Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 29 Sep 2016, 14:32
Slackware 64-bit
Code: Select all
Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz: Upgraded.
This package provides the latest timezone updates.
l/mpfr-3.1.5-x86_64-1.txz: Upgraded.
Slackware 32-bit
Code: Select all
Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz: Upgraded.
This package provides the latest timezone updates.
l/mpfr-3.1.5-i586-1.txz: Upgraded.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 02 Oct 2016, 19:00
Slackware 64-bit
Code: Select all
Sat Oct 1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.23-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.23-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.23-x86_64-1.txz: Upgraded.
a/lvm2-2.02.166-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.23-x86-1.txz: Upgraded.
k/kernel-source-4.4.23-noarch-1.txz: Upgraded.
n/mutt-1.7.0-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-45.4.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Sat Oct 1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.23-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.23-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.23-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/lvm2-2.02.166-i586-1.txz: Upgraded.
d/kernel-headers-4.4.23_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.23_smp-noarch-1.txz: Upgraded.
n/mutt-1.7.0-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.4.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
extra/linux-4.4.23-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 01 Nov 2016, 09:42
Slackware 64-bit
Code: Select all
Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-x86_64-1.txz: Upgraded.
a/kernel-generic-4.4.29-x86_64-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-huge-4.4.29-x86_64-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-modules-4.4.29-x86_64-1.txz: Upgraded.
ap/mariadb-10.0.28-x86_64-1.txz: Upgraded.
This update fixes several security issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
(* Security fix *)
d/gdb-7.12-x86_64-1.txz: Upgraded.
d/guile-2.0.13-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.29-x86-1.txz: Upgraded.
k/kernel-source-4.4.29-noarch-1.txz: Upgraded.
This kernel fixes a security issue known as "Dirty COW". A race
condition was found in the way the Linux kernel's memory subsystem
handled the copy-on-write (COW) breakage of private read-only
memory mappings. An unprivileged local user could use this flaw to
gain write access to otherwise read-only memory mappings and thus
increase their privileges on the system.
For more information, see:
https://dirtycow.ninja/
https://www.kb.cert.org/vuls/id/243144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
(* Security fix *)
l/libcdio-0.94-x86_64-1.txz: Upgraded.
n/nmap-7.30-x86_64-1.txz: Upgraded.
n/php-5.6.27-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
https://php.net/ChangeLog-5.php#5.6.27
(* Security fix *)
x/libX11-1.6.4-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory read in XGetImage() or write in XListFonts().
Affected versions libX11 <= 1.6.3.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
(* Security fix *)
x/libXfixes-5.0.3-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause an integer
overflow on 32 bit architectures.
Affected versions : libXfixes <= 5.0.2.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
(* Security fix *)
x/libXi-1.7.8-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory access or endless loops (Denial of Service).
Affected versions libXi <= 1.7.6.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
(* Security fix *)
x/libXrandr-1.5.1-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory writes.
Affected versions: libXrandr <= 1.5.0.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
(* Security fix *)
x/libXrender-0.9.10-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory writes.
Affected version: libXrender <= 0.9.9.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
(* Security fix *)
x/libXtst-1.2.3-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory access or endless loops (Denial of Service).
Affected version libXtst <= 1.2.2.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
(* Security fix *)
x/libXv-1.0.11-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory and memory corruption.
Affected version libXv <= 1.0.10.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
(* Security fix *)
x/libXvMC-1.0.10-x86_64-1.txz: Upgraded.
Insufficient validation of data from the X server can cause a one byte buffer
read underrun.
Affected version: libXvMC <= 1.0.9.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
(* Security fix *)
xap/mozilla-firefox-49.0.2-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/xscreensaver-5.36-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-i586-1.txz: Upgraded.
a/kernel-generic-4.4.29-i586-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-generic-smp-4.4.29_smp-i686-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-huge-4.4.29-i586-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-huge-smp-4.4.29_smp-i686-1.txz: Upgraded.
Fixes a security issue (Dirty COW).
(* Security fix *)
a/kernel-modules-4.4.29-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.29_smp-i686-1.txz: Upgraded.
ap/mariadb-10.0.28-i586-1.txz: Upgraded.
This update fixes several security issues.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
(* Security fix *)
d/gdb-7.12-i586-1.txz: Upgraded.
d/guile-2.0.13-i586-1.txz: Upgraded.
d/kernel-headers-4.4.29_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.29_smp-noarch-1.txz: Upgraded.
This kernel fixes a security issue known as "Dirty COW". A race
condition was found in the way the Linux kernel's memory subsystem
handled the copy-on-write (COW) breakage of private read-only
memory mappings. An unprivileged local user could use this flaw to
gain write access to otherwise read-only memory mappings and thus
increase their privileges on the system.
For more information, see:
https://dirtycow.ninja/
https://www.kb.cert.org/vuls/id/243144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
(* Security fix *)
l/libcdio-0.94-i586-1.txz: Upgraded.
n/nmap-7.30-i586-1.txz: Upgraded.
n/php-5.6.27-i586-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
https://php.net/ChangeLog-5.php#5.6.27
(* Security fix *)
x/libX11-1.6.4-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory read in XGetImage() or write in XListFonts().
Affected versions libX11 <= 1.6.3.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
(* Security fix *)
x/libXfixes-5.0.3-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause an integer
overflow on 32 bit architectures.
Affected versions : libXfixes <= 5.0.2.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
(* Security fix *)
x/libXi-1.7.8-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory access or endless loops (Denial of Service).
Affected versions libXi <= 1.7.6.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
(* Security fix *)
x/libXrandr-1.5.1-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory writes.
Affected versions: libXrandr <= 1.5.0.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
(* Security fix *)
x/libXrender-0.9.10-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory writes.
Affected version: libXrender <= 0.9.9.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
(* Security fix *)
x/libXtst-1.2.3-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory access or endless loops (Denial of Service).
Affected version libXtst <= 1.2.2.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
(* Security fix *)
x/libXv-1.0.11-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause out of boundary
memory and memory corruption.
Affected version libXv <= 1.0.10.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
(* Security fix *)
x/libXvMC-1.0.10-i586-1.txz: Upgraded.
Insufficient validation of data from the X server can cause a one byte buffer
read underrun.
Affected version: libXvMC <= 1.0.9.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
(* Security fix *)
xap/mozilla-firefox-49.0.2-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/xscreensaver-5.36-i586-1.txz: Upgraded.
extra/linux-4.4.29-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
-
- Posts: 4591
- Joined: 04 Feb 2011, 20:32
- Location: Beograd
-
Contact:
Post
Napisano: 01 Nov 2016, 13:52
Ovo ažuriranje sadrži ispravku za "
Dirty COW" propust i nekoliko siguronosnih ispravki za X11. Moja preporuka je da ga instalirate što je pre moguće.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 06 Nov 2016, 19:51
Slackware 64-bit
Code: Select all
Fri Nov 4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz: Upgraded.
ap/nano-2.7.1-x86_64-1.txz: Upgraded.
ap/vim-8.0.0055-x86_64-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-x86_64-2.txz: Rebuilt.
n/bind-9.10.4_P4-x86_64-1.txz: Upgraded.
This update fixes a denial-of-service vulnerability. A defect in BIND's
handling of responses containing a DNAME answer can cause a resolver to exit
after encountering an assertion failure in db.c or resolver.c. A server
encountering either of these error conditions will stop, resulting in denial
of service to clients. The risk to authoritative servers is minimal;
recursive servers are chiefly at risk.
For more information, see:
https://kb.isc.org/article/AA-01434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
(* Security fix *)
n/curl-7.51.0-x86_64-1.txz: Upgraded.
This release fixes security issues:
CVE-2016-8615: cookie injection for other servers
CVE-2016-8616: case insensitive password comparison
CVE-2016-8617: OOB write via unchecked multiplication
CVE-2016-8618: double-free in curl_maprintf
CVE-2016-8619: double-free in krb5 code
CVE-2016-8620: glob parser write/read out of bounds
CVE-2016-8621: curl_getdate read out of bounds
CVE-2016-8622: URL unescape heap overflow via integer truncation
CVE-2016-8623: Use-after-free via shared cookies
CVE-2016-8624: invalid URL parsing with '#'
CVE-2016-8625: IDNA 2003 makes curl use wrong host
For more information, see:
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://curl.haxx.se/docs/adv_20161102F.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102K.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
(* Security fix *)
xap/gnuchess-6.2.4-x86_64-1.txz: Upgraded.
xap/vim-gvim-8.0.0055-x86_64-1.txz: Upgraded.
Slackware 32-bit
Code: Select all
Fri Nov 4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz: Upgraded.
ap/nano-2.7.1-i586-1.txz: Upgraded.
ap/vim-8.0.0055-i586-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-i586-2.txz: Rebuilt.
n/bind-9.10.4_P4-i586-1.txz: Upgraded.
This update fixes a denial-of-service vulnerability. A defect in BIND's
handling of responses containing a DNAME answer can cause a resolver to exit
after encountering an assertion failure in db.c or resolver.c. A server
encountering either of these error conditions will stop, resulting in denial
of service to clients. The risk to authoritative servers is minimal;
recursive servers are chiefly at risk.
For more information, see:
https://kb.isc.org/article/AA-01434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
(* Security fix *)
n/curl-7.51.0-i586-1.txz: Upgraded.
This release fixes security issues:
CVE-2016-8615: cookie injection for other servers
CVE-2016-8616: case insensitive password comparison
CVE-2016-8617: OOB write via unchecked multiplication
CVE-2016-8618: double-free in curl_maprintf
CVE-2016-8619: double-free in krb5 code
CVE-2016-8620: glob parser write/read out of bounds
CVE-2016-8621: curl_getdate read out of bounds
CVE-2016-8622: URL unescape heap overflow via integer truncation
CVE-2016-8623: Use-after-free via shared cookies
CVE-2016-8624: invalid URL parsing with '#'
CVE-2016-8625: IDNA 2003 makes curl use wrong host
For more information, see:
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://curl.haxx.se/docs/adv_20161102F.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102K.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
(* Security fix *)
xap/gnuchess-6.2.4-i586-1.txz: Upgraded.
xap/vim-gvim-8.0.0055-i586-1.txz: Upgraded.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 20 Nov 2016, 16:49
Slackware 64-bit
Code: Select all
Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-x86_64-2.txz: Rebuilt.
Reverted a speedup patch that is causing regressions when output is directed
to /dev/null. Thanks to SeB.
+--------------------------+
Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-x86_64-1.txz: Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.32-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.32-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.32-x86_64-1.txz: Upgraded.
ap/ghostscript-9.20-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.32-x86-1.txz: Upgraded.
k/kernel-source-4.4.32-noarch-1.txz: Upgraded.
n/nmap-7.31-x86_64-1.txz: Upgraded.
n/samba-4.5.1-x86_64-1.txz: Upgraded.
x/freeglut-3.0.0-x86_64-1.txz: Upgraded.
x/libXfont2-2.0.1-x86_64-1.txz: Added.
x/libdrm-2.4.73-x86_64-1.txz: Upgraded.
x/libxcb-1.12-x86_64-1.txz: Upgraded.
x/mesa-13.0.1-x86_64-1.txz: Upgraded.
x/xcb-proto-1.12-x86_64-1.txz: Upgraded.
x/xcb-util-cursor-0.1.3-x86_64-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-x86_64-10.txz: Rebuilt.
x/xf86-input-evdev-2.10.4-x86_64-1.txz: Upgraded.
x/xf86-input-joystick-1.6.3-x86_64-1.txz: Upgraded.
x/xf86-input-keyboard-1.9.0-x86_64-1.txz: Upgraded.
x/xf86-input-mouse-1.9.2-x86_64-1.txz: Upgraded.
x/xf86-input-penmount-1.5.0-x86_64-10.txz: Rebuilt.
x/xf86-input-synaptics-1.9.0-x86_64-1.txz: Upgraded.
x/xf86-input-vmmouse-13.1.0-x86_64-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-x86_64-10.txz: Rebuilt.
x/xf86-input-wacom-0.33.0-x86_64-2.txz: Rebuilt.
x/xf86-video-amdgpu-1.2.0-x86_64-1.txz: Upgraded.
x/xf86-video-apm-1.2.5-x86_64-9.txz: Rebuilt.
x/xf86-video-ark-0.7.5-x86_64-9.txz: Rebuilt.
x/xf86-video-ast-1.1.5-x86_64-3.txz: Rebuilt.
x/xf86-video-ati-7.8.0-x86_64-1.txz: Upgraded.
x/xf86-video-chips-1.2.6-x86_64-2.txz: Removed.
x/xf86-video-cirrus-1.5.3-x86_64-3.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-x86_64-6.txz: Rebuilt.
x/xf86-video-glint-1.2.8-x86_64-8.txz: Removed.
x/xf86-video-i128-1.3.6-x86_64-9.txz: Rebuilt.
x/xf86-video-i740-1.3.5-x86_64-3.txz: Removed.
x/xf86-video-intel-git_20161115_a1a0f76-x86_64-1.txz: Upgraded.
x/xf86-video-mach64-6.9.5-x86_64-3.txz: Rebuilt.
x/xf86-video-mga-1.6.4-x86_64-3.txz: Removed.
x/xf86-video-neomagic-1.2.9-x86_64-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.13-x86_64-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-x86_64-9.txz: Removed.
x/xf86-video-openchrome-0.5.0-x86_64-2.txz: Rebuilt.
x/xf86-video-r128-6.10.1-x86_64-1.txz: Removed.
x/xf86-video-rendition-4.2.6-x86_64-2.txz: Rebuilt.
x/xf86-video-s3-0.6.5-x86_64-9.txz: Rebuilt.
x/xf86-video-s3virge-1.10.7-x86_64-3.txz: Rebuilt.
x/xf86-video-savage-2.3.8-x86_64-2.txz: Removed.
x/xf86-video-siliconmotion-1.7.8-x86_64-2.txz: Removed.
x/xf86-video-sis-0.10.8-x86_64-2.txz: Removed.
x/xf86-video-sisusb-0.9.6-x86_64-9.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-x86_64-3.txz: Removed.
x/xf86-video-tga-1.2.2-x86_64-9.txz: Rebuilt.
x/xf86-video-trident-1.3.7-x86_64-3.txz: Removed.
x/xf86-video-tseng-1.2.5-x86_64-9.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-x86_64-14.txz: Rebuilt.
x/xf86-video-vesa-2.3.4-x86_64-3.txz: Rebuilt.
x/xf86-video-vmware-13.2.1-x86_64-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-x86_64-10.txz: Rebuilt.
x/xf86-video-xgi-1.6.1-x86_64-2.txz: Removed.
x/xf86-video-xgixp-1.8.1-x86_64-8.txz: Removed.
x/xorg-server-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xephyr-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-1.19.0-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-1.19.0-x86_64-1.txz: Upgraded.
x/xproto-7.0.31-noarch-1.txz: Upgraded.
x/xterm-326-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-50.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
extra/tigervnc/tigervnc-1.7.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Slackware 32-bit
Code: Select all
Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-i586-2.txz: Rebuilt.
Reverted a speedup patch that is causing regressions when output is directed
to /dev/null. Thanks to SeB.
+--------------------------+
Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-i586-1.txz: Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.32-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.32-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.32-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.32_smp-i686-1.txz: Upgraded.
ap/ghostscript-9.20-i586-1.txz: Upgraded.
d/kernel-headers-4.4.32_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.32_smp-noarch-1.txz: Upgraded.
n/nmap-7.31-i586-1.txz: Upgraded.
n/samba-4.5.1-i586-1.txz: Upgraded.
x/freeglut-3.0.0-i586-1.txz: Upgraded.
x/libXfont2-2.0.1-i586-1.txz: Added.
x/libdrm-2.4.73-i586-1.txz: Upgraded.
x/libxcb-1.12-i586-1.txz: Upgraded.
x/mesa-13.0.1-i586-1.txz: Upgraded.
x/xcb-proto-1.12-i586-1.txz: Upgraded.
x/xcb-util-cursor-0.1.3-i586-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-evdev-2.10.4-i586-1.txz: Upgraded.
x/xf86-input-joystick-1.6.3-i586-1.txz: Upgraded.
x/xf86-input-keyboard-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-mouse-1.9.2-i586-1.txz: Upgraded.
x/xf86-input-penmount-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-synaptics-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-vmmouse-13.1.0-i586-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-i586-10.txz: Rebuilt.
x/xf86-input-wacom-0.33.0-i586-2.txz: Rebuilt.
x/xf86-video-amdgpu-1.2.0-i586-1.txz: Upgraded.
x/xf86-video-apm-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-ark-0.7.5-i586-9.txz: Rebuilt.
x/xf86-video-ast-1.1.5-i586-3.txz: Rebuilt.
x/xf86-video-ati-7.8.0-i586-1.txz: Upgraded.
x/xf86-video-chips-1.2.6-i586-2.txz: Removed.
x/xf86-video-cirrus-1.5.3-i586-3.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-i586-6.txz: Rebuilt.
x/xf86-video-geode-2.11.18-i586-2.txz: Rebuilt.
x/xf86-video-glint-1.2.8-i586-8.txz: Removed.
x/xf86-video-i128-1.3.6-i586-9.txz: Rebuilt.
x/xf86-video-i740-1.3.5-i586-3.txz: Removed.
x/xf86-video-intel-git_20161115_a1a0f76-i686-1.txz: Upgraded.
x/xf86-video-mach64-6.9.5-i586-3.txz: Rebuilt.
x/xf86-video-mga-1.6.4-i586-3.txz: Removed.
x/xf86-video-neomagic-1.2.9-i586-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.13-i586-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-i586-9.txz: Removed.
x/xf86-video-openchrome-0.5.0-i586-2.txz: Rebuilt.
x/xf86-video-r128-6.10.1-i586-1.txz: Removed.
x/xf86-video-rendition-4.2.6-i586-2.txz: Rebuilt.
x/xf86-video-s3-0.6.5-i586-9.txz: Rebuilt.
x/xf86-video-s3virge-1.10.7-i586-3.txz: Rebuilt.
x/xf86-video-savage-2.3.8-i586-2.txz: Removed.
x/xf86-video-siliconmotion-1.7.8-i586-2.txz: Removed.
x/xf86-video-sis-0.10.8-i586-2.txz: Removed.
x/xf86-video-sisusb-0.9.6-i586-9.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-i586-3.txz: Removed.
x/xf86-video-tga-1.2.2-i586-9.txz: Rebuilt.
x/xf86-video-trident-1.3.7-i586-3.txz: Removed.
x/xf86-video-tseng-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-i586-14.txz: Rebuilt.
x/xf86-video-vesa-2.3.4-i586-3.txz: Rebuilt.
x/xf86-video-vmware-13.2.1-i586-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-i586-10.txz: Rebuilt.
x/xf86-video-xgi-1.6.1-i586-2.txz: Removed.
x/xf86-video-xgixp-1.8.1-i586-8.txz: Removed.
x/xorg-server-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.19.0-i586-1.txz: Upgraded.
x/xproto-7.0.31-noarch-1.txz: Upgraded.
x/xterm-326-i586-1.txz: Upgraded.
xap/mozilla-firefox-50.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
extra/linux-4.4.32-nosmp-sdk/*: Upgraded.
extra/tigervnc/tigervnc-1.7.0-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 20 Nov 2016, 19:22
odradite:
Code: Select all
# slackpkg update
# slackpkg install-new
# slackpkg upgrade-all
jer se bez druge naredbe neće podignuti X. nije neki ogroman problem, ali da vas odmah upozorim jer se redovno upecam
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 22 Nov 2016, 19:51
Slackware 64-bit
Code: Select all
Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-x86_64-1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes the
following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
5 low-severity vulnerabilities, and provides 28 other non-security
fixes and improvements.
CVE-2016-9311: Trap crash
CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
CVE-2016-7429: Interface selection attack
CVE-2016-7426: Client rate limiting and server responses
CVE-2016-7433: Reboot sync calculation problem
For more information, see:
https://www.kb.cert.org/vuls/id/633847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
(* Security fix *)
+--------------------------+
Slackware 32-bit
Code: Select all
Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-i586-1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes the
following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
5 low-severity vulnerabilities, and provides 28 other non-security
fixes and improvements.
CVE-2016-9311: Trap crash
CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
CVE-2016-7429: Interface selection attack
CVE-2016-7426: Client rate limiting and server responses
CVE-2016-7433: Reboot sync calculation problem
For more information, see:
https://www.kb.cert.org/vuls/id/633847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
(* Security fix *)
+--------------------------+
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 02 Dec 2016, 07:52
Slackware 64-bit
Code: Select all
Thu Dec 1 08:49:20 UTC 2016
d/intltool-0.51.0-x86_64-3.txz: Rebuilt.
Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
possible build failures when intltool is used with automake >= 1.15.
Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/security/known-vulnerabilities/firefox.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
(* Security fix *)
xap/mozilla-thunderbird-45.5.1-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
(* Security fix *)
Slackware 32-bit
Code: Select all
Thu Dec 1 08:49:20 UTC 2016
d/intltool-0.51.0-i586-3.txz: Rebuilt.
Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
possible build failures when intltool is used with automake >= 1.15.
Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/security/known-vulnerabilities/firefox.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
(* Security fix *)
xap/mozilla-thunderbird-45.5.1-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
(* Security fix *)
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 13 Dec 2016, 18:17
Slackware 64-bit
Code: Select all
Mon Dec 12 21:25:50 UTC 2016
a/coreutils-8.26-x86_64-1.txz: Upgraded.
a/grep-2.27-x86_64-1.txz: Upgraded.
a/kernel-firmware-20161211git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.38-x86_64-1.txz: Upgraded.
This kernel fixes a security issue with a race condition in
net/packet/af_packet.c that can be exploited to gain kernel code execution
from unprivileged processes.
Thanks to Philip Pettersson for discovering the bug and providing a patch.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
(* Security fix *)
a/kernel-huge-4.4.38-x86_64-1.txz: Upgraded.
(* Security fix *)
a/kernel-modules-4.4.38-x86_64-1.txz: Upgraded.
ap/nano-2.7.2-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.38-x86-1.txz: Upgraded.
k/kernel-source-4.4.38-noarch-1.txz: Upgraded.
(* Security fix *)
l/gsl-2.3-x86_64-1.txz: Upgraded.
l/loudmouth-1.5.3-x86_64-1.txz: Upgraded.
n/mcabber-1.0.4-x86_64-1.txz: Upgraded.
This update fixes a security issue which can lead to a malicious actor
MITMing a conversation, or adding themselves as an entity on a third
parties roster (thereby granting themselves the associated priviledges
such as observing when the user is online).
For more information, see:
https://gultsch.de/gajim_roster_push_and_message_interception.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
(* Security fix *)
n/php-5.6.29-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
https://php.net/ChangeLog-5.php#5.6.29
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Mon Dec 12 21:25:50 UTC 2016
a/coreutils-8.26-i586-1.txz: Upgraded.
a/grep-2.27-i586-1.txz: Upgraded.
a/kernel-firmware-20161211git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.38-i586-1.txz: Upgraded.
This kernel fixes a security issue with a race condition in
net/packet/af_packet.c that can be exploited to gain kernel code execution
from unprivileged processes.
Thanks to Philip Pettersson for discovering the bug and providing a patch.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
(* Security fix *)
a/kernel-generic-smp-4.4.38_smp-i686-1.txz: Upgraded.
(* Security fix *)
a/kernel-huge-4.4.38-i586-1.txz: Upgraded.
(* Security fix *)
a/kernel-huge-smp-4.4.38_smp-i686-1.txz: Upgraded.
(* Security fix *)
a/kernel-modules-4.4.38-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.38_smp-i686-1.txz: Upgraded.
ap/nano-2.7.2-i586-1.txz: Upgraded.
d/kernel-headers-4.4.38_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.38_smp-noarch-1.txz: Upgraded.
(* Security fix *)
l/gsl-2.3-i586-1.txz: Upgraded.
l/loudmouth-1.5.3-i586-1.txz: Upgraded.
n/mcabber-1.0.4-i586-1.txz: Upgraded.
This update fixes a security issue which can lead to a malicious actor
MITMing a conversation, or adding themselves as an entity on a third
parties roster (thereby granting themselves the associated priviledges
such as observing when the user is online).
For more information, see:
https://gultsch.de/gajim_roster_push_and_message_interception.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
(* Security fix *)
n/php-5.6.29-i586-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
https://php.net/ChangeLog-5.php#5.6.29
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
(* Security fix *)
extra/linux-4.4.38-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Who is online
Users browsing this forum: No registered users and 73 guests