LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 08-18-2011, 05:39 AM   #1
BlackRider
Member
 
Registered: Aug 2011
Posts: 295

Rep: Reputation: 101Reputation: 101
How long does a given version of Slackware have security support?


I was wondering what is the policy of Slackware.inc regarding old versions of Slackware and how long are these "obsolete" versions supposed to have security support.

I have made a quick search in the WWW with Teoma, but the most useful thing I have found is that Slackware 8.1 (2002) still has security updates. That makes for 9 years of support (take that, Red Hat!). However, this is not an ultimate answer.

Has Slackware.inc made an official claim in this regard? If I run Slackware 13.37 today, can I know when support for it will be dropped? Yeah, sure the recommendation is to always update to the last stable release, but many times updating for the shake of updating is not a good idea

Last edited by BlackRider; 08-18-2011 at 05:40 AM.
 
Click here to see the post LQ members have rated as the most helpful post in this thread.
Old 08-18-2011, 05:54 AM   #2
0men
Member
 
Registered: Mar 2011
Location: Brisbane
Distribution: Windows 10, Red Hat, Debian
Posts: 183

Rep: Reputation: 22
Pretty sure, i read on Linux Questions, not so long ago that support up to 8.1 is still supported

I dont think Pat would just drop support for his baby any time soon. Dont feel like you have to be at 13.37. I'm at 13.1 and my university (50,000 + students) have servers that run on 13.0 !!!

Security updates will be provided for 13.37 for a very very long time. Dont stress, and if you dont wanna move from 13.37 to whatever the next 13.** will be. Stick with 13.37 and just update security patches with slackpkg. Easy Peasy

Thank Pat for this

P.S sign up to the Slackware security email list... helps me
... think the links on the Slackware site

Last edited by 0men; 08-18-2011 at 06:04 AM.
 
Old 08-18-2011, 06:52 AM   #3
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,897

Rep: Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019
It's probably best to think of Slackware's security policy as 'best endeavours'.

If Pat becomes aware of a security issue (and occasionally you do have to prod him because he misses stuff ) and it's easy to patch then he tends to make it available for every version he can. However, if the patch would take too much effort to apply or he considers it too intrusive then he might decide it's better not to apply it.

You have to remember that Slackware is a small-scale operation and unlike Redhat Pat doesn't have a team of programmers sitting there back-porting bug-fixes. Anyone who is really serious about security will probably be better off with a distro that can throw more resource at the issue

This is not a criticism, it's just the way it is, and sometimes you may find you need to, er... take-up some of the Slack yourself.
(Sorry 'bout the pun)

Last edited by GazL; 08-18-2011 at 06:59 AM.
 
4 members found this post helpful.
Old 08-18-2011, 08:05 AM   #4
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Hi,

Quote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] bind (SSA:2011-224-01)

New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.


Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
patches/packages/bind-9.7.4-i486-1_slack13.37.txz: Upgraded.
This BIND update addresses a couple of security issues:
* named, set up to be a caching resolver, is vulnerable to a user
querying a domain with very large resource record sets (RRSets)
when trying to negatively cache the response. Due to an off-by-one
error, caching the response could cause named to crash. [RT #24650]
[CVE-2011-1910]
* Change #2912 (see CHANGES) exposed a latent bug in the DNS message
processing code that could allow certain UPDATE requests to crash
named. [RT #24777] [CVE-2011-2464]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename...=CVE-2011-1910
http://cve.mitre.org/cgi-bin/cvename...=CVE-2011-2464
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackwar...1_slack8.1.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackwar...1_slack9.0.tgz

cut the rest
Recent security notice from Slackware: security@slackware.com
I did abbreviate the output in the above quote.

Every Slackware user should sign up at Security Advisories
 
1 members found this post helpful.
Old 08-18-2011, 08:15 AM   #5
BlackRider
Member
 
Registered: Aug 2011
Posts: 295

Original Poster
Rep: Reputation: 101Reputation: 101
Quote:
I dont think Pat would just drop support for his baby any time soon. Dont feel like you have to be at 13.37. I'm at 13.1 and my university (50,000 + students) have servers that run on 13.0 !!!
I am not the kind of guy who is upgrading whenever he cans. If it were not for some hardware issues, I would still use Debian Lenny until security support came to an end. The only reason why I am using Slackware is because the current Debian release is a regression from what Debian 5 was. Chances are that I will run Slackware 13.37 in this machine until the PC falls apart or I update the hardware itself.

This does not mean that I won't subscribe to test every release on a testing partition. Want a piece of advise? Always dual-boot. If you break your main OS, you will have somewhere to fallback.

Quote:
You have to remember that Slackware is a small-scale operation and unlike Redhat Pat doesn't have a team of programmers sitting there back-porting bug-fixes. Anyone who is really serious about security will probably be better off with a distro that can throw more resource at the issue
Good to know. I already suspected that security was not a priority for Slackware.inc because some details, like the X server listening for incoming tcp connections by default. Well, it is still better than some other distributions that have not security service at all.

As I see it, the problem with security in Slackware is not the main components themselves, but the third party software you install. If you install stuff from SlackBuilds.org and a day later upstream authors publish a security fix, then you surely will have to wait until the SlackBuild is updated or update it by yourself... and this is if we suppose that we know that upstream has released this security fix...

Quote:
P.S sign up to the Slackware security email list.
I did that just after I finished mi install :-)


The main question, however, remains opened. It is not that I have high security requirements -in fact, I don't have them even when I use to take measures like I was holding the launch codes of the nuclear warheads of a powerful country. I think that it is a reasonable question: if I install this thing now, how long will it be seriously supported? I mean, I don't think Slackware.inc would start backporting security fixes to Slackware 1.0 even if they could do it easily. There is a limit to the number of Slackware versions that can be supported at the same time.

By the way, is there any centralized and trustworthy site that tracks security exploits and patches? Just curiosity.
 
Old 08-18-2011, 08:30 AM   #6
SeRi@lDiE
Member
 
Registered: Jun 2006
Location: /dev/null
Distribution: Slackware 13.1, Slackware 13.37, aptosid, rhel
Posts: 547
Blog Entries: 7

Rep: Reputation: 55
Quote:
Originally Posted by BlackRider View Post
I am not the kind of guy who is upgrading whenever he cans. If it were not for some hardware issues, I would still use Debian Lenny until security support came to an end. The only reason why I am using Slackware is because the current Debian release is a regression from what Debian 5 was. Chances are that I will run Slackware 13.37 in this machine until the PC falls apart or I update the hardware itself.

This does not mean that I won't subscribe to test every release on a testing partition. Want a piece of advise? Always dual-boot. If you break your main OS, you will have somewhere to fallback.



Good to know. I already suspected that security was not a priority for Slackware.inc because some details, like the X server listening for incoming tcp connections by default. Well, it is still better than some other distributions that have not security service at all.

As I see it, the problem with security in Slackware is not the main components themselves, but the third party software you install. If you install stuff from SlackBuilds.org and a day later upstream authors publish a security fix, then you surely will have to wait until the SlackBuild is updated or update it by yourself... and this is if we suppose that we know that upstream has released this security fix...



I did that just after I finished mi install :-)


The main question, however, remains opened. It is not that I have high security requirements -in fact, I don't have them even when I use to take measures like I was holding the launch codes of the nuclear warheads of a powerful country. I think that it is a reasonable question: if I install this thing now, how long will it be seriously supported? I mean, I don't think Slackware.inc would start backporting security fixes to Slackware 1.0 even if they could do it easily. There is a limit to the number of Slackware versions that can be supported at the same time.

By the way, is there any centralized and trustworthy site that tracks security exploits and patches? Just curiosity.
It is up to the end user to keep up with any 3rd party software security patches. This is the case for any OS.
Slackware will patch the base OS. Anything not included in the base than is consider 3rd party and it will be up to you to update. I keep up with my patches on my own of those pkgs that I install manually via slackbuilds or just compiling... I keep a list and track on a monthly basis... Why does it matter what versions they go back to support? if you are concern that 8 month from now they will stop releasing patches or deprecate the version like ubuntu or fedora will than dont because Slackware versions stick for a while. I am not sure what you mean by seriously supported? I am sure is not a joke to Pat to release patches for hes OS Slackware even to 8.1

As far as keeping up with security go to http://packetstormsecurity.org/
 
Old 08-18-2011, 09:02 AM   #7
allend
LQ 5k Club
 
Registered: Oct 2003
Location: Melbourne
Distribution: Slackware64-15.0
Posts: 6,371

Rep: Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749Reputation: 2749
Quote:
I already suspected that security was not a priority for Slackware.inc because some details, like the X server listening for incoming tcp connections by default.
Sorry, but that is false.
http://www.linuxquestions.org/questi...9/#post4000349
 
Old 08-18-2011, 09:38 AM   #8
0men
Member
 
Registered: Mar 2011
Location: Brisbane
Distribution: Windows 10, Red Hat, Debian
Posts: 183

Rep: Reputation: 22
Lol.... Really,

"I already suspected that security was not a priority for Slackware.inc because some details, like the X server listening for incoming tcp connections by default."

Maybe you should read a bit more before you bag Slackware mate. If you cant handle Slackware than move on. Slackware gives you a blank canvas to work on. Its not a whole install/ready to go thing(if you want that than try...... WINDOWS!!!

Its up to you to make your machine as secure as possible, not Pats, or anyone else on the Slack team. It doesn't matter if you run RedHat, which has Programmers etc working 24/7...... if someone wants to get into your system, trust me, they will !

Its up to YOU to protect your system no matter what operating system your running. No OS is going to tell you "hey BlackRider, i think you system is vulnerable, Hey BlackRider i think you've got a rootkit, hey BlackRider theres some program running on port (blah) that listening for some unknown service called NC ". Its up to you to always be in the "know" which new exploits and techniques may compromise or give unwilling information about your system to crackers.

PacketStorm
&
Exploit database (if you can read code)

Are good places to start.
 
0 members found this post helpful.
Old 08-18-2011, 10:25 AM   #9
brianL
LQ 5k Club
 
Registered: Jan 2006
Location: Oldham, Lancs, England
Distribution: Slackware64 15; SlackwareARM-current (aarch64); Debian 12
Posts: 8,298
Blog Entries: 61

Rep: Reputation: Disabled
Have a look at sbopkg for installing and updating SlackBuilds.

http://sbopkg.org/
 
Old 08-18-2011, 11:24 AM   #10
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,897

Rep: Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019Reputation: 5019
Quote:
Originally Posted by BlackRider View Post
if I install this thing now, how long will it be seriously supported? .
It's not an easy question to answer. Take a look at the latest release: Unless you've taken some action of your own you'll still be running kernel 2.6.37.6 for which upstream security bug provision has already ceased. In fact it ceased somewhere around the time 13.37 actually came out. So if you take a hard-line, black & white stance, you could argue that: as Slackware doesn't have a kernel team back-porting fixes, even the latest release can already be considered as 'unsupported' - at least in-part. Of course, in the real world everything is shades of grey and it's not quite that simple. If a really significant issue came up, then I'm sure Pat would bump the stock kernel, but it's clear that he puts more value on stability than minor security issues, at least when it comes to the kernel.

Being one of the tin-foil hat brigade, I don't share this view and find it a little too conservative, But while I don't share it, I do understand it.


Oh, as for keeping an eye on things. I tend to look at the daily security reports on lwn.net, see what the other distro's are patching and if after reading the CVE it seems like something that's applicable to Slackware, and Pat doesn't provide it in patches/ I do my own local updates until he does.

At the moment I have 3:fairly recent ones.
/var/log/packages/dbus-1.4.14-x86_64-1_patch13.37
/var/log/packages/freetype-2.4.6-x86_64-1_patch13.37
/var/log/packages/libXfont-1.4.4-x86_64-1_patch13.37

Last edited by GazL; 08-18-2011 at 11:28 AM.
 
1 members found this post helpful.
Old 08-18-2011, 02:02 PM   #11
BlackRider
Member
 
Registered: Aug 2011
Posts: 295

Original Poster
Rep: Reputation: 101Reputation: 101
Well, I use to compile my own kernels and forget about stock ones, so this is less a matter for me, but I get the point.

Mr. brianL, I already knew about sbopkg. The problem with slackbuids is that there is no way to ensure that the builds they post have the latest fixes. I has been recently posted in the mailing list that the clamav version is very outdated, for example, and that the script was not "so easy" to make work with the last version of clamav. OK, I have a brain and I can build this software by myself (it is what I did), but sbopkg would install the old version that still remains in SlackBuild.org. I guess this can happen with many other pieces of software.

Also, my claim about third party software is still valid. I have never said that someone else is responsible of what I install from outside the official DVD. The fact, however, is that with Slackware I end installing more external software that with any other distribution. In Debian, I had four self-made packages. In Slackware, I have about twenty. I even use to take the source for some official packages and recompile it to fit my needs. This means that there are 20 packages that won't have security support unless I provide it by myself, but this is something I already knew when I did install them.

Thanks for the links. I am having a look at them right now.
 
Old 08-18-2011, 02:35 PM   #12
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,097

Rep: Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174
clamav is a special case for slackbuilds.org, because it's without maintainer at the moment: in every other case, best practice should be to contact the maintainer if you spot some security fixes.
To avoid sbopkg updating your custom packages, have a look at this Chess' post.

Last edited by ponce; 08-18-2011 at 02:50 PM.
 
Old 08-18-2011, 04:27 PM   #13
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,504

Rep: Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461Reputation: 8461
Quote:
Originally Posted by BlackRider View Post
Good to know. I already suspected that security was not a priority for Slackware.inc because some details, like the X server listening for incoming tcp connections by default. Well, it is still better than some other distributions that have not security service at all.
Actually, security is a major priority, but you have to understand the approach that we take. Slackware is not the home for abandoned software. If upstream doesn't care to create security fixes, we're not likely to. If security is neglected by a given project, we're likely to drop it from Slackware. But, that's not always possible either.

In the case of the X server, perhaps someone might ask X.Org why that's the default? If they change it, then it won't be like that in Slackware. Also, consider that a lot of CVEs that are published are for rather low level issues. I can't count the number of times there was a CVE for a possible but unlikely issue like a denial of service, and the "fix" introduced a much more serious problem that was more likely to cause a denial of service than the originally reported bug.

I'm also pretty careful about not futzing with stuff needlessly, and this leads to better security than if I were to be absorbing all kinds of feature addition or other patches that aren't from upstream. No need to be changing the key generation in OpenSSL to screw up the salt...
 
6 members found this post helpful.
Old 08-18-2011, 05:12 PM   #14
BlackRider
Member
 
Registered: Aug 2011
Posts: 295

Original Poster
Rep: Reputation: 101Reputation: 101
Quote:
I'm also pretty careful about not futzing with stuff needlessly, and this leads to better security than if I were to be absorbing all kinds of feature addition or other patches that aren't from upstream. No need to be changing the key generation in OpenSSL to screw up the salt...
It looks like Debian won't set itself free from this damnation. The OpenSSL issue will be brought up to any security related discussion, it seems :-)

This thread is perpetuating itself while arriving nowhere. That is not to say it is not interesting or useful, but my mind is set up in stubborn_draft_horse_mode and it forces me to walk towards my objective without straying apart from my path.

I will make the same question with other words.

Which criteria dictated that Slackware < 8.1 is not worth more security fixes, while Slackware => 8.1 is still supported?
 
Old 08-18-2011, 07:51 PM   #15
Lufbery
Senior Member
 
Registered: Aug 2006
Location: Harrisburg, PA
Distribution: Slackware 64 14.2
Posts: 1,180
Blog Entries: 29

Rep: Reputation: 135Reputation: 135
Thanks, Pat, for chiming in.

Mozilla seems to be throwing a monkey wrench into things, though. I can't get the latest Seamonkey to build on Slackware 13.1. It requires a newer version of Cairo than what comes with 13.1.

I think that upgrading Cairo would require rebuilding Firefox and Thunderbird too.

For that matter, while new versions of Firefox and Thunderbird are making it into the -current branch, I haven't seen them in the older versions of the stable branch. Again, I think this is less of an issue because Firefox 3.6 and Thunderbird 3.1 are still supported.

Still, it would be great if the latest versions of those three packages -- with all the security updates -- would be available for older versions of Slackware.

Regards,
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
10.3 suse -- how long will support last now 11.0 is out 1kyle SUSE / openSUSE 6 10-19-2008 06:45 AM
CPU does not support long mode - version issue? mweiss Linux - General 3 07-23-2007 01:23 PM
How long does Mr. Pat V support older versions of Slackware? Old_Fogie Slackware 4 06-07-2006 01:47 PM
what mysql version does support NDBCLUSTER for slackware flatform sardonyx Linux - Software 0 04-18-2006 01:35 AM
Slackware security updates - for how long? Nobber Slackware 12 04-03-2006 11:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 06:25 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration