Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackwarearm-14.2 ChangeLog (2017-02-11) ====== ====== Sat Feb 11 11:11:11 UTC 2017 ====== > /INSTALL_KIRKWOOD.TXT: Updated. \\ Updated to be in sync with newer U-Boot versions. \\ Thanks to Dedalus Tlaxcallan Orwell for the suggestions and \\ amendments. ===== Packages ===== ==== Upgraded ==== * [[slackwarearm.14.2>patches/packages/bind-9.10.4_P6-arm-1_slack14.2.txz]] \\ This update fixes a denial-of-service vulnerability. Under some conditions \\ when using both DNS64 and RPZ to rewrite query responses, query processing \\ can resume in an inconsistent state leading to either an INSIST assertion \\ failure or an attempt to read through a NULL pointer. \\ For more information, see: \\ https://kb.isc.org/article/AA-01453 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 \\ (* Security fix *) * [[slackwarearm.14.2>patches/packages/libpcap-1.8.1-arm-1_slack14.2.txz]] \\ This update is required for the new version of tcpdump. * [[slackwarearm.14.2>patches/packages/openssl-1.0.2k-arm-1_slack14.2.txz]] \\ This update fixes security issues: \\ Truncated packet could crash via OOB read (CVE-2017-3731) \\ BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732) \\ Montgomery multiplication may produce incorrect results (CVE-2016-7055) \\ For more information, see: \\ https://www.openssl.org/news/secadv/20170126.txt \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055 \\ (* Security fix *) * [[slackwarearm.14.2>patches/packages/openssl-solibs-1.0.2k-arm-1_slack14.2.txz]] * [[slackwarearm.14.2>patches/packages/php-5.6.30-arm-1_slack14.2.txz]] \\ This release fixes bugs and security issues. \\ For more information, see: \\ https://php.net/ChangeLog-5.php#5.6.30 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 \\ (* Security fix *) * [[slackwarearm.14.2>patches/packages/tcpdump-4.9.0-arm-1_slack14.2.txz]] \\ Fixed bugs which allow an attacker to crash tcpdump (denial of service). \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486 \\ (* Security fix *) {{tag>slackware changelog slackwarearm-14.2 2017-02}} news/2017/02/11/slackwarearm-14.2-changelog.txt Last modified: 6 months agoby Giuseppe Di Terlizzi Log In