Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware64-14.2 ChangeLog (2015-09-01) ====== ====== Tue Sep 1 23:29:22 UTC 2015 ====== ===== Packages ===== ==== Rebuilt ==== * [[slackware64.14.2>a/aaa_elflibs-14.2-x86_64-2.txz]] ==== Upgraded ==== * [[slackware64.14.2>a/cryptsetup-1.6.7-x86_64-1.txz]] * [[slackware64.14.2>a/lvm2-2.02.129-x86_64-1.txz]] * [[slackware64.14.2>ap/lxc-1.1.3-x86_64-1.txz]] * [[slackware64.14.2>d/git-2.5.1-x86_64-1.txz]] * [[slackware64.14.2>l/gdk-pixbuf2-2.31.7-x86_64-1.txz]] \\ Gustavo Grieco discovered a heap overflow in the processing of BMP images \\ which may result in the execution of arbitrary code if a malformed image \\ is opened. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491 \\ (* Security fix *) * [[slackware64.14.2>n/ModemManager-1.4.10-x86_64-1.txz]] * [[slackware64.14.2>n/NetworkManager-1.0.6-x86_64-1.txz]] * [[slackware64.14.2>n/openssh-7.1p1-x86_64-1.txz]] * [[slackware64.14.2>x/libvdpau-1.1.1-x86_64-1.txz]] \\ libvdpau versions 1.1 and earlier, when used in setuid or setgid \\ applications, contain vulnerabilities related to environment variable \\ handling that could allow an attacker to execute arbitrary code or \\ overwrite arbitrary files. This release uses the secure_getenv() \\ function to fix these problems. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198 \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199 \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200 \\ (* Security fix *) * [[slackware64.14.2>x/mesa-10.6.5-x86_64-1.txz]] * [[slackware64.14.2>xap/network-manager-applet-1.0.6-x86_64-1.txz]] ==== Added ==== * [[slackware64.14.2>l/dconf-editor-3.16.1-x86_64-1.txz]] {{tag>slackware changelog slackware64-14.2 2015/09}} news/2015/09/01/slackware64-14.2-changelog.txt Last modified: 8 years agoby Giuseppe Di Terlizzi Log In