Repository 32bit  Forum
Repository 64bit  Wiki
Fri Feb 10 21:07:35 UTC 2017
patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz: Upgraded.
  This update fixes a denial-of-service vulnerability. Under some conditions
  when using both DNS64 and RPZ to rewrite query responses, query processing
  can resume in an inconsistent state leading to either an INSIST assertion
  failure or an attempt to read through a NULL pointer.
  For more information, see:
  https://kb.isc.org/article/AA-01453
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
  (* Security fix *)
patches/packages/libpcap-1.8.1-i586-1_slack14.2.txz: Upgraded.
  This update is required for the new version of tcpdump.
patches/packages/mozilla-thunderbird-45.7.1-i586-1_slack14.2.txz: Upgraded.
  Fixed crash when viewing certain IMAP messages (introduced in 45.7.0)
patches/packages/openssl-1.0.2k-i586-1_slack14.2.txz: Upgraded.
  This update fixes security issues:
  Truncated packet could crash via OOB read (CVE-2017-3731)
  BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
  Montgomery multiplication may produce incorrect results (CVE-2016-7055)
  For more information, see:
  https://www.openssl.org/news/secadv/20170126.txt
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
  (* Security fix *)
patches/packages/openssl-solibs-1.0.2k-i586-1_slack14.2.txz: Upgraded.
patches/packages/php-5.6.30-i586-1_slack14.2.txz: Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
  https://php.net/ChangeLog-5.php#5.6.30
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
  (* Security fix *)
patches/packages/tcpdump-4.9.0-i586-1_slack14.2.txz: Upgraded.
  Fixed bugs which allow an attacker to crash tcpdump (denial of service).
  For more information, see:
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486
  (* Security fix *)