Slackware Security Advisories (sigurnosne nadogradnje)

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Locked

Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 23 May 2016, 19:28


20.05.2016.

Novi curl paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:

Code: Select all

patches/packages/curl-7.49.0-i486-1_slack14.1.txz:  Upgraded.
  Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
  For more information, see:
    https://curl.haxx.se/docs/adv_20160518.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 25 May 2016, 15:38


24.05.2016.

Svež libarchive paket za Slackware 14.1 i -current:

Code: Select all

patches/packages/libarchive-3.1.2-i486-2_slack14.1.txz:  Rebuilt.
  Patched an issue with Zip archive handling that could allow an attacker
  to overwrite parts of the heap in a controlled fashion and execute
  arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 19 Jun 2016, 15:33


27.05.2016.

Novi libxml2, libxslt i php paketi za Slackware 14.0, 14.1 i -current:

Code: Select all

patches/packages/libxml2-2.9.4-i486-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues:
  Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
  Format string vulnerability (CVE-2016-4448).
  Inappropriate fetch of entities content (CVE-2016-4449).
  For more information, see:
    http://xmlsoft.org/news.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
  (* Security fix *)

Code: Select all

patches/packages/libxslt-1.1.29-i486-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and a security issue:
  Fix for type confusion in preprocessing attributes (Daniel Veillard).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
  (* Security fix *)

Code: Select all

patches/packages/php-5.6.22-i486-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.22
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 19 Jun 2016, 15:35


30.05.2016.

Novi imagemagick i mozilla-thunderbird paketi za Slackware 14.0, 14.1 i -current:

Code: Select all

patches/packages/imagemagick-6.8.6_10-i486-3_slack14.1.txz:  Rebuilt.
  Removed popen() support to prevent another shell vulnerability.  This
  issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
  (* Security fix *)

Code: Select all

patches/packages/mozilla-thunderbird-45.1.1-i486-1_slack14.1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 19 Jun 2016, 15:37


03.06.2016.

Novi ntp paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:

Code: Select all

patches/packages/ntp-4.2.8p8-i486-1_slack14.1.txz:  Upgraded.
  This release patches one high and four low severity security issues:
  CVE-2016-4957: Crypto-NAK crash
  CVE-2016-4953: Bad authentication demobilizes ephemeral associations
  CVE-2016-4954: Processing spoofed server packets
  CVE-2016-4955: Autokey association reset
  CVE-2016-4956: Broadcast interleave
  For more information, see:
    http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 19 Jun 2016, 15:38


13.06.2016.

Novi wget paketi za Slackware 13.0, 13.1, 13.37, 14.0, 14.1 i -current:

Code: Select all

patches/packages/wget-1.18-i486-1_slack14.1.txz:  Upgraded.
  This version fixes a security vulnerability present in all old versions
  of wget.  On a server redirect from HTTP to a FTP resource, wget would
  trust the HTTP server and use the name in the redirected URL as the
  destination filename.  This behaviour was changed and now it works
  similarly as a redirect from HTTP to another HTTP resource so the original
  name is used as the destination file.  To keep the previous behaviour the
  user must provide --trust-server-names.
  The vulnerability was discovered by Dawid Golunski and was reported by
  Beyond Security's SecuriTeam.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 22 Jun 2016, 15:43


20.06.2016.

Novi libarchive i pcre paketi za Slackware 14.1 i -current:

Code: Select all

patches/packages/libarchive-3.2.1-i486-1_slack14.1.txz:  Upgraded.
  This release fixes several critical bugs, including some with security
  implications.
  (* Security fix *)

Code: Select all

patches/packages/pcre-8.39-i486-1_slack14.1.txz:  Upgraded.
  This release fixes bugs (including a couple of DoS security issues), and
  retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 04 Jul 2016, 21:36


24.06.2016.

Ovo je update bio pre 14.2 i doneo je sveže php pakete za 14.0, 14.1 i -current:

Code: Select all

patches/packages/php-5.6.23-i486-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.23
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 10 Jul 2016, 20:31


05.07.2016.

Sveži mozilla-thunderbird paketi za Slackware 14.1, 14.2 i -current:

Code: Select all

patches/packages/mozilla-thunderbird-45.2.0-i586-1_slack14.2.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 10 Jul 2016, 20:32


07.07.2016.

Sveži samba paketi za Slackware 14.0, 14.1, 14.2 i -current:

Code: Select all

patches/packages/samba-4.4.5-i586-1_slack14.2.txz:  Upgraded.
  This release fixes a security issue:
  Client side SMB2/3 required signing can be downgraded.
  It's possible for an attacker to downgrade the required signing for an
  SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
  SMB2_SESSION_FLAG_IS_NULL flags.  This means that the attacker can
  impersonate a server being connected to by Samba, and return malicious
  results.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
  (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”


Locked

Who is online

Users browsing this forum: No registered users and 40 guests