Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 08 Aug 2020, 19:59
31.07.2020.
Sveži mozilla-thunderbird paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/mozilla-thunderbird-68.11.0-i686-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/68.11.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2020-35/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 22 Aug 2020, 13:43
19.08.2020.
Sveži curl paketi za Slackware 14.0, 14.1, 14.2 i -current:
Code: Select all
patches/packages/curl-7.72.0-i586-1_slack14.2.txz: Upgraded.
This update fixes a security issue:
libcurl: wrong connect-only connection [98]
For more information, see:
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 22 Aug 2020, 13:44
21.08.2020.
Sveži bind paketi za Slackware 14.0, 14.1, 14.2 i -current:
Code: Select all
patches/packages/bind-9.11.22-i586-1_slack14.2.txz: Upgraded.
This update fixes three security issues:
"update-policy" rules of type "subdomain" were incorrectly treated as
"zonesub" rules, which allowed keys used in "subdomain" rules to update
names outside of the specified subdomains. The problem was fixed by making
sure "subdomain" rules are again processed as described in the ARM.
When BIND 9 was compiled with native PKCS#11 support, it was possible to
trigger an assertion failure in code determining the number of bits in the
PKCS#11 RSA public key with a specially crafted packet.
It was possible to trigger an assertion failure when verifying the response
to a TSIG-signed request.
For more information, see:
https://kb.isc.org/docs/cve-2020-8624
https://kb.isc.org/docs/cve-2020-8623
https://kb.isc.org/docs/cve-2020-8622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 02 Sep 2020, 15:24
24.08.2020.
Sveži mozilla-firefox paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/mozilla-firefox-68.12.0esr-i686-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/68.12.0/releasenotes/
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 Sep 2020, 13:14
04.09.2020.
Sveži gnutls paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/gnutls-3.6.15-i586-1_slack14.2.txz: Upgraded.
libgnutls: Fixed "no_renegotiation" alert handling at incorrect timing,
which could lead to an application crash.
[GNUTLS-SA-2020-09-04, CVSS: medium]
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 Sep 2020, 13:15
12.09.2020.
Sveži Mozilla-Thunderbird paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/mozilla-thunderbird-68.12.0-i686-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/68.12.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2020-40/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Oct 2020, 19:47
22.09.2020.
Sveži seamonkey paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/seamonkey-2.53.4-i686-1_slack14.2.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.4
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 Oct 2020, 18:06
20.10.2020.
Sveži freetype paketi za Slackware 14.0, 14.1, 14.2 i -current:
Code: Select all
patches/packages/freetype-2.6.3-i586-3_slack14.2.txz: Rebuilt.
Fix heap buffer overflow in embedded PNG bitmap handling.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 Oct 2020, 18:09
21.10.2020.
Svež
kernel za Slackware 14.2:
Code: Select all
patches/packages/linux-4.4.240/*: Upgraded.
These updates fix various bugs and security issues, including the recently
discovered "Bleeding Tooth" vulnerability in the Bluetooth subsystem
(CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490).
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.228:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810
Fixed in 4.4.229:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771
Fixed in 4.4.230:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393
Fixed in 4.4.232:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
Fixed in 4.4.233:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
Fixed in 4.4.234:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314
Fixed in 4.4.236:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
Fixed in 4.4.237:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
Fixed in 4.4.238:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643
Fixed in 4.4.239:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211
Fixed in 4.4.240:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 22 Nov 2020, 20:17
14.11.2020.
Sveži Seamonkey paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/seamonkey-2.53.5-i686-1_slack14.2.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.5
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: No registered users and 85 guests