Nästa...
Slackware 14.0, 14.1, 14.2 & current
[slackware-security] curl (SSA:2021-202-02)
New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.Läs mer...
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/curl-7.78.0-i586-1_slack14.2.txz: Upgraded. This update fixes security issues: CURLOPT_SSLCERT mixup with Secure Transport TELNET stack contents disclosure again Bad connection reuse due to flawed path name checks Metalink download sends credentials Wrong content via metalink not discarded For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922 (* Security fix *) +--------------------------+
Ny utvecklingsversion av WINE är släppt idag.
"ChangeLog" visar att 31 buggar är lösta sedan 6.12
Du finner all info rel till 6.13 här
14.2 - Kärnor uppdaterade till 4.4.276
current - Kärnor uppdaterade till 5.13.4
Nedan finner du info från 14.2 ChangeLog
Läs mer...Wed Jul 21 05:30:44 UTC 2021
patches/packages/linux-4.4.276/*: Upgraded.
These updates fix various bugs and security issues, including the recently
announced local privilege escalation vulnerability in the filesystem layer
(CVE-2021-33909).
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt
Fixed in 4.4.262:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
Fixed in 4.4.263:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
Fixed in 4.4.264:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688
Fixed in 4.4.265:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483
Fixed in 4.4.266:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154
Fixed in 4.4.267:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671
Fixed in 4.4.269:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
Fixed in 4.4.270:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
Fixed in 4.4.271:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399
Fixed in 4.4.272:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3587
Fixed in 4.4.274:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
Fixed in 4.4.276:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
(* Security fix *)
+--------------------------+
Måndag, 5.13.3 släpptes tidigare idag, så varför inte en till version...
5.13.4 RC2 har 349 uppdateringar/ändringar sedan 5.13.3
5.12.19 RC2 har 289 uppdateringar/ändringar sedan 5.12.18
5.10.52 RC2 har 239 uppdateringar/ändringar sedan 5.10.51
5.4.134 RC2 har 148 uppdateringar/ändringar sedan 5.4.133
4.14.240 RC2 har 314 uppdateringar/ändringar sedan 4.14.239
Uppdaterat 20/7-21
Ovan listade kärnor är nu släppta:
5.13.4 ChangeLog Redigerat 21/7-21 5.13.4 finns nu i current
5.12.19 ChangeLog
5.10.52 ChangeLog
5.4.134 ChangeLog
4.14.240 ChangeLog
OBS! Detta är sista 5.12.x kärnan. Den är nu EOL
"Sat Jul 17 17:55:10 UTC 2021
Happy 28th birthday, Slackware! :-)
a/aaa_base-15.0-x86_64-1.txz: Upgraded.
Bump version numbers in /etc/os-release and /etc/slackware-version.
Not quite ready to freeze things for a release candidate, but getting there.
Initial email to root still needs a refresh."
RSS resultat...
Till minne av Håkan Nilsson
Mitt Slackware
Appendix Programhantering