Novosti u *current* -u

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Post Reply

Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:45


04.05.2015

Slackware 64bit:

Code: Select all

Mon May 4 04:15:20 UTC 2015
a/aaa_terminfo-5.9-x86_64-1.txz: Upgraded.
a/btrfs-progs-v3.18.2-x86_64-1.txz: Upgraded.
ap/cups-2.0.2-x86_64-3.txz: Rebuilt.
       Removed files that overlap with the cups-filter package.
ap/cups-filters-1.0.68-x86_64-2.txz: Rebuilt.
       Removed bundled version of foomatic-rip.
kde/calligra-2.9.4-x86_64-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
l/libidn-1.30-x86_64-1.txz: Upgraded.
       This is reported to fix hangs with Emacs and other programs.
       Thanks to 55020.
l/ncurses-5.9-x86_64-4.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20141206-patch.sh.
l/qt-4.8.6-x86_64-3.txz: Rebuilt.
       Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
       instead of gstreamer-0. This should fix conflicts with programs that
       use both WebKit and phonon. Thanks to Heinz Wiesinger.
x/libdrm-2.4.60-x86_64-1.txz: Upgraded.
x/mesa-10.5.4-x86_64-1.txz: Upgraded.
xfce/xfwm4-4.12.2-x86_64-2.txz: Rebuilt.
       Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
       Thanks to comet.berkeley.
Slackware 32bit:

Code: Select all

Mon May 4 04:15:20 UTC 2015
a/aaa_terminfo-5.9-i486-1.txz: Upgraded.
a/btrfs-progs-v3.18.2-i486-1.txz: Upgraded.
ap/cups-2.0.2-i486-3.txz: Rebuilt.
       Removed files that overlap with the cups-filter package.
ap/cups-filters-1.0.68-i486-2.txz: Rebuilt.
       Removed bundled version of foomatic-rip.
kde/calligra-2.9.4-i486-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
l/libidn-1.30-i486-1.txz: Upgraded.
       This is reported to fix hangs with Emacs and other programs.
       Thanks to 55020.
l/ncurses-5.9-i486-4.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20141206-patch.sh.
l/qt-4.8.6-i486-3.txz: Rebuilt.
       Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
       instead of gstreamer-0. This should fix conflicts with programs that
       use both WebKit and phonon. Thanks to Heinz Wiesinger.
x/libdrm-2.4.60-i586-1.txz: Upgraded.
x/mesa-10.5.4-i586-1.txz: Upgraded.
xfce/xfwm4-4.12.2-i486-2.txz: Rebuilt.
       Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
       Thanks to comet.berkeley.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:52


12.05.2015

Slackware 64bit:

Code: Select all

Tue May 12 07:17:33 UTC 2015
ap/mariadb-10.0.18-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
       (* Security fix *)
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
d/slacktrack-2.17-x86_64-1.txz: Upgraded.
       Thanks to Stuart Winter.
l/libcanberra-0.30-x86_64-1.txz: Upgraded.
l/qt-4.8.6-x86_64-4.txz: Rebuilt.
       QNAM: Fix upload corruptions when server closes connection
       This patch fixes several upload corruptions if the server closes the
       connection while/before we send data into it.
       cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
n/wpa_supplicant-2.4-x86_64-2.txz: Rebuilt.
       This update fixes potential denial of service issues.
       For more information, see:
       http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
       http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
       http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
       http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
       (* Security fix *)
Slackware 32bit:

Code: Select all

Tue May 12 07:17:33 UTC 2015
ap/mariadb-10.0.18-i586-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
       (* Security fix *)
n/wpa_supplicant-2.4-i486-2.txz: Rebuilt.
       This update fixes potential denial of service issues.
       For more information, see:
       http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
       http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
       http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
       http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
       (* Security fix *)
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
l/libcanberra-0.30-i486-1.txz: Upgraded.
l/qt-4.8.6-i586-4.txz: Rebuilt.
       QNAM: Fix upload corruptions when server closes connection
       This patch fixes several upload corruptions if the server closes the
       connection while/before we send data into it.
       cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
d/slacktrack-2.17-i486-1.txz: Upgraded.
       Thanks to Stuart Winter.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:53


13.05.2015.

Slackware 64bit:

Code: Select all

Wed May 13 02:29:39 UTC 2015
xap/mozilla-firefox-38.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
Slackware 32bit:

Code: Select all

Wed May 13 02:29:39 UTC 2015
xap/mozilla-firefox-38.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:55


17.05.2015.

Slackware 64bit:

Code: Select all

Sun May 17 04:35:46 UTC 2015
xap/mozilla-firefox-38.0.1-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-31.7.0-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Slackware 32bit:

Code: Select all

Sun May 17 04:35:46 UTC 2015
xap/mozilla-firefox-38.0.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-31.7.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:56


11.06.2015.

Slackware 64bit:

Code: Select all

Thu Jun 11 21:31:47 UTC 2015
a/openssl-solibs-1.0.1n-x86_64-1.txz: Upgraded.
ap/screen-4.2.1-x86_64-2.txz: Rebuilt.
       Added some patches to fix corruption when using screen with a serial port.
       Thanks to Stuart Winter.
d/gdb-7.9.1-x86_64-1.txz: Upgraded.
l/qt-4.8.7-x86_64-1.txz: Upgraded.
n/openssl-1.0.1n-x86_64-1.txz: Upgraded.
       Fixes several bugs and security issues:
       o Malformed ECParameters causes infinite loop (CVE-2015-1788)
       o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
       o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
       o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
       o Race condition handling NewSessionTicket (CVE-2015-1791)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
       (* Security fix *)
n/php-5.6.9-x86_64-1.txz: Upgraded.
       This update fixes some bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
       (* Security fix *)
xap/mozilla-firefox-38.0.6-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-38.0.1-x86_64-1.txz: Upgraded.
Slackware 32bit:

Code: Select all

Thu Jun 11 21:31:47 UTC 2015
a/openssl-solibs-1.0.1n-i586-1.txz: Upgraded.
ap/screen-4.2.1-i486-2.txz: Rebuilt.
       Added some patches to fix corruption when using screen with a serial port.
       Thanks to Stuart Winter.
d/gdb-7.9.1-i486-1.txz: Upgraded.
l/qt-4.8.7-i586-1.txz: Upgraded.
n/openssl-1.0.1n-i586-1.txz: Upgraded.
       Fixes several bugs and security issues:
       o Malformed ECParameters causes infinite loop (CVE-2015-1788)
       o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
       o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
       o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
       o Race condition handling NewSessionTicket (CVE-2015-1791)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
       (* Security fix *)
n/php-5.6.9-i586-1.txz: Upgraded.
       This update fixes some bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
       (* Security fix *)
xap/mozilla-firefox-38.0.6-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-38.0.1-i586-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 18:57


12.06.2015.

Slackware 64bit:

Code: Select all

Fri Jun 12 17:58:45 UTC 2015
a/openssl-solibs-1.0.1o-x86_64-1.txz: Upgraded.
n/openssl-1.0.1o-x86_64-1.txz: Upgraded.
       New release to resolve 1.0.1n HMAC ABI incompatibility.
Slackware 32bit:

Code: Select all

Fri Jun 12 17:58:45 UTC 2015
a/openssl-solibs-1.0.1o-i586-1.txz: Upgraded.
n/openssl-1.0.1o-i586-1.txz: Upgraded.
       New release to resolve 1.0.1n HMAC ABI incompatibility.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 19:15


07.07.2015.

Slackware 64bit:

Code: Select all

Tue Jul 7 22:59:17 UTC 2015
ap/cups-2.0.3-x86_64-1.txz: Upgraded.
       This release fixes bugs and a couple of security issues:
       CWE-911: Improper Update of Reference Count - CVE-2015-1158
       This bug could allow an attacker to upload a replacement CUPS
       configuration file and mount further attacks.
       CWE-79: Improper Neutralization of Input During Web Page Generation
       (Cross-site Scripting) - CVE-2015-1159
       A cross-site scripting bug in the CUPS templating engine allows this
       bug to be exploited when a user browses the web. In certain cases,
       the CGI template can echo user input to file rather than escaping the
       text first. This may be used to set up a reflected XSS attack in
       the QUERY parameter of the web interface help page.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
       (* Security fix *)
ap/cups-filters-1.0.71-x86_64-1.txz: Upgraded.
       Fixed overflows and lack of bounds checking in texttopdf.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
       (* Security fix *)
ap/lm_sensors-3.3.5-x86_64-1.txz: Upgraded.
ap/nano-2.4.2-x86_64-1.txz: Upgraded.
ap/screen-4.3.1-x86_64-1.txz: Upgraded.
d/make-3.82-x86_64-6.txz: Rebuilt.
       Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
d/python-2.7.10-x86_64-1.txz: Upgraded.
l/glade3-3.8.5-x86_64-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-base-1.4.5-x86_64-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-x86_64-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-good-1.4.5-x86_64-1.txz: Upgraded.
l/gstreamer-1.4.5-x86_64-1.txz: Upgraded.
l/notify-python-0.1.1-x86_64-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/pygtk-2.24.0-x86_64-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
n/bind-9.10.2_P2-x86_64-1.txz: Upgraded.
       This update fixes a security issue where an attacker who can cause
       a validating resolver to query a zone containing specifically constructed
       contents can cause that resolver to fail an assertion and terminate due
       to a defect in validation code. This means that a recursive resolver that
       is performing DNSSEC validation can be deliberately stopped by an attacker
       who can cause the resolver to perform a query against a
       maliciously-constructed zone. This will result in a denial of service to
       clients who rely on that resolver.
       For more information, see:
       https://kb.isc.org/article/AA-01267/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
       (* Security fix *)
n/ntp-4.2.8p3-x86_64-1.txz: Upgraded.
       This update fixes a security issue where under specific circumstances an
       attacker can send a crafted packet to cause a vulnerable ntpd instance to
       crash. Since this requires 1) ntpd set up to allow remote configuration
       (not allowed by default), and 2) knowledge of the configuration password,
       and 3) access to a computer entrusted to perform remote configuration,
       the vulnerability is considered low-risk.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
       (* Security fix *)
x/scim-hangul-0.3.2-x86_64-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
xap/imagemagick-6.9.1_7-x86_64-1.txz: Upgraded.
       Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
       platforms with non-AMD processors. Thanks to Kirils Solovjovs.
xap/mozilla-firefox-39.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/pidgin-2.10.11-x86_64-2.txz: Rebuilt.
       Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
testing/source/config-testing-4.1.1/*: Added.
Slackware 32bit:

Code: Select all

ap/cups-2.0.3-i486-1.txz: Upgraded.
       This release fixes bugs and a couple of security issues:
       CWE-911: Improper Update of Reference Count - CVE-2015-1158
       This bug could allow an attacker to upload a replacement CUPS
       configuration file and mount further attacks.
       CWE-79: Improper Neutralization of Input During Web Page Generation
       (Cross-site Scripting) - CVE-2015-1159
       A cross-site scripting bug in the CUPS templating engine allows this
       bug to be exploited when a user browses the web. In certain cases,
       the CGI template can echo user input to file rather than escaping the
       text first. This may be used to set up a reflected XSS attack in
       the QUERY parameter of the web interface help page.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
       (* Security fix *)
ap/cups-filters-1.0.71-i486-1.txz: Upgraded.
       Fixed overflows and lack of bounds checking in texttopdf.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
       (* Security fix *)
ap/lm_sensors-3.3.5-i486-1.txz: Upgraded.
ap/nano-2.4.2-i486-1.txz: Upgraded.
ap/screen-4.3.1-i486-1.txz: Upgraded.
d/make-3.82-i486-6.txz: Rebuilt.
       Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
d/python-2.7.10-i586-1.txz: Upgraded.
l/glade3-3.8.5-i586-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-base-1.4.5-i486-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-i486-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-good-1.4.5-i486-1.txz: Upgraded.
l/gstreamer-1.4.5-i486-1.txz: Upgraded.
l/notify-python-0.1.1-i486-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/pygtk-2.24.0-i586-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
n/bind-9.10.2_P2-i486-1.txz: Upgraded.
       This update fixes a security issue where an attacker who can cause
       a validating resolver to query a zone containing specifically constructed
       contents can cause that resolver to fail an assertion and terminate due
       to a defect in validation code. This means that a recursive resolver that
       is performing DNSSEC validation can be deliberately stopped by an attacker
       who can cause the resolver to perform a query against a
       maliciously-constructed zone. This will result in a denial of service to
       clients who rely on that resolver.
       For more information, see:
       https://kb.isc.org/article/AA-01267/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
       (* Security fix *)
n/ntp-4.2.8p3-i486-1.txz: Upgraded.
       This update fixes a security issue where under specific circumstances an
       attacker can send a crafted packet to cause a vulnerable ntpd instance to
       crash. Since this requires 1) ntpd set up to allow remote configuration
       (not allowed by default), and 2) knowledge of the configuration password,
       and 3) access to a computer entrusted to perform remote configuration,
       the vulnerability is considered low-risk.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
       (* Security fix *)
x/scim-hangul-0.3.2-i486-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
xap/imagemagick-6.9.1_7-i586-1.txz: Upgraded.
       Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
       platforms with non-AMD processors. Thanks to Kirils Solovjovs.
xap/mozilla-firefox-39.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/pidgin-2.10.11-i586-2.txz: Rebuilt.
       Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
testing/source/config-testing-4.1.1/*: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 19:16


09.07.2015.

Slackware 64bit:

Code: Select all

Thu Jul 9 18:29:23 UTC 2015
a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
a/openssl-solibs-1.0.1p-x86_64-1.txz: Upgraded.
n/openssl-1.0.1p-x86_64-1.txz: Upgraded.
       This update fixes the following security issue:
       Alternative chains certificate forgery (CVE-2015-1793).
       During certificate verification, OpenSSL (starting from version 1.0.1n and
       1.0.2b) will attempt to find an alternative certificate chain if the first
       attempt to build such a chain fails. An error in the implementation of this
       logic can mean that an attacker could cause certain checks on untrusted
       certificates to be bypassed, such as the CA flag, enabling them to use a
       valid leaf certificate to act as a CA and "issue" an invalid certificate.
       This issue will impact any application that verifies certificates including
       SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
       This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
       This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
       Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
       For more information, see:
       https://openssl.org/news/secadv_20150709.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
       (* Security fix *)
Slackware 32bit:

Code: Select all

a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
a/openssl-solibs-1.0.1p-i586-1.txz: Upgraded.
n/openssl-1.0.1p-i586-1.txz: Upgraded.
       This update fixes the following security issue:
       Alternative chains certificate forgery (CVE-2015-1793).
       During certificate verification, OpenSSL (starting from version 1.0.1n and
       1.0.2b) will attempt to find an alternative certificate chain if the first
       attempt to build such a chain fails. An error in the implementation of this
       logic can mean that an attacker could cause certain checks on untrusted
       certificates to be bypassed, such as the CA flag, enabling them to use a
       valid leaf certificate to act as a CA and "issue" an invalid certificate.
       This issue will impact any application that verifies certificates including
       SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
       This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
       This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
       Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
       For more information, see:
       https://openssl.org/news/secadv_20150709.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 17 Jul 2015, 19:17


12.07.2015.

Slackware 64bit:

Code: Select all

Sun Jul 12 04:28:10 UTC 2015
xap/mozilla-thunderbird-38.1.0-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
testing/packages/e2fsprogs-1.43_WIP_20150518-x86_64-1.txz: Added.
Slackware 32bit:

Code: Select all

xap/mozilla-thunderbird-38.1.0-i586-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
testing/packages/e2fsprogs-1.43_WIP_20150518-i486-1.txz: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 30 Jul 2015, 20:01


28.07.2015.

Slackware 64bit:

Code: Select all

Tue Jul 28 19:36:39 UTC 2015
n/bind-9.10.2_P3-x86_64-1.txz: Upgraded.
       This update fixes a security issue where an error in the handling of TKEY
       queries can be exploited by an attacker for use as a denial-of-service
       vector, as a constructed packet can use the defect to trigger a REQUIRE
       assertion failure, causing BIND to exit.
       Impact:
       Both recursive and authoritative servers are vulnerable to this defect.
       Additionally, exposure is not prevented by either ACLs or configuration
       options limiting or denying service because the exploitable code occurs
       early in the packet handling, before checks enforcing those boundaries.
       Operators should take steps to upgrade to a patched version as soon as
       possible.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
       https://kb.isc.org/article/AA-01272
       (* Security fix *)
Slackware 32bit:

Code: Select all

n/bind-9.10.2_P3-i586-1.txz: Upgraded.
       This update fixes a security issue where an error in the handling of TKEY
       queries can be exploited by an attacker for use as a denial-of-service
       vector, as a constructed packet can use the defect to trigger a REQUIRE
       assertion failure, causing BIND to exit.
       Impact:
       Both recursive and authoritative servers are vulnerable to this defect.
       Additionally, exposure is not prevented by either ACLs or configuration
       options limiting or denying service because the exploitable code occurs
       early in the packet handling, before checks enforcing those boundaries.
       Operators should take steps to upgrade to a patched version as soon as
       possible.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
       https://kb.isc.org/article/AA-01272
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”


Post Reply

Who is online

Users browsing this forum: No registered users and 43 guests