Slackware64-14.2 ChangeLog (2016-02-26)

Fri Feb 26 22:54:05 UTC 2016

  • a/btrfs-progs-v4.4.1-x86_64-1.txz
  • a/kernel-generic-4.4.3-x86_64-1.txz
  • a/kernel-huge-4.4.3-x86_64-1.txz
  • a/kernel-modules-4.4.3-x86_64-1.txz
  • a/sdparm-1.10-x86_64-1.txz
  • ap/mariadb-10.0.24-x86_64-1.txz
  • d/gdb-7.11-x86_64-1.txz
  • d/kernel-headers-4.4.3-x86-1.txz
  • k/kernel-source-4.4.3-noarch-1.txz
  • l/gtk+3-3.18.8-x86_64-1.txz
  • l/libical-2.0.0-x86_64-1.txz
    Shared library .so-version bump.
  • l/libssh-0.7.3-x86_64-1.txz
    Fixed weak key generation. Due to a bug in the ephemeral secret key
    generation for the diffie-hellman-group1 and diffie-hellman-group14
    methods, ephemeral secret keys of size 128 bits are generated, instead
    of the recommended sizes of 1024 and 2048 bits, giving a practical
    security of 63 bits.
    For more information, see:
    (* Security fix *)
  • l/sg3_utils-1.42-x86_64-1.txz
  • n/libssh2-1.7.0-x86_64-1.txz
    Fixed weak key generation. During the SSHv2 handshake when libssh2 is to
    get a suitable value for 'group order' in the Diffle Hellman negotiation,
    it would pass in number of bytes to a function that expected number of bits.
    This would result in the library generating numbers using only an 8th the
    number of random bits than what were intended: 128 or 256 bits instead of
    1023 or 2047. Using such drastically reduced amount of random bits for
    Diffie Hellman weakended the handshake security significantly.
    For more information, see:
    (* Security fix *)
  • x/mesa-11.1.2-x86_64-1.txz
  • kernels/*
  • kde/kdepimlibs-4.14.10-x86_64-2.txz
    Recompiled against libical-2.0.0.
  • n/bluez-5.37-x86_64-2.txz
    Recompiled against libical-2.0.0.
  • xfce/orage-4.12.1-x86_64-3.txz
    Recompiled against libical-2.0.0.
  • isolinux/initrd.img
  • usb-and-pxe-installers/usbboot.img
  • news/2016/02/26/slackware64-14.2-changelog.txt
  • Last modified: 5 years ago
  • by Giuseppe Di Terlizzi