Novosti u *current* -u

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Post Reply

Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 14 Jun 2017, 14:55


Slackware 64-bit

Code: Select all

Tue Jun 13 19:54:24 UTC 2017
a/sysvinit-scripts-2.0-noarch-36.txz: Rebuilt.
       In rc.6, rc.K, and rc.S, use this path setting:
       PATH=/usr/local/sbin:/usr/sbin:/sbin:/usr/local/bin:/usr/bin:/bin
       Thanks to GazL.
ap/sqlite-3.19.3-x86_64-1.txz: Upgraded.
kde/calligra-2.9.11-x86_64-10.txz: Rebuilt.
       Recompiled against libGLEW.so.2.0.0.
kde/kde-runtime-4.14.3-x86_64-4.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kdepim-4.14.10-x86_64-2.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kdepimlibs-4.14.10-x86_64-3.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kget-4.14.3-x86_64-3.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kopete-4.14.3-x86_64-4.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
l/ffmpeg-3.3.2-x86_64-1.txz: Upgraded.
l/gmime-2.6.23-x86_64-2.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
n/dirmngr-1.1.1-x86_64-3.txz: Removed.
n/gnupg2-2.1.21-x86_64-1.txz: Upgraded.
n/gpgme-1.9.0-x86_64-1.txz: Upgraded.
       This eliminates the libgpgme-pthread library, so anything using that will
       need to be recompiled.
n/libgcrypt-1.7.7-x86_64-1.txz: Upgraded.
n/libgpg-error-1.27-x86_64-1.txz: Upgraded.
n/npth-1.5-x86_64-1.txz: Added.
n/pth-2.0.7-x86_64-1.txz: Removed.
n/samba-4.6.5-x86_64-1.txz: Upgraded.
x/glew-2.0.0-x86_64-1.txz: Upgraded.
       Shared library .so-version bump.
       Fixed glew.pc. Thanks to Willy Sudiarto Raharjo.
x/mesa-17.1.2-x86_64-2.txz: Rebuilt.
       Recompiled against libGLEW.so.2.0.0.
xap/fluxbox-1.3.7-x86_64-2.txz: Rebuilt.
       Fixed volume settings in keys file. Thanks to i720.
Slackware 32-bit

Code: Select all

Tue Jun 13 19:54:24 UTC 2017
a/sysvinit-scripts-2.0-noarch-36.txz: Rebuilt.
       In rc.6, rc.K, and rc.S, use this path setting:
       PATH=/usr/local/sbin:/usr/sbin:/sbin:/usr/local/bin:/usr/bin:/bin
       Thanks to GazL.
ap/sqlite-3.19.3-i586-1.txz: Upgraded.
kde/calligra-2.9.11-i586-10.txz: Rebuilt.
       Recompiled against libGLEW.so.2.0.0.
kde/kde-runtime-4.14.3-i586-4.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kdepim-4.14.10-i586-2.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kdepimlibs-4.14.10-i586-3.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kget-4.14.3-i586-3.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
kde/kopete-4.14.3-i586-4.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
l/ffmpeg-3.3.2-i586-1.txz: Upgraded.
l/gmime-2.6.23-i586-2.txz: Rebuilt.
       Recompiled to drop libgpgme-pthread dependency.
n/dirmngr-1.1.1-i586-3.txz: Removed.
n/gnupg2-2.1.21-i586-1.txz: Upgraded.
n/gpgme-1.9.0-i586-1.txz: Upgraded.
       This eliminates the libgpgme-pthread library, so anything using that will
       need to be recompiled.
n/libgcrypt-1.7.7-i586-1.txz: Upgraded.
n/libgpg-error-1.27-i586-1.txz: Upgraded.
n/npth-1.5-i586-1.txz: Added.
n/pth-2.0.7-i486-1.txz: Removed.
n/samba-4.6.5-i586-1.txz: Upgraded.
x/glew-2.0.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
       Fixed glew.pc. Thanks to Willy Sudiarto Raharjo.
x/mesa-17.1.2-i586-2.txz: Rebuilt.
       Recompiled against libGLEW.so.2.0.0.
xap/fluxbox-1.3.7-i486-2.txz: Rebuilt.
       Fixed volume settings in keys file. Thanks to i720.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 15 Jun 2017, 11:35


Slackware 64-bit

Code: Select all

Thu Jun 15 02:08:28 UTC 2017
ap/linuxdoc-tools-0.9.72-x86_64-2.txz: Rebuilt.
       Switched to OpenJade-1.3.2 (from 1.3.3-pre1 which was segfaulting).
       Upgraded to perl-XML-NamespaceSupport-1.12.
       Upgraded to perl-XML-SAX-Base-1.09.
       Updated build script to work with bash 4.4. Thanks to Heinz Wiesinger.
       Support '.conf.new' for config files within /etc/asciidoc.
       Thanks to franzen on LQ for the suggestion.
       Thanks to Stuart Winter.
d/slacktrack-2.18-x86_64-1.txz: Upgraded.
       Thanks to Stuart Winter.
n/NetworkManager-1.8.0-x86_64-3.txz: Upgraded.
       Applied upstream patches from git. Thanks to Robby Workman.
n/bind-9.11.1_P1-x86_64-1.txz: Upgraded.
       Fixed denial of service security issue:
       Some RPZ configurations could go into an infinite query loop when
       encountering responses with TTL=0.
       For more information, see:
       https://kb.isc.org/article/AA-01495
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
       (* Security fix *)
xap/mozilla-firefox-52.2.0esr-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
       (* Security fix *)
xap/mozilla-thunderbird-52.2.0-x86_64-1.txz: Upgraded.
       Switched to using GTK+ v3.
xap/network-manager-applet-1.8.2-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Thu Jun 15 02:08:28 UTC 2017
ap/linuxdoc-tools-0.9.72-i586-2.txz: Rebuilt.
       Switched to OpenJade-1.3.2 (from 1.3.3-pre1 which was segfaulting).
       Upgraded to perl-XML-NamespaceSupport-1.12.
       Upgraded to perl-XML-SAX-Base-1.09.
       Updated build script to work with bash 4.4. Thanks to Heinz Wiesinger.
       Support '.conf.new' for config files within /etc/asciidoc.
       Thanks to franzen on LQ for the suggestion.
       Thanks to Stuart Winter.
d/slacktrack-2.18-i586-1.txz: Upgraded.
       Thanks to Stuart Winter.
n/NetworkManager-1.8.0-i586-3.txz: Upgraded.
       Applied upstream patches from git. Thanks to Robby Workman.
n/bind-9.11.1_P1-i586-1.txz: Upgraded.
       Fixed denial of service security issue:
       Some RPZ configurations could go into an infinite query loop when
       encountering responses with TTL=0.
       For more information, see:
       https://kb.isc.org/article/AA-01495
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
       (* Security fix *)
xap/mozilla-firefox-52.2.0esr-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
       (* Security fix *)
xap/mozilla-thunderbird-52.2.0-i586-1.txz: Upgraded.
       Switched to using GTK+ v3.
xap/network-manager-applet-1.8.2-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 20 Jun 2017, 13:19


Slackware 64-bit

Code: Select all

Tue Jun 20 05:08:21 UTC 2017
a/udisks2-2.6.5-x86_64-1.txz: Upgraded.
       Thanks to Robby Workman.
ap/linuxdoc-tools-0.9.72-x86_64-3.txz: Rebuilt.
       Removed .la files. Thanks to Stuart Winter.
ap/lxc-2.0.8-x86_64-1.txz: Upgraded.
       Added additional default container packages: cyrus-sasl, db48, gnutls,
       iproute2, kmod, libcap-ng, libffi, libmnl, libtasn1, libunistring, nettle,
       and p11-kit. Thanks to CTM.
       Use configure option --enable-cgmanager=no. Thanks to Didier Spaier.
l/cairo-1.14.10-x86_64-1.txz: Upgraded.
l/libbluray-1.0.1-x86_64-1.txz: Upgraded.
l/polkit-0.113-x86_64-3.txz: Rebuilt.
       Added upstream patches to fix a memory leak and increase security when
       using GIO. Thanks to Robby Workman.
n/ModemManager-1.6.8-x86_64-1.txz: Upgraded.
n/nmap-7.50-x86_64-1.txz: Upgraded.
x/libepoxy-1.4.3-x86_64-1.txz: Upgraded.
x/libinput-1.7.3-x86_64-1.txz: Upgraded.
x/libwacom-0.25-x86_64-1.txz: Upgraded.
xfce/garcon-0.6.1-x86_64-1.txz: Upgraded.
xfce/tumbler-0.1.32-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Tue Jun 20 05:08:21 UTC 2017
a/udisks2-2.6.5-i586-1.txz: Upgraded.
       Thanks to Robby Workman.
ap/linuxdoc-tools-0.9.72-i586-3.txz: Rebuilt.
       Removed .la files. Thanks to Stuart Winter.
ap/lxc-2.0.8-i586-1.txz: Upgraded.
       Added additional default container packages: cyrus-sasl, db48, gnutls,
       iproute2, kmod, libcap-ng, libffi, libmnl, libtasn1, libunistring, nettle,
       and p11-kit. Thanks to CTM.
       Use configure option --enable-cgmanager=no. Thanks to Didier Spaier.
l/cairo-1.14.10-i586-1.txz: Upgraded.
l/libbluray-1.0.1-i586-1.txz: Upgraded.
l/polkit-0.113-i586-3.txz: Rebuilt.
       Added upstream patches to fix a memory leak and increase security when
       using GIO. Thanks to Robby Workman.
n/ModemManager-1.6.8-i586-1.txz: Upgraded.
n/nmap-7.50-i586-1.txz: Upgraded.
x/libepoxy-1.4.3-i586-1.txz: Upgraded.
x/libinput-1.7.3-i586-1.txz: Upgraded.
x/libwacom-0.25-i586-1.txz: Upgraded.
xfce/garcon-0.6.1-i586-1.txz: Upgraded.
xfce/tumbler-0.1.32-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 21 Jun 2017, 21:14


Slackware 64-bit

Code: Select all

Wed Jun 21 01:12:42 UTC 2017
kde/calligra-2.9.11-x86_64-11.txz: Rebuilt.
       Recompiled against gsl-2.4.
kde/step-4.14.3-x86_64-5.txz: Rebuilt.
       Recompiled against gsl-2.4.
l/gsl-2.4-x86_64-1.txz: Upgraded.
       Shared library .so-version bump.
Slackware 32-bit

Code: Select all

Wed Jun 21 01:12:42 UTC 2017
kde/calligra-2.9.11-i586-11.txz: Rebuilt.
       Recompiled against gsl-2.4.
kde/step-4.14.3-i586-5.txz: Rebuilt.
       Recompiled against gsl-2.4.
l/gsl-2.4-i586-1.txz: Upgraded.
       Shared library .so-version bump.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 22 Jun 2017, 10:26


Slackware 64-bit

Code: Select all

Wed Jun 21 18:38:46 UTC 2017
ap/lxc-2.0.8-x86_64-2.txz: Rebuilt.
       rc.lxc: Don't use screen for container startup. Thanks to franzen.
d/libtool-2.4.6-x86_64-5.txz: Rebuilt.
       Recompiled to fix wrong embedded GCC version number.
       Thanks to B Watson.
n/gnupg2-2.1.21-x86_64-2.txz: Rebuilt.
       If the machine does not have smard card devices, do not issue a warning about
       a missing smard card. Thanks to Willy Sudiarto Raharjo.
n/openvpn-2.4.3-x86_64-1.txz: Upgraded.
       This update fixes several denial of service issues discovered
       by Guido Vranken.
       For more information, see:
       https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7512
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522
       (* Security fix *)
xap/gnuplot-5.0.6-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Wed Jun 21 18:38:46 UTC 2017
ap/lxc-2.0.8-i586-2.txz: Rebuilt.
       rc.lxc: Don't use screen for container startup. Thanks to franzen.
d/libtool-2.4.6-i586-5.txz: Rebuilt.
       Recompiled to fix wrong embedded GCC version number.
       Thanks to B Watson.
n/gnupg2-2.1.21-i586-2.txz: Rebuilt.
       If the machine does not have smard card devices, do not issue a warning about
       a missing smard card. Thanks to Willy Sudiarto Raharjo.
n/openvpn-2.4.3-i586-1.txz: Upgraded.
       This update fixes several denial of service issues discovered
       by Guido Vranken.
       For more information, see:
       https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7512
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522
       (* Security fix *)
xap/gnuplot-5.0.6-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 24 Jun 2017, 08:42


Slackware 64-bit

Code: Select all

Fri Jun 23 20:11:00 UTC 2017
a/dosfstools-4.1-x86_64-1.txz: Upgraded.
       Thanks to Robby Workman.
a/file-5.31-x86_64-1.txz: Upgraded.
a/os-prober-1.75-x86_64-1.txz: Upgraded.
a/xfsprogs-4.11.0-x86_64-1.txz: Upgraded.
ap/at-3.1.20-x86_64-1.txz: Upgraded.
ap/diffutils-3.6-x86_64-1.txz: Upgraded.
d/automake-1.15.1-noarch-1.txz: Upgraded.
d/nasm-2.13.01-x86_64-1.txz: Upgraded.
l/gst-plugins-base-1.12.1-x86_64-1.txz: Upgraded.
l/gst-plugins-good-1.12.1-x86_64-1.txz: Upgraded.
l/gst-plugins-libav-1.12.1-x86_64-1.txz: Upgraded.
l/gstreamer-1.12.1-x86_64-1.txz: Upgraded.
l/gtk+3-3.22.16-x86_64-1.txz: Upgraded.
l/gtkmm2-2.24.5-x86_64-1.txz: Upgraded.
l/poppler-0.56.0-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Fri Jun 23 20:11:00 UTC 2017
a/dosfstools-4.1-i586-1.txz: Upgraded.
       Thanks to Robby Workman.
a/file-5.31-i586-1.txz: Upgraded.
a/os-prober-1.75-i586-1.txz: Upgraded.
a/xfsprogs-4.11.0-i586-1.txz: Upgraded.
ap/at-3.1.20-i586-1.txz: Upgraded.
ap/diffutils-3.6-i586-1.txz: Upgraded.
d/automake-1.15.1-noarch-1.txz: Upgraded.
d/nasm-2.13.01-i586-1.txz: Upgraded.
l/gst-plugins-base-1.12.1-i586-1.txz: Upgraded.
l/gst-plugins-good-1.12.1-i586-1.txz: Upgraded.
l/gst-plugins-libav-1.12.1-i586-1.txz: Upgraded.
l/gstreamer-1.12.1-i586-1.txz: Upgraded.
l/gtk+3-3.22.16-i586-1.txz: Upgraded.
l/gtkmm2-2.24.5-i586-1.txz: Upgraded.
l/poppler-0.56.0-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 27 Jun 2017, 13:24


Slackware 64-bit

Code: Select all

Mon Jun 26 20:36:18 UTC 2017
a/kernel-firmware-20170626git-noarch-1.txz: Upgraded.
a/kernel-generic-4.9.34-x86_64-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-huge-4.9.34-x86_64-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-modules-4.9.34-x86_64-1.txz: Upgraded.
a/lrzip-0.631-x86_64-1.txz: Upgraded.
a/lvm2-2.02.171-x86_64-1.txz: Upgraded.
a/time-1.7.2-x86_64-1.txz: Upgraded.
a/util-linux-2.30-x86_64-2.txz: Rebuilt.
       Reverted an agetty commit that breaks backspacing over the first character
       entered at the login prompt. Thanks to GazL.
ap/mpg123-1.25.0-x86_64-1.txz: Upgraded.
d/kernel-headers-4.9.34-x86-1.txz: Upgraded.
k/kernel-source-4.9.34-noarch-1.txz: Upgraded.
       This kernel fixes two "Stack Clash" vulnerabilities reported by Qualys.
       The first issue may allow attackers to execute arbitrary code with elevated
       privileges. Failed attack attempts will likely result in denial-of-service
       conditions. The second issue can be exploited to bypass certain security
       restrictions and perform unauthorized actions.
       For more information, see:
       https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
       (* Security fix *)
l/glib2-2.52.3-x86_64-1.txz: Upgraded.
l/glibmm-2.52.0-x86_64-1.txz: Upgraded.
l/gtkmm3-3.22.1-x86_64-1.txz: Upgraded.
xap/gkrellm-2.3.10-x86_64-2.txz: Rebuilt.
       Upgraded to gkrellm-countdown-0.1.1. Thanks to jmccue.
xap/mozilla-thunderbird-52.2.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Mon Jun 26 20:36:18 UTC 2017
a/kernel-firmware-20170626git-noarch-1.txz: Upgraded.
a/kernel-generic-4.9.34-i586-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-generic-smp-4.9.34_smp-i686-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-huge-4.9.34-i586-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-huge-smp-4.9.34_smp-i686-1.txz: Upgraded.
       "Stack Clash" fixes -- see below.
       (* Security fix *)
a/kernel-modules-4.9.34-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.9.34_smp-i686-1.txz: Upgraded.
a/lrzip-0.631-i586-1.txz: Upgraded.
a/lvm2-2.02.171-i586-1.txz: Upgraded.
a/time-1.7.2-i586-1.txz: Upgraded.
a/util-linux-2.30-i586-2.txz: Rebuilt.
       Reverted an agetty commit that breaks backspacing over the first character
       entered at the login prompt. Thanks to GazL.
ap/mpg123-1.25.0-i586-1.txz: Upgraded.
d/kernel-headers-4.9.34_smp-x86-1.txz: Upgraded.
k/kernel-source-4.9.34_smp-noarch-1.txz: Upgraded.
       This kernel fixes two "Stack Clash" vulnerabilities reported by Qualys.
       The first issue may allow attackers to execute arbitrary code with elevated
       privileges. Failed attack attempts will likely result in denial-of-service
       conditions. The second issue can be exploited to bypass certain security
       restrictions and perform unauthorized actions.
       For more information, see:
       https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
       (* Security fix *)
l/glib2-2.52.3-i586-1.txz: Upgraded.
l/glibmm-2.52.0-i586-1.txz: Upgraded.
l/gtkmm3-3.22.1-i586-1.txz: Upgraded.
xap/gkrellm-2.3.10-i586-2.txz: Rebuilt.
       Upgraded to gkrellm-countdown-0.1.1. Thanks to jmccue.
xap/mozilla-thunderbird-52.2.1-i586-1.txz: Upgraded.
extra/linux-4.9.34-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 30 Jun 2017, 15:33


Slackware 64-bit

Code: Select all

Thu Jun 29 20:55:09 UTC 2017
a/mkinitrd-1.4.10-x86_64-1.txz: Upgraded.
       Added support for -P option and MICROCODE_ARCH in mkinitrd.conf to specify
       a microcode archive to be prepended to the initrd for early CPU microcode
       patching by the kernel. Thanks to SeB.
ap/nano-2.8.5-x86_64-1.txz: Upgraded.
ap/screen-4.6.0-x86_64-1.txz: Upgraded.
d/llvm-4.0.1-x86_64-1.txz: Upgraded.
l/pcre-8.40-x86_64-1.txz: Upgraded.
l/readline-7.0.003-x86_64-1.txz: Upgraded.
n/bind-9.11.1_P2-x86_64-1.txz: Upgraded.
       This update fixes a high severity security issue:
       An error in TSIG handling could permit unauthorized zone transfers
       or zone updates.
       For more information, see:
       https://kb.isc.org/article/AA-01503/0
       https://kb.isc.org/article/AA-01504/0
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143
       (* Security fix *)
n/httpd-2.4.26-x86_64-1.txz: Upgraded.
       This update fixes security issues which may lead to an authentication bypass
       or a denial of service:
       important: ap_get_basic_auth_pw() Authentication Bypass CVE-2017-3167
       important: mod_ssl Null Pointer Dereference CVE-2017-3169
       important: mod_http2 Null Pointer Dereference CVE-2017-7659
       important: ap_find_token() Buffer Overread CVE-2017-7668
       important: mod_mime Buffer Overread CVE-2017-7679
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
       (* Security fix *)
n/libgcrypt-1.7.8-x86_64-1.txz: Upgraded.
       Mitigate a local flush+reload side-channel attack on RSA secret keys
       dubbed "Sliding right into disaster".
       For more information, see:
       https://eprint.iacr.org/2017/627
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
       (* Security fix *)
xfce/xfdesktop-4.12.4-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Thu Jun 29 20:55:09 UTC 2017
a/mkinitrd-1.4.10-i586-1.txz: Upgraded.
       Added support for -P option and MICROCODE_ARCH in mkinitrd.conf to specify
       a microcode archive to be prepended to the initrd for early CPU microcode
       patching by the kernel. Thanks to SeB.
ap/nano-2.8.5-i586-1.txz: Upgraded.
ap/screen-4.6.0-i586-1.txz: Upgraded.
d/llvm-4.0.1-i586-1.txz: Upgraded.
l/pcre-8.40-i586-1.txz: Upgraded.
l/readline-7.0.003-i586-1.txz: Upgraded.
n/bind-9.11.1_P2-i586-1.txz: Upgraded.
       This update fixes a high severity security issue:
       An error in TSIG handling could permit unauthorized zone transfers
       or zone updates.
       For more information, see:
       https://kb.isc.org/article/AA-01503/0
       https://kb.isc.org/article/AA-01504/0
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143
       (* Security fix *)
n/httpd-2.4.26-i586-1.txz: Upgraded.
       This update fixes security issues which may lead to an authentication bypass
       or a denial of service:
       important: ap_get_basic_auth_pw() Authentication Bypass CVE-2017-3167
       important: mod_ssl Null Pointer Dereference CVE-2017-3169
       important: mod_http2 Null Pointer Dereference CVE-2017-7659
       important: ap_find_token() Buffer Overread CVE-2017-7668
       important: mod_mime Buffer Overread CVE-2017-7679
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
       (* Security fix *)
n/libgcrypt-1.7.8-i586-1.txz: Upgraded.
       Mitigate a local flush+reload side-channel attack on RSA secret keys
       dubbed "Sliding right into disaster".
       For more information, see:
       https://eprint.iacr.org/2017/627
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
       (* Security fix *)
xfce/xfdesktop-4.12.4-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 02 Jul 2017, 21:31


Slackware 64-bit

Code: Select all

Fri Jun 30 21:14:15 UTC 2017
a/glibc-solibs-2.25-x86_64-3.txz: Rebuilt.
       (* Security fix *)
a/kernel-generic-4.9.35-x86_64-1.txz: Upgraded.
       (* Security fix *)
a/kernel-huge-4.9.35-x86_64-1.txz: Upgraded.
       (* Security fix *)
a/kernel-modules-4.9.35-x86_64-1.txz: Upgraded.
d/kernel-headers-4.9.35-x86-1.txz: Upgraded.
k/kernel-source-4.9.35-noarch-1.txz: Upgraded.
       This kernel fixes security issues that include possible stack exhaustion,
       memory corruption, and arbitrary code execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
       (* Security fix *)
l/glibc-2.25-x86_64-3.txz: Rebuilt.
       Applied upstream security hardening patches from git.
       For more information, see:
       https://sourceware.org/git/?p=glibc.git;a=commit;h=3c7cd21290cabdadd72984fb69bc51e64ff1002d
       https://sourceware.org/git/?p=glibc.git;a=commit;h=46703a3995aa3ca2b816814aa4ad05ed524194dd
       https://sourceware.org/git/?p=glibc.git;a=commit;h=c69d4a0f680a24fdbe323764a50382ad324041e9
       https://sourceware.org/git/?p=glibc.git;a=commit;h=3776f38fcd267c127ba5eb222e2c614c191744aa
       https://sourceware.org/git/?p=glibc.git;a=commit;h=adc7e06fb412a2a1ee52f8cb788caf436335b9f3
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
       (* Security fix *)
l/glibc-i18n-2.25-x86_64-3.txz: Rebuilt.
l/glibc-profile-2.25-x86_64-3.txz: Rebuilt.
       (* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Fri Jun 30 21:14:15 UTC 2017
a/glibc-solibs-2.25-i586-3.txz: Rebuilt.
       (* Security fix *)
a/kernel-generic-4.9.35-i586-1.txz: Upgraded.
       (* Security fix *)
a/kernel-generic-smp-4.9.35_smp-i686-1.txz: Upgraded.
       (* Security fix *)
a/kernel-huge-4.9.35-i586-1.txz: Upgraded.
       (* Security fix *)
a/kernel-huge-smp-4.9.35_smp-i686-1.txz: Upgraded.
       (* Security fix *)
a/kernel-modules-4.9.35-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.9.35_smp-i686-1.txz: Upgraded.
d/kernel-headers-4.9.35_smp-x86-1.txz: Upgraded.
k/kernel-source-4.9.35_smp-noarch-1.txz: Upgraded.
       This kernel fixes security issues that include possible stack exhaustion,
       memory corruption, and arbitrary code execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
       (* Security fix *)
l/glibc-2.25-i586-3.txz: Rebuilt.
       Applied upstream security hardening patches from git.
       For more information, see:
       https://sourceware.org/git/?p=glibc.git;a=commit;h=3c7cd21290cabdadd72984fb69bc51e64ff1002d
       https://sourceware.org/git/?p=glibc.git;a=commit;h=46703a3995aa3ca2b816814aa4ad05ed524194dd
       https://sourceware.org/git/?p=glibc.git;a=commit;h=c69d4a0f680a24fdbe323764a50382ad324041e9
       https://sourceware.org/git/?p=glibc.git;a=commit;h=3776f38fcd267c127ba5eb222e2c614c191744aa
       https://sourceware.org/git/?p=glibc.git;a=commit;h=adc7e06fb412a2a1ee52f8cb788caf436335b9f3
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
       (* Security fix *)
l/glibc-i18n-2.25-i586-3.txz: Rebuilt.
l/glibc-profile-2.25-i586-3.txz: Rebuilt.
       (* Security fix *)
extra/linux-4.9.35-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Moderator
Moderator
offline
User avatar

Posts: 952
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 04 Jul 2017, 15:11


Slackware 64-bit

Code: Select all

Mon Jul 3 23:09:19 UTC 2017
a/grep-3.1-x86_64-1.txz: Upgraded.
ap/acct-6.6.4-x86_64-1.txz: Upgraded.
ap/cups-2.2.4-x86_64-1.txz: Upgraded.
ap/cups-filters-1.14.1-x86_64-1.txz: Upgraded.
ap/gphoto2-2.5.14-x86_64-1.txz: Upgraded.
ap/tmux-2.5-x86_64-1.txz: Upgraded.
l/apr-1.6.2-x86_64-1.txz: Upgraded.
l/apr-util-1.6.0-x86_64-1.txz: Upgraded.
l/libgphoto2-2.5.14-x86_64-1.txz: Upgraded.
l/libpng-1.6.30-x86_64-1.txz: Upgraded.
l/sound-theme-freedesktop-0.8-noarch-1.txz: Upgraded.
x/mesa-17.1.4-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Mon Jul 3 23:09:19 UTC 2017
a/grep-3.1-i586-1.txz: Upgraded.
ap/acct-6.6.4-i586-1.txz: Upgraded.
ap/cups-2.2.4-i586-1.txz: Upgraded.
ap/cups-filters-1.14.1-i586-1.txz: Upgraded.
ap/gphoto2-2.5.14-i586-1.txz: Upgraded.
ap/tmux-2.5-i586-1.txz: Upgraded.
l/apr-1.6.2-i586-1.txz: Upgraded.
l/apr-util-1.6.0-i586-1.txz: Upgraded.
l/libgphoto2-2.5.14-i586-1.txz: Upgraded.
l/libpng-1.6.30-i586-1.txz: Upgraded.
l/sound-theme-freedesktop-0.8-noarch-1.txz: Upgraded.
x/mesa-17.1.4-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa


Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest