Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware64-14.2 ChangeLog (2017-02-10) ====== ====== Fri Feb 10 21:07:35 UTC 2017 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware64.14.2>patches/packages/bind-9.10.4_P6-x86_64-1_slack14.2.txz]] \\ This update fixes a denial-of-service vulnerability. Under some conditions \\ when using both DNS64 and RPZ to rewrite query responses, query processing \\ can resume in an inconsistent state leading to either an INSIST assertion \\ failure or an attempt to read through a NULL pointer. \\ For more information, see: \\ https://kb.isc.org/article/AA-01453 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 \\ (* Security fix *) * [[slackware64.14.2>patches/packages/libpcap-1.8.1-x86_64-1_slack14.2.txz]] \\ This update is required for the new version of tcpdump. * [[slackware64.14.2>patches/packages/mozilla-thunderbird-45.7.1-x86_64-1_slack14.2.txz]] \\ Fixed crash when viewing certain IMAP messages (introduced in 45.7.0) * [[slackware64.14.2>patches/packages/openssl-1.0.2k-x86_64-1_slack14.2.txz]] \\ This update fixes security issues: \\ Truncated packet could crash via OOB read (CVE-2017-3731) \\ BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732) \\ Montgomery multiplication may produce incorrect results (CVE-2016-7055) \\ For more information, see: \\ https://www.openssl.org/news/secadv/20170126.txt \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055 \\ (* Security fix *) * [[slackware64.14.2>patches/packages/openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz]] * [[slackware64.14.2>patches/packages/php-5.6.30-x86_64-1_slack14.2.txz]] \\ This release fixes bugs and security issues. \\ For more information, see: \\ https://php.net/ChangeLog-5.php#5.6.30 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 \\ (* Security fix *) * [[slackware64.14.2>patches/packages/tcpdump-4.9.0-x86_64-1_slack14.2.txz]] \\ Fixed bugs which allow an attacker to crash tcpdump (denial of service). \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486 \\ (* Security fix *) {{tag>slackware changelog slackware64-14.2 2017-02}} news/2017/02/10/slackware64-14.2-changelog.txt Last modified: 6 months agoby Giuseppe Di Terlizzi Log In