Slackware 1086 Published by

The following security updates has been released for Slackware Linux:

dhcp (SSA:2018-060-01)
ntp (SSA:2018-060-02)



dhcp (SSA:2018-060-01)



New dhcp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/dhcp-4.4.1-i586-1_slack14.2.txz: Upgraded.
This update fixes two security issues:
Corrected an issue where large sized 'X/x' format options were causing
option handling logic to overwrite memory when expanding them to human
readable form. Reported by Felix Wilhelm, Google Security Team.
Option reference count was not correctly decremented in error path
when parsing buffer for options. Reported by Felix Wilhelm, Google
Security Team.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/dhcp-4.4.1-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/dhcp-4.4.1-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/dhcp-4.4.1-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/dhcp-4.4.1-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/dhcp-4.4.1-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/dhcp-4.4.1-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/dhcp-4.4.1-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/dhcp-4.4.1-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/dhcp-4.4.1-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/dhcp-4.4.1-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/dhcp-4.4.1-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/dhcp-4.4.1-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/dhcp-4.4.1-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 13.0 package:
6e00b8d233b21719c1fb330995c1fd94 dhcp-4.4.1-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
f2d34f8be57b139ccf46319a65ff806b dhcp-4.4.1-x86_64-1_slack13.0.txz

Slackware 13.1 package:
5bdc4d595fb12cd584835ac1b8537dad dhcp-4.4.1-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
d0e7b0d98d30e59835092293f1e075dd dhcp-4.4.1-x86_64-1_slack13.1.txz

Slackware 13.37 package:
7f12cf77a7f26502cb4a5f704c5b1e91 dhcp-4.4.1-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
f7097b4f1e20945267a98f568315e43b dhcp-4.4.1-x86_64-1_slack13.37.txz

Slackware 14.0 package:
bff19b2bea0f79ab3589efa4404d14ea dhcp-4.4.1-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
35a493141caf99414370246cfa176c61 dhcp-4.4.1-x86_64-1_slack14.0.txz

Slackware 14.1 package:
bd0b8b57803625530ec5f9b44d5a223e dhcp-4.4.1-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
37551b04c1ce51aa9de3fd0d7e287e0b dhcp-4.4.1-x86_64-1_slack14.1.txz

Slackware 14.2 package:
39c1ede4f5d7dce9f49a708e452eb9c1 dhcp-4.4.1-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
252a04936ee7e70c9b31883ab98e8343 dhcp-4.4.1-x86_64-1_slack14.2.txz

Slackware -current package:
7372ab9666c479916f04c0fed10e764e n/dhcp-4.4.1-i586-1.txz

Slackware x86_64 -current package:
e31242d5910ac08ae1a6519bffbd81f9 n/dhcp-4.4.1-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg dhcp-4.4.1-i586-1_slack14.2.txz

ntp (SSA:2018-060-02)



New ntp packages are available for Slackware 14.0, 14.1, 14.2, and -current to
fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/ntp-4.2.8p11-i586-1_slack14.2.txz: Upgraded.
This release addresses five security issues in ntpd:
* LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability:
ephemeral association attack. While fixed in ntp-4.2.8p7, there are
significant additional protections for this issue in 4.2.8p11.
Reported by Matt Van Gundy of Cisco.
* INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909: ctl_getitem(): buffer
read overrun leads to undefined behavior and information leak.
Reported by Yihan Lian of Qihoo 360.
* LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated
ephemeral associations. Reported on the questions@ list.
* LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode
cannot recover from bad state. Reported by Miroslav Lichvar of Red Hat.
* LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909: Unauthenticated packet
can reset authenticated interleaved association.
Reported by Miroslav Lichvar of Red Hat.
For more information, see:
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-):

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p11-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p11-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p11-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p11-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/ntp-4.2.8p11-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/ntp-4.2.8p11-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p11-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p11-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 package:
01c86ddfabec68d52877336258d064c7 ntp-4.2.8p11-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
b2d36d96f9a4d84df3586d38b8b47389 ntp-4.2.8p11-x86_64-1_slack14.0.txz

Slackware 14.1 package:
78b4e9221e725dcb45160950bfc926d0 ntp-4.2.8p11-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
e0d32ed484e02ad28c59838e6407d549 ntp-4.2.8p11-x86_64-1_slack14.1.txz

Slackware 14.2 package:
81690d8e511b403f0fe89c1d120f5049 ntp-4.2.8p11-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
d2c877e3d1b9c7ce003ef090c7610c74 ntp-4.2.8p11-x86_64-1_slack14.2.txz

Slackware -current package:
c3ee95d3944b09c2e891883dc5411a6f n/ntp-4.2.8p11-i586-1.txz

Slackware x86_64 -current package:
fa9c7a8aca0c769791e34a8e48e6d260 n/ntp-4.2.8p11-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the package as root:
# upgradepkg ntp-4.2.8p11-i586-1_slack14.2.txz

Then, restart the NTP daemon:

# sh /etc/rc.d/rc.ntpd restart