New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-1.0.
This update fixes several security issues:
Double Free when processing DTLS packets (CVE-2014-3505)
DTLS memory exhaustion (CVE-2014-3506)
DTLS memory leak from zero-length fragments (CVE-2014-3507)
Information leak in pretty printing functions (CVE-2014-3508)
Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
SRP buffer overrun (CVE-2014-3512)
Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
For more information, see:
https://www.openssl.org/news/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
(* Security fix *)
patches/packages/openssl-
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
MD5 signatures:
+-------------+
Slackware 13.0 packages:
30bdc015b10d8891b90d3f6ea34f5f
3dc4140c22c04c94e5e74386a5a1c2
Slackware x86_64 13.0 packages:
3da32f51273762d67bf9dbcc91af94
075e5d12e5b909ecac923cb210f835
Slackware 13.1 packages:
3b7e2bb2b317bf72b8f9b2b7a14bdd
92af0784eade0674332a56bfab73b9
Slackware x86_64 13.1 packages:
df5f961109d7b50971660ca6a7d4c4
582aaeae3d56730a2e1538a67d4e44
Slackware 13.37 packages:
546445d56d3b367fa0dd4e80859c46
b80e9df8cdd0649939ec2fab20d246
Slackware x86_64 13.37 packages:
9c9ce97dc21340924a3e27c1a80470
0fe1931f2fc82fb8d5fbe72680caf8
Slackware 14.0 packages:
d1580f4b22b99cee42b22276653c81
ec93cec2bcab8ae7391a504573cbc2
Slackware x86_64 14.0 packages:
329475de3759225b1d02aa7317b2eb
25f2a198022d974534986a3913ca70
Slackware 14.1 packages:
8336457bc31d44ebf502ffc4443f12
4b99ac357fbd3065c53367eea246b8
Slackware x86_64 14.1 packages:
f2b8f81d9d7dc02e5d1011f663ccc9
4360abffbb57cb18ba0720f782d782
Slackware -current packages:
49ecd332a899cf742d3467a6efe442
27da017c49045981b1793f105aff36
Slackware x86_64 -current packages:
8d74f3d770802182137c84d925f58c
fd9d94d3210f0aedf74959cb0887e2
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg openssl-1.0.1i-i486-1_slack14.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+-----------------------------
| To leave the slackware-security mailing list: |
+-----------------------------
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+-----------------------------
Komentarų nėra:
Rašyti komentarą