Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:45
04.05.2015
Slackware 64bit:
Code: Select all
Mon May 4 04:15:20 UTC 2015
a/aaa_terminfo-5.9-x86_64-1.txz: Upgraded.
a/btrfs-progs-v3.18.2-x86_64-1.txz: Upgraded.
ap/cups-2.0.2-x86_64-3.txz: Rebuilt.
Removed files that overlap with the cups-filter package.
ap/cups-filters-1.0.68-x86_64-2.txz: Rebuilt.
Removed bundled version of foomatic-rip.
kde/calligra-2.9.4-x86_64-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
l/libidn-1.30-x86_64-1.txz: Upgraded.
This is reported to fix hangs with Emacs and other programs.
Thanks to 55020.
l/ncurses-5.9-x86_64-4.txz: Rebuilt.
Applied upstream patch ncurses-5.9-20141206-patch.sh.
l/qt-4.8.6-x86_64-3.txz: Rebuilt.
Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
instead of gstreamer-0. This should fix conflicts with programs that
use both WebKit and phonon. Thanks to Heinz Wiesinger.
x/libdrm-2.4.60-x86_64-1.txz: Upgraded.
x/mesa-10.5.4-x86_64-1.txz: Upgraded.
xfce/xfwm4-4.12.2-x86_64-2.txz: Rebuilt.
Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
Thanks to comet.berkeley.
Slackware 32bit:
Code: Select all
Mon May 4 04:15:20 UTC 2015
a/aaa_terminfo-5.9-i486-1.txz: Upgraded.
a/btrfs-progs-v3.18.2-i486-1.txz: Upgraded.
ap/cups-2.0.2-i486-3.txz: Rebuilt.
Removed files that overlap with the cups-filter package.
ap/cups-filters-1.0.68-i486-2.txz: Rebuilt.
Removed bundled version of foomatic-rip.
kde/calligra-2.9.4-i486-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
l/libidn-1.30-i486-1.txz: Upgraded.
This is reported to fix hangs with Emacs and other programs.
Thanks to 55020.
l/ncurses-5.9-i486-4.txz: Rebuilt.
Applied upstream patch ncurses-5.9-20141206-patch.sh.
l/qt-4.8.6-i486-3.txz: Rebuilt.
Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
instead of gstreamer-0. This should fix conflicts with programs that
use both WebKit and phonon. Thanks to Heinz Wiesinger.
x/libdrm-2.4.60-i586-1.txz: Upgraded.
x/mesa-10.5.4-i586-1.txz: Upgraded.
xfce/xfwm4-4.12.2-i486-2.txz: Rebuilt.
Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
Thanks to comet.berkeley.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:52
12.05.2015
Slackware 64bit:
Code: Select all
Tue May 12 07:17:33 UTC 2015
ap/mariadb-10.0.18-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
(* Security fix *)
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
d/slacktrack-2.17-x86_64-1.txz: Upgraded.
Thanks to Stuart Winter.
l/libcanberra-0.30-x86_64-1.txz: Upgraded.
l/qt-4.8.6-x86_64-4.txz: Rebuilt.
QNAM: Fix upload corruptions when server closes connection
This patch fixes several upload corruptions if the server closes the
connection while/before we send data into it.
cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
n/wpa_supplicant-2.4-x86_64-2.txz: Rebuilt.
This update fixes potential denial of service issues.
For more information, see:
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
(* Security fix *)
Slackware 32bit:
Code: Select all
Tue May 12 07:17:33 UTC 2015
ap/mariadb-10.0.18-i586-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
(* Security fix *)
n/wpa_supplicant-2.4-i486-2.txz: Rebuilt.
This update fixes potential denial of service issues.
For more information, see:
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
(* Security fix *)
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
l/libcanberra-0.30-i486-1.txz: Upgraded.
l/qt-4.8.6-i586-4.txz: Rebuilt.
QNAM: Fix upload corruptions when server closes connection
This patch fixes several upload corruptions if the server closes the
connection while/before we send data into it.
cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
d/slacktrack-2.17-i486-1.txz: Upgraded.
Thanks to Stuart Winter.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:53
13.05.2015.
Slackware 64bit:
Code: Select all
Wed May 13 02:29:39 UTC 2015
xap/mozilla-firefox-38.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
Slackware 32bit:
Code: Select all
Wed May 13 02:29:39 UTC 2015
xap/mozilla-firefox-38.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:55
17.05.2015.
Slackware 64bit:
Code: Select all
Sun May 17 04:35:46 UTC 2015
xap/mozilla-firefox-38.0.1-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-31.7.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Slackware 32bit:
Code: Select all
Sun May 17 04:35:46 UTC 2015
xap/mozilla-firefox-38.0.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-31.7.0-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:56
11.06.2015.
Slackware 64bit:
Code: Select all
Thu Jun 11 21:31:47 UTC 2015
a/openssl-solibs-1.0.1n-x86_64-1.txz: Upgraded.
ap/screen-4.2.1-x86_64-2.txz: Rebuilt.
Added some patches to fix corruption when using screen with a serial port.
Thanks to Stuart Winter.
d/gdb-7.9.1-x86_64-1.txz: Upgraded.
l/qt-4.8.7-x86_64-1.txz: Upgraded.
n/openssl-1.0.1n-x86_64-1.txz: Upgraded.
Fixes several bugs and security issues:
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
o Race condition handling NewSessionTicket (CVE-2015-1791)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
(* Security fix *)
n/php-5.6.9-x86_64-1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
(* Security fix *)
xap/mozilla-firefox-38.0.6-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-38.0.1-x86_64-1.txz: Upgraded.
Slackware 32bit:
Code: Select all
Thu Jun 11 21:31:47 UTC 2015
a/openssl-solibs-1.0.1n-i586-1.txz: Upgraded.
ap/screen-4.2.1-i486-2.txz: Rebuilt.
Added some patches to fix corruption when using screen with a serial port.
Thanks to Stuart Winter.
d/gdb-7.9.1-i486-1.txz: Upgraded.
l/qt-4.8.7-i586-1.txz: Upgraded.
n/openssl-1.0.1n-i586-1.txz: Upgraded.
Fixes several bugs and security issues:
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
o Race condition handling NewSessionTicket (CVE-2015-1791)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
(* Security fix *)
n/php-5.6.9-i586-1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
(* Security fix *)
xap/mozilla-firefox-38.0.6-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-38.0.1-i586-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 18:57
12.06.2015.
Slackware 64bit:
Code: Select all
Fri Jun 12 17:58:45 UTC 2015
a/openssl-solibs-1.0.1o-x86_64-1.txz: Upgraded.
n/openssl-1.0.1o-x86_64-1.txz: Upgraded.
New release to resolve 1.0.1n HMAC ABI incompatibility.
Slackware 32bit:
Code: Select all
Fri Jun 12 17:58:45 UTC 2015
a/openssl-solibs-1.0.1o-i586-1.txz: Upgraded.
n/openssl-1.0.1o-i586-1.txz: Upgraded.
New release to resolve 1.0.1n HMAC ABI incompatibility.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 19:15
07.07.2015.
Slackware 64bit:
Code: Select all
Tue Jul 7 22:59:17 UTC 2015
ap/cups-2.0.3-x86_64-1.txz: Upgraded.
This release fixes bugs and a couple of security issues:
CWE-911: Improper Update of Reference Count - CVE-2015-1158
This bug could allow an attacker to upload a replacement CUPS
configuration file and mount further attacks.
CWE-79: Improper Neutralization of Input During Web Page Generation
(Cross-site Scripting) - CVE-2015-1159
A cross-site scripting bug in the CUPS templating engine allows this
bug to be exploited when a user browses the web. In certain cases,
the CGI template can echo user input to file rather than escaping the
text first. This may be used to set up a reflected XSS attack in
the QUERY parameter of the web interface help page.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
(* Security fix *)
ap/cups-filters-1.0.71-x86_64-1.txz: Upgraded.
Fixed overflows and lack of bounds checking in texttopdf.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
(* Security fix *)
ap/lm_sensors-3.3.5-x86_64-1.txz: Upgraded.
ap/nano-2.4.2-x86_64-1.txz: Upgraded.
ap/screen-4.3.1-x86_64-1.txz: Upgraded.
d/make-3.82-x86_64-6.txz: Rebuilt.
Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
d/python-2.7.10-x86_64-1.txz: Upgraded.
l/glade3-3.8.5-x86_64-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-base-1.4.5-x86_64-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-x86_64-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-good-1.4.5-x86_64-1.txz: Upgraded.
l/gstreamer-1.4.5-x86_64-1.txz: Upgraded.
l/notify-python-0.1.1-x86_64-4.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/pygtk-2.24.0-x86_64-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
n/bind-9.10.2_P2-x86_64-1.txz: Upgraded.
This update fixes a security issue where an attacker who can cause
a validating resolver to query a zone containing specifically constructed
contents can cause that resolver to fail an assertion and terminate due
to a defect in validation code. This means that a recursive resolver that
is performing DNSSEC validation can be deliberately stopped by an attacker
who can cause the resolver to perform a query against a
maliciously-constructed zone. This will result in a denial of service to
clients who rely on that resolver.
For more information, see:
https://kb.isc.org/article/AA-01267/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
(* Security fix *)
n/ntp-4.2.8p3-x86_64-1.txz: Upgraded.
This update fixes a security issue where under specific circumstances an
attacker can send a crafted packet to cause a vulnerable ntpd instance to
crash. Since this requires 1) ntpd set up to allow remote configuration
(not allowed by default), and 2) knowledge of the configuration password,
and 3) access to a computer entrusted to perform remote configuration,
the vulnerability is considered low-risk.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
(* Security fix *)
x/scim-hangul-0.3.2-x86_64-4.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
xap/imagemagick-6.9.1_7-x86_64-1.txz: Upgraded.
Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
platforms with non-AMD processors. Thanks to Kirils Solovjovs.
xap/mozilla-firefox-39.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/pidgin-2.10.11-x86_64-2.txz: Rebuilt.
Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
testing/source/config-testing-4.1.1/*: Added.
Slackware 32bit:
Code: Select all
ap/cups-2.0.3-i486-1.txz: Upgraded.
This release fixes bugs and a couple of security issues:
CWE-911: Improper Update of Reference Count - CVE-2015-1158
This bug could allow an attacker to upload a replacement CUPS
configuration file and mount further attacks.
CWE-79: Improper Neutralization of Input During Web Page Generation
(Cross-site Scripting) - CVE-2015-1159
A cross-site scripting bug in the CUPS templating engine allows this
bug to be exploited when a user browses the web. In certain cases,
the CGI template can echo user input to file rather than escaping the
text first. This may be used to set up a reflected XSS attack in
the QUERY parameter of the web interface help page.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
(* Security fix *)
ap/cups-filters-1.0.71-i486-1.txz: Upgraded.
Fixed overflows and lack of bounds checking in texttopdf.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
(* Security fix *)
ap/lm_sensors-3.3.5-i486-1.txz: Upgraded.
ap/nano-2.4.2-i486-1.txz: Upgraded.
ap/screen-4.3.1-i486-1.txz: Upgraded.
d/make-3.82-i486-6.txz: Rebuilt.
Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
d/python-2.7.10-i586-1.txz: Upgraded.
l/glade3-3.8.5-i586-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-base-1.4.5-i486-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-i486-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-good-1.4.5-i486-1.txz: Upgraded.
l/gstreamer-1.4.5-i486-1.txz: Upgraded.
l/notify-python-0.1.1-i486-4.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
l/pygtk-2.24.0-i586-2.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
n/bind-9.10.2_P2-i486-1.txz: Upgraded.
This update fixes a security issue where an attacker who can cause
a validating resolver to query a zone containing specifically constructed
contents can cause that resolver to fail an assertion and terminate due
to a defect in validation code. This means that a recursive resolver that
is performing DNSSEC validation can be deliberately stopped by an attacker
who can cause the resolver to perform a query against a
maliciously-constructed zone. This will result in a denial of service to
clients who rely on that resolver.
For more information, see:
https://kb.isc.org/article/AA-01267/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
(* Security fix *)
n/ntp-4.2.8p3-i486-1.txz: Upgraded.
This update fixes a security issue where under specific circumstances an
attacker can send a crafted packet to cause a vulnerable ntpd instance to
crash. Since this requires 1) ntpd set up to allow remote configuration
(not allowed by default), and 2) knowledge of the configuration password,
and 3) access to a computer entrusted to perform remote configuration,
the vulnerability is considered low-risk.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
(* Security fix *)
x/scim-hangul-0.3.2-i486-4.txz: Rebuilt.
Recompiled to eliminate remaining libpng14 references in .la files.
xap/imagemagick-6.9.1_7-i586-1.txz: Upgraded.
Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
platforms with non-AMD processors. Thanks to Kirils Solovjovs.
xap/mozilla-firefox-39.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/pidgin-2.10.11-i586-2.txz: Rebuilt.
Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
testing/source/config-testing-4.1.1/*: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 19:16
09.07.2015.
Slackware 64bit:
Code: Select all
Thu Jul 9 18:29:23 UTC 2015
a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
a/openssl-solibs-1.0.1p-x86_64-1.txz: Upgraded.
n/openssl-1.0.1p-x86_64-1.txz: Upgraded.
This update fixes the following security issue:
Alternative chains certificate forgery (CVE-2015-1793).
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a
valid leaf certificate to act as a CA and "issue" an invalid certificate.
This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
For more information, see:
https://openssl.org/news/secadv_20150709.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
(* Security fix *)
Slackware 32bit:
Code: Select all
a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
a/openssl-solibs-1.0.1p-i586-1.txz: Upgraded.
n/openssl-1.0.1p-i586-1.txz: Upgraded.
This update fixes the following security issue:
Alternative chains certificate forgery (CVE-2015-1793).
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a
valid leaf certificate to act as a CA and "issue" an invalid certificate.
This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
For more information, see:
https://openssl.org/news/secadv_20150709.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 17 Jul 2015, 19:17
12.07.2015.
Slackware 64bit:
Code: Select all
Sun Jul 12 04:28:10 UTC 2015
xap/mozilla-thunderbird-38.1.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
testing/packages/e2fsprogs-1.43_WIP_20150518-x86_64-1.txz: Added.
Slackware 32bit:
Code: Select all
xap/mozilla-thunderbird-38.1.0-i586-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
testing/packages/e2fsprogs-1.43_WIP_20150518-i486-1.txz: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3451
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 30 Jul 2015, 20:01
28.07.2015.
Slackware 64bit:
Code: Select all
Tue Jul 28 19:36:39 UTC 2015
n/bind-9.10.2_P3-x86_64-1.txz: Upgraded.
This update fixes a security issue where an error in the handling of TKEY
queries can be exploited by an attacker for use as a denial-of-service
vector, as a constructed packet can use the defect to trigger a REQUIRE
assertion failure, causing BIND to exit.
Impact:
Both recursive and authoritative servers are vulnerable to this defect.
Additionally, exposure is not prevented by either ACLs or configuration
options limiting or denying service because the exploitable code occurs
early in the packet handling, before checks enforcing those boundaries.
Operators should take steps to upgrade to a patched version as soon as
possible.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
https://kb.isc.org/article/AA-01272
(* Security fix *)
Slackware 32bit:
Code: Select all
n/bind-9.10.2_P3-i586-1.txz: Upgraded.
This update fixes a security issue where an error in the handling of TKEY
queries can be exploited by an attacker for use as a denial-of-service
vector, as a constructed packet can use the defect to trigger a REQUIRE
assertion failure, causing BIND to exit.
Impact:
Both recursive and authoritative servers are vulnerable to this defect.
Additionally, exposure is not prevented by either ACLs or configuration
options limiting or denying service because the exploitable code occurs
early in the packet handling, before checks enforcing those boundaries.
Operators should take steps to upgrade to a patched version as soon as
possible.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
https://kb.isc.org/article/AA-01272
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: No registered users and 43 guests