2012-0027]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4619 CVE-2011-4619]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4576 CVE-2011-4576]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4109 CVE-2011-4109]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-4108 CVE-2011-4108]&lt;br /&gt;
[http://cvedetails.com/cve/CVE-2011-3210 CVE-2011-3210]&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=628</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=628"/>
		<updated>2012-01-30T17:51:15Z</updated>

		<summary type="html">&lt;p&gt;Erik: seperate php CVEs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
linux&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
cups : CVE-2011-3170 CVE-2011-2896&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== CVE-2011-2939 (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
CVE-2011-2705 CVE-2011-1004 CVE-2011-0188&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
emacs&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
t1lib : CVE-2011-1554 CVE-2011-1553 CVE-2011-1552 CVE-2011-0764&lt;br /&gt;
&lt;br /&gt;
freetype2 : CVE-2011-0226&lt;br /&gt;
&lt;br /&gt;
libxml2 : CVE-2011-1944&lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
CVE-2011-4868 CVE-2011-4539 CVE-2011-2749 CVE-2011-2748&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
CVE-2012-0027 CVE-2011-4619 CVE-2011-4576 CVE-2011-4109 CVE-2011-4108 CVE-2011-3210&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4885 CVE-2011-4885] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3379 CVE-2011-3379] (Execute Code) affected : current ====&lt;br /&gt;
The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders. &lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=627</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=627"/>
		<updated>2012-01-30T17:33:01Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
linux&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
cups : CVE-2011-3170 CVE-2011-2896&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== CVE-2011-2939 (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
CVE-2011-2705 CVE-2011-1004 CVE-2011-0188&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
emacs&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
t1lib : CVE-2011-1554 CVE-2011-1553 CVE-2011-1552 CVE-2011-0764&lt;br /&gt;
&lt;br /&gt;
freetype2 : CVE-2011-0226&lt;br /&gt;
&lt;br /&gt;
libxml2 : CVE-2011-1944&lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (Overflow, Gain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
CVE-2011-4868 CVE-2011-4539 CVE-2011-2749 CVE-2011-2748&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
CVE-2012-0027 CVE-2011-4619 CVE-2011-4576 CVE-2011-4109 CVE-2011-4108 CVE-2011-3210&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== CVE-2011-4885 CVE-2011-3379 (Denial Of Service, affected : current, 13.37 and all before ) ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute Code, Overflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=626</id>
		<title>Category:Security:SSA</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Category:Security:SSA&amp;diff=626"/>
		<updated>2012-01-30T17:31:45Z</updated>

		<summary type="html">&lt;p&gt;Erik: details for pidgin&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slackware has recently started to be inactive. At the same time, a number of security issues have been found in various components. This page aims at listing them in order to help everyone know which components have known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The list below is provided as-is. It is meant to be as good as possible but we can't guarantee anything. It is sorted by slackware categories: a/, ap/, d/, ...&lt;br /&gt;
&lt;br /&gt;
A more comprehensive effort might appear at some point in the future (binary packages?) but this is currently only a list of packages and their CVEs when applicable and useful. In some cases, we consider pointing out a specific CVE is not useful because of the number of issues (i.e. get the last version; e.g. mozilla-*).&lt;br /&gt;
&lt;br /&gt;
The CVEs are typically listed as follow:&lt;br /&gt;
${SUMMARY}&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: ${DATE}&lt;br /&gt;
** Available in version: ${UPSTREAM_VERSION_WITH_FIX} (-current ${VERSION_IN_CURRENT}; -stable: ${VERSION_IN_13_37})&lt;br /&gt;
** Upstream commit: ${URL_TO_THE_SPECIFIC_FIX_COMMIT}&lt;br /&gt;
&lt;br /&gt;
== a ==&lt;br /&gt;
linux&lt;br /&gt;
&lt;br /&gt;
== ap ==&lt;br /&gt;
cups : CVE-2011-3170 CVE-2011-2896&lt;br /&gt;
&lt;br /&gt;
== d ==&lt;br /&gt;
=== perl === &lt;br /&gt;
==== CVE-2011-2939 (DDoS, affected: current and stable) ====&lt;br /&gt;
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939 (on cve.mitre.org)].&lt;br /&gt;
* Fix:&lt;br /&gt;
** Fixed upstream on: Tue, 9 Aug 2011&lt;br /&gt;
** Available in version: 5.14.2 (-current: 5.14.0; -stable: 5.12.3)&lt;br /&gt;
** Commit: http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5&lt;br /&gt;
&lt;br /&gt;
=== ruby ===&lt;br /&gt;
CVE-2011-2705 CVE-2011-1004 CVE-2011-0188&lt;br /&gt;
&lt;br /&gt;
== e ==&lt;br /&gt;
emacs&lt;br /&gt;
&lt;br /&gt;
== l ==&lt;br /&gt;
t1lib : CVE-2011-1554 CVE-2011-1553 CVE-2011-1552 CVE-2011-0764&lt;br /&gt;
&lt;br /&gt;
freetype2 : CVE-2011-0226&lt;br /&gt;
&lt;br /&gt;
libxml2 : CVE-2011-1944&lt;br /&gt;
&lt;br /&gt;
== n ==&lt;br /&gt;
=== httpd ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4415 CVE-2011-4415] (DoS, affected : current, 13.37 and all before) ====&lt;br /&gt;
The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the &amp;quot;len +=&amp;quot; statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3607 CVE-2011-3607] (OverflowGain privileges, affected : current, 13.37 and all before) ====&lt;br /&gt;
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. &lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3368 CVE-2011-3368] (affected : current, 13.37 and all before) ====&lt;br /&gt;
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.&lt;br /&gt;
&lt;br /&gt;
=== dhcp ===&lt;br /&gt;
CVE-2011-4868 CVE-2011-4539 CVE-2011-2749 CVE-2011-2748&lt;br /&gt;
&lt;br /&gt;
=== openssl ===&lt;br /&gt;
CVE-2012-0027 CVE-2011-4619 CVE-2011-4576 CVE-2011-4109 CVE-2011-4108 CVE-2011-3210&lt;br /&gt;
&lt;br /&gt;
=== proftpd  ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4130 CVE-2011-4130] (Execute Code, affected : current, 13.37, and all before) ====&lt;br /&gt;
([http://bugs.proftpd.org/show_bug.cgi?id=3711 proftpd bug tracker #3711])&lt;br /&gt;
&lt;br /&gt;
Use-after-free vulnerability in the Response API in ProFTPD '''before 1.3.3g''' allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.&lt;br /&gt;
&lt;br /&gt;
=== php ===&lt;br /&gt;
==== CVE-2011-4885 CVE-2011-3379 (Denial Of Service, affected : current, 13.37 and all before ) ====&lt;br /&gt;
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.&lt;br /&gt;
&lt;br /&gt;
== x ==&lt;br /&gt;
=== libXfont ===&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2895 CVE-2011-2895] (Execute CodeOverflow, current, 13.37 and all before) ====&lt;br /&gt;
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.&lt;br /&gt;
&lt;br /&gt;
== xap ==&lt;br /&gt;
=== pidgin ===&lt;br /&gt;
====  [http://cvedetails.com/cve/CVE-2011-4603 CVE-2011-4603] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4602 CVE-2011-4602] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-4601 CVE-2011-4601] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3594 CVE-2011-3594] (Denial Of Service, Overflow) affected : current, 13.37 and all before ====&lt;br /&gt;
The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-3184 CVE-2011-3184] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The msn_httpconn_parse_data function in httpconn.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.0 does not properly handle HTTP 100 responses, which allows remote attackers to cause a denial of service (incorrect memory access and application crash) via vectors involving a crafted server message.&lt;br /&gt;
&lt;br /&gt;
==== [http://cvedetails.com/cve/CVE-2011-2943 CVE-2011-2943] (Denial Of Service) affected : current, 13.37 and all before ====&lt;br /&gt;
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 does not properly validate characters in nicknames, which allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted nickname that is not properly handled in a WHO response.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=The_Regulars&amp;diff=619</id>
		<title>The Regulars</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=The_Regulars&amp;diff=619"/>
		<updated>2012-01-30T04:19:41Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Staff==&lt;br /&gt;
* [[User:Alan_Hicks|Alan Hicks]]&lt;br /&gt;
* [[User:alienbob|alienBOB]]&lt;br /&gt;
* nachox/darkjoker&lt;br /&gt;
* [[User:phrag|phrag]]&lt;br /&gt;
* [[User:rworkman|rworkman]]&lt;br /&gt;
* [[User:Stx|Stx]]&lt;br /&gt;
* [[User:Unixfool|Unixfool/W|GGL|T]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
* [[User:Adioe3|adioe3]]&lt;br /&gt;
* [[User:Alisonken1|Alisonken1]]&lt;br /&gt;
* [[User:Apeitheo|Apeitheo]]&lt;br /&gt;
* [[User:Boojit|boojit]]&lt;br /&gt;
* [[User:Michiel |BP{k}]]&lt;br /&gt;
* [[User:Buzzedlightyear|Buzzedlightyear]]&lt;br /&gt;
* [[User:chopp|chopp]]&lt;br /&gt;
* [[User:Chrismo|Chrismo]]&lt;br /&gt;
* [[User:clavius|clavius]]&lt;br /&gt;
* [[USer:codermaniac|codermaniac]]&lt;br /&gt;
* [[User:Crudo|crudo]]&lt;br /&gt;
* [[User:Crypticlineage|crypticlineage]]&lt;br /&gt;
* [[User:dadexter|dadexter]]&lt;br /&gt;
* [[User:dchmelik|dchmelik]]&lt;br /&gt;
* [[User:derxob|derxob]]&lt;br /&gt;
* [[User:Dominian|Dominian]]&lt;br /&gt;
* dtanner&lt;br /&gt;
* [[eclipse75]]&lt;br /&gt;
* [[User:Erik|erik]]&lt;br /&gt;
* [[User:FredEmmott|fred]]&lt;br /&gt;
* [[User:giangy|giangy]]&lt;br /&gt;
* [[User:jcm |jcm]]&lt;br /&gt;
* [[User:jpipkin |jpipkin]]&lt;br /&gt;
* [[User:macavity|macavity]]&lt;br /&gt;
* [[User:Marcus | Marcus_]]&lt;br /&gt;
* [[User:Mmlj4|mmlj4]]&lt;br /&gt;
* [[User:natex|natex]]&lt;br /&gt;
* [[USer:Phoul|Phoul]]&lt;br /&gt;
* [[User:Dardan Fejzullahi |radiohead]]&lt;br /&gt;
* [[User:radi0head|radi0head]]&lt;br /&gt;
* Riddick&lt;br /&gt;
* [[User:robert-brown|robert-brown]]&lt;br /&gt;
* [[User:1337ln | ron1n]]&lt;br /&gt;
* [[User:Ryanx0r|Ryanx0r]]&lt;br /&gt;
* [[USer:slackmagic|slackmagic]]&lt;br /&gt;
* [[User:Slakmagik|slakmagik]]&lt;br /&gt;
* [[StevenR]]&lt;br /&gt;
* [[User:Straterra|Straterra]]&lt;br /&gt;
* [[USer:Strykar|Strykar]]&lt;br /&gt;
* [[User:tecky|tecky]]&lt;br /&gt;
* [[User:Tewmten|tewmten]]&lt;br /&gt;
* [[User:v3ctor|v3ctor]]&lt;br /&gt;
* [[User:Zordrak|Zordrak]]&lt;br /&gt;
&lt;br /&gt;
==SlackWiki Admins==&lt;br /&gt;
There is a [[Special:Listadmins|list]] of SlackWiki admins. Please contact one if you think you'd be a suitable admin.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=The_Regulars&amp;diff=618</id>
		<title>The Regulars</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=The_Regulars&amp;diff=618"/>
		<updated>2012-01-30T04:18:02Z</updated>

		<summary type="html">&lt;p&gt;Erik: cpunches is not a regular&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Staff==&lt;br /&gt;
* [[User:Alan_Hicks|Alan Hicks]]&lt;br /&gt;
* [[User:alienbob|alienBOB]]&lt;br /&gt;
* nachox/darkjoker&lt;br /&gt;
* [[User:phrag|phrag]]&lt;br /&gt;
* [[User:rworkman|rworkman]]&lt;br /&gt;
* [[User:Stx|Stx]]&lt;br /&gt;
* [[User:Unixfool|Unixfool/W|GGL|T]]&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
* [[User:Adioe3|adioe3]]&lt;br /&gt;
* [[User:Alisonken1|Alisonken1]]&lt;br /&gt;
* [[User:Apeitheo|Apeitheo]]&lt;br /&gt;
* [[User:Boojit|boojit]]&lt;br /&gt;
* [[User:Michiel |BP{k}]]&lt;br /&gt;
* [[User:Buzzedlightyear|Buzzedlightyear]]&lt;br /&gt;
* [[User:chopp|chopp]]&lt;br /&gt;
* [[User:Chrismo|Chrismo]]&lt;br /&gt;
* [[User:clavius|clavius]]&lt;br /&gt;
* [[USer:codermaniac|codermaniac]]&lt;br /&gt;
* [[User:Crudo|crudo]]&lt;br /&gt;
* [[User:Crypticlineage|crypticlineage]]&lt;br /&gt;
* [[User:dadexter|dadexter]]&lt;br /&gt;
* [[User:dchmelik|dchmelik]]&lt;br /&gt;
* [[User:derxob|derxob]]&lt;br /&gt;
* [[User:Dominian|Dominian]]&lt;br /&gt;
* dtanner&lt;br /&gt;
* [[eclipse75]]&lt;br /&gt;
* [[User:Erik|erik]]&lt;br /&gt;
* [[User:FredEmmott|fred]]&lt;br /&gt;
* [[User:giangy|giangy]]&lt;br /&gt;
* [[User:jcm |jcm]]&lt;br /&gt;
* [[User:jpipkin |jpipkin]]&lt;br /&gt;
* [[User:macavity|macavity]]&lt;br /&gt;
* [[User:Marcus | Marcus_]]&lt;br /&gt;
* [[User:Mmlj4|mmlj4]]&lt;br /&gt;
* [[USer:Phoul|Phoul]]&lt;br /&gt;
* [[User:Dardan Fejzullahi |radiohead]]&lt;br /&gt;
* [[User:radi0head|radi0head]]&lt;br /&gt;
* Riddick&lt;br /&gt;
* [[User:robert-brown|robert-brown]]&lt;br /&gt;
* [[User:1337ln | ron1n]]&lt;br /&gt;
* [[User:Ryanx0r|Ryanx0r]]&lt;br /&gt;
* [[USer:slackmagic|slackmagic]]&lt;br /&gt;
* [[User:Slakmagik|slakmagik]]&lt;br /&gt;
* [[StevenR]]&lt;br /&gt;
* [[User:Straterra|Straterra]]&lt;br /&gt;
* [[USer:Strykar|Strykar]]&lt;br /&gt;
* [[User:tecky|tecky]]&lt;br /&gt;
* [[User:Tewmten|tewmten]]&lt;br /&gt;
* [[User:v3ctor|v3ctor]]&lt;br /&gt;
* [[User:Zordrak|Zordrak]]&lt;br /&gt;
* [[User:natex|natex]]&lt;br /&gt;
&lt;br /&gt;
==SlackWiki Admins==&lt;br /&gt;
There is a [[Special:Listadmins|list]] of SlackWiki admins. Please contact one if you think you'd be a suitable admin.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User_talk:Merge-delete&amp;diff=614</id>
		<title>User talk:Merge-delete</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User_talk:Merge-delete&amp;diff=614"/>
		<updated>2012-01-30T03:52:30Z</updated>

		<summary type="html">&lt;p&gt;Erik: moved User talk:Amanda27 to User talk:Merge-delete: Automatically moved page while merging the user &amp;quot;Amanda27&amp;quot; to &amp;quot;Merge-delete&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Boutique Hotels In India&lt;br /&gt;
&lt;br /&gt;
Indulge yourself in sheer luxury throughout your remain in boutique hotels in India.[http://hotelslonavala.net/ hotels in lonavala] These are the places where one can live like rajas and maharajas. They're simply unique within their architecture and hang up where one can get highly personalized services inside a distinctive manner. They are heritage hotels that supply you with a unique connection with living existence.[http://hotelslonavala.net/ hotels in lonavala] Just opposite to western style hotels, these places permit you to know and have the wealthy culture and history of India.&lt;br /&gt;
&lt;br /&gt;
 On a trip from the beaten tracks in India, you might find several boutique hotels where one can unwind yourself and also have home-cooked food. With enchanting folk music, amazing architecture, peace and exceptional hospitality, these hotels can bring alive the times of rajas and maharajas of older occasions. Their architecture, gardens, food and luxuries echo from the glorious past of India. Although you will find several hotels in India but when youre searching for best hotels, then certainly Rajasthan may be the condition that you need to visit whenever you arrived at India.&lt;br /&gt;
&lt;br /&gt;
 You will find several havelis-converted-hotels in Rajasthan where you can unwind yourself and dip your senses in luxury. Remaining during these hotels is definitely an entirely different experience. Youll feel like you aren't nowadays. For experience a completely different lifestyle, you have to visit these hotels and spend your trip. Trust, youll possess a lifetime experience. The deserted great thing about Rajasthan and wealthy tradition enables you to definitely go through the luxury in simplicity. You no more have to pretend as possible be genuine and do what youve always loved.&lt;br /&gt;
&lt;br /&gt;
 The best hotels in Rajasthan are Rawla Narlai, Raas Hotel, The Serai, Udai Kothi, Bhainsrorgarh and Devigarh. From the sights of those hotels, regal inside and grass to authentic antiques, lodging and fooding may be worth admiring. You seem like wandering within the deserts, going through the wonder, studying wealthy tradition, listening folk music and gorging on local meals. Several companies offer vacation packages to Rajasthan. Whenever you arrived at India, you just cant manage to miss these places. They feature glorious past of India.&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=597</id>
		<title>User:Erik</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=597"/>
		<updated>2012-01-29T18:41:28Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Name: [mailto:erik@sl1200.org Erik Hanson]&amp;lt;br&amp;gt;&lt;br /&gt;
Web: [http://sl1200.org/~erik/ http://sl1200s.org/~erik/]&amp;lt;br&amp;gt;&lt;br /&gt;
IRC: [irc://frop.taphouse.org/ Taphouse Cabal] [irc://irc.efnet.org/ EFnet] [irc://chat.freenode.net/ The Freenode Network]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\phi_n(\kappa) = \frac{1}{4\pi^2\kappa^2} \int_0^\infty \frac{\sin(\kappa R)}{\kappa R} \frac{\partial}{\partial R}\left[R^2\frac{\partial D_n(R)}{\partial R}\right]\,dR&amp;lt;/math&amp;gt;&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=595</id>
		<title>User:Erik</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=User:Erik&amp;diff=595"/>
		<updated>2012-01-27T19:09:24Z</updated>

		<summary type="html">&lt;p&gt;Erik: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Name: [mailto:erik@sl1200.org Erik Hanson]&amp;lt;br&amp;gt;&lt;br /&gt;
Web: [http://sl1200.org/~erik/ http://sl1200s.org/~erik/]&amp;lt;br&amp;gt;&lt;br /&gt;
IRC: [irc://frop.taphouse.org/ Taphouse Cabal] [irc://irc.efnet.org/ EFnet] [irc://chat.freenode.net/ The Freenode Network]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;math&amp;gt;\phi_n(\kappa) = \frac{1}{4\pi^2\kappa^2} \int_0^\infty \frac{\sin(\kappa R)}{\kappa R} \frac{\partial}{\partial R}\left[R^2\frac{\partial D_n(R)}{\partial R}\right]\,dR&amp;lt;/math&amp;gt;&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=SlackBuild_Scripts&amp;diff=592</id>
		<title>SlackBuild Scripts</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=SlackBuild_Scripts&amp;diff=592"/>
		<updated>2012-01-24T19:52:10Z</updated>

		<summary type="html">&lt;p&gt;Erik: Removed offline/404 sites&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SlackBuild scripts are simple shell scripts which can automate the compiling and packaging of a program from source. &lt;br /&gt;
&lt;br /&gt;
While not necessary to compile and create packages on Slackware, SlackBuilds serve as tools for scripting the compiling and packaging processes, which are often repetitive. Just as importantly, SlackBuilds also act as documentation of compile-time options and configurations for that particular package. For that reason, official Slackware packages come with SlackBuilds bundled with the source code, and the inclusion of a SlackBuild is desirable in third-party packages.&lt;br /&gt;
&lt;br /&gt;
== Using SlackBuild Scripts ==&lt;br /&gt;
In this example I'm going to use the [http://www.pidgin.im Pidgin] slackbuild. First you find on the mirror in the source directory and download the whole directory of Pidgin:&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;mkdir pidgin&amp;lt;/code&amp;gt;&lt;br /&gt;
: &amp;lt;code&amp;gt;cd pidgin&amp;lt;/code&amp;gt;&lt;br /&gt;
: &amp;lt;code&amp;gt;wget --passive-ftp &amp;lt;nowiki&amp;gt;ftp://slackware.at/slackware-12.1/source/xap/pidgin/*&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This downloads the files needed for Slackware scripts.  The same idea applies for SlackBuild scripts from other&lt;br /&gt;
sources - you generally need to download all of the files in the directory that contains the build script.  For example, in the pidgin source directory, you would need the following files:&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;pidgin-2.4.1.tar.bz2  pidgin-encryption-3.0.tar.gz  pidgin.SlackBuild*  slack-desc &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There will sometimes be other files, such as doinst.sh, diff.gz patch files, and rc.* scripts in this directory.&lt;br /&gt;
&lt;br /&gt;
Now, say you want to get the newest version of pidgin? Well, you download the tar.bz2 file (in Pidgin, the script uses tar.bz2). Now you open up pidgin.Slackbuild:&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;VERSION=2.4.1&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is the line we are looking at. Now we can change this to&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;VERSION=2.4.2&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now you can edit the compile flags and other cool things not covered here. Now that we have downloaded and edited the SlackBuild script, let's make it executable:&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;chmod +x pidgin.SlackBuild&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now this is executable, and we want to run as root for permissions and other reasons so we want to become root:&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;su -&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now we start the script, and this will compile Pidgin and make a Slackware package.  Depending on how the &lt;br /&gt;
script is written, the resulting package will be in /tmp, some directory of /tmp, or perhaps some&lt;br /&gt;
other location - have a look at the SlackBuild script for some hints if you can't find the package that&lt;br /&gt;
was built.  &lt;br /&gt;
&lt;br /&gt;
Once you find the package, you simply use 'installpkg' to install it normally (and you probably want to&lt;br /&gt;
move it somewhere else on your system for safekeeping).&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;code&amp;gt;./pidgin.SlackBuild&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=SlackBuild Archives=&lt;br /&gt;
;* http://www.slackbuilds.org&lt;br /&gt;
;* http://repository.slacky.eu&lt;br /&gt;
;* http://www.slackware.com/~alien/slackbuilds/&lt;br /&gt;
&lt;br /&gt;
=Other Resources=&lt;br /&gt;
For a bit more detailed tutorial, see this entry: [[Writing A SlackBuild Script]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Tutorials]]&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
	<entry>
		<id>https://www.slackwiki.com/index.php?title=Writing_A_SlackBuild_Script&amp;diff=591</id>
		<title>Writing A SlackBuild Script</title>
		<link rel="alternate" type="text/html" href="https://www.slackwiki.com/index.php?title=Writing_A_SlackBuild_Script&amp;diff=591"/>
		<updated>2012-01-24T19:47:42Z</updated>

		<summary type="html">&lt;p&gt;Erik: Removed offline/404 sites&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Tutorials]]&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
 Originally written by Florian Mueller jjdm@jjdm.org&lt;br /&gt;
 Substantial cleanup and enhancement by Robby Workman (rworkman)&lt;br /&gt;
&lt;br /&gt;
If you use slackware as your main operating system, you have probably wanted to install quite a few applications which are not available in the official slackware.com or even third-party repositories like linuxpackages.net, or perhaps you just don't like using third-party packages.  In this situation, you have several options on how to install the application:&lt;br /&gt;
&lt;br /&gt;
 * ./configure &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install&lt;br /&gt;
 * use checkinstall&lt;br /&gt;
 * use installwatch&lt;br /&gt;
 * compile and use makepkg by hand&lt;br /&gt;
 * write a SlackBuild script&lt;br /&gt;
&lt;br /&gt;
I will go through the last option: writing [[SlackBuild Scripts]] (which combines the best qualities of all the other aforementioned methods). With a SlackBuild script, you have the build process automated, which will allow you to easily do later upgrades or patches to the package. SlackBuild scripts are also the method by which Patrick Volkerding builds all of the official packages for Slackware. If you look at the various scripts from different sources, you will notice that there is generally an application-independent portion of a script and an application-specific portion of the script.&lt;br /&gt;
&lt;br /&gt;
I cannot teach you how to build the &amp;quot;perfect&amp;quot; package, as reaching that goal requires fairly in-depth knowledge of the Slackware operating system.  You must consider the interactions of your proposed package with all of the other packages within the distribution; they must be integrated seamlessly.  What I can teach you is how to build a package that works and which stays true to the &amp;quot;Slackware Way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;But it takes so much time!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
It will take approximately thirty minutes to go through this tutorial and about fifteen minutes to create each package (actual compile process not included), but the time you save in the future (you want to create a newer version of the package) makes the initial time expenditure worth it.&lt;br /&gt;
&lt;br /&gt;
= The Slackware package structure =&lt;br /&gt;
&lt;br /&gt;
See [[Packages#Slackware Package Layout]]&lt;br /&gt;
&lt;br /&gt;
= Setting up your build environment =&lt;br /&gt;
&lt;br /&gt;
See [[Build_Environment]] for examples of how various users do this.&lt;br /&gt;
&lt;br /&gt;
= Getting Started =&lt;br /&gt;
&lt;br /&gt;
Hopefully, everything is now clear about Slackware package structure, and you have set up a clean build environment, so we'll begin the process of building a package with a SlackBuild script.&lt;br /&gt;
&lt;br /&gt;
For this example, we'll create a package of latex2html - I made my homepage with that tool.&lt;br /&gt;
&lt;br /&gt;
First, you have to create a directory named &amp;lt;build_environment&amp;gt;/latex2html/. Get the most recent source code release of latex2html place it in this directory.  Note that use of wget below to obtain the most recent source code is optional - you can just as well use your favorite web browser to download it, and then move it into the correct directory.&lt;br /&gt;
&lt;br /&gt;
 $ cd &amp;lt;build_environment&amp;gt;&lt;br /&gt;
 $ mkdir latex2html&lt;br /&gt;
 $ cd latex2html&lt;br /&gt;
 $ wget http://saftsack.fs.uni-bayreuth.de/~latex2ht/current/latex2html-2002-2-1.tar.gz # 05.02.2005&lt;br /&gt;
&lt;br /&gt;
Next, we'll create some other needed files with touch.  If you're not familiar with touch, see:&lt;br /&gt;
 man touch&lt;br /&gt;
Note that the *.SlackBuild file will always contain the name of the application for which it's written; for example, gaim would have gaim.SlackBuild.&lt;br /&gt;
&lt;br /&gt;
 $ touch latex2html.SlackBuild&lt;br /&gt;
 $ touch slack-desc&lt;br /&gt;
&lt;br /&gt;
Extract the source code of the application, because we'll need to look at the configure script later on to determine what options we need to pass to it.&lt;br /&gt;
&lt;br /&gt;
 $ tar -xzf latex2html-2002-2-1.tar.gz || exit 1&lt;br /&gt;
&lt;br /&gt;
= Writing the slack-desc file =&lt;br /&gt;
&lt;br /&gt;
See this [[Slack-desc]] page on SlackWiki.org for instructions on how to write a proper slack-desc file.&lt;br /&gt;
&lt;br /&gt;
= Writing the SlackBuild script =&lt;br /&gt;
&lt;br /&gt;
This is the section which takes the most time, and I'll go through it with you step by step.  When you build more packages, you'll probably be able to just copy an existing SlackBuild script and customize it. First, you need to understand that you can write your SlackBuild script in any manner you choose so long as it creates a working package; the method described here is more or less the way Pat Volkerding [[http://slackware.com/~volkerdi]] does it, but even Pat has several different styles for writing the official SlackBuild scripts.  Therefore, if you see something you would do a different way, feel free to do it that way - it's okay.&lt;br /&gt;
&lt;br /&gt;
===Initial Setup===&lt;br /&gt;
&lt;br /&gt;
Open the file latex2html.SlackBuild with your favourite editor.  What follows below is a piece by piece walk-through of a working SlackBuild script.  You may certainly paste the exact contents of those pieces, but in the author's opinion, you have a better chance of understanding it if you write everything yourself.&lt;br /&gt;
&lt;br /&gt;
First, you'll need to set your shell interpreter.  This should be /bin/sh, as *every* Slackware system is guaranteed to have this shell installed, and you want maximum portability.  For this same reason, be careful not to use any extensions and/or syntax that is customized for your particular shell (bash, zsh, or whatever), as it won't be interpreted correctly.  The '-e' flag tells the shell to exit on any error; this helps with both debugging your script as well as ensuring your script does not proceed in an unknown state.&lt;br /&gt;
&lt;br /&gt;
 #!/bin/sh -e&lt;br /&gt;
&lt;br /&gt;
You might want to include a license of some sort with your SlackBuild script (preferably a GPL or BSD-style license), but at a minimum, you'll want something like this:&lt;br /&gt;
&lt;br /&gt;
 #&amp;lt;your name&amp;gt; revision date yyyy/mm/dd&lt;br /&gt;
&lt;br /&gt;
With the next few lines, we set some variables that will be used throughout the script. First is the &amp;quot;CWD&amp;quot; variable; in our case, CWD will be &amp;lt;build_environment&amp;gt;/latex2html/. We also test if the TMP variable is set, and if not, we set it to /tmp.&lt;br /&gt;
&lt;br /&gt;
 #Set initial variables:	&lt;br /&gt;
 &lt;br /&gt;
 CWD=$(pwd)&lt;br /&gt;
 if [ &amp;quot;$TMP&amp;quot; = &amp;quot;&amp;quot; ]; then&lt;br /&gt;
   TMP=/tmp&lt;br /&gt;
 fi&lt;br /&gt;
&lt;br /&gt;
Some people like to build in a subdirectory of /tmp (such as /tmp/build), but that's up to you.&lt;br /&gt;
 &lt;br /&gt;
 # The version which appears in the application's filename&lt;br /&gt;
 VERSION=2002-2-1 	&lt;br /&gt;
 &lt;br /&gt;
 # If the version conflicts with the Slackware package standard&lt;br /&gt;
 # The dash character (&amp;quot;-&amp;quot;) is not allowed in the VERSION string&lt;br /&gt;
 # You can set the PKG_VERSION to something else than VERSION&lt;br /&gt;
 PKG_VERSION=2002.2.1 # the version which appears in the package name. &lt;br /&gt;
 &lt;br /&gt;
 ARCH=${ARCH:-i486} # the architecture on which you want to build your package	&lt;br /&gt;
 &lt;br /&gt;
 # First digit is the build number, which specifies how many times it has been built.	&lt;br /&gt;
 # Second string is the short form of the authors name, typical three initials:w&lt;br /&gt;
 BUILD=${BUILD:-1_rlw}&lt;br /&gt;
 &lt;br /&gt;
 # The application's name&lt;br /&gt;
 APP=latex2html&lt;br /&gt;
 &lt;br /&gt;
 # The installation directory of the package (where its actual directory&lt;br /&gt;
 # structure will be created) &lt;br /&gt;
 PKG=$TMP/package-$APP&lt;br /&gt;
&lt;br /&gt;
Set SLKCFLAGS (which will be used for both CFLAGS and CXXFLAGS).  If you are building on a system with an earlier version of gcc than 3.4.x, then you'll need to use &amp;quot;-mcpu&amp;quot; instead of &amp;quot;-mtune&amp;quot; below.&lt;br /&gt;
&lt;br /&gt;
 if [ &amp;quot;$ARCH&amp;quot; = &amp;quot;i486&amp;quot; ]; then&lt;br /&gt;
   SLKCFLAGS=&amp;quot;-O2 -march=i486 -mtune=i686&amp;quot;&lt;br /&gt;
  elif [ &amp;quot;$ARCH&amp;quot; = &amp;quot;x86_64&amp;quot; ]; then&lt;br /&gt;
   SLKCFLAGS=&amp;quot;-O2 -fPIC&amp;quot;&lt;br /&gt;
 fi&lt;br /&gt;
&lt;br /&gt;
The section just finished sets up a few application-specific variables. When you want to create a package of some other application, you can usually just change the variables, and most of the further steps will work automatically.&lt;br /&gt;
&lt;br /&gt;
=== Extract Sources ===&lt;br /&gt;
&lt;br /&gt;
 # Delete the leftover directories if they exist (due to a previous build)&lt;br /&gt;
 # and (re)create the packaging directory&lt;br /&gt;
 rm -rf $PKG &lt;br /&gt;
 mkdir -p $TMP $PKG&lt;br /&gt;
 rm -rf $TMP/$APP-$VERSION&lt;br /&gt;
 &lt;br /&gt;
 # Change to the TMP directory&lt;br /&gt;
 cd $TMP || exit 1&lt;br /&gt;
  &lt;br /&gt;
 # Extract the application source in TMP&lt;br /&gt;
 # Note: if your application comes as a tar.bz2, you need tar -jxvf&lt;br /&gt;
 tar -zxvf $CWD/$APP-$VERSION.tar.gz || exit 1&lt;br /&gt;
 &lt;br /&gt;
 # Change to the application source directory&lt;br /&gt;
 cd $APP-$VERSION || exit 1&lt;br /&gt;
  &lt;br /&gt;
 # Change ownership and permissions if necessary&lt;br /&gt;
 # This may not be needed in some source tarballs, but it never hurts&lt;br /&gt;
 chown -R root:root .&lt;br /&gt;
 chmod -R u+w,go+r-w,a-s .&lt;br /&gt;
&lt;br /&gt;
===Configure and Compile Sources===&lt;br /&gt;
&lt;br /&gt;
 # Set configure options&lt;br /&gt;
 # If your app is written in C++, you'll also need to add a line for CXXFLAGS&lt;br /&gt;
 CFLAGS=&amp;quot;$SLKCFLAGS&amp;quot; \&lt;br /&gt;
   ./configure \&lt;br /&gt;
   --prefix=/usr \&lt;br /&gt;
   --sysconfdir=/etc \&lt;br /&gt;
   --localstatedir=/var \&lt;br /&gt;
   --with-perl=/usr/bin/perl \&lt;br /&gt;
   --enable-eps \&lt;br /&gt;
   --enable-gif \&lt;br /&gt;
   --enable-png \&lt;br /&gt;
   --build=$ARCH-slackware-linux \&lt;br /&gt;
   --host=$ARCH-slackware-linux &lt;br /&gt;
 &lt;br /&gt;
 # compile the source, but exit if anything goes wrong&lt;br /&gt;
 make || exit&lt;br /&gt;
  &lt;br /&gt;
 # Install everything into the package directory, but exit if anything goes wrong&lt;br /&gt;
 make install DESTDIR=$PKG || exit&lt;br /&gt;
&lt;br /&gt;
There are three configure options I always set:&lt;br /&gt;
&lt;br /&gt;
* --prefix=/usr&lt;br /&gt;
* --sysconfdir=/etc&lt;br /&gt;
* --localstatedir=/var&lt;br /&gt;
&lt;br /&gt;
This makes configuration files go to /etc, state files (such as log files) go to /var, and the rest goes to /usr. That's the usual Slackware way, but it's your system, so you can certainly install everything in /usr/local or some other location.  See the Unix Filesystem Hierarchy Standard [[http://www.pathname.com/fhs/]] for more information on &amp;quot;correct&amp;quot; locations of various filetypes.&lt;br /&gt;
&lt;br /&gt;
You notice that there were several other options passed to the configure script, and for each application you compile, you have to figure those out for yourself - that's why you were told to extract the sources earlier in this process.  You simply cd into the source directory and run:&lt;br /&gt;
 ./configure --help&lt;br /&gt;
This will produce a page or two (sometimes more, though) of information about various options that are specific to the application.  Read through this information and figure out what you need (I like to pipe that command through lpr to get a printed copy, but you can certainly use some sort of pager as well:&lt;br /&gt;
 ./configure --help | lpr&lt;br /&gt;
 ./configure --help | less&lt;br /&gt;
&lt;br /&gt;
The DESTDIR variable is very important in this script because it specifies the directory in which the files should be installed.  This should always be our package directory ($PKG).  Unfortunately, some applications' Makefiles will not support the DESTDIR variable, so you can't use it for those apps.  A simple line like this:&lt;br /&gt;
 grep DESTDIR Makefile*&lt;br /&gt;
while inside the source directory should tell you whether it supports DESTDIR or not.  If you get some lines of output with $DESTDIR in them, you're in good shape.  If the command returns no output, then the Makefile does not support the DESTDIR variable.&lt;br /&gt;
&lt;br /&gt;
Here's a piece of advice: ALWAYS go through the ./configure &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install DESTDIR=/somedir process manually and as a NORMAL USER account BEFORE you run your SlackBuild script.  There are quite a few applications out there which try to do &amp;quot;funny stuff&amp;quot; during the installation phase.&lt;br /&gt;
 For example, apcupsd will attempt to patch your /etc/rc.d/rc.6 init script&lt;br /&gt;
 Yes, it's possible to avoid this with a configure option, but it's not obvious that you would need&lt;br /&gt;
 to do so until you look at all of the Makefiles for apcupsd (or watch the install process)&lt;br /&gt;
Anyway, if you go through the process as a normal user, you will get &amp;quot;Permission Denied&amp;quot; errors and such if the install process tries to write anywhere it's not allowed to do so.&lt;br /&gt;
&lt;br /&gt;
=== Install Documentation ===&lt;br /&gt;
&lt;br /&gt;
 # Create a directory for documentation&lt;br /&gt;
 mkdir -p $PKG/usr/doc/$APP-$VERSION&lt;br /&gt;
 &lt;br /&gt;
 # Copy documentation to the docs directory and fix permissions&lt;br /&gt;
 cp -a BUGS Changes FAQ INSTALL LICENSE MANIFEST README TODO docs/ $PKG/usr/doc/$APP-$VERSION&lt;br /&gt;
 find $PKG/usr/doc/$APP-$VERSION -type f -exec chmod 644 {} \;&lt;br /&gt;
&lt;br /&gt;
I (rworkman) also like to place a copy of my SlackBuild script in this directory&lt;br /&gt;
 cat $CWD/$APP.SlackBuild &amp;gt; $PKG/usr/doc/$APP-$VERSION/$APP.SlackBuild&lt;br /&gt;
&lt;br /&gt;
Make sure you look inside the actual source archive of the application, because some applications won't have all of the documentation files specified above, and some applications will have additional files.  In other words, don't just copy/paste what you see above into your SlackBuild script - you *must* customize this section for each individual application.&lt;br /&gt;
&lt;br /&gt;
=== Final Touches ===&lt;br /&gt;
&lt;br /&gt;
 # Create the ./install directory and copy the slack-desc into it&lt;br /&gt;
 mkdir -p $PKG/install&lt;br /&gt;
 cat $CWD/slack-desc &amp;gt; $PKG/install/slack-desc&lt;br /&gt;
&lt;br /&gt;
NOTE: In some cases, you will have some sort of command or setup that&lt;br /&gt;
needs to run after the package contents are installed - for this, you&lt;br /&gt;
would add a file to $CWD called &amp;quot;doinst.sh&amp;quot; which contains the needed&lt;br /&gt;
commands, and then compress that file with gzip.  The SlackBuild script&lt;br /&gt;
will zcat (which means to gunzip and cat its contents) that file and &lt;br /&gt;
write the output to a doinst.sh file in the $PKG/install directory.&lt;br /&gt;
&lt;br /&gt;
 # Add doinst.sh to package (if it exists)&lt;br /&gt;
 if [ -e $CWD/doinst.sh.gz ]; then&lt;br /&gt;
   zcat $CWD/doinst.sh.gz &amp;gt; $PKG/install/doinst.sh&lt;br /&gt;
 fi&lt;br /&gt;
&lt;br /&gt;
Let's conserve space if we can; strip libraries and binaries and compress man pages with gzip&lt;br /&gt;
Note that you might be able to use &amp;quot;make install-strip&amp;quot; instead of &amp;quot;make install&amp;quot; above instead to accomplish the same purpose&lt;br /&gt;
&lt;br /&gt;
 # Strip some libraries and binaries&lt;br /&gt;
 ( cd $PKG&lt;br /&gt;
    find . | xargs file | grep &amp;quot;executable&amp;quot; | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2&amp;gt; /dev/null&lt;br /&gt;
    find . | xargs file | grep &amp;quot;shared object&amp;quot; | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2&amp;gt; /dev/null&lt;br /&gt;
 )&lt;br /&gt;
 &lt;br /&gt;
 # Compress man pages if they exist&lt;br /&gt;
 if [ -d $PKG/usr/man ]; then&lt;br /&gt;
   ( cd $PKG/usr/man&lt;br /&gt;
   find . -type f -exec gzip -9 {} \;&lt;br /&gt;
   for i in $(find . -type l) ; do ln -s $(readlink $i).gz $i.gz ; rm $i ; done&lt;br /&gt;
   ) &lt;br /&gt;
 fi&lt;br /&gt;
 &lt;br /&gt;
 # Compress info pages if they exist (and remove the dir file)&lt;br /&gt;
 if [ -d $PKG/usr/info ]; then&lt;br /&gt;
   gzip -9 $PKG/usr/info/*.info&lt;br /&gt;
   rm -f $PKG/usr/info/dir&lt;br /&gt;
 fi&lt;br /&gt;
&lt;br /&gt;
=== Build the Package ===&lt;br /&gt;
&lt;br /&gt;
 # Build the package&lt;br /&gt;
 cd $PKG&lt;br /&gt;
 /sbin/makepkg -l y -c n $TMP/$APP-$PKG_VERSION-$ARCH-$BUILD.tgz&lt;br /&gt;
&lt;br /&gt;
= Other Concerns =&lt;br /&gt;
&lt;br /&gt;
=== DESTDIR Option Not Available ===&lt;br /&gt;
&lt;br /&gt;
As mentioned above, there are quite a few applications whose Makefiles do not support the DESTDIR option for make install.  On some applications the DESTDIR Makefile variable has another name.  For example, some Qt applications use the variable INSTALL_ROOT for the same purpose.  If you can understand Makefiles, it is probably worth your time to take a look at its contents and try to find out which actions are performed in the install rule.  Sometimes there will be no DESTDIR equivalent at all.  The &amp;lt;strong&amp;gt;best&amp;lt;/strong&amp;gt; thing you can do in this situation is write a patch for the Makefile.in or equivalent, and submit it to the developer(s) for inclusion in the source, but I realize that everyone doesn't have the ability to do that.  The second best thing you can do it write to the developer(s) and ask them to include that functionality in future releases.  In the meantime, here are some thoughts on the subject...&lt;br /&gt;
&lt;br /&gt;
==== Example 1: ====&lt;br /&gt;
Configure the build with:&lt;br /&gt;
 ./configure --prefix=$PKG/usr&lt;br /&gt;
along with your other configure options.  This will install *all* of the package contents in that directory.  If the package creates $PKG/usr/etc and $PKG/usr/var directories (or any other directories that should be elsewhere), you can probably just move them to their correct location within the package directory tree and everything will be fine.  You might also try this along with your other configure options.&lt;br /&gt;
 ./configure --prefix=$PKG/usr \&lt;br /&gt;
    --sysconfdir=$PKG/etc \&lt;br /&gt;
    --localstatedir=$PKG/var &lt;br /&gt;
There are some applications, however, which &amp;quot;hard-code&amp;quot; configuration files based on configure/Makefile parameters.  In those cases, you'll have to figure out a way to patch the config file prior to packaging it, or in worst-case scenario, include instructions for the end user on how to make the necessary changes.&lt;br /&gt;
&lt;br /&gt;
==== Example 2: ====&lt;br /&gt;
This example makes use of the ability to override any Makefile variable, which is called a '''macro''' in the Makefile terminology, on the command line and not have to worry about patching the Makefile to include a '''DESTDIR''' macro in the Makefile.  This approach makes it a bit easier for those not familiar with Makefiles.&lt;br /&gt;
&lt;br /&gt;
If the Makefile does not honor '''DESTDIR''' for the 'make install' command, you can change the prefix macro, instead:&lt;br /&gt;
 make prefix=$PKG/usr install&lt;br /&gt;
This will override the $(prefix) variable inside the Makefile and install to the location you supplied on the command line.  Therefore, you can configure with the standard ''./configure --prefix=/usr'' (or ''./configure --prefix=/usr/local'') syntax, yet install to a different location as if you supplied a ''DESTDIR=$PKG/usr'' for the 'make install' command.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT NOTE: Macro names are case-sensitive (at least for GNU make).  Some Makefiles may use a &amp;quot;'''PREFIX ='''&amp;quot; macro instead of the usual &amp;quot;'''prefix ='''&amp;quot;, so the 'make install' command would look like this:&lt;br /&gt;
 make PREFIX=$PKG/usr install&lt;br /&gt;
Therefore, it's necessary to look inside the Makefile to be sure which form was used for the prefix.  For large, complex makefiles, the easiest way is to 'grep' the Makefile, like so:&lt;br /&gt;
 grep -i '^prefix \?=' Makefile{,.in}&lt;br /&gt;
The ''-i'' option makes the search case-insensitive and the ''{,.in}'' part at the end will search &amp;quot;Makefile&amp;quot; or &amp;quot;Makefile.in&amp;quot; files, the second one being a template for the &amp;quot;configure&amp;quot; script.  Grep's search term is a basic regular expression, so the escaped question mark after the space (\?) means there may or may not be a space in between when searching.&lt;br /&gt;
&lt;br /&gt;
Once in a while, there may be a &amp;quot;'''PREFIX ='''&amp;quot; in a Makefile that is not defined which you are to edit and supply the location. Use the usual ''/usr'' (or ''/usr/local''), in this case, and then use 'make PREFIX=$PKG/usr install' to install to the package's build location.&lt;br /&gt;
&lt;br /&gt;
=== Patching the Sources ===&lt;br /&gt;
&lt;br /&gt;
Sooner or later, there will be some reason to patch the source code prior to building a package, and you'll want to be able to do this automatically.  &lt;br /&gt;
&lt;br /&gt;
===== Obtaining the Patch =====&lt;br /&gt;
&lt;br /&gt;
In most cases, the patch will be provided by the author of the source code, so we're not going to discuss patch *creation* here.  Download the patch and place it in the same directory as the SlackBuild script, slack-desc file, and other related files (in $CWD from above).&lt;br /&gt;
 $ wget http://someapplication.org/files/patches/bigsecuritypatch.diff&lt;br /&gt;
It's not necessary to do the next step, but because developers generally want to conserve space if possible, it's conventional to do this:&lt;br /&gt;
 $ gzip -9 bigsecuritypatch.diff&lt;br /&gt;
This will result in a new file called bigsecuritypatch.diff.gz -- we'll use that in the SlackBuild script in just a moment.&lt;br /&gt;
&lt;br /&gt;
===== Applying the Patch =====&lt;br /&gt;
&lt;br /&gt;
You will now need to edit your &amp;lt;application&amp;gt;.SlackBuild script so that it applies the patch before it runs configure, make, and make install.  To do this, you'll want something like this to run before the configure script, but after extracting the sources:&lt;br /&gt;
 zcat $CWD/bigsecuritypatch.diff.gz | patch -p1 || exit&lt;br /&gt;
Depending on how the patch was created, you might use a different patchlevel on that line, as in:&lt;br /&gt;
 zcat $CWD/bigsecuritypatch.diff.gz | patch -p0 || exit&lt;br /&gt;
It's a bit beyond the scope of this HOWTO, but essentially, the -p# specifies the number of trailing directories to skip when looking for the file to patch.  You'll often need to skip the top-level directory, but not always (hence the -p0).&lt;br /&gt;
&lt;br /&gt;
= See Also =&lt;br /&gt;
&lt;br /&gt;
* [[SlackBuild_Scripts]]&lt;br /&gt;
* [[Different_Approach_To_Buildscripts]]&lt;br /&gt;
* [[Building_A_Package]]&lt;br /&gt;
* [[Slack-desc]]&lt;br /&gt;
* [[Checkinstall]]&lt;br /&gt;
* [[Compiling]]&lt;br /&gt;
&lt;br /&gt;
= SlackBuild Script Repositories =&lt;br /&gt;
&lt;br /&gt;
;* http://slackbuilds.org&lt;br /&gt;
;* http://www.slackware.com/~alien/slackbuilds/&lt;br /&gt;
;* http://slackbuilds.slackadelic.com/&lt;br /&gt;
;* http://slackbuilds.rlworkman.net/&lt;/div&gt;</summary>
		<author><name>Erik</name></author>
	</entry>
</feed>