Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 31 Jan 2019, 21:18
30.01.2019.
Sveži kernel paketi za Slackware 14.2:
Code: Select all
patches/packages/linux-4.4.172/*: Upgraded.
These updates fix various bugs and many (mostly minor) security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.159:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
Fixed in 4.4.160:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972
Fixed in 4.4.163:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281
Fixed in 4.4.164:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710
Fixed in 4.4.167:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
Fixed in 4.4.168:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12896
Fixed in 4.4.169:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
Fixed in 4.4.170:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
Fixed in 4.4.171:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612
Fixed in 4.4.172:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18249
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 04 Feb 2019, 20:31
01.02.2019.
Sveži mariadb paketi za Slackware 14.1 i 14.2:
Code: Select all
patches/packages/mariadb-10.0.38-i586-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Feb 2019, 17:12
06.02.2019.
Sveži curl paketi za Slackware 14.0, 14.1, 14.2 i -current:
Code: Select all
patches/packages/curl-7.64.0-i586-1_slack14.2.txz: Upgraded.
This release fixes the following security issues:
NTLM type-2 out-of-bounds buffer read.
NTLMv2 type-3 header stack buffer overflow.
SMTP end-of-response out-of-bounds read.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Feb 2019, 17:13
07.02.2019.
Sveži php paketi za Slackware 14.0, 14.1 i 14.2:
Code: Select all
patches/packages/php-5.6.40-i586-1_slack14.2.txz: Upgraded.
Several security bugs have been fixed in this release:
GD:
Fixed bug #77269 (efree() on uninitialized Heap data in imagescale leads
to use-after-free).
Fixed bug #77270 (imagecolormatch Out Of Bounds Write on Heap).
Mbstring:
Fixed bug #77370 (Buffer overflow on mb regex functions - fetch_token).
Fixed bug #77371 (heap buffer overflow in mb regex functions -
compile_string_node).
Fixed bug #77381 (heap buffer overflow in multibyte match_at).
Fixed bug #77382 (heap buffer overflow due to incorrect length in
expand_case_fold_string).
Fixed bug #77385 (buffer overflow in fetch_token).
Fixed bug #77394 (Buffer overflow in multibyte case folding - unicode).
Fixed bug #77418 (Heap overflow in utf32be_mbc_to_code).
Phar:
Fixed bug #77247 (heap buffer overflow in phar_detect_phar_fname_ext).
Xmlrpc:
Fixed bug #77242 (heap out of bounds read in xmlrpc_decode()).
Fixed bug #77380 (Global out of bounds read in xmlrpc base64 code).
For more information, see:
https://php.net/ChangeLog-5.php#5.6.40
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:10
13.02.2019.
Sveži mozilla-firefox paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/mozilla-firefox-60.5.1esr-i686-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18356
https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2019-5785
https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/#CVE-2018-18335
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:12
14.02.2019.
Sveži mozilla-thunderbird paketi za Slackware 14.2 i -current:
Code: Select all
patches/packages/mozilla-thunderbird-60.5.1-i686-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/60.5.1/releasenotes/
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18356
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2019-5785
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18335
https://www.mozilla.org/en-US/security/advisories/mfsa2019-06/#CVE-2018-18509
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:14
23.02.2019.
Sveži file paketi za Slackware 14.0, 14.1, 14.2. -current:
Code: Select all
patches/packages/file-5.36-i586-1_slack14.2.txz: Upgraded.
Fix out-of-bounds read and denial-of-service security issues:
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:15
26.02.2019.
Sveži openssl paketi za Slackware 14.2:
Code: Select all
patches/packages/openssl-1.0.2r-i586-1_slack14.2.txz: Upgraded.
Go into the error state if a fatal alert is sent or received. If an
application calls SSL_shutdown after a fatal alert has occured and
then behaves different based on error codes from that function then
the application may be vulnerable to a padding oracle.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559
(* Security fix *)
patches/packages/openssl-solibs-1.0.2r-i586-1_slack14.2.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:16
01.03.2019.
Sveži infozip paketi za Slackware 14.0, 14.1, 14.2. i -current:
Code: Select all
patches/packages/infozip-6.0-i586-4_slack14.2.txz: Rebuilt.
Added some patches that should fix extracting archives with non-latin
characters in the filenames. Thanks to saahriktu.
This update also fixes various security issues in zip and unzip.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 16 Mar 2019, 00:17
03.03.2019.
Sveži python paketi za Slackware 14.0, 14.1, 14.2. i -current:
Code: Select all
patches/packages/python-2.7.16-i586-1_slack14.2.txz: Upgraded.
Updated to the latest 2.7.x release, which fixes a few security issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: No registered users and 51 guests