Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 May 2023, 12:46
09. V 2023.
Sveži mozilla-firefox paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/mozilla-firefox-102.11.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.11.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-17/
https://www.cve.org/CVERecord?id=CVE-2023-32205
https://www.cve.org/CVERecord?id=CVE-2023-32206
https://www.cve.org/CVERecord?id=CVE-2023-32207
https://www.cve.org/CVERecord?id=CVE-2023-32211
https://www.cve.org/CVERecord?id=CVE-2023-32212
https://www.cve.org/CVERecord?id=CVE-2023-32213
https://www.cve.org/CVERecord?id=CVE-2023-32214
https://www.cve.org/CVERecord?id=CVE-2023-32215
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 May 2023, 12:46
10. V 2023.
Sveži mozilla-thunderbird paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/mozilla-thunderbird-102.11.0-i686-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.11.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-18/
https://www.cve.org/CVERecord?id=CVE-2023-32206
https://www.cve.org/CVERecord?id=CVE-2023-32207
https://www.cve.org/CVERecord?id=CVE-2023-32211
https://www.cve.org/CVERecord?id=CVE-2023-32212
https://www.cve.org/CVERecord?id=CVE-2023-32213
https://www.cve.org/CVERecord?id=CVE-2023-32214
https://www.cve.org/CVERecord?id=CVE-2023-32215
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 May 2023, 12:47
17. V 2023.
Sveži curl paketi za Slackware 14.0, 14.1, 14.2, 15.0 i -current:
Code: Select all
patches/packages/curl-8.1.0-i586-1_slack15.0.txz: Upgraded.
This update fixes security issues:
more POST-after-PUT confusion.
IDN wildcard match.
siglongjmp race condition.
UAF in SSH sha256 fingerprint check.
For more information, see:
https://curl.se/docs/CVE-2023-28322.html
https://curl.se/docs/CVE-2023-28321.html
https://curl.se/docs/CVE-2023-28320.html
https://curl.se/docs/CVE-2023-28319.html
https://www.cve.org/CVERecord?id=CVE-2023-28322
https://www.cve.org/CVERecord?id=CVE-2023-28321
https://www.cve.org/CVERecord?id=CVE-2023-28320
https://www.cve.org/CVERecord?id=CVE-2023-28319
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 20 May 2023, 12:48
19. V 2023.
Sveži cups-filters paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/cups-filters-1.28.17-i586-1_slack15.0.txz: Upgraded.
[PATCH] Merge pull request from GHSA-gpxc-v2m8-fr3x.
With execv() command line arguments are passed as separate strings and
not the full command line in a single string. This prevents arbitrary
command execution by escaping the quoting of the arguments in a job
with forged job title.
Thanks to marav.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-24805
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 28 May 2023, 18:31
22. V 2023.
Sveži c-ares paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/c-ares-1.19.1-i586-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues:
0-byte UDP payload causes Denial of Service.
Insufficient randomness in generation of DNS query IDs.
Buffer Underwrite in ares_inet_net_pton().
AutoTools does not set CARES_RANDOM_FILE during cross compilation.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-32067
https://www.cve.org/CVERecord?id=CVE-2023-31147
https://www.cve.org/CVERecord?id=CVE-2023-31130
https://www.cve.org/CVERecord?id=CVE-2023-31124
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 28 May 2023, 18:32
24. V 2023.
Sveži texlive paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/texlive-2023.230322-i586-1_slack15.0.txz: Upgraded.
This update patches a security issue:
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when
compiling a TeX file obtained from an untrusted source. This occurs
because luatex-core.lua lets the original io.popen be accessed. This also
affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
Thanks to Johannes Schoepfer.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-32700
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 28 May 2023, 18:33
25. V 2023.
Sveži ntfs-3g paketi za Slackware 14.2, 15.0 i -current:
Code: Select all
patches/packages/ntfs-3g-2022.10.3-i586-1_slack15.0.txz: Upgraded.
Fixed vulnerabilities that may allow an attacker using a maliciously
crafted NTFS-formatted image file or external storage to potentially
execute arbitrary privileged code or cause a denial of service.
Thanks to opty.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46790
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 27 Jun 2023, 20:03
30. V 2023.
Sveži openssl paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/openssl-1.1.1u-i586-1_slack15.0.txz: Upgraded.
This update fixes a security issue:
Possible DoS translating ASN.1 object identifiers.
For more information, see:
https://www.openssl.org/news/secadv/20230530.txt
https://www.cve.org/CVERecord?id=CVE-2023-2650
(* Security fix *)
patches/packages/openssl-solibs-1.1.1u-i586-1_slack15.0.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 27 Jun 2023, 20:05
02. VI 2023.
Sveži cups paketi za Slackware 14.2, 15.0 i -current:
Code: Select all
patches/packages/cups-2.4.3-i586-1_slack15.0.txz: Upgraded.
Fixed a heap buffer overflow in _cups_strlcpy(), when the configuration file
cupsd.conf sets the value of loglevel to DEBUG, that could allow a remote
attacker to launch a denial of service (DoS) attack, or possibly execute
arbirary code.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-32324
(* Security fix *)
Sveži ntp paketi za Slackware 14.0, 14.1, 14.2, 15.0 i -current:
Code: Select all
patches/packages/ntp-4.2.8p16-i586-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-26551
https://www.cve.org/CVERecord?id=CVE-2023-26552
https://www.cve.org/CVERecord?id=CVE-2023-26553
https://www.cve.org/CVERecord?id=CVE-2023-26554
https://www.cve.org/CVERecord?id=CVE-2023-26555
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

-
- Posts: 3401
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 27 Jun 2023, 20:06
06. VI 2023.
Sveži mozilla-firefox paketi za Slackware 15.0 i -current:
Code: Select all
patches/packages/mozilla-firefox-102.12.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.12.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-19/
https://www.cve.org/CVERecord?id=CVE-2023-34414
https://www.cve.org/CVERecord?id=CVE-2023-34416
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”

Who is online
Users browsing this forum: No registered users and 4 guests