Risks
Advisories
Browse
or
or
Slackware Security Advisory - seamonkey (SSA:2012-326-01)
[slackware-security]  seamonkey (SSA:2012-326-01)

New seamonkey packages are available for Slackware 13.37, 14.0, and -current to
fix security issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/seamonkey-solibs-2.14-i486-1_slack14.0.txz:  Upgraded.
patches/packages/seamonkey-2.14-i486-1_slack14.0.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/seamonkey-2.14
-i486-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/seamonkey-soli
bs-2.14-i486-1_slack13.37.txz

Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/seamonkey-2.
14-x86_64-1_slack13.37.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/seamonkey-so
libs-2.14-x86_64-1_slack13.37.txz

Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-2.14-
i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-solib
s-2.14-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-2.1
4-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-sol
ibs-2.14-x86_64-1_slack14.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/seamonkey-solibs-
2.14-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/seamonkey-2.14-
i486-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/seamonkey-sol
ibs-2.14-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/seamonkey-2
.14-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.37 packages:
8e77353d40f70c8baa634eec44e5813a  seamonkey-2.14-i486-1_slack13.37.txz
c3826b69fefa3462bbd1e1e5632ab468  seamonkey-solibs-2.14-i486-1_slack13.37.txz

Slackware x86_64 13.37 packages:
9c3a9738b52351888d279060517c4b7e  seamonkey-2.14-x86_64-1_slack13.37.txz
e4c593d81144ebed4c1fb4c79a101df6  seamonkey-solibs-2.14-x86_64-1_slack13.37.txz

Slackware 14.0 packages:
22598aff72214da616def333ed7a1b85  seamonkey-2.14-i486-1_slack14.0.txz
b8b7af35df643e94bd316e1e94c1cb01  seamonkey-solibs-2.14-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages:
e3c8bdf7d545f16fc06613fec8e761a9  seamonkey-2.14-x86_64-1_slack14.0.txz
a94b85a4f97b4ee33c9b0ae833ef9abc  seamonkey-solibs-2.14-x86_64-1_slack14.0.txz

Slackware -current packages:
fad9778b90a69ec5b84b398199db3612  l/seamonkey-solibs-2.14-i486-1.txz
e8a37e76942105c934adf8b340d7f5a7  xap/seamonkey-2.14-i486-1.txz

Slackware x86_64 -current packages:
befb793a55dee5a0f8ddda27077247a2  l/seamonkey-solibs-2.14-x86_64-1.txz
9964d866ef06922798cdc676c3379d7d  xap/seamonkey-2.14-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg seamonkey-2.14-i486-1_slack14.0.txz
seamonkey-solibs-2.14-i486-1_slack14.0.txz


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Apr 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //