Thursday, October 30, 2014

Security Advisory: wget

wget package has been updated and rebuilt in all supported Slackware releases, back to Slackware 13.0 to fix a security vulnerability that could allow an attacker to write outside of the expected directory.

in -current branch, moc is now upgraded to 2.5.0, following a request from LQ

Friday, October 24, 2014

Security Advisories: glibc and pidgin

Patrick has released two security updates on both -stable and -current branch. The first update was pidgin and it fixed 5 security vulnerabilities. This update was applied to all -stable releases back to Slackware 13.0. They are now upgraded to Pidgin 2.10.10.

The second update was glibc. This update was only applied to Slackware 14.1 and -current and both have different version number. On 14.1, the glibc was rebuilt to include the patch that fixed several security issues (there are 9 CVEs related to this package), while in -current, Pat (finally) upgraded glibc to 2.20, a big jumping from 2.17 found in Slackware 14.1.

With these update in -current, all the core toolchain (gcc, glibc, and kernel) are set and the fun phase of -current may start in real this time. Normally, glibc was set once for a release and there won't be any changes except for minor upgrade or security fixes only because all applications will be compiled against those combination (mostly glibc and gcc).

Update: glibc were rebuilt with an updated gcc that was patched to fix bug pr61801 since it's causing some applications not working. I tested Google Chrome, but i believe many others will not run either. Google Chrome reported
setresgid: Function not implemented
Could not drop privileges: Function not implemented
Read on socketpair: Success

After updating gcc and glibc, they are working again.

Sunday, October 19, 2014

MATE Roadmap Updated

Few days ago i saw a discussion on IRC saying that MATE 1.10 will be released soon. I was kinda puzzled as there were lots of item in the TODO list in MATE Roadmap for 1.10. When i checked the Roadmap again, apparently MATE developers pushed GTK+3 support again to future releases (now targetting MATE 1.12) along with other features that didn't make it into MATE 1.10 schedule.

Most of the TODO list for MATE 1.10 have been completed with only 2 left:
  • caja: Plugin system (GSOC 2014)
  • Move all documentation into mate-user-guide 
One of the reason why GTK+3 support is delayed is because they (GTK developers) introduced incompatible changes on every major releases (3.8, 3.10, 3.12, and 3.14), so it's quite hard for MATE developers to support every releases within one version number. So they came up with a decision to release separate package for mate-themes which targets different GTK+3 version, depending on which Linux distribution that are going to use MATE Desktop. You can see the branches in their Github.

Since MATE focused on incremental instead of bigbang changes, i'm hoping that the transition from MATE 1.8 to MATE 1.10 will be smooth. There will be new packages introduced and some packages gets removed. You can check the documentation i provided in Master branch of our MSB project.

There is one package that are going to be removed by upstream, but not yet included in the list of removal package in MSB and that is mate-system-tools. In my opinion, this package can still be used for MATE 1.10 unless no one is using them. Let me know and i will gladly remove it.

Thursday, October 16, 2014

Poodlebleed Fixes

Slackware has released advisories to several products and i didn't write the previous one so consider this as a cumulative updates :)

The previous update was about Firefox and Thunderbird and it's only released in -current architecture. There are no ESR updates for stable releases anymore.

The second and latest advisories is about openssl which is vulnerable to multiple vulnerabilities, including the latest poodlebleed. If you are running public servers, it's highly recommended to upgrade the openssl packages as soon as possible. Use the above link to test whether your server is still vulnerable or not.

Upgrading openssl packages is not enough as your web server application (apache or nginx or any other products you use) can still fallback SSLv3, so you need to disable it manually. Here's how to do it:
  • nano /etc/httpd/extra/httpd-ssl.conf
  • Change
    SSLProtocol all -SSLv2
    SSLProtocol all -SSLv2 -SSLv3
  • Restart apache
You can also force your browser to disable SSL 3.0. If you use Google Chrome, they already disable it since February. For Firefox, you need to set it manually. Open about:config and enter security.tls.version.min and change it to 1. You can check whether your user-agent is vulnerable or not by visiting this URL:

Sunday, October 5, 2014

Firefox Rebuilt on x86 only

Pat has rebuilt mozilla-firefox on current 32 bit architecture only to fix sluggishness problem reported on LQ. This problem was not found on 64 bit, so those two arch will have different build number, but it will be synced again on the next Firefox update which is very close now (it reached Beta 9 at the time this post is written).

elilo is also upgraded to the latest version in -current.

Tuesday, September 30, 2014

Another BASH Update

Here comes another bash update to fix more security vulnerabilities. This time, a patch from Florian Weimer changes the encoding bash uses for exported functions to avoid clashes with shell variables and to avoid depending only on an environment variable's contents to determine whether or not to interpret it as a shell function. This change causes a backward incompatible break, but most of your scripts should be safe and continue to work as it is, unless you use the affected features. As always, please upgrade ASAP.

Monday, September 29, 2014

Security Advisory: Firefox, Thunderbird, Seamonkey

Three security advisories were released this morning for Slackware 14.0, 14.1, and current machines. Seamonkey was released for Slackware 14.0 and newer while the rest were released for 14.1 and newer. The stable releases got ESR release for Firefox, but current will always follow the latest Firefox build available from Mozilla FTP Site.

Saturday, September 27, 2014

Bash Update for CVE-2014-7169 Fix

Another bash update for all Slackware releases has been pushed by Patrick as the official fix is now available on BASH's FTP site. The new update should fix the CVE-2014-7169 advisory as now i get the correct result after running the same exploit code that i mentioned on the previous blog post. I suggest that you quickly apply the update for your machines as soon as possible as there has been report of many attackers utilizing this vulnerabilities in the wild. The discussion hasn't ended yet, so stay tune for further updates :)

Friday, September 26, 2014

Second Patch on Bash Bug

The initial patch to fix the bash vulnerability was not fully fix the problem as Tavis Ormandy found another exploit to bash which lead to another CVE entry to be made : CVE-2014-7169. This new bug can be simply be solved by using a single line of code and it has been applied to all Slackware releases as of today, thanks to Pat quick response on this issue. Hopefully this finally fixed the bash bug.

Anyway, i can confirmed that the patch worked for Slackware{64}-14.1 (i didn't test other version), but on my desktop -current machine, the same exploit code is still working. Can anyone confirm  this?

Here's the safe exploit code used:

env X='() { (a)=>\' sh -c "echo date"; cat echo
Here's what i got in Slackware-14.1:
sh: X: line 1: syntax error near unexpected token `='                                                                                                        
sh: X: line 1: `'                                                                                                                                            
sh: error importing function definition for `X'                                                                                                              
cat: echo: No such file or directory

meanwhile this is what i got in my current machine:
sh: X: line 1: syntax error near unexpected token `='
sh: X: line 1: `'
sh: error importing function definition for `X'
Fri Sep 26 07:30:35 WIB 2014

In -current, lxc is also upgraded to the latest version as well.

Thursday, September 25, 2014

Two Security Advisories

There are two security advisories released today and you are advised to upgrade as soon as possible (don't worry, it won't cause problem as in iOS 8.0.1 update yesterday).

The first update is for bash which is known to be vulnerable due to how they handle environment variables. This bug affects many applications that uses bash scripts on their operations, namely httpd, ssh, dhclient, etc. This update is backported to all supported Slackware releases (13.0 to -current).

The second update is mozilla-nss which fixed the RSA Signature Forgery vulnerability. This update is applied only to Slackware 14.0 and newer