LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 01-23-2024, 11:23 PM   #196
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,523

Rep: Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489

1 updates (x86_64). Including a (* Security fix *)! : 1 Upgraded
Code:
Wed Jan 24 04:53:38 UTC 2024
patches/packages/mozilla-thunderbird-115.7.0-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.7.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-04/
    https://www.cve.org/CVERecord?id=CVE-2024-0741
    https://www.cve.org/CVERecord?id=CVE-2024-0742
    https://www.cve.org/CVERecord?id=CVE-2024-0746
    https://www.cve.org/CVERecord?id=CVE-2024-0747
    https://www.cve.org/CVERecord?id=CVE-2024-0749
    https://www.cve.org/CVERecord?id=CVE-2024-0750
    https://www.cve.org/CVERecord?id=CVE-2024-0751
    https://www.cve.org/CVERecord?id=CVE-2024-0753
    https://www.cve.org/CVERecord?id=CVE-2024-0755
  (* Security fix *)
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
1 members found this post helpful.
Old 01-26-2024, 04:45 PM   #197
drumz
Member
 
Registered: Apr 2005
Location: Oklahoma, USA
Distribution: Slackware
Posts: 906

Rep: Reputation: 697Reputation: 697Reputation: 697Reputation: 697Reputation: 697Reputation: 697
1 updates (x86_64). Including a (* Security fix *)! : 1 Upgraded
Code:
Fri Jan 26 20:59:27 UTC 2024
patches/packages/pam-1.6.0-x86_64-1_slack15.0.txz:  Upgraded.
  pam_namespace.so: fixed a possible local denial-of-service vulnerability.
  For more information, see:
    https://seclists.org/oss-sec/2024/q1/31
    https://www.cve.org/CVERecord?id=CVE-2024-22365
  (* Security fix *)
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
1 members found this post helpful.
Old 01-31-2024, 04:04 PM   #198
drumz
Member
 
Registered: Apr 2005
Location: Oklahoma, USA
Distribution: Slackware
Posts: 906

Rep: Reputation: 697Reputation: 697Reputation: 697Reputation: 697Reputation: 697Reputation: 697
4 updates (x86_64). Including a (* Security fix *)! : 4 Upgraded
Code:
Wed Jan 31 21:19:19 UTC 2024
extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz:  Upgraded.
  sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
  Remote attackers can use a published exploitation technique to inject e-mail
  messages with a spoofed MAIL FROM address, allowing bypass of an SPF
  protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
  but some other popular e-mail servers do not. This is resolved in 8.18 and
  later versions with 'o' in srv_features.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-51765
  (* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz:  Upgraded.
patches/packages/curl-8.6.0-x86_64-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.
patches/packages/libmilter-8.18.1-x86_64-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
1 members found this post helpful.
Old 02-03-2024, 03:06 PM   #199
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,523

Rep: Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489
2 updates (x86_64) : 2 Upgraded
Code:
Sat Feb  3 20:54:00 UTC 2024
patches/packages/ca-certificates-20240203-noarch-1_slack15.0.txz:  Upgraded.
  This update provides the latest CA certificates to check for the
  authenticity of SSL connections.
patches/packages/glibc-zoneinfo-2024a-noarch-1_slack15.0.txz:  Upgraded.
  This package provides the latest timezone updates.
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
1 members found this post helpful.
Old 02-04-2024, 01:47 PM   #200
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,523

Rep: Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489
1 updates (x86_64). Including a (* Security fix *)! : 1 Upgraded
Code:
Sun Feb  4 19:37:40 UTC 2024
patches/packages/libxml2-2.11.7-x86_64-1_slack15.0.txz:  Upgraded.
  Fix the following security issue:
  xmlreader: Don't expand XIncludes when backtracking.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-25062
  (* Security fix *)
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
3 members found this post helpful.
Old 02-07-2024, 03:08 PM   #201
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
1 updates (x86_64). Including a (* Security fix *)! : 1 Upgraded
Code:
Wed Feb  7 20:07:29 UTC 2024
patches/packages/expat-2.6.0-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Fix quadratic runtime issues with big tokens that can cause
  denial of service.
  Fix billion laughs attacks for users compiling *without* XML_DTD
  defined (which is not common).
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-52425
    https://www.cve.org/CVERecord?id=CVE-2023-52426
  (* Security fix *)
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
Old 02-08-2024, 05:44 PM   #202
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
1 updates (x86_64) : 1 Upgraded
Code:
Thu Feb  8 22:17:18 UTC 2024
patches/packages/dehydrated-0.7.1-noarch-1_slack15.0.txz:  Upgraded.
  This is a bugfix release that addresses (among other things) an
  "unbound variable" error if the signing server is not available.
  Thanks to metaed for the heads-up.
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt

And thank you for the fix!

Last edited by metaed; 02-09-2024 at 02:53 PM.
 
Old 02-08-2024, 05:58 PM   #203
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
@metaed
Do you still have trouble accessing my changelog file ?
 
Old 02-08-2024, 10:11 PM   #204
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
Quote:
Originally Posted by marav View Post
@metaed
Do you still have trouble accessing my changelog file ?
It works most times. Today I was "Forbidden".
 
Old 02-09-2024, 04:37 PM   #205
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
1 updates (x86_64). Including a (* Security fix *)! : 1 Upgraded
Code:
Fri Feb  9 21:48:09 UTC 2024
patches/packages/xpdf-4.05-x86_64-1_slack15.0.txz:  Upgraded.
  This update fixes security issues:
  Fixed a bug in the ICCBased color space parser that was allowing the number
  of components to be zero. Thanks to huckleberry for the bug report.
  Fixed a bug in the ICCBased color space parser that was allowing the number
  of components to be zero. Thanks to huckleberry for the bug report.
  Added checks for PDF object loops in AcroForm::scanField(),
  Catalog::readPageLabelTree2(), and Catalog::readEmbeddedFileTree().
  The zero-width character problem can also happen if the page size is very
  large -- that needs to be limited too, the same way as character position
  coordinates. Thanks to jlinliu for the bug report.
  Add some missing bounds check code in DCTStream. Thanks to Jiahao Liu for
  the bug report.
  Fix a deadlock when an object stream's length field is contained in another
  object stream. Thanks to Jiahao Liu for the bug report.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-2662
    https://www.cve.org/CVERecord?id=CVE-2023-2662
    https://www.cve.org/CVERecord?id=CVE-2018-7453
    https://www.cve.org/CVERecord?id=CVE-2018-16369
    https://www.cve.org/CVERecord?id=CVE-2022-36561
    https://www.cve.org/CVERecord?id=CVE-2022-41844
    https://www.cve.org/CVERecord?id=CVE-2023-2663
    https://www.cve.org/CVERecord?id=CVE-2023-2664
    https://www.cve.org/CVERecord?id=CVE-2023-3044
    https://www.cve.org/CVERecord?id=CVE-2023-3436
  (* Security fix *)
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
Old 02-09-2024, 04:56 PM   #206
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
Quote:
Originally Posted by marav View Post
Do you still have trouble accessing my changelog file?
I've isolated it to port 80 (works fine) vs port 443 (forbidden).

Windows Chrome works fine.
Linux Chrome rewrites the URL from http to https, but manually I can edit the link and resubmit to get the changelog.
Android Chrome rewrites the URL also. But when I manually edit the link and resubmit I still get https and forbidden.
If I come up with definite solutions I'll follow up.
 
Old 02-09-2024, 05:26 PM   #207
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by metaed View Post
I've isolated it to port 80 (works fine) vs port 443 (forbidden).

Windows Chrome works fine.
Linux Chrome rewrites the URL from http to https, but manually I can edit the link and resubmit to get the changelog.
Android Chrome rewrites the URL also. But when I manually edit the link and resubmit I still get https and forbidden.
If I come up with definite solutions I'll follow up.
I only run a Nginx server on port 80 on this box
So, if any browser rewrite http to https, you need to add an exception
It's clearly not a Google compliant site, but is that surprising? :-)
 
Old 02-10-2024, 04:14 AM   #208
Didier Spaier
LQ Addict
 
Registered: Nov 2008
Location: Paris, France
Distribution: Slint64-15.0
Posts: 11,062

Rep: Reputation: Disabled
Quote:
Originally Posted by marav View Post
I only run a Nginx server on port 80 on this box
So, if any browser rewrite http to https, you need to add an exception
It's clearly not a Google compliant site, but is that surprising? :-)
Well this has nothing to do with Google, rather with enabling secure connections. But you are not alone, same issue with slackware.com

Last edited by Didier Spaier; 02-10-2024 at 08:23 AM. Reason: s/to allow/enabling/
 
1 members found this post helpful.
Old 02-11-2024, 05:51 PM   #209
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
1 updates (x86_64) : 1 Upgraded
Code:
Sun Feb 11 22:11:59 UTC 2024
patches/packages/mariadb-10.5.24-x86_64-1_slack15.0.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://mariadb.com/kb/en/mariadb-10-5-24-release-notes/
Provided by http://matoda.pw/report/slack-15.0-x86_64.txt
 
Old 02-12-2024, 03:00 PM   #210
metaed
Member
 
Registered: Apr 2022
Location: US
Distribution: Slackware64 15.0
Posts: 367

Rep: Reputation: 171Reputation: 171
Upgrading dehydrated from 0.7.0 to 0.7.1 recreates the directory /var/www/dehydrated. This means the directory user:group revert to root:root. Anyone who has configured DEHYDRATED_USER and DEHYDRATED_GROUP to non-root for safety reasons will also have changed the user:group on /var/www/dehydrated. (See the excellent 2019 tutorial by AlienBOB, “Using Let’s Encrypt to Secure your Slackware webserver with HTTPS”.) This means as a post-upgrade step you must restore the directory user:group, as they no longer align with the user:group in the configuration file. Because it is a normal, optional, step to set DEHYDRATED_USER and DEHYDRATED_GROUP, it might make sense for the doinst.sh script to preserve the user:group of /var/www/dehydrated in the case of an upgrade.
 
2 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Latest changelog for slackware-current marav Slackware 1546 Today 02:41 PM
[SOLVED] Latest Firefox (88.0.1) has trouble with -current changelog... andrew.46 Slackware 5 05-10-2021 04:59 AM
Latest Xorg changelog effect brodo Slackware 12 09-22-2008 01:17 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 05:52 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration