Sunday, October 19, 2014

MATE Roadmap Updated

Few days ago i saw a discussion on IRC saying that MATE 1.10 will be released soon. I was kinda puzzled as there were lots of item in the TODO list in MATE Roadmap for 1.10. When i checked the Roadmap again, apparently MATE developers pushed GTK+3 support again to future releases (now targetting MATE 1.12) along with other features that didn't make it into MATE 1.10 schedule.

Most of the TODO list for MATE 1.10 have been completed with only 2 left:
  • caja: Plugin system (GSOC 2014)
  • Move all documentation into mate-user-guide 
One of the reason why GTK+3 support is delayed is because they (GTK developers) introduced incompatible changes on every major releases (3.8, 3.10, 3.12, and 3.14), so it's quite hard for MATE developers to support every releases within one version number. So they came up with a decision to release separate package for mate-themes which targets different GTK+3 version, depending on which Linux distribution that are going to use MATE Desktop. You can see the branches in their Github.

Since MATE focused on incremental instead of bigbang changes, i'm hoping that the transition from MATE 1.8 to MATE 1.10 will be smooth. There will be new packages introduced and some packages gets removed. You can check the documentation i provided in Master branch of our MSB project.

There is one package that are going to be removed by upstream, but not yet included in the list of removal package in MSB and that is mate-system-tools. In my opinion, this package can still be used for MATE 1.10 unless no one is using them. Let me know and i will gladly remove it.

Thursday, October 16, 2014

Poodlebleed Fixes

Slackware has released advisories to several products and i didn't write the previous one so consider this as a cumulative updates :)

The previous update was about Firefox and Thunderbird and it's only released in -current architecture. There are no ESR updates for stable releases anymore.

The second and latest advisories is about openssl which is vulnerable to multiple vulnerabilities, including the latest poodlebleed. If you are running public servers, it's highly recommended to upgrade the openssl packages as soon as possible. Use the above link to test whether your server is still vulnerable or not.

Upgrading openssl packages is not enough as your web server application (apache or nginx or any other products you use) can still fallback SSLv3, so you need to disable it manually. Here's how to do it:
  • nano /etc/httpd/extra/httpd-ssl.conf
  • Change
    SSLProtocol all -SSLv2
    SSLProtocol all -SSLv2 -SSLv3
  • Restart apache
You can also force your browser to disable SSL 3.0. If you use Google Chrome, they already disable it since February. For Firefox, you need to set it manually. Open about:config and enter security.tls.version.min and change it to 1. You can check whether your user-agent is vulnerable or not by visiting this URL:

Sunday, October 5, 2014

Firefox Rebuilt on x86 only

Pat has rebuilt mozilla-firefox on current 32 bit architecture only to fix sluggishness problem reported on LQ. This problem was not found on 64 bit, so those two arch will have different build number, but it will be synced again on the next Firefox update which is very close now (it reached Beta 9 at the time this post is written).

elilo is also upgraded to the latest version in -current.

Tuesday, September 30, 2014

Another BASH Update

Here comes another bash update to fix more security vulnerabilities. This time, a patch from Florian Weimer changes the encoding bash uses for exported functions to avoid clashes with shell variables and to avoid depending only on an environment variable's contents to determine whether or not to interpret it as a shell function. This change causes a backward incompatible break, but most of your scripts should be safe and continue to work as it is, unless you use the affected features. As always, please upgrade ASAP.

Monday, September 29, 2014

Security Advisory: Firefox, Thunderbird, Seamonkey

Three security advisories were released this morning for Slackware 14.0, 14.1, and current machines. Seamonkey was released for Slackware 14.0 and newer while the rest were released for 14.1 and newer. The stable releases got ESR release for Firefox, but current will always follow the latest Firefox build available from Mozilla FTP Site.

Saturday, September 27, 2014

Bash Update for CVE-2014-7169 Fix

Another bash update for all Slackware releases has been pushed by Patrick as the official fix is now available on BASH's FTP site. The new update should fix the CVE-2014-7169 advisory as now i get the correct result after running the same exploit code that i mentioned on the previous blog post. I suggest that you quickly apply the update for your machines as soon as possible as there has been report of many attackers utilizing this vulnerabilities in the wild. The discussion hasn't ended yet, so stay tune for further updates :)

Friday, September 26, 2014

Second Patch on Bash Bug

The initial patch to fix the bash vulnerability was not fully fix the problem as Tavis Ormandy found another exploit to bash which lead to another CVE entry to be made : CVE-2014-7169. This new bug can be simply be solved by using a single line of code and it has been applied to all Slackware releases as of today, thanks to Pat quick response on this issue. Hopefully this finally fixed the bash bug.

Anyway, i can confirmed that the patch worked for Slackware{64}-14.1 (i didn't test other version), but on my desktop -current machine, the same exploit code is still working. Can anyone confirm  this?

Here's the safe exploit code used:

env X='() { (a)=>\' sh -c "echo date"; cat echo
Here's what i got in Slackware-14.1:
sh: X: line 1: syntax error near unexpected token `='                                                                                                        
sh: X: line 1: `'                                                                                                                                            
sh: error importing function definition for `X'                                                                                                              
cat: echo: No such file or directory

meanwhile this is what i got in my current machine:
sh: X: line 1: syntax error near unexpected token `='
sh: X: line 1: `'
sh: error importing function definition for `X'
Fri Sep 26 07:30:35 WIB 2014

In -current, lxc is also upgraded to the latest version as well.

Thursday, September 25, 2014

Two Security Advisories

There are two security advisories released today and you are advised to upgrade as soon as possible (don't worry, it won't cause problem as in iOS 8.0.1 update yesterday).

The first update is for bash which is known to be vulnerable due to how they handle environment variables. This bug affects many applications that uses bash scripts on their operations, namely httpd, ssh, dhclient, etc. This update is backported to all supported Slackware releases (13.0 to -current).

The second update is mozilla-nss which fixed the RSA Signature Forgery vulnerability. This update is applied only to Slackware 14.0 and newer

Thursday, September 18, 2014

Three Set of KDE Packages Released

Although KDE has released their KDE 4.14.1, KDE Framework 5, and Plasma 5 source code to public for few days, it doesn't mean that Eric Hamelers didn't notice. In fact, he has prepared the packages and release all of it at the day of the final set (Plasma) released yesterday by announcing it on his blog. Releasing it one by one is possible, but you will have to perform the update process three times, which may be inconvenience. This also gives us time to test the packages and make sure nothing is broken.

In general, KDE 4.14.1 is a minor update, polishing KDE applications to further improve the translations and provide bug fixes. Most of the efforts are now focused on porting the applications to use Qt5, QML, Framework 5 and Plasma 5. As always, these packages are intended to be installed on top of Slackware-Current machines and please read the README (KDE 4.14.1 and KDE 5).

The new directory for KDE5 is now changed to 5 (not 5.0.x anymore), so you might want to change the download script if you have one. Otherwise, just use the rsync an you are good to go.

Get the packages from these mirror sites:
Kudos to Eric Hameleers and have fun enjoying KDE 4.14.1 and Framework 5 + Plasma 5

Wednesday, September 10, 2014

Security Update: seamonkey

After Firefox and Thunderbird gets updated, seamonkey is following with another security advisory released for Slackware 14.0, 14.1, and -current. All releases gets an update to seamonkey 2.29.

In -current, the default stock has been raised to 3.14.18, the latest stable kernel maintained by Greg K-H. The ChangeLog is available on's site. There has been some minor update on some packages, namely:
  • btrfs-progs: upgraded to 20140909
  • net-snmp: upgraded to
  • rdesktop: upgraded to 1.8.2 (request from LQ)