New openssl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/openssl-1.0.
Fixes several bugs and security issues:
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
o Race condition handling NewSessionTicket (CVE-2015-1791)
For more information, see:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
(* Security fix *)
patches/packages/openssl-
+--------------------------+
Where to find the new packages:
+-----------------------------
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/
ftp://ftp.slackware.com/pub/
MD5 signatures:
+-------------+
Slackware 13.0 packages:
383ecfed6bfef1440a44d708274584
fb186187ffa200e22d9450a9d0e321
Slackware x86_64 13.0 packages:
eb52318ed52fef726402f0b2a74745
9447927b960a01b21149e28a978302
Slackware 13.1 packages:
37f46f6b4fe2acbe217eaf7c0b33b7
986de2e71676f61d788a59a1e0c8de
Slackware x86_64 13.1 packages:
6b160ce817dcde3ae5b3a861b28438
503d891680c711162386ea7e3daadc
Slackware 13.37 packages:
5e7501b1d73d01d3d87704c3cfd3a8
874f0b59870dd3f259640c9930a02f
Slackware x86_64 13.37 packages:
b6d91614458040d461dff3c3eab452
be106df5e59c2be7fa442df8ba85ad
Slackware 14.0 packages:
ee7c3937e6a6d7ac7537f751af7da7
758662437d33f99ec0a686cedeb191
Slackware x86_64 14.0 packages:
2dfdc4729e93cf460018e9e30a6223
9cb4b34e97e60f6bfe4c843aabeae9
Slackware 14.1 packages:
5a9bf08d55615cfc097109c2e3786f
fb1c05468e5c38d51a8ff6ac435e3a
Slackware x86_64 14.1 packages:
1ef5cede3f954c3e4741012ffa76b7
ea22c288c60ae1d7ea8c5b3a160846
Slackware -current packages:
56db8712d653c060f910e8915a8f86
6d6264c9943e27240db5c8f5ec342e
Slackware x86_64 -current packages:
e73f7aff5aa0ad14bc06428544f99a
91b550b9eb0ac0c580e158375a93c0
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg openssl-1.0.1n-i486-1_slack14.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+-----------------------------
| To leave the slackware-security mailing list: |
+-----------------------------
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+-----------------------------
Komentarų nėra:
Rašyti komentarą