Next revision | Previous revision |
news:2013:06:27:slackware-14.1-changelog [2015/03/10 12:25] – creata Giuseppe Di Terlizzi | news:2013:06:27:slackware-14.1-changelog [2015/03/26 10:56] (current) – Giuseppe Di Terlizzi |
---|
| |
====== Thu Jun 27 23:56:34 UTC 2013 ====== | ====== Thu Jun 27 23:56:34 UTC 2013 ====== |
> | |
| |
===== Packages ===== | ===== Packages ===== |
| |
==== Upgraded ==== | ==== Upgraded ==== |
* [[slackware.14.1>a/ed-1.9-i486-1.txz]] | * [[slackware.14.1>a/ed-1.9-i486-1.txz]] |
* [[slackware.14.1>d/ruby-1.9.3_p448-i486-1.txz]] (Security fix) | * [[slackware.14.1>d/ruby-1.9.3_p448-i486-1.txz]] \\ This update patches a vulnerability in Ruby's SSL client that could allow \\ man-in-the-middle attackers to spoof SSL servers via a valid certificate \\ issued by a trusted certification authority. \\ For more information, see: \\ http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 \\ (* Security fix *) |
| |
==== Rebuilt ==== | ==== Rebuilt ==== |
* [[slackware.14.1>a/procps-3.2.8-i486-4.txz]] | * [[slackware.14.1>a/procps-3.2.8-i486-4.txz]] \\ Include header files. Thanks to mancha. |
* [[slackware.14.1>ap/pm-utils-1.4.1-i486-4.txz]] | * [[slackware.14.1>ap/pm-utils-1.4.1-i486-4.txz]] \\ In the 49bluetooth-generic hook, don't take action unless the kernel supports \\ rfkill, the rfkill binary is present, and rc.bluetooth is executable. \\ Thanks to Grifulkin and Darth Vader for the bug report. |
===== ChangeLog ===== | |
<code> | |
Thu Jun 27 23:56:34 UTC 2013 | |
a/ed-1.9-i486-1.txz: Upgraded. | |
a/procps-3.2.8-i486-4.txz: Rebuilt. | |
Include header files. Thanks to mancha. | |
ap/pm-utils-1.4.1-i486-4.txz: Rebuilt. | |
In the 49bluetooth-generic hook, don't take action unless the kernel supports | |
rfkill, the rfkill binary is present, and rc.bluetooth is executable. | |
Thanks to Grifulkin and Darth Vader for the bug report. | |
d/ruby-1.9.3_p448-i486-1.txz: Upgraded. | |
This update patches a vulnerability in Ruby's SSL client that could allow | |
man-in-the-middle attackers to spoof SSL servers via a valid certificate | |
issued by a trusted certification authority. | |
For more information, see: | |
http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ | |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 | |
(* Security fix *) | |
</code> | |
| |
| |
{{tag>slackware changelog slackware-14.1 2013/06}} | {{tag>slackware changelog slackware-14.1 2013/06}} |
| |