Slackware 1133 Published by

The following Slackware updates has been released:

patch (SSA:2015-047-01)
seamonkey (SSA:2015-047-02)
sudo (SSA:2015-047-03)



patch (SSA:2015-047-01)

New patch packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/patch-2.7.4-i486-1_slack14.1.txz: Upgraded.
Patch no longer follows symbolic links to input and output files. This
ensures that symbolic links created by git-style patches cannot cause
patch to write outside the working directory.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/patch-2.7.4-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/patch-2.7.4-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/patch-2.7.4-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/patch-2.7.4-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/patch-2.7.4-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/patch-2.7.4-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/patch-2.7.4-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/patch-2.7.4-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/patch-2.7.4-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/patch-2.7.4-x86_64-1_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/patch-2.7.4-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/patch-2.7.4-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
f887adfdfb23434dd3f37d3f49a9077d patch-2.7.4-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
58455b6b9842e708d422038ab8fe7edb patch-2.7.4-x86_64-1_slack13.0.txz

Slackware 13.1 package:
fd369453096a7118ade75fe489ab17e9 patch-2.7.4-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
cc381cc22597f5553bf681dad3d343f0 patch-2.7.4-x86_64-1_slack13.1.txz

Slackware 13.37 package:
acf0d74eee4378cb7d9118ff97825c6b patch-2.7.4-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
38281ce24307296474d00139783d5131 patch-2.7.4-x86_64-1_slack13.37.txz

Slackware 14.0 package:
883366258723850e1c172833da20e9f3 patch-2.7.4-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
1ee2e9fa194f40682a551fb6b9bd83a7 patch-2.7.4-x86_64-1_slack14.0.txz

Slackware 14.1 package:
7824fea560e2e0fe4510048e2bb3ce3b patch-2.7.4-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
e951553245144de113bc5950e6ebd7c6 patch-2.7.4-x86_64-1_slack14.1.txz

Slackware -current package:
025d4917aca246e4bb81ec2c21cc7886 a/patch-2.7.4-i486-1.txz

Slackware x86_64 -current package:
60940b74eaca8815b56b94de206a2e64 a/patch-2.7.4-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg patch-2.7.4-i486-1_slack14.1.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key

seamonkey (SSA:2015-047-02)

New seamonkey packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/seamonkey-2.32.1-i486-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.32.1-i486-1_slack14.1.txz: Upgraded.
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.


Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-2.32.1-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-solibs-2.32.1-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-2.32.1-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-solibs-2.32.1-x86_64-1_slack14.0.txz

Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/seamonkey-2.32.1-i486-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/seamonkey-solibs-2.32.1-i486-1_slack14.1.txz

Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/seamonkey-2.32.1-x86_64-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/seamonkey-solibs-2.32.1-x86_64-1_slack14.1.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/seamonkey-solibs-2.32.1-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/seamonkey-2.32.1-i486-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/seamonkey-solibs-2.32.1-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/seamonkey-2.32.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 packages:
537b3283974de9875ea8edc5fbc01143 seamonkey-2.32.1-i486-1_slack14.0.txz
b226baa70a9d7a4006af8ae9a728215a seamonkey-solibs-2.32.1-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages:
5d20d5efacf32a32bbeb7b5bf3155c6e seamonkey-2.32.1-x86_64-1_slack14.0.txz
704b9048b48cc9c26acc1c51b38c40f3 seamonkey-solibs-2.32.1-x86_64-1_slack14.0.txz

Slackware 14.1 packages:
c2ab10de551425313c881826c4787eae seamonkey-2.32.1-i486-1_slack14.1.txz
3c7701c9037874bd17958a96bb1390d3 seamonkey-solibs-2.32.1-i486-1_slack14.1.txz

Slackware x86_64 14.1 packages:
ef0d61d7b99117726ca8048a391da0be seamonkey-2.32.1-x86_64-1_slack14.1.txz
844c13f43968dba5385122937cddd93f seamonkey-solibs-2.32.1-x86_64-1_slack14.1.txz

Slackware -current packages:
37fc2432451732e8aa8691cade409e32 l/seamonkey-solibs-2.32.1-i486-1.txz
56541be63b3f17b0f1b6f1c13ede4357 xap/seamonkey-2.32.1-i486-1.txz

Slackware x86_64 -current packages:
f22a870d97d538a13881c055a3c56db9 l/seamonkey-solibs-2.32.1-x86_64-1.txz
223b0df50c2cac960f7d3aca6fd72dc0 xap/seamonkey-2.32.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg seamonkey-2.32.1-i486-1_slack14.1.txz seamonkey-solibs-2.32.1-i486-1_slack14.1.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key

sudo (SSA:2015-047-03)

New sudo packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/sudo-1.8.12-i486-1_slack14.1.txz: Upgraded.
This update fixes a potential security issue by only passing the TZ
environment variable it is considered safe. This prevents exploiting bugs
in glibc's TZ parser that could be used to read files that the user does
not have access to, or to cause a denial of service.
For more information, see:
http://www.sudo.ws/sudo/alerts/tz.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/sudo-1.8.12-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/sudo-1.8.12-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/sudo-1.8.12-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/sudo-1.8.12-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/sudo-1.8.12-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/sudo-1.8.12-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/sudo-1.8.12-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/sudo-1.8.12-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/sudo-1.8.12-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/sudo-1.8.12-x86_64-1_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/sudo-1.8.12-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/sudo-1.8.12-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
035101ffefe581d4147bc82cae995f20 sudo-1.8.12-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
cb041dc9ae54add3a7933e1c0c0697fb sudo-1.8.12-x86_64-1_slack13.0.txz

Slackware 13.1 package:
942fe050f8dfc56d4c163ccaaec04f29 sudo-1.8.12-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
5240ada948250e29773823a179bd5f7c sudo-1.8.12-x86_64-1_slack13.1.txz

Slackware 13.37 package:
ee8fc289076d61cf11f2ccf820704d00 sudo-1.8.12-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
9a37c7f40f496ea9531295910483a23c sudo-1.8.12-x86_64-1_slack13.37.txz

Slackware 14.0 package:
8ff36c6c8b9034b2da68ae44e4a9e779 sudo-1.8.12-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
941e59e982171bae13c3b41bb178a1af sudo-1.8.12-x86_64-1_slack14.0.txz

Slackware 14.1 package:
e2cb4be14b19cd9272373e10e0bd9882 sudo-1.8.12-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
5cda2e6cb8079542819f1daeb3e7c656 sudo-1.8.12-x86_64-1_slack14.1.txz

Slackware -current package:
1b2e4523131873d75de134673f26f876 ap/sudo-1.8.12-i486-1.txz

Slackware x86_64 -current package:
74264293c2e69cbdf7f58dbb87b9c2ae ap/sudo-1.8.12-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg sudo-1.8.12-i486-1_slack14.1.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key