[slackware-security] libssh2 (SSA:2024-290-01)
New libssh2 packages are available for Slackware 15.0 and -current to
fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/libssh2-1.11.1-i586-1_slack15.0.txz: Upgraded.
src: add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack."
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-48795
(* Security fix *)
+--------------------------+
[slackware-security] libarchive (SSA:2024-287-01)
New libarchive packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/libarchive-3.7.7-i586-1_slack15.0.txz: Upgraded.
This update fixes bug and the following security issues:
gzip: prevent a hang when processing a malformed gzip inside a gzip.
tar: don't crash on truncated tar archives.
tar: fix two leaks in tar header parsing.
(* Security fix *)
+--------------------------+
Character tables updates to Unicode 16.0.0.
Better window positioning in the Wayland driver.
More support for network sessions in DirectPlay.
Support for plug&play device change notifications.
Various bug fixes (11).
För mer information, se länken ovan...
OBS! Läs changelog för respektive 15.0 och current för full information!!
1.
[slackware-security] cups-filters/cups-browsed (SSA:2024-275-01)
New cups-filters (Slackware 15.0) and cups-browsed (Slackware -current)
packages are available to fix a security issue.
2.
[slackware-security] mozilla-firefox (SSA:2024-275-02)
New mozilla-firefox packages are available for Slackware 15.0 and -current to
fix security issues.
3.
[slackware-security] rpath security issues (SSA:2024-275-03)
Several packages have been updated for Slackware 15.0 and -current to fix
rpath security issues.
[slackware-security] boost (SSA:2024-270-01)
New boost packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/boost-1.78.0-i586-3_slack15.0.txz: Rebuilt.
Get rid of hardcoded temporary paths in the cmake files.
Since these paths point to a location that an unprivileged user could
create and populate with files that could be picked up during a build,
it's possible this bug could be used for malicious purposes.
Thanks to jmacloue.
(* Security fix *)
+--------------------------+
RSS resultat...
Till minne av Håkan Nilsson
Mitt Slackware
Appendix Programhantering