new patches have been released for slackware64-14.0. Follows the relevant part of ChangeLog.txt:
Codice: Seleziona tutto
Slacky BOT Packager
Moderatore: Staff
Codice: Seleziona tutto
Codice: Seleziona tutto
Sun Sep 29 02:39:29 UTC 2013
patches/packages/lm_sensors-3.3.4-x86_64-1_slack14.0.txz: Upgraded.
This update fixes issues with sensors-detect that may cause serious trouble
on recent hardware (most notably laptops.) The symptoms are that the
display starts misbehaving (wrong resolution or wrong gamma factor.)
The risk is mitigated in this package by changing the default behavior of
sensors-detect to no longer touch EDID EEPROMs and then to no longer probe
graphics adapters at all unless the user asks for it.
patches/packages/seamonkey-2.21-x86_64-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.21-x86_64-1_slack14.0.txz: Upgraded.
+--------------------------+
Codice: Seleziona tutto
Thu Oct 3 02:57:44 UTC 2013
patches/packages/mozilla-nss-3.15.2-x86_64-1_slack14.0.txz: Upgraded.
Upgraded to nss-3.15.2 and nspr-4.10.1.
This should help keep Google Chrome updates working for a while.
Also, adding /lib and /usr/lib (or /lib64 and /usr/lib64) to the
top of /etc/ld.so.conf will help Chrome use the correct libraries
instead of the ones from Seamonkey.
+--------------------------+
Wed Oct 2 03:25:01 UTC 2013
patches/packages/ca-certificates-20130906-noarch-1_slack14.0.txz: Upgraded.
This package updates to the latest CA certificates.
+--------------------------+
Codice: Seleziona tutto
Mon Oct 14 22:09:17 UTC 2013
patches/packages/gnupg-1.4.15-x86_64-1_slack14.0.txz: Upgraded.
Fixed possible infinite recursion in the compressed packet
parser. [CVE-2013-4402]
Protect against rogue keyservers sending secret keys.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
(* Security fix *)
patches/packages/gnupg2-2.0.22-x86_64-1_slack14.0.txz: Upgraded.
Fixed possible infinite recursion in the compressed packet
parser. [CVE-2013-4402]
Protect against rogue keyservers sending secret keys.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
(* Security fix *)
patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txz: Upgraded.
This package upgrade was needed by the new version of gnupg2.
patches/packages/xorg-server-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
Patched a use-after-free bug that can cause an X server crash or
memory corruption.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
(* Security fix *)
patches/packages/xorg-server-xephyr-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
+--------------------------+
Codice: Seleziona tutto
Fri Oct 18 02:41:09 UTC 2013
patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txz: Upgraded.
Patched overflows, crashes, and out of bounds writes.
Thanks to mancha for the backported patches.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Sat Oct 19 03:42:15 UTC 2013
patches/packages/hplip-3.12.9-x86_64-3_slack14.0.txz: Rebuilt.
This fixes a polkit race condition that could allow local users to bypass
intended access restrictions.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Sun Nov 3 06:07:52 UTC 2013
patches/packages/mozilla-thunderbird-17.0.10esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Mon Nov 18 20:52:16 UTC 2013
patches/packages/mozilla-firefox-17.0.11esr-x86_64-1_slack14.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *)
patches/packages/php-5.4.22-x86_64-1_slack14.0.txz: Upgraded.
This is a bugfix release.
patches/packages/samba-3.6.20-x86_64-1_slack14.0.txz: Upgraded.
This update fixes two security issues:
* Samba versions 3.2.0 and above do not check the underlying file or
directory ACL when opening an alternate data stream.
* In setups which provide ldap(s) and/or https services, the private key
for SSL/TLS encryption might be world readable. This typically happens
in active directory domain controller setups.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
(* Security fix *)
patches/packages/seamonkey-2.22-x86_64-1_slack14.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.22-x86_64-1_slack14.0.txz: Upgraded.
+--------------------------+
Codice: Seleziona tutto
Fri Dec 6 00:20:17 UTC 2013
patches/packages/mozilla-nss-3.15.3-x86_64-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
(* Security fix *)
patches/packages/mozilla-thunderbird-24.1.1-x86_64-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
patches/packages/seamonkey-2.22.1-x86_64-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.22.1-x86_64-1_slack14.1.txz: Upgraded.
+--------------------------+
Codice: Seleziona tutto
Mon Dec 16 20:51:01 UTC 2013
patches/packages/libiodbc-3.52.8-x86_64-1_slack14.1.txz: Upgraded.
This update fixes an rpath pointing to a location in /tmp that was found in
two test programs (iodbctest and iodbctestw). This could have allowed a
local attacker with write access to /tmp to add modified libraries (and
execute arbitrary code) as any user running the test programs.
Thanks to Christopher Oliver for the bug report.
(* Security fix *)
patches/packages/libjpeg-v8a-x86_64-2_slack14.1.txz: Rebuilt.
Fix use of uninitialized memory when decoding images with missing SOS data
for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
This could allow remote attackers to obtain sensitive information from
uninitialized memory locations via a crafted JPEG image.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
(* Security fix *)
patches/packages/llvm-3.3-x86_64-3_slack14.1.txz: Rebuilt.
The LLVM package included binaries with an rpath pointing to the build
location in /tmp. This allows an attacker with write access to /tmp to
add modified libraries (and execute arbitrary code) as any user running
the LLVM binaries. This updated package rebuilds LLVM to exclude the
build directories from the rpath information.
Thanks to Christopher Oliver for the bug report.
(* Security fix *)
patches/packages/mozilla-firefox-24.2.0esr-x86_64-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *)
patches/packages/mozilla-thunderbird-24.2.0-x86_64-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
(* Security fix *)
patches/packages/ruby-1.9.3_p484-x86_64-1_slack14.1.txz: Upgraded.
This update fixes a heap overflow in floating point parsing. A specially
crafted string could cause a heap overflow leading to a denial of service
attack via segmentation faults and possibly arbitrary code execution.
For more information, see:
https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
(* Security fix *)
patches/packages/seamonkey-2.23-x86_64-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.23-x86_64-1_slack14.1.txz: Upgraded.
+--------------------------+
Codice: Seleziona tutto
Fri Dec 20 22:46:09 UTC 2013
patches/packages/gnupg-1.4.16-x86_64-1_slack14.1.txz: Upgraded.
Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
For more information, see:
http://www.cs.tau.ac.il/~tromer/acoustic/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Tue Jan 14 03:54:48 UTC 2014
patches/packages/libXfont-1.4.7-x86_64-1_slack14.1.txz: Upgraded.
This update fixes a stack overflow when reading a BDF font file containing
a longer than expected string, which could lead to crashes or privilege
escalation.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
(* Security fix *)
patches/packages/openssl-1.0.1f-x86_64-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
Fix for TLS record tampering bug CVE-2013-4353
Fix for TLS version checking bug CVE-2013-6449
Fix for DTLS retransmission bug CVE-2013-6450
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
(* Security fix *)
patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz: Upgraded.
patches/packages/openssl-1.0.1f-x86_64-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
Fix for TLS record tampering bug CVE-2013-4353
Fix for TLS version checking bug CVE-2013-6449
Fix for DTLS retransmission bug CVE-2013-6450
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
(* Security fix *)
patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.1.txz: Upgraded.
patches/packages/php-5.4.24-x86_64-1_slack14.1.txz: Upgraded.
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
which allows remote attackers to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted certificate that is not
properly handled by the openssl_x509_parse function.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
(* Security fix *)
patches/packages/samba-4.1.4-x86_64-1_slack14.1.txz: Upgraded.
This update fixes a heap-based buffer overflow that may allow AD domain
controllers to execute arbitrary code via an invalid fragment length in
a DCE-RPC packet.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Tue Jan 28 21:07:13 UTC 2014
patches/packages/bind-9.9.4_P2-x86_64-1_slack14.1.txz: Upgraded.
This update fixes a defect in the handling of NSEC3-signed zones that can
cause BIND to be crashed by a specific set of queries.
NOTE: According to the second link below, Slackware is probably not
vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
anyway, though.
For more information, see:
https://kb.isc.org/article/AA-01078
https://kb.isc.org/article/AA-01085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
patches/packages/mozilla-nss-3.15.4-x86_64-1_slack14.1.txz: Upgraded.
Upgraded to nss-3.15.4 and nspr-4.10.3.
Fixes a possible man-in-the-middle issue.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
(* Security fix *)
+--------------------------+
Codice: Seleziona tutto
Sat Feb 1 00:56:38 UTC 2014
patches/packages/cairo-1.12.16-x86_64-1_slack14.1.txz: Upgraded.
This is a bugfix update that was tested in -current and found to resolve
some outstanding issues with the package that shipped in Slackware 14.1.
Removed --enable-xcb-shm (may cause instability with GTK+3).
Removed --enable-xlib-xcb (causes GIMP slowdown).
Added --enable-ft and --enable-gl.
+--------------------------+
Codice: Seleziona tutto
Mon Feb 3 20:58:32 UTC 2014
patches/packages/pidgin-2.10.9-x86_64-1_slack14.1.txz: Upgraded.
This update fixes various security issues and other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
(* Security fix *)
+--------------------------+