LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-13-2018, 12:41 PM   #646
TurboBlaze
LQ Newbie
 
Registered: Jan 2018
Location: Russian Federation, Lipetsk region, Dankov
Distribution: Porteus
Posts: 19

Rep: Reputation: Disabled

* Samba 4.7.6 Available for Download

Samba 4.7.6 (gzipped)
Signature

Patch (gzipped) against Samba 4.7.5
Signature

Quote:
=============================
Release Notes for Samba 4.7.6
March 13, 2018
=============================


This is a security release in order to address the following defects:

o CVE-2018-1050 (Denial of Service Attack on external print server.)
o CVE-2018-1057 (Authenticated users can change other users' password.)
* imagemagick-7.0.7.26
https://github.com/ImageMagick/ImageMagick

Last edited by TurboBlaze; 03-13-2018 at 01:39 PM.
 
Old 03-13-2018, 01:41 PM   #647
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 1,630

Rep: Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636
glib-networking-2.56.0:

(need meson now)
http://ftp.gnome.org/pub/gnome/sourc...ng-2.56.0.news
http://ftp.gnome.org/pub/gnome/sourc...-2.56.0.tar.xz
 
Old 03-13-2018, 01:49 PM   #648
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 1,630

Rep: Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636
gcr-3.28.0:

http://ftp.gnome.org/pub/gnome/sourc...cr-3.28.0.news
http://ftp.gnome.org/pub/gnome/sourc...-3.28.0.tar.xz
 
Old 03-13-2018, 01:59 PM   #649
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 1,585

Rep: Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834Reputation: 4834
Quote:
Originally Posted by TurboBlaze View Post
At this time, the libraries from ImageMagick-7.x are unusable by programs that would want to link with them.
 
1 members found this post helpful.
Old 03-13-2018, 04:21 PM   #650
saxa
Member
 
Registered: Aug 2004
Distribution: Slackware
Posts: 440

Rep: Reputation: 44
Dconf-0.28.0

https://download.gnome.org/sources/d...-0.28.0.tar.xz
 
Old 03-13-2018, 08:19 PM   #651
saxa
Member
 
Registered: Aug 2004
Distribution: Slackware
Posts: 440

Rep: Reputation: 44
adwaita-icon-theme 3.28.0
https://download.gnome.org/sources/a...-3.28.0.tar.xz

Maybe is it also worth wait a bit for gstreamer 1.14.x series.
 
Old 03-13-2018, 08:21 PM   #652
saxa
Member
 
Registered: Aug 2004
Distribution: Slackware
Posts: 440

Rep: Reputation: 44
gnome-keyring-3.28.0.1
https://download.gnome.org/sources/g....28.0.1.tar.xz
 
Old 03-14-2018, 12:58 AM   #653
atelszewski
Member
 
Registered: Aug 2007
Distribution: Slackware
Posts: 885

Rep: Reputation: Disabled
Hi,

Code:
http://slackware.osuosl.org/slackware-current/source/xap/mozilla-firefox/.mozconfig
Leftover possibly?

--
Best regards,
Andrzej Telszewski
 
Old 03-14-2018, 01:01 AM   #654
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 1,630

Rep: Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636
libinput-1.10.3:

https://cgit.freedesktop.org/wayland...?h=1.10-branch
https://www.freedesktop.org/software...-1.10.3.tar.xz
 
Old 03-14-2018, 02:22 AM   #655
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 1,630

Rep: Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636
Quote:
Originally Posted by gmgf View Post

hexchat-2.14.0:

(hexchat use 'meson', and need 'luajit' for build, also, now)

http://luajit.org/

(hexchat build with the SBO 'luajit' version)
https://slackbuilds.org/slackbuilds/...jit.SlackBuild

https://dl.hexchat.net/hexchat/hexchat-2.14.0.tar.xz
Finally it build on current without luajit, like this:

Code:
mkdir build
cd build
meson setup \
  --prefix=/usr \
  --libdir=lib${LIBDIRSUFFIX} \
  --libexecdir /usr/libexec \
  --bindir /usr/bin \
  --sbindir /usr/sbin \
  --includedir /usr/include \
  --datadir /usr/share \
  --mandir /usr/man \
  --sysconfdir /etc \
  --localstatedir /var \
  -Dwith-lua=false \
  .. || exit 1
  ninja || exit 1
  DESTDIR=$PKG ninja install || exit 1
cd ..

Last edited by gmgf; 03-14-2018 at 05:32 AM.
 
2 members found this post helpful.
Old 03-14-2018, 02:23 AM   #656
Thom1b
Member
 
Registered: Mar 2010
Location: France
Distribution: Slackware
Posts: 216

Rep: Reputation: 164Reputation: 164
curl-7.59.0 is released with three security fixes.

Quote:
=======================================================

Project curl Security Advisory, March 14th 2018 -
[Permalink](https://curl.haxx.se/docs/adv_2018-9cd6.html)

VULNERABILITY
-------------

curl can be fooled into writing a zero byte out of bounds.

This bug can trigger when curl is told to work on an FTP URL, with the setting
to only issue a single CWD command (`--ftp-method singlecwd` or the libcurl
alternative `CURLOPT_FTP_FILEMETHOD`).

curl then URL-decodes the given path, calls strlen() on the result and deducts
the length of the file name part to find the end of the directory within the
buffer. It then writes a zero byte on that index, in a buffer allocated on the
heap.

If the directory part of the URL contains a "%00" sequence, the directory
length might end up shorter than the file name path, making the calculation
`size_t index = directory_len - filepart_len` end up with a huge index
variable for where the zero byte gets stored: `heap_buffer[index] = 0`. On
several architectures that huge index will wrap and work as a negative value,
thus overwriting memory *before* the intended heap buffer.

By using different file part lengths and putting %00 in different places in
the URL, an attacker that can control what paths a curl-using application uses
can write that zero byte on different indexes.

We are not aware of any exploit of this flaw.

INFO
----

This bug was introduced in December 2004 in [this
commit](https://github.com/curl/curl/commit/6e1e9caa32da0995).

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2018-1000120 to this issue.

CWE-122: Heap-based Buffer Overflow

AFFECTED VERSIONS
-----------------

- Affected versions: curl 7.12.3 to and including curl 7.58.0
- Not affected versions: curl < 7.12.3 and curl >= 7.59.0

libcurl is used by many applications, but not always advertised as such.

THE SOLUTION
------------

In curl version 7.59.0, curl rejects FTP URLs that contain any "control
characters". That is byte values below ascii 32.

A [patch for CVE-2018-1000120](https://curl.haxx.se/CVE-2018-1000120.patch) is available
Quote:
LDAP NULL pointer dereference
=============================

Project curl Security Advisory, March 14th 2018 -
[Permalink](https://curl.haxx.se/docs/adv_2018-97a2.html)

VULNERABILITY
-------------

curl might dereference a near-NULL address when getting an LDAP URL.

The function `ldap_get_attribute_ber()` is called to get attributes, but it
turns out that it can return `LDAP_SUCCESS` and still return a `NULL` pointer
in the result pointer when getting a particularly crafted response. This was a
surprise to us and to the code.

libcurl-using applications that allow LDAP URLs, or that allow redirects to
LDAP URLs could be made to crash by a malicious server.

We are not aware of any exploit of this flaw.

INFO
----

The bug is only present in curl versions built to use OpenLDAP.

This bug was introduced in May 2010 in [this
commit](https://github.com/curl/curl/commit/2e056353b00d09).

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2018-1000121 to this issue.

CWE-476: NULL Pointer Dereference

AFFECTED VERSIONS
-----------------

- Affected versions: curl 7.21.0 to and including curl 7.58.0
- Not affected versions: curl < 7.21.0 and curl >= 7.59.0

libcurl is used by many applications, but not always advertised as such.

THE SOLUTION
------------

In curl version 7.59.0, curl checks the pointer properly before using it.

A [patch for CVE-2018-1000121](https://curl.haxx.se/CVE-2018-1000121.patch) is available.
Quote:
RTSP RTP buffer over-read
=========================

Project curl Security Advisory, March 14th 2018 -
[Permalink](https://curl.haxx.se/docs/adv_2018-b047.html)

VULNERABILITY
-------------

curl can be tricked into copying data beyond end of its heap based buffer.

When asked to transfer an RTSP URL, curl could calculate a wrong data length
to copy from the read buffer. The memcpy call would copy data from the heap
following the buffer to a storage area that would subsequently be delivered to
the application (if it didn't cause a crash). We've managed to get it to reach
several hundreds bytes out of range.

This could lead to information leakage or a denial of service for the
application if the server offering the RTSP data can trigger this.

We are not aware of any exploit of this flaw.

INFO
----

This bug was introduced in January 2010 in [this
commit](https://github.com/curl/curl/commit/bc4582b68a673d3) when RTSP support
was first added.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2018-1000122 to this issue.

CWE-126: Buffer Over-read

AFFECTED VERSIONS
-----------------

- Affected versions: curl 7.20.0 to and including curl 7.58.0
- Not affected versions: curl < 7.20.0 and curl >= 7.59.0

libcurl is used by many applications, but not always advertised as such.

THE SOLUTION
------------

In curl version 7.59.0, curl makes sure that this code never gets told to copy
more data than it is allowed to read from the buffer.

A [patch for CVE-2018-1000122](https://curl.haxx.se/CVE-2018-1000122.patch) is available.
 
1 members found this post helpful.
Old 03-14-2018, 10:20 AM   #657
cwizardone
Senior Member
 
Registered: Feb 2007
Distribution: Slackware64-current with "True Multilib" & Xfce.
Posts: 4,169
Blog Entries: 1

Rep: Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497Reputation: 1497
Samba-4.8.0

Release notes, https://www.samba.org/samba/history/samba-4.8.0.html
 
Old 03-14-2018, 01:56 PM   #658
Thom1b
Member
 
Registered: Mar 2010
Location: France
Distribution: Slackware
Posts: 216

Rep: Reputation: 164Reputation: 164
new bind versions are released with security fix.

Quote:
Posting date: 14 March 2018
Program Impacted: BIND
Versions affected: 9.0.x -> 9.8.x, 9.9.0->9.9.11-P1,
9.10.0->9.10.6-P1, 9.11.0->9.11.2-P1,
9.12.0->9.12.0-P1
Description:

"update-policy local;", which is a permission cluster provided
as a shortcut for operators who use Dynamic DNS (DDNS), was
misleadingly named in that its original implementation did not
actually enforce a requirement that the updates it allows originate
locally.

A full description of "update-policy local;" is included in
Section 6.2 of the BIND Administrator Reference Manual, but to
briefly summarize:

When "update-policy local;" is set for a zone in named.conf,
named will create and use an automatically generated session
key (named "local-ddns" by default and stored in local storage
on the server) and will permit updates to the zone to any
client successfully authenticating using that key.

Since the key is generated and stored locally, in usual cases
this should equate to only allowing local updates unless an
operator deliberately copies the local-ddns key elsewhere.

However, in June 2017 disclosed CVE-2017-3143, a flaw in TSIG
authentication which enabled an attacker who was able to send
and receive messages to an authoritative DNS server and who had
knowledge of a valid TSIG key name for the zone and service being
targeted to manipulate BIND into accepting an unauthorized dynamic
update. In our disclosure for CVE-2017-3143 we warned of its
potential interaction with the behavior of update-policy local.
By policy, however, ISC prefers security releases to contain
only the minimal fix required to prevent the exploitable condition.
Therefore, security patch releases for CVE-2017-3143 fixed only
the TSIG authentication flaw without changing the behavior of
the "update-policy local;" feature.

Beginning with the March 2018 maintenance releases of BIND
(9.9.12, 9.10.7, 9.11.3, and 9.12.1) the behavior of "update-policy
local" is now changed so that updates are permitted under the
policy only when they are received from locally configured
addresses AND use the local session key.

Impact:

We think it is unlikely that many operators are deliberately
relying on the non-local option of the previous behavior (and
we recommend against it) but if any are, please see the "Workarounds"
section of this advisory for advice on how to replicate the
previous behavior. For all other operators (those who were not
relying on the non-local side-effect of the previous behavior)
the new behavior should represent an improvement in DDNS security
if you use the local update policy.

Workarounds:

The change in "update-policy local;" behavior which debuts in
the March 2018 maintenance releases should improve security by
properly restricting updates to only those that are received
from locally configured addresses AND are authenticated using
the local session key. However, in the event that an operator
was deliberately relying on the non-local option of the previous
behavior, behavior equivalent to the previous behavior of
"update-policy local;" can be produced by using this syntax:
"update-policy { grant local-ddns zonesub any; };"

Solution:

Software versions which enforce the corrected, more restrictive
behavior are now available from our downloads page,
http://www.isc.org/downloads/all.

- BIND 9 version 9.9.12
- BIND 9 version 9.10.7
- BIND 9 version 9.11.3
- BIND 9 version 9.12.1

Do you still have questions? Questions regarding this advisory
should go to security-officer@isc.org. To report a new issue,
please encrypt your message using security-officer@isc.org's PGP
key which can be found here:
https://www.isc.org/downloads/softwa...y/openpgp-key/.
If you are unable to use encrypted email, you may also report new
issues at: https://www.isc.org/community/report-bug/.
 
Old 03-14-2018, 09:08 PM   #659
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: Slackware
Posts: 8,440

Rep: Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471Reputation: 3471
vim-gvim's slack-desc still says it's build against GTK2, even though that hasn't been true in quite a while.
 
1 members found this post helpful.
Old 03-15-2018, 03:38 AM   #660
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 1,630

Rep: Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636Reputation: 636
Quote:
Originally Posted by gmgf View Post
gvfs.SlackBuild for current with meson:

Code:
mkdir -p build
cd build
meson setup \
  --prefix=/usr \
  --libdir=lib${LIBDIRSUFFIX} \
  --libexecdir     /usr/libexec \
  --mandir         /usr/man \
  --sysconfdir     /etc \
  --localstatedir  /var \
  -Dsystemduserunitdir=false \
  -Dtmpfilesdir=false \
  -Ddnssd=false \
  -Dgoogle=false \
  -Dgoa=false \
  -Dnfs=false \
  -Dlogind=false \
  -Dman=true \
  -Ddeprecated_programs=true \
  .. || exit 1
  ninja || exit 1
  DESTDIR=$PKG ninja install || exit 1
cd ..

Last edited by gmgf; 03-15-2018 at 04:07 AM.
 
1 members found this post helpful.
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Requests for -current (20151216) rworkman Slackware 3441 12-28-2017 03:50 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 10:14 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration