Slackware 1215 Published by Philipp Esselbach 0

Updated bind packages are available for Slackware 10.2 and 11.0 to address a load problem. It was reported that the initial build of these updates complained that the Linux capability module was not present and would refuse to load. It was determined that the packages which were compiled on 10.2 and 11.0 systems running 2.6 kernels, and although the installed kernel headers are from 2.4.x, it picked up on this resulting in packages that would only run under 2.4 kernels. These new packages address the issue.

Slackware 1215 Published by Philipp Esselbach 0

New php packages are available for Slackware 12.0, 12.1, and -current to fix security issues, as well as make improvements and fix bugs.

Slackware 1215 Published by Philipp Esselbach 0

New gnutls packages are available for Slackware 12.0, 12.1, and -current to correctly fix the certificate chain verification issue that the upgrade to gnutls-2.6.1 attempted to fix. Without this upgrade, processing a certificate chain containing only one self-signed certificate may cause GnuTLS linked programs to crash.

Slackware 1215 Published by Philipp Esselbach 0

New net-snmp packages are available for Slackware 12.0, 12.1, and -current to fix a denial of service issue.

Slackware 1215 Published by Philipp Esselbach 0

New php packages are available for Slackware 10.2 and 11.0 to fix security issues. These releases are the last to contain PHP 4.4.x, which was upgraded to version 4.4.9 to fix PCRE issues and other bugs.

Please note that this is the FINAL release of PHP4, and it has already passed the announced end-of-life. Sites should seriously consider migrating to PHP5 rather than upgrading to php-4.4.9.

Slackware 1215 Published by Philipp Esselbach 0

Slackware 1215 Published by Philipp Esselbach 0

New ruby packages are available for Slackware 11.0, 12.0, 12.1, and -current to fix security issues.

More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726