Slackware Essential And Critical Security Patch Updates - Page 56
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
New seamonkey packages are available for Slackware 12.2, 13.0, and -current to fix security issues.
New mozilla-thunderbird packages are available for Slackware 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues.
New seamonkey packages are available for Slackware 11.0, 12.0, and 12.1 to fix security issues. For more information, see:
New mozilla-firefox packages are available for Slackware 13.0 and -current to fix security issues. More details about the issues may be found on the Mozilla website:
New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix denial of service issues. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
New httpd packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. mod_ssl: A partial fix for the TLS renegotiation prefix injection attack by rejecting any client-initiated renegotiations.
A new mozilla-firefox package is available for Slackware 12.2 to fix security issues. The package may also be used with Slackware 11.0 or newer. More details about the issues may be found on the Mozilla website:
New gzip packages are available for Slackware 13.0 (64-bit) and -current to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New seamonkey packages are available for Slackware 12.2, 13.0, and -current to fix security issues. For more information, see:
New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New php packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New httpd packages are available for Slackware 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. More details about the issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
New mozilla-firefox packages are available for Slackware 12.2, 13.0, and -current to fix security issues. The Firefox 3.0.16 package may also be used with Slackware 11.0 or newer. More details about the issues may be found on the Mozilla website:
New seamonkey packages are available for Slackware 12.2, 13.0, and -current to fix security issues. More details about the issues may be found on the Mozilla web site:
New gimp packages are available for Slackware 12.1, 12.2, 13.0, and -current to fix security issues. More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion, resulting in a denial of service.
New Linux kernel packages are available for Slackware 13.0 and -current to address a security issue. A kernel bug discovered by David Ford may allow remote attackers to crash the kernel by sending an oversized IP packet. While the impact on ordinary servers is still unclear (the
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. More details about this issue may be found here: