Repository 32bit  Forum
Repository 64bit  Wiki
Mon Dec 16 20:51:01 UTC 2013
patches/packages/libiodbc-3.52.8-x86_64-1_slack14.1.txz: Upgraded.
  This update fixes an rpath pointing to a location in /tmp that was found in
  two test programs (iodbctest and iodbctestw). This could have allowed a
  local attacker with write access to /tmp to add modified libraries (and
  execute arbitrary code) as any user running the test programs.
  Thanks to Christopher Oliver for the bug report.
  (* Security fix *)
patches/packages/libjpeg-v8a-x86_64-2_slack14.1.txz: Rebuilt.
  Fix use of uninitialized memory when decoding images with missing SOS data
  for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
  This could allow remote attackers to obtain sensitive information from
  uninitialized memory locations via a crafted JPEG image.
  For more information, see:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
  (* Security fix *)
patches/packages/llvm-3.3-x86_64-3_slack14.1.txz: Rebuilt.
  The LLVM package included binaries with an rpath pointing to the build
  location in /tmp. This allows an attacker with write access to /tmp to
  add modified libraries (and execute arbitrary code) as any user running
  the LLVM binaries. This updated package rebuilds LLVM to exclude the
  build directories from the rpath information.
  Thanks to Christopher Oliver for the bug report.
  (* Security fix *)
patches/packages/mozilla-firefox-24.2.0esr-x86_64-1_slack14.1.txz: Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
  http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
  (* Security fix *)
patches/packages/mozilla-thunderbird-24.2.0-x86_64-1_slack14.1.txz: Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
  http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
  (* Security fix *)
patches/packages/ruby-1.9.3_p484-x86_64-1_slack14.1.txz: Upgraded.
  This update fixes a heap overflow in floating point parsing. A specially
  crafted string could cause a heap overflow leading to a denial of service
  attack via segmentation faults and possibly arbitrary code execution.
  For more information, see:
  https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
  (* Security fix *)
patches/packages/seamonkey-2.23-x86_64-1_slack14.1.txz: Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
  http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
patches/packages/seamonkey-solibs-2.23-x86_64-1_slack14.1.txz: Upgraded.