New glibc packages are available for Slackware 13.0, 13.1, 13.37, 14.0,
and 14.1 to fix a security issue.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/glibc-2.17-
This update patches a security issue __nss_hostname_digits_dots() function
of glibc which may be triggered through the gethostbyname*() set of
functions. This flaw could allow local or remote attackers to take control
of a machine running a vulnerable version of glibc. Thanks to Qualys for
discovering this issue (also known as the GHOST vulnerability.)
For more information, see:
https://www.qualys.com/
http://cve.mitre.org/cgi-bin/
(* Security fix *)
patches/packages/glibc-i18n-2.
patches/packages/glibc-
patches/packages/glibc-solibs-
patches/packages/glibc-
Upgraded to tzcode2014j and tzdata2014j.
+--------------------------+
Where to find the new packages:
+-----------------------------
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
MD5 signatures:
+-------------+
Slackware 13.0 packages:
41402c65ebdef4b022c799131556ef
7095e3cd743af0179ea14b9bff81e3
901d50b809ed84837ff45b2ca7838b
421a711b7cf1be2df2421ae5cd50b2
61278ba5a904a7474e9b0b64b0daab
Slackware x86_64 13.0 packages:
d4266628a8db63751f3f55b8bc2e21
b6161a0e23da771c5c6903605e49e4
b8026d61e3849cce26539def0b665c
1f7f4cf57d44d75d4ef2786152f334
61278ba5a904a7474e9b0b64b0daab
Slackware 13.1 packages:
03e0d0224efe8bc794b5be0454612a
fabbdd8d7f14667c7a2dc7ede87b55
1c1d86a9dabe329c3d30796188b66e
e2ebe08bb02550c69202a6f973ef7e
61278ba5a904a7474e9b0b64b0daab
Slackware x86_64 13.1 packages:
c00de492a4842e3a86101028e8cc03
9657c55f39b233333e48d08acee9ed
ada2d7f7b7ffdfd7a4407696ad714e
b3c393e74aafbb5276cea1217dfcd1
61278ba5a904a7474e9b0b64b0daab
Slackware 13.37 packages:
16615e6ef8311b928e3a05e0b7f3e5
319dfc0cbdaf8410981195fffb1371
6964339495ab981d17ba27cd5878a4
1834abd11fab02725e897040bbead5
61278ba5a904a7474e9b0b64b0daab
Slackware x86_64 13.37 packages:
1753003d261831ac235445e23a9f98
8aa103984bb2cb293072a022dd9144
a56e90a34eec8f60e265c45d05490a
c6f684ea049e4091b96d15606eb454
61278ba5a904a7474e9b0b64b0daab
Slackware 14.0 packages:
a2fadb666bfdf5c7c4c9792cbf3478
3b3626f4a170a603af36ca60c7840f
ad237d138bb874e57c4080071d27e7
f07d37e52014cec80e43d883eda516
61278ba5a904a7474e9b0b64b0daab
Slackware x86_64 14.0 packages:
a5d02d71a230b6daa39d2ebefd8a65
62c30b615e38ba63cafb8053383eab
152d094ab6bc4c7f763dd4ad1a5378
b256163bb179d1aebfda5f45270a05
61278ba5a904a7474e9b0b64b0daab
Slackware 14.1 packages:
8f2fb91bb39d8a1db3bd6510295e6b
8d179820a827a4dce028b57d3fa392
19a4824c6ff8792a1166a38ceff824
417dede2ae464059002b6fcc2048f9
61278ba5a904a7474e9b0b64b0daab
Slackware x86_64 14.1 packages:
490ce11a13439e30ff312769cc4fab
cd145e0d6a12b15d5282d7d1b3de92
93aea777dd41dc1c631dce1cf252bf
6b759039a5b3f8c88b3753e722ded7
61278ba5a904a7474e9b0b64b0daab
Slackware -current packages:
395d4ad5fb71c4a56a500c3e51d07c
61278ba5a904a7474e9b0b64b0daab
3ca2827446e66d0d2d0e0bc8c55ba1
94105b1a10c42ce0995f8ace6b4f06
fcc2ad4f5aad3a7d704d708a170c53
Slackware x86_64 -current packages:
25129dd9dfed8a8e834c87ba40c1ef
61278ba5a904a7474e9b0b64b0daab
b8ff5e308769d8e4eddccd9940058d
8c3db9286aa93346d25ffad3817813
21f2a62d975b433f570cd5129cdc21
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg glibc-*
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+-----------------------------
| To leave the slackware-security mailing list: |
+-----------------------------
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
Komentarų nėra:
Rašyti komentarą