Jump to content
Compatible Support Forums
Sign in to follow this  
news

[slackware-security] kdelibs (SSA:2017-136-02)

Recommended Posts

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

[slackware-security] kdelibs (SSA:2017-136-02)

 

New kdelibs packages are available for Slackware 13.37, 14.0, 14.1, 14.2,

and -current to fix a security issue.

 

 

Here are the details from the Slackware 14.2 ChangeLog:

+--------------------------+

patches/packages/kdelibs-4.14.32-i586-1_slack14.2.txz: Upgraded.

This update fixes a security issue with KAuth that can lead to gaining

root from an unprivileged account.

For more information, see:

http://www.openwall.com/lists/oss-security/2017/05/10/3

https://www.kde.org/info/security/advisory-20170510-1.txt

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422

(* Security fix *)

+--------------------------+

 

 

Where to find the new packages:

+-----------------------------+

 

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating FTP and rsync hosting

to the Slackware project! :-)

 

Also see the "Get Slack" section on http://slackware.com for

additional mirror sites near you.

 

Updated package for Slackware 13.37:

ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/kdelibs-4.5.5-i486-3_slack13.37.txz

 

Updated package for Slackware x86_64 13.37:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/kdelibs-4.5.5-x86_64-3_slack13.37.txz

 

Updated package for Slackware 14.0:

ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/kdelibs-4.8.5-i486-2_slack14.0.txz

 

Updated package for Slackware x86_64 14.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txz

 

Updated package for Slackware 14.1:

ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/kdelibs-4.10.5-i486-3_slack14.1.txz

 

Updated package for Slackware x86_64 14.1:

ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/kdelibs-4.10.5-x86_64-3_slack14.1.txz

 

Updated package for Slackware 14.2:

ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/kdelibs-4.14.32-i586-1_slack14.2.txz

 

Updated package for Slackware x86_64 14.2:

ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/kdelibs-4.14.32-x86_64-1_slack14.2.txz

 

Updated package for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/kde/kdelibs-4.14.32-i586-1.txz

 

Updated package for Slackware x86_64 -current:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/kde/kdelibs-4.14.32-x86_64-1.txz

 

 

MD5 signatures:

+-------------+

 

Slackware 13.37 package:

2074c2dff09a4a74e60f48f08e0e9abc kdelibs-4.5.5-i486-3_slack13.37.txz

 

Slackware x86_64 13.37 package:

692beba6610b1f2440650497bc3085cb kdelibs-4.5.5-x86_64-3_slack13.37.txz

 

Slackware 14.0 package:

c61bd3215be43dac0544b54342548837 kdelibs-4.8.5-i486-2_slack14.0.txz

 

Slackware x86_64 14.0 package:

a408af269fbba64dde31a91b91c72650 kdelibs-4.8.5-x86_64-2_slack14.0.txz

 

Slackware 14.1 package:

5ddb537f570c63c792511a095bbadb86 kdelibs-4.10.5-i486-3_slack14.1.txz

 

Slackware x86_64 14.1 package:

199c36c994a11bd48748ef3988ee143b kdelibs-4.10.5-x86_64-3_slack14.1.txz

 

Slackware 14.2 package:

ef1e87085864e36b70d9aadcdd20fa7a kdelibs-4.14.32-i586-1_slack14.2.txz

 

Slackware x86_64 14.2 package:

5182a2121695c705376366f4be56861f kdelibs-4.14.32-x86_64-1_slack14.2.txz

 

Slackware -current package:

ba5ba522f02e69ee6f44fc686cce081f kde/kdelibs-4.14.32-i586-1.txz

 

Slackware x86_64 -current package:

da0befacb4014eafa221fbc694542d97 kde/kdelibs-4.14.32-x86_64-1.txz

 

 

Installation instructions:

+------------------------+

 

Upgrade the package as root:

# upgradepkg kdelibs-4.14.32-i586-1_slack14.2.txz

 

 

+-----+

 

Slackware Linux Security Team

http://slackware.com/gpg-key

security ( -at -) slackware.com

 

+------------------------------------------------------------------------+

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×