Kernel 5.4.43 (27/05-20)
Skriven Av: minime Den: 2020-05-28 07:18:18  https://tinyurl.com/y972qd7w
Redigerad: 2020-05-28 21:28:53 av: mdkdio 

Kernel 5.4.43 innehåller 111 uppdateringar, förändringar och/eller nya funktioner sedan 5.4.42.
Mer information om detta, vänligen kolla igenom changelog i länken ovan eller läsa diff log här.

Slackware Current uppdaterat 28/5

Slackware Current (14.2+/15.0) och uppdateringar från och med den 18 May
Skriven Av: minime Den: 2020-05-20 14:00:54  https://www.slackwarelinux.se/?s=chglog64
Redigerad: 2020-05-23 14:11:22 av: mdkdio 

En liten "heads up" angående PAM, då man kör slackpkg upgrade så installeras inte alla nödvändiga PAM paket av sig själv.
man måste installera dessa manuellt.

Dessa paket är:

  • pam-1.3.1-*-1.txz
  • cracklib-2.9.7-*-1.txz
  • libpwquality-1.4.2-*-1.txz

Se till att göra detta innan ni startar om systemet, för annars låser ni er ute själva helt och hållet.

Enklaste lösningen är:
Följ anvisningarna för slackpkg.
slackpkg update
slackpkg install-new
slackpkg upgrade-all
Så ska det fungera

Kernel 4.4.224
Skriven Av: minime Den: 2020-05-20 13:26:44  https://tinyurl.com/ycg5wcjw 

Kernel 4.4.224 innehåller 86 uppdateringar, förändringar och/eller nya funktioner sedan 4.4.223.
Mer information om detta, vänligen kolla igenom changelog i länken ovan eller läsa diff log här.

Slackware 14.2 "paket" är inte uppdaterad.

Kernel 5.4.42
Skriven Av: minime Den: 2020-05-20 13:23:23  https://tinyurl.com/ydcmu4js
Redigerad: 2020-05-22 07:48:50 av: mdkdio 

Kernel 5.4.42 innehåller 147 uppdateringar, förändringar och/eller nya funktioner sedan 5.4.41.
Mer information om detta, vänligen kolla igenom changelog i länken ovan eller läsa diff log här.

Slackware Current uppdaterat 20/5

Säkerhets uppdateringar 19/5 -20
Skriven Av: mdkdio Den: 2020-05-20 08:15:07  
Redigerad: 2020-05-20 08:15:25 av: mdkdio 

[slackware-security] libexif (SSA:2020-140-02)
New libexif packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

&

[slackware-security] bind (SSA:2020-140-01)
New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/libexif-0.6.22-i486-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues: CVE-2018-20030:
Fix for recursion DoS CVE-2020-13114:
Time consumption DoS when parsing canon array markers CVE-2020-13113:
Potential use of uninitialized memory CVE-2020-13112:
Various buffer overread fixes due to integer overflows in maker notes CVE-2020-0093:
read overflow CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs CVE-2020-12767:
fixed division by zero CVE-2016-6328: fixed integer overflow when parsing maker notes CVE-2017-7544:
fixed buffer overread
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544
(* Security fix *)

+--------------------------+

&

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.19-i586-1_slack14.2.txz: Upgraded.
This update fixes security issues:
A malicious actor who intentionally exploits the lack of effective limitation
on the number of fetches performed when processing referrals can,
through the use of specially crafted referrals, cause a recursing server
to issue a very large number of fetches in an attempt to process the referral.
This has at least two potential effects:
The performance of the recursing server can potentially be degraded
by the additional work required to perform these fetches,
and the attacker can exploit this behavior to use the recursing server as a reflector
in a reflection attack with a high amplification factor.
Replaying a TSIG BADTIME response as a request could trigger an assertion failure.
For more information, see:
https://kb.isc.org/docs/cve-2020-8616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
https://kb.isc.org/docs/cve-2020-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
(* Security fix *)

+--------------------------+

Senaste artikeln är:
Fingeravtrycksläsare i Slackware Linux 15.0

Info om cookies:
Cookies


RSS resultat...

Håkans Slackware

Till minne av Håkan Nilsson
Mitt Slackware
Appendix Programhantering

Senaste Kernel Versioner
Mainline
6.9-rc6 2024-04-28
Stable
6.8.9 2024-05-02
Longterm
6.6.30 2024-05-02
6.1.90 2024-05-02
5.15.158 2024-05-02
5.10.216 2024-05-02
5.4.275 2024-05-02
4.19.313 2024-05-02