The following 5 updates has been released for Slackware Linux:
bind (SSA:2014-175-01)
gnupg (SSA:2014-175-02)
gnupg2 (SSA:2014-175-03)
samba (SSA:2014-175-04)
seamonkey (SSA:2014-175-05)
New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
bind (SSA:2014-175-01)
gnupg (SSA:2014-175-02)
gnupg2 (SSA:2014-175-03)
samba (SSA:2014-175-04)
seamonkey (SSA:2014-175-05)
New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/bind-9.9.5_P1-i486-1_slack14.1.txz: Upgraded.
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bind-9.8.7_P1-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bind-9.8.7_P1-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bind-9.8.7_P1-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bind-9.8.7_P1-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bind-9.8.7_P1-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bind-9.8.7_P1-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.9.5_P1-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.9.5_P1-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.9.5_P1-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.9.5_P1-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.9.5_P1-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.9.5_P1-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.0 package:
68c347027ac6ce76dffa0812bf5cba92 bind-9.8.7_P1-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
513cf5eca63726b3d25415b541292748 bind-9.8.7_P1-x86_64-1_slack13.0.txz
Slackware 13.1 package:
859959231b9fd16872a81c0160b77ddb bind-9.8.7_P1-i486-1_slack13.1.txz
Slackware x86_64 13.1 package:
fb2de1c5f593b19549b3d2de13d6fbdd bind-9.8.7_P1-x86_64-1_slack13.1.txz
Slackware 13.37 package:
2b31ddca74fe5a34c6a4618e68d47318 bind-9.8.7_P1-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
5d2f7205a31006ca2c03f0ef89b0d8f3 bind-9.8.7_P1-x86_64-1_slack13.37.txz
Slackware 14.0 package:
aa3435f95524c2203169a5fd52bfa72c bind-9.9.5_P1-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
9899fae00a73c1bd2fe798dc21839fa3 bind-9.9.5_P1-x86_64-1_slack14.0.txz
Slackware 14.1 package:
a1598e727c87f55cd249ec5f4ef12c36 bind-9.9.5_P1-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
f908655cd6bb3e9894b77fb814efd706 bind-9.9.5_P1-x86_64-1_slack14.1.txz
Slackware -current package:
9c0c516579affda8a63a90c9f5b8df30 n/bind-9.9.5_P1-i486-1.txz
Slackware x86_64 -current package:
7eb5432da1619a9a1172d73896e8fb9b n/bind-9.9.5_P1-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.9.5_P1-i486-1_slack14.1.txz
Then, restart the name server:
# /etc/rc.d/rc.bind restart
[id=61225]gnupg (SSA:2014-175-02)
New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/gnupg-1.4.17-i486-1_slack14.1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/gnupg-1.4.17-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/gnupg-1.4.17-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/gnupg-1.4.17-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/gnupg-1.4.17-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/gnupg-1.4.17-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/gnupg-1.4.17-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/gnupg-1.4.17-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/gnupg-1.4.17-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/gnupg-1.4.17-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/gnupg-1.4.17-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/gnupg-1.4.17-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/gnupg-1.4.17-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.0 package:
2a3448e3d468203be5458c357d6f05ef gnupg-1.4.17-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
bd2c80dd4d2ae5a28c49026070bc7800 gnupg-1.4.17-x86_64-1_slack13.0.txz
Slackware 13.1 package:
0e49f54235b05a9b981af034c490b39d gnupg-1.4.17-i486-1_slack13.1.txz
Slackware x86_64 13.1 package:
becc38f574d9af131e667e573b410af9 gnupg-1.4.17-x86_64-1_slack13.1.txz
Slackware 13.37 package:
f807d51cb4d1474aa41979c0a933ca1d gnupg-1.4.17-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
a7e2270d3992e827c7f62d3e64218e16 gnupg-1.4.17-x86_64-1_slack13.37.txz
Slackware 14.0 package:
bbc9a2603c167222daeac34fcdbfd15d gnupg-1.4.17-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
e3fbe6149e0bad38952225c602788469 gnupg-1.4.17-x86_64-1_slack14.0.txz
Slackware 14.1 package:
42252dd42d19619ae2d40f85061f4cfc gnupg-1.4.17-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
032338eac243499017516e4d9bd8cece gnupg-1.4.17-x86_64-1_slack14.1.txz
Slackware -current package:
4eb3e45b7337197ff3281335147b2556 n/gnupg-1.4.17-i486-1.txz
Slackware x86_64 -current package:
f09b029cd5daa846a9e87bc4699cda81 n/gnupg-1.4.17-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg gnupg-1.4.17-i486-1_slack14.1.txz
gnupg2 (SSA:2014-175-03)
New gnupg2 packages are available for Slackware 13.37, 14.0, 14.1,
and -current to fix a security issue.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/gnupg2-2.0.24-i486-1_slack14.1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/gnupg2-2.0.24-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/gnupg2-2.0.24-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/gnupg2-2.0.24-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/gnupg2-2.0.24-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/gnupg2-2.0.24-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/gnupg2-2.0.24-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/gnupg2-2.0.24-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 13.37 package:
cc0c37aacd0d3eab10f353d3f82f3584 gnupg2-2.0.24-i486-1_slack13.37.txz
Slackware x86_64 13.37 package:
8c76fafd4e469785dd571ad84a679a18 gnupg2-2.0.24-x86_64-1_slack13.37.txz
Slackware 14.0 package:
47bc00e244c2c52d8177fbae205b6609 gnupg2-2.0.24-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
d76d81aa67d0806ad3a85b4e1772bd31 gnupg2-2.0.24-x86_64-1_slack14.0.txz
Slackware 14.1 package:
3649d32b6fb1733320acbc47ca10ff02 gnupg2-2.0.24-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
9f77fb4f094295c4c396d02fba3b8159 gnupg2-2.0.24-x86_64-1_slack14.1.txz
Slackware -current package:
a14b1af17da04ccc4651215c84682d5d n/gnupg2-2.0.24-i486-1.txz
Slackware x86_64 -current package:
02705c86d2231234533427c1cd5b1da3 n/gnupg2-2.0.24-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg gnupg2-2.0.24-i486-1_slack14.1.txz
samba (SSA:2014-175-04)
New samba packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/samba-4.1.9-i486-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/samba-3.6.24-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/samba-3.6.24-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/samba-4.1.9-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/samba-4.1.9-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-4.1.9-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/samba-4.1.9-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 package:
19e6778a1b642b051ec893b5fda161a0 samba-3.6.24-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
a18f536e4c31228132e594b1fa6f830a samba-3.6.24-x86_64-1_slack14.0.txz
Slackware 14.1 package:
44879c1d5400b830817def5730686937 samba-4.1.9-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
16cb8c3f747b0fdbaafc221bf5ce0aa6 samba-4.1.9-x86_64-1_slack14.1.txz
Slackware -current package:
399198d155fcfa5d449237ea89828c98 n/samba-4.1.9-i486-1.txz
Slackware x86_64 -current package:
8eeb6a52026f809b04bc8a2820c5c5ef n/samba-4.1.9-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg samba-4.1.9-i486-1_slack14.1.txz
Then, if Samba is running restart it:
# /etc/rc.d/rc.samba restart
seamonkey (SSA:2014-175-05)
New seamonkey packages are available for Slackware 14.0, 14.1, and -current to
fix security issues.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/seamonkey-2.26.1-i486-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
patches/packages/seamonkey-solibs-2.26.1-i486-1_slack14.1.txz: Upgraded.
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-2.26.1-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-solibs-2.26.1-i486-1_slack14.0.txz
Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-2.26.1-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-solibs-2.26.1-x86_64-1_slack14.0.txz
Updated packages for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/seamonkey-2.26.1-i486-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/seamonkey-solibs-2.26.1-i486-1_slack14.1.txz
Updated packages for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/seamonkey-2.26.1-x86_64-1_slack14.1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/seamonkey-solibs-2.26.1-x86_64-1_slack14.1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/seamonkey-solibs-2.26.1-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/seamonkey-2.26.1-i486-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/seamonkey-solibs-2.26.1-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/seamonkey-2.26.1-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 packages:
70da8bc38dc7bef9e5c3b687f163940e seamonkey-2.26.1-i486-1_slack14.0.txz
0d9c4675f2544afab85cf01c399d4152 seamonkey-solibs-2.26.1-i486-1_slack14.0.txz
Slackware x86_64 14.0 packages:
99ec0023438f88d44e24ed15fd0bce12 seamonkey-2.26.1-x86_64-1_slack14.0.txz
6a6056938ebfb9f04155e5d4f66d2e93 seamonkey-solibs-2.26.1-x86_64-1_slack14.0.txz
Slackware 14.1 packages:
0aa920ea922b3065eb80bf8e6ed8b647 seamonkey-2.26.1-i486-1_slack14.1.txz
dcfd9431214a2259374030fd4d8106e6 seamonkey-solibs-2.26.1-i486-1_slack14.1.txz
Slackware x86_64 14.1 packages:
6c3f0ce16a45aee3d50d241fea8cd008 seamonkey-2.26.1-x86_64-1_slack14.1.txz
4806231b6ce06534ec2191234e07625b seamonkey-solibs-2.26.1-x86_64-1_slack14.1.txz
Slackware -current packages:
faafe41358a3188246eb1305025b13ca l/seamonkey-solibs-2.26.1-i486-1.txz
f4246ae2f208941b022739a614f1b08a xap/seamonkey-2.26.1-i486-1.txz
Slackware x86_64 -current packages:
64d9afdde3e078c3d69c5f2f8021b268 l/seamonkey-solibs-2.26.1-x86_64-1.txz
eebc139d96eb4ea7d0929a6fa51100a3 xap/seamonkey-2.26.1-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg seamonkey-2.26.1-i486-1_slack14.1.txz seamonkey-solibs-2.26.1-i486-1_slack14.1.txz