Slackware Essential And Critical Security Patch Updates - Page 66
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
New php packages are available for Slackware 10.2 and 11.0 to improve the stability and security of PHP. Quite a few bugs were fixed -- please encouraged to upgrade. Please note that we haven't tested all PHP applications for backwards compatibility with this new upgrade, so you
New samba packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a denial-of-service security issue. More details about the issues fixed in Samba 3.0.24 may be found in the Common Vulnerabilities and Exposures (CVE) database:
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix denial of service security issues. Versions of bind-9.2.x older than bind-9.2.8, and versions of bind-9.3.x older than 9.3.4 can be made to crash with malformed local or remote data.
New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
A new koffice package is available for Slackware 10.2 to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
A new seamonkey package is available for Slackware 11.0 to fix security issues.
New xine-lib packages are available for Slackware 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New mozilla-firefox packages are available for Slackware 10.2 and 11.0 to fix security issues.
New mozilla-thunderbird packages are available for Slackware 10.2 and 11.0 to fix security issues.
Hello, As many people have pointed out, the last advisory (SSA:2006-340-01) was not signed with the usual Slackware Security Team key (fingerprint 40102233). I did some reconfiguration on the box that
New gnupg packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about the issues may be found here:
New libpng packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New proftpd packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New tar packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
The original advisory for this issue contained incorrect URLs for the Slackware 11.0 patches. Sorry about that! The URLs for the 10.2 packages were correct (and the Firefox/Thunderbird links given for 11.0 would have been just fine anyway since
New Firefox and Thunderbird packages are available for Slackware 10.2 and 11.0 to fix security issues. In addition, a new Seamonkey package is available for Slackware 11.0 to fix similar issues.
New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues. The minimum OpenSSL version was raised to OpenSSL 0.9.7l and OpenSSL 0.9.8d to avoid exposure to known security flaws in older versions (these patches were already issued for Slackware). If you
New screen packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New php packages are available for Slackware 10.2 and 11.0 to fix security issues. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
New qt packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a possible security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: