Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 26 Aug 2014, 15:12
25.08.2014.
Neki lepi paketi u -currentu: mesa, kernel, neki drajveri....
Slackware 64bit:
Code: Select all
Mon Aug 25 22:02:08 UTC 2014
a/kernel-generic-3.14.17-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.17-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.17-x86_64-1.txz: Upgraded.
a/libcgroup-0.41-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.17-x86-1.txz: Upgraded.
k/kernel-source-3.14.17-noarch-1.txz: Upgraded.
Changed these kernel options:
CONNECTOR m -> y
+PROC_EVENTS y
Thanks to linuxxer.
l/freetype-2.5.3-x86_64-1.txz: Upgraded.
n/tin-2.2.1-x86_64-1.txz: Upgraded.
x/libxcb-1.11-x86_64-1.txz: Upgraded.
x/mesa-10.2.6-x86_64-1.txz: Upgraded.
Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
x/xcb-proto-1.11-x86_64-1.txz: Upgraded.
x/xf86-input-mouse-1.9.1-x86_64-1.txz: Upgraded.
x/xf86-video-ast-1.0.1-x86_64-1.txz: Upgraded.
x/xfs-1.1.4-x86_64-1.txz: Upgraded.
x/xorg-server-1.15.2-x86_64-2.txz: Rebuilt.
Added these explicit options for all X servers:
--enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
Thanks to Dinithion.
x/xorg-server-xephyr-1.15.2-x86_64-2.txz: Rebuilt.
x/xorg-server-xnest-1.15.2-x86_64-2.txz: Rebuilt.
x/xorg-server-xvfb-1.15.2-x86_64-2.txz: Rebuilt.
x/xrandr-1.4.3-x86_64-1.txz: Upgraded.
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-x86_64-2.txz: Rebuilt.
Fix ABI mismatch. Thanks to dr.s.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:
Code: Select all
a/kernel-generic-3.14.17-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.17-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.17-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/libcgroup-0.41-i486-1.txz: Upgraded.
d/kernel-headers-3.14.17_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.17_smp-noarch-1.txz: Upgraded.
Changed these kernel options:
CONNECTOR m -> y
+PROC_EVENTS y
Thanks to linuxxer.
l/freetype-2.5.3-i486-1.txz: Upgraded.
n/tin-2.2.1-i486-1.txz: Upgraded.
x/libxcb-1.11-i486-1.txz: Upgraded.
x/mesa-10.2.6-i486-1.txz: Upgraded.
Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
x/xcb-proto-1.11-i486-1.txz: Upgraded.
x/xf86-input-mouse-1.9.1-i486-1.txz: Upgraded.
x/xf86-video-ast-1.0.1-i486-1.txz: Upgraded.
x/xfs-1.1.4-i486-1.txz: Upgraded.
x/xorg-server-1.15.2-i486-2.txz: Rebuilt.
Added these explicit options for all X servers:
--enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
Thanks to Dinithion.
x/xorg-server-xephyr-1.15.2-i486-2.txz: Rebuilt.
x/xorg-server-xnest-1.15.2-i486-2.txz: Rebuilt.
x/xorg-server-xvfb-1.15.2-i486-2.txz: Rebuilt.
x/xrandr-1.4.3-i486-1.txz: Upgraded.
extra/linux-3.14.17-nosmp-sdk/*: Upgraded.
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-i486-2.txz: Rebuilt.
Fix ABI mismatch. Thanks to dr.s.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 29 Aug 2014, 10:13
28.08.2014.
Slackware 64bit:
Code: Select all
Thu Aug 28 23:17:47 UTC 2014
l/mozilla-nss-3.16.4-x86_64-1.txz: Upgraded.
Upgraded to nss-3.16.4 and nspr-4.10.7.
Slackware 32bit:
Code: Select all
Thu Aug 28 23:17:47 UTC 2014
l/mozilla-nss-3.16.4-i486-1.txz: Upgraded.
Upgraded to nss-3.16.4 and nspr-4.10.7.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 05 Sep 2014, 00:21
04.09.2014.
Slackware 64bit:
Code: Select all
Thu Sep 4 19:43:25 UTC 2014
xap/mozilla-firefox-32.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-31.1.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
n/php-5.4.32-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
(* Security fix *)
Slackware 32bit:
Code: Select all
xap/mozilla-firefox-32.0-i486-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-31.1.0-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
n/php-5.4.32-i486-1.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 09 Sep 2014, 21:35
09.09.2014.
Kernel update verzija 3.14.8, Seamonkey 2.29 i još ponešto.
Slackware 64bit:
Code: Select all
Tue Sep 9 18:01:05 UTC 2014
a/kernel-firmware-20140909git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.18-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.18-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.18-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.18-x86-1.txz: Upgraded.
k/kernel-source-3.14.18-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.29-x86_64-1.txz: Upgraded.
xap/rdesktop-1.8.2-x86_64-1.txz: Upgraded.
xap/seamonkey-2.29-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
(* Security fix *)
isolinux/initrd.img: Rebuilt.
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
Slackware 32bit:
Code: Select all
Tue Sep 9 18:01:05 UTC 2014
a/kernel-firmware-20140909git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.18-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.18_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.18-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.18_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.18-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.18_smp-i686-1.txz: Upgraded.
d/kernel-headers-3.14.18_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.18_smp-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.29-i486-1.txz: Upgraded.
xap/rdesktop-1.8.2-i486-1.txz: Upgraded.
xap/seamonkey-2.29-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
(* Security fix *)
extra/linux-3.14.18-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Sep 2014, 02:49
09.09.2014.
Drugi update večeras,
Slackware 64bit:
Code: Select all
Tue Sep 9 22:48:58 UTC 2014
a/btrfs-progs-20140909-x86_64-1.txz: Upgraded.
n/net-snmp-5.7.2.1-x86_64-1.txz: Upgraded.
Patched to properly report Btrfs mounts in hrFS/hrStorage tables.
Thanks to Jakub Jankowski.
Slackware 32bit:
Code: Select all
Tue Sep 9 22:48:58 UTC 2014
a/btrfs-progs-20140909-i486-1.txz: Upgraded.
n/net-snmp-5.7.2.1-i486-1.txz: Upgraded.
Patched to properly report Btrfs mounts in hrFS/hrStorage tables.
Thanks to Jakub Jankowski.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 Sep 2014, 10:28
24.09.2014.
Slackware 64bit:
Code: Select all
Wed Sep 24 22:52:53 UTC 2014
a/bash-4.3.025-x86_64-1.txz: Upgraded.
This update fixes a vulnerability in bash related to how environment
variables are processed: trailing code in function definitions was
executed, independent of the variable name. In many common configurations
(such as the use of CGI scripts), this vulnerability is exploitable over
the network. Thanks to Stephane Chazelas for discovering this issue.
For more information, see:
http://seclists.org/oss-sec/2014/q3/650
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
(* Security fix *)
l/mozilla-nss-3.16.5-x86_64-1.txz: Upgraded.
Fixed an RSA Signature Forgery vulnerability.
For more information, see:
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
(* Security fix *)
Slackware 32bit:
Code: Select all
a/bash-4.3.025-i486-1.txz: Upgraded.
This update fixes a vulnerability in bash related to how environment
variables are processed: trailing code in function definitions was
executed, independent of the variable name. In many common configurations
(such as the use of CGI scripts), this vulnerability is exploitable over
the network. Thanks to Stephane Chazelas for discovering this issue.
For more information, see:
http://seclists.org/oss-sec/2014/q3/650
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
(* Security fix *)
l/mozilla-nss-3.16.5-i486-1.txz: Upgraded.
Fixed an RSA Signature Forgery vulnerability.
For more information, see:
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 Sep 2014, 23:22
25.09.2014.
Nakon što je pronađen novi propust vrlo brzo je stigla nadogradnja. Sveži paketi:
Slackware 64bit:
Code: Select all
Thu Sep 25 19:55:13 UTC 2014
a/bash-4.3.025-x86_64-2.txz: Rebuilt.
Patched an additional trailing string processing vulnerability discovered
by Tavis Ormandy.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
(* Security fix *)
ap/lxc-1.0.6-x86_64-1.txz: Upgraded.
Fixed bash completion file. Thanks to dunric.
Slackware 32bit
Code: Select all
Thu Sep 25 19:55:13 UTC 2014
a/bash-4.3.025-i486-2.txz: Rebuilt.
Patched an additional trailing string processing vulnerability discovered
by Tavis Ormandy.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
(* Security fix *)
ap/lxc-1.0.6-i486-1.txz: Upgraded.
Fixed bash completion file. Thanks to dunric.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 27 Sep 2014, 10:05
26.09.2014.
Slackware 64bit:
Code: Select all
Fri Sep 26 22:23:32 UTC 2014
a/bash-4.3.026-x86_64-1.txz: Upgraded.
This is essentially a rebuild as the preliminary patch for CVE-2014-7169
has been accepted by upstream and is now signed. This also bumps the
patchlevel, making it easy to tell this is the fixed version.
Possibly more changes to come, given the ongoing discussions on oss-sec.
Slackware 32bit:
Code: Select all
Fri Sep 26 22:23:32 UTC 2014
a/bash-4.3.026-i486-1.txz: Upgraded.
This is essentially a rebuild as the preliminary patch for CVE-2014-7169
has been accepted by upstream and is now signed. This also bumps the
patchlevel, making it easy to tell this is the fixed version.
Possibly more changes to come, given the ongoing discussions on oss-sec.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 29 Sep 2014, 07:16
28.09.2014.
Slackware 64bit:
Code: Select all
Sun Sep 28 23:07:39 UTC 2014
l/seamonkey-solibs-2.29.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-32.0.3-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-31.1.2-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
xap/seamonkey-2.29.1-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
Slackware 32bit:
Code: Select all
l/seamonkey-solibs-2.29.1-i486-1.txz: Upgraded.
xap/mozilla-firefox-32.0.3-i486-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-31.1.2-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
xap/seamonkey-2.29.1-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 29 Sep 2014, 21:39
29.09.2014.
Slackware 64bit:
Code: Select all
Mon Sep 29 18:41:23 UTC 2014
a/bash-4.3.027-x86_64-1.txz: Upgraded.
Another bash update. Here's some information included with the patch:
"This patch changes the encoding bash uses for exported functions to avoid
clashes with shell variables and to avoid depending only on an environment
variable's contents to determine whether or not to interpret it as a shell
function."
After this update, an environment variable will not go through the parser
unless it follows this naming structure: BASH_FUNC_*%%
Most scripts never expected to import functions from environment variables,
so this change (although not backwards compatible) is not likely to break
many existing scripts. It will, however, close off access to the parser as
an attack surface in the vast majority of cases. There's already another
vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
but this hardening patch prevents it (and likely many more similar ones).
Thanks to Florian Weimer and Chet Ramey.
(* Security fix *)
Slackware 32bit:
Code: Select all
a/bash-4.3.027-i486-1.txz: Upgraded.
Another bash update. Here's some information included with the patch:
"This patch changes the encoding bash uses for exported functions to avoid
clashes with shell variables and to avoid depending only on an environment
variable's contents to determine whether or not to interpret it as a shell
function."
After this update, an environment variable will not go through the parser
unless it follows this naming structure: BASH_FUNC_*%%
Most scripts never expected to import functions from environment variables,
so this change (although not backwards compatible) is not likely to break
many existing scripts. It will, however, close off access to the parser as
an attack surface in the vast majority of cases. There's already another
vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
but this hardening patch prevents it (and likely many more similar ones).
Thanks to Florian Weimer and Chet Ramey.
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: No registered users and 27 guests