Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 30 Apr 2014, 12:35
29.04.2014.
Slackware 64bit:
Code: Select all
Tue Apr 29 23:35:59 UTC 2014
ap/screen-4.2.1-x86_64-1.txz: Upgraded.
l/qt-4.8.6-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-29.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-24.5.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Slackware 32bit:
Code: Select all
ap/screen-4.2.1-i486-1.txz: Upgraded.
l/qt-4.8.6-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0-i486-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-24.5.0-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 09 May 2014, 19:32
09.05.2014.
Zanimljiv update za current, imamo novi kernel 3.14.3 koji se pojavio pre svega nekoliko dana, zatim tu je svež gcc i još po nešto
Slackware 64bit:
Code: Select all
Fri May 9 01:47:42 UTC 2014
a/glibc-solibs-2.19-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.3-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.3-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.3-x86_64-1.txz: Upgraded.
d/binutils-2.24.51.0.3-x86_64-1.txz: Upgraded.
d/gcc-4.8.2-x86_64-2.txz: Rebuilt.
Include libiberty.a since that's no longer in the binutils package.
d/gcc-g++-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-gfortran-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-gnat-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-go-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-java-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-objc-4.8.2-x86_64-2.txz: Rebuilt.
d/kernel-headers-3.14.3-x86-1.txz: Upgraded.
d/oprofile-0.9.7-x86_64-5.txz: Rebuilt.
k/kernel-source-3.14.3-noarch-1.txz: Upgraded.
l/glibc-2.19-x86_64-1.txz: Upgraded.
l/glibc-i18n-2.19-x86_64-1.txz: Upgraded.
l/glibc-profile-2.19-x86_64-1.txz: Upgraded.
n/libnftnl-1.0.1-x86_64-1.txz: Added.
n/nftables-0.2-x86_64-1.txz: Added.
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
Patched to fix an issue with bash-4.3. Thanks to ponce.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:
Code: Select all
a/glibc-solibs-2.19-i486-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.3-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.3-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.3-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.3_smp-i686-1.txz: Upgraded.
d/binutils-2.24.51.0.3-i486-1.txz: Upgraded.
d/gcc-4.8.2-i486-2.txz: Rebuilt.
Include libiberty.a since that's no longer in the binutils package.
d/gcc-g++-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gfortran-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gnat-4.8.2-i486-2.txz: Rebuilt.
d/gcc-go-4.8.2-i486-2.txz: Rebuilt.
d/gcc-java-4.8.2-i486-2.txz: Rebuilt.
d/gcc-objc-4.8.2-i486-2.txz: Rebuilt.
d/kernel-headers-3.14.3_smp-x86-1.txz: Upgraded.
d/oprofile-0.9.7-i486-5.txz: Rebuilt.
k/kernel-source-3.14.3_smp-noarch-1.txz: Upgraded.
l/glibc-2.19-i486-1.txz: Upgraded.
l/glibc-i18n-2.19-i486-1.txz: Upgraded.
l/glibc-profile-2.19-i486-1.txz: Upgraded.
n/libnftnl-1.0.1-i486-1.txz: Added.
n/nftables-0.2-i486-1.txz: Added.
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
Patched to fix an issue with bash-4.3. Thanks to ponce.
extra/linux-3.14.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 12 May 2014, 08:27
12.05.2014.
Slackware 64bit:
Code: Select all
Mon May 12 02:24:36 UTC 2014
l/seamonkey-solibs-2.26-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-29.0.1-x86_64-1.txz: Upgraded.
xap/seamonkey-2.26-x86_64-1.tx: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
Slackware 32bit:
Code: Select all
l/seamonkey-solibs-2.26-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0.1-i486-1.txz: Upgraded.
xap/seamonkey-2.26-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 14 May 2014, 00:35
13.05.2014.
Slackware 64bit:
Code: Select all
Tue May 13 20:25:35 UTC 2014
a/kernel-generic-3.14.4-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.4-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.4-x86_64-1.txz: Upgraded.
d/gdb-7.7.1-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.4-x86-1.txz: Upgraded.
k/kernel-source-3.14.4-noarch-1.txz: Upgraded.
Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
other kernel debugging options. Besides fixing the nVidia issues, I wonder
if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-x86_64-3.txz: Rebuilt.
Symlink headers to /usr/include, since Mesa wants them there.
Thanks to Robby Workman.
xap/ddd-3.3.12-x86_64-2.txz: Rebuilt.
Patched to fix the machine code view. Thanks to Christopher Oliver.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:
Code: Select all
a/kernel-generic-3.14.4-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.4-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.4-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.4_smp-i686-1.txz: Upgraded.
d/gdb-7.7.1-i486-1.txz: Upgraded.
d/kernel-headers-3.14.4_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.4_smp-noarch-1.txz: Upgraded.
Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
other kernel debugging options. Besides fixing the nVidia issues, I wonder
if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-i486-3.txz: Rebuilt.
Symlink headers to /usr/include, since Mesa wants them there.
Thanks to Robby Workman.
xap/ddd-3.3.12-i486-2.txz: Rebuilt.
Patched to fix the machine code view. Thanks to Christopher Oliver.
extra/linux-3.14.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 02 Jun 2014, 03:30
01.06.2014.
Slackware 64bit:
Code: Select all
Sun Jun 1 19:48:54 UTC 2014
a/gawk-4.1.1-x86_64-2.txz: Rebuilt.
Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
Compressed the man pages in man3.
a/kernel-generic-3.14.5-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.5-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.5-x86_64-1.txz: Upgraded.
ap/mariadb-5.5.37-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
(* Security fix *)
ap/nano-2.3.3-x86_64-1.txz: Upgraded.
d/gcc-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-g++-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-gnat-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-go-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-java-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-objc-4.8.3-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.5-x86-1.txz: Upgraded.
d/make-3.82-x86_64-5.txz: Rebuilt.
Patched to fix a bug with parallel builds.
Thanks to Danny Schmarsel.
k/kernel-source-3.14.5-noarch-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:
Code: Select all
Sun Jun 1 19:48:54 UTC 2014
a/gawk-4.1.1-i486-2.txz: Rebuilt.
Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
Compressed the man pages in man3.
a/kernel-generic-3.14.5-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.5-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.5-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.5_smp-i686-1.txz: Upgraded.
ap/mariadb-5.5.37-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
(* Security fix *)
ap/nano-2.3.3-i486-1.txz: Upgraded.
d/gcc-4.8.3-i486-1.txz: Upgraded.
d/gcc-g++-4.8.3-i486-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-i486-1.txz: Upgraded.
d/gcc-gnat-4.8.3-i486-1.txz: Upgraded.
d/gcc-go-4.8.3-i486-1.txz: Upgraded.
d/gcc-java-4.8.3-i486-1.txz: Upgraded.
d/gcc-objc-4.8.3-i486-1.txz: Upgraded.
d/kernel-headers-3.14.5_smp-x86-1.txz: Upgraded.
d/make-3.82-i486-5.txz: Rebuilt.
Patched to fix a bug with parallel builds.
Thanks to Danny Schmarsel.
k/kernel-source-3.14.5_smp-noarch-1.txz: Upgraded.
extra/linux-3.14.5-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 06 Jun 2014, 11:59
06.06.2014.
Slackware 64bit:
Code: Select all
Fri Jun 6 04:27:01 UTC 2014
a/openssl-solibs-1.0.1h-x86_64-1.txz: Upgraded.
(* Security fix *)
ap/nano-2.3.4-x86_64-1.txz: Upgraded.
l/libtasn1-3.6-x86_64-1.txz: Upgraded.
Multiple security issues have been corrected in the libtasn1 library.
These errors allow a remote attacker to cause a denial of service, or
possibly to execute arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
n/gnutls-3.2.15-x86_64-1.txz: Upgraded.
A security issue has been corrected in gnutls. This vulnerability
affects the client side of the gnutls library. A server that sends
a specially crafted ServerHello could corrupt the memory of a requesting
client. This may allow a remote attacker to execute arbitrary code.
Additional vulnerabilities in the embedded libtasn1 library have also
been patched.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
n/irssi-0.8.16-x86_64-1.txz: Upgraded.
n/openssl-1.0.1h-x86_64-1.txz: Upgraded.
Multiple security issues have been corrected, including a possible
man-in-the-middle attack where weak keying material is forced, denial
of service, and the execution of arbitrary code.
For more information, see:
http://www.openssl.org/news/secadv_20140605.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
(* Security fix *)
n/sendmail-8.14.9-x86_64-1.txz: Upgraded.
This release fixes one security related bug by properly closing file
descriptors (except stdin, stdout, and stderr) before executing programs.
This bug could enable local users to interfere with an open SMTP
connection if they can execute their own program for mail delivery
(e.g., via procmail or the prog mailer).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
(* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
Slackware 32bit:
Code: Select all
a/openssl-solibs-1.0.1h-i486-1.txz: Upgraded.
ap/nano-2.3.4-i486-1.txz: Upgraded.
l/libtasn1-3.6-i486-1.txz: Upgraded.
Multiple security issues have been corrected in the libtasn1 library.
These errors allow a remote attacker to cause a denial of service, or
possibly to execute arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
n/gnutls-3.2.15-i486-1.txz: Upgraded.
A security issue has been corrected in gnutls. This vulnerability
affects the client side of the gnutls library. A server that sends
a specially crafted ServerHello could corrupt the memory of a requesting
client. This may allow a remote attacker to execute arbitrary code.
Additional vulnerabilities in the embedded libtasn1 library have also
been patched.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
n/irssi-0.8.16-i486-1.txz: Upgraded.
n/openssl-1.0.1h-i486-1.txz: Upgraded.
Multiple security issues have been corrected, including a possible
man-in-the-middle attack where weak keying material is forced, denial
of service, and the execution of arbitrary code.
For more information, see:
http://www.openssl.org/news/secadv_20140605.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
(* Security fix *)
n/sendmail-8.14.9-i486-1.txz: Upgraded.
This release fixes one security related bug by properly closing file
descriptors (except stdin, stdout, and stderr) before executing programs.
This bug could enable local users to interfere with an open SMTP
connection if they can execute their own program for mail delivery
(e.g., via procmail or the prog mailer).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
(* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 10 Jun 2014, 03:46
09.06.2014.
Slackware 64bit:
Code: Select all
Mon Jun 9 20:16:02 UTC 2014
n/php-5.4.29-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues, including a possible denial
of service, and an issue where insecure default permissions on the FPM
socket may allow local users to run arbitrary code as the apache user.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
(* Security fix *)
Slackware 32bit:
Code: Select all
Mon Jun 9 20:16:02 UTC 2014
n/php-5.4.29-i486-1.txz: Upgraded.
This update fixes bugs and security issues, including a possible denial
of service, and an issue where insecure default permissions on the FPM
socket may allow local users to run arbitrary code as the apache user.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 12 Jun 2014, 11:39
12.06.2014.
Slackware 64bit:
Code: Select all
Thu Jun 12 05:11:52 UTC 2014
ap/ddrescue-1.18.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-30.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-24.6.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Slackware 32bit:
Code: Select all
ap/ddrescue-1.18.1-i486-1.txz: Upgraded.
xap/mozilla-firefox-30.0-i486-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-24.6.0-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 19 Jun 2014, 09:29
17.06.2014.
Slackware 64bit:
Code: Select all
l/ncurses-5.9-x86_64-3.txz: Rebuilt.
Applied upstream patch ncurses-5.9-20140308-patch.sh.
Thanks to comet.berkeley.
n/yptools-2.14-x86_64-3.txz: Rebuilt.
Corrected yppasswd patch that was causing password changes to fail.
Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-x86_64-1.txz: Upgraded.
Slackware 32bit:
Code: Select all
l/ncurses-5.9-i486-3.txz: Rebuilt.
Applied upstream patch ncurses-5.9-20140308-patch.sh.
Thanks to comet.berkeley.
n/yptools-2.14-i486-3.txz: Rebuilt.
Corrected yppasswd patch that was causing password changes to fail.
Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-i486-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
-
- Posts: 3468
- Joined: 01 Apr 2012, 13:50
- Location: Mlečni put
Post
Napisano: 25 Jun 2014, 19:02
24.06.2014.
Slackware 64bit:
Code: Select all
Tue Jun 24 22:35:07 UTC 2014
ap/man-1.6g-x86_64-2.txz: Rebuilt.
Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.26.1-x86_64-1.txz: Upgraded.
n/bind-9.9.5_P1-x86_64-1.txz: Upgraded.
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case. :-)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
n/gnupg-1.4.17-x86_64-1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
n/gnupg2-2.0.24-x86_64-1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
n/samba-4.1.9-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *)
xap/seamonkey-2.26.1-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
testing/packages/bind-9.10.0_P2-x86_64-1.txz: Added.
Slackware 32bit:
Code: Select all
ap/man-1.6g-i486-2.txz: Rebuilt.
Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.26.1-i486-1.txz: Upgraded.
n/bind-9.9.5_P1-i486-1.txz: Upgraded.
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case. :-)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
n/gnupg-1.4.17-i486-1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
n/gnupg2-2.0.24-i486-1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
n/samba-4.1.9-i486-1.txz: Upgraded.
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *)
xap/seamonkey-2.26.1-i486-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
testing/packages/bind-9.10.0_P2-i486-1.txz: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”
Who is online
Users browsing this forum: No registered users and 70 guests