User Tools

Site Tools


changelog_14.2

ChangeLog 14.2

Slackware upstream ChangeLog entries are courtesy of Patrick Volkerding.

2018-12-08

php-5.6.39: Upgraded. Several security bugs have been fixed in this release:

  • Segfault when using convert.quoted-printable-encode filter.
  • Null pointer dereference in imap_mail.
  • imap_open allows to run arbitrary shell commands via mailbox parameter.
  • PharData always creates new files with mode 0666.
  • Heap Buffer Overflow (READ: 4) in phar_parse_pharfile.

For more information, see:

(Security fix)

2018-12-05

gnutls-3.6.5: Upgraded. This update fixes a security issue: Bleichenbacher-like side channel leakage in PKCS#1 1.5 verification and padding oracle verification. For more information, see:

(Security fix)

nettle-3.4.1: Upgraded. This update fixes a security issue: A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. For more information, see:

(Security fix)

2018-12-03

mozilla-nss-3.40.1: Upgraded. Upgraded to nss-3.40.1 and nspr-4.20. Mitigate cache side-channel variant of the Bleichenbacher attack. For more information, see:

(Security fix)

2018-11-29

samba-4.6.16: Rebuilt. This update patches some security issues:

  • CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server
  • CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT
  • CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server
  • CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers
  • CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported)
  • CVE-2018-16857: Bad password count in AD DC not always effective

For more information, see:

(Security fix)

2018-11-22

openssl-1.0.2q: Upgraded. This update fixes a timing side-channel flaw on processors which implement SMT/Hyper-Threading architectures, and a side channel attack on DSA signature generation that could allow an attacker to recover the private key. For more information, see:

(Security fix)

openssl-solibs-1.0.2q: Upgraded.

2018-11-15

icecat-60.3.0: Upgraded (FXP). This update includes upstream features and patches.

(Security fix)

2018-11-12

2018-11-05

2018-10-31

curl-7.62.0: Upgraded. This release fixes the following security issues: SASL password overflow via integer overflow. Use-after-free in handle close. Warning message out-of-buffer read. For more information, see:

(Security fix)

glibc-zoneinfo-2018g: Upgraded. This package provides the latest timezone updates.

httpd-2.4.37: Upgraded. This is the latest release from the Apache HTTP Server 2.4.x stable branch.

2018-10-27

libssh-0.7.6: Upgraded. Fixed authentication bypass vulnerability. For more information, see:

(Security fix)

2018-10-10

git-2.14.5: Upgraded. This update fixes a security issue: Submodules' “URL“s come from the untrusted .gitmodules file, but we blindly gave it to “git clone” to clone submodules when “git clone –recurse-submodules” was used to clone a project that has such a submodule. The code has been hardened to reject such malformed URLs (e.g. one that begins with a dash). Credit for finding and fixing this vulnerability goes to joernchen and Jeff King, respectively. For more information, see:

(Security fix)

httpd-2.4.35: Upgraded. This release fixes bugs and regressions in httpd-2.4.34, adds an apache2ctl → apachectl symlink, and no longer automatically overwrites rc.httpd when upgraded.

extra/llvm/llvm-6.0.1: Upgraded. Moved this package from /patches, since it is not really a required patch. Unless you're planning to rebuild Firefox or Thunderbird (or have some other use-case for a more recent LLVM than was shipped with Slackware 14.2) you probably don't need to upgrade to this package, and it was reported that doing so impacted at least one package provided by slackbuilds.org. So, /extra seems like a better place for this package.

2018-09-22

linux-libre-*-4.4.157: Upgraded. This kernel removes the unnecessary vmacache_flush_all code which could have led to a use-after-free situation and potentially local privilege escalation. In addition, it fixes some regressions which may have led to diminished X performance. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2018-09-15

php-5.6.38: Upgraded. One security bug has been fixed in this release: Apache2: XSS due to the header Transfer-Encoding: chunked For more information, see:

(Security fix)

2018-09-13

ghostscript-9.25: Upgraded. This release fixes problems with argument handling, some unintended results of the security fixes to the SAFER file access restrictions (specifically accessing ICC profile files), and some additional security issues over the recent 9.24 release. For more information, see:

(Security fix)

lxc-2.0.1: Rebuilt. Added libunistring to the list of initial packages in the Slackware template since it is now required by wget, and without it slackpkg will not function properly. Thanks to mralk3.

2018-09-06

FXP: Mozilla products were purged from FXP, but we still pass on the free+libre dependencies supplied by the upstream, along with their message.

PV: Hey folks, in light of Firefox 52.x ESR reaching EOL a few hours ago, I'm providing some updates. This required adding Rust and a newer version of LLVM as optional updates for Slackware 14.2. And in case it doesn't work for you (perhaps there's an extension you need that's not supported by 60.x ESR), the last Firefox and Thunderbird 52.x EST have been moved to /pasture as a fallback. If there are any more updates to those (but I don't think there will be), I'll make those updates in /pasture as well.

llvm-6.0.1: Upgraded. This upgrade to LLVM is provided because Firefox and Thunderbird require a newer version than what was shipped with Slackware 14.2. The libLLVM shared library from llvm-3.8.0 is also included in this package, so it should be safe to upgrade on Slackware 14.2 systems without breaking anything, but unless you are planning to recompile Firefox or Thunderbird, or you need a newer version of LLVM for some reason, it is optional.

rust-1.28.0: Added. Since Rust is now a requirement to compile Firefox and Thunderbird we are adding it here. Unless you will need to recompile those (or need to compile other code written in Rust), it is an optional addition.

curl-7.61.1: Upgraded. This update fixes an NTLM password overflow via integer overflow. For more information, see:

(Security fix)

ghostscript-9.24: Upgraded. Patched multiple -dSAFER sandbox bypass vulnerabilities. Thanks to Tavis Ormandy. For more information, see:

(Security fix)

2018-08-29

linux-libre-*-4.4.153: Upgraded. This kernel update enables mitigations for L1 Terminal Fault aka Foreshadow and Foreshadow-NG vulnerabilities. Thanks to Bernhard Kaindl for bisecting the boot issue that was preventing us from upgrading to earlier 4.4.x kernels that contained this fix. To see the status of CPU vulnerability mitigations on your system, look at the files in: /sys/devices/system/cpu/vulnerabilities Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2018-08-21

libX11-1.6.6: Upgraded. This update fixes some security issues:

  • Fixed crash on invalid reply (CVE-2018-14598).
  • Fixed off-by-one writes (CVE-2018-14599).
  • Fixed out of boundary write (CVE-2018-14600).

For more information, see:

(Security fix)

2018-08-17

ntp-4.2.8p12: Upgraded. This release improves on one security fix in ntpd:

  • LOW/MEDIUM: Sec 3012: Sybil vulnerability: ephemeral association attack

While fixed in ntp-4.2.8p7 and with significant additional protections for this issue in 4.2.8p11, ntp-4.2.8p12 includes a fix for an edge case in the new noepeer support. Originally reported by Matt Van Gundy of Cisco. Edge-case hole reported by Martin Burnicki of Meinberg. And fixes another security issue in ntpq and ntpdc:

  • LOW: Sec 3505:

The openhost() function used during command-line hostname processing by ntpq and ntpdc can write beyond its buffer limit, which could allow an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. Reported by Fakhri Zulkifli. For more information, see:

(Security fix)

samba-4.6.16: Upgraded. This is a security release in order to address the following defects:

  • Insufficient input validation on client directory listing in libsmbclient.
  • A malicious server could return a directory entry that could corrupt libsmbclient memory.
  • Confidential attribute disclosure from the AD LDAP server.
  • Missing access control checks allow discovery of confidential attribute values via authenticated LDAP search expressions.

For more information, see:

(Security fix)

2018-08-14

blueman-2.0.6: Rebuilt.

  • Fixed install script to rename config file from .new.
  • Allow users in the netdev group to make changes. Thanks to voleg, kgha, and zakame.

openssl-1.0.2p: Upgraded. This update fixes two low severity security issues:

  • Client DoS due to large DH parameter.
  • Cache timing vulnerability in RSA Key Generation.

For more information, see:

(Security fix)

openssl-solibs-1.0.2p: Upgraded.

xscreensaver-5.40: Upgraded. Here's an upgrade to the latest xscreensaver.

2018-08-10

bind-9.10.8_P1: Upgraded. Fixed a security issue where named could crash during recursive processing of DNAME records when “deny-answer-aliases” was in use resulting in a denial of service. Note that “deny-answer-aliases” is rarely used. For more information, see:

(Security fix)

2018-08-02

lftp-4.8.4: Upgraded. It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system. For more information, see:

(Security fix)

blueman-2.0.6: Upgraded. This update fixes an issue where blueman-mechanism did not enforce the polkit action 'org.blueman.network.setup' for which a polkit policy is shipped. This meant that any user with access to the D-Bus system bus was able to access the related API without authentication. The result was an unspecified impact on the networking stack. Thanks to Matthias Gerstner for discovering this issue.

(Security fix)

2018-07-31

file-5.34: Upgraded. Fixed a denial of service crash when processing a crafted ELF file. For more information, see:

(Security fix)

2018-07-28

linux-libre-*-4.4.144: Upgraded. This kernel update enables additional mitigations for spectre_v2 (IBPB and IBRS_FW). It also enables reporting on the Speculative Store Bypass vulnerability (aka GPZ Variant 4) which affects Intel processors and must be patched with a microcode update. To see the status of CPU vulnerability mitigations on your system, look at the files in: /sys/devices/system/cpu/vulnerabilities In addition, these kernels enable SMB2. Here's the complete list of kernel config changes from the previous 4.4.132:

  • -X86_DEBUG_STATIC_CPU_HAS n
  • CIFS_SMB2 n → y
  • +CC_OPTIMIZE_FOR_PERFORMANCE y
  • +CIFS_SMB311 n
  • +X86_FAST_FEATURE_TESTS y

Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2018-07-21

php-5.6.37: Upgraded. Several security bugs have been fixed in this release, including:

  • Int Overflow lead to Heap OverFlow in exif_thumbnail_extract of exif.c
  • heap-buffer-overflow (READ of size 48) while reading exif data

(Security fix)

2018-07-18

httpd-2.4.34: Upgraded. This update fixes two denial of service issues:

  • mod_md: DoS via Coredumps on specially crafted requests
  • mod_http2: DoS for HTTP/2 connections by specially crafted requests

For more information, see:

(Security fix)

R-3.5.1: Upgraded (FXP)

2018-07-17

mutt-1.10.1: Upgraded. This update fixes bugs and security issues. Upstream strongly recommends that all IMAP and POP users upgrade as soon as possible.

(Security fix)

2018-07-12

bind-9.10.8: Upgraded. This update fixes security issues: Fixed a bug where extraordinarily large zone transfers caused several problems, with possible outcomes including corrupted journal files or server exit due to assertion failure. Don't permit recursive query service to unauthorized clients. For more information, see:

(Security fix)

curl-7.61.0: Upgraded. This update fixes a buffer overflow in SMTP send. For more information, see:

(Security fix)

zlib-1.2.11: Upgraded. This is a bugfix package update to fix decompression errors when zlib is used with recent versions of Node.js. Thanks to Ken Zalewski for the report.

2018-06-19

gnupg-1.4.23: Upgraded. Sanitize the diagnostic output of the original file name in verbose mode. By using a made up file name in the message it was possible to fake status messages. Using this technique it was for example possible to fake the verification status of a signed mail. For more information, see:

(Security fix)

libcgroup-0.41: Rebuilt. This is a bugfix package update.

  • Make cgexec setgid root (setuid root is an unnecessarily large hammer).
  • Added /etc/cgconfig.d/ directory.
  • Added “LANG=C” in build script to avoid a bug where rc.cgred reports syntax errors at start.

These changes are tested here, and work with unprivileged containers. Thanks to chris.willing.

libcgroup-0.41: Rebuilt. This is a bugfix package update. Make cgexec setuid root, since the cgred group doesn't exist on 14.2. This is how the -2 build was, but the change was inadvertently dropped in the previous update.

libgcrypt-1.7.10: Upgraded. Use blinding for ECDSA signing to mitigate a novel side-channel attack. For more information, see:

(Security fix)

libcgroup-0.41: Rebuilt. This is a bugfix package update. Apply all post 0.41 patches from git, including one for an infinite loop bug that causes 100% CPU usage on one core. Thanks to chris.willing.

2018-06-08

gnupg2-2.0.31: Upgraded. Sanitize the diagnostic output of the original file name in verbose mode. By using a made up file name in the message it was possible to fake status messages. Using this technique it was for example possible to fake the verification status of a signed mail. For more information, see:

(Security fix)

elilo-3.16: Rebuilt. Patched and rebuilt to fix issues with larger kernels.

2018-06-01

git-2.14.4: Upgraded. This update fixes security issues: Submodule “names” come from the untrusted .gitmodules file, but we blindly append them to $GIT_DIR/modules to create our on-disk repo paths. This means you can do bad things by putting ”../” into the name. We now enforce some rules for submodule names which will cause Git to ignore these malicious names (CVE-2018-11235). Credit for finding this vulnerability and the proof of concept from which the test script was adapted goes to Etienne Stalmans. It was possible to trick the code that sanity-checks paths on NTFS into reading random piece of memory (CVE-2018-11233). Credit for fixing for these bugs goes to Jeff King, Johannes Schindelin and others. For more information, see:

(Security fix)

glibc-zoneinfo-2018e: Rebuilt. Handle removal of US/Pacific-New timezone. If we see that the machine is using this, it will be automatically switched to US/Pacific.

2018-05-23

linux-libre-4.4.132: Upgraded. This kernel upgrade is being provided primarily to fix a regression in the getsockopt() function, but it also contains fixes for two denial-of-service security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

procps-ng-3.3.15: Upgraded. Shared library .so-version bump. This update fixes bugs and security issues:

  • library: Fix integer overflow and LPE in file2strvec
  • library: Use size_t for alloc functions
  • pgrep: Fix stack-based buffer overflow
  • ps: Fix buffer overflow in output buffer, causing DOS
  • top: Don't use cwd for location of config

For more information, see:

(Security fix)

2018-05-17

curl-7.60.0: Upgraded. This release contains security fixes:

  • FTP: shutdown response buffer overflow
  • RTSP: bad headers buffer over-read

For more information, see:

(Security fix)

php-5.6.36: Upgraded. This fixes many bugs, including some security issues:

  • Heap Buffer Overflow (READ: 1786) in exif_iif_add_value
  • stream filter convert.iconv leads to infinite loop on invalid sequence
  • Malicious LDAP-Server Response causes crash
  • fix for CVE-2018-5712 may not be complete

For more information, see:

(Security fix)

2018-05-11

2018-05-09

glibc-zoneinfo-2018e: Upgraded. This package provides the latest timezone updates.

wget-1.19.5: Upgraded. Fixed a security issue where a malicious web server could inject arbitrary cookies into the cookie jar file. For more information, see:

(Security fix)

2018-05-04

2018-05-01

2018-04-30

openvpn-2.4.6: Upgraded. This is a security update fixing a potential double-free() in Interactive Service. This usually only leads to a process crash (DoS by an unprivileged local account) but since it could possibly lead to memory corruption if happening while multiple other threads are active at the same time, CVE-2018-9336 has been assigned to acknowledge this risk. For more information, see:

(Security fix)

2018-04-28

R-3.5.0: Upgraded (FXP)

2018-04-18

gd-2.2.5: Upgraded. This update fixes two security issues: Double-free in gdImagePngPtr() (denial of service). Buffer over-read into uninitialized memory (information leak). For more information, see:

(Security fix)

2018-04-06

patch-2.7.6: Upgraded. Fix arbitrary shell execution possible with obsolete ed format patches. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156

(Security fix)

libidn-1.34: Upgraded. This update fixes security issues:

  • Fix integer overflow in combine_hangul()
  • Fix integer overflow in punycode decoder
  • Fix NULL pointer dereference in g_utf8_normalize()
  • Fix NULL pointer dereference in stringprep_ucs4_nfkc_normalize()

(Security fix)

2018-04-03

puddletag-1.2.0: Upgraded (FXP)

2018-04-01

php-5.6.35: Upgraded. This update fixes a security issue where sensitive data belonging to other accounts might be accessed by a local user. For more information, see: http://bugs.php.net/75605

(Security fix)

2018-03-29

ruby-2.2.10: Upgraded. This release includes some bug fixes and some security fixes:

  • HTTP response splitting in WEBrick.
  • Unintentional file and directory creation with directory traversal in tempfile and tmpdir.
  • DoS by large request in WEBrick.
  • Buffer under-read in String#unpack.
  • Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket.
  • Unintentional directory traversal by poisoned NUL byte in Dir.
  • Multiple vulnerabilities in RubyGems.

For more information, see:

(Security fix)

openssl-1.0.2o: Upgraded. This update fixes a security issue: Constructed ASN.1 types with a recursive definition could exceed the stack. For more information, see:

(Security fix)

openssl-solibs-1.0.2o: Upgraded.

glibc-zoneinfo-2018d: Upgraded. This package provides the latest timezone updates.

2018-03-20

New FXP packages: ftgl-2.1.3_rc5, projectM-2.1.0

2018-03-18

2018-03-16

curl-7.59.0: Upgraded. This update fixes security issues: FTP path trickery leads to NIL byte out of bounds write LDAP NULL pointer dereference RTSP RTP buffer over-read For more information, see:

(Security fix)

R-3.4.4: Upgraded (FXP)

2018-03-13

samba-4.4.16: Rebuilt. This is a security update in order to patch the following defect: On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users` passwords, including administrative users. For more information, see:

(Security fix)

libtool-2.4.6: Rebuilt. Rebuilt to fix the embedded GCC version number. Thanks to David Spencer.

openssh-7.4p1: Rebuilt. sftp-server: in read-only mode, sftp-server was incorrectly permitting creation of zero-length files. Reported by Michal Zalewski. Thanks to arny (of Bluewhite64 fame) for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906

(Security fix)

php-5.6.34: Upgraded. This update fixes a stack buffer overflow vulnerability. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584

(Security fix)

2018-03-04

icecat-52.6.0: Upgraded (FXP). This update includes upstream features and patches. https://www.mozilla.org/en-US/firefox/52.6.0/releasenotes/

(Security fix)

linux-libre-*-4.4.118: Upgraded. This kernel includes __user pointer sanitization mitigation for the Spectre (variant 1) speculative side channel attack. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753

(Security fix)

You may have to force slackpkg to load the files, even though ChangeLog hasn't changed.

2018-03-01

dhcp-4.4.1: Upgraded. This update fixes two security issues:

(Security fix)

ntp-4.2.8p11: Upgraded. This release addresses five security issues in ntpd:

(Security fix)

wget-1.19.4: Rebuilt. Applied upstream patch to fix logging in background mode. Thanks to Willy Sudiarto Raharjo.

2018-02-23

compton-316eac0613bf342ff91cc645a6c3c80e6b9083fb: Upgraded.

New FXP package: gtklife-5.2

2018-02-15

2018-02-11

New FXP package: unrar-5.5.8

2018-02-09

linux-libre-*-4.4.115: Upgraded. This kernel includes full retpoline mitigation for the Spectre (variant 2) speculative side channel attack. Please note that this kernel was compiled with gcc-5.5.0, also provided as an update for Slackware FreeSlack 14.2. You'll need to install the updated gcc in order to compile kernel modules that will load into this updated kernel. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

You may have to force slackpkg to load the files, even though ChangeLog hasn't changed.

2018-02-08

New FXP package: ghc-7.10.3

2018-02-07

gcc-5.5.0: Upgraded. Upgraded to the latest gcc-5 release, with patches to support -mindirect-branch=thunk-extern, allowing full mitigation of Spectre v2 in the kernel (when CONFIG_RETPOLINE is used).

  • gcc-g++-5.5.0: Upgraded.
  • gcc-gfortran-5.5.0: Upgraded.
  • gcc-gnat-5.5.0: Upgraded.
  • gcc-go-5.5.0: Upgraded.
  • gcc-java-5.5.0: Upgraded.
  • gcc-objc-5.5.0: Upgraded.

2018-02-04

php-5.6.33: Upgraded. This update fixes bugs and security issues, including: Potential infinite loop in gdImageCreateFromGifCtx. Reflected XSS in .phar 404 page. For more information, see:

(Security fix)

mariadb-10.0.34: Upgraded. This update fixes bugs and security issues. For more information, see:

(Security fix)

rsync-3.1.3: Upgraded. This update fixes two security issues: Fixed a buffer overrun in the protocol's handling of xattr names and ensure that the received name is null terminated. Fix an issue with –protect-args where the user could specify the arg in the protected-arg list and short-circuit some of the arg-sanitizing code. For more information, see:

(Security fix)

curl-7.58.0: Rebuilt. Recompiled using –with-libssh2, which is evidently no longer a default option. Thanks to Markus Wiesner.

2018-01-24

curl-7.58.0: Upgraded. This update fixes security issues: HTTP authentication leak in redirects HTTP/2 trailer out-of-bounds read For more information, see:

(Security fix)

glibc-zoneinfo: Upgraded. This package provides the latest timezone updates.

wget-1.19.4: Upgraded. More bug fixes: A major bug that caused GZip'ed pages to never be decompressed has been fixed Support for Content-Encoding and Transfer-Encoding have been marked as experimental and disabled by default

2018-01-18

bind-9.10.6_P1: Upgraded. This update fixes a high severity security issue: Improper sequencing during cleanup can lead to a use-after-free error, triggering an assertion failure and crash in named. For more information, see:

(Security fix)

2018-01-17

linux-libre-*-4.4.111: Upgraded. This kernel includes mitigations for the Spectre (variant 2) and Meltdown speculative side channel attacks. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2018-01-09

irssi-1.0.6: Upgraded. This update fixes multiple security vulnerabilities. For more information, see:

(Security fix)

xscreensaver-5.38: Upgraded. Here's an upgrade to the latest xscreensaver.

2018-01-05

R-3.4.3: Upgraded (FXP)

2017-12-20

ruby-2.2.9: Upgraded. This update fixes a security issue: Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the pipe character “|”, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution. For more information, see:

(Security fix)

2017-12-08

openssl-1.0.2n: Upgraded. This update fixes security issues: Read/write after SSL object in error state rsaz_1024_mul_avx2 overflow bug on x86_64 For more information, see:

(Security fix)

openssl-solibs-1.0.2n: Upgraded.

curl-7.57.0: Upgraded. This update fixes security issues: SSL out of buffer access FTP wildcard out of bounds read NTLM buffer overflow via integer overflow For more information, see:

(Security fix)

libXcursor-1.1.15: Upgraded. Fix heap overflows when parsing malicious files. (CVE-2017-16612) It is possible to trigger heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments. The integer overflow occurs because the chosen limit 0x10000 for dimensions is too large for 32 bit systems, because each pixel takes 4 bytes. Properly chosen values allow an overflow which in turn will lead to less allocated memory than needed for subsequent reads. The signedness bug is triggered by reading the length of a comment as unsigned int, but casting it to int when calling the function XcursorCommentCreate. Turning length into a negative value allows the check against XCURSOR_COMMENT_MAX_LEN to pass, and the following addition of sizeof (XcursorComment) + 1 makes it possible to allocate less memory than needed for subsequent reads. For more information, see:

(Security fix)

libXfont-1.5.1: Rebuilt. Open files with O_NOFOLLOW. (CVE-2017-16611) A non-privileged X client can instruct X server running under root to open any file by creating own directory with “fonts.dir”, “fonts.alias” or any font file being a symbolic link to any other file in the system. X server will then open it. This can be issue with special files such as /dev/watchdog (which could then reboot the system). For more information, see:

(Security fix)

2017-11-28

samba-4.4.16: Rebuilt. This is a security update in order to patch the following defects:

  • CVE-2017-14746 (Use-after-free vulnerability.)

All versions of Samba from 4.0.0 onwards are vulnerable to a use after free vulnerability, where a malicious SMB1 request can be used to control the contents of heap memory via a deallocated heap pointer. It is possible this may be used to compromise the SMB server.

  • CVE-2017-15275 (Server heap memory information leak.)

All versions of Samba from 3.6.0 onwards are vulnerable to a heap memory information leak, where server allocated heap memory may be returned to the client without being cleared.

For more information, see:

(Security fix)

2017-11-21

libtiff-4.0.9: Upgraded. This release contains security fixes and improvements. For more information, see:

(Security fix)

2017-11-16

2017-11-04

New FXP packages:

  • gnucash-2.6.13 and its pre-requisites
  • goffice0.8-0.8.17
  • libgnomecanvas
  • libofx-0.9.11
  • libwebp-0.6.0
  • webkitgtk-2.4.11

2017-11-03

mariadb-10.0.33: Upgraded. This update fixes bugs and security issues. For more information, see:

(Security fix)

openssl-1.0.2m: Upgraded. This update fixes a security issue: There is a carry propagating bug in the x64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. For more information, see:

(Security fix)

openssl-solibs-1.0.2m: Upgraded.

2017-10-27

NetworkManager-1.8.4: Upgraded. This update is provided to address issues with wifi scanning when using the new wpa_supplicant with certain hardware drivers. If you're not having problems, you don't need this update (but it probably won't hurt).

network-manager-applet-1.8.4: Upgraded. This package goes along with the optional NetworkManager update.

php-5.6.32: Upgraded. Several security bugs were fixed in this release: Out of bounds read in timelib_meridian(). The arcfour encryption stream filter crashes PHP. Applied upstream patch for PCRE (CVE-2016-1283). For more information, see:

(Security fix)

wget-1.19.2: Upgraded. This update fixes stack and heap overflows in in HTTP protocol handling. For more information, see:

(Security fix)

2017-10-26

glibc-zoneinfo-2017c: Upgraded. This package provides the latest timezone updates.

httpd-2.4.29: Upgraded. This is a bugfix release.

irssi-1.0.5: Upgraded. This update fixes some remote denial of service issues. For more information, see:

(Security fix)

xfce4-weather-plugin-0.8.10: Upgraded. This has a bugfix related to setting the location: https://bugzilla.xfce.org/show_bug.cgi?id=13877

2017-10-24

curl-7.56.1: Upgraded. This update fixes a security issue: IMAP FETCH response out of bounds read may cause a crash or information leak. For more information, see:

(Security fix)

2017-10-06

libXres-1.2.0: Upgraded. Integer overflows may allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions. For more information, see:

(Security fix)

wpa_supplicant-2.6: Upgraded. This update includes patches to mitigate the WPA2 protocol issues known as “KRACK” (Key Reinstallation AttaCK), which may be used to decrypt data, hijack TCP connections, and to forge and inject packets. This is the list of vulnerabilities that are addressed here:

(Security fix)

xorg-server-1.18.3: Rebuilt. This update fixes integer overflows and other possible security issues. For more information, see:

(Security fix)

xorg-server-xephyr-1.18.3: Rebuilt.

xorg-server-xnest-1.18.3: Rebuilt.

xorg-server-xvfb-1.18.3: Rebuilt.

2017-10-06

curl-7.56.0: Upgraded. This update fixes a security issue: libcurl may read outside of a heap allocated buffer when doing FTP. For more information, see:

(Security fix)

openjpeg-2.3.0: Upgraded. This update fixes security issues which may lead to a denial of service or possibly remote code execution. For more information, see:

(Security fix)

xorg-server-1.18.3: Rebuilt. This update fixes two security issues: Xext/shm: Validate shmseg resource id, otherwise it can belong to a non-existing client and abort X server with FatalError “client not in use”, or overwrite existing segment of another existing client. Generating strings for XKB data used a single shared static buffer, which offered several opportunities for errors. Use a ring of resizable buffers instead, to avoid problems when strings end up longer than anticipated. For more information, see:

(Security fix)

xorg-server-xephyr-1.18.3: Rebuilt.

xorg-server-xnest-1.18.3: Rebuilt.

xorg-server-xvfb-1.18.3: Rebuilt.

2017-10-02

dnsmasq-2.78: Upgraded. This update fixes bugs and remotely exploitable security issues that may have impacts including denial of service, information leak, and execution of arbitrary code. Thanks to Felix Wilhelm, Fermin J. Serna, Gabriel Campana, Kevin Hamacher, Ron Bowes, and Gynvael Coldwind of the Google Security Team. For more information, see:

(Security fix)

2017-10-01

2017-09-28

gegl-0.2.0: Rebuilt. Patched integer overflows in operations/external/ppm-load.c that could allow a denial of service (application crash) or possibly the execution of arbitrary code via a large width or height value in a ppm image. For more information, see:

(Security fix)

2017-09-23

libxml2-2.9.5: Upgraded. This release fixes some security issues: Detect infinite recursion in parameter entities (Nick Wellnhofer), Fix handling of parameter-entity references (Nick Wellnhofer), Disallow namespace nodes in XPointer ranges (Nick Wellnhofer), Fix XPointer paths beginning with range-to (Nick Wellnhofer). (Security fix)

python-2.7.14: Upgraded. Updated to the latest 2.7.x release. This fixes some security issues related to the bundled expat library. For more information, see:

(Security fix)

2017-09-21

samba-4.4.16: Upgraded. This is a security release in order to address the following defects: SMB1/2/3 connections may not require signing where they should. A man in the middle attack may hijack client connections. SMB3 connections don't keep encryption across DFS redirects. A man in the middle attack can read and may alter confidential documents transferred via a client connection, which are reached via DFS redirect when the original connection used SMB3. Server memory information leak over SMB1. Client with write access to a share can cause server memory contents to be written into a file or printer. For more information, see:

(Security fix)

2017-09-18

httpd-2.4.27: Rebuilt. This update patches a security issue (“Optionsbleed”) with the OPTIONS http method which may leak arbitrary pieces of memory to a potential attacker. Thanks to Hanno Bo:ck. For more information, see:

(Security fix)

libgcrypt-1.7.9: Upgraded. Mitigate a local side-channel attack on Curve25519 dubbed “May the Fourth be With You”. For more information, see:

(Security fix)

ruby-2.2.8: Upgraded. This release includes several security fixes. For more information, see:

(Security fix)

2017-09-16

bluez-5.47: Upgraded. Fixed an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests. For more information, see:

(Security fix)

linux-libre-*-4.4.88: Upgraded. This update fixes the security vulnerability known as “BlueBorne”. The native Bluetooth stack in the Linux Kernel (BlueZ), starting at Linux kernel version 3.3-rc1 is vulnerable to a stack overflow in the processing of L2CAP configuration responses resulting in remote code execution in kernel space. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2017-09-12

emacs-25.3: Upgraded. This update fixes a security vulnerability in Emacs. Gnus no longer supports “richtext” and “enriched” inline MIME objects. This support was disabled to avoid evaluation of arbitrary Lisp code contained in email messages and news articles. For more information, see:

(Security fix)

libzip-1.0.1: Rebuilt. Fix a denial of service security issue. For more information, see:

(Security fix)

2017-09-08

bash-4.3.048: Upgraded. This update fixes two security issues found in bash before 4.4: The expansion of '\h' in the prompt string allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine. The theoretical attack vector is a hostile DHCP server providing a crafted hostname, but this is unlikely to occur in a normal Slackware configuration as we ignore the hostname provided by DHCP. Specially crafted SHELLOPTS+PS4 environment variables used against bogus setuid binaries using system()/popen() allowed local attackers to execute arbitrary code as root. For more information, see:

(Security fix)

mariadb-10.0.32: Upgraded. This update fixes bugs and security issues. For more information, see:

(Security fix)

mozilla-nss-3.31.1: Upgraded. Upgraded to nss-3.31.1 and nspr-4.16. This is a bugfix release.

tcpdump-4.9.2: Upgraded. This update fixes bugs and many security issues (see the included CHANGES file). For more information, see:

(Security fix)

2017-09-03

icecat-52.3.0: Upgraded. This update includes upstream features and patches. https://www.mozilla.org/en-US/security/advisories/mfsa2017-19/ (Security fix)

2017-08-12

xorg-server-1.18.3: Rebuilt. This update fixes two security issues: a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server allowed authenticated malicious users to access potentially privileged data from the X server. For more information, see:

(Security fix)

xorg-server-xephyr-1.18.3: Rebuilt.

xorg-server-xnest-1.18.3: Rebuilt.

xorg-server-xvfb-1.18.3: Rebuilt.

2017-08-12

git-2.14.1: Upgraded. Fixes security issues: A "ssh://..." URL can result in a “ssh” command line with a hostname that begins with a dash “-”, which would cause the “ssh” command to instead (mis)treat it as an option. This is now prevented by forbidding such a hostname (which should not impact any real-world usage). Similarly, when GIT_PROXY_COMMAND is configured, the command is run with host and port that are parsed out from "ssh://..." URL; a poorly written GIT_PROXY_COMMAND could be tricked into treating a string that begins with a dash “-” as an option. This is now prevented by forbidding such a hostname and port number (again, which should not impact any real-world usage). For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117 (Security fix)

libsoup-2.52.2: Rebuilt. Fixed a chunked decoding buffer overrun that could be exploited against either clients or servers. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885 (Security fix)

mercurial-4.3.1: Upgraded. Fixes security issues: Mercurial's symlink auditing was incomplete prior to 4.3, and could be abused to write to files outside the repository. Mercurial was not sanitizing hostnames passed to ssh, allowing shell injection attacks on clients by specifying a hostname starting with -oProxyCommand. For more information, see:

(Security fix)

subversion-1.9.7: Upgraded. Fixed client side arbitrary code execution vulnerability. For more information, see:

(Security fix)

2017-08-11

curl-7.55.0: Upgraded. This update fixes three security issues:

  • URL globbing out of bounds read
  • TFTP sends more than buffer size
  • FILE buffer read out of bounds

For more information, see:

(Security fix)

glibc-2.23: Rebuilt. Fixed a regression with the recent glibc patch packages: Don't clobber the libm.so linker script with a symlink. Thanks to guanx.

glibc-i18n-2.23: Rebuilt.

glibc-profile-2.23: Rebuilt.

glibc-solibs-2.23: Rebuilt.

2017-08-20

gnupg-1.4.22: Upgraded. Mitigate a flush+reload side-channel attack on RSA secret keys dubbed “Sliding right into disaster”. For more information, see:

(Security fix)

2017-07-28

squashfs-tools-4.3: Rebuilt. Patched a couple of denial of service issues and other bugs. For more information, see:

(Security fix)

dbus-1.10.8: Rebuilt. Don't demand high-quality entropy from expat-2.2.2+ because 1) dbus doesn't need it and 2) it can cause the boot process to hang if dbus times out. Thanks to SeB for a link to the bug report and patch.

bind-9.10.5_P3: Upgraded. Fix a regression in the previous BIND release that broke verification of TSIG signed TCP message sequences where not all the messages contain TSIG records. Compiled to use libidn rather than the deprecated (and broken) idnkit.

2017-07-14

tcpdump-4.9.1: Upgraded. This update fixes an issue where tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108 (Security fix)

expat-2.2.2: Upgraded. Fixes security issues including: external entity infinite loop DoS. For more information, see:

(Security fix)

gd-2.2.4: Upgraded. Fixes security issues: gdImageCreate() doesn't check for oversized images and as such is prone to

  • DoS vulnerabilities. (CVE-2016-9317)
  • double-free in gdImageWebPtr() (CVE-2016-6912)
  • potential unsigned underflow in gd_interpolation.c (CVE-2016-10166)
  • DOS vulnerability in gdImageCreateFromGd2Ctx() (CVE-2016-10167)
  • Signed Integer Overflow gd_io.c (CVE-2016-10168)

For more information, see:

(Security fix)

libtirpc-1.0.2: Upgraded. This is a bugfix release.

rpcbind-0.2.4: Rebuilt. Fixed a bug in a previous patch where a svc_freeargs() call ended up freeing a static pointer causing rpcbind to crash. Thanks to Jonathan Woithe, Rafael Jorge Csura Szendrodi, and Robby Workman for identifying the problem and helping to test a fix.

2017-07-14

mariadb-10.0.31: Upgraded. This update fixes bugs and security issues. For more information, see:

(Security fix)

samba-4.4.15 Upgraded. This update fixes an authentication validation bypass security issue: “Orpheus' Lyre mutual authentication validation bypass” All versions of Samba from 4.0.0 onwards using embedded Heimdal Kerberos are vulnerable to a man-in-the-middle attack impersonating a trusted server, who may gain elevated access to the domain by returning malicious replication or authorization data. Samba binaries built against MIT Kerberos are not vulnerable. For more information, see:

(Security fix)

httpd-2.4.27 Upgraded. This update fixes two security issues: Read after free in mod_http2 (CVE-2017-9789) Uninitialized memory reflection in mod_auth_digest (CVE-2017-9788) Thanks to Robert Swiecki for reporting these issues. For more information, see:

(Security fix)

2017-07-10

libtirpc-1.0.1: Rebuilt. Patched a bug which can cause a denial of service through memory exhaustion. Thanks to Robby Workman. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779 (Security fix)

rpcbind-0.2.4: Upgraded. Patched a bug which can cause a denial of service through memory exhaustion. Thanks to Robby Workman. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779 (Security fix)

2017-07-09

irssi-1.0.4: Upgraded. This release fixes two remote crash issues as well as a few bugs. For more information, see:

(Security fix)

2017-07-07

ca-certificates-20161130: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections.

php-5.6.31: Upgraded. This release fixes bugs and security issues. For more information, see:

(Security fix)

glibc-2.23: Rebuilt. Recompiled with upstream patch from git: “[PATCH] X86: Don't assert on older Intel CPUs [BZ #20647]” This fixes an ldconfig failure on older Intel CPUs including Pentium MMX.

glibc-i18n-2.23: Rebuilt.

glibc-profile-2.23: Rebuilt.

glibc-solibs-2.23: Rebuilt.

xscreensaver-5.37: Upgraded. Here's an upgrade to the latest xscreensaver.

2017-07-02

linux-libre-*-4.4.75: Upgraded. This kernel fixes security issues that include possible stack exhaustion, memory corruption, and arbitrary code execution. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

2017-07-01

2017-06-29

bind-9.10.5_P2: Upgraded. This update fixes a high severity security issue: an error in TSIG handling could permit unauthorized zone transfers or zone updates. For more information, see:

(Security fix)

httpd-2.4.26: Upgraded. This update fixes security issues which may lead to an authentication bypass or a denial of service:

  • important: ap_get_basic_auth_pw() Authentication Bypass CVE-2017-3167
  • important: mod_ssl Null Pointer Dereference CVE-2017-3169
  • important: mod_http2 Null Pointer Dereference CVE-2017-7659
  • important: ap_find_token() Buffer Overread CVE-2017-7668
  • important: mod_mime Buffer Overread CVE-2017-7679

For more information, see:

(Security fix)

libgcrypt-1.7.8: Upgraded. Mitigate a local flush+reload side-channel attack on RSA secret keys dubbed “Sliding right into disaster”. For more information, see:

(Security fix)

mkinitrd-1.4.10: Upgraded. Added support for -P option and MICROCODE_ARCH in mkinitrd.conf to specify a microcode archive to be prepended to the initrd for early CPU microcode patching by the kernel. Thanks to SeB.

2017-06-27

linux-libre-*-4.4.74: Upgraded. This kernel fixes two “Stack Clash” vulnerabilities reported by Qualys. The first issue may allow attackers to execute arbitrary code with elevated privileges. Failed attack attempts will likely result in denial-of-service conditions. The second issue can be exploited to bypass certain security restrictions and perform unauthorized actions.

Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see:

(Security fix)

nasm-2.13.01: Upgraded. This update is needed for some newer projects to compile properly.

2017-06-21

2017-06-15

bind-9.10.5_P1: Upgraded. Fixed denial of service security issue: some RPZ configurations could go into an infinite query loop when encountering responses with TTL=0. For more information, see:

(Security fix)

pkg-config-0.29.2: Upgraded. This is a bugfix release, and is needed for some updates on slackbuilds.org to compile properly. Thanks to Willy Sudiarto Raharjo.

2017-06-08

irssi-1.0.3: Upgraded. Fixed security issues that may result in a denial of service. For more information, see:

(Security fix)

sudo-1.8.20p2: Upgraded. This is a bugfix release: Fixed a bug parsing /proc/pid/stat when the process name contains a newline. This is not exploitable due to the /dev traversal changes made in sudo 1.8.20p1.

2017-05-30

lynx-2.8.8rel.2: Rebuilt. Fixed lynx startup without a URL by correcting STARTFILE in lynx.cfg to use the new URL for the Lynx homepage. Thanks to John David Yost.

sudo-1.8.20p1: Upgraded. This update fixes a potential overwrite of arbitrary system files. This bug was discovered and analyzed by Qualys, Inc. For more information, see:

(Security fix)

2017-05-25

icecat-52.1.0: Upgraded. This marks a switch to a repackaged binary build by Gnuzilla. (Security fix)

2017-05-24

samba-4.4.14: Upgraded. This update fixes a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it. For more information, see https://www.samba.org/samba/security/CVE-2017-7494.html and http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494 (Security fix)

gkrellm-2.3.10: Upgraded. This is a bugfix release to fix a broken gkrellm.pc.

2017-05-16

freetype-2.6.3: Rebuilt. This update fixes an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c. For more information, see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 (Security fix)

kdelibs-4.14.32: Upgraded. This update fixes a security issue with KAuth that can lead to gaining root from an unprivileged account. For more information, see:

(Security fix)

2017-05-01

rxvt-2.7.10: Rebuilt. Patched an integer overflow that can crash rxvt with an escape sequence, or possibly have unspecified other impact. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7483 (Security fix)

xfce4-weather-plugin-0.8.9: Upgraded. Package upgraded to fix the API used to fetch weather data. Thanks to Robby Workman.

2017-04-23

getmail-4.54.0: Upgraded. This is a bugfix release to fix a failure to retrieve HTML formatted emails that contain a line longer than 1024 characters. Thanks to Edward Trumbo.

ntp-4.2.8p10: Upgraded. In addition to bug fixes and enhancements, this release fixes security issues of medium and low severity:

  • Denial of Service via Malformed Config (Medium)
  • Authenticated DoS via Malicious Config Option (Medium)
  • Potential Overflows in ctl_put() functions (Medium)
  • Buffer Overflow in ntpq when fetching reslist from a malicious ntpd (Medium)
  • 0rigin DoS (Medium)
  • Buffer Overflow in DPTS Clock (Low)
  • Improper use of snprintf() in mx4200_send() (Low)
  • The following issues do not apply to Linux systems:
  • Privileged execution of User Library code (WINDOWS PPSAPI ONLY) (Low)
  • Stack Buffer Overflow from Command Line (WINDOWS installer ONLY) (Low)
  • Data Structure terminated insufficiently (WINDOWS installer ONLY) (Low)

For more information, see:

(Security fix)

proftpd-1.3.5e: Upgraded. This release fixes a security issue: AllowChrootSymlinks off does not check entire DefaultRoot path for symlinks. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418 (Security fix)

2017-04-19

minicom-2.7.1: Upgraded. Fix an out of bounds data access that can lead to remote code execution. This issue was found by Solar Designer of Openwall during a security audit of the Virtuozzo 7 product, which contains derived downstream code in its prl-vzvncserver component. For more information, see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467 (Security fix)

2017-04-14

2017-04-08

2017-04-01

samba-4.4.13: Upgraded. This is a bug fix release to address a regression introduced by the security fixes for CVE-2017-2619 (Symlink race allows access outside share definition). Please see https://bugzilla.samba.org/show_bug.cgi?id=12721 for details.

2017-03-28

mariadb-10.0.30: Upgraded. This update fixes security issues: Crash in libmysqlclient.so. Difficult to exploit vulnerability allows low privileged attacker with logon to compromise the server. Successful attacks of this vulnerability can result in unauthorized access to data. For more information, see:

(Security fix)

2017-03-24

glibc-zoneinfo-2017b: Upgraded. This package provides the latest timezone updates.

mcabber-1.0.5: Upgraded. This update fixes a security issue: An incorrect implementation of XEP-0280: Message Carbons in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5604 (Security fix)

samba-4.4.12: Upgraded. This update fixes a security issue: All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619 (Security fix)

2017-03-15

glibc-zoneinfo-2017a: Upgraded. This package provides the latest timezone updates.

libcgroup-0.41: Rebuilt. This is a bugfix package update. Fixed rc.cgred to source the correct config file. Don't remove the entire cgroup file system with “rc.cgconfig stop”. Thanks to chris.willing. NOTE: Be sure to install any .new config files.

pidgin-2.12.0: Upgraded. This update fixes a minor security issue (out of bounds memory read in purple_markup_unescape_entity). For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640 (Security fix)

2017-03-08

R-3.3.3, icecat-45.7.0: Upgraded.

2017-02-05

murrine, murrine-themes: Added to FXP.

2017-02-04

libreoffice-5.3.0: Added to FXP.

2017-01-29

nted (NoteEdit): Added to FXP.

2017-01-14

SDL2, SDL2_image, physfs, supertux: Added to FXP.

2017-01-09

nethack-3.6.0, fontforge-20150824: Added to FXP.

2016-12-17

Fixed up output formatting in freepkg, which is now ready for testing; please let us know if you have comments, feature requests, or package requests.

2016-12-15

meld3, gtksourceview3, glade: Added to FXP.

2016-12-13

Kernel upgrade 4.4.29 → 4.4.38

2016-12-05

icecat-45.5.1: Upgraded.

2016-11-03

Kernel upgrade 4.4.19 → 4.4.29

2016-10-26

linux-libre-image 4.4.27 fixes Dirty COW (CVE-2016-5195)

2016-08-26

Kernel upgrade 4.4.14 → 4.4.19

2016-08-09

Purged non-free font-bh-ttf and font-bh-type1 from the main repository.

2016-08-09

icecat-38.8.0: Rebuilt to avoid unidentified crashes on some CPUs.

changelog_14.2.txt · Last modified: 2018/12/08 03:11 by connie