Novosti u *current* -u

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Post Reply

Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 29 Sep 2016, 14:32


Slackware 64-bit

Code: Select all

Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz: Upgraded.
       This package provides the latest timezone updates.
l/mpfr-3.1.5-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz: Upgraded.
       This package provides the latest timezone updates.
l/mpfr-3.1.5-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 02 Oct 2016, 19:00


Slackware 64-bit

Code: Select all

Sat Oct 1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.23-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.23-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.23-x86_64-1.txz: Upgraded.
a/lvm2-2.02.166-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.23-x86-1.txz: Upgraded.
k/kernel-source-4.4.23-noarch-1.txz: Upgraded.
n/mutt-1.7.0-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-45.4.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Sat Oct 1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.23-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.23-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.23-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/lvm2-2.02.166-i586-1.txz: Upgraded.
d/kernel-headers-4.4.23_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.23_smp-noarch-1.txz: Upgraded.
n/mutt-1.7.0-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.4.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
extra/linux-4.4.23-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 01 Nov 2016, 09:42


Slackware 64-bit

Code: Select all

Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-x86_64-1.txz: Upgraded.
a/kernel-generic-4.4.29-x86_64-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-huge-4.4.29-x86_64-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-modules-4.4.29-x86_64-1.txz: Upgraded.
ap/mariadb-10.0.28-x86_64-1.txz: Upgraded.
       This update fixes several security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
       (* Security fix *)
d/gdb-7.12-x86_64-1.txz: Upgraded.
d/guile-2.0.13-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.29-x86-1.txz: Upgraded.
k/kernel-source-4.4.29-noarch-1.txz: Upgraded.
       This kernel fixes a security issue known as "Dirty COW". A race
       condition was found in the way the Linux kernel's memory subsystem
       handled the copy-on-write (COW) breakage of private read-only
       memory mappings. An unprivileged local user could use this flaw to
       gain write access to otherwise read-only memory mappings and thus
       increase their privileges on the system.
       For more information, see:
       https://dirtycow.ninja/
       https://www.kb.cert.org/vuls/id/243144
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
       (* Security fix *)
l/libcdio-0.94-x86_64-1.txz: Upgraded.
n/nmap-7.30-x86_64-1.txz: Upgraded.
n/php-5.6.27-x86_64-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.27
       (* Security fix *)
x/libX11-1.6.4-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory read in XGetImage() or write in XListFonts().
       Affected versions libX11 <= 1.6.3.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
       (* Security fix *)
x/libXfixes-5.0.3-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause an integer
       overflow on 32 bit architectures.
       Affected versions : libXfixes <= 5.0.2.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
       (* Security fix *)
x/libXi-1.7.8-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected versions libXi <= 1.7.6.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
       (* Security fix *)
x/libXrandr-1.5.1-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected versions: libXrandr <= 1.5.0.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
       (* Security fix *)
x/libXrender-0.9.10-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected version: libXrender <= 0.9.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
       (* Security fix *)
x/libXtst-1.2.3-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected version libXtst <= 1.2.2. 
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
       (* Security fix *)
x/libXv-1.0.11-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory and memory corruption.
       Affected version libXv <= 1.0.10.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
       (* Security fix *)
x/libXvMC-1.0.10-x86_64-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause a one byte buffer
       read underrun.
       Affected version: libXvMC <= 1.0.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953 
       (* Security fix *)
xap/mozilla-firefox-49.0.2-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/xscreensaver-5.36-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-i586-1.txz: Upgraded.
a/kernel-generic-4.4.29-i586-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-generic-smp-4.4.29_smp-i686-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-huge-4.4.29-i586-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-huge-smp-4.4.29_smp-i686-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-modules-4.4.29-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.29_smp-i686-1.txz: Upgraded.
ap/mariadb-10.0.28-i586-1.txz: Upgraded.
       This update fixes several security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
       (* Security fix *)
d/gdb-7.12-i586-1.txz: Upgraded.
d/guile-2.0.13-i586-1.txz: Upgraded.
d/kernel-headers-4.4.29_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.29_smp-noarch-1.txz: Upgraded.
       This kernel fixes a security issue known as "Dirty COW". A race
       condition was found in the way the Linux kernel's memory subsystem
       handled the copy-on-write (COW) breakage of private read-only
       memory mappings. An unprivileged local user could use this flaw to
       gain write access to otherwise read-only memory mappings and thus
       increase their privileges on the system.
       For more information, see:
       https://dirtycow.ninja/
       https://www.kb.cert.org/vuls/id/243144
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
       (* Security fix *)
l/libcdio-0.94-i586-1.txz: Upgraded.
n/nmap-7.30-i586-1.txz: Upgraded.
n/php-5.6.27-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.27
       (* Security fix *)
x/libX11-1.6.4-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory read in XGetImage() or write in XListFonts().
       Affected versions libX11 <= 1.6.3.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
       (* Security fix *)
x/libXfixes-5.0.3-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause an integer
       overflow on 32 bit architectures.
       Affected versions : libXfixes <= 5.0.2.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
       (* Security fix *)
x/libXi-1.7.8-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected versions libXi <= 1.7.6.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
       (* Security fix *)
x/libXrandr-1.5.1-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected versions: libXrandr <= 1.5.0.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
       (* Security fix *)
x/libXrender-0.9.10-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected version: libXrender <= 0.9.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
       (* Security fix *)
x/libXtst-1.2.3-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected version libXtst <= 1.2.2.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
       (* Security fix *)
x/libXv-1.0.11-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory and memory corruption.
       Affected version libXv <= 1.0.10.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
       (* Security fix *)
x/libXvMC-1.0.10-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause a one byte buffer
       read underrun.
       Affected version: libXvMC <= 1.0.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
       (* Security fix *)
xap/mozilla-firefox-49.0.2-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/xscreensaver-5.36-i586-1.txz: Upgraded.
extra/linux-4.4.29-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 3953
Joined: 04 Feb 2011, 20:32
Location: Beograd
Contact:

Post Napisano: 01 Nov 2016, 13:52


Ovo ažuriranje sadrži ispravku za "Dirty COW" propust i nekoliko siguronosnih ispravki za X11. Moja preporuka je da ga instalirate što je pre moguće.



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 06 Nov 2016, 19:51


Slackware 64-bit

Code: Select all

Fri Nov 4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz: Upgraded.
ap/nano-2.7.1-x86_64-1.txz: Upgraded.
ap/vim-8.0.0055-x86_64-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-x86_64-2.txz: Rebuilt.
n/bind-9.10.4_P4-x86_64-1.txz: Upgraded.
       This update fixes a denial-of-service vulnerability. A defect in BIND's
       handling of responses containing a DNAME answer can cause a resolver to exit
       after encountering an assertion failure in db.c or resolver.c. A server
       encountering either of these error conditions will stop, resulting in denial
       of service to clients. The risk to authoritative servers is minimal;
       recursive servers are chiefly at risk.
       For more information, see:
       https://kb.isc.org/article/AA-01434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
       (* Security fix *)
n/curl-7.51.0-x86_64-1.txz: Upgraded.
       This release fixes security issues:
       CVE-2016-8615: cookie injection for other servers
       CVE-2016-8616: case insensitive password comparison
       CVE-2016-8617: OOB write via unchecked multiplication
       CVE-2016-8618: double-free in curl_maprintf
       CVE-2016-8619: double-free in krb5 code
       CVE-2016-8620: glob parser write/read out of bounds
       CVE-2016-8621: curl_getdate read out of bounds
       CVE-2016-8622: URL unescape heap overflow via integer truncation
       CVE-2016-8623: Use-after-free via shared cookies
       CVE-2016-8624: invalid URL parsing with '#'
       CVE-2016-8625: IDNA 2003 makes curl use wrong host
       For more information, see:
       https://curl.haxx.se/docs/adv_20161102A.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
       https://curl.haxx.se/docs/adv_20161102B.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
       https://curl.haxx.se/docs/adv_20161102C.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
       https://curl.haxx.se/docs/adv_20161102D.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
       https://curl.haxx.se/docs/adv_20161102E.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
       https://curl.haxx.se/docs/adv_20161102F.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
       https://curl.haxx.se/docs/adv_20161102G.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
       https://curl.haxx.se/docs/adv_20161102H.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
       https://curl.haxx.se/docs/adv_20161102I.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
       https://curl.haxx.se/docs/adv_20161102J.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
       https://curl.haxx.se/docs/adv_20161102K.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
       (* Security fix *)
xap/gnuchess-6.2.4-x86_64-1.txz: Upgraded.
xap/vim-gvim-8.0.0055-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Fri Nov 4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz: Upgraded.
ap/nano-2.7.1-i586-1.txz: Upgraded.
ap/vim-8.0.0055-i586-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-i586-2.txz: Rebuilt.
n/bind-9.10.4_P4-i586-1.txz: Upgraded.
       This update fixes a denial-of-service vulnerability. A defect in BIND's
       handling of responses containing a DNAME answer can cause a resolver to exit
       after encountering an assertion failure in db.c or resolver.c. A server
       encountering either of these error conditions will stop, resulting in denial
       of service to clients. The risk to authoritative servers is minimal;
       recursive servers are chiefly at risk.
       For more information, see:
       https://kb.isc.org/article/AA-01434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
       (* Security fix *)
n/curl-7.51.0-i586-1.txz: Upgraded.
       This release fixes security issues:
       CVE-2016-8615: cookie injection for other servers
       CVE-2016-8616: case insensitive password comparison
       CVE-2016-8617: OOB write via unchecked multiplication
       CVE-2016-8618: double-free in curl_maprintf
       CVE-2016-8619: double-free in krb5 code
       CVE-2016-8620: glob parser write/read out of bounds
       CVE-2016-8621: curl_getdate read out of bounds
       CVE-2016-8622: URL unescape heap overflow via integer truncation
       CVE-2016-8623: Use-after-free via shared cookies
       CVE-2016-8624: invalid URL parsing with '#'
       CVE-2016-8625: IDNA 2003 makes curl use wrong host
       For more information, see:
       https://curl.haxx.se/docs/adv_20161102A.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
       https://curl.haxx.se/docs/adv_20161102B.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
       https://curl.haxx.se/docs/adv_20161102C.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
       https://curl.haxx.se/docs/adv_20161102D.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
       https://curl.haxx.se/docs/adv_20161102E.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
       https://curl.haxx.se/docs/adv_20161102F.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
       https://curl.haxx.se/docs/adv_20161102G.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
       https://curl.haxx.se/docs/adv_20161102H.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
       https://curl.haxx.se/docs/adv_20161102I.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
       https://curl.haxx.se/docs/adv_20161102J.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
       https://curl.haxx.se/docs/adv_20161102K.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
       (* Security fix *)
xap/gnuchess-6.2.4-i586-1.txz: Upgraded.
xap/vim-gvim-8.0.0055-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 20 Nov 2016, 16:49


Slackware 64-bit

Code: Select all

Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-x86_64-2.txz: Rebuilt.
       Reverted a speedup patch that is causing regressions when output is directed
       to /dev/null. Thanks to SeB.
+--------------------------+
Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-x86_64-1.txz: Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.32-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.32-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.32-x86_64-1.txz: Upgraded.
ap/ghostscript-9.20-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.32-x86-1.txz: Upgraded.
k/kernel-source-4.4.32-noarch-1.txz: Upgraded.
n/nmap-7.31-x86_64-1.txz: Upgraded.
n/samba-4.5.1-x86_64-1.txz: Upgraded.
x/freeglut-3.0.0-x86_64-1.txz: Upgraded.
x/libXfont2-2.0.1-x86_64-1.txz: Added.
x/libdrm-2.4.73-x86_64-1.txz: Upgraded.
x/libxcb-1.12-x86_64-1.txz: Upgraded.
x/mesa-13.0.1-x86_64-1.txz: Upgraded.
x/xcb-proto-1.12-x86_64-1.txz: Upgraded.
x/xcb-util-cursor-0.1.3-x86_64-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-x86_64-10.txz: Rebuilt.
x/xf86-input-evdev-2.10.4-x86_64-1.txz: Upgraded.
x/xf86-input-joystick-1.6.3-x86_64-1.txz: Upgraded.
x/xf86-input-keyboard-1.9.0-x86_64-1.txz: Upgraded.
x/xf86-input-mouse-1.9.2-x86_64-1.txz: Upgraded.
x/xf86-input-penmount-1.5.0-x86_64-10.txz: Rebuilt.
x/xf86-input-synaptics-1.9.0-x86_64-1.txz: Upgraded.
x/xf86-input-vmmouse-13.1.0-x86_64-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-x86_64-10.txz: Rebuilt.
x/xf86-input-wacom-0.33.0-x86_64-2.txz: Rebuilt.
x/xf86-video-amdgpu-1.2.0-x86_64-1.txz: Upgraded.
x/xf86-video-apm-1.2.5-x86_64-9.txz: Rebuilt.
x/xf86-video-ark-0.7.5-x86_64-9.txz: Rebuilt.
x/xf86-video-ast-1.1.5-x86_64-3.txz: Rebuilt.
x/xf86-video-ati-7.8.0-x86_64-1.txz: Upgraded.
x/xf86-video-chips-1.2.6-x86_64-2.txz: Removed.
x/xf86-video-cirrus-1.5.3-x86_64-3.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-x86_64-6.txz: Rebuilt.
x/xf86-video-glint-1.2.8-x86_64-8.txz: Removed.
x/xf86-video-i128-1.3.6-x86_64-9.txz: Rebuilt.
x/xf86-video-i740-1.3.5-x86_64-3.txz: Removed.
x/xf86-video-intel-git_20161115_a1a0f76-x86_64-1.txz: Upgraded.
x/xf86-video-mach64-6.9.5-x86_64-3.txz: Rebuilt.
x/xf86-video-mga-1.6.4-x86_64-3.txz: Removed.
x/xf86-video-neomagic-1.2.9-x86_64-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.13-x86_64-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-x86_64-9.txz: Removed.
x/xf86-video-openchrome-0.5.0-x86_64-2.txz: Rebuilt.
x/xf86-video-r128-6.10.1-x86_64-1.txz: Removed.
x/xf86-video-rendition-4.2.6-x86_64-2.txz: Rebuilt.
x/xf86-video-s3-0.6.5-x86_64-9.txz: Rebuilt.
x/xf86-video-s3virge-1.10.7-x86_64-3.txz: Rebuilt.
x/xf86-video-savage-2.3.8-x86_64-2.txz: Removed.
x/xf86-video-siliconmotion-1.7.8-x86_64-2.txz: Removed.
x/xf86-video-sis-0.10.8-x86_64-2.txz: Removed.
x/xf86-video-sisusb-0.9.6-x86_64-9.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-x86_64-3.txz: Removed.
x/xf86-video-tga-1.2.2-x86_64-9.txz: Rebuilt.
x/xf86-video-trident-1.3.7-x86_64-3.txz: Removed.
x/xf86-video-tseng-1.2.5-x86_64-9.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-x86_64-14.txz: Rebuilt.
x/xf86-video-vesa-2.3.4-x86_64-3.txz: Rebuilt.
x/xf86-video-vmware-13.2.1-x86_64-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-x86_64-10.txz: Rebuilt.
x/xf86-video-xgi-1.6.1-x86_64-2.txz: Removed.
x/xf86-video-xgixp-1.8.1-x86_64-8.txz: Removed.
x/xorg-server-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xephyr-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-1.19.0-x86_64-1.txz: Upgraded.
x/xproto-7.0.31-noarch-1.txz: Upgraded.
x/xterm-326-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-50.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
extra/tigervnc/tigervnc-1.7.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Slackware 32-bit

Code: Select all

Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-i586-2.txz: Rebuilt.
       Reverted a speedup patch that is causing regressions when output is directed
       to /dev/null. Thanks to SeB.
+--------------------------+
Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-i586-1.txz: Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.32-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.32-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.32-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.32_smp-i686-1.txz: Upgraded.
ap/ghostscript-9.20-i586-1.txz: Upgraded.
d/kernel-headers-4.4.32_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.32_smp-noarch-1.txz: Upgraded.
n/nmap-7.31-i586-1.txz: Upgraded.
n/samba-4.5.1-i586-1.txz: Upgraded.
x/freeglut-3.0.0-i586-1.txz: Upgraded.
x/libXfont2-2.0.1-i586-1.txz: Added.
x/libdrm-2.4.73-i586-1.txz: Upgraded.
x/libxcb-1.12-i586-1.txz: Upgraded.
x/mesa-13.0.1-i586-1.txz: Upgraded.
x/xcb-proto-1.12-i586-1.txz: Upgraded.
x/xcb-util-cursor-0.1.3-i586-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-evdev-2.10.4-i586-1.txz: Upgraded.
x/xf86-input-joystick-1.6.3-i586-1.txz: Upgraded.
x/xf86-input-keyboard-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-mouse-1.9.2-i586-1.txz: Upgraded.
x/xf86-input-penmount-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-synaptics-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-vmmouse-13.1.0-i586-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-i586-10.txz: Rebuilt.
x/xf86-input-wacom-0.33.0-i586-2.txz: Rebuilt.
x/xf86-video-amdgpu-1.2.0-i586-1.txz: Upgraded.
x/xf86-video-apm-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-ark-0.7.5-i586-9.txz: Rebuilt.
x/xf86-video-ast-1.1.5-i586-3.txz: Rebuilt.
x/xf86-video-ati-7.8.0-i586-1.txz: Upgraded.
x/xf86-video-chips-1.2.6-i586-2.txz: Removed.
x/xf86-video-cirrus-1.5.3-i586-3.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-i586-6.txz: Rebuilt.
x/xf86-video-geode-2.11.18-i586-2.txz: Rebuilt.
x/xf86-video-glint-1.2.8-i586-8.txz: Removed.
x/xf86-video-i128-1.3.6-i586-9.txz: Rebuilt.
x/xf86-video-i740-1.3.5-i586-3.txz: Removed.
x/xf86-video-intel-git_20161115_a1a0f76-i686-1.txz: Upgraded.
x/xf86-video-mach64-6.9.5-i586-3.txz: Rebuilt.
x/xf86-video-mga-1.6.4-i586-3.txz: Removed.
x/xf86-video-neomagic-1.2.9-i586-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.13-i586-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-i586-9.txz: Removed.
x/xf86-video-openchrome-0.5.0-i586-2.txz: Rebuilt.
x/xf86-video-r128-6.10.1-i586-1.txz: Removed.
x/xf86-video-rendition-4.2.6-i586-2.txz: Rebuilt.
x/xf86-video-s3-0.6.5-i586-9.txz: Rebuilt.
x/xf86-video-s3virge-1.10.7-i586-3.txz: Rebuilt.
x/xf86-video-savage-2.3.8-i586-2.txz: Removed.
x/xf86-video-siliconmotion-1.7.8-i586-2.txz: Removed.
x/xf86-video-sis-0.10.8-i586-2.txz: Removed.
x/xf86-video-sisusb-0.9.6-i586-9.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-i586-3.txz: Removed.
x/xf86-video-tga-1.2.2-i586-9.txz: Rebuilt.
x/xf86-video-trident-1.3.7-i586-3.txz: Removed.
x/xf86-video-tseng-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-i586-14.txz: Rebuilt.
x/xf86-video-vesa-2.3.4-i586-3.txz: Rebuilt.
x/xf86-video-vmware-13.2.1-i586-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-i586-10.txz: Rebuilt.
x/xf86-video-xgi-1.6.1-i586-2.txz: Removed.
x/xf86-video-xgixp-1.8.1-i586-8.txz: Removed.
x/xorg-server-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.19.0-i586-1.txz: Upgraded.
x/xproto-7.0.31-noarch-1.txz: Upgraded.
x/xterm-326-i586-1.txz: Upgraded.
xap/mozilla-firefox-50.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
extra/linux-4.4.32-nosmp-sdk/*: Upgraded.
extra/tigervnc/tigervnc-1.7.0-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 20 Nov 2016, 19:22


odradite:

Code: Select all

# slackpkg update
# slackpkg install-new
# slackpkg upgrade-all
jer se bez druge naredbe neće podignuti X. nije neki ogroman problem, ali da vas odmah upozorim jer se redovno upecam :grin:
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 22 Nov 2016, 19:51


Slackware 64-bit

Code: Select all

Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-x86_64-1.txz: Upgraded.
       In addition to bug fixes and enhancements, this release fixes the
       following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
       5 low-severity vulnerabilities, and provides 28 other non-security
       fixes and improvements.
       CVE-2016-9311: Trap crash
       CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
       CVE-2016-7427: Broadcast Mode Replay Prevention DoS
       CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
       CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
       CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
       CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
       CVE-2016-7429: Interface selection attack
       CVE-2016-7426: Client rate limiting and server responses
       CVE-2016-7433: Reboot sync calculation problem
       For more information, see:
       https://www.kb.cert.org/vuls/id/633847
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
       (* Security fix *)
+--------------------------+
Slackware 32-bit

Code: Select all

Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-i586-1.txz: Upgraded.
       In addition to bug fixes and enhancements, this release fixes the
       following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
       5 low-severity vulnerabilities, and provides 28 other non-security
       fixes and improvements.
       CVE-2016-9311: Trap crash
       CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
       CVE-2016-7427: Broadcast Mode Replay Prevention DoS
       CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
       CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
       CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
       CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
       CVE-2016-7429: Interface selection attack
       CVE-2016-7426: Client rate limiting and server responses
       CVE-2016-7433: Reboot sync calculation problem
       For more information, see:
       https://www.kb.cert.org/vuls/id/633847
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
       (* Security fix *)
+--------------------------+
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 02 Dec 2016, 07:52


Slackware 64-bit

Code: Select all

Thu Dec 1 08:49:20 UTC 2016
d/intltool-0.51.0-x86_64-3.txz: Rebuilt.
       Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
       possible build failures when intltool is used with automake >= 1.15.
       Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/firefox.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
xap/mozilla-thunderbird-45.5.1-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
Slackware 32-bit

Code: Select all

Thu Dec 1 08:49:20 UTC 2016
d/intltool-0.51.0-i586-3.txz: Rebuilt.
       Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
       possible build failures when intltool is used with automake >= 1.15.
       Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/firefox.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
xap/mozilla-thunderbird-45.5.1-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 13 Dec 2016, 18:17


Slackware 64-bit

Code: Select all

Mon Dec 12 21:25:50 UTC 2016
a/coreutils-8.26-x86_64-1.txz: Upgraded.
a/grep-2.27-x86_64-1.txz: Upgraded.
a/kernel-firmware-20161211git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.38-x86_64-1.txz: Upgraded.
       This kernel fixes a security issue with a race condition in
       net/packet/af_packet.c that can be exploited to gain kernel code execution
       from unprivileged processes.
       Thanks to Philip Pettersson for discovering the bug and providing a patch.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
       (* Security fix *)
a/kernel-huge-4.4.38-x86_64-1.txz: Upgraded.
       (* Security fix *)
a/kernel-modules-4.4.38-x86_64-1.txz: Upgraded.
ap/nano-2.7.2-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.38-x86-1.txz: Upgraded.
k/kernel-source-4.4.38-noarch-1.txz: Upgraded.
       (* Security fix *)
l/gsl-2.3-x86_64-1.txz: Upgraded.
l/loudmouth-1.5.3-x86_64-1.txz: Upgraded.
n/mcabber-1.0.4-x86_64-1.txz: Upgraded.
       This update fixes a security issue which can lead to a malicious actor
       MITMing a conversation, or adding themselves as an entity on a third
       parties roster (thereby granting themselves the associated priviledges
       such as observing when the user is online).
       For more information, see:
       https://gultsch.de/gajim_roster_push_and_message_interception.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
       (* Security fix *)
n/php-5.6.29-x86_64-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.29
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
       (* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Mon Dec 12 21:25:50 UTC 2016
a/coreutils-8.26-i586-1.txz: Upgraded.
a/grep-2.27-i586-1.txz: Upgraded.
a/kernel-firmware-20161211git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.38-i586-1.txz: Upgraded.
       This kernel fixes a security issue with a race condition in
       net/packet/af_packet.c that can be exploited to gain kernel code execution
       from unprivileged processes.
       Thanks to Philip Pettersson for discovering the bug and providing a patch.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
       (* Security fix *)
a/kernel-generic-smp-4.4.38_smp-i686-1.txz: Upgraded.
       (* Security fix *)
a/kernel-huge-4.4.38-i586-1.txz: Upgraded.
       (* Security fix *)
a/kernel-huge-smp-4.4.38_smp-i686-1.txz: Upgraded.
       (* Security fix *)
a/kernel-modules-4.4.38-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.38_smp-i686-1.txz: Upgraded.
ap/nano-2.7.2-i586-1.txz: Upgraded.
d/kernel-headers-4.4.38_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.38_smp-noarch-1.txz: Upgraded.
       (* Security fix *)
l/gsl-2.3-i586-1.txz: Upgraded.
l/loudmouth-1.5.3-i586-1.txz: Upgraded.
n/mcabber-1.0.4-i586-1.txz: Upgraded.
       This update fixes a security issue which can lead to a malicious actor
       MITMing a conversation, or adding themselves as an entity on a third
       parties roster (thereby granting themselves the associated priviledges
       such as observing when the user is online).
       For more information, see:
       https://gultsch.de/gajim_roster_push_and_message_interception.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
       (* Security fix *)
n/php-5.6.29-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.29
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
       (* Security fix *)
extra/linux-4.4.38-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa


Post Reply

Who is online

Users browsing this forum: No registered users and 2 guests