This is an old revision of the document!
Slackware64-14.1 ChangeLog (2013-11-18)
Mon Nov 18 20:52:16 UTC 2013
Packages
Upgraded
- patches/packages/mozilla-firefox-24.1.1esr-x86_64-1_slack14.1.txz
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
(* Security fix *) - patches/packages/openssh-6.4p1-x86_64-1_slack14.1.txz
sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected.
For more information, see:
http://www.openssh.com/txt/gcmrekey.adv
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
(* Security fix *) - patches/packages/php-5.4.22-x86_64-1_slack14.1.txz
This is a bugfix release. - patches/packages/samba-4.1.1-x86_64-1_slack14.1.txz
This update fixes two security issues:
* Samba versions 3.2.0 and above do not check the underlying file or
directory ACL when opening an alternate data stream.
* In setups which provide ldap(s) and/or https services, the private key
for SSL/TLS encryption might be world readable. This typically happens
in active directory domain controller setups.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
(* Security fix *)
Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini. - patches/packages/seamonkey-2.22-x86_64-1_slack14.1.txz
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)