Slackware Current (14.2+/15.0) och uppdateringar från och med den 18 May
Skriven Av: minime Den: 2020-05-20 14:00:54  https://www.slackwarelinux.se/?s=chglog64
Redigerad: 2020-05-23 14:11:22 av: mdkdio 

En liten "heads up" angående PAM, då man kör slackpkg upgrade så installeras inte alla nödvändiga PAM paket av sig själv.
man måste installera dessa manuellt.

Dessa paket är:

  • pam-1.3.1-*-1.txz
  • cracklib-2.9.7-*-1.txz
  • libpwquality-1.4.2-*-1.txz

Se till att göra detta innan ni startar om systemet, för annars låser ni er ute själva helt och hållet.

Enklaste lösningen är:
Följ anvisningarna för slackpkg.
slackpkg update
slackpkg install-new
slackpkg upgrade-all
Så ska det fungera

Kernel 4.4.224
Skriven Av: minime Den: 2020-05-20 13:26:44  https://tinyurl.com/ycg5wcjw 

Kernel 4.4.224 innehåller 86 uppdateringar, förändringar och/eller nya funktioner sedan 4.4.223.
Mer information om detta, vänligen kolla igenom changelog i länken ovan eller läsa diff log här.

Slackware 14.2 "paket" är inte uppdaterad.

Kernel 5.4.42
Skriven Av: minime Den: 2020-05-20 13:23:23  https://tinyurl.com/ydcmu4js
Redigerad: 2020-05-22 07:48:50 av: mdkdio 

Kernel 5.4.42 innehåller 147 uppdateringar, förändringar och/eller nya funktioner sedan 5.4.41.
Mer information om detta, vänligen kolla igenom changelog i länken ovan eller läsa diff log här.

Slackware Current uppdaterat 20/5

Säkerhets uppdateringar 19/5 -20
Skriven Av: mdkdio Den: 2020-05-20 08:15:07  
Redigerad: 2020-05-20 08:15:25 av: mdkdio 

[slackware-security] libexif (SSA:2020-140-02)
New libexif packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

&

[slackware-security] bind (SSA:2020-140-01)
New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/libexif-0.6.22-i486-1_slack14.2.txz: Upgraded.
This update fixes bugs and security issues: CVE-2018-20030:
Fix for recursion DoS CVE-2020-13114:
Time consumption DoS when parsing canon array markers CVE-2020-13113:
Potential use of uninitialized memory CVE-2020-13112:
Various buffer overread fixes due to integer overflows in maker notes CVE-2020-0093:
read overflow CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs CVE-2020-12767:
fixed division by zero CVE-2016-6328: fixed integer overflow when parsing maker notes CVE-2017-7544:
fixed buffer overread
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544
(* Security fix *)

+--------------------------+

&

Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.19-i586-1_slack14.2.txz: Upgraded.
This update fixes security issues:
A malicious actor who intentionally exploits the lack of effective limitation
on the number of fetches performed when processing referrals can,
through the use of specially crafted referrals, cause a recursing server
to issue a very large number of fetches in an attempt to process the referral.
This has at least two potential effects:
The performance of the recursing server can potentially be degraded
by the additional work required to perform these fetches,
and the attacker can exploit this behavior to use the recursing server as a reflector
in a reflection attack with a high amplification factor.
Replaying a TSIG BADTIME response as a request could trigger an assertion failure.
For more information, see:
https://kb.isc.org/docs/cve-2020-8616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616
https://kb.isc.org/docs/cve-2020-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
(* Security fix *)

+--------------------------+

Från Pat 15/5 -20
Skriven Av: mdkdio Den: 2020-05-15 14:37:52   

Fri May 15 07:28:15 UTC 2020
Hey folks, just a heads-up that PAM is about to be merged into the main tree.
We can't have it blocking other upgrades any longer. The config files could be
improved (adding support for pam_krb5 and pam_ldap, for example), but they'll
do for now. Have a good weekend, and enjoy these updates! :-)

Länkar
Statistik & info

Senast registrerade användare är:
conatus

Senaste artikeln är:
Installera Kodi-18.7 på Slackware Current (15.0)

Användaren mdkdio har skrivit flest (18) artiklar

Cookies

Håkans Slackware

Till minne av Håkan Nilsson
Mitt Slackware
Appendix Programhantering

Senaste Kernel Versioner
Mainline
Version: 5.7-rc7
Released: 2020-05-25
Stable
Version: 5.6.14
Released: 2020-05-20
Longterm
Version: 5.4.42
Released: 2020-05-20
Version: 4.19.124
Released: 2020-05-20
Version: 4.14.181
Released: 2020-05-20
Version: 4.9.224
Released: 2020-05-20
Version: 4.4.224
Released: 2020-05-20
Version: 3.16.84
Released: 2020-05-22