Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 23 May 2016, 19:28
20.05.2016.
Novi curl paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:
Code: Select all
patches/packages/curl-7.49.0-i486-1_slack14.1.txz: Upgraded.
Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
For more information, see:
https://curl.haxx.se/docs/adv_20160518.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 May 2016, 15:38
24.05.2016.
Svež libarchive paket za Slackware 14.1 i -current:
Code: Select all
patches/packages/libarchive-3.1.2-i486-2_slack14.1.txz: Rebuilt.
Patched an issue with Zip archive handling that could allow an attacker
to overwrite parts of the heap in a controlled fashion and execute
arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 19 Jun 2016, 15:33
27.05.2016.
Novi libxml2, libxslt i php paketi za Slackware 14.0, 14.1 i -current:
Code: Select all
patches/packages/libxml2-2.9.4-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues:
Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
Format string vulnerability (CVE-2016-4448).
Inappropriate fetch of entities content (CVE-2016-4449).
For more information, see:
http://xmlsoft.org/news.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
(* Security fix *)
Code: Select all
patches/packages/libxslt-1.1.29-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and a security issue:
Fix for type confusion in preprocessing attributes (Daniel Veillard).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
(* Security fix *)
Code: Select all
patches/packages/php-5.6.22-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.22
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 19 Jun 2016, 15:35
30.05.2016.
Novi imagemagick i mozilla-thunderbird paketi za Slackware 14.0, 14.1 i -current:
Code: Select all
patches/packages/imagemagick-6.8.6_10-i486-3_slack14.1.txz: Rebuilt.
Removed popen() support to prevent another shell vulnerability. This
issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
(* Security fix *)
Code: Select all
patches/packages/mozilla-thunderbird-45.1.1-i486-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 19 Jun 2016, 15:37
03.06.2016.
Novi ntp paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:
Code: Select all
patches/packages/ntp-4.2.8p8-i486-1_slack14.1.txz: Upgraded.
This release patches one high and four low severity security issues:
CVE-2016-4957: Crypto-NAK crash
CVE-2016-4953: Bad authentication demobilizes ephemeral associations
CVE-2016-4954: Processing spoofed server packets
CVE-2016-4955: Autokey association reset
CVE-2016-4956: Broadcast interleave
For more information, see:
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 19 Jun 2016, 15:38
13.06.2016.
Novi wget paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:
Code: Select all
patches/packages/wget-1.18-i486-1_slack14.1.txz: Upgraded.
This version fixes a security vulnerability present in all old versions
of wget. On a server redirect from HTTP to a FTP resource, wget would
trust the HTTP server and use the name in the redirected URL as the
destination filename. This behaviour was changed and now it works
similarly as a redirect from HTTP to another HTTP resource so the original
name is used as the destination file. To keep the previous behaviour the
user must provide --trust-server-names.
The vulnerability was discovered by Dawid Golunski and was reported by
Beyond Security's SecuriTeam.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 22 Jun 2016, 15:43
20.06.2016.
Novi libarchive i pcre paketi za Slackware 14.1 i -current:
Code: Select all
patches/packages/libarchive-3.2.1-i486-1_slack14.1.txz: Upgraded.
This release fixes several critical bugs, including some with security
implications.
(* Security fix *)
Code: Select all
patches/packages/pcre-8.39-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs (including a couple of DoS security issues), and
retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 04 Jul 2016, 21:36
24.06.2016.
Ovo je update bio pre 14.2 i doneo je sveže php pakete za 14.0, 14.1 i -current:
Code: Select all
patches/packages/php-5.6.23-i486-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Jul 2016, 20:31
05.07.2016.
Sveži mozilla-thunderbird paketi za Slackware 14.1, 14.2 i -current:
Code: Select all
patches/packages/mozilla-thunderbird-45.2.0-i586-1_slack14.2.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Jul 2016, 20:32
07.07.2016.
Sveži samba paketi za Slackware 14.0, 14.1, 14.2 i -current:
Code: Select all
patches/packages/samba-4.4.5-i586-1_slack14.2.txz: Upgraded.
This release fixes a security issue:
Client side SMB2/3 required signing can be downgraded.
It's possible for an attacker to downgrade the required signing for an
SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can
impersonate a server being connected to by Samba, and return malicious
results.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: Google [Bot] and 90 guests