mirror of
git://slackware.nl/current.git
synced 2025-01-15 15:41:54 +01:00
2 commits
Author | SHA1 | Message | Date | |
---|---|---|---|---|
Patrick J Volkerding
|
2d770ad859 |
Wed Oct 30 21:03:27 UTC 2024
extra/llvm-19.1.3-x86_64-1_slack15.0.txz: Upgraded. Shared library .so-version bump. If you are upgrading from a previous LLVM, you might also need llvm13-compat and/or llvm17-compat. We'll be using this for newer Mozilla things. extra/llvm17-compat-17.0.6-x86_64-1_slack15.0.txz: Added. This is to support any locally compiled software that was linked against libLLVM-17.so from the llvm-17.0.6 that was previously in /extra. extra/rust-bindgen-0.69.4-x86_64-1_slack15.0.txz: Added. extra/rust-for-mozilla/rust-1.82.0-x86_64-1_slack15.0.txz: Upgraded. extra/tigervnc/tigervnc-1.12.0-x86_64-7_slack15.0.txz: Rebuilt. Recompiled against xorg-server-1.20.14, including a patch for a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) patches/packages/mozilla-firefox-128.4.0esr-x86_64-1_slack15.0.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-56/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) patches/packages/mozilla-thunderbird-128.4.0esr-x86_64-1_slack15.0.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/ https://www.cve.org/CVERecord?id=CVE-2024-10458 https://www.cve.org/CVERecord?id=CVE-2024-10459 https://www.cve.org/CVERecord?id=CVE-2024-10460 https://www.cve.org/CVERecord?id=CVE-2024-10461 https://www.cve.org/CVERecord?id=CVE-2024-10462 https://www.cve.org/CVERecord?id=CVE-2024-10463 https://www.cve.org/CVERecord?id=CVE-2024-10464 https://www.cve.org/CVERecord?id=CVE-2024-10465 https://www.cve.org/CVERecord?id=CVE-2024-10466 https://www.cve.org/CVERecord?id=CVE-2024-10467 (* Security fix *) patches/packages/xorg-server-1.20.14-x86_64-14_slack15.0.txz: Rebuilt. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) patches/packages/xorg-server-xephyr-1.20.14-x86_64-14_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xnest-1.20.14-x86_64-14_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.20.14-x86_64-14_slack15.0.txz: Rebuilt. patches/packages/xorg-server-xwayland-21.1.4-x86_64-12_slack15.0.txz: Rebuilt. This update fixes a security issue: By providing a modified bitmap, a heap-based buffer overflow may occur. This may lead to local privilege escalation if the server is run as root or remote code execution (e.g. x11 over ssh). This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative For more information, see: https://lists.x.org/archives/xorg-announce/2024-October/003545.html https://www.cve.org/CVERecord?id=CVE-2024-9632 (* Security fix *) |
||
Patrick J Volkerding
|
4657194ae3 |
Tue Oct 1 18:01:38 UTC 2024
Several ELF objects were found to have rpaths pointing into /tmp, a world writable directory. This could have allowed a local attacker to launch denial of service attacks or execute arbitrary code when the affected binaries are run by placing crafted ELF objects in the /tmp rpath location. All rpaths with an embedded /tmp path have been scrubbed from the binaries, and makepkg has gained a lint feature to detect these so that they won't creep back in. extra/llvm-17.0.6-x86_64-2_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/cryfs-0.10.3-x86_64-5_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/cups-filters-1.28.17-x86_64-2_slack15.0.txz: Rebuilt. Mitigate security issue that could lead to a denial of service or the execution of arbitrary code. Rebuilt with --with-browseremoteprotocols=none to disable incoming connections, since this daemon has been shown to be insecure. If you actually use cups-browsed, be sure to install the new /etc/cups/cups-browsed.conf.new containing this line: BrowseRemoteProtocols none For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-47176 (* Security fix *) patches/packages/espeak-ng-1.50-x86_64-4_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/libvncserver-0.9.13-x86_64-4_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/marisa-0.2.6-x86_64-5_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/mlt-7.4.0-x86_64-2_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/mozilla-firefox-115.16.0esr-x86_64-1_slack15.0.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/115.16.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-48 https://www.cve.org/CVERecord?id=CVE-2024-9392 https://www.cve.org/CVERecord?id=CVE-2024-9393 https://www.cve.org/CVERecord?id=CVE-2024-9394 https://www.cve.org/CVERecord?id=CVE-2024-9401 (* Security fix *) patches/packages/openobex-1.7.2-x86_64-6_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) patches/packages/pkgtools-15.0-noarch-44_slack15.0.txz: Rebuilt. makepkg: when looking for ELF objects with --remove-rpaths or --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part of the directory or filename. Also warn about /tmp rpaths after the package is built. patches/packages/spirv-llvm-translator-13.0.0-x86_64-2_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) testing/packages/llvm-18.1.8-x86_64-2_slack15.0.txz: Rebuilt. Remove rpaths from binaries. (* Security fix *) |
Renamed from extra/llvm-17.0.6-x86_64-1_slack15.0.txt (Browse further)