2018-05-26 01:29:36 +02:00
|
|
|
|
Fri May 25 23:29:36 UTC 2018
|
|
|
|
|
patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Handle removal of US/Pacific-New timezone. If we see that the machine is
|
|
|
|
|
using this, it will be automatically switched to US/Pacific.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 23 04:42:29 UTC 2018
|
|
|
|
|
patches/packages/linux-4.4.132/*: Upgraded.
|
|
|
|
|
This kernel upgrade is being provided primarily to fix a regression in the
|
|
|
|
|
getsockopt() function, but it also contains fixes for two denial-of-service
|
|
|
|
|
security issues.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.8.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/thunderbird/52.8.0/releasenotes/
|
|
|
|
|
https://www.mozilla.org/en-US/security/advisories/mfsa2018-13/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/procps-ng-3.3.15-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
This update fixes bugs and security issues:
|
|
|
|
|
library: Fix integer overflow and LPE in file2strvec
|
|
|
|
|
library: Use size_t for alloc functions
|
|
|
|
|
pgrep: Fix stack-based buffer overflow
|
|
|
|
|
ps: Fix buffer overflow in output buffer, causing DOS
|
|
|
|
|
top: Don't use cwd for location of config
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 17 04:13:16 UTC 2018
|
|
|
|
|
patches/packages/curl-7.60.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes:
|
|
|
|
|
FTP: shutdown response buffer overflow
|
|
|
|
|
RTSP: bad headers buffer over-read
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/php-5.6.36-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This fixes many bugs, including some security issues:
|
|
|
|
|
Heap Buffer Overflow (READ: 1786) in exif_iif_add_value
|
|
|
|
|
stream filter convert.iconv leads to infinite loop on invalid sequence
|
|
|
|
|
Malicious LDAP-Server Response causes crash
|
|
|
|
|
fix for CVE-2018-5712 may not be complete
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10549
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 10 21:01:11 UTC 2018
|
|
|
|
|
patches/packages/mariadb-10.0.35-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 10 01:24:19 UTC 2018
|
|
|
|
|
patches/packages/glibc-zoneinfo-2018e-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
patches/packages/mozilla-firefox-52.8.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
https://www.mozilla.org/en-US/security/advisories/mfsa2018-12/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/wget-1.19.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed a security issue where a malicious web server could inject arbitrary
|
|
|
|
|
cookies into the cookie jar file.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri May 4 19:40:52 UTC 2018
|
|
|
|
|
patches/packages/python-2.7.15-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Updated to the latest 2.7.x release.
|
|
|
|
|
This fixes some security issues in difflib and poplib (regexes vulnerable
|
|
|
|
|
to denial of service attacks), as well as security issues with the bundled
|
|
|
|
|
expat library.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 3 22:42:35 UTC 2018
|
|
|
|
|
patches/packages/seamonkey-2.49.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information (when it appears), see:
|
|
|
|
|
http://www.seamonkey-project.org/releases/seamonkey2.49.3
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/seamonkey-solibs-2.49.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 1 06:24:40 UTC 2018
|
|
|
|
|
patches/packages/libwmf-0.2.8.4-x86_64-7_slack14.2.txz: Rebuilt.
|
|
|
|
|
Renamed package to fix wrong package tag (was slack14.1, should be
|
|
|
|
|
slack14.2). Thanks to rworkman for the heads-up.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Apr 30 22:35:43 UTC 2018
|
|
|
|
|
patches/packages/libwmf-0.2.8.4-x86_64-7_slack14.1.txz: Rebuilt.
|
|
|
|
|
Patched denial of service and possible execution of arbitrary code
|
|
|
|
|
security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-firefox-52.7.4esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 27 03:58:48 UTC 2018
|
|
|
|
|
patches/packages/openvpn-2.4.6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a security update fixing a potential double-free() in Interactive
|
|
|
|
|
Service. This usually only leads to a process crash (DoS by an unprivileged
|
|
|
|
|
local account) but since it could possibly lead to memory corruption if
|
|
|
|
|
happening while multiple other threads are active at the same time,
|
|
|
|
|
CVE-2018-9336 has been assigned to acknowledge this risk.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9336
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Apr 19 01:04:06 UTC 2018
|
|
|
|
|
patches/packages/gd-2.2.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
Double-free in gdImagePngPtr() (denial of service).
|
|
|
|
|
Buffer over-read into uninitialized memory (information leak).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 6 20:47:43 UTC 2018
|
|
|
|
|
patches/packages/patch-2.7.6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix arbitrary shell execution possible with obsolete ed format patches.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Apr 1 19:45:12 UTC 2018
|
|
|
|
|
patches/packages/libidn-1.34-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
Fix integer overflow in combine_hangul()
|
|
|
|
|
Fix integer overflow in punycode decoder
|
|
|
|
|
Fix NULL pointer dereference in g_utf8_normalize()
|
|
|
|
|
Fix NULL pointer dereference in stringprep_ucs4_nfkc_normalize()
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Apr 1 02:53:26 UTC 2018
|
|
|
|
|
patches/packages/php-5.6.35-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where sensitive data belonging to other
|
|
|
|
|
accounts might be accessed by a local user.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://bugs.php.net/75605
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 29 20:48:28 UTC 2018
|
|
|
|
|
patches/packages/ruby-2.2.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release includes some bug fixes and some security fixes:
|
|
|
|
|
HTTP response splitting in WEBrick.
|
|
|
|
|
Unintentional file and directory creation with directory traversal in
|
|
|
|
|
tempfile and tmpdir.
|
|
|
|
|
DoS by large request in WEBrick.
|
|
|
|
|
Buffer under-read in String#unpack.
|
|
|
|
|
Unintentional socket creation by poisoned NUL byte in UNIXServer
|
|
|
|
|
and UNIXSocket.
|
|
|
|
|
Unintentional directory traversal by poisoned NUL byte in Dir.
|
|
|
|
|
Multiple vulnerabilities in RubyGems.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 29 01:02:50 UTC 2018
|
|
|
|
|
patches/packages/openssl-1.0.2o-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
Constructed ASN.1 types with a recursive definition could exceed the stack.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20180327.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2o-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Mar 26 22:06:38 UTC 2018
|
|
|
|
|
patches/packages/mozilla-firefox-52.7.3esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/security/advisories/mfsa2018-10/
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 23 22:28:20 UTC 2018
|
|
|
|
|
patches/packages/glibc-zoneinfo-2018d-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.7.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/thunderbird/52.7.0/releasenotes/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Mar 18 00:55:39 UTC 2018
|
|
|
|
|
patches/packages/libvorbis-1.3.6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Mar 17 03:25:26 UTC 2018
|
|
|
|
|
patches/packages/mozilla-firefox-52.7.2esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/security/advisories/mfsa2018-08/
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 16 02:29:29 UTC 2018
|
|
|
|
|
patches/packages/curl-7.59.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
FTP path trickery leads to NIL byte out of bounds write
|
|
|
|
|
LDAP NULL pointer dereference
|
|
|
|
|
RTSP RTP buffer over-read
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_2018-9cd6.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
|
|
|
|
|
https://curl.haxx.se/docs/adv_2018-97a2.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
|
|
|
|
|
https://curl.haxx.se/docs/adv_2018-b047.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Mar 13 21:12:51 UTC 2018
|
|
|
|
|
patches/packages/mozilla-firefox-52.7.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/security/advisories/mfsa2018-07/
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/samba-4.4.16-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
This is a security update in order to patch the following defect:
|
|
|
|
|
On a Samba 4 AD DC the LDAP server in all versions of Samba from
|
|
|
|
|
4.0.0 onwards incorrectly validates permissions to modify passwords
|
|
|
|
|
over LDAP allowing authenticated users to change any other users`
|
|
|
|
|
passwords, including administrative users.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2018-1057.html
|
|
|
|
|
https://wiki.samba.org/index.php/CVE-2018-1057
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 8 07:07:45 UTC 2018
|
|
|
|
|
patches/packages/libtool-2.4.6-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
Rebuilt to fix the embedded GCC version number. Thanks to David Spencer.
|
|
|
|
|
patches/packages/openssh-7.4p1-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
sftp-server: in read-only mode, sftp-server was incorrectly permitting
|
|
|
|
|
creation of zero-length files. Reported by Michal Zalewski.
|
|
|
|
|
Thanks to arny (of Bluewhite64 fame) for the heads-up.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/php-5.6.34-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a stack buffer overflow vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 1 23:24:54 UTC 2018
|
|
|
|
|
patches/packages/dhcp-4.4.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
Corrected an issue where large sized 'X/x' format options were causing
|
|
|
|
|
option handling logic to overwrite memory when expanding them to human
|
|
|
|
|
readable form. Reported by Felix Wilhelm, Google Security Team.
|
|
|
|
|
Option reference count was not correctly decremented in error path
|
|
|
|
|
when parsing buffer for options. Reported by Felix Wilhelm, Google
|
|
|
|
|
Security Team.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/ntp-4.2.8p11-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release addresses five security issues in ntpd:
|
|
|
|
|
* LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability:
|
|
|
|
|
ephemeral association attack. While fixed in ntp-4.2.8p7, there are
|
|
|
|
|
significant additional protections for this issue in 4.2.8p11.
|
|
|
|
|
Reported by Matt Van Gundy of Cisco.
|
|
|
|
|
* INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909: ctl_getitem(): buffer
|
|
|
|
|
read overrun leads to undefined behavior and information leak.
|
|
|
|
|
Reported by Yihan Lian of Qihoo 360.
|
|
|
|
|
* LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated
|
|
|
|
|
ephemeral associations. Reported on the questions@ list.
|
|
|
|
|
* LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode
|
|
|
|
|
cannot recover from bad state. Reported by Miroslav Lichvar of Red Hat.
|
|
|
|
|
* LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909: Unauthenticated packet
|
|
|
|
|
can reset authenticated interleaved association.
|
|
|
|
|
Reported by Miroslav Lichvar of Red Hat.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Feb 26 21:32:03 UTC 2018
|
|
|
|
|
patches/packages/linux-4.4.118/*: Upgraded.
|
|
|
|
|
This kernel includes __user pointer sanitization mitigation for the Spectre
|
|
|
|
|
(variant 1) speculative side channel attack.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Feb 24 07:41:40 UTC 2018
|
|
|
|
|
patches/packages/wget-1.19.4-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix logging in background mode.
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Feb 16 03:19:36 UTC 2018
|
|
|
|
|
patches/packages/irssi-1.0.7-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/html/irssi_sa_2018_02
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Feb 14 19:48:51 UTC 2018
|
|
|
|
|
patches/packages/seamonkey-2.49.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/seamonkey-solibs-2.49.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Feb 7 04:28:48 UTC 2018
|
|
|
|
|
patches/packages/gcc-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Upgraded to the latest gcc-5 release, with patches to support
|
|
|
|
|
-mindirect-branch=thunk-extern, allowing full mitigation of Spectre v2
|
|
|
|
|
in the kernel (when CONFIG_RETPOLINE is used).
|
|
|
|
|
patches/packages/gcc-g++-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/gcc-gfortran-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/gcc-gnat-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/gcc-go-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/gcc-java-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/gcc-objc-5.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/linux-4.4.115/*: Upgraded.
|
|
|
|
|
This kernel includes full retpoline mitigation for the Spectre (variant 2)
|
|
|
|
|
speculative side channel attack.
|
|
|
|
|
Please note that this kernel was compiled with gcc-5.5.0, also provided as
|
|
|
|
|
an update for Slackware 14.2. You'll need to install the updated gcc in order
|
|
|
|
|
to compile kernel modules that will load into this updated kernel.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Feb 4 05:13:27 UTC 2018
|
|
|
|
|
patches/packages/php-5.6.33-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues, including:
|
|
|
|
|
Potential infinite loop in gdImageCreateFromGifCtx.
|
|
|
|
|
Reflected XSS in .phar 404 page.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Feb 1 18:24:15 UTC 2018
|
|
|
|
|
patches/packages/mariadb-10.0.34-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/rsync-3.1.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
Fixed a buffer overrun in the protocol's handling of xattr names and
|
|
|
|
|
ensure that the received name is null terminated.
|
|
|
|
|
Fix an issue with --protect-args where the user could specify the arg in
|
|
|
|
|
the protected-arg list and short-circuit some of the arg-sanitizing code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jan 26 03:46:16 UTC 2018
|
|
|
|
|
patches/packages/curl-7.58.0-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Recompiled using --with-libssh2, which is evidently no longer a default
|
|
|
|
|
option. Thanks to Markus Wiesner.
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.6.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/thunderbird/52.6.0/releasenotes/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jan 25 02:24:04 UTC 2018
|
|
|
|
|
patches/packages/curl-7.58.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
HTTP authentication leak in redirects
|
|
|
|
|
HTTP/2 trailer out-of-bounds read
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_2018-b3bf.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
|
|
|
|
|
https://curl.haxx.se/docs/adv_2018-824a.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 24 04:21:44 UTC 2018
|
|
|
|
|
patches/packages/glibc-zoneinfo-2018c-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jan 22 22:47:47 UTC 2018
|
|
|
|
|
patches/packages/wget-1.19.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
More bug fixes:
|
|
|
|
|
A major bug that caused GZip'ed pages to never be decompressed has been fixed
|
|
|
|
|
Support for Content-Encoding and Transfer-Encoding have been marked as
|
|
|
|
|
experimental and disabled by default
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jan 20 16:00:51 UTC 2018
|
|
|
|
|
patches/packages/mozilla-firefox-52.6.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
Specifically, this update contains performance.now() mitigations for Spectre.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/wget-1.19.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes various non-security bugs, including this one:
|
|
|
|
|
Prevent erroneous decompression of .gz and .tgz files with broken servers.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 17 21:36:23 UTC 2018
|
|
|
|
|
patches/packages/bind-9.10.6_P1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a high severity security issue:
|
|
|
|
|
Improper sequencing during cleanup can lead to a use-after-free error,
|
|
|
|
|
triggering an assertion failure and crash in named.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01542
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jan 15 23:13:01 UTC 2018
|
|
|
|
|
patches/packages/linux-4.4.111/*: Upgraded.
|
|
|
|
|
This kernel includes mitigations for the Spectre (variant 2) and Meltdown
|
|
|
|
|
speculative side channel attacks.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jan 9 00:54:19 UTC 2018
|
|
|
|
|
patches/packages/irssi-1.0.6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes multiple security vulnerabilities.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2018_01.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5205
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5206
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5207
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5208
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Dec 29 23:09:14 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-52.5.3esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Dec 25 00:00:16 UTC 2017
|
|
|
|
|
patches/packages/xscreensaver-5.38-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Here's an upgrade to the latest xscreensaver.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Dec 22 21:49:01 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.5.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/en-US/thunderbird/52.5.2/releasenotes/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 20 03:05:58 UTC 2017
|
|
|
|
|
patches/packages/ruby-2.2.9-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile
|
|
|
|
|
use Kernel#open to open a local file. If the localfile argument starts with
|
|
|
|
|
the pipe character "|", the command following the pipe character is executed.
|
|
|
|
|
The default value of localfile is File.basename(remotefile), so malicious FTP
|
|
|
|
|
servers could cause arbitrary command execution.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Dec 9 00:02:28 UTC 2017
|
|
|
|
|
patches/packages/openssl-1.0.2n-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
Read/write after SSL object in error state
|
|
|
|
|
rsaz_1024_mul_avx2 overflow bug on x86_64
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20171207.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2n-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Dec 8 05:54:21 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-52.5.2esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Dec 2 20:32:45 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-52.5.1esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Nov 29 21:48:33 UTC 2017
|
|
|
|
|
patches/packages/curl-7.57.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
SSL out of buffer access
|
|
|
|
|
FTP wildcard out of bounds read
|
|
|
|
|
NTLM buffer overflow via integer overflow
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_2017-af0a.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818
|
|
|
|
|
https://curl.haxx.se/docs/adv_2017-ae72.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
|
|
|
|
|
https://curl.haxx.se/docs/adv_2017-12e7.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Nov 29 08:15:09 UTC 2017
|
|
|
|
|
patches/packages/libXcursor-1.1.15-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix heap overflows when parsing malicious files. (CVE-2017-16612)
|
|
|
|
|
It is possible to trigger heap overflows due to an integer overflow
|
|
|
|
|
while parsing images and a signedness issue while parsing comments.
|
|
|
|
|
The integer overflow occurs because the chosen limit 0x10000 for
|
|
|
|
|
dimensions is too large for 32 bit systems, because each pixel takes
|
|
|
|
|
4 bytes. Properly chosen values allow an overflow which in turn will
|
|
|
|
|
lead to less allocated memory than needed for subsequent reads.
|
|
|
|
|
The signedness bug is triggered by reading the length of a comment
|
|
|
|
|
as unsigned int, but casting it to int when calling the function
|
|
|
|
|
XcursorCommentCreate. Turning length into a negative value allows the
|
|
|
|
|
check against XCURSOR_COMMENT_MAX_LEN to pass, and the following
|
|
|
|
|
addition of sizeof (XcursorComment) + 1 makes it possible to allocate
|
|
|
|
|
less memory than needed for subsequent reads.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXfont-1.5.1-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Open files with O_NOFOLLOW. (CVE-2017-16611)
|
|
|
|
|
A non-privileged X client can instruct X server running under root
|
|
|
|
|
to open any file by creating own directory with "fonts.dir",
|
|
|
|
|
"fonts.alias" or any font file being a symbolic link to any other
|
|
|
|
|
file in the system. X server will then open it. This can be issue
|
|
|
|
|
with special files such as /dev/watchdog (which could then reboot
|
|
|
|
|
the system).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 28 06:20:03 UTC 2017
|
|
|
|
|
patches/packages/samba-4.4.16-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
This is a security update in order to patch the following defects:
|
|
|
|
|
CVE-2017-14746 (Use-after-free vulnerability.)
|
|
|
|
|
All versions of Samba from 4.0.0 onwards are vulnerable to a use after
|
|
|
|
|
free vulnerability, where a malicious SMB1 request can be used to
|
|
|
|
|
control the contents of heap memory via a deallocated heap pointer. It
|
|
|
|
|
is possible this may be used to compromise the SMB server.
|
|
|
|
|
CVE-2017-15275 (Server heap memory information leak.)
|
|
|
|
|
All versions of Samba from 3.6.0 onwards are vulnerable to a heap
|
|
|
|
|
memory information leak, where server allocated heap memory may be
|
|
|
|
|
returned to the client without being cleared.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-14746.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-15275.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Nov 25 07:44:07 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.5.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 21 05:05:41 UTC 2017
|
|
|
|
|
patches/packages/libtiff-4.0.9-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 17 00:56:25 UTC 2017
|
|
|
|
|
patches/packages/libplist-2.0.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6440
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6439
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6438
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6437
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6436
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6435
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5836
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5835
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5834
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5545
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5209
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-firefox-52.5.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 3 03:31:56 UTC 2017
|
|
|
|
|
patches/packages/mariadb-10.0.33-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://jira.mariadb.org/browse/MDEV-13819
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-1.0.2m-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
There is a carry propagating bug in the x64 Montgomery squaring procedure.
|
|
|
|
|
No EC algorithms are affected. Analysis suggests that attacks against RSA
|
|
|
|
|
and DSA as a result of this defect would be very difficult to perform and
|
|
|
|
|
are not believed likely. Attacks against DH are considered just feasible
|
|
|
|
|
(although very difficult) because most of the work necessary to deduce
|
|
|
|
|
information about a private key may be performed offline. The amount of
|
|
|
|
|
resources required for such an attack would be very significant and likely
|
|
|
|
|
only accessible to a limited number of attackers. An attacker would
|
|
|
|
|
additionally need online access to an unpatched system using the target
|
|
|
|
|
private key in a scenario with persistent DH parameters and a private
|
|
|
|
|
key that is shared between multiple clients.
|
|
|
|
|
This only affects processors that support the BMI1, BMI2 and ADX extensions
|
|
|
|
|
like Intel Broadwell (5th generation) and later or AMD Ryzen.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20171102.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2m-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Oct 27 20:34:35 UTC 2017
|
|
|
|
|
patches/packages/NetworkManager-1.8.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update is provided to address issues with wifi scanning when using the
|
|
|
|
|
new wpa_supplicant with certain hardware drivers. If you're not having
|
|
|
|
|
problems, you don't need this update (but it probably won't hurt).
|
|
|
|
|
patches/packages/network-manager-applet-1.8.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package goes along with the optional NetworkManager update.
|
|
|
|
|
patches/packages/php-5.6.32-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Several security bugs were fixed in this release:
|
|
|
|
|
Out of bounds read in timelib_meridian().
|
|
|
|
|
The arcfour encryption stream filter crashes PHP.
|
|
|
|
|
Applied upstream patch for PCRE (CVE-2016-1283).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/wget-1.19.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes stack and heap overflows in in HTTP protocol handling.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Oct 25 19:09:26 UTC 2017
|
|
|
|
|
patches/packages/glibc-zoneinfo-2017c-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
patches/packages/httpd-2.4.29-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/irssi-1.0.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes some remote denial of service issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2017_10.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15228
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15227
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15721
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15723
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15722
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xfce4-weather-plugin-0.8.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This has a bugfix related to setting the location:
|
|
|
|
|
https://bugzilla.xfce.org/show_bug.cgi?id=13877
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Oct 24 05:31:18 UTC 2017
|
|
|
|
|
patches/packages/curl-7.56.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
IMAP FETCH response out of bounds read may cause a crash or information leak.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20171023.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/seamonkey-2.49.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/seamonkey-solibs-2.49.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Oct 18 18:21:18 UTC 2017
|
|
|
|
|
patches/packages/libXres-1.2.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Integer overflows may allow X servers to trigger allocation of insufficient
|
|
|
|
|
memory and a buffer overflow via vectors related to the (1)
|
|
|
|
|
XResQueryClients and (2) XResQueryClientResources functions.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update includes patches to mitigate the WPA2 protocol issues known
|
|
|
|
|
as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data,
|
|
|
|
|
hijack TCP connections, and to forge and inject packets. This is the
|
|
|
|
|
list of vulnerabilities that are addressed here:
|
|
|
|
|
CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the
|
|
|
|
|
4-way handshake.
|
|
|
|
|
CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake.
|
|
|
|
|
CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way
|
|
|
|
|
handshake.
|
|
|
|
|
CVE-2017-13080: Reinstallation of the group key (GTK) in the group key
|
|
|
|
|
handshake.
|
|
|
|
|
CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group
|
|
|
|
|
key handshake.
|
|
|
|
|
CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)
|
|
|
|
|
Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)
|
|
|
|
|
while processing it.
|
|
|
|
|
CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
|
|
|
|
|
CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
|
|
|
|
|
PeerKey (TPK) key in the TDLS handshake.
|
|
|
|
|
CVE-2017-13087: reinstallation of the group key (GTK) when processing a
|
|
|
|
|
Wireless Network Management (WNM) Sleep Mode Response frame.
|
|
|
|
|
CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
|
|
|
|
|
processing a Wireless Network Management (WNM) Sleep Mode Response frame.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.krackattacks.com/
|
|
|
|
|
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xorg-server-1.18.3-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
This update fixes integer overflows and other possible security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xorg-server-xephyr-1.18.3-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xnest-1.18.3-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xvfb-1.18.3-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Oct 7 02:53:31 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.4.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Oct 6 06:32:32 UTC 2017
|
|
|
|
|
patches/packages/curl-7.56.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
libcurl may read outside of a heap allocated buffer when doing FTP.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20171004.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openjpeg-2.3.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues which may lead to a denial of service
|
|
|
|
|
or possibly remote code execution.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14164
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xorg-server-1.18.3-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
Xext/shm: Validate shmseg resource id, otherwise it can belong to a
|
|
|
|
|
non-existing client and abort X server with FatalError "client not
|
|
|
|
|
in use", or overwrite existing segment of another existing client.
|
|
|
|
|
Generating strings for XKB data used a single shared static buffer,
|
|
|
|
|
which offered several opportunities for errors. Use a ring of
|
|
|
|
|
resizable buffers instead, to avoid problems when strings end up
|
|
|
|
|
longer than anticipated.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xorg-server-xephyr-1.18.3-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xnest-1.18.3-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xvfb-1.18.3-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Oct 2 17:16:06 UTC 2017
|
|
|
|
|
patches/packages/dnsmasq-2.78-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and remotely exploitable security issues that may
|
|
|
|
|
have impacts including denial of service, information leak, and execution
|
|
|
|
|
of arbitrary code. Thanks to Felix Wilhelm, Fermin J. Serna, Gabriel Campana,
|
|
|
|
|
Kevin Hamacher, Ron Bowes, and Gynvael Coldwind of the Google Security Team.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Oct 1 19:19:08 UTC 2017
|
|
|
|
|
patches/packages/openexr-2.2.0-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Patched bugs that may lead to program crashes or possibly execution of
|
|
|
|
|
arbitrary code. Thanks to Thomas Choi for the patch.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9110
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9112
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9114
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9116
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 28 21:03:26 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-52.4.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 28 05:31:20 UTC 2017
|
|
|
|
|
patches/packages/gegl-0.2.0-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
Patched integer overflows in operations/external/ppm-load.c that could allow
|
|
|
|
|
a denial of service (application crash) or possibly the execution of
|
|
|
|
|
arbitrary code via a large width or height value in a ppm image.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4433
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Sep 23 01:02:32 UTC 2017
|
|
|
|
|
patches/packages/libxml2-2.9.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes some security issues:
|
|
|
|
|
Detect infinite recursion in parameter entities (Nick Wellnhofer),
|
|
|
|
|
Fix handling of parameter-entity references (Nick Wellnhofer),
|
|
|
|
|
Disallow namespace nodes in XPointer ranges (Nick Wellnhofer),
|
|
|
|
|
Fix XPointer paths beginning with range-to (Nick Wellnhofer).
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/python-2.7.14-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Updated to the latest 2.7.x release.
|
|
|
|
|
This fixes some security issues related to the bundled expat library.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 21 01:23:24 UTC 2017
|
|
|
|
|
patches/packages/samba-4.4.16-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a security release in order to address the following defects:
|
|
|
|
|
SMB1/2/3 connections may not require signing where they should. A man in the
|
|
|
|
|
middle attack may hijack client connections.
|
|
|
|
|
SMB3 connections don't keep encryption across DFS redirects. A man in the
|
|
|
|
|
middle attack can read and may alter confidential documents transferred via
|
|
|
|
|
a client connection, which are reached via DFS redirect when the original
|
|
|
|
|
connection used SMB3.
|
|
|
|
|
Server memory information leak over SMB1. Client with write access to a share
|
|
|
|
|
can cause server memory contents to be written into a file or printer.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-12150.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-12151.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-12163.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Sep 18 19:15:03 UTC 2017
|
|
|
|
|
patches/packages/httpd-2.4.27-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
This update patches a security issue ("Optionsbleed") with the OPTIONS http
|
|
|
|
|
method which may leak arbitrary pieces of memory to a potential attacker.
|
|
|
|
|
Thanks to Hanno Bo:ck.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://seclists.org/oss-sec/2017/q3/477
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libgcrypt-1.7.9-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Mitigate a local side-channel attack on Curve25519 dubbed "May
|
|
|
|
|
the Fourth be With You".
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://eprint.iacr.org/2017/806
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/ruby-2.2.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release includes several security fixes.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Sep 15 17:31:57 UTC 2017
|
|
|
|
|
patches/packages/bluez-5.47-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed an information disclosure vulnerability which allows remote attackers
|
|
|
|
|
to obtain sensitive information from the bluetoothd process memory. This
|
|
|
|
|
vulnerability lies in the processing of SDP search attribute requests.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/linux-4.4.88/*: Upgraded.
|
|
|
|
|
This update fixes the security vulnerability known as "BlueBorne".
|
|
|
|
|
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at
|
|
|
|
|
Linux kernel version 3.3-rc1 is vulnerable to a stack overflow in
|
|
|
|
|
the processing of L2CAP configuration responses resulting in remote
|
|
|
|
|
code execution in kernel space.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
|
|
|
|
|
https://www.armis.com/blueborne
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 12 22:18:51 UTC 2017
|
|
|
|
|
patches/packages/emacs-25.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security vulnerability in Emacs. Gnus no longer
|
|
|
|
|
supports "richtext" and "enriched" inline MIME objects. This support
|
|
|
|
|
was disabled to avoid evaluation of arbitrary Lisp code contained in
|
|
|
|
|
email messages and news articles.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://seclists.org/oss-sec/2017/q3/422
|
|
|
|
|
https://bugs.gnu.org/28350
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libzip-1.0.1-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fix a denial of service security issue.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14107
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Sep 8 17:56:01 UTC 2017
|
|
|
|
|
patches/packages/bash-4.3.048-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues found in bash before 4.4:
|
|
|
|
|
The expansion of '\h' in the prompt string allows remote authenticated users
|
|
|
|
|
to execute arbitrary code via shell metacharacters placed in 'hostname' of a
|
|
|
|
|
machine. The theoretical attack vector is a hostile DHCP server providing a
|
|
|
|
|
crafted hostname, but this is unlikely to occur in a normal Slackware
|
|
|
|
|
configuration as we ignore the hostname provided by DHCP.
|
|
|
|
|
Specially crafted SHELLOPTS+PS4 environment variables used against bogus
|
|
|
|
|
setuid binaries using system()/popen() allowed local attackers to execute
|
|
|
|
|
arbitrary code as root.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mariadb-10.0.32-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-nss-3.31.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.31.1 and nspr-4.16.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/tcpdump-4.9.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and many security issues (see the included
|
|
|
|
|
CHANGES file).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Aug 17 05:36:28 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.3.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Aug 15 22:16:12 UTC 2017
|
|
|
|
|
patches/packages/xorg-server-1.18.3-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
A user authenticated to an X Session could crash or execute code in the
|
|
|
|
|
context of the X Server by exploiting a stack overflow in the endianness
|
|
|
|
|
conversion of X Events.
|
|
|
|
|
Uninitialized data in endianness conversion in the XEvent handling of the
|
|
|
|
|
X.Org X Server allowed authenticated malicious users to access potentially
|
|
|
|
|
privileged data from the X server.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xorg-server-xephyr-1.18.3-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xnest-1.18.3-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xorg-server-xvfb-1.18.3-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Aug 11 23:02:43 UTC 2017
|
|
|
|
|
patches/packages/git-2.14.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixes security issues:
|
|
|
|
|
A "ssh://..." URL can result in a "ssh" command line with a hostname that
|
|
|
|
|
begins with a dash "-", which would cause the "ssh" command to instead
|
|
|
|
|
(mis)treat it as an option. This is now prevented by forbidding such a
|
|
|
|
|
hostname (which should not impact any real-world usage).
|
|
|
|
|
Similarly, when GIT_PROXY_COMMAND is configured, the command is run with
|
|
|
|
|
host and port that are parsed out from "ssh://..." URL; a poorly written
|
|
|
|
|
GIT_PROXY_COMMAND could be tricked into treating a string that begins with a
|
|
|
|
|
dash "-" as an option. This is now prevented by forbidding such a hostname
|
|
|
|
|
and port number (again, which should not impact any real-world usage).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libsoup-2.52.2-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed a chunked decoding buffer overrun that could be exploited against
|
|
|
|
|
either clients or servers.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mercurial-4.3.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixes security issues:
|
|
|
|
|
Mercurial's symlink auditing was incomplete prior to 4.3, and could
|
|
|
|
|
be abused to write to files outside the repository.
|
|
|
|
|
Mercurial was not sanitizing hostnames passed to ssh, allowing
|
|
|
|
|
shell injection attacks on clients by specifying a hostname starting
|
|
|
|
|
with -oProxyCommand.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000115
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000116
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/subversion-1.9.7-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed client side arbitrary code execution vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://subversion.apache.org/security/CVE-2017-9800-advisory.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Aug 9 20:23:16 UTC 2017
|
|
|
|
|
patches/packages/curl-7.55.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes three security issues:
|
|
|
|
|
URL globbing out of bounds read
|
|
|
|
|
TFTP sends more than buffer size
|
|
|
|
|
FILE buffer read out of bounds
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20170809A.html
|
|
|
|
|
https://curl.haxx.se/docs/adv_20170809B.html
|
|
|
|
|
https://curl.haxx.se/docs/adv_20170809C.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000099
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/glibc-2.23-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed a regression with the recent glibc patch packages:
|
|
|
|
|
Don't clobber the libm.so linker script with a symlink.
|
|
|
|
|
Thanks to guanx.
|
|
|
|
|
patches/packages/glibc-i18n-2.23-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/glibc-profile-2.23-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/glibc-solibs-2.23-x86_64-4_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/mozilla-firefox-52.3.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Aug 2 03:43:51 UTC 2017
|
|
|
|
|
patches/packages/gnupg-1.4.22-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Mitigate a flush+reload side-channel attack on RSA secret keys dubbed
|
|
|
|
|
"Sliding right into disaster".
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://eprint.iacr.org/2017/627
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jul 28 20:29:47 UTC 2017
|
|
|
|
|
patches/packages/squashfs-tools-4.3-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Patched a couple of denial of service issues and other bugs.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4645
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4646
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 27 01:03:02 UTC 2017
|
|
|
|
|
patches/packages/dbus-1.10.8-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Don't demand high-quality entropy from expat-2.2.2+ because 1) dbus doesn't
|
|
|
|
|
need it and 2) it can cause the boot process to hang if dbus times out.
|
|
|
|
|
Thanks to SeB for a link to the bug report and patch.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 25 21:09:42 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.5_P3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix a regression in the previous BIND release that broke verification
|
|
|
|
|
of TSIG signed TCP message sequences where not all the messages contain
|
|
|
|
|
TSIG records.
|
|
|
|
|
Compiled to use libidn rather than the deprecated (and broken) idnkit.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jul 24 19:59:34 UTC 2017
|
|
|
|
|
patches/packages/tcpdump-4.9.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes an issue where tcpdump 4.9.0 allows remote attackers
|
|
|
|
|
to cause a denial of service (heap-based buffer over-read and application
|
|
|
|
|
crash) via crafted packet data.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jul 21 20:09:49 UTC 2017
|
|
|
|
|
patches/packages/seamonkey-2.48-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.seamonkey-project.org/releases/seamonkey2.48
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/seamonkey-solibs-2.48-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 18 23:10:25 UTC 2017
|
|
|
|
|
patches/packages/expat-2.2.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixes security issues including:
|
|
|
|
|
External entity infinite loop DoS
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
|
|
|
|
|
https://libexpat.github.io/doc/cve-2017-9233/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/gd-2.2.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixes security issues:
|
|
|
|
|
gdImageCreate() doesn't check for oversized images and as such is prone to
|
|
|
|
|
DoS vulnerabilities. (CVE-2016-9317)
|
|
|
|
|
double-free in gdImageWebPtr() (CVE-2016-6912)
|
|
|
|
|
potential unsigned underflow in gd_interpolation.c (CVE-2016-10166)
|
|
|
|
|
DOS vulnerability in gdImageCreateFromGd2Ctx() (CVE-2016-10167)
|
|
|
|
|
Signed Integer Overflow gd_io.c (CVE-2016-10168)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libtirpc-1.0.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/rpcbind-0.2.4-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed a bug in a previous patch where a svc_freeargs() call ended up freeing
|
|
|
|
|
a static pointer causing rpcbind to crash. Thanks to Jonathan Woithe,
|
|
|
|
|
Rafael Jorge Csura Szendrodi, and Robby Workman for identifying the problem
|
|
|
|
|
and helping to test a fix.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jul 14 22:11:58 UTC 2017
|
|
|
|
|
patches/packages/mariadb-10.0.31-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/samba-4.4.15-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes an authentication validation bypass security issue:
|
|
|
|
|
"Orpheus' Lyre mutual authentication validation bypass"
|
|
|
|
|
All versions of Samba from 4.0.0 onwards using embedded Heimdal
|
|
|
|
|
Kerberos are vulnerable to a man-in-the-middle attack impersonating
|
|
|
|
|
a trusted server, who may gain elevated access to the domain by
|
|
|
|
|
returning malicious replication or authorization data.
|
|
|
|
|
Samba binaries built against MIT Kerberos are not vulnerable.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-11103.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 13 18:19:01 UTC 2017
|
|
|
|
|
patches/packages/httpd-2.4.27-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
Read after free in mod_http2 (CVE-2017-9789)
|
|
|
|
|
Uninitialized memory reflection in mod_auth_digest (CVE-2017-9788)
|
|
|
|
|
Thanks to Robert Swiecki for reporting these issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://httpd.apache.org/security/vulnerabilities_24.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9789
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jul 10 21:43:37 UTC 2017
|
|
|
|
|
patches/packages/libtirpc-1.0.1-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Patched a bug which can cause a denial of service through memory exhaustion.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/rpcbind-0.2.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Patched a bug which can cause a denial of service through memory exhaustion.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Jul 9 20:38:08 UTC 2017
|
|
|
|
|
patches/packages/irssi-1.0.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes two remote crash issues as well as a few bugs.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2017_07.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10965
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10966
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jul 8 00:11:34 UTC 2017
|
|
|
|
|
patches/packages/ca-certificates-20161130-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update provides the latest CA certificates to check for the
|
|
|
|
|
authenticity of SSL connections.
|
|
|
|
|
patches/packages/php-5.6.31-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://php.net/ChangeLog-5.php#5.6.31
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 6 00:57:41 UTC 2017
|
|
|
|
|
patches/packages/glibc-2.23-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Recompiled with upstream patch from git:
|
|
|
|
|
"[PATCH] X86: Don't assert on older Intel CPUs [BZ #20647]"
|
|
|
|
|
This fixes an ldconfig failure on older Intel CPUs including Pentium MMX.
|
|
|
|
|
patches/packages/glibc-i18n-2.23-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/glibc-profile-2.23-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/glibc-solibs-2.23-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/xscreensaver-5.37-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Here's an upgrade to the latest xscreensaver.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 30 21:14:15 UTC 2017
|
|
|
|
|
patches/packages/glibc-2.23-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Applied upstream security hardening patches from git.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://sourceware.org/git/?p=glibc.git;a=commit;h=3c7cd21290cabdadd72984fb69bc51e64ff1002d
|
|
|
|
|
https://sourceware.org/git/?p=glibc.git;a=commit;h=46703a3995aa3ca2b816814aa4ad05ed524194dd
|
|
|
|
|
https://sourceware.org/git/?p=glibc.git;a=commit;h=c69d4a0f680a24fdbe323764a50382ad324041e9
|
|
|
|
|
https://sourceware.org/git/?p=glibc.git;a=commit;h=3776f38fcd267c127ba5eb222e2c614c191744aa
|
|
|
|
|
https://sourceware.org/git/?p=glibc.git;a=commit;h=adc7e06fb412a2a1ee52f8cb788caf436335b9f3
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/glibc-i18n-2.23-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
patches/packages/glibc-profile-2.23-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/glibc-solibs-2.23-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/linux-4.4.75/*: Upgraded.
|
|
|
|
|
This kernel fixes security issues that include possible stack exhaustion,
|
|
|
|
|
memory corruption, and arbitrary code execution.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 29 20:55:09 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.5_P2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a high severity security issue:
|
|
|
|
|
An error in TSIG handling could permit unauthorized zone transfers
|
|
|
|
|
or zone updates.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01503/0
|
|
|
|
|
https://kb.isc.org/article/AA-01504/0
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/httpd-2.4.26-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues which may lead to an authentication bypass
|
|
|
|
|
or a denial of service:
|
|
|
|
|
important: ap_get_basic_auth_pw() Authentication Bypass CVE-2017-3167
|
|
|
|
|
important: mod_ssl Null Pointer Dereference CVE-2017-3169
|
|
|
|
|
important: mod_http2 Null Pointer Dereference CVE-2017-7659
|
|
|
|
|
important: ap_find_token() Buffer Overread CVE-2017-7668
|
|
|
|
|
important: mod_mime Buffer Overread CVE-2017-7679
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libgcrypt-1.7.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Mitigate a local flush+reload side-channel attack on RSA secret keys
|
|
|
|
|
dubbed "Sliding right into disaster".
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://eprint.iacr.org/2017/627
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mkinitrd-1.4.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Added support for -P option and MICROCODE_ARCH in mkinitrd.conf to specify
|
|
|
|
|
a microcode archive to be prepended to the initrd for early CPU microcode
|
|
|
|
|
patching by the kernel. Thanks to SeB.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jun 26 20:36:18 UTC 2017
|
|
|
|
|
patches/packages/linux-4.4.74/*: Upgraded.
|
|
|
|
|
This kernel fixes two "Stack Clash" vulnerabilities reported by Qualys.
|
|
|
|
|
The first issue may allow attackers to execute arbitrary code with elevated
|
|
|
|
|
privileges. Failed attack attempts will likely result in denial-of-service
|
|
|
|
|
conditions. The second issue can be exploited to bypass certain security
|
|
|
|
|
restrictions and perform unauthorized actions.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.2.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 23 20:11:00 UTC 2017
|
|
|
|
|
patches/packages/nasm-2.13.01-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update is needed for some newer projects to compile properly.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 21 18:38:46 UTC 2017
|
|
|
|
|
patches/packages/openvpn-2.3.17-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes several denial of service issues discovered
|
|
|
|
|
by Guido Vranken.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7512
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 15 02:08:28 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.5_P1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed denial of service security issue:
|
|
|
|
|
Some RPZ configurations could go into an infinite query loop when
|
|
|
|
|
encountering responses with TTL=0.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01495
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-firefox-52.2.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.2.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 13 19:54:24 UTC 2017
|
|
|
|
|
patches/packages/pkg-config-0.29.2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release, and is needed for some updates on slackbuilds.org
|
|
|
|
|
to compile properly. Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 7 22:42:04 UTC 2017
|
|
|
|
|
patches/packages/irssi-1.0.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed security issues that may result in a denial of service.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2017_06.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9468
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9469
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 31 23:07:23 UTC 2017
|
|
|
|
|
patches/packages/sudo-1.8.20p2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release:
|
|
|
|
|
Fixed a bug parsing /proc/pid/stat when the process name contains
|
|
|
|
|
a newline. This is not exploitable due to the /dev traversal changes
|
|
|
|
|
made in sudo 1.8.20p1.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 30 17:39:17 UTC 2017
|
|
|
|
|
patches/packages/lynx-2.8.8rel.2-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed lynx startup without a URL by correcting STARTFILE in lynx.cfg to use
|
|
|
|
|
the new URL for the Lynx homepage. Thanks to John David Yost.
|
|
|
|
|
patches/packages/sudo-1.8.20p1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a potential overwrite of arbitrary system files.
|
|
|
|
|
This bug was discovered and analyzed by Qualys, Inc.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.sudo.ws/alerts/linux_tty.html
|
|
|
|
|
http://www.openwall.com/lists/oss-security/2017/05/30/16
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 24 19:38:59 UTC 2017
|
|
|
|
|
patches/packages/samba-4.4.14-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a remote code execution vulnerability, allowing a
|
|
|
|
|
malicious client to upload a shared library to a writable share, and
|
|
|
|
|
then cause the server to load and execute it.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.samba.org/samba/security/CVE-2017-7494.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon May 22 20:58:20 UTC 2017
|
|
|
|
|
patches/packages/gkrellm-2.3.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release to fix a broken gkrellm.pc.
|
|
|
|
|
patches/packages/mozilla-firefox-52.1.2esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 16 20:11:03 UTC 2017
|
|
|
|
|
patches/packages/freetype-2.6.3-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
This update fixes an out-of-bounds write caused by a heap-based buffer
|
|
|
|
|
overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/kdelibs-4.14.32-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue with KAuth that can lead to gaining
|
|
|
|
|
root from an unprivileged account.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openwall.com/lists/oss-security/2017/05/10/3
|
|
|
|
|
https://www.kde.org/info/security/advisory-20170510-1.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.1.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon May 1 23:31:02 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.1.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
patches/packages/rxvt-2.7.10-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
Patched an integer overflow that can crash rxvt with an escape sequence,
|
|
|
|
|
or possibly have unspecified other impact.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7483
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 26 23:09:45 UTC 2017
|
|
|
|
|
patches/packages/xfce4-weather-plugin-0.8.9-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Package upgraded to fix the API used to fetch weather data.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Apr 24 18:06:06 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-52.1.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 21 22:40:12 UTC 2017
|
|
|
|
|
patches/packages/getmail-4.54.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release to fix a failure to retrieve HTML formatted emails
|
|
|
|
|
that contain a line longer than 1024 characters. Thanks to Edward Trumbo.
|
|
|
|
|
patches/packages/ntp-4.2.8p10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes security
|
|
|
|
|
issues of medium and low severity:
|
|
|
|
|
Denial of Service via Malformed Config (Medium)
|
|
|
|
|
Authenticated DoS via Malicious Config Option (Medium)
|
|
|
|
|
Potential Overflows in ctl_put() functions (Medium)
|
|
|
|
|
Buffer Overflow in ntpq when fetching reslist from a malicious ntpd (Medium)
|
|
|
|
|
0rigin DoS (Medium)
|
|
|
|
|
Buffer Overflow in DPTS Clock (Low)
|
|
|
|
|
Improper use of snprintf() in mx4200_send() (Low)
|
|
|
|
|
The following issues do not apply to Linux systems:
|
|
|
|
|
Privileged execution of User Library code (WINDOWS PPSAPI ONLY) (Low)
|
|
|
|
|
Stack Buffer Overflow from Command Line (WINDOWS installer ONLY) (Low)
|
|
|
|
|
Data Structure terminated insufficiently (WINDOWS installer ONLY) (Low)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6455
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6452
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6459
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/proftpd-1.3.5e-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes a security issue:
|
|
|
|
|
AllowChrootSymlinks off does not check entire DefaultRoot path for symlinks.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 19 04:46:45 UTC 2017
|
|
|
|
|
patches/packages/minicom-2.7.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix an out of bounds data access that can lead to remote code execution.
|
|
|
|
|
This issue was found by Solar Designer of Openwall during a security audit
|
|
|
|
|
of the Virtuozzo 7 product, which contains derived downstream code in its
|
|
|
|
|
prl-vzvncserver component.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Apr 18 04:21:33 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.0.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Apr 13 21:19:45 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.4_P8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed denial of service security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01465
|
|
|
|
|
https://kb.isc.org/article/AA-01466
|
|
|
|
|
https://kb.isc.org/article/AA-01471
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 8 16:24:35 UTC 2017
|
|
|
|
|
patches/packages/libtiff-4.0.7-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-52.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 1 05:16:59 UTC 2017
|
|
|
|
|
patches/packages/samba-4.4.13-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bug fix release to address a regression introduced by the security
|
|
|
|
|
fixes for CVE-2017-2619 (Symlink race allows access outside share definition).
|
|
|
|
|
Please see https://bugzilla.samba.org/show_bug.cgi?id=12721 for details.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Mar 28 20:30:50 UTC 2017
|
|
|
|
|
patches/packages/mariadb-10.0.30-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
Crash in libmysqlclient.so.
|
|
|
|
|
Difficult to exploit vulnerability allows low privileged attacker with
|
|
|
|
|
logon to compromise the server. Successful attacks of this vulnerability
|
|
|
|
|
can result in unauthorized access to data.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-firefox-52.0.2esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Upgraded to new Firefox 52.x ESR branch.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 23 21:38:23 UTC 2017
|
|
|
|
|
patches/packages/glibc-zoneinfo-2017b-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
patches/packages/mcabber-1.0.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
An incorrect implementation of XEP-0280: Message Carbons in multiple XMPP
|
|
|
|
|
clients allows a remote attacker to impersonate any user, including
|
|
|
|
|
contacts, in the vulnerable application's display. This allows for various
|
|
|
|
|
kinds of social engineering attacks.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5604
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/samba-4.4.12-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
|
|
|
|
|
a malicious client using a symlink race to allow access to areas of
|
|
|
|
|
the server file system not exported under the share definition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 16 01:37:05 UTC 2017
|
|
|
|
|
patches/packages/pidgin-2.12.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a minor security issue (out of bounds memory read in
|
|
|
|
|
purple_markup_unescape_entity).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Mar 8 00:17:36 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-45.8.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.8.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Mar 1 19:09:44 UTC 2017
|
|
|
|
|
patches/packages/libcgroup-0.41-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
This is a bugfix package update.
|
|
|
|
|
Fixed rc.cgred to source the correct config file.
|
|
|
|
|
Don't remove the entire cgroup file system with "rc.cgconfig stop".
|
|
|
|
|
Thanks to chris.willing.
|
|
|
|
|
NOTE: Be sure to install any .new config files.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Feb 28 23:51:55 UTC 2017
|
|
|
|
|
patches/packages/glibc-zoneinfo-2017a-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Feb 10 21:07:35 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.4_P6-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a denial-of-service vulnerability. Under some conditions
|
|
|
|
|
when using both DNS64 and RPZ to rewrite query responses, query processing
|
|
|
|
|
can resume in an inconsistent state leading to either an INSIST assertion
|
|
|
|
|
failure or an attempt to read through a NULL pointer.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01453
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libpcap-1.8.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update is required for the new version of tcpdump.
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.7.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed crash when viewing certain IMAP messages (introduced in 45.7.0)
|
|
|
|
|
patches/packages/openssl-1.0.2k-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes security issues:
|
|
|
|
|
Truncated packet could crash via OOB read (CVE-2017-3731)
|
|
|
|
|
BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
|
|
|
|
|
Montgomery multiplication may produce incorrect results (CVE-2016-7055)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20170126.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
patches/packages/php-5.6.30-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://php.net/ChangeLog-5.php#5.6.30
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/tcpdump-4.9.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed bugs which allow an attacker to crash tcpdump (denial of service).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jan 26 18:42:29 UTC 2017
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.7.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jan 23 21:30:13 UTC 2017
|
|
|
|
|
patches/packages/mozilla-firefox-45.7.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jan 20 04:18:02 UTC 2017
|
|
|
|
|
patches/packages/seamonkey-2.46-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Recompiled with less aggressive optimization (-Os) to fix crashes.
|
|
|
|
|
patches/packages/seamonkey-solibs-2.46-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 18 20:39:17 UTC 2017
|
|
|
|
|
patches/packages/mariadb-10.0.29-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 18 01:02:19 UTC 2017
|
|
|
|
|
patches/packages/seamonkey-2.46-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Restored missing nspr/obsolete headers.
|
|
|
|
|
patches/packages/seamonkey-solibs-2.46-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jan 14 05:34:32 UTC 2017
|
|
|
|
|
patches/packages/scim-1.4.17-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is a bugfix package update.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jan 12 01:15:52 UTC 2017
|
|
|
|
|
patches/packages/bind-9.10.4_P5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a denial-of-service vulnerability. An error in handling
|
|
|
|
|
certain queries can cause an assertion failure when a server is using the
|
|
|
|
|
nxdomain-redirect feature to cover a zone for which it is also providing
|
|
|
|
|
authoritative service. A vulnerable server could be intentionally stopped
|
|
|
|
|
by an attacker if it was using a configuration that met the criteria for
|
|
|
|
|
the vulnerability and if the attacker could cause it to accept a query
|
|
|
|
|
that possessed the required attributes.
|
|
|
|
|
Please note: This vulnerability affects the "nxdomain-redirect" feature,
|
|
|
|
|
which is one of two methods of handling NXDOMAIN redirection, and is only
|
|
|
|
|
available in certain versions of BIND. Redirection using zones of type
|
|
|
|
|
"redirect" is not affected by this vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01442
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9778
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/gnutls-3.5.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://gnutls.org/security.html#GNUTLS-SA-2017-1
|
|
|
|
|
https://gnutls.org/security.html#GNUTLS-SA-2017-2
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/irssi-0.8.21-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed security issues that may result in a denial of service.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2017_01.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/python-2.7.13-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
This is a rebuilt package to fix a build-time regression with the
|
|
|
|
|
multiprocessing.synchronize module.
|
|
|
|
|
Thanks to Damien Goutte-Gattat for the bug report.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Dec 30 19:29:13 UTC 2016
|
|
|
|
|
patches/packages/libpng-1.6.27-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes an old NULL pointer dereference bug in png_set_text_2()
|
|
|
|
|
discovered and patched by Patrick Keshishian. The potential "NULL
|
|
|
|
|
dereference" bug has existed in libpng since version 0.71 of June 26, 1995.
|
|
|
|
|
To be vulnerable, an application has to load a text chunk into the png
|
|
|
|
|
structure, then delete all text, then add another text chunk to the same
|
|
|
|
|
png structure, which seems to be an unlikely sequence, but it has happened.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.6.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/seamonkey-2.46-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.seamonkey-project.org/releases/seamonkey2.46
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/seamonkey-solibs-2.46-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 28 21:05:19 UTC 2016
|
|
|
|
|
patches/packages/python-2.7.13-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes security issues:
|
|
|
|
|
Issue #27850: Remove 3DES from ssl module's default cipher list to counter
|
|
|
|
|
measure sweet32 attack (CVE-2016-2183).
|
|
|
|
|
Issue #27568: Prevent HTTPoxy attack (CVE-2016-1000110). Ignore the
|
|
|
|
|
HTTP_PROXY variable when REQUEST_METHOD environment is set, which indicates
|
|
|
|
|
that the script is in CGI mode.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/samba-4.4.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes security issues:
|
|
|
|
|
CVE-2016-2123 (Samba NDR Parsing ndr_pull_dnsp_name Heap-based Buffer
|
|
|
|
|
Overflow Remote Code Execution Vulnerability).
|
|
|
|
|
CVE-2016-2125 (Unconditional privilege delegation to Kerberos servers
|
|
|
|
|
in trusted realms).
|
|
|
|
|
CVE-2016-2126 (Flaws in Kerberos PAC validation can trigger privilege
|
|
|
|
|
elevation).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Dec 24 18:14:51 UTC 2016
|
|
|
|
|
patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues:
|
|
|
|
|
Multiple integer overflows in XML_GetBuffer.
|
|
|
|
|
Fix crash on malformed input.
|
|
|
|
|
Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716.
|
|
|
|
|
Use more entropy for hash initialization.
|
|
|
|
|
Resolve troublesome internal call to srand.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Dec 24 02:36:05 UTC 2016
|
|
|
|
|
patches/packages/httpd-2.4.25-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
* CVE-2016-8740: mod_http2: Mitigate DoS memory exhaustion via endless
|
|
|
|
|
CONTINUATION frames.
|
|
|
|
|
* CVE-2016-5387: core: Mitigate [f]cgi "httpoxy" issues.
|
|
|
|
|
* CVE-2016-2161: mod_auth_digest: Prevent segfaults during client entry
|
|
|
|
|
allocation when the shared memory space is exhausted.
|
|
|
|
|
* CVE-2016-0736: mod_session_crypto: Authenticate the session data/cookie
|
|
|
|
|
with a MAC (SipHash) to prevent deciphering or tampering with a padding
|
|
|
|
|
oracle attack.
|
|
|
|
|
* CVE-2016-8743: Enforce HTTP request grammar corresponding to RFC7230 for
|
|
|
|
|
request lines and request headers, to prevent response splitting and
|
|
|
|
|
cache pollution by malicious clients or downstream proxies.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssh-7.4p1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is primarily a bugfix release, and also addresses security issues.
|
|
|
|
|
ssh-agent(1): Will now refuse to load PKCS#11 modules from paths outside
|
|
|
|
|
a trusted whitelist.
|
|
|
|
|
sshd(8): When privilege separation is disabled, forwarded Unix-domain
|
|
|
|
|
sockets would be created by sshd(8) with the privileges of 'root'.
|
|
|
|
|
sshd(8): Avoid theoretical leak of host private key material to
|
|
|
|
|
privilege-separated child processes via realloc().
|
|
|
|
|
sshd(8): The shared memory manager used by pre-authentication compression
|
|
|
|
|
support had a bounds checks that could be elided by some optimising
|
|
|
|
|
compilers to potentially allow attacks against the privileged monitor.
|
|
|
|
|
process from the sandboxed privilege-separation process.
|
|
|
|
|
sshd(8): Validate address ranges for AllowUser and DenyUsers directives at
|
|
|
|
|
configuration load time and refuse to accept invalid ones. It was
|
|
|
|
|
previously possible to specify invalid CIDR address ranges
|
|
|
|
|
(e.g. user@127.1.2.3/55) and these would always match, possibly resulting
|
|
|
|
|
in granting access where it was not intended.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssh.com/txt/release-7.4
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xfce4-weather-plugin-0.8.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Package upgraded to fix the API used to fetch weather data.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Dec 18 05:20:25 UTC 2016
|
|
|
|
|
patches/packages/glibc-zoneinfo-2016j-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Dec 13 22:14:13 UTC 2016
|
|
|
|
|
patches/packages/mozilla-firefox-45.6.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Dec 12 21:25:50 UTC 2016
|
|
|
|
|
patches/packages/linux-4.4.38/*: Upgraded.
|
|
|
|
|
This kernel fixes a security issue with a race condition in
|
|
|
|
|
net/packet/af_packet.c that can be exploited to gain kernel code execution
|
|
|
|
|
from unprivileged processes.
|
|
|
|
|
Thanks to Philip Pettersson for discovering the bug and providing a patch.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/loudmouth-1.5.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update is needed for the mcabber security update.
|
|
|
|
|
patches/packages/mcabber-1.0.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue which can lead to a malicious actor
|
|
|
|
|
MITMing a conversation, or adding themselves as an entity on a third
|
|
|
|
|
parties roster (thereby granting themselves the associated priviledges
|
|
|
|
|
such as observing when the user is online).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://gultsch.de/gajim_roster_push_and_message_interception.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/php-5.6.29-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://php.net/ChangeLog-5.php#5.6.29
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Dec 1 08:49:20 UTC 2016
|
|
|
|
|
patches/packages/intltool-0.51.0-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
|
|
|
|
|
possible build failures when intltool is used with automake >= 1.15.
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
patches/packages/mozilla-firefox-45.5.1esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.5.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Nov 21 19:21:22 UTC 2016
|
|
|
|
|
patches/packages/ntp-4.2.8p9-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes the
|
|
|
|
|
following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
|
|
|
|
|
5 low-severity vulnerabilities, and provides 28 other non-security
|
|
|
|
|
fixes and improvements.
|
|
|
|
|
CVE-2016-9311: Trap crash
|
|
|
|
|
CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
|
|
|
|
|
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
|
|
|
|
|
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
|
|
|
|
|
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
|
|
|
|
|
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
|
|
|
|
|
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
|
|
|
|
|
CVE-2016-7429: Interface selection attack
|
|
|
|
|
CVE-2016-7426: Client rate limiting and server responses
|
|
|
|
|
CVE-2016-7433: Reboot sync calculation problem
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.kb.cert.org/vuls/id/633847
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 18 22:49:40 UTC 2016
|
|
|
|
|
patches/packages/mozilla-firefox-45.5.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 4 03:31:38 UTC 2016
|
|
|
|
|
patches/packages/bind-9.10.4_P4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a denial-of-service vulnerability. A defect in BIND's
|
|
|
|
|
handling of responses containing a DNAME answer can cause a resolver to exit
|
|
|
|
|
after encountering an assertion failure in db.c or resolver.c. A server
|
|
|
|
|
encountering either of these error conditions will stop, resulting in denial
|
|
|
|
|
of service to clients. The risk to authoritative servers is minimal;
|
|
|
|
|
recursive servers are chiefly at risk.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01434
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/curl-7.51.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes security issues:
|
|
|
|
|
CVE-2016-8615: cookie injection for other servers
|
|
|
|
|
CVE-2016-8616: case insensitive password comparison
|
|
|
|
|
CVE-2016-8617: OOB write via unchecked multiplication
|
|
|
|
|
CVE-2016-8618: double-free in curl_maprintf
|
|
|
|
|
CVE-2016-8619: double-free in krb5 code
|
|
|
|
|
CVE-2016-8620: glob parser write/read out of bounds
|
|
|
|
|
CVE-2016-8621: curl_getdate read out of bounds
|
|
|
|
|
CVE-2016-8622: URL unescape heap overflow via integer truncation
|
|
|
|
|
CVE-2016-8623: Use-after-free via shared cookies
|
|
|
|
|
CVE-2016-8624: invalid URL parsing with '#'
|
|
|
|
|
CVE-2016-8625: IDNA 2003 makes curl use wrong host
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102A.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102B.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102C.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102D.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102E.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102F.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102G.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102H.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102I.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102J.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
|
|
|
|
|
https://curl.haxx.se/docs/adv_20161102K.html
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/glibc-zoneinfo-2016i-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Oct 31 23:38:24 UTC 2016
|
|
|
|
|
patches/packages/libX11-1.6.4-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory read in XGetImage() or write in XListFonts().
|
|
|
|
|
Affected versions libX11 <= 1.6.3.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXfixes-5.0.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause an integer
|
|
|
|
|
overflow on 32 bit architectures.
|
|
|
|
|
Affected versions : libXfixes <= 5.0.2.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXi-1.7.8-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory access or endless loops (Denial of Service).
|
|
|
|
|
Affected versions libXi <= 1.7.6.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXrandr-1.5.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory writes.
|
|
|
|
|
Affected versions: libXrandr <= 1.5.0.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXrender-0.9.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory writes.
|
|
|
|
|
Affected version: libXrender <= 0.9.9.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXtst-1.2.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory access or endless loops (Denial of Service).
|
|
|
|
|
Affected version libXtst <= 1.2.2.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXv-1.0.11-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause out of boundary
|
|
|
|
|
memory and memory corruption.
|
|
|
|
|
Affected version libXv <= 1.0.10.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/libXvMC-1.0.10-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Insufficient validation of data from the X server can cause a one byte buffer
|
|
|
|
|
read underrun.
|
|
|
|
|
Affected version: libXvMC <= 1.0.9.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/linux-4.4.29/*: Upgraded.
|
|
|
|
|
This kernel fixes a security issue known as "Dirty COW". A race condition
|
|
|
|
|
was found in the way the Linux kernel's memory subsystem handled the
|
|
|
|
|
copy-on-write (COW) breakage of private read-only memory mappings. An
|
|
|
|
|
unprivileged local user could use this flaw to gain write access to
|
|
|
|
|
otherwise read-only memory mappings and thus increase their privileges on
|
|
|
|
|
the system.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://dirtycow.ninja/
|
|
|
|
|
https://www.kb.cert.org/vuls/id/243144
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mariadb-10.0.28-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/php-5.6.27-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://php.net/ChangeLog-5.php#5.6.27
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/xscreensaver-5.36-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Here's an upgrade to the latest xscreensaver.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Oct 1 17:11:13 UTC 2016
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.4.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 28 23:24:37 UTC 2016
|
|
|
|
|
patches/packages/glibc-zoneinfo-2016g-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 27 19:16:56 UTC 2016
|
|
|
|
|
patches/packages/bind-9.10.4_P3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a denial-of-service vulnerability. Testing by ISC has
|
|
|
|
|
uncovered a critical error condition which can occur when a nameserver is
|
|
|
|
|
constructing a response. A defect in the rendering of messages into
|
|
|
|
|
packets can cause named to exit with an assertion failure in buffer.c while
|
|
|
|
|
constructing a response to a query that meets certain criteria.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01419/0
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Sep 26 18:14:08 UTC 2016
|
|
|
|
|
patches/packages/openssl-1.0.2j-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
Missing CRL sanity check (CVE-2016-7052)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20160926.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2j-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Sep 23 23:30:53 UTC 2016
|
|
|
|
|
patches/packages/php-5.6.26-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://php.net/ChangeLog-5.php#5.6.26
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 22 18:38:07 UTC 2016
|
|
|
|
|
patches/packages/openssl-1.0.2i-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes denial-of-service and other security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20160922.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssl-solibs-1.0.2i-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 21 21:10:52 UTC 2016
|
|
|
|
|
patches/packages/irssi-0.8.20-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes two remote crash and heap corruption vulnerabilites
|
|
|
|
|
in Irssi's format parsing code. Impact: Remote crash and heap
|
|
|
|
|
corruption. Remote code execution seems difficult since only Nuls are
|
|
|
|
|
written. Bugs discovered by, and patches provided by Gabriel Campana
|
|
|
|
|
and Adrien Guinet from Quarkslab.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://irssi.org/security/irssi_sa_2016.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 21 15:54:06 UTC 2016
|
|
|
|
|
patches/packages/mozilla-firefox-45.4.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/pidgin-2.11.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.pidgin.im/news/security/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 15 22:54:52 UTC 2016
|
|
|
|
|
patches/packages/curl-7.50.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed heap overflows in four libcurl functions: curl_escape(),
|
|
|
|
|
curl_easy_escape(), curl_unescape() and curl_easy_unescape().
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160914.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 13 18:13:32 UTC 2016
|
|
|
|
|
patches/packages/mariadb-10.0.27-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a critical vulnerability which can allow local and
|
|
|
|
|
remote attackers to inject malicious settings into MySQL configuration
|
|
|
|
|
files (my.cnf). A successful exploitation could allow attackers to
|
|
|
|
|
execute arbitrary code with root privileges which would then allow them
|
|
|
|
|
to fully compromise the server.
|
|
|
|
|
This issue was discovered and reported by Dawid Golunski.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
|
|
|
|
|
https://jira.mariadb.org/browse/MDEV-10465
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Sep 12 18:39:03 UTC 2016
|
|
|
|
|
patches/packages/sdl-1.2.15-x86_64-5_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed a regression that broke MOD support. Thanks to B Watson.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Sep 10 18:04:42 UTC 2016
|
|
|
|
|
patches/packages/gnutls-3.4.15-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
|
|
|
|
|
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/gtk+2-2.24.31-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue: Integer overflow in the
|
|
|
|
|
gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
|
|
|
|
|
attackers to cause a denial of service (crash) via a large image file,
|
|
|
|
|
which triggers a large memory allocation.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 8 21:35:02 UTC 2016
|
|
|
|
|
patches/packages/php-5.6.25-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.25
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Aug 31 20:43:10 UTC 2016
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.3.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Aug 23 19:45:33 UTC 2016
|
|
|
|
|
patches/packages/gnupg-1.4.21-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
|
|
|
|
|
obtains 580 bytes from the standard RNG can trivially predict the next
|
|
|
|
|
20 bytes of output. (This is according to the NEWS file included in the
|
|
|
|
|
source. According to the annoucement linked below, an attacker who obtains
|
|
|
|
|
4640 bits from the RNG can trivially predict the next 160 bits of output.)
|
|
|
|
|
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/glib2-2.46.2-x86_64-3_slack14.2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix a use-before-allocate bug in libgio. Without
|
|
|
|
|
this fix, Thunar will crash if $HOME is on an NFS volume.
|
|
|
|
|
Thanks to Jonathan Woithe.
|
|
|
|
|
patches/packages/libgcrypt-1.7.3-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
|
|
|
|
|
obtains 580 bytes from the standard RNG can trivially predict the next
|
|
|
|
|
20 bytes of output. (This is according to the NEWS file included in the
|
|
|
|
|
source. According to the annoucement linked below, an attacker who obtains
|
|
|
|
|
4640 bits from the RNG can trivially predict the next 160 bits of output.)
|
|
|
|
|
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/linux-4.4.19/*: Upgraded.
|
|
|
|
|
A flaw was found in the implementation of the Linux kernels handling of
|
|
|
|
|
networking challenge ack where an attacker is able to determine the shared
|
|
|
|
|
counter. This may allow an attacker located on different subnet to inject
|
|
|
|
|
or take over a TCP connection between a server and client without having to
|
|
|
|
|
be a traditional Man In the Middle (MITM) style attack.
|
|
|
|
|
Be sure to upgrade your initrd after upgrading the kernel packages.
|
|
|
|
|
If you use lilo to boot your machine, be sure lilo.conf points to the correct
|
|
|
|
|
kernel and initrd and run lilo as root to update the bootloader.
|
|
|
|
|
If you use elilo to boot your machine, you should run eliloconfig to copy the
|
|
|
|
|
kernel and initrd to the EFI System Partition.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/screen-4.4.0-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Reverted a change to /etc/screenrc.new that prevented the console from being
|
|
|
|
|
cleared when a screen session was detached. Thanks to Stuart Winter.
|
|
|
|
|
patches/packages/stunnel-5.35-x86_64-2_slack14.2.txz: Rebuilt.
|
|
|
|
|
Fixed incorrect config file name in generate-stunnel-key.sh.
|
|
|
|
|
Thanks to Ebben Aries.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Aug 11 18:55:48 UTC 2016
|
|
|
|
|
patches/packages/glibc-zoneinfo-2016f-noarch-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This package provides the latest timezone updates.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Aug 6 19:29:16 UTC 2016
|
|
|
|
|
patches/packages/curl-7.50.1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes security issues:
|
|
|
|
|
TLS: switch off SSL session id when client cert is used
|
|
|
|
|
TLS: only reuse connections with the same client cert
|
|
|
|
|
curl_multi_cleanup: clear connection pointer for easy handles
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160803A.html
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160803B.html
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160803C.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/mozilla-firefox-45.3.0esr-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/openssh-7.3p1-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This is primarily a bugfix release, and also addresses security issues.
|
|
|
|
|
sshd(8): Mitigate a potential denial-of-service attack against the system's
|
|
|
|
|
crypt(3) function via sshd(8).
|
|
|
|
|
sshd(8): Mitigate timing differences in password authentication that could
|
|
|
|
|
be used to discern valid from invalid account names when long passwords were
|
|
|
|
|
sent and particular password hashing algorithms are in use on the server.
|
|
|
|
|
ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
|
|
|
|
|
countermeasures.
|
|
|
|
|
ssh(1), sshd(8): Improve operation ordering of MAC verification for
|
|
|
|
|
Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
|
|
|
|
|
before decrypting any ciphertext.
|
|
|
|
|
sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openssh.com/txt/release-7.3
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/stunnel-5.35-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixes security issues:
|
|
|
|
|
Fixed malfunctioning "verify = 4".
|
|
|
|
|
Fixed incorrectly enforced client certificate requests.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 28 18:17:17 UTC 2016
|
|
|
|
|
patches/packages/libidn-1.33-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed out-of-bounds read bugs. Fixed crashes on invalid UTF-8.
|
|
|
|
|
Thanks to Hanno Böck.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jul 22 20:51:23 UTC 2016
|
|
|
|
|
patches/packages/bind-9.10.4_P2-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
Fixed a security issue:
|
|
|
|
|
getrrsetbyname with a non absolute name could trigger an infinite
|
|
|
|
|
recursion bug in lwresd and named with lwres configured if when
|
|
|
|
|
combined with a search list entry the resulting name is too long.
|
|
|
|
|
(CVE-2016-2775) [RT #42694]
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 21 23:25:54 UTC 2016
|
|
|
|
|
patches/packages/gimp-2.8.18-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes a security issue:
|
|
|
|
|
Use-after-free vulnerability in the xcf_load_image function in
|
|
|
|
|
app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of
|
|
|
|
|
service (program crash) or possibly execute arbitrary code via a crafted
|
|
|
|
|
XCF file.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
patches/packages/php-5.6.24-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.24
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 7 19:52:36 UTC 2016
|
|
|
|
|
patches/packages/samba-4.4.5-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release fixes a security issue:
|
|
|
|
|
Client side SMB2/3 required signing can be downgraded.
|
|
|
|
|
It's possible for an attacker to downgrade the required signing for an
|
|
|
|
|
SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
|
|
|
|
|
SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can
|
|
|
|
|
impersonate a server being connected to by Samba, and return malicious
|
|
|
|
|
results.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 5 04:52:45 UTC 2016
|
|
|
|
|
patches/packages/mozilla-thunderbird-45.2.0-x86_64-1_slack14.2.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Jun 30 20:26:57 UTC 2016
|
|
|
|
|
Slackware 14.2 x86_64 stable is released!
|
2011-04-25 15:37:00 +02:00
|
|
|
|
|
2016-06-30 22:26:57 +02:00
|
|
|
|
The long development cycle (the Linux community has lately been living in
|
|
|
|
|
"interesting times", as they say) is finally behind us, and we're proud to
|
|
|
|
|
announce the release of Slackware 14.2. The new release brings many updates
|
|
|
|
|
and modern tools, has switched from udev to eudev (no systemd), and adds
|
|
|
|
|
well over a hundred new packages to the system. Thanks to the team, the
|
|
|
|
|
upstream developers, the dedicated Slackware community, and everyone else
|
|
|
|
|
who pitched in to help make this release a reality.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
|
|
|
|
|
The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
|
|
|
|
|
32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware
|
|
|
|
|
project by picking up a copy from store.slackware.com. We're taking
|
|
|
|
|
pre-orders now, and offer a discount if you sign up for a subscription.
|
|
|
|
|
|
2012-09-26 03:10:42 +02:00
|
|
|
|
Have fun! :-)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Jun 30 17:25:39 UTC 2016
|
|
|
|
|
testing/packages/kernel-module-ecryptfs-4.4.14-x86_64-1.txz: Added.
|
|
|
|
|
This package contains a fixed version of the eCryptfs kernel module.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 29 19:38:51 UTC 2016
|
|
|
|
|
a/sysklogd-1.5.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Add a new -c option to disable suppression of repeated messages, which helps
|
|
|
|
|
log parsing tools such as fail2ban work better.
|
|
|
|
|
ap/at-3.1.19-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed broken at_deny.5 man page symlink.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 29 00:23:01 UTC 2016
|
|
|
|
|
a/kernel-firmware-20160628git-noarch-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Jun 26 01:28:27 UTC 2016
|
|
|
|
|
ap/screen-4.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-pulseaudio-plugin-0.2.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Reverted the icon background color patch, which was causing artifacts around
|
|
|
|
|
the icon or other issues such as the icon being too wide. These seemed
|
|
|
|
|
worse than the background color issue, which at least doesn't affect the
|
|
|
|
|
default Xfce theme. The patch remains in the source directory, commented
|
|
|
|
|
out in case anyone wants to try it. Also, an alternate patch from
|
|
|
|
|
Jean-Philippe Guillemin has been added to the source directory (commented
|
|
|
|
|
out).
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 24 23:37:19 UTC 2016
|
|
|
|
|
Sorry about the delay, but we had to wait for this kernel. At least we were
|
|
|
|
|
able to get some other good fixes in this week while we were waiting. :-)
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt.
|
|
|
|
|
a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-10.0.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.14-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.14-noarch-1.txz: Upgraded.
|
|
|
|
|
This kernel release fixes two security issues:
|
|
|
|
|
Corrupted offset allows for arbitrary decrements in compat
|
|
|
|
|
IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory
|
|
|
|
|
corruption, leading to elevation of privileges or kernel code execution.
|
|
|
|
|
This occurs in a compat_setsockopt() call that is normally restricted to
|
|
|
|
|
root, however, Linux 3/4 kernels that support user and network namespaces
|
|
|
|
|
can allow an unprivileged user to trigger this functionality. This is
|
|
|
|
|
exploitable from inside a container.
|
|
|
|
|
Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
|
|
|
|
|
Risk: Medium. Impact: Out of bounds heap memory access, leading to a
|
|
|
|
|
Denial of Service (or possibly heap disclosure or further impact).
|
|
|
|
|
This occurs in a setsockopt() call that is normally restricted to root,
|
|
|
|
|
however, Linux 3/4 kernels that support user and network namespaces can
|
|
|
|
|
allow an unprivileged user to trigger this functionality. This is
|
|
|
|
|
exploitable from inside a container.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openwall.com/lists/oss-security/2016/06/24/5
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libpng-1.6.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/librsvg-2.40.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.23
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 23 22:59:25 UTC 2016
|
|
|
|
|
kde/kde-workspace-4.11.22-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Fixed a bug with generating the initial panel where two Konqueror launchers
|
|
|
|
|
would be created. Instead, there will be one launcher each for Dolphin,
|
|
|
|
|
Konqueror, Firefox, and Konsole. Thanks to Eric Hameleers.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 23 08:04:53 UTC 2016
|
|
|
|
|
ap/cups-filters-1.9.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.45.0.
|
|
|
|
|
kde/calligra-2.9.11-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.45.0.
|
|
|
|
|
l/poppler-0.45.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-8.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.45.0.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 22 21:56:53 UTC 2016
|
|
|
|
|
a/etc-14.2-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Added root to the audio group.
|
|
|
|
|
a/kernel-firmware-20160622git-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.8.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Don't remove LLVMHello.so as it is referenced in LLVMExports.cmake breaking
|
|
|
|
|
builds that use "find_package(LLVM 3.8 CONFIG)". Thanks to Hunter S.
|
|
|
|
|
l/pulseaudio-9.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes many bugs, including this one that was commonly reported
|
|
|
|
|
during the Slackware 14.2 development cycle:
|
|
|
|
|
"Automatic routing improvements:
|
|
|
|
|
In 8.0, PulseAudio started to automatically switch to another profile when
|
|
|
|
|
the device associated with the current profile is unplugged. That seemingly
|
|
|
|
|
smart thing had some serious unintended consequences. One typical issue was
|
|
|
|
|
that when unplugging headphones, PulseAudio might switch to S/PDIF output
|
|
|
|
|
and not switch back to headphones when they are plugged in again. Another
|
|
|
|
|
issue was that HDMI in many cases appears to get temporarily unplugged when
|
|
|
|
|
the monitor goes to sleep mode, or even when switching the refresh rate of
|
|
|
|
|
the monitor -- PulseAudio 8.0 would move audio away from the HDMI monitor in
|
|
|
|
|
these cases and not move the audio back to HDMI when the monitor becomes
|
|
|
|
|
available again. These issues are now fixed."
|
|
|
|
|
l/sip-4.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-pulseaudio-plugin-0.2.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied a patch to make the icon background match the theme (although this
|
|
|
|
|
will only work if the theme has a GTK+3 subtheme). Thanks to DarkVision.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 21 19:11:38 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-22.txz: Rebuilt.
|
|
|
|
|
l/gmp-6.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
testing/packages/screen-4.4.0-x86_64-1.txz: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 21 17:50:21 UTC 2016
|
|
|
|
|
a/bash-4.3.046-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jun 20 21:39:07 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-21.txz: Rebuilt.
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-8.txz: Rebuilt.
|
|
|
|
|
In mkinitrd_command_generator.sh, include a few more modules that might be
|
|
|
|
|
needed to unlock a LUKS partition using a USB keyboard.
|
|
|
|
|
Thanks to Eric Hameleers.
|
|
|
|
|
l/cairo-1.14.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched an issue that was causing GTK3 applets to crash.
|
|
|
|
|
See: https://github.com/mate-desktop/mate-panel/issues/369
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
l/libarchive-3.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes several critical bugs, including some with security
|
|
|
|
|
implications.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/pcre-8.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs (including a couple of DoS security issues), and
|
|
|
|
|
retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 17 22:43:09 UTC 2016
|
|
|
|
|
xap/imagemagick-6.9.4_9-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 16 21:52:57 UTC 2016
|
|
|
|
|
l/gd-2.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
Stack consumption vulnerability allows remote attackers to cause a denial of
|
|
|
|
|
service via a crafted imagefilltoborder call.
|
|
|
|
|
Integer signedness error allows remote attackers to cause a denial of service
|
|
|
|
|
or potentially execute arbitrary code via crafted compressed gd2 data, which
|
|
|
|
|
triggers a heap-based buffer overflow.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added option --with-vpx-dir=/usr. Thanks to Pierre ANDREENKO.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 16 18:13:55 UTC 2016
|
|
|
|
|
testing/packages/tmux-2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added /usr/share/terminfo/tmux{,-256color}. Thanks to dugan.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 15 18:56:13 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-20.txz: Rebuilt.
|
|
|
|
|
kde/kdelibs-4.14.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libjpeg-turbo-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libgcrypt-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libgpg-error-1.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 15 06:13:17 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-19.txz: Rebuilt.
|
|
|
|
|
ap/cups-2.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 15 01:57:05 UTC 2016
|
|
|
|
|
a/glibc-zoneinfo-2016e-noarch-1.txz: Upgraded.
|
|
|
|
|
a/pkgtools-14.2-noarch-10.txz: Rebuilt.
|
|
|
|
|
In removepkg, fix package name matching so that (for example) "removepkg s"
|
|
|
|
|
will not remove a package whose name begins and ends with "s".
|
|
|
|
|
Thanks to Andreas Guldstrand.
|
|
|
|
|
Added internationalized man pages.
|
|
|
|
|
Thanks to Didier Spaier and the Slint translation team.
|
|
|
|
|
ap/slackpkg-2.82.1-noarch-3.txz: Rebuilt.
|
|
|
|
|
Added internationalized man pages.
|
|
|
|
|
Thanks to Didier Spaier and the Slint translation team.
|
|
|
|
|
ap/vim-7.4.1938-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.9.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/gparted-0.26.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/vim-gvim-7.4.1938-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 14 03:48:17 UTC 2016
|
|
|
|
|
xap/pidgin-2.10.12-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use the much larger collection of SSL certs in /etc/ssl/certs rather
|
|
|
|
|
than the ones that ship with Pidgin, otherwise certificates issued by
|
|
|
|
|
Let's Encrypt (and others) cannot be verified. Thanks to Cesare.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jun 13 21:34:08 UTC 2016
|
|
|
|
|
a/gettext-0.19.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pkgtools-14.2-noarch-9.txz: Rebuilt.
|
|
|
|
|
In setup.80.make-bootdisk, create a first bootable active primary partition
|
|
|
|
|
rather than using a filesystem on the unpartitioned device. Some BIOSes
|
|
|
|
|
won't boot it otherwise. Thanks to Richard Narron.
|
|
|
|
|
d/gettext-tools-0.19.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Jun 13 07:07:39 UTC 2016
|
|
|
|
|
a/grub-2.00-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Use correct GRUB_DISABLE_RECOVERY option in /etc/default/grub.new.
|
|
|
|
|
Thanks to Eugen Wissner.
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Fixed detecting USB partition in init, added proper USB storage modules
|
|
|
|
|
to mkinitrd, and added missing USB keyboard modules to
|
|
|
|
|
mkinitrd_command_generator.sh to fix entering LUKS password with some
|
|
|
|
|
newer USB keyboards. Thanks to Eric Hameleers.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-33.txz: Rebuilt.
|
|
|
|
|
rc.S: In cryptsetup script, support supplying a password of "none"
|
|
|
|
|
(interactive entry) for non-swap partitions to allow specifying additional
|
|
|
|
|
options. Support a new option "discard" to pass the --allow-discards option
|
|
|
|
|
to cryptsetup when unlocking a volume, which can potentially improve
|
|
|
|
|
performance and longevity on some SSDs. Thanks to Nathan Wallace.
|
|
|
|
|
ap/cups-filters-1.9.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lxc-2.0.1-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Merged rc.S changes.
|
|
|
|
|
l/hicolor-icon-theme-0.15-noarch-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Install udev rules in the correct directory. Thanks to gmgf.
|
|
|
|
|
n/samba-4.4.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
When installing, move any files existing in /etc/samba/private to
|
|
|
|
|
/var/lib/samba/private, not just *.tdb files.
|
|
|
|
|
Thanks to Maciej Goluchowski.
|
|
|
|
|
n/vsftpd-3.0.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched to handle NULL returns from recent glibc crypt(). Thanks to nixi.
|
|
|
|
|
n/wget-1.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
This version fixes a security vulnerability present in all old versions
|
|
|
|
|
of wget. On a server redirect from HTTP to a FTP resource, wget would
|
|
|
|
|
trust the HTTP server and use the name in the redirected URL as the
|
|
|
|
|
destination filename. This behaviour was changed and now it works
|
|
|
|
|
similarly as a redirect from HTTP to another HTTP resource so the original
|
|
|
|
|
name is used as the destination file. To keep the previous behaviour the
|
|
|
|
|
user must provide --trust-server-names.
|
|
|
|
|
The vulnerability was discovered by Dawid Golunski and was reported by
|
|
|
|
|
Beyond Security's SecuriTeam.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/xterm-325-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/efiboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 9 18:13:44 UTC 2016
|
|
|
|
|
a/e2fsprogs-1.43.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/groff-1.22.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use correct app-defaults directory. Thanks to DarkVision.
|
|
|
|
|
kde/kdelibs-4.14.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160601_b617f80-x86_64-1.txz: Upgraded.
|
|
|
|
|
Rolling the git dice one more time since there are reports that this version
|
|
|
|
|
fixes video corruption and freezes after resume. Please let me know quickly
|
|
|
|
|
if it causes any regressions.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Rebuilt to update e2fsprogs.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Rebuilt to update e2fsprogs.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jun 8 21:20:46 UTC 2016
|
|
|
|
|
a/kernel-generic-4.4.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Support LABEL= and UUID= for resume device. Thanks to SeB.
|
|
|
|
|
a/pkgtools-14.2-noarch-8.txz: Rebuilt.
|
|
|
|
|
pkgtool: Correctly determine root device when running from the installer.
|
|
|
|
|
Thanks to Richard Narron.
|
|
|
|
|
d/kernel-headers-4.4.13-x86-1.txz: Upgraded.
|
|
|
|
|
d/python-setuptools-22.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Include documentation in package. Thanks to bassmadrigal.
|
|
|
|
|
k/kernel-source-4.4.13-noarch-1.txz: Upgraded.
|
|
|
|
|
l/sdl-1.2.15-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Patched an SDL_ttf bug that prevents shaded text from displaying.
|
|
|
|
|
Thanks to Cheng Bao.
|
|
|
|
|
n/samba-4.4.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched doinst.sh to fix a couple possible (harmless) error messages upon
|
|
|
|
|
installation. Thanks to Maciej Goluchowski.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
testing/source/linux-4.5.4-configs/*: Removed.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 7 21:39:07 UTC 2016
|
|
|
|
|
a/smartmontools-6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gnutls-3.4.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
Use secure_getenv() where available to obtain environment variables to
|
|
|
|
|
fix an issue where setuid programs could potentially allow an attacker
|
|
|
|
|
to overwrite and corrupt arbitrary files.
|
|
|
|
|
This issue was only present in gnutls-3.4.12.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Migrate any .tdb files in /etc/samba/private to /var/lib/samba/private.
|
|
|
|
|
Thanks to ivandi.
|
|
|
|
|
xap/gkrellm-2.3.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-45.2.0esr-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 7 06:03:13 UTC 2016
|
|
|
|
|
a/pkgtools-14.2-noarch-7.txz: Rebuilt.
|
|
|
|
|
In setup.80.make-bootdisk, use -i option with syslinux.
|
|
|
|
|
Thanks to Richard Narron.
|
|
|
|
|
In setup.80.make-bootdisk, try to use syslinux-nomtools. This is more
|
|
|
|
|
reliable due to a race condition between udev and mtools when syslinux
|
|
|
|
|
makes rapid calls to mtools. If syslinux-nomtools is not available, then
|
|
|
|
|
run syslinux within strace which changes the timing enough that it works.
|
|
|
|
|
l/aspell-en-7.1_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
On all of these aspell dictionary packages, use a proper $ARCH.
|
|
|
|
|
Thanks to Didier Spaier.
|
|
|
|
|
n/yptools-2.14-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Compile with --libexecdir=/usr/lib${LIBDIRSUFFIX}/yp or else ypserv will
|
|
|
|
|
not be able to start ypxfr on 64-bit. Thanks to Jonathan Woithe.
|
|
|
|
|
extra/aspell-word-lists/aspell-af-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-am-0.03_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-az-0.02_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-be-0.01-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-bg-4.1_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-bn-0.01.1_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-br-0.50_2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ca-20040130_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-cs-20040614_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-csb-0.02_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-cy-0.50_3-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-da-1.4.42_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-de-20030222_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-el-0.50_3-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-eo-2.1.20000225a_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-es-1.11_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-et-0.1.21_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-fa-0.11_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-fi-0.7_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-fo-0.2.16_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-fr-0.50_3-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ga-4.5_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-gd-0.1.1_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-gl-0.5a_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-gu-0.03_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-gv-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-he-1.0_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-hi-0.02_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-hil-0.11_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-hr-0.51_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-hsb-0.02_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-hu-0.99.4.2_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ia-0.50_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-id-1.2_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-is-0.51.1_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-it-2.2_20050523_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ku-0.20_1-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-la-20020503_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-lt-1.2.1_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-lv-0.5.5_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-mg-0.03_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-mi-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-mk-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-mn-0.06_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-mr-0.10_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ms-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-mt-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-nb-0.50.1_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-nds-0.01_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-nl-0.50_2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-nn-0.50.1_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-no-0.50_2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ny-0.01_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-or-0.03_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-pa-0.01_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-pl-6.0_20061121_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-pt-0.50_2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-pt_BR-20090702_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-qu-0.02_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ro-3.3_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-ru-0.99f7_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-rw-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-sc-1.0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-sk-2.01_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-sl-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-sr-0.02-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-sv-0.51_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-sw-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-ta-20040424_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-te-0.01_2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-tet-0.1.1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-tl-0.02_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-tn-1.0.1_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-tr-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-uk-1.4.0_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-uz-0.6_0-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/aspell-word-lists/aspell-vi-0.01.1_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-wa-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-yi-0.01.1_1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
extra/aspell-word-lists/aspell-zu-0.50_0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jun 4 20:56:31 UTC 2016
|
|
|
|
|
d/pkg-config-0.29.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added /usr/local/share/pkgconfig to $PKG_CONFIG_PATH.
|
|
|
|
|
Thanks to bassmadrigal.
|
|
|
|
|
n/nftables-0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/samba-4.4.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Moved /etc/samba/private/ to /var/lib/samba/private/.
|
|
|
|
|
Thanks to Pierre ANDREENKO.
|
|
|
|
|
x/xf86-input-evdev-2.10.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 3 23:36:07 UTC 2016
|
|
|
|
|
ap/lxc-2.0.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
In /etc/inittab, use "shutdown -h now" for powerfail. Without this, lxc-stop
|
|
|
|
|
will send SIGPWR to attempt to stop the container, and will then force stop
|
|
|
|
|
it after a one minute timeout. Thanks to Andreas V<>gele.
|
|
|
|
|
In the init scripts, wrap $container in double quotes to prevent syntax
|
|
|
|
|
errors if the variable is unset. Thanks to Jakub 'shasta' Jankowski.
|
|
|
|
|
l/libxml2-2.9.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix attribute decoding during XML schema validation.
|
|
|
|
|
Thanks to Andreas V<>gele.
|
|
|
|
|
n/net-snmp-5.7.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Include support for the ucd-snmp/diskio module.
|
|
|
|
|
Thanks to Jakub 'shasta' Jankowski.
|
|
|
|
|
n/ntp-4.2.8p8-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release patches one high and four low severity security issues:
|
|
|
|
|
CVE-2016-4957: Crypto-NAK crash
|
|
|
|
|
CVE-2016-4953: Bad authentication demobilizes ephemeral associations
|
|
|
|
|
CVE-2016-4954: Processing spoofed server packets
|
|
|
|
|
CVE-2016-4955: Autokey association reset
|
|
|
|
|
CVE-2016-4956: Broadcast interleave
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/imagemagick-6.9.4_7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-panel-4.12.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Blink taskbar buttons for notification 4 times, not G_MAXUINT times.
|
|
|
|
|
Thanks to Andrzej Telszewski.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 2 19:08:13 UTC 2016
|
|
|
|
|
This could be the last batch of updates before 14.2 stable, so please test!
|
|
|
|
|
a/kernel-firmware-20160601git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/hplip-3.16.5-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched setup.py to set LC_ALL=C, which should fix parsing CUPS output.
|
|
|
|
|
d/gdb-7.11.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.12-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.12-noarch-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.2.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libnftnl-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.4_6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xscreensaver-5.35-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed missing '\' in the build script which caused a few configure options
|
|
|
|
|
to be skipped. Thanks to Stuart Winter.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue May 31 20:05:12 UTC 2016
|
|
|
|
|
ap/cdrtools-3.01-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Applied cdrtools-3.01-fix-20151126-mkisofs-isoinfo.patch. Thanks to gmgf.
|
|
|
|
|
ap/hplip-3.16.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with these changed paths:
|
|
|
|
|
--with-hpppddir=/usr/share/ppd/HP
|
|
|
|
|
--with-drvdir=/usr/share/cups/drv/HP
|
|
|
|
|
This matches what is expected for Slackware in the distros.dat file and is
|
|
|
|
|
hardcoded in core_install.py. Thanks to kjhambrick.
|
|
|
|
|
l/LibRaw-0.17.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/lcms2-2.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Don't package PDF/RTF docs.
|
|
|
|
|
n/bluez-5.40-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/bash-completion/bash-completion-2.2-noarch-3.txz: Rebuilt.
|
|
|
|
|
Removed mpv -> mplayer symlink. Thanks to Robby Workman.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 31 05:42:04 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-18.txz: Rebuilt.
|
|
|
|
|
ap/tmux-2.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added /usr/share/terminfo/tmux{,-256color}. Thanks to dugan.
|
|
|
|
|
d/python-setuptools-21.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.49.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/blueman-2.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
xap/imagemagick-6.9.4_5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Removed popen() support to prevent another shell vulnerability. This
|
|
|
|
|
issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-45.1.1-x86_64-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/xscreensaver-5.35-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri May 27 23:08:17 UTC 2016
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-32.txz: Rebuilt.
|
|
|
|
|
rc.S: Fixed cgroup, cgmanager, and cgproxy handling so that it works if /usr
|
|
|
|
|
is a separate partition. Thanks to Richard Cranium and Matteo Bernardini.
|
|
|
|
|
ap/ghostscript-9.19-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use the bundled version of openjpeg, which includes patches needed by
|
|
|
|
|
ghostscript. Thanks to qunying.
|
|
|
|
|
ap/lxc-2.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Merged rc.S changes.
|
|
|
|
|
l/libxml2-2.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues:
|
|
|
|
|
Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
|
|
|
|
|
Format string vulnerability (CVE-2016-4448).
|
|
|
|
|
Inappropriate fetch of entities content (CVE-2016-4449).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://xmlsoft.org/news.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libxslt-1.1.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and a security issue:
|
|
|
|
|
Fix for type confusion in preprocessing attributes (Daniel Veillard).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.22
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/geeqie-1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Make rc.dropbear executable. Thanks to Eduard Rozenberg.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Make rc.dropbear executable. Thanks to Eduard Rozenberg.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 26 23:12:27 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-17.txz: Rebuilt.
|
|
|
|
|
l/libpng-1.6.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtiff-4.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.4_P1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXfixes-5.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xproto-7.0.29-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.4_4-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 26 20:30:18 UTC 2016
|
|
|
|
|
ap/ghostscript-9.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
Dumped old unmaintained bundled libraries and linked with system libraries
|
|
|
|
|
instead. There had been a crash previously with the GIMP plugin and
|
|
|
|
|
ghostscript > 9.07, but now it works as expected. Thanks to qunying.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 25 23:37:36 UTC 2016
|
|
|
|
|
x/xf86-input-wacom-0.33.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
In rc.dropbear, drop the option to use /etc/motd.net (this was preventing
|
|
|
|
|
dropbear from starting properly). Thanks to Eduard Rozenberg.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
In rc.dropbear, drop the option to use /etc/motd.net (this was preventing
|
|
|
|
|
dropbear from starting properly). Thanks to Eduard Rozenberg.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 25 04:20:09 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-16.txz: Rebuilt.
|
|
|
|
|
a/e2fsprogs-1.43-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Do not use 64-bit by default on ext4, since some bootloaders cannot handle
|
|
|
|
|
it yet. But use "auto_64-bit_support = 1", which will enable 64-bit if the
|
|
|
|
|
number of blocks for the file system requires the feature to be enabled.
|
|
|
|
|
a/syslinux-4.07-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-filters-1.8.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.44.0.
|
|
|
|
|
ap/mpg123-1.23.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/slackpkg-2.82.1-noarch-2.txz: Rebuilt.
|
|
|
|
|
Updated URLs for garr.it mirrors. Thanks to Andrej Sossi.
|
|
|
|
|
d/git-2.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.9.11-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.44.0.
|
|
|
|
|
l/libarchive-3.1.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched an issue with Zip archive handling that could allow an attacker
|
|
|
|
|
to overwrite parts of the heap in a controlled fashion and execute
|
|
|
|
|
arbitrary code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/poppler-0.44.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
n/gnutls-3.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-1.2_20160125-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled with --disable-ossaudio.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.44.0.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri May 20 21:20:29 UTC 2016
|
|
|
|
|
a/aaa_base-14.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Updated your your initial email. ;-)
|
|
|
|
|
Thanks to Tonus for the typo report.
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-15.txz: Rebuilt.
|
|
|
|
|
a/btrfs-progs-v4.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/e2fsprogs-1.43-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/gzip-1.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/tar-1.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lxc-2.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.13.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.1832-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.11-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.11-noarch-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.49.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160518.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/dnsmasq-2.76-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/vim-gvim-7.4.1832-x86_64-1.txz: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 17 21:52:11 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-14.txz: Rebuilt.
|
|
|
|
|
d/mercurial-3.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gdbm-1.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libmtp-1.1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libndp-1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue. It was found that libndp did
|
|
|
|
|
not properly validate and check the origin of Neighbor Discovery
|
|
|
|
|
Protocol (NDP) messages. An attacker on a non-local network could
|
|
|
|
|
use this flaw to advertise a node as a router, allowing them to
|
|
|
|
|
perform man-in-the-middle attacks on a connecting client, or
|
|
|
|
|
disrupt the network connectivity of that client.
|
|
|
|
|
Thanks to Julien Bernard (Viag<61>nie) for reporting this issue.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3698
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/gnuplot-5.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added libcaca support. Thanks to Andrew Clemons.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 17 05:06:44 UTC 2016
|
|
|
|
|
a/kernel-firmware-20160516git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.154-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-setuptools-21.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.4_1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed .new config file installation. Thanks to ivandi.
|
|
|
|
|
testing/source/linux-4.5.4-configs/*: Added.
|
|
|
|
|
testing/source/linux-4.6-configs/*: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 12 01:50:21 UTC 2016
|
|
|
|
|
a/kernel-firmware-20160511git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/man-pages-4.06-noarch-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.10-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.10-noarch-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-45.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/network-manager-applet-1.2.2-x86_64-1.txz: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 11 05:20:01 UTC 2016
|
|
|
|
|
a/dcron-4.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Patched bug where cron.update is not picked up while jobs are still running.
|
|
|
|
|
Thanks to Jeroen Hendriks.
|
|
|
|
|
ap/lxc-2.0.0-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Applied "[PATCH] cgfsng: don't require that systemd subsystem be mounted".
|
|
|
|
|
Thanks to Johannes Sch<63>pfer.
|
|
|
|
|
ap/moc-2.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/slackpkg-2.82.1-noarch-1.txz: Upgraded.
|
|
|
|
|
Updated x86* mirrors lists for Slackware 14.2.
|
|
|
|
|
n/openvpn-2.3.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.4_1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release addresses several security issues in ImageMagick, including:
|
|
|
|
|
Insufficient shell characters filtering allows code execution (CVE-2016-3714)
|
|
|
|
|
Server Side Request Forgery (CVE-2016-3718)
|
|
|
|
|
File deletion (CVE-2016-3715)
|
|
|
|
|
File moving (CVE-2016-3716)
|
|
|
|
|
Local file read (CVE-2016-3717)
|
|
|
|
|
In addition, the default policy.xml config file has been modified to disable
|
|
|
|
|
all of the previously vulnerable coders, and to disable indirect reads.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://imagetragick.com
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu May 5 05:17:19 UTC 2016
|
|
|
|
|
a/kernel-generic-4.4.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-31.txz: Rebuilt.
|
|
|
|
|
In rc.M, bluetooth must start before NetworkManager (like it did in Slackware
|
|
|
|
|
14.1) in order to enable bluetooth networking. Thanks to James Marca.
|
|
|
|
|
ap/lxc-2.0.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Merged rc.M changes.
|
|
|
|
|
d/kernel-headers-4.4.9-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.9-noarch-1.txz: Upgraded.
|
|
|
|
|
n/mutt-1.6.1-x86_64-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Wed May 4 19:24:29 UTC 2016
|
|
|
|
|
ap/hplip-3.16.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-45.1.1esr-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 3 20:30:53 UTC 2016
|
|
|
|
|
a/openssl-solibs-1.0.2h-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.2h-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
Memory corruption in the ASN.1 encoder (CVE-2016-2108)
|
|
|
|
|
Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
|
|
|
|
|
EVP_EncodeUpdate overflow (CVE-2016-2105)
|
|
|
|
|
EVP_EncryptUpdate overflow (CVE-2016-2106)
|
|
|
|
|
ASN.1 BIO excessive memory allocation (CVE-2016-2109)
|
|
|
|
|
EBCDIC overread (CVE-2016-2176)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20160503.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/hexchat-2.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
testing/packages/tmux-2.2-x86_64-1.txz: Added.
|
|
|
|
|
For those using a UTF8 locale, I'm adding back the latest tmux in /testing.
|
|
|
|
|
Most likely we'll throw the switch on "UTF8 by default" shortly into the
|
|
|
|
|
next development cycle, but now isn't the time for it.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon May 2 19:42:54 UTC 2016
|
|
|
|
|
ap/tmux-2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted to tmux-2.1, because tmux-2.2 has dropped support for non-UTF8
|
|
|
|
|
character sets "since supporting multiple character sets is a pain".
|
|
|
|
|
Thanks to Dan Church for the bug report.
|
|
|
|
|
d/mercurial-3.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes possible arbitrary code execution when converting Git
|
|
|
|
|
repos. Mercurial prior to 3.8 allowed arbitrary code execution when using
|
|
|
|
|
the convert extension on Git repos with hostile names. This could affect
|
|
|
|
|
automated code conversion services that allow arbitrary repository names.
|
|
|
|
|
This is a further side-effect of Git CVE-2015-7545.
|
|
|
|
|
Reported and fixed by Blake Burkhart.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/icu4c-56.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched pkgdata crash when using "-m". Thanks to Fabio Bas.
|
|
|
|
|
l/librsvg-2.40.15-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted upstream patch that broke the rsvg-convert scaling functionality.
|
|
|
|
|
Thanks to haary.
|
|
|
|
|
n/samba-4.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.3_9-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 30 20:28:33 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-13.txz: Rebuilt.
|
|
|
|
|
a/lvm2-2.02.152-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gphoto2-2.5.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-10.0.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.1811-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/ruby-2.2.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/subversion-1.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes two security issues:
|
|
|
|
|
CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm.
|
|
|
|
|
CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn
|
|
|
|
|
during COPY/MOVE authorization check.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
|
|
|
|
|
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libgphoto2-2.5.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/whois-5.2.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/yptools-2.14-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Don't remove unmerged .new config files. Thanks to christian laubscher.
|
|
|
|
|
x/xf86-input-evdev-2.10.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/vim-gvim-7.4.1811-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 30 05:51:33 UTC 2016
|
|
|
|
|
d/perl-5.22.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 29 20:54:01 UTC 2016
|
|
|
|
|
ap/cups-filters-1.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.43.0.
|
|
|
|
|
kde/calligra-2.9.11-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.43.0.
|
|
|
|
|
l/poppler-0.43.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
n/ntp-4.2.8p7-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release patches several low and medium severity security issues:
|
|
|
|
|
CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering
|
|
|
|
|
CVE-2016-1549: Sybil vulnerability: ephemeral association attack,
|
|
|
|
|
AKA: ntp-sybil - MITIGATION ONLY
|
|
|
|
|
CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion
|
|
|
|
|
botch
|
|
|
|
|
CVE-2016-2517: Remote configuration trustedkey/requestkey values are not
|
|
|
|
|
properly validated
|
|
|
|
|
CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with
|
|
|
|
|
MATCH_ASSOC
|
|
|
|
|
CVE-2016-2519: ctl_getitem() return value not always checked
|
|
|
|
|
CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos
|
|
|
|
|
CVE-2016-1548: Interleave-pivot - MITIGATION ONLY
|
|
|
|
|
CVE-2015-7704: KoD fix: peer associations were broken by the fix for
|
|
|
|
|
NtpBug2901, AKA: Symmetric active/passive mode is broken
|
|
|
|
|
CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks
|
|
|
|
|
CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,
|
|
|
|
|
authdecrypt-timing, AKA: authdecrypt-timing
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.21
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/libdrm-2.4.68-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.43.0.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 27 21:16:37 UTC 2016
|
|
|
|
|
n/yptools-2.14-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Use /usr/lib$LIBDIRSUFFIX/yp in /var/yp/Makefile.new. Thanks to alex14641.
|
|
|
|
|
xap/mozilla-firefox-45.1.0esr-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed $RELEASEVER to avoid installing extra files and placing a few files in
|
|
|
|
|
the wrong location. Thanks to Mikhail Zotov.
|
|
|
|
|
xfce/xfce4-settings-4.12.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched a bug that may prevent a display from waking up from standby mode
|
|
|
|
|
when running a 4.4.x (or newer) kernel. Thanks to Matthias Schuster.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 27 04:20:57 UTC 2016
|
|
|
|
|
xap/mozilla-firefox-45.1.0esr-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Apr 26 05:16:02 UTC 2016
|
|
|
|
|
ap/lxc-2.0.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
rc.lxc: Stop containers with lxc-stop rather than having lxc-attach call
|
|
|
|
|
/sbin/halt. Thanks to linuxxer and Matteo Bernardini.
|
|
|
|
|
xfce/xfce4-weather-plugin-0.8.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Apr 24 03:44:25 UTC 2016
|
|
|
|
|
a/grep-2.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
Needed to be built into the huge kernel since virtio is. Thanks to Cal Peake.
|
|
|
|
|
NET_9P m -> y
|
|
|
|
|
NET_9P_VIRTIO m -> y
|
|
|
|
|
a/kernel-modules-4.4.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lilo-24.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched usable memory bug. Thanks to Sl4ck3ver.
|
|
|
|
|
ap/lxc-2.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.12.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.8-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.8-noarch-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/ca-certificates-20160104-noarch-1.txz: Upgraded.
|
|
|
|
|
Thanks to Cal Peake for fixing a build script typo that created duplicate
|
|
|
|
|
certificates with each successive build.
|
|
|
|
|
n/gnupg2-2.0.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/motif-2.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/network-manager-applet-1.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Patched busybox umask bug. Thanks to Goran "CHUPCKO" Lazic.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Patched busybox umask bug. Thanks to Goran "CHUPCKO" Lazic.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Apr 19 18:59:10 UTC 2016
|
|
|
|
|
x/xf86-video-intel-git_20160418_562ae1f-x86_64-1.txz: Upgraded.
|
|
|
|
|
Bumped to latest git, dropped glamor fallback patch.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Apr 18 22:21:58 UTC 2016
|
|
|
|
|
a/coreutils-8.25-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted new default ls quoting.
|
|
|
|
|
a/glibc-zoneinfo-2016d-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.1752-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/cmake-3.5.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/perl-5.22.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched security issue "loss of taint in canonpath()". Thanks to ttk.
|
|
|
|
|
Patched to recognize gcc 5.x to allow using -D_FORTIFY_SOURCE=2.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/bluez-5.39-x86_64-2.txz: Rebuilt.
|
|
|
|
|
In rc.bluetooth, don't attempt to start/stop rfcomm. Thanks to e5150.
|
|
|
|
|
n/libgcrypt-1.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160417_81029be-x86_64-1.txz: Upgraded.
|
|
|
|
|
Removed --with-default-dri=2 --with-default-accel=uxa options
|
|
|
|
|
Added patch for modesetting + glamor fallback on gen9+.
|
|
|
|
|
Hopefully the latest git, these option changes, and fallback patch will solve
|
|
|
|
|
the issues reported on LQ. Please test!
|
|
|
|
|
xap/imagemagick-6.9.3_8-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/vim-gvim-7.4.1752-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 15 20:37:37 UTC 2016
|
|
|
|
|
Finally got some fixes we were waiting for in this new kernel.
|
|
|
|
|
It's been almost a month since 14.2rc1 so we'll call this Slackware
|
|
|
|
|
14.2 release candidate 2. Almost there. Get in any last-minute
|
|
|
|
|
bug reports quickly. :-)
|
|
|
|
|
a/kernel-generic-4.4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
BLK_DEV_NVME m -> y
|
|
|
|
|
a/kernel-modules-4.4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.7-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.7-noarch-1.txz: Upgraded.
|
|
|
|
|
l/alsa-lib-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix error EBADFD. Thanks to e5150.
|
|
|
|
|
l/glibmm-2.46.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base-1.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good-1.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtkmm3-3.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qca-2.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Install crypto.prf in the correct directory. Thanks to David Spencer.
|
|
|
|
|
n/gnutls-3.4.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nfs-utils-1.3.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix nfsd startup on kernels without IPv6 support. Thanks to Mario Preksavec.
|
|
|
|
|
n/samba-4.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the security issues known as "badlock" (or "sadlock"),
|
|
|
|
|
which may allow man-in-the-middle or denial-of-service attacks:
|
|
|
|
|
CVE-2015-5370 (Multiple errors in DCE-RPC code)
|
|
|
|
|
CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)
|
|
|
|
|
CVE-2016-2111 (NETLOGON Spoofing Vulnerability)
|
|
|
|
|
CVE-2016-2112 (LDAP client and server don't enforce integrity)
|
|
|
|
|
CVE-2016-2113 (Missing TLS certificate validation)
|
|
|
|
|
CVE-2016-2114 ("server signing = mandatory" not enforced)
|
|
|
|
|
CVE-2016-2115 (SMB IPC traffic is not integrity protected)
|
|
|
|
|
CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/xf86-video-intel-git_20160224_d167280-x86_64-1.txz: Upgraded.
|
|
|
|
|
So far, this version seems to be the most stable of the ones tested.
|
|
|
|
|
Thanks to Andrzej Telszewski.
|
|
|
|
|
x/xf86-video-openchrome-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.18.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied a patch from https://bugs.freedesktop.org/show_bug.cgi?id=49950
|
|
|
|
|
to fix applying keyboard layout settings when using a keyboard/mouse combo
|
|
|
|
|
device such as a Logitech wireless keyboard with the unifying receiver.
|
|
|
|
|
Thanks to Jean-Philippe Guillemin.
|
|
|
|
|
x/xorg-server-xephyr-1.18.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.18.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.18.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/geeqie-1.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-45.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Apr 12 05:37:20 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-12.txz: Rebuilt.
|
|
|
|
|
Added libtdb.so.1.3.8.
|
|
|
|
|
a/lvm2-2.02.150-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/tmux-2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/QScintilla-2.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libpng-1.6.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtasn1-4.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/sip-4.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/epic5-2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/httpd-2.4.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nmap-7.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/proftpd-1.3.5b-x86_64-1.txz: Upgraded.
|
|
|
|
|
Compiled with --enable-dso. Thanks to David M. Syzdek.
|
|
|
|
|
Compiled with --enable-nls. Thanks to Olek.
|
|
|
|
|
n/samba-4.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This will probably be a very short-lived package, but it would be good to
|
|
|
|
|
hear about any bugs before 4.4.1 is packaged (probably tomorrow).
|
|
|
|
|
n/vsftpd-3.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
In /etc/vsftpd.conf.new, set seccomp_sandbox=NO to work around bugs.
|
|
|
|
|
x/xf86-video-amdgpu-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-ati-7.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160411_a7526ea-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-45.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 6 05:07:44 UTC 2016
|
|
|
|
|
d/git-2.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/nasm-2.12.01-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/strace-4.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/subversion-1.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Subversion servers and clients are vulnerable to remotely triggerable
|
|
|
|
|
heap-based buffer overflows and out-of-bounds reads that may allow remote
|
|
|
|
|
attackers to cause a denial of service or possibly execute arbitrary code
|
|
|
|
|
under the context of the targeted process.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5259
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/harfbuzz-1.2.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/librsvg-2.40.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bluez-5.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160405_afddc9f-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xterm-324-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/tigervnc/tigervnc-1.6.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Rebuilt for xorg-server-1.18.3.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Apr 4 19:54:22 UTC 2016
|
|
|
|
|
a/lvm2-2.02.149-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/make-4.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied patch: Handle NULL returns from ttyname(). Thanks to e5150.
|
|
|
|
|
l/iso-codes-3.67-noarch-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bluez-5.38-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added another patch from upstream git. Thanks to gmgf.
|
|
|
|
|
n/mutt-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/inputproto-2.3.2-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Apr 1 21:17:37 UTC 2016
|
|
|
|
|
a/elilo-3.16-x86_64-2.txz: Rebuilt.
|
|
|
|
|
eliloconfig: strip alphabetic characters from $EFI_PARTITION.
|
|
|
|
|
Rebuilt /boot/elilo-x86_64.efi against gnu-efi-3.0.4.
|
|
|
|
|
a/kernel-firmware-20160401git-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/alsa-utils-1.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Don't run rc.alsa by default.
|
|
|
|
|
ap/at-3.1.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/mercurial-3.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes security issues and bugs, including remote code execution
|
|
|
|
|
in binary delta decoding, arbitrary code execution with Git subrepos, and
|
|
|
|
|
arbitrary code execution when converting Git repos.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
f/linux-howtos-20160401-noarch-1.txz: Upgraded.
|
|
|
|
|
l/alsa-lib-1.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/alsa-plugins-1.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gnu-efi-3.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/newt-0.52.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ModemManager-1.4.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dhcp-4.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and (previously patched) security issues.
|
|
|
|
|
n/php-5.6.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.20
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/audacious-3.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/audacious-plugins-3.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Mar 29 07:43:02 UTC 2016
|
|
|
|
|
d/git-2.8.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/iptables-1.6.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Moved /usr/etc/ethertypes to /etc/ethertypes. Thanks to e5150.
|
|
|
|
|
usb-and-pxe-installers/usbimg2disk.sh: Patched.
|
|
|
|
|
Exclude any dangling symlinks when copying files. Thanks to gsl.
|
|
|
|
|
Add new option -e (or --errors) to abort on any errors.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Mar 27 19:39:10 UTC 2016
|
|
|
|
|
a/dbus-1.10.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/grub-2.00-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Include support for 32-bit EFI. Thanks to Eric Hameleers.
|
|
|
|
|
a/lvm2-2.02.148-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/hplip-3.16.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dbus-python-1.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/brltty/brltty-5.3.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added upstream patch to prefer a blank if the same glyph is used for other
|
|
|
|
|
characters. Added udev rules. Thanks to Didier Spaier.
|
|
|
|
|
testing/source/linux-4.6-rc1-configs/*: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Mar 26 23:20:34 UTC 2016
|
|
|
|
|
a/etc-14.2-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Added polkitd user (UID 87) and group (GID 87).
|
|
|
|
|
ap/mc-4.8.16-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied some upstream patches. Thanks to th_r.
|
|
|
|
|
d/cmake-3.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/iso-codes-3.66-noarch-1.txz: Upgraded.
|
|
|
|
|
l/libsecret-0.18.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/polkit-0.113-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Ensure that polkitd user (UID 87) and group (GID 87) exist.
|
|
|
|
|
Ensure correct permissions on /etc/polkit-1/rules.d.
|
|
|
|
|
Remove obsolete .pkla rules and /etc/polkit-1/localauthority directory.
|
|
|
|
|
Don't build and install examples.
|
|
|
|
|
l/urwid-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Switch to version 1.0.3, since wicd has problems with newer versions.
|
|
|
|
|
n/bluez-5.38-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use reset=1 when loading the btusb module.
|
|
|
|
|
Applied upstream patch to fix a crash when connecting to audio controllers.
|
|
|
|
|
Thanks to gmgf.
|
|
|
|
|
n/curl-7.48.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/mtr-0.86-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xkeyboard-config-2.17-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/fvwm-2.6.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/brltty/brltty-5.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/wicd/wicd-1.7.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix wicd-curses crash bugs. Thanks to foobaru, Tonus, and comet.berkeley.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 25 20:43:59 UTC 2016
|
|
|
|
|
a/glibc-zoneinfo-2016c-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20160325git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/ntfs-3g-2016.2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
ap/cups-filters-1.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sudo-1.8.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/zsh-5.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ktouch-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched to fix performance issues. Thanks to Andrzej Telszewski.
|
|
|
|
|
l/libevent-2.0.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
Multiple integer overflows in the evbuffer API allow context-dependent
|
|
|
|
|
attackers to cause a denial of service or possibly have other unspecified
|
|
|
|
|
impact via "insanely large inputs" to the (1) evbuffer_add,
|
|
|
|
|
(2) evbuffer_expand, or (3) bufferevent_write function, which triggers a
|
|
|
|
|
heap-based buffer overflow or an infinite loop.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/polkit-0.113-x86_64-1.txz: Upgraded.
|
|
|
|
|
Polkit config format change: Uses ".rules" files rather than ".pkla", and
|
|
|
|
|
the rules files are JavaScript. Thanks to Robby Workman.
|
|
|
|
|
l/polkit-gnome-0.105-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/NetworkManager-1.0.10-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Patched rc.networkmanager to only attempt to kill wpa_supplicant on shutdown
|
|
|
|
|
using the first .pid found in /var/run or /run. Otherwise if those
|
|
|
|
|
directories are symlinked or bind mounted together there will be a race
|
|
|
|
|
condition that may result in an error message.
|
|
|
|
|
I'm still not certain that rc.networkmanager should be messing with
|
|
|
|
|
wpa_supplicant. What about cases where NetworkManager might be configured to
|
|
|
|
|
*not* manage the wireless interfaces at all?
|
|
|
|
|
Luckily, there is rarely any reason for stopping NetworkManager (outside of
|
|
|
|
|
shutdown or reboot), or for restarting it.
|
|
|
|
|
n/irssi-0.8.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nmap-7.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Mar 21 03:19:48 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-11.txz: Rebuilt.
|
|
|
|
|
a/lvm2-2.02.147-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pciutils-3.4.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use a shared libpci, not a static one. This fixes linking some programs as
|
|
|
|
|
the static library won't pull in other recent dependencies such as libudev.
|
|
|
|
|
Thanks to 55020.
|
|
|
|
|
a/pkgtools-14.2-noarch-6.txz: Rebuilt.
|
|
|
|
|
In installpkg's terse mode, make some dots connecting the description to the
|
|
|
|
|
uncompressed package size.
|
|
|
|
|
a/utempter-1.1.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed manpage symlinks. Thanks to elyk.
|
|
|
|
|
ap/cups-filters-1.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.42.0.
|
|
|
|
|
ap/ddrescue-1.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/man-pages-4.05-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/mc-4.8.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.9.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.42.0.
|
|
|
|
|
kde/kde-workspace-4.11.22-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against shared library from pciutils-3.4.1.
|
|
|
|
|
kde/lskat-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fixed a typo in slack-desc.
|
|
|
|
|
l/harfbuzz-1.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libodfgen-0.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/librevenge-0.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libvisio-0.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libwpd-0.10.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libzip-1.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed manpage symlinks. Thanks to elyk.
|
|
|
|
|
l/poppler-0.42.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/taglib-1.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/wavpack-4.75.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
n/NetworkManager-1.0.10-x86_64-4.txz: Rebuilt.
|
|
|
|
|
When stopping NetworkManager, ensure that wpa_supplicant is also stopped.
|
|
|
|
|
Thanks to allend.
|
|
|
|
|
n/bluez-5.38-x86_64-1.txz: Upgraded.
|
|
|
|
|
tcl/tcl-8.6.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed manpage symlinks. Thanks to elyk.
|
|
|
|
|
tcl/tk-8.6.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/hexchat-2.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against shared library from pciutils-3.4.1.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Recompiled against poppler-0.42.0.
|
|
|
|
|
xfce/xfce4-power-manager-1.4.4-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Removed dead symlinks in documentation. Thanks to elyk.
|
|
|
|
|
extra/source/flashplayer-plugin/flashplayer-plugin.SlackBuild: Patched.
|
|
|
|
|
Scrape the webpage to determine the latest version.
|
|
|
|
|
Thanks to Eric Hameleers.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
usb-and-pxe-installers/usbimg2disk.sh: Patched.
|
|
|
|
|
Fixed the call to sfdisk to make the first partition active.
|
|
|
|
|
Thanks to Jonathan Woithe.
|
|
|
|
|
Leave syslinux files in the USB stick root rather than trying to move them.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 18 20:02:40 UTC 2016
|
|
|
|
|
d/git-2.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
NOTE: Issuing this patch again since the bug reporter listed the
|
|
|
|
|
wrong git version (2.7.1) as fixed. The vulnerability was actually
|
|
|
|
|
patched in git-2.7.4.
|
|
|
|
|
Fixed buffer overflows allowing server and client side remote code
|
|
|
|
|
execution in all git versions before 2.7.4.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://seclists.org/oss-sec/2016/q1/645
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/hexchat-2.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
extra/bash-completion/bash-completion-2.2-noarch-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patches to fix tar filename completion and related issues.
|
|
|
|
|
Thanks to Robby Workman.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Mar 17 22:09:16 UTC 2016
|
|
|
|
|
Good hello, let's call this Slackware 14.2 release candidate 1. We still
|
|
|
|
|
have a bit of work to do before this is fully ready to go, but we're done
|
|
|
|
|
doing every little upgrade that comes along. Well, mostly.
|
|
|
|
|
Have a great day, and beannachtai na Feile Padraig oraibh!
|
|
|
|
|
a/kernel-generic-4.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.6-x86-1.txz: Upgraded.
|
|
|
|
|
d/perl-5.22.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Also upgraded to DBD-mysql-4.033, URI-1.71, and XML-Simple-2.22.
|
|
|
|
|
k/kernel-source-4.4.6-noarch-1.txz: Upgraded.
|
|
|
|
|
l/M2Crypto-0.23.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/crda-3.18-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Upgraded to wireless-regdb-2016.02.08. Thanks to USUARIONUEVO.
|
|
|
|
|
n/nmap-7.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-45.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
extra/tigervnc/tigervnc-1.6.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Rebuilt for xorg-server-1.18.2.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
testing/source/linux-4.5-configs/*: Added.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Mar 15 23:53:18 UTC 2016
|
|
|
|
|
a/glibc-zoneinfo-2016b-noarch-1.txz: Upgraded.
|
|
|
|
|
a/procps-ng-3.3.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed buffer overflows allowing server and client side remote code
|
|
|
|
|
execution in all git versions before 2.7.1.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://seclists.org/oss-sec/2016/q1/645
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
kde/kdelibs-4.14.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/seamonkey-solibs-2.40-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ethtool-4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/gnuplot-5.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/seamonkey-2.40-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.seamonkey-project.org/releases/seamonkey2.40
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xfce/xfce4-clipman-plugin-1.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Mar 14 02:18:20 UTC 2016
|
|
|
|
|
a/grep-2.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sudo-1.8.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
New options: --with-insults --with-all-insults --with-pc-insults.
|
|
|
|
|
Sorry about this, I know it's a bit silly. ;-)
|
|
|
|
|
Thanks to chytraeus for the suggestion.
|
|
|
|
|
x/videoproto-2.3.3-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-1.2_20160125-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Rebuilt against ffmpeg-2.8.6.
|
|
|
|
|
Force lavf for flac because the native demuxer can't handle embedded album
|
|
|
|
|
art. As a bonus (or a regression) you'll also get album art if it exists.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-8.txz: Rebuilt.
|
|
|
|
|
Rebuilt against ffmpeg-2.8.6.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 10 23:43:47 UTC 2016
|
|
|
|
|
a/kernel-firmware-20160310git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.1530-x86_64-1.txz: Upgraded.
|
|
|
|
|
When building vim, we now fetch a prepatched archive from github rather than
|
|
|
|
|
applying hundreds or thousands of patches to the original sources. As a side
|
|
|
|
|
benefit, all you need to do in order to build the latest version of vim is
|
|
|
|
|
remove the existing tarball and run the SlackBuild again. It will scrape the
|
|
|
|
|
vim page at github for the latest version number and then fetch that version.
|
|
|
|
|
Thanks to USUARIONUEVO for posting a URL that got me thinking about it.
|
|
|
|
|
d/git-2.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.5-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.5-noarch-1.txz: Upgraded.
|
|
|
|
|
l/gtk+3-3.18.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssh-7.2p2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes a security bug:
|
|
|
|
|
sshd(8): sanitise X11 authentication credentials to avoid xauth
|
|
|
|
|
command injection when X11Forwarding is enabled.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openssh.com/txt/x11fwd.adv
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/vim-gvim-7.4.1530-x86_64-1.txz: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Use "mkfs.brtfs -f" in SeTpartitions. Thanks to Didier Spaier.
|
|
|
|
|
kernels/*: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Use "mkfs.brtfs -f" in SeTpartitions. Thanks to Didier Spaier.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 10 02:46:49 UTC 2016
|
|
|
|
|
a/cryptsetup-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/grep-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/htop-2.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/cmake-3.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.9.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdelibs-4.14.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca\@valencia-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.11-noarch-1.txz: Upgraded.
|
|
|
|
|
l/mozilla-nss-3.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.23 and nspr-4.12.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/nss.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/bind-9.10.3_P4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed security issues:
|
|
|
|
|
Duplicate EDNS COOKIE options in a response could trigger an assertion
|
|
|
|
|
failure. (CVE-2016-2088) [RT #41809]
|
|
|
|
|
Fix resolver assertion failure due to improper DNAME handling when
|
|
|
|
|
parsing fetch reply messages. (CVE-2016-1286) [RT #41753]
|
|
|
|
|
Malformed control messages can trigger assertions in named and rndc.
|
|
|
|
|
(CVE-2016-1285) [RT #41666]
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2088
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/gnupg-1.4.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lynx-2.8.8rel.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-openchrome-git_20160309_74e95a6-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Mar 9 01:36:14 UTC 2016
|
|
|
|
|
d/llvm-3.8.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
x/mesa-11.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against libLLVM-3.8.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Recompiled against libLLVM-3.8.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Mar 8 20:30:19 UTC 2016
|
|
|
|
|
l/shared-mime-info-1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/samba-4.3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs, and two security issues:
|
|
|
|
|
Incorrect ACL get/set allowed on symlink path (CVE-2015-7560).
|
|
|
|
|
Out-of-bounds read in internal DNS server (CVE-2016-0771).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-firefox-45.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Mar 8 01:54:33 UTC 2016
|
|
|
|
|
A few more updates. Thanks to Robby Workman for prepping most of
|
|
|
|
|
the minor version bumps.
|
|
|
|
|
a/acpid-2.0.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/ed-1.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/hwdata-0.284-noarch-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.145-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pciutils-3.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-filters-1.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/diffstat-1.60-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/enscript-1.6.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/foomatic-filters-4.0.17-x86_64-1.txz: Removed.
|
|
|
|
|
The cups-filters package contains these programs.
|
|
|
|
|
ap/lxc-1.1.5-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added modified versions of a few init scripts instead of having the
|
|
|
|
|
lxc-slackware template try to patch them (which invariably led to the
|
|
|
|
|
template breaking every time any of the other files were changed).
|
|
|
|
|
ap/man-pages-4.04-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/sysstat-11.2.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/binutils-2.26-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Rebuilt with --enable-install-libiberty, since the binutils version of
|
|
|
|
|
libiberty.a will be built with -fPIC where needed.
|
|
|
|
|
d/cscope-15.8b-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Rebuilt with --disable-install-libiberty.
|
|
|
|
|
d/gcc-g++-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-5.3.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/pkg-config-0.29.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-setuptools-20.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/LibRaw-0.17.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/aspell-0.60.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/fribidi-0.19.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/fuse-2.9.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+2-2.24.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.26.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgsf-1.14.36-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libnl3-3.2.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsecret-0.18.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libwpg-0.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/mpfr-3.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pycurl-7.43.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/v4l-utils-1.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nettle-3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/netwatch-1.3.1_2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssh-7.2p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Alan Brantley for updating the libwrap patch.
|
|
|
|
|
n/p11-kit-0.23.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.19
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/libdrm-2.4.67-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libva-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libva-intel-driver-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.18.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied a patch to fix crashes when making MPlayer (and some other video
|
|
|
|
|
players) go fullscreen after a resume. Thanks to orbea.
|
|
|
|
|
x/xorg-server-xephyr-1.18.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.18.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.18.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/geeqie-1.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix crashes and high CPU usage when used with modern versions
|
|
|
|
|
of GTK+. Thanks to Jas for pointing out the patch in upstream git.
|
|
|
|
|
extra/bash-completion/bash-completion-2.2-noarch-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 4 18:22:42 UTC 2016
|
|
|
|
|
a/kernel-generic-4.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.144-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/mdadm-3.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/upower-0.9.23-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added several patches from the git master branch, including one to prevent
|
|
|
|
|
a bluetooth mouse or keyboard from being improperly detected as a power
|
|
|
|
|
source. Thanks to Robby Workman.
|
|
|
|
|
ap/texinfo-6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.4-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.4-noarch-1.txz: Upgraded.
|
|
|
|
|
l/dbus-glib-0.106-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dbus-python-1.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/conntrack-tools-1.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gnutls-3.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/iproute2-4.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/iptables-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/irssi-0.8.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libnetfilter_conntrack-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libnftnl-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nftables-0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/stunnel-5.31-x86_64-1.txz: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Mar 3 20:05:41 UTC 2016
|
|
|
|
|
ap/mariadb-10.0.24-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with patched binutils.
|
|
|
|
|
d/binutils-2.26-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patches for several bugs, including:
|
|
|
|
|
PR ld/19698
|
|
|
|
|
* elflink.c (bfd_elf_record_link_assignment): Set versioned if
|
|
|
|
|
symbol version is unknown.
|
|
|
|
|
Which was causing MariaDB to fail to start properly for Akonadi.
|
|
|
|
|
d/python-2.7.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
Thanks to Matteo Bernardini.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
l/neon-0.30.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
Thanks to Matteo Bernardini.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 3 05:41:26 UTC 2016
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-10.txz: Rebuilt.
|
|
|
|
|
a/kernel-firmware-20160302git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.2g-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-30.txz: Rebuilt.
|
|
|
|
|
rc.M: Start D-Bus and NetworkManager right after rc.inet1.
|
|
|
|
|
ap/ksh93-2012_08_01-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed broken locale files. Thanks to Didier Spaier.
|
|
|
|
|
ap/nano-2.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.11.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.1424-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/ruby-2.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libssh2-1.7.0-x86_64-1.txz: Moved.
|
|
|
|
|
Moved from N -> L series to be consistent with libssh.
|
|
|
|
|
l/poppler-0.41.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qca-2.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qca-cyrus-sasl-2.0.0_beta3-x86_64-2.txz: Removed.
|
|
|
|
|
l/qca-gnupg-2.0.0_beta3-x86_64-1.txz: Removed.
|
|
|
|
|
l/qca-ossl-2.0.0_beta3-x86_64-3.txz: Removed.
|
|
|
|
|
l/qt-4.8.7-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
n/curl-7.47.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
n/fetchmail-6.3.26-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
n/httpd-2.4.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/links-2.12-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
n/mailx-12.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Drop SSLv2 support (no longer supported by OpenSSL), and fix security issues
|
|
|
|
|
that could allow a local attacker to cause mailx to execute arbitrary
|
|
|
|
|
shell commands through the use of a specially-crafted email address.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/openssl-1.0.2g-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
|
|
|
|
|
Double-free in DSA code (CVE-2016-0705)
|
|
|
|
|
Memory leak in SRP database lookups (CVE-2016-0798)
|
|
|
|
|
BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
|
|
|
|
|
Fix memory issues in BIO_*printf functions (CVE-2016-0799)
|
|
|
|
|
Side channel attack on modular exponentiation (CVE-2016-0702)
|
|
|
|
|
Note that this package drops all support for SSLv2, which breaks the ABI for
|
|
|
|
|
any binaries that make use of SSLv2_client_method.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv/20160301.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://php.net/ChangeLog-5.php#5.6.18
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/stunnel-5.30-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Allow OpenSSL to use the default key size for DH in generate-stunnel-key.sh.
|
|
|
|
|
Thanks to Markus Reichelt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
n/wget-1.17.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to drop support for OpenSSL SSLv2.
|
|
|
|
|
tcl/expect-5.45-x86_64-1.txz: Upgraded.
|
|
|
|
|
tcl/tcl-8.6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
tcl/tk-8.6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160229_d167280-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xrandr-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/vim-gvim-7.4.1424-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xpdf-3.04-x86_64-2.txz: Rebuilt.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Another attempt to get /sbin/probe to reliably handle nvme partitions.
|
|
|
|
|
Thanks to w9cf and Grant Coady.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Another attempt to get /sbin/probe to reliably handle nvme partitions.
|
|
|
|
|
Thanks to w9cf and Grant Coady.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Feb 26 22:54:05 UTC 2016
|
|
|
|
|
a/btrfs-progs-v4.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sdparm-1.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-10.0.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gdb-7.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.3-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/kdepimlibs-4.14.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against libical-2.0.0.
|
|
|
|
|
l/gtk+3-3.18.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libical-2.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/libssh-0.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed weak key generation. Due to a bug in the ephemeral secret key
|
|
|
|
|
generation for the diffie-hellman-group1 and diffie-hellman-group14
|
|
|
|
|
methods, ephemeral secret keys of size 128 bits are generated, instead
|
|
|
|
|
of the recommended sizes of 1024 and 2048 bits, giving a practical
|
|
|
|
|
security of 63 bits.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/sg3_utils-1.42-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bluez-5.37-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against libical-2.0.0.
|
|
|
|
|
n/libssh2-1.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed weak key generation. During the SSHv2 handshake when libssh2 is to
|
|
|
|
|
get a suitable value for 'group order' in the Diffle Hellman negotiation,
|
|
|
|
|
it would pass in number of bytes to a function that expected number of bits.
|
|
|
|
|
This would result in the library generating numbers using only an 8th the
|
|
|
|
|
number of random bits than what were intended: 128 or 256 bits instead of
|
|
|
|
|
1023 or 2047. Using such drastically reduced amount of random bits for
|
|
|
|
|
Diffie Hellman weakended the handshake security significantly.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/mesa-11.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/orage-4.12.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against libical-2.0.0.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Feb 23 19:31:59 UTC 2016
|
|
|
|
|
a/glibc-solibs-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/procps-ng-3.3.10-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Restored FROM field in w. Thanks to Stuart Winter.
|
|
|
|
|
ap/cups-2.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Corrected CXXFLAGS to fix build for older CPUs. Thanks to ecd102.
|
|
|
|
|
ap/mc-4.8.15-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix displaying man pages. Thanks to DarkVision.
|
|
|
|
|
d/kernel-headers-4.4.2-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.2-noarch-1.txz: Upgraded.
|
|
|
|
|
Key .config changes for this kernel update:
|
|
|
|
|
CHECKPOINT_RESTORE n -> y
|
|
|
|
|
DEBUG_KERNEL n -> y
|
|
|
|
|
EXPERT n -> y
|
|
|
|
|
NR_CPUS 128 -> 256
|
|
|
|
|
KALLSYMS_ALL y
|
|
|
|
|
LIVEPATCH y
|
|
|
|
|
l/GConf-3.2.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched "GConf-WARNING **: Client failed to connect to the D-BUS daemon:"
|
|
|
|
|
and added a couple other patches from git. Thanks to Robby Workman.
|
|
|
|
|
l/alsa-lib-1.1.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Changed the default /etc/asound.conf.new to use a different configuration
|
|
|
|
|
for PulseAudio that is less likely to cause issues than the previous one,
|
|
|
|
|
especially on machines where the analog output is not recognized as card 0
|
|
|
|
|
by the BIOS. Thanks to Ryan P.C. McQuen who went above and beyond on this
|
|
|
|
|
bug report by convincing upstream to recommend this on their website in
|
|
|
|
|
order to convince me to make the change. :-)
|
|
|
|
|
l/glibc-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
Of the security fixes, the most important and well-publicized is the
|
|
|
|
|
stack-based buffer overflow in libresolv that could allow specially
|
|
|
|
|
crafted DNS responses to seize control of execution flow in the DNS
|
|
|
|
|
client (CVE-2015-7547). However, due to a patch applied to Slackware's
|
|
|
|
|
glibc back in 2009 (don't use the gethostbyname4() lookup method as it
|
|
|
|
|
was causing some cheap routers to misbehave), we were not vulnerable to
|
|
|
|
|
that issue. The rest of the fixed security issues are less critical.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/glibc-i18n-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-profile-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libproxy-0.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.3_P3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes two possible denial-of-service issues:
|
|
|
|
|
render_ecs errors were mishandled when printing out a OPT record resulting
|
|
|
|
|
in a assertion failure. (CVE-2015-8705) [RT #41397]
|
|
|
|
|
Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/libgcrypt-1.6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Mitigate side-channel attack on ECDH with Weierstrass curves.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.cs.tau.ac.IL/~tromer/ecdh/
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/nmap-7.01-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ntp-4.2.8p6-x86_64-1.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes
|
|
|
|
|
several low and medium severity vulnerabilities.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/xf86-video-amdgpu-1.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/blueman-2.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Rewrite launcher scripts to use #!/usr/bin/python2.7 rather than
|
|
|
|
|
#!/usr/bin/env python.
|
|
|
|
|
For details, see: https://github.com/blueman-project/blueman/issues/435
|
|
|
|
|
Thanks to zakame and Robby Workman.
|
|
|
|
|
extra/tigervnc/tigervnc-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Feb 14 19:40:04 UTC 2016
|
|
|
|
|
xap/mozilla-thunderbird-38.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Feb 11 21:56:21 UTC 2016
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-29.txz: Rebuilt.
|
|
|
|
|
rc.S: Avoid mounting /dev/shm twice.
|
|
|
|
|
Thanks to Andrzej Telszewski and GazL.
|
|
|
|
|
rc.6, rc.K: Match 'type nfs ' rather than 'type nfs' to avoid false hits
|
|
|
|
|
(and error messages) from matching nfsd pseudo-filesystems.
|
|
|
|
|
Thanks to Jonathan Woithe.
|
|
|
|
|
ap/hplip-3.16.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/htop-2.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/freetype-2.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libcap-ng-0.7.7-x86_64-1.txz: Added.
|
|
|
|
|
This is needed by mount.cifs in order to support making it setuid so that
|
|
|
|
|
normal users can mount remote CIFS partitions. And it is expected that
|
|
|
|
|
other programs will begin to use it in preference to the older libcap.
|
|
|
|
|
n/cifs-utils-6.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against libcap-ng. Now mount.cifs will work for normal users
|
|
|
|
|
if setuid root. By default, mount.cifs remains NOT setuid root, though.
|
|
|
|
|
x/pixman-0.34.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-r128-6.10.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-44.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Feb 8 22:08:35 UTC 2016
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Blacklisted rules.d/60-openobex.rules to prevent error messages at boot.
|
|
|
|
|
Thanks to Eric Hameleers.
|
|
|
|
|
ap/cups-2.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/ghostscript-9.07-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Reverted back to ghostscript-9.07, since any newer version causes the GIMP
|
|
|
|
|
ps plugin to crash when attempting to import a .ps or .eps file. Whatever
|
|
|
|
|
is causing the problem happened between gs-9.07 and gs-9.09, and is probably
|
|
|
|
|
also dependent on the libraries in use and perhaps the compiler, since some
|
|
|
|
|
other distributions appear to be using the latest ghostscript without issues.
|
|
|
|
|
If anyone can figure it out, hints are welcome. Meanwhile this gets
|
|
|
|
|
everything working again.
|
|
|
|
|
d/gcc-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix internal compiler error building Wine.
|
|
|
|
|
Thanks to Kirill Smirnov.
|
|
|
|
|
d/gcc-g++-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-5.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libsndfile-1.0.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes security issues which may allow attackers to cause
|
|
|
|
|
a denial of service, or possibly execute arbitrary code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/loudmouth-1.5.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.47.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where NTLM credentials are not checked
|
|
|
|
|
for proxy connection reuse. The effects of this flaw is that the application
|
|
|
|
|
could be reusing a proxy connection using the previously used credentials
|
|
|
|
|
and thus it could be given to or prevented access from resources that it
|
|
|
|
|
wasn't intended to. Thanks to Isaac Boukris.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://curl.haxx.se/docs/adv_20160127A.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/mcabber-1.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/stunnel-5.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20160208_8b8c9a3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-44.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/wicd/wicd-1.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Feb 3 22:39:25 UTC 2016
|
|
|
|
|
Welcome to Slackware 14.2 beta 2. Getting closer. :-)
|
|
|
|
|
a/coreutils-8.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-zoneinfo-2016a-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20160201git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.141-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.2f-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-28.txz: Rebuilt.
|
|
|
|
|
rc.6: Change command variable to shutdown_command to avoid conflicting with
|
|
|
|
|
a same-named variable in rc.networkmanager. Thanks to Antonio Maretzek.
|
|
|
|
|
Added new script rc.cpufreq to set CPU frequency scaling.
|
|
|
|
|
If executable, it will be run from rc.M.
|
|
|
|
|
ap/cups-filters-1.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/dmidecode-3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gutenprint-5.2.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Run cups-genppdupdate after installing. Thanks to Lukasz Wieczorek.
|
|
|
|
|
ap/soma-2.10.4-noarch-1.txz: Upgraded.
|
|
|
|
|
d/binutils-2.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/cmake-3.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.4.1-x86-1.txz: Upgraded.
|
|
|
|
|
d/mercurial-3.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/oprofile-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-setuptools-19.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.4.1-noarch-1.txz: Upgraded.
|
|
|
|
|
CPU_FREQ_DEFAULT_GOV_ONDEMAND n -> y
|
|
|
|
|
CPU_FREQ_DEFAULT_GOV_USERSPACE y -> n
|
|
|
|
|
CPU_FREQ_GOV_CONSERVATIVE m -> y
|
|
|
|
|
CPU_FREQ_GOV_ONDEMAND m -> y
|
|
|
|
|
CPU_FREQ_GOV_PERFORMANCE m -> y
|
|
|
|
|
CPU_FREQ_GOV_POWERSAVE m -> y
|
|
|
|
|
l/gst-plugins-base-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+2-2.24.29-x86_64-2.txz: Rebuilt.
|
|
|
|
|
In /usr/share/gtk-2.0/gtkrc, specify Adwaita as the icon theme, and Tango as
|
|
|
|
|
a fallback. This fixes icon issues when using fluxbox and other more basic
|
|
|
|
|
window managers. Thanks to schmatzler and dTd.
|
|
|
|
|
l/gtk+3-3.18.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/librsvg-2.40.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pulseaudio-8.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Set "flat-volumes = no" in daemon.conf.new by default.
|
|
|
|
|
l/seamonkey-solibs-2.39-x86_64-3.txz: Rebuilt.
|
|
|
|
|
n/openssl-1.0.2f-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
DH small subgroups (CVE-2016-0701).
|
|
|
|
|
SSLv2 doesn't block disabled ciphers (CVE-2015-3197).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://openssl.org/news/secadv/20160128.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0701
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/proftpd-1.3.5a-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/traceroute-2.0.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xterm-322-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-1.2_20160125-x86_64-1.txz: Upgraded.
|
|
|
|
|
This is the latest MPlayer-1.2 branch, identical to the 1.2.1 stable release.
|
|
|
|
|
The bundled ffmpeg has been upgraded to 2.8.5, which fixes two security
|
|
|
|
|
issues by which a remote attacker may conduct a cross-origin attack and read
|
|
|
|
|
arbitrary files on the system.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/gparted-0.25.0-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Erik W. Hanson.
|
|
|
|
|
xap/hexchat-2.10.2-x86_64-1.txz: Added.
|
|
|
|
|
This package replaces xchat.
|
|
|
|
|
xap/mozilla-firefox-44.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This compiles properly with -O2 optimization again.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/pidgin-2.10.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/seamonkey-2.39-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled with -Os optimization to fix random crashes.
|
|
|
|
|
xap/xchat-2.8.8-x86_64-11.txz: Removed.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Rebuilt against ffmpeg-2.8.5, which fixes two security issues by which a
|
|
|
|
|
remote attacker may conduct a cross-origin attack and read arbitrary files
|
|
|
|
|
on the system.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Jan 17 07:24:08 UTC 2016
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-27.txz: Upgraded.
|
|
|
|
|
rc.M: If rc.pulseaudio is executable, run it (not recommended though).
|
|
|
|
|
ap/alsa-utils-1.1.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
On a fresh system, install rc.alsa as executable. It's apparently still
|
|
|
|
|
useful for loading some mixer defaults even when PulseAudio is used.
|
|
|
|
|
ap/cups-filters-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gutenprint-5.2.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lxc-1.1.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed failed rc.M patch with lxc-create, and rebased against recent scripts.
|
|
|
|
|
Thanks to Jakub Jankowski.
|
|
|
|
|
ap/mpg123-1.22.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Don't depend on libpulsecommon-7.1.
|
|
|
|
|
ap/sox-14.4.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Don't depend on libpulsecommon-7.1.
|
|
|
|
|
d/llvm-3.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.9.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca@valencia-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.10-noarch-1.txz: Upgraded.
|
|
|
|
|
l/a52dec-0.7.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Include a52_internal.h header. Thanks to Johannes Sch<63>pfer.
|
|
|
|
|
l/alsa-plugins-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Don't depend on libpulsecommon-7.1.
|
|
|
|
|
l/libao-1.2.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Don't depend on libpulsecommon-7.1.
|
|
|
|
|
l/libcanberra-0.30-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Don't depend on libpulsecommon-7.1.
|
|
|
|
|
l/poppler-0.40.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pulseaudio-7.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed .la files to avoid linking things to libpulsecommon-7.1.
|
|
|
|
|
Thanks to chrisVV.
|
|
|
|
|
If autospawn is off, start the daemon manually in start-pulseaudio-x11.
|
|
|
|
|
And yes, if you're allergic to PulseAudio that means you might also need to
|
|
|
|
|
disable /etc/xdg/autostart/pulseaudio.desktop...
|
|
|
|
|
n/NetworkManager-1.0.10-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fixed build script to properly apply the patches.
|
|
|
|
|
Thanks to K4rolis and rworkman.
|
|
|
|
|
n/bluez-hcidump-2.5-x86_64-1.txz: Removed.
|
|
|
|
|
hcidump is included in the main bluez package.
|
|
|
|
|
Thanks to Audrius Kazukauskas.
|
|
|
|
|
x/mesa-11.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-vmmouse-13.1.0-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Put udev rules in correct directory. Thanks to chrisVV.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-4.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jan 15 02:29:54 UTC 2016
|
|
|
|
|
l/gtkmm2-2.24.4-x86_64-1.txz: Added.
|
|
|
|
|
n/openssh-7.1p2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes an information leak and a buffer overflow. In particular,
|
|
|
|
|
the information leak allows a malicious SSH server to steal the client's
|
|
|
|
|
private keys. Thanks to Qualys for reporting this issue.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 13 00:01:23 UTC 2016
|
|
|
|
|
Hey folks, happy new year!
|
|
|
|
|
After upgrading to BlueZ 5 recently, everything seemed to be working great,
|
|
|
|
|
but then it was pointed out that Bluetooth audio was no longer working.
|
|
|
|
|
The reason was that the newer BlueZ branch had dropped ALSA support and now
|
|
|
|
|
required PulseAudio. So with some trepidation, we began investigating adding
|
|
|
|
|
PulseAudio to Slackware. Going back to BlueZ 4 wasn't an option with various
|
|
|
|
|
dependent projects either having dropped support for it, or considering doing
|
|
|
|
|
so. After several iterations here refining the foundation packages and
|
|
|
|
|
recompiling and tweaking other packages to use PulseAudio, it's working well
|
|
|
|
|
and you'll likely not notice much of a change. But if you're using Bluetooth
|
|
|
|
|
audio, or needing to direct audio through HDMI, you'll probably find it a lot
|
|
|
|
|
easier to accomplish that.
|
|
|
|
|
Best of all, we're finally a modern, relevant Linux distro! ;-)
|
|
|
|
|
Thanks to Mario Preksavec, Heinz Wiesinger, and Robby Workman for a lot of
|
|
|
|
|
help and testing. Bug reports, complaints, and threats can go to me.
|
|
|
|
|
Also, enjoy a shiny new LTS 4.4.0 kernel and consider this 14.2 beta 1.
|
|
|
|
|
a/apmd-3.2.2-x86_64-3.txz: Removed.
|
|
|
|
|
APM is no longer used in the shipped kernels, xapm was broken, and
|
|
|
|
|
it no longer compiles. It's time to remove it.
|
|
|
|
|
a/etc-14.2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Added user (pulse) and group (pulse) for PulseAudio.
|
|
|
|
|
Added pulse user to the audio group.
|
|
|
|
|
a/eudev-3.1.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
Blacklisted new watchdog modules (bcm7038_wdt, max63xx_wdt).
|
|
|
|
|
a/kernel-generic-4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-26.txz: Rebuilt.
|
|
|
|
|
rc.M: Don't try to start apmd.
|
|
|
|
|
ap/alsa-utils-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Change perms on /etc/rc.d/rc.alsa to 644.
|
|
|
|
|
ap/ghostscript-9.18-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix missing gerrors.h.
|
|
|
|
|
ap/mpg123-1.22.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Add support for PulseAudio and use it for output by default.
|
|
|
|
|
ap/pamixer-1.3.1-x86_64-1.txz: Added.
|
|
|
|
|
A command-line mixer for PulseAudio.
|
|
|
|
|
ap/sox-14.4.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/kernel-headers-4.4-x86-1.txz: Upgraded.
|
|
|
|
|
d/perl-5.22.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added TermReadKey for MariaDB's mytop. Thanks to Larry Hajali.
|
|
|
|
|
Removed dangling s2p symlinks. Thanks to DarkVision.
|
|
|
|
|
k/kernel-source-4.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/kde-runtime-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/kmix-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/alsa-lib-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added a default /etc/asound.conf redirecting ALSA output to PulseAudio.
|
|
|
|
|
l/alsa-plugins-1.1.0-x86_64-1.txz: Added.
|
|
|
|
|
This provides a plugin to redirect ALSA output to PulseAudio.
|
|
|
|
|
l/atkmm-2.24.2-x86_64-1.txz: Added.
|
|
|
|
|
l/cairomm-1.12.0-x86_64-1.txz: Added.
|
|
|
|
|
l/glibmm-2.46.3-x86_64-1.txz: Added.
|
|
|
|
|
l/gst-plugins-good-1.6.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gst-plugins-good0-0.10.31-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gtkmm3-3.18.0-x86_64-1.txz: Added.
|
|
|
|
|
l/json-c-0.12-x86_64-1.txz: Added.
|
|
|
|
|
This is needed by PulseAudio.
|
|
|
|
|
l/keybinder-0.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Add support for GTK+3, which is needed by xfce4-pulseaudio-plugin to grab
|
|
|
|
|
multimedia keys.
|
|
|
|
|
l/libao-1.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libasyncns-0.8-x86_64-1.txz: Added.
|
|
|
|
|
This is needed by PulseAudio.
|
|
|
|
|
l/libcanberra-0.30-x86_64-4.txz: Rebuilt.
|
|
|
|
|
l/libsigc++-2.6.2-x86_64-1.txz: Added.
|
|
|
|
|
l/pangomm-2.38.1-x86_64-1.txz: Added.
|
|
|
|
|
l/phonon-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/pulseaudio-7.1-x86_64-1.txz: Added.
|
|
|
|
|
l/qt-4.8.7-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Make sure that .pc and .la files use $LIBDIRSUFFIX in the X11 library path.
|
|
|
|
|
Thanks to Dhaby Xiloj.
|
|
|
|
|
l/sdl-1.2.15-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/seamonkey-solibs-2.39-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/speexdsp-1.2rc3-x86_64-1.txz: Added.
|
|
|
|
|
This is needed by PulseAudio.
|
|
|
|
|
l/xapian-core-1.2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added patches from the upstream stable git branch.
|
|
|
|
|
Added back the pm-utils hook.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/bluez-5.37-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dhcp-4.3.3_P1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a denial-of-service vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/dirmngr-1.1.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched to fix problems when using libgcrypt-1.6.x. Thanks to xflow7.
|
|
|
|
|
n/inetd-1.79s-x86_64-9.txz: Rebuilt.
|
|
|
|
|
Patched segfault of daytime. Thanks to tfonz.
|
|
|
|
|
x/libdrm-2.4.66-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-evdev-2.10.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-amdgpu-1.0.0-x86_64-1.txz: Added.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-5.txz: Removed.
|
|
|
|
|
This driver has been incorporated into the xorg-server package.
|
|
|
|
|
Thanks to ReaperX.
|
|
|
|
|
x/xorg-cf-files-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Don't use noarch. Thanks to DarkVision.
|
|
|
|
|
xap/MPlayer-20150721-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/audacious-3.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/audacious-plugins-3.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-43.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/pavucontrol-3.0-x86_64-1.txz: Added.
|
|
|
|
|
A mixer for PulseAudio. Requires the GTKmm stack.
|
|
|
|
|
xap/seamonkey-2.39-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-6.txz: Rebuilt.
|
|
|
|
|
xfce/Thunar-1.6.10-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fix some crashes that occur with file moves.
|
|
|
|
|
Thanks to Jean-Philippe Guillemin.
|
|
|
|
|
xfce/xfce4-mixer-4.10.0-x86_64-2.txz: Removed.
|
|
|
|
|
Replaced by xfce4-pulseaudio-plugin.
|
|
|
|
|
xfce/xfce4-power-manager-1.4.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Don't include NetworkManager; let pm-utils handle it.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
xfce/xfce4-pulseaudio-plugin-0.2.4-x86_64-1.txz: Added.
|
|
|
|
|
This replaces xfce4-mixer and xfce4-volumed.
|
|
|
|
|
xfce/xfce4-volumed-0.1.13-x86_64-3.txz: Removed.
|
|
|
|
|
Replaced by xfce4-pulseaudio-plugin.
|
|
|
|
|
extra/bash-completion/bash-completion-2.1-noarch-4.txz: Rebuilt.
|
|
|
|
|
Corrected information in slack-desc. Thanks to Arkadiusz Drabczyk.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
pasture/apmd-3.2.2-x86_64-3.txz: Moved to /pasture.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Dec 29 04:45:53 UTC 2015
|
|
|
|
|
a/aaa_base-14.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Removed obsolete /var/rwho symlink. Thanks to yars.
|
|
|
|
|
Bumped version to 14.2.
|
|
|
|
|
a/glibc-solibs-2.22-x86_64-4.txz: Rebuilt.
|
|
|
|
|
a/quota-4.03-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.22-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Removed /usr/include/rpcsvc/rquota.{h,x}, as these are provided by the
|
|
|
|
|
quota package. Thanks to BrZ.
|
|
|
|
|
l/glibc-i18n-2.22-x86_64-4.txz: Rebuilt.
|
|
|
|
|
l/glibc-profile-2.22-x86_64-4.txz: Rebuilt.
|
|
|
|
|
l/pycurl-7.19.5.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added --with-ssl to use libssl. Thanks to walecha.
|
|
|
|
|
xap/mozilla-firefox-43.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Dec 24 20:49:54 UTC 2015
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Patched /sbin/probe to handle nvme partitions. Thanks to Didier Spaier.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Patched /sbin/probe to handle nvme partitions. Thanks to Didier Spaier.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 23 22:44:58 UTC 2015
|
|
|
|
|
a/lvm2-2.02.138-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/ghostscript-9.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lsof-4.89-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pycups-1.9.73-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pycurl-7.19.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.46.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/links-2.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/obexfs-0.12-x86_64-1.txz: Removed.
|
|
|
|
|
This functionality is now included in the obexftp package.
|
|
|
|
|
n/obexftp-0.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/openobex-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/rsync-3.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXi-1.7.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/pixman-0.33.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-cf-files-1.0.6-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-43.0.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Compile with -Os instead of -O2 to work around crash issues.
|
|
|
|
|
Recent betas are working fine with -O2, so we'll probably be
|
|
|
|
|
able to switch back to that again soon. Thanks to j_v.
|
|
|
|
|
xap/mozilla-thunderbird-38.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/network-manager-applet-1.0.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 23 05:20:09 UTC 2015
|
|
|
|
|
a/glibc-solibs-2.22-x86_64-3.txz: Rebuilt.
|
|
|
|
|
a/sharutils-4.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-filters-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/libx86-1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Add a pkgconfig file.
|
|
|
|
|
ap/rpm-4.12.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vbetool-1.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/Cython-0.23.4-x86_64-1.txz: Added.
|
|
|
|
|
Cython is required to build blueman.
|
|
|
|
|
kde/bluedevil-2.1.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/M2Crypto-0.22.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/djvulibre-3.5.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/fuse-2.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.22-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fixed empty /etc/nscd.conf.new. Thanks to Jakub Jankowski.
|
|
|
|
|
l/glibc-i18n-2.22-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/glibc-profile-2.22-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/libcroco-0.6.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libssh-0.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libxml2-2.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/loudmouth-1.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/sbc-1.3-x86_64-1.txz: Added.
|
|
|
|
|
Sub Band Codec is an audio library for bluetooth.
|
|
|
|
|
n/ModemManager-1.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed obsolete 55NetworkManager script.
|
|
|
|
|
n/bluez-5.36-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Dugan Chen and Robby Workman.
|
|
|
|
|
n/cifs-utils-6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libtirpc-1.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed typo in slack-desc. Thanks to Ricardo Nabinger Sanchez.
|
|
|
|
|
n/mcabber-1.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nfs-utils-1.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/obex-data-server-0.4.6-x86_64-3.txz: Removed.
|
|
|
|
|
n/openvpn-2.3.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.0.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/blueman-2.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
This update fixes a local privilege escalation vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-firefox-43.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Fixed NFS install. Thanks to Stuart Winter.
|
|
|
|
|
Added nvme and sdhci-acpi kernel modules.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Fixed NFS install. Thanks to Stuart Winter.
|
|
|
|
|
Added nvme and sdhci-acpi kernel modules.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Dec 18 05:28:25 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-9.txz: Rebuilt.
|
|
|
|
|
Added libstdc++.so.5.0.7. Thanks to schmatzler.
|
|
|
|
|
a/glibc-solibs-2.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/glibc-zoneinfo-2015g-noarch-2.txz: Rebuilt.
|
|
|
|
|
This is now built independently from glibc.
|
|
|
|
|
Don't list posix/ and right/ zones in the timeconfig menu.
|
|
|
|
|
Hardlink more files in /usr/share/zoneinfo/posix/ to save space.
|
|
|
|
|
Fix a bug in timeconfig when the zone selection in text mode is left empty.
|
|
|
|
|
Thanks to Xsane for the suggestions... I used some of them. :) But,
|
|
|
|
|
in my opinion, listing only the canonical timezone names in zone1970.tab
|
|
|
|
|
goes a bit too far. Many of the non-canonical names are commonly used
|
|
|
|
|
(such as US/Central vs. America/Chicago).
|
|
|
|
|
a/grub-2.00-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched bug where password protection during system startup may be
|
|
|
|
|
bypassed by hitting the backspace key 28 times giving a rescue shell.
|
|
|
|
|
Thanks to Hector Marco and Ismael Ripoll.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
a/mcelog-128-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/os-prober-1.70-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pcmciautils-018-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sdparm-1.09-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/usbutils-008-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/joe-4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mpg123-1.22.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/M2Crypto-0.22.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Don't include a copy of the timezone database or timeconfig script.
|
|
|
|
|
Only ship locale files for C, POSIX, and en_US in the main package.
|
|
|
|
|
l/glibc-i18n-2.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Add a C.UTF-8 locale.
|
|
|
|
|
l/glibc-profile-2.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/keyutils-1.5.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/sg3_utils-1.41-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gnupg2-2.0.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gpa-0.9.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gpgme-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libassuan-2.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libgcrypt-1.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libgpg-error-1.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libksba-1.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/pinentry-0.9.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ulogd-2.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/bash-completion/bash-completion-2.1-noarch-3.txz: Rebuilt.
|
|
|
|
|
Create /etc/bash_completion.d/ in the bash-completion package.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 16 07:03:12 UTC 2015
|
|
|
|
|
ap/slackpkg-2.82.0-noarch-16.txz: Rebuilt.
|
|
|
|
|
Bugfix for a syntax error in core-functions.sh.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 16 04:21:07 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-8.txz: Rebuilt.
|
|
|
|
|
a/kernel-firmware-20151215git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.1.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.1.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.1.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lrzip-0.621-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.137-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/ncompress-4.2.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.2e-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/patch-2.7.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysklogd-1.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
rc.syslog: Don't run klogd in a container.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-25.txz: Rebuilt.
|
|
|
|
|
rc.modules: New simplfied module dep script.
|
|
|
|
|
NOTE: This will be installed as /etc/rc.d/rc.modules.new by default.
|
|
|
|
|
To use it, remove the existing rc.modules symlink and move the new
|
|
|
|
|
file into place.
|
|
|
|
|
rc.modules.local: New local module loading script.
|
|
|
|
|
Thanks to GazL and rworkman for helping clean out the rc.modules cruft.
|
|
|
|
|
rc.S: If executable, start rc.cgmanager.
|
|
|
|
|
rc.6: If executable, stop rc.cgmanager.
|
|
|
|
|
a/tree-1.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/usb_modeswitch-2.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/utempter-1.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/util-linux-2.27.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/which-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/xfsprogs-4.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cgmanager-0.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Matteo Bernardini and Robby Workman.
|
|
|
|
|
ap/cups-2.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-filters-1.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
foomatic-rip: SECURITY FIX: Also consider the back tick ('`') as an illegal
|
|
|
|
|
shell escape character.
|
|
|
|
|
Thanks to Michal Kowalczyk from the Google Security Team for the hint.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/man-pages-4.03-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/qpdf-6.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
ap/slackpkg-2.82.0-noarch-15.txz: Rebuilt.
|
|
|
|
|
Don't blacklist aaa_elflibs. Upgrade it right after glibc-solibs.
|
|
|
|
|
Suggest http://mirrors.slackware.com rather than ftp (which won't redirect).
|
|
|
|
|
Prompt to restart the upgrade process if slackpkg is upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
ap/terminus-font-4.40-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/xfsdump-3.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/cmake-3.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/flex-2.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-java-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-objc-5.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gdb-7.10.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.1.15-x86-1.txz: Upgraded.
|
|
|
|
|
d/libtool-2.4.6-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Rebuilt to fix embedded GCC version number.
|
|
|
|
|
d/nasm-2.11.08-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-2.7.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/scons-2.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-4.1.15-noarch-1.txz: Upgraded.
|
|
|
|
|
l/cairo-1.14.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dconf-editor-3.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gdk-pixbuf2-2.32.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+2-2.24.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+3-3.18.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/iso-codes-3.63-noarch-1.txz: Upgraded.
|
|
|
|
|
l/libcroco-0.6.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgphoto2-2.5.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix Nikon CoolPix Sxxxx detection.
|
|
|
|
|
Thanks to Ondrej Kubecka and Marcus Meissner.
|
|
|
|
|
l/libnih-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Write .pid files in /run, not /var/run.
|
|
|
|
|
l/libpng-1.6.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed incorrect implementation of png_set_PLTE() that uses png_ptr
|
|
|
|
|
not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126
|
|
|
|
|
vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libraw1394-2.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/neon-0.30.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.3_P2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes three security issues:
|
|
|
|
|
Update allowed OpenSSL versions as named is potentially vulnerable
|
|
|
|
|
to CVE-2015-3193.
|
|
|
|
|
Insufficient testing when parsing a message allowed records with an
|
|
|
|
|
incorrect class to be be accepted, triggering a REQUIRE failure when
|
|
|
|
|
those records were subsequently cached. (CVE-2015-8000)
|
|
|
|
|
Address fetch context reference count handling error on socket error.
|
|
|
|
|
(CVE-2015-8461)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8461
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/dhcp-4.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dnsmasq-2.75-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ethtool-4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/iw-4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libtirpc-1.0.1-x86_64-1.txz: Added.
|
|
|
|
|
This is needed by rpcbind. Thanks to Jan Rafaj.
|
|
|
|
|
n/mobile-broadband-provider-info-20151214-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.2e-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193).
|
|
|
|
|
Certificate verify crash with missing PSS parameter (CVE-2015-3194).
|
|
|
|
|
X509_ATTRIBUTE memory leak (CVE-2015-3195).
|
|
|
|
|
Race condition handling PSK identify hint (CVE-2015-3196).
|
|
|
|
|
Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794).
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://openssl.org/news/secadv_20151203.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/portmap-6.0-x86_64-1.txz: Removed.
|
|
|
|
|
This is replaced by the new libtirpc and rpcbind packages.
|
|
|
|
|
n/rpcbind-0.2.3-x86_64-1.txz: Added.
|
|
|
|
|
This replaces the portmap package. Thanks to Jan Rafaj.
|
|
|
|
|
n/samba-4.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/wget-1.17.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/wpa_supplicant-2.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/liberation-fonts-ttf-1.07.4-noarch-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-nouveau-1.0.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-43.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
extra/fltk/fltk-1.3.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix undefined reference to `Fl_XFont_On_Demand::value()'.
|
|
|
|
|
Build shared libraries, not static.
|
|
|
|
|
Thanks to Stefan Steier.
|
|
|
|
|
extra/tigervnc/tigervnc-1.5.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against shared fltk libraries.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Dec 3 07:28:30 UTC 2015
|
|
|
|
|
a/cpio-2.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dbus-1.10.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/eudev-3.1.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
In rc.udev, create static nodes with better initial permissions.
|
|
|
|
|
a/lvm2-2.02.136-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.2d-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pkgtools-14.2-noarch-5.txz: Rebuilt.
|
|
|
|
|
Set LANG=C in pkgtool.
|
|
|
|
|
a/tar-1.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-2.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kio-mtp-2063e75_20131020git-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fix invalid UTF-8 sequence in slack-desc. Thanks to turtleli.
|
|
|
|
|
l/eigen3-3.2.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed eigen3.pc include directory. Thanks to chris.willing.
|
|
|
|
|
l/freetype-2.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.46.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix a memory leak.
|
|
|
|
|
l/gmp-6.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libmtp-1.1.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Put the udev stuff in the right directory. Thanks to yars.
|
|
|
|
|
l/libpng-1.6.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed buffer overflows in the png_set_PLTE(), png_get_PLTE(),
|
|
|
|
|
png_set_tIME(), and png_convert_to_rfc1123() functions that allow
|
|
|
|
|
attackers to cause a denial of service (application crash) or
|
|
|
|
|
possibly have unspecified other impact via a small bit-depth value
|
|
|
|
|
in an IHDR (aka image header) chunk in a PNG image.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/librsvg-2.40.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.2d-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Nov 25 06:36:06 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-7.txz: Rebuilt.
|
|
|
|
|
Added libudev.so.1.
|
|
|
|
|
a/eudev-3.1.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
rc.udev: create all static modes in /dev before starting udevd.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
Support loading additional devices from /etc/udev/devices.
|
|
|
|
|
Set correct permissions on /dev/ppp.
|
|
|
|
|
a/pkgtools-14.2-noarch-4.txz: Rebuilt.
|
|
|
|
|
installpkg: calculate installed package size using numfmt.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-24.txz: Rebuilt.
|
|
|
|
|
In rc.K and rc.6, don't kill mdmon. If it's running at shutdown, it needs
|
|
|
|
|
to stay up through the shutdown of userspace in order to prevent a hang
|
|
|
|
|
followed by the rebuilding of the RAID array after the power is cycled.
|
|
|
|
|
Thanks to Csaba Biegl.
|
|
|
|
|
l/pcre-8.38-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed overflows that could lead to a denial of service or the execution
|
|
|
|
|
of arbitrary code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Calculate partition sizes with numfmt. Thanks to bassmadrigal.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Calculate partition sizes with numfmt. Thanks to bassmadrigal.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 24 03:31:43 UTC 2015
|
|
|
|
|
a/dbus-1.10.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kmod-22-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lilo-24.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-23.txz: Rebuilt.
|
|
|
|
|
rc.6: Don't clear /var/lock/subsys.
|
|
|
|
|
rc.S: Clear /var/lock/subsys here instead, so that the directory will be
|
|
|
|
|
cleared out on startup after a power failure.
|
|
|
|
|
rc.sysvinit: Run kill scripts for the current, not previous, runlevel.
|
|
|
|
|
Thanks to Sl4ck3ver.
|
|
|
|
|
a/upower-0.9.23-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/cups-filters-1.0.76-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/lm_sensors-3.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
d/intltool-0.51.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix warnings with perl-5.22.0. Thanks to Stuart Winter.
|
|
|
|
|
d/llvm-3.7.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Build using cmake and clang. This results in a smaller package size, fixes
|
|
|
|
|
compiler-rt, and changes the shared library name from libLLVM-3.7.so to
|
|
|
|
|
libLLVM.so.3.7.0 (which requires recompiling any binaries linked to libLLVM).
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
kde/calligra-2.9.9-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/babl-0.1.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/poppler-0.38.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
n/NetworkManager-1.0.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/wget-1.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/glew-1.13.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
x/mesa-11.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
Patched to find the new LLVM library.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
xap/gimp-2.8.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/network-manager-applet-1.0.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/windowmaker-0.95.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patch to fix a segfault in wmmenugen.c. Thanks to imitheos.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-3.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Nov 22 23:37:53 UTC 2015
|
|
|
|
|
a/eudev-3.1.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Add eudev startup message for kmsg. Thanks to Richard Narron.
|
|
|
|
|
Blacklist some more watchdog modules to work around broken hardware.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
Added /dev/net/tun.
|
|
|
|
|
a/kernel-firmware-20151122git-noarch-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Nov 21 19:18:17 UTC 2015
|
|
|
|
|
Some more recompiles and a couple upgrades. Most of these were needed to
|
|
|
|
|
fix packages on 32-bit that were needlessly linking the old libudev.so.0.
|
|
|
|
|
Thanks to bormant for spotting these. After rebuilding them, they no longer
|
|
|
|
|
link to libudev at all... Since this got us close to having Xfce built
|
|
|
|
|
entirely for 586 on 32-bit, those packages were rebuilt as well.
|
|
|
|
|
l/gcr-3.16.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gtk+2-2.24.28-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/gtkspell-2.0.16-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/libiodbc-3.52.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libwnck-2.31.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/polkit-gnome-0.102-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/virtuoso-ose-6.1.8-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/vte-0.28.2-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/compiz-0.8.8-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/blueman-r708-x86_64-5.txz: Rebuilt.
|
|
|
|
|
xap/gucharmap-3.12.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/imagemagick-6.9.2_6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/pidgin-2.10.11-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xfce/Thunar-1.6.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/garcon-0.4.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/gtk-xfce-engine-2.10.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/libxfce4ui-4.12.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/libxfce4util-4.12.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/orage-4.12.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/thunar-volman-0.8.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-appfinder-4.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-clipman-plugin-1.2.3-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-dev-tools-4.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-mixer-4.10.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-notifyd-0.2.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-panel-4.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-power-manager-1.4.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-session-4.12.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-settings-4.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-systemload-plugin-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-taskmanager-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-terminal-0.6.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-volumed-0.1.13-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xfce/xfconf-4.12.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfdesktop-4.12.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfwm4-4.12.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 20 21:52:15 UTC 2015
|
|
|
|
|
a/eudev-3.1.5-x86_64-4.txz: Rebuilt.
|
|
|
|
|
rc.udev: Don't update the hardware database index until / is read-write.
|
|
|
|
|
Remove obsolete /lib/udev/udevd symlink.
|
|
|
|
|
a/udisks-1.0.5-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Eliminate redundant udev rule trying to call pci-db.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 20 05:25:18 UTC 2015
|
|
|
|
|
We've made the switch from udev to eudev, and everything seems to be working
|
|
|
|
|
perfectly. Big thanks to the eudev team for helping us bring Slackware's
|
|
|
|
|
udev up to date! Make sure you remove the old udev and install both of the
|
|
|
|
|
new packages (eudev and libgudev), and then the changeover to eudev should
|
|
|
|
|
go as smooth as silk. Really, the icu4c upgrade seemed more disruptive. :)
|
|
|
|
|
A reboot after this is probably better than "/etc/rc.d/rc.udev force-restart",
|
|
|
|
|
but that worked fine here, too. It would also be a good idea to regenerate
|
|
|
|
|
the initrd so that it uses eudev, but once again things worked fine here
|
|
|
|
|
either way. Have fun!
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-6.txz: Rebuilt.
|
|
|
|
|
a/etc-14.2-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Added input group, GID 71.
|
|
|
|
|
Added SDDM user/group, UID 64, GID 64.
|
|
|
|
|
a/eudev-3.1.5-x86_64-3.txz: Added.
|
|
|
|
|
This replaces the udev package.
|
|
|
|
|
rc.udev: Fix mounting /dev/shm.
|
|
|
|
|
rc.udev: Remove devtmpfs check.
|
|
|
|
|
rc.udev: Remove persistent CD rules support.
|
|
|
|
|
udev.conf: Remove obsolete udev_root setting.
|
|
|
|
|
Patch 60-cdrom_id.rules to create alternate device names.
|
|
|
|
|
Move system installed hwdb files under /lib.
|
|
|
|
|
Remove obsolete udev_root references from the manpages, and install them.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
a/libgudev-230-x86_64-1.txz: Added.
|
|
|
|
|
This library is required to use eudev.
|
|
|
|
|
a/lvm2-2.02.134-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-22.txz: Rebuilt.
|
|
|
|
|
rc.S: Remove obsolete UMSDOS related error messages.
|
|
|
|
|
a/udev-182-x86_64-7.txz: Removed.
|
|
|
|
|
This is replaced by the eudev and libgudev packages.
|
|
|
|
|
a/udisks-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/udisks2-2.1.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/usbutils-007-x86_64-3.txz: Rebuilt.
|
|
|
|
|
a/util-linux-2.26.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/gphoto2-2.5.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gutenprint-5.2.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/hplip-3.15.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/usbmuxd-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix problems with Wine (and possibly other things.)
|
|
|
|
|
Thanks to Spinlock.
|
|
|
|
|
d/gcc-g++-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-5.2.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/mercurial-3.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Renamed bash-completion file from mercurial to hg, otherwise it doesn't work.
|
|
|
|
|
Thanks to Audrius Kazukauskas.
|
|
|
|
|
d/subversion-1.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/calligra-2.9.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-workspace-4.11.22-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdeconnect-kde-0.8-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched to fix problems with OpenSSH 7.x. Thanks to Eric Hameleers.
|
|
|
|
|
kde/kdelibs-4.14.14-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kig-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/ConsoleKit2-1.0.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/akonadi-1.13.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/apr-util-1.5.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/boost-1.59.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/gtk+3-3.18.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.26.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/harfbuzz-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/icu4c-56.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/libatasmart-0.19-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libcanberra-0.30-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/libgphoto2-2.5.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgpod-0.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libmtp-1.1.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsoup-2.52.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libusb-1.0.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libusb-compat-0.1.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libvisio-0.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/qt-4.8.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/raptor2-2.0.15-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/system-config-printer-1.3.13-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/ModemManager-1.4.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/NetworkManager-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/bluez-4.101-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/dhcpcd-6.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/httpd-2.4.17-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/libmbim-1.12.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/network-scripts-14.2-noarch-1.txz: Upgraded.
|
|
|
|
|
Add loopback up/down/start/stop features.
|
|
|
|
|
Fix bringing down a single non-bridge interface.
|
|
|
|
|
Thanks to Xsane.
|
|
|
|
|
n/nmap-7.00-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/tin-2.2.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/intel-gpu-tools-1.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-evdev-2.10.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-vmmouse-13.1.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ati-7.6.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-intel-git_20151119_666f25b-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-nouveau-git_20151119_6e6d8ac-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-openchrome-0.3.3-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-1.18.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xephyr-1.18.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.18.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.18.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/audacious-3.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/audacious-plugins-3.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/network-manager-applet-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/sane-1.0.25-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/exo-0.10.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-screenshooter-1.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-weather-plugin-0.8.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Removed udev, added eudev and libgudev.
|
|
|
|
|
Fixed partition size output.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Removed udev, added eudev and libgudev.
|
|
|
|
|
Fixed partition size output.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Nov 15 20:26:58 UTC 2015
|
|
|
|
|
testing/packages/eudev-3.1.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use --with-rootlibexecdir=/lib/udev regardless of $ARCH.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Nov 14 21:35:57 UTC 2015
|
|
|
|
|
Please enjoy "almost a beta." Sorry we missed Friday the 13th this time.
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
a/bash-4.3.042-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/e2fsprogs-1.42.13-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed uncompressed manpages.
|
|
|
|
|
a/file-5.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/gettext-0.19.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/hwdata-0.283-noarch-1.txz: Added.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
a/kernel-firmware-20151112git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.1.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.1.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.1.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pciutils-3.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
a/tcsh-6.19.00-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/usbutils-007-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Use the usb.ids from the hwdata package.
|
|
|
|
|
ap/alsa-utils-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lxc-1.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/man-1.6g-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fixed conditional in makewhatis. Thanks to mancha.
|
|
|
|
|
ap/man-pages-4.02-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/mc-4.8.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/powertop-2.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/squashfs-tools-4.3-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Eric Hameleers.
|
|
|
|
|
d/cmake-3.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
d/gcc-java-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
d/gcc-objc-5.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gettext-tools-0.19.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/intltool-0.51.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.1.13-x86-1.txz: Upgraded.
|
|
|
|
|
d/libtool-2.4.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/subversion-1.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Moved DAV SVN modules to the correct Apache directory. Thanks to cendryon.
|
|
|
|
|
k/kernel-source-4.1.13-noarch-1.txz: Upgraded.
|
|
|
|
|
MICROCODE m -> y
|
|
|
|
|
X86_CPUID m -> y
|
|
|
|
|
X86_MSR m -> y
|
|
|
|
|
+MICROCODE_AMD_EARLY y
|
|
|
|
|
+MICROCODE_EARLY y
|
|
|
|
|
+MICROCODE_INTEL_EARLY y
|
|
|
|
|
kde/calligra-2.9.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdelibs-4.14.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkdcraw-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/step-4.14.3-x86_64-4.txz: Rebuilt.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca\@valencia-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.9-noarch-1.txz: Upgraded.
|
|
|
|
|
l/ConsoleKit2-1.0.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed uncompressed manpage.
|
|
|
|
|
l/LibRaw-0.17.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/alsa-lib-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-core-2.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/eigen2-2.0.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/eigen3-3.2.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gdk-pixbuf2-2.32.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.46.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gnome-keyring-3.16.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed uncompressed manpages.
|
|
|
|
|
l/gsl-2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/gst-plugins-good-1.6.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gtk+3-3.18.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.26.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsoup-2.52.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libvpx-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/pilot-link-0.12.5-x86_64-10.txz: Rebuilt.
|
|
|
|
|
Fixed uncompressed manpage.
|
|
|
|
|
l/readline-6.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied two upstream patches. Thanks to gmgf.
|
|
|
|
|
l/seamonkey-solibs-2.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/xapian-core-1.2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/rp-pppoe-3.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/whois-5.2.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
tcl/tcl-8.6.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed uncompressed manpages.
|
|
|
|
|
x/mesa-11.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-acecad-1.5.0-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-aiptek-1.4.1-x86_64-8.txz: Removed.
|
|
|
|
|
This driver is unmaintained and no longer compiles.
|
|
|
|
|
x/xf86-input-evdev-2.10.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-joystick-1.6.1-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-keyboard-1.8.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-mouse-1.9.1-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-penmount-1.5.0-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-synaptics-1.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-vmmouse-13.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-void-1.4.0-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-wacom-0.19.0-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-apm-1.2.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ark-0.7.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ast-1.1.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ati-7.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-chips-1.2.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-cirrus-1.5.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-dummy-0.3.7-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-glint-1.2.8-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i128-1.3.6-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i740-1.3.5-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-intel-git_20151112_7490b9e-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-mach64-6.9.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-mga-1.6.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-neomagic-1.2.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-nouveau-git_20151112_1ff13a9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-nv-2.1.20-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-openchrome-0.3.3-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-r128-6.10.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-rendition-4.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-s3-0.6.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3virge-1.10.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-savage-2.3.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-siliconmotion-1.7.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sis-0.10.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sisusb-0.9.6-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tdfx-1.4.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tga-1.2.2-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-trident-1.3.7-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tseng-1.2.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-v4l-0.2.0-x86_64-13.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vesa-2.3.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-voodoo-1.2.5-x86_64-9.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgi-1.6.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgixp-1.8.1-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-1.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xterm-320-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-20150721-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xap/gnuplot-5.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/seamonkey-2.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/windowmaker-0.95.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-5.txz: Rebuilt.
|
|
|
|
|
xap/xscreensaver-5.34-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/fltk/fltk-1.3.3-x86_64-1.txz: Added.
|
|
|
|
|
FLTK is needed to compile tigervnc.
|
|
|
|
|
extra/tigervnc/tigervnc-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Eric Hameleers.
|
|
|
|
|
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-x86_64-4.txz: Rebuilt.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
testing/packages/eudev-3.1.5-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Jean-Philippe Guillemin.
|
|
|
|
|
Expect problems (especially with an initrd) unless everything depending upon
|
|
|
|
|
libudev.so.0 is recompiled. Those packages include: ConsoleKit2,
|
|
|
|
|
ModemManager, NetworkManager, aaa_elflibs, bluez, dhcpcd, gutenprint, gvfs,
|
|
|
|
|
intel-gpu-tools, kde-workspace, kdelibs, libatasmart, libcanberra, libgphoto2,
|
|
|
|
|
libgpod, libmbim, libmtp, libusb, libusb-compat, lvm2, network-manager-applet,
|
|
|
|
|
qt, sane, system-config-printer, udisks, udisks2, usbmuxd, usbutils,
|
|
|
|
|
util-linux, xf86-input-evdev, xf86-input-vmmouse, xf86-video-ati,
|
|
|
|
|
xf86-video-intel, xf86-video-modesetting, xf86-video-nouveau,
|
|
|
|
|
xf86-video-openchrome, and xorg-server.
|
|
|
|
|
testing/packages/libgudev-230-x86_64-1.txz: Added.
|
|
|
|
|
This package is also needed in order to test eudev.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
usb-and-pxe-installers/usbimg2disk.sh: Upgraded.
|
|
|
|
|
Patched to handle spaces in the FAT label. Thanks to Eric Hameleers.
|
|
|
|
|
Patched to fix directory layout for UEFI boot. Thanks to Didier Spaier.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 6 01:15:43 UTC 2015
|
|
|
|
|
l/mozilla-nss-3.20.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.20.1 and nspr-4.10.10.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 3 19:50:31 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-4.txz: Rebuilt.
|
|
|
|
|
l/pcre-8.37-x86_64-1.txz: Upgraded.
|
|
|
|
|
Moved libraries into /lib{,64} since grep needs them.
|
|
|
|
|
Thanks to Michal Cieslakiewicz.
|
|
|
|
|
xap/mozilla-firefox-42.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Nov 2 19:34:58 UTC 2015
|
|
|
|
|
a/grep-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.133-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-10.0.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-evdev-2.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-synaptics-1.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.17.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.17.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.17.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.17.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Nov 1 17:11:32 UTC 2015
|
|
|
|
|
kde/calligra-2.9.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against gsl-2.0.
|
|
|
|
|
kde/step-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against gsl-2.0.
|
|
|
|
|
l/cairo-1.14.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gsl-2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/orc-0.4.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Oct 31 17:39:05 UTC 2015
|
|
|
|
|
a/lvm2-2.02.132-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pkgtools-14.2-noarch-3.txz: Rebuilt.
|
|
|
|
|
Fix unnecessary bashism "==" in makepkg. Thanks to Lars Lindqvist.
|
|
|
|
|
a/xz-5.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xdg-utils-1.1.1-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/sane-1.0.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Oct 31 00:13:40 UTC 2015
|
|
|
|
|
a/dbus-1.10.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.46.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to work around an issue with Java.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
l/gvfs-1.26.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bridge-utils-1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Oct 29 20:12:14 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added libgdbm.so.4.
|
|
|
|
|
Added libssh2.so.1.
|
|
|
|
|
Added libudev.so.0.
|
|
|
|
|
Added libgudev-1.0.so.0.
|
|
|
|
|
a/btrfs-progs-v4.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/cryptsetup-1.6.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dbus-1.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
a/e2fsprogs-1.42.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/etc-14.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Improved comments in lang.{csh,sh} concerning UTF-8.
|
|
|
|
|
Thanks to Didier Spaier.
|
|
|
|
|
a/hdparm-9.48-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.1.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.1.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.1.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/less-481-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/pkgtools-14.2-noarch-2.txz: Rebuilt.
|
|
|
|
|
Sort the file lists in /var/log/packages when installing.
|
|
|
|
|
Thanks to Erik Jan Tromp.
|
|
|
|
|
ap/cups-filters-1.0.76-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/dc3dd-7.2.641-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/linuxdoc-tools-0.9.69-x86_64-5.txz: Rebuilt.
|
|
|
|
|
ap/moc-2.5.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/tmux-2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.898-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/zsh-5.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/automake-1.15-noarch-1.txz: Upgraded.
|
|
|
|
|
d/ccache-3.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/cmake-3.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/dev86-0.16.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
d/git-2.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.1.12-x86-1.txz: Upgraded.
|
|
|
|
|
d/make-4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/perl-5.22.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded perl modules: DBD-mysql-4.032, DBI-1.634, URI-1.69,
|
|
|
|
|
XML-Parser-2.44, gettext-1.07.
|
|
|
|
|
d/python-2.7.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/python-setuptools-18.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/ruby-2.2.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/scons-2.4.0-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
d/subversion-1.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
k/kernel-source-4.1.12-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/amarok-2.8.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/amor-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/analitza-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ark-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/artikulate-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/audiocd-kio-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/baloo-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/baloo-widgets-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/blinken-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/bluedevil-2.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/bomber-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/bovo-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/calligra-2.9.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/cantor-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/cervisia-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/dolphin-plugins-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/dragon-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/filelight-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/granatier-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/gwenview-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/juk-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/k3b-2.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kaccessible-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kactivities-4.13.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kajongg-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kalgebra-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kalzium-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kamera-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kanagram-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kapman-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kapptemplate-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kate-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/katomic-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kaudiocreator-1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kblackbox-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kblocks-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kbounce-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kbreakout-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kbruch-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kcachegrind-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kcalc-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kcharselect-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kcolorchooser-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kcron-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-base-artwork-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-baseapps-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-dev-scripts-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-dev-utils-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-runtime-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kde-workspace-4.11.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdeartwork-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdeconnect-kde-0.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdegraphics-mobipocket-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdegraphics-strigi-analyzer-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdegraphics-thumbnailers-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdelibs-4.14.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdenetwork-filesharing-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdenetwork-strigi-analyzers-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdepim-4.14.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdepim-runtime-4.14.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdepimlibs-4.14.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdeplasma-addons-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdesdk-kioslaves-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdesdk-strigi-analyzers-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdesdk-thumbnailers-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdev-python-1.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevelop-4.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevelop-pg-qt-1.0.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdevelop-php-1.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevelop-php-docs-1.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevplatform-1.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdewebdev-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdf-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kdiamond-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kfilemetadata-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kfloppy-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kfourinline-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kgamma-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kgeography-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kget-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kgoldrunner-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kgpg-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/khangman-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kig-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kigo-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/killbots-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kio-mtp-2063e75_20131020git-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kiriki-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kiten-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kjumpingcube-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/klettres-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/klickety-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/klines-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmag-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmahjongg-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmines-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmix-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmousetool-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmouth-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kmplot-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/knavalbattle-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/knetwalk-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kolf-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kollision-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kolourpaint-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kompare-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/konquest-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/konsole-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kopete-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/korundum-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/kpat-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kplayer-0.7.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kppp-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kqtquickcharts-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/krdc-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kremotecontrol-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kreversi-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/krfb-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kross-interpreters-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kruler-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksaneplugin-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kscreen-1.0.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kshisen-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksirk-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksnakeduel-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksnapshot-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kspaceduel-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksquares-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kstars-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksudoku-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ksystemlog-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kteatime-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ktimer-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ktorrent-4.3.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ktouch-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ktuberling-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kturtle-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/ktux-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kubrick-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kuser-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kwalletmanager-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kwebkitpart-1.3.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/kwordquiz-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkcddb-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkcompactdisc-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkdcraw-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkdeedu-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkdegames-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkexiv2-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkipi-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkmahjongg-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkomparediff2-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libksane-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libkscreen-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libktorrent-1.3.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/libmm-qt-1.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libnm-qt-0.9.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/lokalize-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/lskat-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/marble-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/mplayerthumbs-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/nepomuk-core-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/nepomuk-widgets-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/okteta-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/okular-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/oxygen-gtk2-1.4.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/oxygen-icons-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/pairs-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/palapeli-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/parley-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/partitionmanager-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/perlkde-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/perlqt-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/picmi-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/plasma-nm-0.9.3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/polkit-kde-agent-1-9d74ae3_20120104git-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/poxml-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/print-manager-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/pykde4-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/qtruby-4.14.3-x86_64-4.txz: Rebuilt.
|
|
|
|
|
kde/rocs-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/skanlite-1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/smokegen-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/smokekde-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/smokeqt-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
kde/step-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/superkaramba-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/svgpart-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/sweeper-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/umbrello-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/wicd-kde-0.3.0_bcf27d8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/zeroconf-ioslave-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca@valencia-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.8-noarch-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.8-noarch-1.txz: Upgraded.
|
|
|
|
|
l/ConsoleKit-0.4.5-x86_64-1.txz: Removed.
|
|
|
|
|
l/ConsoleKit2-1.0.0-x86_64-1.txz: Added.
|
|
|
|
|
This replaces the ConsoleKit package.
|
|
|
|
|
Thanks to Eric Hameleers and Robby Workman.
|
|
|
|
|
l/GConf-3.2.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/adwaita-icon-theme-3.18.0-noarch-1.txz: Upgraded.
|
|
|
|
|
l/apr-1.5.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/apr-util-1.5.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-atk-2.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-core-2.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/atk-2.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dconf-editor-3.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/ebook-tools-0.2.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to support epub3 fixed layout.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/exiv2-0.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump. Thanks to Heinz Wiesinger.
|
|
|
|
|
l/freetype-2.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gdbm-1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump. Thanks to Heinz Wiesinger.
|
|
|
|
|
l/gdk-pixbuf2-2.32.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib-networking-2.46.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.46.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman for preparing the most recent gtk/glib stack
|
|
|
|
|
that's marked as stable.
|
|
|
|
|
l/gnome-themes-standard-3.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gobject-introspection-1.46.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gsettings-desktop-schemas-3.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gsl-1.16-x86_64-1.txz: Added.
|
|
|
|
|
l/gst-plugins-base-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+3-3.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.26.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/jasper-1.900.1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Applied many security and bug fixes.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libcanberra-0.30-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed building against tdb. Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libodfgen-0.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libproxy-0.4.11-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/librsvg-2.40.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsoup-2.52.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtiff-4.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libvisio-0.1.3-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libvpx-1.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump. Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libwpg-0.3.0-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/libzip-1.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump. Thanks to Heinz Wiesinger.
|
|
|
|
|
l/pango-1.38.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pilot-link-0.12.5-x86_64-9.txz: Rebuilt.
|
|
|
|
|
l/poppler-0.37.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
l/pygobject3-3.18.2-x86_64-1.txz: Added.
|
|
|
|
|
l/python-pillow-3.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to Pillow 3.0.0 and Sane 2.8.2.
|
|
|
|
|
l/qca-2.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qca-cyrus-sasl-2.0.0_beta3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/serf-1.3.8-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
l/strigi-0.7.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/virtuoso-ose-6.1.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/alpine-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/curl-7.45.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This is now compiled against libssh2 for sftp support.
|
|
|
|
|
Thanks to Jonathan Woithe.
|
|
|
|
|
Fixes some security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/cyrus-sasl-2.1.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
Shared library .so-version bump.
|
|
|
|
|
n/epic5-1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/httpd-2.4.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/icmpinfo-1.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to avoid a segfault on 64-bit systems. Thanks to Zolt<6C>n P<>sfai.
|
|
|
|
|
n/imapd-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/irssi-0.8.17-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/libssh2-1.6.0-x86_64-1.txz: Added.
|
|
|
|
|
Apologies to Jonathan Woithe for taking so long to add this one. :-)
|
|
|
|
|
n/mutt-1.5.24-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/net-snmp-5.7.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/netatalk-2.2.3-x86_64-6.txz: Rebuilt.
|
|
|
|
|
n/ntp-4.2.8p4-x86_64-1.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes
|
|
|
|
|
several low and medium severity vulnerabilities.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/obexftp-0.23-x86_64-11.txz: Rebuilt.
|
|
|
|
|
n/openldap-client-2.4.42-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/sendmail-8.15.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/sendmail-cf-8.15.2-noarch-2.txz: Rebuilt.
|
|
|
|
|
n/vsftpd-3.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/yptools-2.14-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Upgraded to ypbind-mt-1.38 and ypserv-2.32.1.
|
|
|
|
|
x/libdrm-2.4.65-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libva-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libva-intel-driver-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/pixman-0.33.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-1.4.15-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch to fix segfault with GTK3 apps.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
x/scim-anthy-1.2.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-hangul-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-input-pad-0.1.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-pinyin-0.5.92-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-tables-0.5.14.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xinput-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.17.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.17.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.17.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.17.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-20150721-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/audacious-3.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/audacious-plugins-3.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/geeqie-1.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
xap/gnuchess-6.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.2_4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-41.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/pidgin-2.10.11-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xap/vim-gvim-7.4.898-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xchat-2.8.8-x86_64-11.txz: Rebuilt.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-2.txz: Rebuilt.
|
|
|
|
|
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-x86_64-3.txz: Rebuilt.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Oct 8 23:09:33 UTC 2015
|
|
|
|
|
d/ccache-3.2.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --sysconfdir=/etc so that ccache will look there for a
|
|
|
|
|
system-wide config (not in /usr/etc). Thanks to David Spencer.
|
|
|
|
|
d/libtool-2.4.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/mozilla-thunderbird-38.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --enable-calendar.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Removed broken .la files. Thanks to David Spencer.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Oct 5 17:24:30 UTC 2015
|
|
|
|
|
a/glibc-zoneinfo-2015g-noarch-1.txz: Upgraded.
|
|
|
|
|
Upgraded to tzcode2015g and tzdata2015g.
|
|
|
|
|
ap/cdrtools-3.01-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed useless man pages in /usr/man/man3. Thanks to Adrien Nader.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Oct 1 21:21:36 UTC 2015
|
|
|
|
|
a/pkgtools-14.2-noarch-1.txz: Upgraded.
|
|
|
|
|
Patched makepkg and removepkg to support spaces in symlinks. Spaces in file
|
|
|
|
|
and directory names also work, so support should be complete.
|
|
|
|
|
Thanks to Erik Jan Tromp.
|
|
|
|
|
Patched makepkg to ensure that the root of a package is chmod 755.
|
|
|
|
|
Patched installpkg to speed up several parts of the script, especially when
|
|
|
|
|
symlinks are created by an install script. If bash is available, install
|
|
|
|
|
scripts will be translated to avoid spawning two subshells per link.
|
|
|
|
|
Also, reduced UUOC! :-)
|
|
|
|
|
Patched removepkg to speed up several parts of the script.
|
|
|
|
|
Thanks to Stuart Winter and Jim Hawkins.
|
|
|
|
|
Patched upgradepkg to speed up several parts of the script by using native
|
|
|
|
|
bash rather than calling out to sed. (Similar changes might be applied to
|
|
|
|
|
installpkg/removepkg in the future, but upgradepkg looping against the full
|
|
|
|
|
set of packages is where the most improvement is seen)
|
|
|
|
|
Thanks to Michal "mina86" Nazarewicz.
|
|
|
|
|
l/mozilla-nss-3.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.20 and nspr-4.10.9.
|
|
|
|
|
l/seamonkey-solibs-2.38-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/libXi-1.7.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxcb-1.11.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-chips-1.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-s3virge-1.10.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-sis-0.10.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-41.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-38.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/seamonkey-2.38-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 23 01:10:36 UTC 2015
|
|
|
|
|
a/smartmontools-6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cdrtools-3.01-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/ddrescue-1.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/ccache-3.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gc-7.4.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Build without --disable-static, but don't package the extra static libraries.
|
|
|
|
|
This ensures that all the symbols are exported in the shared libraries.
|
|
|
|
|
l/libjpeg-turbo-1.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtasn1-4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/notify-python-0.1.1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Patched to fix hplip-tools. Thanks to gmgf.
|
|
|
|
|
n/stunnel-5.23-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Server certificate config file name changed from stunnel.cnf to openssl.cnf.
|
|
|
|
|
Thanks to Iouri Kharon.
|
|
|
|
|
xap/mozilla-firefox-41.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 15 22:36:17 UTC 2015
|
|
|
|
|
ap/hplip-3.15.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.8.11.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ca-certificates-20150426-noarch-2.txz: Rebuilt.
|
|
|
|
|
Patched update-ca-certificates to remove incompatible command operators
|
|
|
|
|
used to call 'run-parts'. Thanks to Stuart Winter.
|
|
|
|
|
n/stunnel-5.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-11.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20150915_23986f0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Set default acceleration method to DRI2/UXA.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 10 14:12:07 UTC 2015
|
|
|
|
|
d/gdb-7.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gobject-introspection-1.44.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/netpbm-10.66.02-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Removed junk /usr/pkgconfig_template and /usr/bin/manweb files.
|
|
|
|
|
Thanks to j_v on LQ.
|
|
|
|
|
l/parted-3.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/sendmail-8.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/sendmail-cf-8.15.2-noarch-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.6.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 3 22:02:39 UTC 2015
|
|
|
|
|
l/seamonkey-solibs-2.35-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/mutt-1.5.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.6.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --enable-nine.
|
|
|
|
|
xap/seamonkey-2.35-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 2 19:36:31 UTC 2015
|
|
|
|
|
n/bind-9.10.2_P4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes two denial-of-service vulnerabilities:
|
|
|
|
|
+ CVE-2015-5722 is a denial-of-service vector which can be
|
|
|
|
|
exploited remotely against a BIND server that is performing
|
|
|
|
|
validation on DNSSEC-signed records. Validating recursive
|
|
|
|
|
resolvers are at the greatest risk from this defect, but it has not
|
|
|
|
|
been ruled out that it could be exploited against an
|
|
|
|
|
authoritative-only nameserver under limited conditions. Servers
|
|
|
|
|
that are not performing validation are not vulnerable. However,
|
|
|
|
|
ISC does not recommend disabling validation as a workaround to
|
|
|
|
|
this issue as it exposes the server to other types of attacks.
|
|
|
|
|
Upgrading to the patched versions is the recommended solution.
|
|
|
|
|
All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722.
|
|
|
|
|
+ CVE-2015-5986 is a denial-of-service vector which can be used
|
|
|
|
|
against a BIND server that is performing recursion. Validation
|
|
|
|
|
is not required. Recursive resolvers are at the greatest risk
|
|
|
|
|
from this defect, but it has not been ruled out that it could
|
|
|
|
|
be exploited against an authoritative-only nameserver under
|
|
|
|
|
limited conditions.
|
|
|
|
|
Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to
|
|
|
|
|
CVE-2015-5986.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01287/0
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
|
|
|
|
|
https://kb.isc.org/article/AA-01291/0
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 1 23:29:22 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/cryptsetup-1.6.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.129-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lxc-1.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dconf-editor-3.16.1-x86_64-1.txz: Added.
|
|
|
|
|
l/gdk-pixbuf2-2.31.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
Gustavo Grieco discovered a heap overflow in the processing of BMP images
|
|
|
|
|
which may result in the execution of arbitrary code if a malformed image
|
|
|
|
|
is opened.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/ModemManager-1.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssh-7.1p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libvdpau-1.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
libvdpau versions 1.1 and earlier, when used in setuid or setgid
|
|
|
|
|
applications, contain vulnerabilities related to environment variable
|
|
|
|
|
handling that could allow an attacker to execute arbitrary code or
|
|
|
|
|
overwrite arbitrary files. This release uses the secure_getenv()
|
|
|
|
|
function to fix these problems.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/mesa-10.6.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/network-manager-applet-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Aug 30 22:43:36 UTC 2015
|
|
|
|
|
l/adwaita-icon-theme-3.16.2-noarch-2.txz: Rebuilt.
|
|
|
|
|
Patched to remove bogus /usr/locale/ directory tree. Thanks to ponce.
|
|
|
|
|
l/gvfs-1.24.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Rebuilt to fix missing CIFS filesystem support. Thanks to lems.
|
|
|
|
|
x/xorg-server-1.17.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with stability patches from upstream. Thanks to ponce.
|
|
|
|
|
x/xorg-server-xephyr-1.17.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.17.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.17.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Aug 29 05:27:29 UTC 2015
|
|
|
|
|
a/procps-ng-3.3.10-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Recompiled without --enable-timeout-stat to fix fuser hang.
|
|
|
|
|
kde/oxygen-gtk3-1.4.1-x86_64-1.txz: Removed.
|
|
|
|
|
x/libXaw3dXft-1.6.2d-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/mozilla-firefox-40.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Aug 24 19:03:07 UTC 2015
|
|
|
|
|
d/ruby-2.2.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/intel-gpu-tools-1.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-git_20150824_3e07681-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to ponce for helpful hints on getting this working again.
|
|
|
|
|
x/xf86-video-xgi-1.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Aug 21 21:17:48 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dosfstools-3.0.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/etc-14.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/glibc-solibs-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-zoneinfo-2015f-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20150820git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-4.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-4.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-4.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/procps-ng-3.3.10-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fix "fuser -s $FILE" with patch from upstream git.
|
|
|
|
|
Thanks to Dan Church.
|
|
|
|
|
ap/cups-2.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
ap/cups-filters-1.0.73-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/hplip-3.15.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched a bug. Thanks to gmgf.
|
|
|
|
|
ap/linuxdoc-tools-0.9.69-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Upgraded to asciidoc-8.6.9 and gtk-doc-1.24.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
d/gcc-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-java-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-objc-4.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-4.1.6-x86-1.txz: Upgraded.
|
|
|
|
|
d/pkg-config-0.28-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/ruby-2.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Vincent Batts.
|
|
|
|
|
e/emacs-24.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
k/kernel-source-4.1.6-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/korundum-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/qtruby-4.14.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/elfutils-0.163-x86_64-1.txz: Added.
|
|
|
|
|
l/glib-networking-2.44.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/glibc-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-i18n-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-profile-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+2-2.24.28-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gtk+3-3.16.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.24.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libarchive-3.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libelf-0.8.13-x86_64-5.txz: Removed.
|
|
|
|
|
l/libmng-2.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/librsvg-2.40.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libvncserver-0.9.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/loudmouth-1.5.0_20121201-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/pango-1.36.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/urwid-1.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gnutls-3.4.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
|
|
|
|
|
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/iputils-s20140519-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nettle-3.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/obexftp-0.23-x86_64-10.txz: Rebuilt.
|
|
|
|
|
n/samba-4.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Modified wscript files to install talloc, tevent, and tdb directly.
|
|
|
|
|
Thanks to Christoph Willing.
|
|
|
|
|
x/appres-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/bdftopcf-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/beforelight-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/bitmap-1.0.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/compiz-0.8.8-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/dri2proto-2.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/dri3proto-1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/editres-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/fixesproto-5.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/font-util-1.3.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/fonttosfnt-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/fslsfonts-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/fstobdf-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/glamor-egl-0.6.0-x86_64-1.txz: Removed.
|
|
|
|
|
x/iceauth-1.0.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/ico-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/imake-1.0.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/intel-gpu-tools-1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/kbproto-1.0.7-noarch-1.txz: Upgraded.
|
|
|
|
|
x/libFS-1.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libICE-1.0.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libSM-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libX11-1.6.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXScrnSaver-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXau-1.0.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXaw-1.0.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXaw3d-1.6.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/libXcm-0.5.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXcomposite-0.4.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXcursor-1.1.14-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXdamage-1.1.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXdmcp-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXevie-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXext-1.3.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXfixes-5.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXfont-1.5.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXfontcache-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXft-2.3.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/libXi-1.7.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXinerama-1.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXmu-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXp-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXpm-3.5.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXpresent-1.0.0-x86_64-1.txz: Added.
|
|
|
|
|
x/libXrandr-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXrender-0.9.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXres-1.0.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXt-1.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXtst-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXv-1.0.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXvMC-1.0.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXxf86dga-1.1.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXxf86misc-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXxf86vm-1.1.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libdmx-1.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libdrm-2.4.64-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libepoxy-1.3.1-x86_64-1.txz: Added.
|
|
|
|
|
x/libfontenc-1.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libpciaccess-0.13.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxcb-1.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libxkbfile-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxshmfence-1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/listres-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/lndir-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/luit-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/makedepend-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/mesa-10.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mkcomposecache-1.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/mkfontscale-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/oclock-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/pixman-0.33.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/presentproto-1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/randrproto-1.5.0-noarch-1.txz: Upgraded.
|
|
|
|
|
x/rendercheck-1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/rgb-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/sessreg-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/setxkbmap-1.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/showfont-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/smproxy-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/transset-1.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/twm-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/viewres-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/x11perf-1.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xauth-1.0.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xbacklight-1.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xbiff-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xbitmaps-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcalc-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-proto-1.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-0.4.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-cursor-0.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-errors-1.0-x86_64-1.txz: Added.
|
|
|
|
|
x/xcb-util-image-0.4.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-keysyms-0.4.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-renderutil-0.3.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcb-util-wm-0.4.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xclipboard-1.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xclock-1.0.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcm-0.5.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcmsdb-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcompmgr-1.1.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xconsole-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xcursorgen-1.0.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xdbedizzy-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xditview-1.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xdm-1.1.11-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xdpyinfo-1.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xdriinfo-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xedit-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xev-1.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xextproto-7.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xeyes-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-acecad-1.5.0-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-aiptek-1.4.1-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-evdev-2.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-joystick-1.6.1-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-keyboard-1.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-mouse-1.9.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-penmount-1.5.0-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-synaptics-1.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-vmmouse-13.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-void-1.4.0-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-wacom-0.19.0-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-apm-1.2.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ark-0.7.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ast-1.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-ati-7.5.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-chips-1.2.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-cirrus-1.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-dummy-0.3.7-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-glint-1.2.8-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i128-1.3.6-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i740-1.3.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-intel-2.99.917-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-mach64-6.9.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-mga-1.6.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-neomagic-1.2.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-nouveau-1.0.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-nv-2.1.20-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-openchrome-0.3.3-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-r128-6.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-rendition-4.2.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3-0.6.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3virge-1.10.6-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-savage-2.3.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-siliconmotion-1.7.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-sis-0.10.7-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sisusb-0.9.6-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tdfx-1.4.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tga-1.2.2-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-trident-1.3.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tseng-1.2.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-v4l-0.2.0-x86_64-12.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vesa-2.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-voodoo-1.2.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgi-git_5a3e0de677b7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgixp-1.8.1-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86dga-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xfd-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xfontsel-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xfs-1.1.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xfsinfo-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xgamma-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xgc-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xhost-1.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xinit-1.3.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xinput-1.6.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xkbcomp-1.3.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xkbevd-1.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xkbprint-1.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xkbutils-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xkill-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xload-1.1.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xlogo-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xlsatoms-1.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xlsclients-1.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xlsfonts-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xmag-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xman-1.1.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xmessage-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xmh-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xmodmap-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xmore-1.0.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-docs-1.7.1-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.17.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.17.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.17.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.17.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-sgml-doctools-1.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xpr-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xprop-1.2.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xproto-7.0.28-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xpyb-1.3.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xrandr-1.4.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xrdb-1.1.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xrefresh-1.0.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xscope-1.4.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xset-1.2.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xsetroot-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xsm-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xstdcmap-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xvidtune-1.0.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xvinfo-1.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xwd-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xwininfo-1.1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xwud-1.0.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/MPlayer-20150721-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
xap/ddd-3.3.12-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/pan-0.139-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
extra/wicd/wicd-1.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Probably better to use NetworkManager, but this seems to work for now.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Aug 14 19:31:42 UTC 2015
|
|
|
|
|
ap/hplip-3.15.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/pykde4-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/qtruby-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/smokeqt-4.14.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/PyQt-4.11.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/QScintilla-2.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dhcpcd-6.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Tested and found to work here. We'll probably avoid the 6.9.x series
|
|
|
|
|
until the bugs get worked out (or we have a real need to upgrade).
|
|
|
|
|
xap/mozilla-thunderbird-38.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Aug 12 05:50:41 UTC 2015
|
|
|
|
|
n/openssh-7.0p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Aug 11 18:11:12 UTC 2015
|
|
|
|
|
a/procps-ng-3.3.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --disable-modern-top to restore classic display defaults.
|
|
|
|
|
l/libjpeg-turbo-1.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/sip-4.16.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-40.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
Thanks to Matteo Bernardini and Stephen M. Wright II for help with some
|
|
|
|
|
build script improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Aug 9 19:42:38 UTC 2015
|
|
|
|
|
a/file-5.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/slackpkg-2.82.0-noarch-14.tgz: Rebuilt.
|
|
|
|
|
Patched to avoid false package name matches when the full name of a
|
|
|
|
|
package is a substring of another package's name, as happened recently
|
|
|
|
|
with atk-2.16.0 and at-spi2-atk-2.16.0. Thanks to Eric Hameleers.
|
|
|
|
|
n/dhcpcd-6.9.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --rundir=/run.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Aug 7 23:32:05 UTC 2015
|
|
|
|
|
Thanks to rworkman for help on many of these!
|
|
|
|
|
a/bash-4.3.039-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/coreutils-8.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dbus-1.8.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/file-5.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/gawk-4.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kmod-21-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.125-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/procps-3.2.8-x86_64-4.txz: Removed.
|
|
|
|
|
a/procps-ng-3.3.10-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Larry Hajali for the initial SlackBuild diff.
|
|
|
|
|
a/sysvinit-2.88dsf-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Removed pidof which is now part of the procps-ng package.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-21.txz: Rebuilt.
|
|
|
|
|
Handle changed sysctl syntax in rc.S.
|
|
|
|
|
a/util-linux-2.26.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/xfsprogs-3.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-2.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mc-4.8.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sc-7.16-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Added SC.MACROS to the documentation. Thanks to Dario Niedermann.
|
|
|
|
|
ap/screen-4.3.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Drop dependency on libelf.
|
|
|
|
|
ap/tmux-2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/binutils-2.25.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Added c89 and c99 shell scripts.
|
|
|
|
|
d/gcc-g++-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-4.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/git-2.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/mercurial-3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/oprofile-1.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/swig-3.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/adwaita-icon-theme-3.16.2-noarch-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-atk-2.16.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-core-2.16.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/atk-2.16.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dconf-0.24.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/freetype-2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gcr-3.16.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib-networking-2.44.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.44.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Drop dependency on libelf.
|
|
|
|
|
l/gnome-keyring-3.16.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gnome-themes-standard-3.16.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gsettings-desktop-schemas-3.16.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+2-2.24.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gvfs-1.24.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-1.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgsf-1.14.34-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libpcap-1.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsecret-0.18.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsoup-2.50.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/mozilla-nss-3.19.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/nss.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/mpfr-3.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ca-certificates-20150426-noarch-1.txz: Upgraded.
|
|
|
|
|
This package updates to the latest CA certificates.
|
|
|
|
|
n/dhcpcd-6.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.6.3a-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/tcpdump-4.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-39.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/network-manager-applet-1.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/Thunar-1.6.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/exo-0.10.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-weather-plugin-0.8.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfdesktop-4.12.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 28 19:36:39 UTC 2015
|
|
|
|
|
n/bind-9.10.2_P3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where an error in the handling of TKEY
|
|
|
|
|
queries can be exploited by an attacker for use as a denial-of-service
|
|
|
|
|
vector, as a constructed packet can use the defect to trigger a REQUIRE
|
|
|
|
|
assertion failure, causing BIND to exit.
|
|
|
|
|
Impact:
|
|
|
|
|
Both recursive and authoritative servers are vulnerable to this defect.
|
|
|
|
|
Additionally, exposure is not prevented by either ACLs or configuration
|
|
|
|
|
options limiting or denying service because the exploitable code occurs
|
|
|
|
|
early in the packet handling, before checks enforcing those boundaries.
|
|
|
|
|
Operators should take steps to upgrade to a patched version as soon as
|
|
|
|
|
possible.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
|
|
|
|
|
https://kb.isc.org/article/AA-01272
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jul 17 19:38:52 UTC 2015
|
|
|
|
|
n/httpd-2.4.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
* CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local
|
|
|
|
|
URL-path with the INCLUDES filter active, introduced in 2.4.11.
|
|
|
|
|
* CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a
|
|
|
|
|
script calls r:wsupgrade() can cause a child process crash.
|
|
|
|
|
* CVE-2015-3183: core: Fix chunk header parsing defect. Remove
|
|
|
|
|
apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
|
|
|
|
|
filter, parse chunks in a single pass with zero copy. Limit accepted
|
|
|
|
|
chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
|
|
|
|
|
* CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
|
|
|
|
|
httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/xscreensaver-5.33-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Jul 12 04:28:10 UTC 2015
|
|
|
|
|
xap/mozilla-thunderbird-38.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
testing/packages/e2fsprogs-1.43_WIP_20150518-x86_64-1.txz: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jul 9 18:29:23 UTC 2015
|
|
|
|
|
a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.1p-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1p-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issue:
|
|
|
|
|
Alternative chains certificate forgery (CVE-2015-1793).
|
|
|
|
|
During certificate verification, OpenSSL (starting from version 1.0.1n and
|
|
|
|
|
1.0.2b) will attempt to find an alternative certificate chain if the first
|
|
|
|
|
attempt to build such a chain fails. An error in the implementation of this
|
|
|
|
|
logic can mean that an attacker could cause certain checks on untrusted
|
|
|
|
|
certificates to be bypassed, such as the CA flag, enabling them to use a
|
|
|
|
|
valid leaf certificate to act as a CA and "issue" an invalid certificate.
|
|
|
|
|
This issue will impact any application that verifies certificates including
|
|
|
|
|
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
|
|
|
|
|
This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
|
|
|
|
|
This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
|
|
|
|
|
Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://openssl.org/news/secadv_20150709.txt
|
|
|
|
|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 7 22:59:17 UTC 2015
|
|
|
|
|
ap/cups-2.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes bugs and a couple of security issues:
|
|
|
|
|
CWE-911: Improper Update of Reference Count - CVE-2015-1158
|
|
|
|
|
This bug could allow an attacker to upload a replacement CUPS
|
|
|
|
|
configuration file and mount further attacks.
|
|
|
|
|
CWE-79: Improper Neutralization of Input During Web Page Generation
|
|
|
|
|
(Cross-site Scripting) - CVE-2015-1159
|
|
|
|
|
A cross-site scripting bug in the CUPS templating engine allows this
|
|
|
|
|
bug to be exploited when a user browses the web. In certain cases,
|
|
|
|
|
the CGI template can echo user input to file rather than escaping the
|
|
|
|
|
text first. This may be used to set up a reflected XSS attack in
|
|
|
|
|
the QUERY parameter of the web interface help page.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/cups-filters-1.0.71-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed overflows and lack of bounds checking in texttopdf.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/lm_sensors-3.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/screen-4.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/make-3.82-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
|
|
|
|
|
d/python-2.7.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glade3-3.8.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to eliminate remaining libpng14 references in .la files.
|
|
|
|
|
l/gst-plugins-base-1.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base0-0.10.36-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to eliminate remaining libpng14 references in .la files.
|
|
|
|
|
l/gst-plugins-good-1.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer-1.4.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/notify-python-0.1.1-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Recompiled to eliminate remaining libpng14 references in .la files.
|
|
|
|
|
l/pygtk-2.24.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled to eliminate remaining libpng14 references in .la files.
|
|
|
|
|
n/bind-9.10.2_P2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where an attacker who can cause
|
|
|
|
|
a validating resolver to query a zone containing specifically constructed
|
|
|
|
|
contents can cause that resolver to fail an assertion and terminate due
|
|
|
|
|
to a defect in validation code. This means that a recursive resolver that
|
|
|
|
|
is performing DNSSEC validation can be deliberately stopped by an attacker
|
|
|
|
|
who can cause the resolver to perform a query against a
|
|
|
|
|
maliciously-constructed zone. This will result in a denial of service to
|
|
|
|
|
clients who rely on that resolver.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01267/
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/ntp-4.2.8p3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where under specific circumstances an
|
|
|
|
|
attacker can send a crafted packet to cause a vulnerable ntpd instance to
|
|
|
|
|
crash. Since this requires 1) ntpd set up to allow remote configuration
|
|
|
|
|
(not allowed by default), and 2) knowledge of the configuration password,
|
|
|
|
|
and 3) access to a computer entrusted to perform remote configuration,
|
|
|
|
|
the vulnerability is considered low-risk.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/scim-hangul-0.3.2-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Recompiled to eliminate remaining libpng14 references in .la files.
|
|
|
|
|
xap/imagemagick-6.9.1_7-x86_64-1.txz: Upgraded.
|
|
|
|
|
Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
|
|
|
|
|
platforms with non-AMD processors. Thanks to Kirils Solovjovs.
|
|
|
|
|
xap/mozilla-firefox-39.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/pidgin-2.10.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
|
|
|
|
|
testing/source/config-testing-4.1.1/*: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 12 17:58:45 UTC 2015
|
|
|
|
|
a/openssl-solibs-1.0.1o-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1o-x86_64-1.txz: Upgraded.
|
|
|
|
|
New release to resolve 1.0.1n HMAC ABI incompatibility.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 11 21:31:47 UTC 2015
|
|
|
|
|
a/openssl-solibs-1.0.1n-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/screen-4.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added some patches to fix corruption when using screen with a serial port.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
d/gdb-7.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qt-4.8.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1n-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixes several bugs and security issues:
|
|
|
|
|
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
|
|
|
|
|
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
|
|
|
|
|
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
|
|
|
|
|
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
|
|
|
|
|
o Race condition handling NewSessionTicket (CVE-2015-1791)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.6.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-firefox-38.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-38.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun May 17 04:35:46 UTC 2015
|
|
|
|
|
xap/mozilla-firefox-38.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-31.7.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed May 13 02:29:39 UTC 2015
|
|
|
|
|
xap/mozilla-firefox-38.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 12 07:17:33 UTC 2015
|
|
|
|
|
ap/mariadb-10.0.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
|
|
|
|
|
d/slacktrack-2.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
l/libcanberra-0.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qt-4.8.6-x86_64-4.txz: Rebuilt.
|
|
|
|
|
QNAM: Fix upload corruptions when server closes connection
|
|
|
|
|
This patch fixes several upload corruptions if the server closes the
|
|
|
|
|
connection while/before we send data into it.
|
|
|
|
|
cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
|
|
|
|
|
n/wpa_supplicant-2.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
This update fixes potential denial of service issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
|
|
|
|
|
http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
|
|
|
|
|
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
|
|
|
|
|
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon May 4 04:15:20 UTC 2015
|
|
|
|
|
a/aaa_terminfo-5.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/btrfs-progs-v3.18.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-2.0.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Removed files that overlap with the cups-filter package.
|
|
|
|
|
ap/cups-filters-1.0.68-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed bundled version of foomatic-rip.
|
|
|
|
|
kde/calligra-2.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
|
|
|
|
|
l/libidn-1.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
This is reported to fix hangs with Emacs and other programs.
|
|
|
|
|
Thanks to 55020.
|
|
|
|
|
l/ncurses-5.9-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch ncurses-5.9-20141206-patch.sh.
|
|
|
|
|
l/qt-4.8.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
|
|
|
|
|
instead of gstreamer-0. This should fix conflicts with programs that
|
|
|
|
|
use both WebKit and phonon. Thanks to Heinz Wiesinger.
|
|
|
|
|
x/libdrm-2.4.60-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.5.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfwm4-4.12.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
|
|
|
|
|
Thanks to comet.berkeley.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Apr 29 05:10:52 UTC 2015
|
|
|
|
|
l/libxml2-2.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted a patch that breaks the catalog. Thanks to Stuart Winter.
|
|
|
|
|
n/gnupg-1.4.19-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix spurious debug messages that may break sbopkg and slackpkg.
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Apr 26 18:56:37 UTC 2015
|
|
|
|
|
l/shared-mime-info-1.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to not hammer the system with fsync.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Apr 26 16:50:47 UTC 2015
|
|
|
|
|
ap/cups-2.0.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix high CPU load on one core when adding or removing printers.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 25 23:13:15 UTC 2015
|
|
|
|
|
ap/sqlite-3.8.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/netpbm-10.66.02-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Fixed missing pnmtops. Thanks to Richard David Sherman.
|
|
|
|
|
n/gnupg2-2.0.27-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix spurious debug messages that may break sbopkg and slackpkg.
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
tcl/tcl-8.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
tcl/tk-8.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-20150425-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed runtime CPU detection. Thanks to Daniil Bratashov.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Apr 25 02:37:47 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.1-x86_64-6.txz: Rebuilt.
|
|
|
|
|
Added libstdc++.so.6.0.20.
|
|
|
|
|
a/cxxlibs-6.0.18-x86_64-1.txz: Removed.
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-4.txz: Rebuilt.
|
|
|
|
|
In mkinitrd_command_generator.sh: fixed the kernel version detection, and
|
|
|
|
|
muted the error about missing /sys hcd module directories.
|
|
|
|
|
Blacklisted iphone-set-info to prevent the initrd from uselessly bloating.
|
|
|
|
|
Thanks to Ryan P.C. McQuen, Eric Hameleers, and Dan Church.
|
|
|
|
|
d/gcc-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with --enable-install-libiberty. Thanks to fskmh.
|
|
|
|
|
d/gcc-g++-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-4.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/llvm-3.6.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed overly restrictive permissions on c++-analyzer, ccc-analyzer,
|
|
|
|
|
scan-build, set-xcode-analyzer, and scan-view.
|
|
|
|
|
Thanks to Ricardo Nabinger Sanchez.
|
|
|
|
|
l/gc-7.4.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix "undefined reference to `GC_setup_mark_lock'", noticed while
|
|
|
|
|
building inkscape. Thanks to Matteo Bernardini.
|
|
|
|
|
l/libmpc-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to fskmh.
|
|
|
|
|
l/lzo-2.09-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/netpbm-10.66.02-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed libnetpbm.so symlink. Thanks to Matteo Bernardini.
|
|
|
|
|
n/crda-3.18-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Ensure libreg.so is installed in the proper lib directory.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
n/iproute2-3.18.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Properly handle /etc/iproute2/nl_protos.new config file.
|
|
|
|
|
Thanks to Wim Speekenbrink.
|
|
|
|
|
n/libgpg-error-1.18-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Compress info file, and remove /usr/info/dir from package.
|
|
|
|
|
Thanks to Edward Trumbo.
|
|
|
|
|
Don't build static library.
|
|
|
|
|
n/php-5.6.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed permissions on /etc/httpd/. Thanks to Francisco Ambrozio.
|
|
|
|
|
n/rsync-3.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Apr 21 23:44:00 UTC 2015
|
|
|
|
|
Greetings! It has indeed been far too long. I apologize for the absence
|
|
|
|
|
of updates lately, but we've been using the time to get some good work done.
|
|
|
|
|
This is not a beta (probably not even an alpha release yet), but it is also
|
|
|
|
|
not a drill. ;-) We've spared you all most of the pain while we
|
|
|
|
|
transitioned to a lot of new libraries that got major version number bumps,
|
|
|
|
|
and have tested everything to ensure that this will be a smooth upgrade.
|
|
|
|
|
Still, I'd be surprised if all this didn't introduce any regressions, so if
|
|
|
|
|
you find any problems let us know. Huge thanks are due to Robby Workman,
|
|
|
|
|
Heinz Wiesinger, Eric Hameleers, and Stuart Winter for all the help. Have fun!
|
|
|
|
|
a/aaa_elflibs-14.1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
a/acl-2.2.52-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/acpid-2.0.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/attr-2.4.47-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/cryptsetup-1.6.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dbus-1.8.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/dosfstools-3.0.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/ed-1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/etc-14.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Added usbmux user to /etc/passwd.
|
|
|
|
|
a/file-5.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
Include the flat files in the package again.
|
|
|
|
|
Compile /etc/file/magic.mgc from the flat files upon installation,
|
|
|
|
|
and include a script in /etc/file/ to recompile from the flat files
|
|
|
|
|
to handle any local additions.
|
|
|
|
|
Thanks to Marco Maggi and Kees Theunissen.
|
|
|
|
|
a/gawk-4.1.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
a/gettext-0.19.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-solibs-2.21-x86_64-2.txz: Rebuilt.
|
|
|
|
|
a/glibc-zoneinfo-2015c-noarch-1.txz: Upgraded.
|
|
|
|
|
a/gptfdisk-1.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/hdparm-9.45-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/infozip-6.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
a/kernel-generic-3.18.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.18.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
Config changes for the huge kernel:
|
|
|
|
|
HW_RANDOM_VIRTIO m -> y
|
|
|
|
|
SCSI_VIRTIO m -> y
|
|
|
|
|
VIRTIO m -> y
|
|
|
|
|
VIRTIO_BALLOON m -> y
|
|
|
|
|
VIRTIO_BLK m -> y
|
|
|
|
|
VIRTIO_CONSOLE m -> y
|
|
|
|
|
VIRTIO_MMIO m -> y
|
|
|
|
|
VIRTIO_NET m -> y
|
|
|
|
|
VIRTIO_PCI m -> y
|
|
|
|
|
a/kernel-modules-3.18.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kmod-20-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/less-458-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/logrotate-3.8.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/lvm2-2.02.118-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/mdadm-3.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/mkinitrd-1.4.8-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Patched to fix a minor bug passing kernel options with -m.
|
|
|
|
|
Thanks to hutyerah.
|
|
|
|
|
a/ntfs-3g-2015.3.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.1m-x86_64-1.txz: Upgraded.
|
|
|
|
|
Dropped the old .so.0 libraries.
|
|
|
|
|
a/reiserfsprogs-3.6.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/smartmontools-6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-20.txz: Rebuilt.
|
|
|
|
|
Initialize the system clock frequency and tick in rc.S, and various other
|
|
|
|
|
clock handling improvements. Thanks to Xsane.
|
|
|
|
|
Filter errors from .gvfs when unmounting local filesystems.
|
|
|
|
|
Look for SDDM in rc.4.
|
|
|
|
|
a/udisks2-2.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/upower-0.9.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/usb_modeswitch-2.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/xfsprogs-3.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/xz-5.2.1-x86_64-1.tgz: Upgraded.
|
|
|
|
|
ap/alsa-utils-1.0.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/bc-1.06.95-x86_64-3.txz: Rebuilt.
|
|
|
|
|
ap/cdrtools-3.01a24-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-2.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/cups-filters-1.0.68-x86_64-1.txz: Added.
|
|
|
|
|
ap/dmidecode-2.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/flac-1.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/foomatic-filters-4.0.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/ghostscript-9.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gphoto2-2.5.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/gutenprint-5.2.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/hplip-3.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/htop-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/itstool-2.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lsscsi-0.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/lzip-1.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/man-pages-3.82-noarch-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-10.0.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/qpdf-5.1.2-x86_64-1.txz: Added.
|
|
|
|
|
ap/radeontool-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sox-14.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sqlite-3.8.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/tmux-1.9a-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/usbmuxd-1.0.9-x86_64-1.txz: Added.
|
|
|
|
|
ap/vim-7.4.692-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/xfsdump-3.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/zsh-5.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/bison-3.0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/clisp-2.49-x86_64-3.txz: Rebuilt.
|
|
|
|
|
d/cmake-3.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/doxygen-1.8.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/flex-2.5.39-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-java-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-objc-4.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gettext-tools-0.19.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/git-2.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/help2man-1.46.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.18.11-x86-1.txz: Upgraded.
|
|
|
|
|
d/libtool-2.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
d/pkg-config-0.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-2.7.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/python-setuptools-14.3-x86_64-1.txz: Added.
|
|
|
|
|
d/rcs-5.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/ruby-1.9.3_p551-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/strace-4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/swig-2.0.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/yasm-1.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
e/emacs-24.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.18.11-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/amarok-2.8.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/amor-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/analitza-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ark-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/artikulate-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/audiocd-kio-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/baloo-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/baloo-widgets-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/blinken-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/bluedevil-2.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/bomber-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/bovo-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/cantor-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/cervisia-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/dolphin-plugins-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/dragon-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/filelight-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/granatier-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/gwenview-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/juk-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/k3b-2.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kaccessible-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kactivities-4.13.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kajongg-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kalgebra-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kalzium-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kamera-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kanagram-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kapman-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kapptemplate-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kate-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/katomic-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kblackbox-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kblocks-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kbounce-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kbreakout-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kbruch-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kcachegrind-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kcalc-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kcharselect-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kcolorchooser-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kcron-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kde-base-artwork-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kde-baseapps-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kde-dev-scripts-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kde-dev-utils-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kde-runtime-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kde-wallpapers-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kde/kde-workspace-4.11.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdeadmin-4.10.5-x86_64-1.txz: Removed.
|
|
|
|
|
kde/kdeartwork-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdeconnect-kde-0.8-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdegraphics-mobipocket-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdegraphics-strigi-analyzer-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdegraphics-thumbnailers-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdelibs-4.14.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdenetwork-4.10.5-x86_64-1.txz: Removed.
|
|
|
|
|
kde/kdenetwork-filesharing-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdenetwork-strigi-analyzers-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdepim-4.14.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdepim-runtime-4.14.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdepimlibs-4.14.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdeplasma-addons-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdesdk-4.10.5-x86_64-1.txz: Removed.
|
|
|
|
|
kde/kdesdk-kioslaves-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdesdk-strigi-analyzers-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdesdk-thumbnailers-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdetoys-4.10.5-x86_64-1.txz: Removed.
|
|
|
|
|
kde/kdev-python-1.7.1-x86_64-1.txz: Added.
|
|
|
|
|
kde/kdevelop-4.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevelop-php-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevelop-php-docs-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdevplatform-1.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdewebdev-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdf-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kdiamond-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kfilemetadata-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kfloppy-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kfourinline-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kgamma-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kgeography-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kget-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kgoldrunner-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kgpg-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/khangman-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kig-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kigo-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/killbots-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kio-mtp-2063e75_20131020git-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kiriki-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kiten-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kjumpingcube-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/klettres-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/klickety-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/klines-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmag-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmahjongg-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmines-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmix-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmousetool-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmouth-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kmplot-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/knavalbattle-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/knetwalk-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kolf-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kollision-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kolourpaint-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kompare-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/konquest-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/konsole-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kopete-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/korundum-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kpat-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kppp-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kqtquickcharts-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/krdc-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kremotecontrol-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kreversi-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/krfb-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kross-interpreters-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kruler-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksaneplugin-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kscreen-1.0.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kshisen-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksirk-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksnakeduel-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksnapshot-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kspaceduel-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksquares-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kstars-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksudoku-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ksystemlog-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kteatime-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/ktimer-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ktouch-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ktuberling-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kturtle-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/ktux-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kubrick-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kuser-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kwallet-4.10.5-x86_64-1.txz: Removed.
|
|
|
|
|
kde/kwalletmanager-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/kwebkitpart-1.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/kwordquiz-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkcddb-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkcompactdisc-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkdcraw-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkdeedu-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkdegames-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkexiv2-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkipi-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkmahjongg-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkomparediff2-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/libksane-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libkscreen-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/libktorrent-1.3.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
kde/libmm-qt-1.0.1-x86_64-1.txz: Added.
|
|
|
|
|
kde/libnm-qt-0.9.8.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/lokalize-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/lskat-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/marble-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/mplayerthumbs-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/nepomuk-core-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/nepomuk-widgets-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/networkmanagement-0.9.0.9-x86_64-1.txz: Removed.
|
|
|
|
|
kde/okteta-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/okular-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/oxygen-gtk2-1.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/oxygen-gtk3-1.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/oxygen-icons-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/pairs-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/palapeli-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/parley-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/partitionmanager-1.1.1-x86_64-1.txz: Added.
|
|
|
|
|
kde/perlkde-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/perlqt-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/picmi-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/plasma-nm-0.9.3.5-x86_64-1.txz: Added.
|
|
|
|
|
kde/poxml-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/print-manager-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/pykde4-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/qtruby-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/rocs-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/skanlite-1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/smokegen-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/smokekde-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/smokeqt-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/step-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/superkaramba-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/svgpart-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/sweeper-4.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/umbrello-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kde/zeroconf-ioslave-4.14.3-x86_64-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-bs-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca@valencia-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-fi-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-nl-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-uk-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.9.2-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ar-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-bg-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-bs-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ca-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ca@valencia-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-cs-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-da-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-de-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-el-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-en_GB-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-es-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-et-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-eu-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-fa-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-fi-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-fr-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ga-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-gl-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-he-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-hi-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-hr-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-hu-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ia-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-id-4.14.3-noarch-1.txz: Added.
|
|
|
|
|
kdei/kde-l10n-is-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-it-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ja-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-kk-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-km-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ko-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-lt-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-lv-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-mr-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-nb-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-nds-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-nl-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-nn-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-pa-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-pl-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-pt-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-pt_BR-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ro-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ru-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-si-4.10.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/kde-l10n-sk-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-sl-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-sr-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-sv-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-tg-4.10.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/kde-l10n-th-4.10.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/kde-l10n-tr-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-ug-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-uk-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-vi-4.10.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/kde-l10n-wa-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-zh_CN-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/kde-l10n-zh_TW-4.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
l/LibRaw-0.16.0-x86_64-1.txz: Added.
|
|
|
|
|
l/a52dec-0.7.4-x86_64-1.txz: Added.
|
|
|
|
|
l/adwaita-icon-theme-3.14.1-noarch-1.txz: Added.
|
|
|
|
|
l/akonadi-1.13.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/alsa-lib-1.0.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/alsa-oss-1.0.28-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-atk-2.14.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/at-spi2-core-2.14.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/atk-2.14.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/attica-0.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/boost-1.58.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/cairo-1.14.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dbus-glib-0.104-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/dconf-0.22.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/desktop-file-utils-0.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/djvulibre-3.5.25.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/eigen3-3.2.4-x86_64-1.txz: Added.
|
|
|
|
|
l/exiv2-0.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/fftw-3.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/freetype-2.5.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/fuse-2.9.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gc-7.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gcr-3.14.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gd-2.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gdk-pixbuf2-2.30.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gegl-0.2.0-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/giflib-5.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glade3-3.8.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib-networking-2.42.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glib2-2.42.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.21-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/glibc-i18n-2.21-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/glibc-profile-2.21-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gmime-2.6.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gnome-icon-theme-3.8.3-x86_64-1.txz: Removed.
|
|
|
|
|
This has been replaced by the adwaita-icon-theme package.
|
|
|
|
|
l/gnome-keyring-3.14.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gnome-themes-standard-3.14.2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gobject-introspection-1.42.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/grantlee-0.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gsettings-desktop-schemas-3.14.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base-1.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-base0-0.10.36-x86_64-1.txz: Added.
|
|
|
|
|
l/gst-plugins-good-1.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gst-plugins-good0-0.10.31-x86_64-1.txz: Added.
|
|
|
|
|
l/gstreamer-1.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gstreamer0-0.10.36-x86_64-1.txz: Added.
|
|
|
|
|
l/gtk+2-2.24.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtk+3-3.14.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/gtkspell-2.0.16-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/gvfs-1.22.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/harfbuzz-0.9.40-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/hicolor-icon-theme-0.13-noarch-1.txz: Upgraded.
|
|
|
|
|
l/hunspell-1.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/icu4c-54.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/ilmbase-2.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/imlib-1.9.15-x86_64-7.txz: Removed.
|
|
|
|
|
l/iso-codes-3.57-noarch-1.txz: Upgraded.
|
|
|
|
|
l/jasper-1.900.1-x86_64-4.txz: Rebuilt.
|
|
|
|
|
l/jemalloc-3.6.0-x86_64-1.txz: Added.
|
|
|
|
|
l/judy-1.0.5-x86_64-1.txz: Added.
|
|
|
|
|
l/lcms-1.19-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/lcms2-2.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libao-1.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libbluedevil-2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libcanberra-0.29-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/libcddb-1.3.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/libcdio-0.93-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libcdio-paranoia-10.2+0.93+1-x86_64-1.txz: Added.
|
|
|
|
|
l/libdiscid-0.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libdvdnav-5.0.3-x86_64-1.txz: Added.
|
|
|
|
|
l/libdvdread-5.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libelf-0.8.13-x86_64-5.txz: Rebuilt.
|
|
|
|
|
l/libfakekey-0.1-x86_64-1.txz: Added.
|
|
|
|
|
l/libffi-3.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libglade-2.6.4-x86_64-5.txz: Rebuilt.
|
|
|
|
|
l/libgnome-keyring-3.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgphoto2-2.5.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgpod-0.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libgsf-1.14.33-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libimobiledevice-1.2.0-x86_64-1.txz: Added.
|
|
|
|
|
l/libiodbc-3.52.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libjpeg-turbo-1.4.0-x86_64-1.txz: Added.
|
|
|
|
|
l/libjpeg-v8a-x86_64-2.txz: Removed.
|
|
|
|
|
l/liblastfm-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libmng-2.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libmtp-1.1.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libnl3-3.2.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libnotify-0.7.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libodfgen-0.1.3-x86_64-1.txz: Added.
|
|
|
|
|
l/libogg-1.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libplist-1.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libpng-1.6.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libraw1394-2.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/librevenge-0.0.2-x86_64-1.txz: Added.
|
|
|
|
|
l/librsvg-2.40.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsecret-0.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libsigsegv-2.10-x86_64-1.txz: Added.
|
|
|
|
|
l/libsoup-2.48.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libssh-0.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libtasn1-4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtiff-4.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libusbmuxd-1.0.10-x86_64-1.txz: Added.
|
|
|
|
|
l/libvncserver-0.9.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libvorbis-1.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libvpx-1.3.0-x86_64-1.txz: Added.
|
|
|
|
|
l/libwmf-0.2.8.4-x86_64-6.txz: Rebuilt.
|
|
|
|
|
l/libwmf-docs-0.2.8.4-noarch-6.txz: Rebuilt.
|
|
|
|
|
l/libwnck-2.31.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libwpd-0.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libxklavier-5.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libxml2-2.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libxslt-1.1.28-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/lzo-2.08-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/netpbm-10.66.02-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/newt-0.52.18-x86_64-1.txz: Added.
|
|
|
|
|
l/openexr-2.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/openjpeg-2.1.0-x86_64-1.txz: Added.
|
|
|
|
|
l/orc-0.4.22-x86_64-1.txz: Added.
|
|
|
|
|
l/pango-1.36.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pcre-8.36-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/phonon-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/phonon-gstreamer-4.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/phonon-mplayer-1b1fd1f_20110823git-x86_64-1.txz: Removed.
|
|
|
|
|
l/phonon-xine-4.4.4-x86_64-1.txz: Removed.
|
|
|
|
|
l/pil-1.1.7-x86_64-4.txz: Removed.
|
|
|
|
|
l/pilot-link-0.12.5-x86_64-8.txz: Rebuilt.
|
|
|
|
|
l/polkit-gnome-0.102-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/poppler-0.32.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/poppler-data-0.4.7-noarch-1.txz: Upgraded.
|
|
|
|
|
l/pycairo-1.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/pycups-1.9.70-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/python-pillow-2.7.0-x86_64-1.txz: Added.
|
|
|
|
|
l/qt-4.8.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed issues with BMP, ICO, and GIF handling that could lead to a denial
|
|
|
|
|
of service or the execution of arbitrary code when processing malformed
|
|
|
|
|
images.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/qt-gstreamer-1.2.0-x86_64-1.txz: Added.
|
|
|
|
|
l/raptor2-2.0.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/sdl-1.2.15-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/seamonkey-solibs-2.33.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/shared-desktop-ontologies-0.11.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/shared-mime-info-1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/slang-2.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/soprano-2.9.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/strigi-0.7.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/svgalib-1.9.25-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/v4l-utils-1.6.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/virtuoso-ose-6.1.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/vte-0.28.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
l/wavpack-4.70.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/xapian-core-1.2.17-x86_64-1.txz: Added.
|
|
|
|
|
n/ModemManager-1.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/NetworkManager-1.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fix some denial-of-service and other security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01166/
|
|
|
|
|
https://kb.isc.org/article/AA-01161/
|
|
|
|
|
https://kb.isc.org/article/AA-01167/
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/bluez-4.101-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bluez-hcidump-2.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/crda-3.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.41.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dhcp-4.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dhcpcd-6.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/dirmngr-1.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/dnsmasq-2.72-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/fetchmail-6.3.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/getmail-4.47.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gnupg-1.4.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
|
|
|
|
|
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
|
|
|
|
|
* Fixed data-dependent timing variations in modular exponentiation
|
|
|
|
|
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
|
|
|
|
|
are Practical].
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/gnupg2-2.0.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gpa-0.9.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/gpgme-1.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/httpd-2.4.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
* CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer
|
|
|
|
|
over-read, with response headers' size above 8K.
|
|
|
|
|
* CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an
|
|
|
|
|
empty value. PR 56924.
|
|
|
|
|
* CVE-2014-8109 mod_lua: Fix handling of the Require line when a
|
|
|
|
|
LuaAuthzProvider is used in multiple Require directives with
|
|
|
|
|
different arguments. PR57204.
|
|
|
|
|
* CVE-2013-5704 core: HTTP trailers could be used to replace HTTP
|
|
|
|
|
headers late during request processing, potentially undoing or
|
|
|
|
|
otherwise confusing modules that examined or modified request
|
|
|
|
|
headers earlier. Adds "MergeTrailers" directive to restore legacy
|
|
|
|
|
behavior.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/iproute2-3.18.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/iptables-1.4.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/irssi-0.8.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/lftp-4.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libassuan-2.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libgcrypt-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
|
|
|
|
|
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
|
|
|
|
|
* Fixed data-dependent timing variations in modular exponentiation
|
|
|
|
|
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
|
|
|
|
|
are Practical].
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/libgpg-error-1.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libksba-1.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libmbim-1.12.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libndp-1.4-x86_64-1.txz: Added.
|
|
|
|
|
n/libnftnl-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libqmi-1.12.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/links-2.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/mutt-1.5.23-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched a vulnerability where malformed headers can cause mutt to crash.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/net-snmp-5.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/netatalk-2.2.3-x86_64-5.txz: Rebuilt.
|
|
|
|
|
n/netkit-ftp-0.17-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/nfs-utils-1.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nftables-0.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ntp-4.2.8p2-x86_64-1.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes the
|
|
|
|
|
following medium-severity vulnerabilities involving private key
|
|
|
|
|
authentication:
|
|
|
|
|
* ntpd accepts unauthenticated packets with symmetric key crypto.
|
|
|
|
|
* Authentication doesn't protect symmetric associations against DoS attacks.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/obex-data-server-0.4.6-x86_64-3.txz: Rebuilt.
|
|
|
|
|
n/openssl-1.0.1m-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixes several bugs and security issues:
|
|
|
|
|
o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
|
|
|
|
|
o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
|
|
|
|
|
o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
|
|
|
|
|
o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
|
|
|
|
|
o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
|
|
|
|
|
o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
|
|
|
|
|
o Removed the export ciphers from the DEFAULT ciphers
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/p11-kit-0.23.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.6.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes some security issues.
|
|
|
|
|
Please note that this package build also moves the configuration files
|
|
|
|
|
from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/pinentry-0.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/popa3d-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ppp-2.4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed a potential security issue in parsing option files.
|
|
|
|
|
Fixed remotely triggerable PID overflow that causes pppd to crash.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/proftpd-1.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Patched an issue where mod_copy allowed unauthenticated copying
|
|
|
|
|
of files via SITE CPFR/CPTO.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/slrn-1.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/tftp-hpa-5.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/tin-2.2.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
n/wget-1.16.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/whois-5.2.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/wpa_supplicant-2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
t/tetex-3.0-x86_64-10.txz: Rebuilt.
|
|
|
|
|
t/tetex-doc-3.0-x86_64-10.txz: Rebuilt.
|
|
|
|
|
t/transfig-3.2.5e-x86_64-3.txz: Rebuilt.
|
|
|
|
|
t/xfig-3.2.5c-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/bdftopcf-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/bitmap-1.0.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/compiz-0.8.8-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/font-util-1.3.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/fontconfig-2.11.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/fontsproto-2.1.3-noarch-1.txz: Upgraded.
|
|
|
|
|
x/fslsfonts-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/fstobdf-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/iceauth-1.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libX11-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXaw3dXft-1.6.2d-x86_64-1.txz: Added.
|
|
|
|
|
x/libXdmcp-1.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXfont-1.5.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXft-2.3.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/libXp-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXvMC-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXxf86vm-1.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libevdev-1.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libpciaccess-0.13.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libva-1.5.1-x86_64-1.txz: Added.
|
|
|
|
|
x/libva-intel-driver-1.5.1-x86_64-1.txz: Added.
|
|
|
|
|
x/libvdpau-1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxshmfence-1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Robby Workman and Heinz Wiesinger.
|
|
|
|
|
x/mkfontscale-1.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/motif-2.3.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/randrproto-1.4.1-noarch-1.txz: Upgraded.
|
|
|
|
|
x/rgb-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/scim-1.4.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/sessreg-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/showfont-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcalc-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-cursor-0.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-image-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-keysyms-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcursorgen-1.0.6-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xdg-utils-1.1.0_rc3-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xdm-1.1.11-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xedit-1.2.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-acecad-1.5.0-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-aiptek-1.4.1-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-evdev-2.9.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-joystick-1.6.1-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-keyboard-1.8.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-mouse-1.9.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-penmount-1.5.0-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-synaptics-1.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-vmmouse-13.0.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-void-1.4.0-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-wacom-0.19.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-apm-1.2.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ark-0.7.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ast-1.0.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ati-7.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-chips-1.2.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-cirrus-1.5.2-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-dummy-0.3.7-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-glint-1.2.8-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i128-1.3.6-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i740-1.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-2.99.917-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-mach64-6.9.4-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-mga-1.6.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-neomagic-1.2.8-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-nouveau-1.0.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-nv-2.1.20-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-openchrome-0.3.3-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-r128-6.9.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-rendition-4.2.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3-0.6.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3virge-1.10.6-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-savage-2.3.7-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-siliconmotion-1.7.7-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sis-0.10.7-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sisusb-0.9.6-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tdfx-1.4.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-tga-1.2.2-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-trident-1.3.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-tseng-1.2.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-v4l-0.2.0-x86_64-11.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vesa-2.3.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vmware-13.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-voodoo-1.2.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgi-git_5a3e0de677b7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-xgixp-1.8.1-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xfsinfo-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xinit-1.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xkbcomp-1.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xman-1.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.16.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.16.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.16.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.16.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xproto-7.0.27-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xterm-318-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xtrans-1.3.5-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/MPlayer-20150403-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to MPlayer from trunk built against ffmpeg-2.6.1.
|
|
|
|
|
xap/audacious-3.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/audacious-plugins-3.6.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/blueman-r708-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/electricsheep-20090306-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/fvwm-2.6.5-x86_64-7.txz: Rebuilt.
|
|
|
|
|
xap/geeqie-20150329git-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/gftp-2.0.19-x86_64-4.txz: Rebuilt.
|
|
|
|
|
xap/gimp-2.8.14-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/gnuchess-6.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to gnuchess-6.2.1 and xboard-4.8.0.
|
|
|
|
|
xap/gnuplot-4.6.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/gucharmap-3.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/imagemagick-6.9.0_10-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-37.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-31.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/network-manager-applet-1.0.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/rdesktop-1.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/sane-1.0.24-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xap/seamonkey-2.33.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/vim-gvim-7.4.692-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/windowmaker-0.95.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xaos-3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xchat-2.8.8-x86_64-10.txz: Rebuilt.
|
|
|
|
|
xap/xfractint-20.04p13-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xine-lib-1.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xine-ui-0.99.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xlockmore-5.46-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xpaint-2.9.10.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xsane-0.999-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xscreensaver-5.32-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xv-3.10a-x86_64-7.txz: Rebuilt.
|
|
|
|
|
xfce/Thunar-1.6.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/exo-0.10.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/garcon-0.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/gtk-xfce-engine-2.10.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/libxfce4ui-4.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/libxfce4util-4.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/libxfcegui4-4.10.0-x86_64-2.txz: Removed.
|
|
|
|
|
xfce/orage-4.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/thunar-volman-0.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/tumbler-0.1.31-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-appfinder-4.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-clipman-plugin-1.2.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-dev-tools-4.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-mixer-4.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-notifyd-0.2.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-panel-4.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-power-manager-1.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-screenshooter-1.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-session-4.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-settings-4.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-systemload-plugin-1.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-taskmanager-1.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-terminal-0.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-volumed-0.1.13-x86_64-2.txz: Rebuilt.
|
|
|
|
|
xfce/xfce4-weather-plugin-0.8.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfconf-4.12.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfdesktop-4.12.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfwm4-4.12.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xfce/xfwm4-themes-4.10.0-x86_64-1.txz: Removed.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
testing/source/config-testing-4.0/*: Added.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
usb-and-pxe-installers/usbimg2disk.sh: Patched to fix sfdisk bug.
|
|
|
|
|
Thanks to Tim Thomas.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Mar 5 21:56:15 UTC 2015
|
|
|
|
|
a/util-linux-2.26-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed dangling tunelp symlink. Thanks to Jesu Feran.
|
|
|
|
|
n/samba-4.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This package fixes security issues since the last update:
|
|
|
|
|
BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer
|
|
|
|
|
in netlogon server could lead to security vulnerability.
|
|
|
|
|
BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference
|
|
|
|
|
a NULL pointer.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/wget-1.16.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-36.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/google-chrome/google-chrome.SlackBuild: Patched.
|
|
|
|
|
Fixed google-chrome repackaging script due to the change from lzma to xz.
|
|
|
|
|
Thanks to Jennifer Doering.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Feb 26 01:06:11 UTC 2015
|
|
|
|
|
ap/vim-7.4.640-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gdb-7.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/nmap-6.47-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/glew-1.10.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added libGLEWmx to the package. Thanks to Klaatu and Larry Hajali.
|
|
|
|
|
xap/fluxbox-1.3.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-36.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-31.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/vim-gvim-7.4.640-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/xchat-2.8.8-x86_64-9.txz: Rebuilt.
|
|
|
|
|
Don't force the use of SSLv3, since many sites are dropping support for it.
|
|
|
|
|
Thanks to Schism.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Feb 21 00:00:27 UTC 2015
|
|
|
|
|
a/lilo-24.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Filter fdisk output to fix detecting Linux partitions.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-19.txz: Rebuilt.
|
|
|
|
|
Removed -w from grep in rc.S to detect rtc ioports correctly.
|
|
|
|
|
Thanks to Xsane.
|
|
|
|
|
a/util-linux-2.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
Patched to fix issues with EFI and GPT since switching to the new fdisk.
|
|
|
|
|
Thanks to Ryan P.C. McQuen and Jonathan Li for the helpful hints.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
Patched to fix issues with EFI and GPT since switching to the new fdisk.
|
|
|
|
|
Thanks to Ryan P.C. McQuen and Jonathan Li for the helpful hints.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Feb 16 19:33:36 UTC 2015
|
|
|
|
|
a/aaa_elflibs-14.1-x86_64-4.txz: Rebuilt.
|
|
|
|
|
a/btrfs-progs-20150213-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/coreutils-8.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/e2fsprogs-1.42.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-solibs-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-zoneinfo-2015a-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20150212git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.33-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.33-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.33-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/patch-2.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Patch no longer follows symbolic links to input and output files. This
|
|
|
|
|
ensures that symbolic links created by git-style patches cannot cause
|
|
|
|
|
patch to write outside the working directory.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
a/sharutils-4.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/sysvinit-scripts-2.0-noarch-18.txz: Rebuilt.
|
|
|
|
|
Patched the init scripts to produce nicer output from the new versions
|
|
|
|
|
of mount/umount. Run the GTK+/FDo registry rebuilds in the background
|
|
|
|
|
to speed up boot time. Optimize the search for icon cache files by only
|
|
|
|
|
looking in the directories they might be in, rather than all directories
|
|
|
|
|
under /usr/share/icons.
|
|
|
|
|
a/util-linux-2.25.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/sudo-1.8.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a potential security issue by only passing the TZ
|
|
|
|
|
environment variable it is considered safe. This prevents exploiting bugs
|
|
|
|
|
in glibc's TZ parser that could be used to read files that the user does
|
|
|
|
|
not have access to, or to cause a denial of service.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.sudo.ws/sudo/alerts/tz.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
d/guile-2.0.11-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against readline-6.3.
|
|
|
|
|
d/kernel-headers-3.14.33-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.33-noarch-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-i18n-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-profile-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/parted-3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/readline-6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/seamonkey-solibs-2.32.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ntp-4.2.8p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Changed rc.ntpd to no longer save the system time to the hardware clock.
|
|
|
|
|
This had been done in an effort to stop a time skew that may well have
|
|
|
|
|
been caused by other issues with hwclock and the kernel. If removing
|
|
|
|
|
this code causes any issues to return, let me know. Thanks to Xsane.
|
|
|
|
|
xap/seamonkey-2.32.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 28 19:23:00 UTC 2015
|
|
|
|
|
a/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded.
|
|
|
|
|
Upgraded to tzcode2014j and tzdata2014j.
|
|
|
|
|
a/patch-2.7.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-35.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jan 21 03:10:01 UTC 2015
|
|
|
|
|
d/gdb-7.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/alpine-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/imapd-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/samba-4.1.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update is a security release in order to address CVE-2014-8143
|
|
|
|
|
(Elevation of privilege to Active Directory Domain Controller).
|
|
|
|
|
Samba's AD DC allows the administrator to delegate creation of user or
|
|
|
|
|
computer accounts to specific users or groups. However, all released
|
|
|
|
|
versions of Samba's AD DC did not implement the additional required
|
|
|
|
|
check on the UF_SERVER_TRUST_ACCOUNT bit in the userAccountControl
|
|
|
|
|
attributes. Most Samba deployments are not of the AD Domain Controller,
|
|
|
|
|
but are of the classic domain controller, the file server or print server.
|
|
|
|
|
Only the Active Directory Domain Controller is affected by this issue.
|
|
|
|
|
Additionally, most sites running the AD Domain Controller do not configure
|
|
|
|
|
delegation for the creation of user or computer accounts, and so are not
|
|
|
|
|
vulnerable to this issue, as no writes are permitted to the
|
|
|
|
|
userAccountControl attribute, no matter what the value.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jan 17 04:26:41 UTC 2015
|
|
|
|
|
a/kernel-generic-3.14.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-java-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-objc-4.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.29-x86-1.txz: Upgraded.
|
|
|
|
|
d/libtool-2.4.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.29-noarch-1.txz: Upgraded.
|
|
|
|
|
l/freetype-2.5.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes a security bug that could cause freetype to crash
|
|
|
|
|
or run programs upon opening a specially crafted file.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/seamonkey-solibs-2.32-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-35.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-31.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/seamonkey-2.32-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jan 9 17:47:53 UTC 2015
|
|
|
|
|
a/openssl-solibs-1.0.1k-x86_64-1.txz: Upgraded.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/openssl-1.0.1k-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues:
|
|
|
|
|
DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
|
|
|
|
|
DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
|
|
|
|
|
no-ssl3 configuration sets method to NULL (CVE-2014-3569)
|
|
|
|
|
ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
|
|
|
|
|
RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
|
|
|
|
|
DH client certificates accepted without verification [Server] (CVE-2015-0205)
|
|
|
|
|
Certificate fingerprints can be modified (CVE-2014-8275)
|
|
|
|
|
Bignum squaring may produce incorrect results (CVE-2014-3570)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv_20150108.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/fluxbox-1.3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Dec 23 00:05:23 UTC 2014
|
|
|
|
|
a/kernel-generic-3.14.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.560-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.27-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.27-noarch-1.txz: Upgraded.
|
|
|
|
|
l/libusb-1.0.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libusb-compat-0.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/ntp-4.2.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
In addition to bug fixes and enhancements, this release fixes
|
|
|
|
|
several high-severity vulnerabilities discovered by Neel Mehta
|
|
|
|
|
and Stephen Roettger of the Google Security Team.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.kb.cert.org/vuls/id/852879
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.4.36-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
#68545 (NULL pointer dereference in unserialize.c).
|
|
|
|
|
#68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142)
|
|
|
|
|
#68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/libdrm-2.4.58-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libvdpau-0.9-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Heinz Wiesinger.
|
|
|
|
|
x/mesa-10.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.15.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
This update fixes many security issues discovered by Ilja van Sprundel,
|
|
|
|
|
a security researcher with IOActive.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/xorg-server-xephyr-1.15.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.15.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.15.2-x86_64-3.txz: Rebuilt.
|
|
|
|
|
xap/MPlayer-1.1_20130819-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled with support for libvdpau.
|
|
|
|
|
xap/vim-gvim-7.4.560-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
testing/source/config-testing-3.18.1/*: Added.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Dec 11 01:18:35 UTC 2014
|
|
|
|
|
a/gptfdisk-0.8.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/seamonkey-solibs-2.31-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.10.1_P1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue where a failure to place limits on
|
|
|
|
|
delegation chaining can allow an attacker to crash BIND or cause memory
|
|
|
|
|
exhaustion.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01216
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/openssh-6.7p1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Restored support for tcpwrappers that was dropped by upstream.
|
|
|
|
|
Thanks to mancha.
|
|
|
|
|
n/openvpn-2.3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue that allows remote authenticated
|
|
|
|
|
users to cause a denial of service (server crash) via a small control
|
|
|
|
|
channel packet.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/wpa_supplicant-2.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a remote command-execution vulnerability caused by a
|
|
|
|
|
failure to adequately sanitize user-supplied input.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/pidgin-2.10.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains login fixes for MSN and some XMPP servers.
|
|
|
|
|
xap/seamonkey-2.31-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Dec 3 07:03:12 UTC 2014
|
|
|
|
|
xap/mozilla-thunderbird-31.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Dec 1 23:57:40 UTC 2014
|
|
|
|
|
a/grep-2.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/groff-1.22.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-34.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Nov 16 22:41:20 UTC 2014
|
|
|
|
|
a/kernel-generic-3.14.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.24-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.24-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-33.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
testing/source/config-testing-3.17.3/*: Added.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Nov 13 20:45:54 UTC 2014
|
|
|
|
|
ap/mariadb-5.5.40-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Reverted change to my_config.h that breaks compiling many applications
|
|
|
|
|
that link against the MariaDB libraries.
|
|
|
|
|
Thanks to Willy Sudiarto Raharjo.
|
|
|
|
|
xap/pidgin-2.10.10-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix Gadu-Gadu protocol when GnuTLS is not used. Thanks to mancha.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 11 04:53:57 UTC 2014
|
|
|
|
|
xap/mozilla-firefox-33.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Nov 7 21:02:55 UTC 2014
|
|
|
|
|
a/bash-4.3.030-x86_64-1.txz: Upgraded.
|
|
|
|
|
Applied all upstream patches. The previously applied patch requiring
|
|
|
|
|
a specific prefix/suffix in order to parse variables for functions
|
|
|
|
|
closed all of the known vulnerabilities anyway, but it's clear that
|
|
|
|
|
until all the patches were applied that the "is this still vulnerable"
|
|
|
|
|
questions were not going to end...
|
|
|
|
|
a/btrfs-progs-20141107-x86_64-1.txz: Upgraded.
|
|
|
|
|
Added the header files to the package. Thanks to Vincent Batts.
|
|
|
|
|
a/kernel-firmware-20141106git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mpg123-1.21.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.23-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.23-noarch-1.txz: Upgraded.
|
|
|
|
|
xfce/xfce4-weather-plugin-0.8.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Nov 4 00:05:23 UTC 2014
|
|
|
|
|
ap/mariadb-5.5.40-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/seamonkey-solibs-2.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/php-5.4.34-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
#68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
|
|
|
|
|
#68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
|
|
|
|
|
#68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-firefox-33.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/seamonkey-2.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Oct 29 18:21:12 UTC 2014
|
|
|
|
|
ap/moc-2.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/wget-1.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a symlink vulnerability that could allow an attacker
|
|
|
|
|
to write outside of the expected directory.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Oct 25 04:30:31 UTC 2014
|
|
|
|
|
xap/gimp-2.8.14-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Oct 24 21:11:15 UTC 2014
|
|
|
|
|
a/glibc-solibs-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched bug pr61801, which caused some failures with glibc-2.20.
|
|
|
|
|
d/gcc-g++-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-4.8.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/glibc-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled with patched gcc.
|
|
|
|
|
l/glibc-i18n-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
l/glibc-profile-2.20-x86_64-2.txz: Rebuilt.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Oct 24 04:55:44 UTC 2014
|
|
|
|
|
a/glibc-solibs-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-zoneinfo-2014i-noarch-1.txz: Upgraded.
|
|
|
|
|
Upgraded to tzcode2014i and tzdata2014i.
|
|
|
|
|
l/glibc-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues, and adds an extra security
|
|
|
|
|
hardening patch from Florian Weimer. Thanks to mancha for help with
|
|
|
|
|
tracking and backporting patches.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/glibc-i18n-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-profile-2.20-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/pidgin-2.10.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues:
|
|
|
|
|
Insufficient SSL certificate validation (CVE-2014-3694)
|
|
|
|
|
Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
|
|
|
|
|
Remote crash parsing malformed Groupwise message (CVE-2014-3696)
|
|
|
|
|
Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
|
|
|
|
|
Potential information leak from XMPP (CVE-2014-3698)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Oct 21 02:10:33 UTC 2014
|
|
|
|
|
e/emacs-24.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Oct 20 22:21:45 UTC 2014
|
|
|
|
|
n/openssh-6.7p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue that allows remote servers to trigger
|
|
|
|
|
the skipping of SSHFP DNS RR checking by presenting an unacceptable
|
|
|
|
|
HostCertificate.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Wed Oct 15 17:28:59 UTC 2014
|
|
|
|
|
a/openssl-solibs-1.0.1j-x86_64-1.txz: Upgraded.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/openssl-1.0.1j-x86_64-1.tx: Upgraded.
|
|
|
|
|
This update fixes several security issues:
|
|
|
|
|
SRTP Memory Leak (CVE-2014-3513):
|
|
|
|
|
A flaw in the DTLS SRTP extension parsing code allows an attacker, who
|
|
|
|
|
sends a carefully crafted handshake message, to cause OpenSSL to fail
|
|
|
|
|
to free up to 64k of memory causing a memory leak. This could be
|
|
|
|
|
exploited in a Denial Of Service attack.
|
|
|
|
|
Session Ticket Memory Leak (CVE-2014-3567):
|
|
|
|
|
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
|
|
|
|
|
integrity of that ticket is first verified. In the event of a session
|
|
|
|
|
ticket integrity check failing, OpenSSL will fail to free memory
|
|
|
|
|
causing a memory leak. By sending a large number of invalid session
|
|
|
|
|
tickets an attacker could exploit this issue in a Denial Of Service
|
|
|
|
|
attack.
|
|
|
|
|
SSL 3.0 Fallback protection:
|
|
|
|
|
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
|
|
|
|
|
to block the ability for a MITM attacker to force a protocol
|
|
|
|
|
downgrade.
|
|
|
|
|
Some client applications (such as browsers) will reconnect using a
|
|
|
|
|
downgraded protocol to work around interoperability bugs in older
|
|
|
|
|
servers. This could be exploited by an active man-in-the-middle to
|
|
|
|
|
downgrade connections to SSL 3.0 even if both sides of the connection
|
|
|
|
|
support higher protocols. SSL 3.0 contains a number of weaknesses
|
|
|
|
|
including POODLE (CVE-2014-3566).
|
|
|
|
|
Build option no-ssl3 is incomplete (CVE-2014-3568):
|
|
|
|
|
When OpenSSL is configured with "no-ssl3" as a build option, servers
|
|
|
|
|
could accept and complete a SSL 3.0 handshake, and clients could be
|
|
|
|
|
configured to send them.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv_20141015.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Oct 14 23:45:01 UTC 2014
|
|
|
|
|
xap/mozilla-firefox-33.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-31.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Sun Oct 5 00:38:31 UTC 2014
|
|
|
|
|
a/elilo-3.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to fsLeg for the extra bit of sed that was needed to build the
|
|
|
|
|
latest version.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Sep 29 18:41:23 UTC 2014
|
|
|
|
|
a/bash-4.3.027-x86_64-1.txz: Upgraded.
|
|
|
|
|
Another bash update. Here's some information included with the patch:
|
|
|
|
|
"This patch changes the encoding bash uses for exported functions to avoid
|
|
|
|
|
clashes with shell variables and to avoid depending only on an environment
|
|
|
|
|
variable's contents to determine whether or not to interpret it as a shell
|
|
|
|
|
function."
|
|
|
|
|
After this update, an environment variable will not go through the parser
|
|
|
|
|
unless it follows this naming structure: BASH_FUNC_*%%
|
|
|
|
|
Most scripts never expected to import functions from environment variables,
|
|
|
|
|
so this change (although not backwards compatible) is not likely to break
|
|
|
|
|
many existing scripts. It will, however, close off access to the parser as
|
|
|
|
|
an attack surface in the vast majority of cases. There's already another
|
|
|
|
|
vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
|
|
|
|
|
but this hardening patch prevents it (and likely many more similar ones).
|
|
|
|
|
Thanks to Florian Weimer and Chet Ramey.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
2009-08-26 17:00:38 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Sun Sep 28 23:07:39 UTC 2014
|
|
|
|
|
l/seamonkey-solibs-2.29.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-32.0.3-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2016-06-30 22:26:57 +02:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-31.1.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/seamonkey-2.29.1-x86_64-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri Sep 26 22:23:32 UTC 2014
|
|
|
|
|
a/bash-4.3.026-x86_64-1.txz: Upgraded.
|
|
|
|
|
This is essentially a rebuild as the preliminary patch for CVE-2014-7169
|
|
|
|
|
has been accepted by upstream and is now signed. This also bumps the
|
|
|
|
|
patchlevel, making it easy to tell this is the fixed version.
|
|
|
|
|
Possibly more changes to come, given the ongoing discussions on oss-sec.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Sep 25 19:55:13 UTC 2014
|
|
|
|
|
a/bash-4.3.025-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched an additional trailing string processing vulnerability discovered
|
|
|
|
|
by Tavis Ormandy.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
ap/lxc-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed bash completion file. Thanks to dunric.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Sep 24 22:52:53 UTC 2014
|
|
|
|
|
a/bash-4.3.025-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a vulnerability in bash related to how environment
|
|
|
|
|
variables are processed: trailing code in function definitions was
|
|
|
|
|
executed, independent of the variable name. In many common configurations
|
|
|
|
|
(such as the use of CGI scripts), this vulnerability is exploitable over
|
|
|
|
|
the network. Thanks to Stephane Chazelas for discovering this issue.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://seclists.org/oss-sec/2014/q3/650
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/mozilla-nss-3.16.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed an RSA Signature Forgery vulnerability.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Sep 9 22:48:58 UTC 2014
|
|
|
|
|
a/btrfs-progs-20140909-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/net-snmp-5.7.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Patched to properly report Btrfs mounts in hrFS/hrStorage tables.
|
|
|
|
|
Thanks to Jakub Jankowski.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Sep 9 18:01:05 UTC 2014
|
|
|
|
|
a/kernel-firmware-20140909git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.18-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.18-noarch-1.txz: Upgraded.
|
|
|
|
|
l/seamonkey-solibs-2.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/rdesktop-1.8.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/seamonkey-2.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Sep 4 19:43:25 UTC 2014
|
|
|
|
|
xap/mozilla-firefox-32.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2016-06-30 22:26:57 +02:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-31.1.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
n/php-5.4.32-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Aug 28 23:17:47 UTC 2014
|
|
|
|
|
l/mozilla-nss-3.16.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.16.4 and nspr-4.10.7.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Aug 25 22:02:08 UTC 2014
|
|
|
|
|
a/kernel-generic-3.14.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/libcgroup-0.41-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.17-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.17-noarch-1.txz: Upgraded.
|
|
|
|
|
Changed these kernel options:
|
|
|
|
|
CONNECTOR m -> y
|
|
|
|
|
+PROC_EVENTS y
|
|
|
|
|
Thanks to linuxxer.
|
|
|
|
|
l/freetype-2.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/tin-2.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxcb-1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.2.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
|
|
|
|
|
x/xcb-proto-1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-mouse-1.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-ast-1.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xfs-1.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.15.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Added these explicit options for all X servers:
|
|
|
|
|
--enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
|
|
|
|
|
Thanks to Dinithion.
|
|
|
|
|
x/xorg-server-xephyr-1.15.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xnest-1.15.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xorg-server-xvfb-1.15.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xrandr-1.4.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix ABI mismatch. Thanks to dr.s.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
kernels/*: Upgraded.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri Aug 8 19:02:50 UTC 2014
|
|
|
|
|
Welcome pi kernel! Unless we reach kernel 3.14.159, this is probably the best
|
|
|
|
|
approximation we're going to get. :-)
|
|
|
|
|
a/kernel-firmware-20140807git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/openssl-solibs-1.0.1i-x86_64-1.txz: Upgraded.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
d/kernel-headers-3.14.16-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.16-noarch-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1i-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes several security issues:
|
|
|
|
|
Double Free when processing DTLS packets (CVE-2014-3505)
|
|
|
|
|
DTLS memory exhaustion (CVE-2014-3506)
|
|
|
|
|
DTLS memory leak from zero-length fragments (CVE-2014-3507)
|
|
|
|
|
Information leak in pretty printing functions (CVE-2014-3508)
|
|
|
|
|
Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
|
|
|
|
|
OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
|
|
|
|
|
OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
|
|
|
|
|
SRP buffer overrun (CVE-2014-3512)
|
|
|
|
|
Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.openssl.org/news/secadv_20140806.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
|
|
|
|
|
(* Security fix *)
|
2009-08-26 17:00:38 +02:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2010-05-19 10:58:23 +02:00
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Aug 4 20:55:26 UTC 2014
|
|
|
|
|
a/gpm-1.20.7-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Removed the mouse-t.el file, which is older than the version in Emacs.
|
|
|
|
|
Thanks to Richard Cranium.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Aug 1 21:13:18 UTC 2014
|
|
|
|
|
n/dhcpcd-6.0.5-x86_64-3.txz: Rebuilt.
|
|
|
|
|
This update fixes a security issue where a specially crafted packet
|
|
|
|
|
received from a malicious DHCP server causes dhcpcd to enter an infinite
|
|
|
|
|
loop causing a denial of service.
|
|
|
|
|
Thanks to Tobias Stoeckmann for the bug report.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.1.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a remote code execution attack on unauthenticated nmbd
|
|
|
|
|
NetBIOS name services. A malicious browser can send packets that may
|
|
|
|
|
overwrite the heap of the target nmbd NetBIOS name services daemon.
|
|
|
|
|
It may be possible to use this to generate a remote code execution
|
|
|
|
|
vulnerability as the superuser (root).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/xscreensaver-5.29-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Disabled nag screen that says "This version of XScreenSaver is very old!
|
|
|
|
|
Please upgrade!" when the age of the software exceeds 12 months.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jul 30 00:08:00 UTC 2014
|
|
|
|
|
d/gdb-7.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/guile-2.0.11-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXext-1.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXi-1.7.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-intel-2.99.914-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xterm-310-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jul 23 23:00:34 UTC 2014
|
|
|
|
|
a/kernel-generic-3.14.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.13-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/nano-2.3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.13-x86-1.txz: Upgraded.
|
|
|
|
|
e/emacs-24.3-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Renamed ctags manpage that conflicts with Exuberant Ctags. Thanks to Jim.
|
|
|
|
|
k/kernel-source-3.14.13-noarch-1.txz: Upgraded.
|
|
|
|
|
n/httpd-2.4.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
*) SECURITY: CVE-2014-0117 (cve.mitre.org)
|
|
|
|
|
mod_proxy: Fix crash in Connection header handling which
|
|
|
|
|
allowed a denial of service attack against a reverse proxy
|
|
|
|
|
with a threaded MPM. [Ben Reser]
|
|
|
|
|
*) SECURITY: CVE-2014-0118 (cve.mitre.org)
|
|
|
|
|
mod_deflate: The DEFLATE input filter (inflates request bodies) now
|
|
|
|
|
limits the length and compression ratio of inflated request bodies to
|
|
|
|
|
avoid denial of sevice via highly compressed bodies. See directives
|
|
|
|
|
DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
|
|
|
|
|
and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
|
|
|
|
|
*) SECURITY: CVE-2014-0226 (cve.mitre.org)
|
|
|
|
|
Fix a race condition in scoreboard handling, which could lead to
|
|
|
|
|
a heap buffer overflow. [Joe Orton, Eric Covener]
|
|
|
|
|
*) SECURITY: CVE-2014-0231 (cve.mitre.org)
|
|
|
|
|
mod_cgid: Fix a denial of service against CGI scripts that do
|
|
|
|
|
not consume stdin that could lead to lingering HTTPD child processes
|
|
|
|
|
filling up the scoreboard and eventually hanging the server. By
|
|
|
|
|
default, the client I/O timeout (Timeout directive) now applies to
|
|
|
|
|
communication with scripts. The CGIDScriptTimeout directive can be
|
|
|
|
|
used to set a different timeout for communication with scripts.
|
|
|
|
|
[Rainer Jung, Eric Covener, Yann Ylavic]
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-firefox-31.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-31.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Sun Jul 20 05:00:36 UTC 2014
|
|
|
|
|
x/mesa-10.2.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Added --with-egl-platforms="drm,x11". Without this, the EGL support for drm
|
|
|
|
|
is not built leading to crashes with newer radeon hardware.
|
|
|
|
|
Thanks to sberthelot and Robby Workman.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Wed Jul 16 05:31:30 UTC 2014
|
|
|
|
|
x/xf86-video-intel-2.99.912-x86_64-1.txz: Upgraded.
|
|
|
|
|
Looks like the stable driver won't compile with the new xorg-server, so
|
|
|
|
|
we'll try this one.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jul 15 23:53:10 UTC 2014
|
|
|
|
|
Enjoy some new X related updates! Thanks to Robby Workman for lots of help
|
|
|
|
|
on the X.Org upgrades, and to alienBOB for an earlier SlackBuild for Motif
|
|
|
|
|
that I used as a reference for configure options and other fixes.
|
|
|
|
|
You can blame me for picking xorg-server-1.15.2 over xorg-server-1.14.7. ;-)
|
|
|
|
|
If you're using a proprietary video driver you'll probably need to recompile it
|
|
|
|
|
for the new X server... if you can.
|
|
|
|
|
ap/linuxdoc-tools-0.9.69-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl.
|
|
|
|
|
Thanks to Matteo Bernardini for the report.
|
|
|
|
|
ap/lxc-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/automake-1.14.1-noarch-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
kde/calligra-2.8.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-bs-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca\@valencia-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-en_GB-2.8.5-noarch-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-es-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-fi-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ia-2.7.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-it-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ja-2.8.5-noarch-1.txz: Added.
|
|
|
|
|
kdei/calligra-l10n-kk-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sl-2.7.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-sv-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.7.5-noarch-1.txz: Removed.
|
|
|
|
|
kdei/calligra-l10n-uk-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.8.5-noarch-1.txz: Upgraded.
|
|
|
|
|
l/lesstif-0.95.2-x86_64-1.txz: Removed.
|
|
|
|
|
LessTif is making way for real Motif.
|
|
|
|
|
Thanks to the Hungry Programmers for a great run. :-)
|
|
|
|
|
t/tetex-3.0-x86_64-9.txz: Rebuilt.
|
|
|
|
|
Recompiled /usr/bin/xdvi-motif.bin against Motif.
|
|
|
|
|
x/dri3proto-1.0-x86_64-1.txz: Added.
|
|
|
|
|
x/fontconfig-2.11.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/freeglut-2.8.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/gccmakedep-1.0.3-noarch-1.txz: Upgraded.
|
|
|
|
|
x/glamor-egl-0.6.0-x86_64-1.txz: Added.
|
|
|
|
|
x/glew-1.10.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/glproto-1.4.17-noarch-1.txz: Upgraded.
|
|
|
|
|
x/imake-1.0.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/inputproto-2.3.1-noarch-1.txz: Upgraded.
|
|
|
|
|
x/libFS-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libICE-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXfont-1.4.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXft-2.3.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libXi-1.7.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libdrm-2.4.54-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libevdev-1.2-x86_64-1.txz: Added.
|
|
|
|
|
x/libxcb-1.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/libxshmfence-1.1-x86_64-1.txz: Added.
|
|
|
|
|
x/makedepend-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/mesa-10.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/motif-2.3.4-x86_64-1.txz: Added.
|
|
|
|
|
x/mtdev-1.1.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/pixman-0.32.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/presentproto-1.0-x86_64-1.txz: Added.
|
|
|
|
|
x/util-macros-1.19.0-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xauth-1.0.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-proto-1.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-cursor-0.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-renderutil-0.3.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcb-util-wm-0.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xcursorgen-1.0.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xdg-user-dirs-0.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xextproto-7.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-acecad-1.5.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-aiptek-1.4.1-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-evdev-2.9.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-joystick-1.6.1-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-keyboard-1.8.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-mouse-1.9.0-x86_64-4.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-penmount-1.5.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-synaptics-1.8.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-input-vmmouse-13.0.0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-void-1.4.0-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-input-wacom-0.19.0-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-apm-1.2.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ark-0.7.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-ast-0.99.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-ati-7.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-chips-1.2.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-cirrus-1.5.2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-dummy-0.3.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-glint-1.2.8-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i128-1.3.6-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-i740-1.3.4-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-mach64-6.9.4-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-mga-1.6.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-modesetting-0.9.0-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-neomagic-1.2.8-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-nouveau-1.0.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-nv-2.1.20-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-openchrome-0.3.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-r128-6.9.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-rendition-4.2.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3-0.6.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-s3virge-1.10.6-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-savage-2.3.7-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-siliconmotion-1.7.7-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sis-0.10.7-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-sisusb-0.9.6-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tdfx-1.4.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tga-1.2.2-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-trident-1.3.6-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-tseng-1.2.5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-v4l-0.2.0-x86_64-10.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vesa-2.3.3-x86_64-2.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-vmware-13.0.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xf86-video-voodoo-1.2.5-x86_64-6.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgi-git_be3abf8570a-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xf86-video-xgixp-1.8.1-x86_64-5.txz: Rebuilt.
|
|
|
|
|
x/xkeyboard-config-2.11-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xorg-cf-files-1.0.5-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-1.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xephyr-1.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xnest-1.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xorg-server-xvfb-1.15.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xproto-7.0.26-noarch-1.txz: Upgraded.
|
|
|
|
|
x/xrandr-1.4.2-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xscope-1.4.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xterm-309-x86_64-1.txz: Upgraded.
|
|
|
|
|
x/xtrans-1.3.4-noarch-1.txz: Upgraded.
|
|
|
|
|
xap/ddd-3.3.12-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Recompiled against Motif.
|
|
|
|
|
xap/xpdf-3.04-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jul 12 17:34:47 UTC 2014
|
|
|
|
|
ap/nano-2.3.5-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Provide --datadir to ./configure to work around a bug that installed the
|
|
|
|
|
locale files in the wrong directory.
|
|
|
|
|
Thanks to Wim Speekenbrink.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sat Jul 12 02:24:10 UTC 2014
|
|
|
|
|
a/bash-4.3.018-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20140710git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.12-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/shadow-4.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This adds support for subuid and subgid needed for unprivileged containers.
|
|
|
|
|
Thanks to Christoph Willing.
|
|
|
|
|
ap/cgmanager-20140710_986cd44-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Matteo Bernardini.
|
|
|
|
|
ap/linuxdoc-tools-0.9.69-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
ap/lxc-1.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This adds a template for for lxc-create to create a minimal Slackware
|
|
|
|
|
container using slackpkg. For example, this will create a container
|
|
|
|
|
named "current":
|
|
|
|
|
lxc-create -n current -t slackware
|
|
|
|
|
There's an rc.lxc init script added to autorun/autostop containers, but it's
|
|
|
|
|
not currently hooked in to the main init scripts, so if you want to use it
|
|
|
|
|
you'll need to add it to your rc.local and rc.local_shutdown (and make it
|
|
|
|
|
executable). The script will look for "lxc.start.auto = 1" in the container
|
|
|
|
|
config file to determine if a container should be autostarted (1) or not (0).
|
|
|
|
|
Thanks to Matteo Bernardini.
|
|
|
|
|
ap/lzip-1.15-x86_64-1.txz: Added.
|
|
|
|
|
ap/nano-2.3.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/slackpkg-2.82.0-noarch-13.tgz: Rebuilt.
|
|
|
|
|
Patched to support $ROOT and $CONF environment variables.
|
|
|
|
|
Thanks to Matteo Bernardini.
|
|
|
|
|
d/gnu-cobol-1.1-x86_64-1.txz: Added.
|
|
|
|
|
d/kernel-headers-3.14.12-x86-1.txz: Upgraded.
|
|
|
|
|
d/open-cobol-1.1-x86_64-2.txz: Removed.
|
|
|
|
|
This project has been renamed GNU Cobol.
|
|
|
|
|
d/slacktrack-2.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
Thanks to Stuart Winter.
|
|
|
|
|
k/kernel-source-3.14.12-noarch-1.txz: Upgraded.
|
|
|
|
|
Added back CONFIG_USER_NS=y now that it no longer conflicts with XFS.
|
|
|
|
|
Thanks to Christoph Willing.
|
|
|
|
|
l/libnih-1.0.3-x86_64-1.txz: Added.
|
|
|
|
|
Thanks to Matteo Bernardini.
|
|
|
|
|
l/taglib-1.9.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
Linked with -lstdc++. Thanks to comet.berkeley.
|
|
|
|
|
n/php-5.4.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
testing/source/config-testing-3.15.5/*: Added.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Jun 24 22:35:07 UTC 2014
|
|
|
|
|
ap/man-1.6g-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Moved config file to /etc.
|
|
|
|
|
ap/man-pages-3.69-noarch-1.txz: Upgraded.
|
|
|
|
|
l/seamonkey-solibs-2.26.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/bind-9.9.5_P1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This fixes security issues and other bugs. Please note that the first
|
|
|
|
|
CVE only affects Windows, and the second one was claimed to be fixed by
|
|
|
|
|
an earlier version of BIND. But we'll update anyway just in case. :-)
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/gnupg-1.4.17-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release includes a security fix to stop a denial of service using
|
|
|
|
|
garbled compressed data packets which can be used to put gpg into an
|
|
|
|
|
infinite loop.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/gnupg2-2.0.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release includes a security fix to stop a denial of service using
|
|
|
|
|
garbled compressed data packets which can be used to put gpg into an
|
|
|
|
|
infinite loop.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.1.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues, including a flaw in Samba's
|
|
|
|
|
internal DNS server which can be exploited to cause a denial of service,
|
|
|
|
|
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
|
|
|
|
|
configurations that use shadow_copy* for vfs objects to reveal potentially
|
|
|
|
|
private server information, a denial of service on the nmbd NetBIOS name
|
|
|
|
|
services daemon, and a denial of service crash involving overwriting
|
|
|
|
|
memory on an authenticated connection to the smbd file server.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/seamonkey-2.26.1-x86_64-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
This update contains security fixes and improvements.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
testing/packages/bind-9.10.0_P2-x86_64-1.txz: Added.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jun 17 22:19:30 UTC 2014
|
|
|
|
|
l/ncurses-5.9-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Applied upstream patch ncurses-5.9-20140308-patch.sh.
|
|
|
|
|
Thanks to comet.berkeley.
|
|
|
|
|
n/yptools-2.14-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Corrected yppasswd patch that was causing password changes to fail.
|
|
|
|
|
Thanks to Henrik Carlqvist.
|
|
|
|
|
xap/xscreensaver-5.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jun 12 05:11:52 UTC 2014
|
|
|
|
|
ap/ddrescue-1.18.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-30.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-24.6.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Jun 9 20:16:02 UTC 2014
|
|
|
|
|
n/php-5.4.29-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes bugs and security issues, including a possible denial
|
|
|
|
|
of service, and an issue where insecure default permissions on the FPM
|
|
|
|
|
socket may allow local users to run arbitrary code as the apache user.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Jun 6 04:27:01 UTC 2014
|
|
|
|
|
a/openssl-solibs-1.0.1h-x86_64-1.txz: Upgraded.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/nano-2.3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/libtasn1-3.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
Multiple security issues have been corrected in the libtasn1 library.
|
|
|
|
|
These errors allow a remote attacker to cause a denial of service, or
|
|
|
|
|
possibly to execute arbitrary code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/gnutls-3.2.15-x86_64-1.txz: Upgraded.
|
|
|
|
|
A security issue has been corrected in gnutls. This vulnerability
|
|
|
|
|
affects the client side of the gnutls library. A server that sends
|
|
|
|
|
a specially crafted ServerHello could corrupt the memory of a requesting
|
|
|
|
|
client. This may allow a remote attacker to execute arbitrary code.
|
|
|
|
|
Additional vulnerabilities in the embedded libtasn1 library have also
|
|
|
|
|
been patched.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/irssi-0.8.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1h-x86_64-1.txz: Upgraded.
|
|
|
|
|
Multiple security issues have been corrected, including a possible
|
|
|
|
|
man-in-the-middle attack where weak keying material is forced, denial
|
|
|
|
|
of service, and the execution of arbitrary code.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openssl.org/news/secadv_20140605.txt
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/sendmail-8.14.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
This release fixes one security related bug by properly closing file
|
|
|
|
|
descriptors (except stdin, stdout, and stderr) before executing programs.
|
|
|
|
|
This bug could enable local users to interfere with an open SMTP
|
|
|
|
|
connection if they can execute their own program for mail delivery
|
|
|
|
|
(e.g., via procmail or the prog mailer).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Sun Jun 1 19:48:54 UTC 2014
|
|
|
|
|
a/gawk-4.1.1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
|
|
|
|
|
Compressed the man pages in man3.
|
|
|
|
|
a/kernel-generic-3.14.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/mariadb-5.5.37-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
ap/nano-2.3.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-g++-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gfortran-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-gnat-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-go-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-java-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-objc-4.8.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.5-x86-1.txz: Upgraded.
|
|
|
|
|
d/make-3.82-x86_64-5.txz: Rebuilt.
|
|
|
|
|
Patched to fix a bug with parallel builds.
|
|
|
|
|
Thanks to Danny Schmarsel.
|
|
|
|
|
k/kernel-source-3.14.5-noarch-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2010-05-19 10:58:23 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue May 13 22:31:28 UTC 2014
|
|
|
|
|
l/libelf-0.8.13-x86_64-4.txz: Rebuilt.
|
|
|
|
|
Use -D_FILE_OFFSET_BITS=64 on 32-bit x86 (needed for Chromium).
|
|
|
|
|
Requested by alienBOB. :-)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue May 13 20:25:35 UTC 2014
|
|
|
|
|
a/kernel-generic-3.14.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gdb-7.7.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/kernel-headers-3.14.4-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.14.4-noarch-1.txz: Upgraded.
|
|
|
|
|
Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
|
|
|
|
|
other kernel debugging options. Besides fixing the nVidia issues, I wonder
|
|
|
|
|
if getting rid of this stuff will speed the kernel up?
|
|
|
|
|
l/libelf-0.8.13-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Symlink headers to /usr/include, since Mesa wants them there.
|
|
|
|
|
Thanks to Robby Workman.
|
|
|
|
|
xap/ddd-3.3.12-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix the machine code view. Thanks to Christopher Oliver.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
kernels/*: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon May 12 02:24:36 UTC 2014
|
|
|
|
|
l/seamonkey-solibs-2.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-29.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/seamonkey-2.26-x86_64-1.tx: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
This update contains security fixes and improvements.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri May 9 01:47:42 UTC 2014
|
|
|
|
|
a/glibc-solibs-2.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-huge-3.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/kernel-modules-3.14.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/binutils-2.24.51.0.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/gcc-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Include libiberty.a since that's no longer in the binutils package.
|
|
|
|
|
d/gcc-g++-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gfortran-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-gnat-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-go-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-java-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/gcc-objc-4.8.2-x86_64-2.txz: Rebuilt.
|
|
|
|
|
d/kernel-headers-3.14.3-x86-1.txz: Upgraded.
|
|
|
|
|
d/oprofile-0.9.7-x86_64-5.txz: Rebuilt.
|
|
|
|
|
k/kernel-source-3.14.3-noarch-1.txz: Upgraded.
|
|
|
|
|
l/glibc-2.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-i18n-2.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/glibc-profile-2.19-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/libnftnl-1.0.1-x86_64-1.txz: Added.
|
|
|
|
|
n/nftables-0.2-x86_64-1.txz: Added.
|
|
|
|
|
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
|
|
|
|
|
Patched to fix an issue with bash-4.3. Thanks to ponce.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Apr 29 23:35:59 UTC 2014
|
|
|
|
|
ap/screen-4.2.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/qt-4.8.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-29.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-24.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2012-09-26 03:10:42 +02:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
2009-08-26 17:00:38 +02:00
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Apr 22 17:31:48 UTC 2014
|
|
|
|
|
a/bash-4.3.011-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/gawk-4.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/grep-2.18-x86_64-1.txz: Upgraded.
|
|
|
|
|
ap/vim-7.4.258-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssh-6.6p1-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fixed a bug with curve25519-sha256 that caused a key exchange failure in
|
|
|
|
|
about 1 in 512 connection attempts.
|
|
|
|
|
xap/vim-gvim-7.4.258-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Apr 21 20:09:48 UTC 2014
|
|
|
|
|
l/libyaml-0.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
|
|
|
|
|
where a specially crafted string could cause a heap overflow leading to
|
|
|
|
|
arbitrary code execution.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
|
|
|
|
|
https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.4.27-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue in the in the awk script detector
|
|
|
|
|
which allows context-dependent attackers to cause a denial of service
|
|
|
|
|
(CPU consumption) via a crafted ASCII file that triggers a large amount
|
|
|
|
|
of backtracking.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Apr 8 14:19:51 UTC 2014
|
|
|
|
|
a/openssl-solibs-1.0.1g-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1g-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
A missing bounds check in the handling of the TLS heartbeat extension
|
|
|
|
|
can be used to reveal up to 64k of memory to a connected client or server.
|
|
|
|
|
Thanks for Neel Mehta of Google Security for discovering this bug and to
|
|
|
|
|
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
|
|
|
|
|
preparing the fix.
|
|
|
|
|
Fix for the attack described in the paper "Recovering OpenSSL
|
|
|
|
|
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
|
|
|
|
|
by Yuval Yarom and Naomi Benger. Details can be obtained from:
|
|
|
|
|
http://eprint.iacr.org/2014/140
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Mon Mar 31 20:30:28 UTC 2014
|
|
|
|
|
l/apr-1.5.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
l/apr-util-1.5.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/httpd-2.4.9-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Recompiled against new apr/apr-util to restore missing mod_mpm_event.so.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Fri Mar 28 03:43:11 UTC 2014
|
|
|
|
|
l/mozilla-nss-3.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue:
|
|
|
|
|
The cert_TestHostName function in lib/certdb/certdb.c in the
|
|
|
|
|
certificate-checking implementation in Mozilla Network Security Services
|
|
|
|
|
(NSS) before 3.16 accepts a wildcard character that is embedded in an
|
|
|
|
|
internationalized domain name's U-label, which might allow man-in-the-middle
|
|
|
|
|
attackers to spoof SSL servers via a crafted certificate.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/seamonkey-solibs-2.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/curl-7.36.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes four security issues.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://curl.haxx.se/docs/adv_20140326A.html
|
|
|
|
|
http://curl.haxx.se/docs/adv_20140326B.html
|
|
|
|
|
http://curl.haxx.se/docs/adv_20140326C.html
|
|
|
|
|
http://curl.haxx.se/docs/adv_20140326D.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/httpd-2.4.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update addresses two security issues.
|
|
|
|
|
Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults
|
|
|
|
|
when logging truncated cookies. Clean up the cookie logging parser to
|
|
|
|
|
recognize only the cookie=value pairs, not valueless cookies.
|
|
|
|
|
mod_dav: Keep track of length of cdata properly when removing leading
|
|
|
|
|
spaces. Eliminates a potential denial of service from specifically crafted
|
|
|
|
|
DAV WRITE requests.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/openssh-6.6p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a security issue when using environment passing with
|
|
|
|
|
a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be
|
|
|
|
|
tricked into accepting any environment variable that contains the
|
|
|
|
|
characters before the wildcard character.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/tin-2.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-28.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-24.4.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/seamonkey-2.25-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Sun Mar 16 02:52:28 UTC 2014
|
|
|
|
|
n/php-5.4.26-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a flaw where a specially crafted data file may cause a
|
|
|
|
|
segfault or 100% CPU consumption when a web page uses fileinfo() on it.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri Mar 14 00:44:48 UTC 2014
|
|
|
|
|
n/samba-4.1.6-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
CVE-2013-4496:
|
|
|
|
|
Samba versions 3.4.0 and above allow the administrator to implement
|
|
|
|
|
locking out Samba accounts after a number of bad password attempts.
|
|
|
|
|
However, all released versions of Samba did not implement this check for
|
|
|
|
|
password changes, such as are available over multiple SAMR and RAP
|
|
|
|
|
interfaces, allowing password guessing attacks.
|
|
|
|
|
CVE-2013-6442:
|
|
|
|
|
Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
|
|
|
|
|
smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
|
|
|
|
|
command options it will remove the existing ACL on the object being
|
|
|
|
|
modified, leaving the file or directory unprotected.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Mar 13 03:32:38 UTC 2014
|
|
|
|
|
n/mutt-1.5.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a buffer overflow where malformed RFC2047 header
|
|
|
|
|
lines could result in denial of service or potentially the execution
|
|
|
|
|
of arbitrary code as the user running mutt.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Mar 11 07:06:18 UTC 2014
|
|
|
|
|
a/udisks-1.0.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a stack-based buffer overflow when handling long path
|
|
|
|
|
names. A malicious, local user could use this flaw to create a
|
|
|
|
|
specially-crafted directory structure that could lead to arbitrary code
|
|
|
|
|
execution with the privileges of the udisks daemon (root).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
a/udisks2-2.1.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a stack-based buffer overflow when handling long path
|
|
|
|
|
names. A malicious, local user could use this flaw to create a
|
|
|
|
|
specially-crafted directory structure that could lead to arbitrary code
|
|
|
|
|
execution with the privileges of the udisks daemon (root).
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Mar 6 04:14:23 UTC 2014
|
|
|
|
|
ap/sudo-1.8.9p5-x86_64-1.txz: Upgraded.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Mar 3 23:32:18 UTC 2014
|
|
|
|
|
n/gnutls-3.1.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed a security issue where a specially crafted certificate could
|
|
|
|
|
bypass certificate validation checks.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Feb 27 20:43:28 UTC 2014
|
|
|
|
|
d/subversion-1.7.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fix denial of service bugs.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Feb 20 00:30:49 UTC 2014
|
|
|
|
|
a/kernel-firmware-20140215git-noarch-1.txz: Upgraded.
|
|
|
|
|
a/kernel-generic-3.10.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
These are new kernels that fix CVE-2014-0038, a bug that can allow local
|
|
|
|
|
users to gain a root shell.
|
|
|
|
|
Be sure to reinstall LILO (run "lilo" as root) after upgrading the kernel
|
|
|
|
|
packages, or on UEFI systems, copy the appropriate kernel to
|
|
|
|
|
/boot/efi/EFI/Slackware/vmlinuz).
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
a/kernel-huge-3.10.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
These are new kernels that fix CVE-2014-0038, a bug that can allow local
|
|
|
|
|
users to gain a root shell.
|
|
|
|
|
Be sure to reinstall LILO (run "lilo" as root) after upgrading the kernel
|
|
|
|
|
packages, or on UEFI systems, copy the appropriate kernel to
|
|
|
|
|
/boot/efi/EFI/Slackware/vmlinuz).
|
2013-11-04 18:08:47 +01:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
a/kernel-modules-3.10.30-x86_64-1.txz: Upgraded.
|
|
|
|
|
a/shadow-4.1.5.1-x86_64-3.txz: Rebuilt.
|
|
|
|
|
Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c"
|
|
|
|
|
(CVE-2005-4890) by detaching the controlling terminal in the non-PAM
|
|
|
|
|
case via a TIOCNOTTY request. Bi-directional protection is excessive
|
|
|
|
|
and breaks a commonly-used methods for privilege escalation on non-PAM
|
|
|
|
|
systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript).
|
|
|
|
|
This update relaxes the restriction and only detaches the controlling
|
|
|
|
|
tty when the callee is not root (which is, after all, the threat vector).
|
|
|
|
|
Thanks to mancha for the patch (and the above information).
|
|
|
|
|
ap/mariadb-5.5.35-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a buffer overflow in the mysql command line client which
|
|
|
|
|
may allow malicious or compromised database servers to cause a denial of
|
|
|
|
|
service (crash) and possibly execute arbitrary code via a long server
|
|
|
|
|
version string.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
d/kernel-headers-3.10.30-x86-1.txz: Upgraded.
|
|
|
|
|
k/kernel-source-3.10.30-noarch-1.txz: Upgraded.
|
|
|
|
|
These are new kernels that fix CVE-2014-0038, a bug that can allow local
|
|
|
|
|
users to gain a root shell.
|
|
|
|
|
Be sure to reinstall LILO (run "lilo" as root) after upgrading the kernel
|
|
|
|
|
packages, or on UEFI systems, copy the appropriate kernel to
|
|
|
|
|
/boot/efi/EFI/Slackware/vmlinuz).
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
n/gnutls-3.1.21-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a flaw where a version 1 intermediate certificate would be
|
|
|
|
|
considered as a CA certificate by GnuTLS by default.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-firefox-27.0.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
isolinux/initrd.img: Rebuilt.
|
|
|
|
|
kernels/*: Upgraded.
|
|
|
|
|
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Feb 13 23:45:53 UTC 2014
|
|
|
|
|
n/curl-7.35.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a flaw where libcurl could, in some circumstances, reuse
|
|
|
|
|
the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
|
|
|
|
|
request.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://curl.haxx.se/docs/adv_20140129.html
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/ntp-4.2.6p5-x86_64-5.txz: Rebuilt.
|
|
|
|
|
All stable versions of NTP remain vulnerable to a remote attack where the
|
|
|
|
|
"ntpdc -c monlist" command can be used to amplify network traffic as part
|
|
|
|
|
of a denial of service attack. By default, Slackware is not vulnerable
|
|
|
|
|
since it includes "noquery" as a default restriction. However, it is
|
|
|
|
|
vulnerable if this restriction is removed. To help mitigate this flaw,
|
|
|
|
|
"disable monitor" has been added to the default ntp.conf (which will disable
|
|
|
|
|
the monlist command even if other queries are allowed), and the default
|
|
|
|
|
restrictions have been extended to IPv6 as well.
|
|
|
|
|
All users of the NTP daemon should make sure that their ntp.conf contains
|
|
|
|
|
"disable monitor" to prevent misuse of the NTP service. The new ntp.conf
|
|
|
|
|
file will be installed as /etc/ntp.conf.new with a package upgrade, but the
|
|
|
|
|
changes will need to be merged into any existing ntp.conf file by the admin.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
|
|
|
|
|
http://www.kb.cert.org/vuls/id/348126
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Sat Feb 8 18:41:15 UTC 2014
|
|
|
|
|
l/seamonkey-solibs-2.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-27.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/mozilla-thunderbird-24.3.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/seamonkey-2.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2013-11-04 18:08:47 +01:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2011-04-25 15:37:00 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Feb 3 20:58:32 UTC 2014
|
|
|
|
|
xap/pidgin-2.10.9-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes various security issues and other bugs.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
+--------------------------+
|
|
|
|
|
Thu Jan 30 21:30:11 UTC 2014
|
|
|
|
|
n/openssh-6.5p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
+--------------------------+
|
|
|
|
|
Tue Jan 28 21:07:13 UTC 2014
|
|
|
|
|
l/mozilla-nss-3.15.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
Upgraded to nss-3.15.4 and nspr-4.10.3.
|
|
|
|
|
Fixes a possible man-in-the-middle issue.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/bind-9.9.4_P2-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a defect in the handling of NSEC3-signed zones that can
|
|
|
|
|
cause BIND to be crashed by a specific set of queries.
|
|
|
|
|
NOTE: According to the second link below, Slackware is probably not
|
|
|
|
|
vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
|
|
|
|
|
anyway, though.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://kb.isc.org/article/AA-01078
|
|
|
|
|
https://kb.isc.org/article/AA-01085
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
|
2012-09-26 03:10:42 +02:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Tue Jan 14 03:54:48 UTC 2014
|
|
|
|
|
a/openssl-solibs-1.0.1f-x86_64-1.txz: Upgraded.
|
|
|
|
|
d/llvm-3.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssl-1.0.1f-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes the following security issues:
|
|
|
|
|
Fix for TLS record tampering bug CVE-2013-4353
|
|
|
|
|
Fix for TLS version checking bug CVE-2013-6449
|
|
|
|
|
Fix for DTLS retransmission bug CVE-2013-6450
|
2012-09-26 03:10:42 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.4.24-x86_64-1.txz: Upgraded.
|
|
|
|
|
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
|
|
|
|
|
5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
|
|
|
|
|
parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
|
|
|
|
|
which allows remote attackers to execute arbitrary code or cause a denial
|
|
|
|
|
of service (memory corruption) via a crafted certificate that is not
|
|
|
|
|
properly handled by the openssl_x509_parse function.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/samba-4.1.4-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a heap-based buffer overflow that may allow AD domain
|
|
|
|
|
controllers to execute arbitrary code via an invalid fragment length in
|
|
|
|
|
a DCE-RPC packet.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
x/libXfont-1.4.7-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a stack overflow when reading a BDF font file containing
|
|
|
|
|
a longer than expected string, which could lead to crashes or privilege
|
|
|
|
|
escalation.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
|
2011-04-25 15:37:00 +02:00
|
|
|
|
(* Security fix *)
|
2012-09-26 03:10:42 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Fri Dec 20 22:46:09 UTC 2013
|
|
|
|
|
n/gnupg-1.4.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
|
|
|
|
|
Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
|
2011-04-25 15:37:00 +02:00
|
|
|
|
For more information, see:
|
2016-06-30 22:26:57 +02:00
|
|
|
|
http://www.cs.tau.ac.il/~tromer/acoustic/
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
|
2009-08-26 17:00:38 +02:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Dec 16 20:51:01 UTC 2013
|
|
|
|
|
d/llvm-3.3-x86_64-3.txz: Rebuilt.
|
|
|
|
|
The LLVM package included binaries with an rpath pointing to the build
|
|
|
|
|
location in /tmp. This allows an attacker with write access to /tmp to
|
|
|
|
|
add modified libraries (and execute arbitrary code) as any user running
|
|
|
|
|
the LLVM binaries. This updated package rebuilds LLVM to exclude the
|
|
|
|
|
build directories from the rpath information.
|
|
|
|
|
Thanks to Christopher Oliver for the bug report.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
d/ruby-1.9.3_p484-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes a heap overflow in floating point parsing. A specially
|
|
|
|
|
crafted string could cause a heap overflow leading to a denial of service
|
|
|
|
|
attack via segmentation faults and possibly arbitrary code execution.
|
|
|
|
|
For more information, see:
|
|
|
|
|
https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/cairo-1.12.16-x86_64-1.txz: Upgraded.
|
|
|
|
|
Removed --enable-xcb-shm (may cause instability with GTK+3).
|
|
|
|
|
Removed --enable-xlib-xcb (causes GIMP slowdown).
|
|
|
|
|
Added --enable-ft and --enable-gl.
|
|
|
|
|
If there are no problems reported with this update, perhaps it should be
|
|
|
|
|
issued as a 14.1 bugfix?
|
|
|
|
|
l/libiodbc-3.52.8-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes an rpath pointing to a location in /tmp that was found in
|
|
|
|
|
two test programs (iodbctest and iodbctestw). This could have allowed a
|
|
|
|
|
local attacker with write access to /tmp to add modified libraries (and
|
|
|
|
|
execute arbitrary code) as any user running the test programs.
|
|
|
|
|
Thanks to Christopher Oliver for the bug report.
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/libjpeg-v8a-x86_64-2.txz: Rebuilt.
|
|
|
|
|
Fix use of uninitialized memory when decoding images with missing SOS data
|
|
|
|
|
for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
|
|
|
|
|
This could allow remote attackers to obtain sensitive information from
|
|
|
|
|
uninitialized memory locations via a crafted JPEG image.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
l/seamonkey-solibs-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-firefox-26.0-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
2016-06-30 22:26:57 +02:00
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/mozilla-thunderbird-24.2.0-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2013-11-04 18:08:47 +01:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
2009-08-26 17:00:38 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/seamonkey-2.23-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
2013-11-04 18:08:47 +01:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Thu Dec 5 22:20:36 UTC 2013
|
|
|
|
|
kde/calligra-2.7.5-x86_64-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-bs-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ca\@valencia-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-cs-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-da-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-de-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-el-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-es-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-et-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fi-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-fr-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-gl-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-hu-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ia-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-it-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-kk-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nb-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nds-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-nl-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pl-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-pt_BR-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-ru-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sk-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sl-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-sv-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-tr-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-uk-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_CN-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
kdei/calligra-l10n-zh_TW-2.7.5-noarch-1.txz: Upgraded.
|
|
|
|
|
l/mozilla-nss-3.15.3-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
l/seamonkey-solibs-2.22.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/gimp-2.8.10-x86_64-1.txz: Upgraded.
|
|
|
|
|
xap/mozilla-thunderbird-24.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
xap/seamonkey-2.22.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
2013-11-04 18:08:47 +01:00
|
|
|
|
(* Security fix *)
|
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Nov 18 20:52:16 UTC 2013
|
|
|
|
|
l/seamonkey-solibs-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
n/openssh-6.4p1-x86_64-1.txz: Upgraded.
|
|
|
|
|
sshd(8): fix a memory corruption problem triggered during rekeying
|
|
|
|
|
when an AES-GCM cipher is selected.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.openssh.com/txt/gcmrekey.adv
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
n/php-5.4.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
This is a bugfix release.
|
|
|
|
|
n/samba-4.1.1-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update fixes two security issues:
|
|
|
|
|
* Samba versions 3.2.0 and above do not check the underlying file or
|
|
|
|
|
directory ACL when opening an alternate data stream.
|
|
|
|
|
* In setups which provide ldap(s) and/or https services, the private key
|
|
|
|
|
for SSL/TLS encryption might be world readable. This typically happens
|
|
|
|
|
in active directory domain controller setups.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
|
|
|
|
|
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
|
|
|
|
|
(* Security fix *)
|
|
|
|
|
Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini.
|
|
|
|
|
xap/mozilla-firefox-25.0.1-x86_64-1.txz: Upgraded.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
This release contains security fixes and improvements.
|
2009-08-26 17:00:38 +02:00
|
|
|
|
For more information, see:
|
2013-11-04 18:08:47 +01:00
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
|
2009-08-26 17:00:38 +02:00
|
|
|
|
(* Security fix *)
|
2016-06-30 22:26:57 +02:00
|
|
|
|
xap/seamonkey-2.22-x86_64-1.txz: Upgraded.
|
|
|
|
|
This update contains security fixes and improvements.
|
|
|
|
|
For more information, see:
|
|
|
|
|
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
|
|
|
|
|
(* Security fix *)
|
2012-09-26 03:10:42 +02:00
|
|
|
|
+--------------------------+
|
2016-06-30 22:26:57 +02:00
|
|
|
|
Mon Nov 4 17:08:47 UTC 2013
|
|
|
|
|
Slackware 14.1 x86_64 stable is released!
|
2012-09-26 03:10:42 +02:00
|
|
|
|
|
2016-06-30 22:26:57 +02:00
|
|
|
|
It's been another interesting release cycle here at Slackware bringing
|
|
|
|
|
new features like support for UEFI machines, updated compilers and
|
|
|
|
|
development tools, the switch from MySQL to MariaDB, and many more
|
|
|
|
|
improvements throughout the system. Thanks to the team, the upstream
|
|
|
|
|
developers, the dedicated Slackware community, and everyone else who
|
|
|
|
|
pitched in to help make this release a reality.
|
2012-09-26 03:10:42 +02:00
|
|
|
|
|
|
|
|
|
The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
|
|
|
|
|
32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware
|
|
|
|
|
project by picking up a copy from store.slackware.com. We're taking
|
|
|
|
|
pre-orders now, and offer a discount if you sign up for a subscription.
|
|
|
|
|
|
2013-11-04 18:08:47 +01:00
|
|
|
|
Have fun! :-)
|