Slackware 1133 Published by

The following two security updates are available for Slackware:

dhcpcd (SSA:2014-213-02)
samba (SSA:2014-213-01)



dhcpcd (SSA:2014-213-02)

New dhcpcd packages are available for Slackware 13.1, 13.37, 14.0, 14.1,
and -current to fix a security issue.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/dhcpcd-6.0.5-i486-3_slack14.1.txz: Rebuilt.
This update fixes a security issue where a specially crafted packet
received from a malicious DHCP server causes dhcpcd to enter an infinite
loop causing a denial of service.
Thanks to Tobias Stoeckmann for the bug report.
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/dhcpcd-5.2.12-i486-2_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/dhcpcd-5.2.12-x86_64-2_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/dhcpcd-5.2.12-i486-2_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/dhcpcd-5.2.12-x86_64-2_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/dhcpcd-5.5.6-i486-2_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/dhcpcd-6.0.5-i486-3_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/dhcpcd-6.0.5-x86_64-3_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/dhcpcd-6.0.5-i486-3.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/dhcpcd-6.0.5-x86_64-3.txz


MD5 signatures:
+-------------+

Slackware 13.1 package:
7ee61ba111c58bfe6147890bae50846e dhcpcd-5.2.12-i486-2_slack13.1.txz

Slackware x86_64 13.1 package:
b2976c0bc824c53da33bdeaf5647c99b dhcpcd-5.2.12-x86_64-2_slack13.1.txz

Slackware 13.37 package:
e8fc381c5c5623c3d591ff06585da7f7 dhcpcd-5.2.12-i486-2_slack13.37.txz

Slackware x86_64 13.37 package:
fa7f9341a63b2568a78a812dcbe2a220 dhcpcd-5.2.12-x86_64-2_slack13.37.txz

Slackware 14.0 package:
cb9cb0030a700a664f9634cea787e1a3 dhcpcd-5.5.6-i486-2_slack14.0.txz

Slackware x86_64 14.0 package:
830d0d7230297fb9d8e454acc0ff7a1c dhcpcd-5.5.6-x86_64-2_slack14.0.txz

Slackware 14.1 package:
0016202a22b11a4741039f302a50a246 dhcpcd-6.0.5-i486-3_slack14.1.txz

Slackware x86_64 14.1 package:
1999479013557ec1e3eca33c7c2f3927 dhcpcd-6.0.5-x86_64-3_slack14.1.txz

Slackware -current package:
6f7335d0dace5432244dcbfbadce9053 n/dhcpcd-6.0.5-i486-3.txz

Slackware x86_64 -current package:
4d0d4e0ae8876022729802e31a30f86c n/dhcpcd-6.0.5-x86_64-3.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg dhcpcd-6.0.5-i486-3_slack14.1.txz

samba (SSA:2014-213-01)

New samba packages are available for Slackware 14.1 and -current to
fix a security issue.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/samba-4.1.11-i486-1_slack14.1.txz: Upgraded.
This update fixes a remote code execution attack on unauthenticated nmbd
NetBIOS name services. A malicious browser can send packets that may
overwrite the heap of the target nmbd NetBIOS name services daemon.
It may be possible to use this to generate a remote code execution
vulnerability as the superuser (root).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/samba-4.1.11-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/samba-4.1.11-x86_64-1_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-4.1.11-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/samba-4.1.11-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.1 package:
f9eb404a40088180c93195b679402d8d samba-4.1.11-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
0ea529ae98cfcba0a54e93919eda9ca5 samba-4.1.11-x86_64-1_slack14.1.txz

Slackware -current package:
bb47fb29b6dcb9a828b1e8dac3e59107 n/samba-4.1.11-i486-1.txz

Slackware x86_64 -current package:
587d9963535d8d42236dd61b91d1a0a8 n/samba-4.1.11-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg samba-4.1.11-i486-1_slack14.1.txz

Then, if Samba is running restart it:
# /etc/rc.d/rc.samba restart