Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-14.1 ChangeLog (2017-02-10) ====== ====== Fri Feb 10 21:07:35 UTC 2017 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware.14.1>patches/packages/bind-9.9.9_P6-i486-1_slack14.1.txz]] \\ This update fixes a denial-of-service vulnerability. Under some conditions \\ when using both DNS64 and RPZ to rewrite query responses, query processing \\ can resume in an inconsistent state leading to either an INSIST assertion \\ failure or an attempt to read through a NULL pointer. \\ For more information, see: \\ https://kb.isc.org/article/AA-01453 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 \\ (* Security fix *) * [[slackware.14.1>patches/packages/libpcap-1.8.1-i486-1_slack14.1.txz]] \\ This update is required for the new version of tcpdump. * [[slackware.14.1>patches/packages/mozilla-thunderbird-45.7.1-i486-1_slack14.1.txz]] \\ Fixed crash when viewing certain IMAP messages (introduced in 45.7.0) * [[slackware.14.1>patches/packages/php-5.6.30-i486-1_slack14.1.txz]] \\ This release fixes bugs and security issues. \\ For more information, see: \\ https://php.net/ChangeLog-5.php#5.6.30 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161 \\ (* Security fix *) * [[slackware.14.1>patches/packages/tcpdump-4.9.0-i486-1_slack14.1.txz]] \\ Fixed bugs which allow an attacker to crash tcpdump (denial of service). \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486 \\ (* Security fix *) {{tag>slackware changelog slackware-14.1 2017-02}} news/2017/02/10/slackware-14.1-changelog.txt Last modified: 8 months agoby Giuseppe Di Terlizzi Log In