Slackware64-current ChangeLog (2014-06-24)
Tue Jun 24 22:35:07 UTC 2014
Packages
Rebuilt
- ap/man-1.6g-x86_64-2.txz
Moved config file to /etc.
Upgraded
- n/bind-9.9.5_P1-x86_64-1.txz
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *) - n/gnupg-1.4.17-x86_64-1.txz
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *) - n/gnupg2-2.0.24-x86_64-1.txz
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *) - n/samba-4.1.9-x86_64-1.txz
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *) - xap/seamonkey-2.26.1-x86_64-1.txz
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)