Slackware-12.1 ChangeLog (2008-07-29)

Tue Jul 29 13:32:21 CDT 2008

patches/packages/proftpd-1.3.1-i486-2_slack12.1.tgz:
Recompiled against new OpenSSL, since this evidently checks the OpenSSL
version and will only run against the libraries it was compiled against.
A small patch was also added due to changes in the system includes.
Thanks to Martin Schmitz for the info and a pointer to the patch.

Mon Jul 28 22:05:06 CDT 2008

patches/packages/fetchmail-6.3.8-i486-3_slack12.1.tgz:
Patched to fix a possible denial of service when “-v -v” options are used.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2711
(* Security fix *)
patches/packages/httpd-2.2.9-i486-1_slack12.1.tgz:
Upgraded to httpd-2.2.9.
This release fixes flaws which could allow XSS attacks.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
(* Security fix *)
patches/packages/libxslt-1.1.24-i486-1_slack12.1.tgz:
Upgraded to libxslt-1.1.24.
A buffer overflow when processing XSL stylesheets could result in the
execution of arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767
(* Security fix *)
patches/packages/links-2.1-i486-1_slack12.1.tgz:
Upgraded to links-2.1.
Unspecified vulnerability in Links before 2.1, when “only proxies” is
enabled, has unknown impact and attack vectors related to providing
“URLs to external programs.”
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3329
(* Security fix *)
patches/packages/mozilla-thunderbird-2.0.0.16-i686-1.tgz:
Upgraded to thunderbird-2.0.0.16.
This upgrade fixes some more security bugs.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html
(* Security fix *)
patches/packages/mtr-0.73-i486-1_slack12.1.tgz:
Upgraded to mtr-0.73.
This fixes a minor security bug where a very long hostname in the trace path
could lead to an overflow (and most likely just a crash).
(* Security fix *)
patches/packages/net-snmp-5.4.1.2-i486-1_slack12.1.tgz:
Upgraded to net-snmp-5.4.1.2.
A vulnerability was discovered where an attacked could spoof an authenticated
SNMPv3 packet due to incorrect HMAC checking. Also, a buffer overflow was
found that could be exploited if an application using the net-snmp perl
modules connects to a malicious server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
(* Security fix *)
patches/packages/openssh-5.1p1-i486-1_slack12.1.tgz:
Upgraded to openssh-5.1p1.
When upgrading OpenSSH, it is VERY IMPORTANT to also upgrade OpenSSL, or
it is possible to be unable to log back into sshd!
patches/packages/openssl-0.9.8h-i486-1_slack12.1.tgz:
Upgraded to OpenSSL 0.9.8h.
The Codenomicon TLS test suite uncovered security bugs in OpenSSL.
If OpenSSL was compiled using non-default options (Slackware's package
is not), then a malicious packet could cause a crash. Also, a malformed
TLS handshake could also lead to a crash.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672
When upgrading OpenSSL, it is VERY IMPORTANT to also upgrade OpenSSH, or
it is possible to be unable to log back into sshd!
(* Security fix *)
patches/packages/openssl-solibs-0.9.8h-i486-1_slack12.1.tgz:
Upgraded to OpenSSL 0.9.8h shared libraries (see above).
(* Security fix *)
patches/packages/pcre-7.7-i486-1_slack12.1.tgz:
Upgraded to pcre-7.7.
Tavis Ormandy of the Google Security Team found a buffer overflow triggered
when handling certain regular expressions. This could lead to a crash or
possible execution of code as the user of the PCRE-linked application.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371
(* Security fix *)
patches/packages/vim-7.1.330-i486-1_slack12.1.tgz:
Upgraded to vim-7.1.330. This fixes several security issues related to
the automatic processing of untrusted files.
For more information, see:
http://www.rdancer.org/vulnerablevim.html
(* Security fix *)
patches/packages/vim-gvim-7.1.330-i486-1_slack12.1.tgz:
Upgraded to vim-gvim-7.1.330.
See “vim” above for details.
(* Security fix *)
  • news/2008/07/29/slackware-12.1-changelog.txt
  • Last modified: 12 months ago
  • by Giuseppe Di Terlizzi