Novosti u *current* -u

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Post Reply

Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 07 Aug 2016, 13:54


Slackware 64-bit

Code: Select all

Sat Aug 6 19:29:16 UTC 2016
n/curl-7.50.1-x86_64-1.txz: Upgraded.
       This release fixes security issues:
       TLS: switch off SSL session id when client cert is used
       TLS: only reuse connections with the same client cert
       curl_multi_cleanup: clear connection pointer for easy handles
       For more information, see:
       https://curl.haxx.se/docs/adv_20160803A.html
       https://curl.haxx.se/docs/adv_20160803B.html
       https://curl.haxx.se/docs/adv_20160803C.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
       (* Security fix *)
n/mutt-1.6.2-x86_64-1.txz: Upgraded.
n/openssh-7.3p1-x86_64-1.txz: Upgraded.
       This is primarily a bugfix release, and also addresses security issues.
       sshd(8): Mitigate a potential denial-of-service attack against the system's
       crypt(3) function via sshd(8).
       sshd(8): Mitigate timing differences in password authentication that could
       be used to discern valid from invalid account names when long passwords were
       sent and particular password hashing algorithms are in use on the server.
       ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
       countermeasures.
       ssh(1), sshd(8): Improve operation ordering of MAC verification for
       Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
       before decrypting any ciphertext.
       sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
       For more information, see:
       http://www.openssh.com/txt/release-7.3
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
       (* Security fix *)
n/stunnel-5.35-x86_64-1.txz: Upgraded.
       Fixes security issues:
       Fixed malfunctioning "verify = 4".
       Fixed incorrectly enforced client certificate requests.
       (* Security fix *)
Slackware 32-bit

Code: Select all

Sat Aug 6 19:29:16 UTC 2016
n/curl-7.50.1-i586-1.txz: Upgraded.
       This release fixes security issues:
       TLS: switch off SSL session id when client cert is used
       TLS: only reuse connections with the same client cert
       curl_multi_cleanup: clear connection pointer for easy handles
       For more information, see:
       https://curl.haxx.se/docs/adv_20160803A.html
       https://curl.haxx.se/docs/adv_20160803B.html
       https://curl.haxx.se/docs/adv_20160803C.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
       (* Security fix *)
n/mutt-1.6.2-i586-1.txz: Upgraded.
n/openssh-7.3p1-i586-1.txz: Upgraded.
       This is primarily a bugfix release, and also addresses security issues.
       sshd(8): Mitigate a potential denial-of-service attack against the system's
       crypt(3) function via sshd(8).
       sshd(8): Mitigate timing differences in password authentication that could
       be used to discern valid from invalid account names when long passwords were
       sent and particular password hashing algorithms are in use on the server.
       ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
       countermeasures.
       ssh(1), sshd(8): Improve operation ordering of MAC verification for
       Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
       before decrypting any ciphertext.
       sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
       For more information, see:
       http://www.openssh.com/txt/release-7.3
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
       (* Security fix *)
n/stunnel-5.35-i586-1.txz: Upgraded.
       Fixes security issues:
       Fixed malfunctioning "verify = 4".
       Fixed incorrectly enforced client certificate requests.
       (* Security fix *)
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 11 Aug 2016, 23:59


Slackware 64-bit

Code: Select all

Thu Aug 11 18:24:29 UTC 2016
a/glibc-solibs-2.24-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2016f-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.17-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.17-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.17-x86_64-1.txz: Upgraded.
ap/diffutils-3.4-x86_64-1.txz: Upgraded.
ap/vim-7.4.2196-x86_64-1.txz: Upgraded.
d/binutils-2.27-x86_64-1.txz: Upgraded.
d/gcc-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-g++-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-go-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-java-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-objc-5.4.0-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.17-x86-1.txz: Upgraded.
d/llvm-3.8.1-x86_64-1.txz: Upgraded.
d/oprofile-1.1.0-x86_64-2.txz: Rebuilt.
k/kernel-source-4.4.17-noarch-1.txz: Upgraded.
l/glibc-2.24-x86_64-1.txz: Upgraded.
l/glibc-i18n-2.24-x86_64-1.txz: Upgraded.
l/glibc-profile-2.24-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-48.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/vim-gvim-7.4.2196-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

	
Current (pre-release) ChangeLog for x86 (32-bit)
Thu Aug 11 18:24:29 UTC 2016
a/glibc-solibs-2.24-i586-1.txz: Upgraded.
a/glibc-zoneinfo-2016f-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.17-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.17-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.17-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.17_smp-i686-1.txz: Upgraded.
ap/diffutils-3.4-i586-1.txz: Upgraded.
ap/vim-7.4.2196-i586-1.txz: Upgraded.
d/binutils-2.27-i586-1.txz: Upgraded.
d/gcc-5.4.0-i586-1.txz: Upgraded.
d/gcc-g++-5.4.0-i586-1.txz: Upgraded.
d/gcc-gfortran-5.4.0-i586-1.txz: Upgraded.
d/gcc-gnat-5.4.0-i586-1.txz: Upgraded.
d/gcc-go-5.4.0-i586-1.txz: Upgraded.
d/gcc-java-5.4.0-i586-1.txz: Upgraded.
d/gcc-objc-5.4.0-i586-1.txz: Upgraded.
d/kernel-headers-4.4.17_smp-x86-1.txz: Upgraded.
d/llvm-3.8.1-i586-1.txz: Upgraded.
d/oprofile-1.1.0-i586-2.txz: Rebuilt.
k/kernel-source-4.4.17_smp-noarch-1.txz: Upgraded.
l/glibc-2.24-i586-1.txz: Upgraded.
l/glibc-i18n-2.24-i586-1.txz: Upgraded.
l/glibc-profile-2.24-i586-1.txz: Upgraded.
xap/mozilla-firefox-48.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/vim-gvim-7.4.2196-i586-1.txz: Upgraded.
extra/linux-4.4.17-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 24 Aug 2016, 12:29


Slackware 64-bit

Code: Select all

Tue Aug 23 19:45:33 UTC 2016
a/glibc-solibs-2.24-x86_64-2.txz: Rebuilt.
a/kernel-firmware-20160823git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.19-x86_64-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-huge-4.4.19-x86_64-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-modules-4.4.19-x86_64-1.txz: Upgraded.
ap/diffutils-3.5-x86_64-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.72-x86_64-1.txz: Upgraded.
       Thanks to Stuart Winter.
ap/screen-4.4.0-x86_64-2.txz: Rebuilt.
       Reverted a change to /etc/screenrc.new that prevented the console from being
       cleared when a screen session was detached. Thanks to Stuart Winter.
d/binutils-2.27-x86_64-2.txz: Rebuilt.
       Recompiled with --disable-compressed-debug-sections, since other tools are
       not yet capable of parsing that.
       Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter.
d/kernel-headers-4.4.19-x86-1.txz: Upgraded.
k/kernel-source-4.4.19-noarch-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
l/glib2-2.46.2-x86_64-3.txz: Rebuilt.
       Applied upstream patch to fix a use-before-allocate bug in libgio. Without
       this fix, Thunar will crash if $HOME is on an NFS volume.
       Thanks to Jonathan Woithe.
l/glibc-2.24-x86_64-2.txz: Rebuilt.
       If libm.so is a linker script, don't clobber it with a symlink.
       Thanks to guanx.
l/glibc-i18n-2.24-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.24-x86_64-2.txz: Rebuilt.
n/gnupg-1.4.21-x86_64-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/libgcrypt-1.7.3-x86_64-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/network-scripts-14.2-noarch-3.txz: Rebuilt.
       In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
       to speed up the boot time slightly.
       Thanks to Amritpal Bath.
n/stunnel-5.35-x86_64-2.txz: Rebuilt.
       Fixed incorrect config file name in generate-stunnel-key.sh.
       Thanks to Ebben Aries.
xap/mozilla-firefox-48.0.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Tue Aug 23 19:45:33 UTC 2016
a/glibc-solibs-2.24-i586-2.txz: Rebuilt.
a/kernel-firmware-20160823git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.19-i586-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-generic-smp-4.4.19_smp-i686-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-huge-4.4.19-i586-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-huge-smp-4.4.19_smp-i686-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-modules-4.4.19-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.19_smp-i686-1.txz: Upgraded.
ap/diffutils-3.5-i586-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.72-i586-1.txz: Upgraded.
       Thanks to Stuart Winter.
ap/screen-4.4.0-i586-2.txz: Rebuilt.
       Reverted a change to /etc/screenrc.new that prevented the console from being
       cleared when a screen session was detached. Thanks to Stuart Winter.
d/binutils-2.27-i586-2.txz: Rebuilt.
       Recompiled with --disable-compressed-debug-sections, since other tools are
       not yet capable of parsing that.
       Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter.
d/kernel-headers-4.4.19_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.19_smp-noarch-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
l/glib2-2.46.2-i586-3.txz: Rebuilt.
       Applied upstream patch to fix a use-before-allocate bug in libgio. Without
       this fix, Thunar will crash if $HOME is on an NFS volume.
       Thanks to Jonathan Woithe.
l/glibc-2.24-i586-2.txz: Rebuilt.
       If libm.so is a linker script, don't clobber it with a symlink.
       Thanks to guanx.
l/glibc-i18n-2.24-i586-2.txz: Rebuilt.
l/glibc-profile-2.24-i586-2.txz: Rebuilt.
n/gnupg-1.4.21-i586-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/libgcrypt-1.7.3-i586-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/network-scripts-14.2-noarch-3.txz: Rebuilt.
       In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
       to speed up the boot time slightly.
       Thanks to Amritpal Bath.
n/stunnel-5.35-i586-2.txz: Rebuilt.
       Fixed incorrect config file name in generate-stunnel-key.sh.
       Thanks to Ebben Aries.
xap/mozilla-firefox-48.0.1-i586-1.txz: Upgraded.
extra/linux-4.4.19-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 25 Aug 2016, 07:27


Slackware 64-bit

Code: Select all

Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 30 Aug 2016, 13:19


Slackware 64-bit

Code: Select all

Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-x86_64-1.txz: Upgraded.
l/gsl-2.2-x86_64-1.txz: Upgraded.
Slackware 32-bit

Code: Select all

Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-i586-1.txz: Upgraded.
l/gsl-2.2-i586-1.txz: Upgraded.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 31 Aug 2016, 06:27


Slackware 64-bit

Code: Select all

Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-go-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-java-6.2.0-x86_64-1.txz: Added.
       Please note that if you install this package, gettext (specifically the
       gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-x86_64-1.txz: Added.
Slackware 32-bit

Code: Select all

Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-i586-1.txz: Added.
testing/packages/gcc-g++-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gfortran-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gnat-6.2.0-i586-1.txz: Added.
testing/packages/gcc-go-6.2.0-i586-1.txz: Added.
testing/packages/gcc-java-6.2.0-i586-1.txz: Added.
       Please note that if you install this package, gettext (specifically the
       gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-i586-1.txz: Added.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 01 Sep 2016, 06:06


Slackware 64-bit

Code: Select all

Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-45.3.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Slackware 32-bit

Code: Select all

Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.3.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 09 Sep 2016, 06:02


Slackware 64-bit

Code: Select all

Thu Sep 8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.20-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.20-x86_64-1.txz: Upgraded.
a/kmod-23-x86_64-2.txz: Rebuilt.
a/util-linux-2.28.2-x86_64-1.txz: Upgraded.
ap/hplip-3.16.8-x86_64-1.txz: Upgraded.
ap/nano-2.7.0-x86_64-1.txz: Upgraded.
ap/pamixer-1.3.1-x86_64-2.txz: Rebuilt.
ap/rpm-4.12.0.1-x86_64-2.txz: Rebuilt.
ap/vim-7.4.2342-x86_64-1.txz: Upgraded.
d/Cython-0.24.1-x86_64-1.txz: Upgraded.
d/gdb-7.11.1-x86_64-2.txz: Rebuilt.
d/kernel-headers-4.4.20-x86-1.txz: Upgraded.
d/mercurial-3.9.1-x86_64-1.txz: Upgraded.
d/python-2.7.12-x86_64-1.txz: Upgraded.
       Compiled using --enable-unicode=ucs4.
       The upstream default for Python Unicode is ucs2, but ucs4 is more widely
       used and recommended now. Any Python scripts or binaries that use UCS-2
       will need to be recompiled. These can be identified with the following
       grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20-noarch-1.txz: Upgraded.
kde/calligra-2.9.11-x86_64-6.txz: Rebuilt.
kde/kate-4.14.3-x86_64-3.txz: Rebuilt.
kde/kdev-python-1.7.2-x86_64-2.txz: Rebuilt.
kde/kig-4.14.3-x86_64-4.txz: Rebuilt.
kde/kross-interpreters-4.14.3-x86_64-3.txz: Rebuilt.
kde/pykde4-4.14.3-x86_64-4.txz: Rebuilt.
kde/superkaramba-4.14.3-x86_64-3.txz: Rebuilt.
l/PyQt-4.11.4-x86_64-2.txz: Rebuilt.
l/akonadi-1.13.0-x86_64-3.txz: Rebuilt.
l/boost-1.61.0-x86_64-1.txz: Upgraded.
       Shared library .so-version bump.
l/dbus-python-1.2.4-x86_64-2.txz: Rebuilt.
l/gdbm-1.12-x86_64-2.txz: Rebuilt.
l/glib2-2.46.2-x86_64-4.txz: Rebuilt.
l/gobject-introspection-1.46.0-x86_64-2.txz: Rebuilt.
l/libxml2-2.9.4-x86_64-3.txz: Rebuilt.
l/pilot-link-0.12.5-x86_64-11.txz: Rebuilt.
l/pycups-1.9.73-x86_64-2.txz: Rebuilt.
l/pycurl-7.43.0-x86_64-2.txz: Rebuilt.
l/pygobject-2.28.6-x86_64-3.txz: Rebuilt.
l/pygobject3-3.18.2-x86_64-2.txz: Rebuilt.
l/pygtk-2.24.0-x86_64-3.txz: Rebuilt.
l/python-pillow-3.0.0-x86_64-2.txz: Rebuilt.
l/sip-4.18.1-x86_64-1.txz: Upgraded.
n/php-5.6.25-x86_64-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       http://php.net/ChangeLog-5.php#5.6.25
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
       (* Security fix *)
n/samba-4.5.0-x86_64-1.txz: Upgraded.
xap/blueman-2.0.4-x86_64-2.txz: Rebuilt.
xap/gimp-2.8.18-x86_64-2.txz: Rebuilt.
xap/vim-gvim-7.4.2342-x86_64-1.txz: Upgraded.
extra/brltty/brltty-5.4-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit

Code: Select all

Thu Sep 8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.20-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.20-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kmod-23-i586-2.txz: Rebuilt.
a/util-linux-2.28.2-i586-1.txz: Upgraded.
ap/hplip-3.16.8-i586-1.txz: Upgraded.
ap/nano-2.7.0-i586-1.txz: Upgraded.
ap/pamixer-1.3.1-i586-2.txz: Rebuilt.
ap/rpm-4.12.0.1-i586-2.txz: Rebuilt.
ap/vim-7.4.2342-i586-1.txz: Upgraded.
d/Cython-0.24.1-i586-1.txz: Upgraded.
d/gdb-7.11.1-i586-2.txz: Rebuilt.
d/kernel-headers-4.4.20_smp-x86-1.txz: Upgraded.
d/mercurial-3.9.1-i586-1.txz: Upgraded.
d/python-2.7.12-i586-1.txz: Upgraded.
       Compiled using --enable-unicode=ucs4.
       The upstream default for Python Unicode is ucs2, but ucs4 is more widely
       used and recommended now. Any Python scripts or binaries that use UCS-2
       will need to be recompiled. These can be identified with the following
       grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20_smp-noarch-1.txz: Upgraded.
kde/calligra-2.9.11-i586-6.txz: Rebuilt.
kde/kate-4.14.3-i586-3.txz: Rebuilt.
kde/kdev-python-1.7.2-i586-2.txz: Rebuilt.
kde/kig-4.14.3-i586-4.txz: Rebuilt.
kde/kross-interpreters-4.14.3-i586-3.txz: Rebuilt.
kde/pykde4-4.14.3-i586-4.txz: Rebuilt.
kde/superkaramba-4.14.3-i586-3.txz: Rebuilt.
l/PyQt-4.11.4-i586-2.txz: Rebuilt.
l/akonadi-1.13.0-i586-3.txz: Rebuilt.
l/boost-1.61.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/dbus-python-1.2.4-i586-2.txz: Rebuilt.
l/gdbm-1.12-i586-2.txz: Rebuilt.
l/glib2-2.46.2-i586-4.txz: Rebuilt.
l/gobject-introspection-1.46.0-i586-2.txz: Rebuilt.
l/libxml2-2.9.4-i586-3.txz: Rebuilt.
l/pilot-link-0.12.5-i586-11.txz: Rebuilt.
l/pycups-1.9.73-i586-2.txz: Rebuilt.
l/pycurl-7.43.0-i586-2.txz: Rebuilt.
l/pygobject-2.28.6-i486-3.txz: Rebuilt.
l/pygobject3-3.18.2-i586-2.txz: Rebuilt.
l/pygtk-2.24.0-i586-3.txz: Rebuilt.
l/python-pillow-3.0.0-i586-2.txz: Rebuilt.
l/sip-4.18.1-i586-1.txz: Upgraded.
n/php-5.6.25-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       http://php.net/ChangeLog-5.php#5.6.25
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
       (* Security fix *)
n/samba-4.5.0-i586-1.txz: Upgraded.
xap/blueman-2.0.4-i586-2.txz: Rebuilt.
xap/gimp-2.8.18-i586-2.txz: Rebuilt.
xap/vim-gvim-7.4.2342-i586-1.txz: Upgraded.
extra/brltty/brltty-5.4-i586-1.txz: Upgraded.
extra/linux-4.4.20-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa



Administrator
Administrator
offline
User avatar

Posts: 4590
Joined: 04 Feb 2011, 20:32
Location: Beograd
Contact:

Post Napisano: 10 Sep 2016, 13:14


Pre instalacije ovog poslednjeg update-a, obratite pažnju na sledeće:

Code: Select all

       Compiled using --enable-unicode=ucs4.
       The upstream default for Python Unicode is ucs2, but ucs4 is more widely
       used and recommended now. Any Python scripts or binaries that use UCS-2
       will need to be recompiled. These can be identified with the following
       grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null



Administrator
Administrator
offline
User avatar

Posts: 1680
Joined: 07 Jun 2012, 18:01
Location: Najlipši grad na svitu :)

Post Napisano: 12 Sep 2016, 10:27


Slackware 64-bit

Code: Select all

Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-x86_64-1.txz: Upgraded.
       This update fixes a security issue: Integer overflow in the
       gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
       attackers to cause a denial of service (crash) via a large image file,
       which triggers a large memory allocation.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
       (* Security fix *)
n/gnutls-3.4.15-x86_64-1.txz: Upgraded.
       libgnutls: Corrected the comparison of the serial size in OCSP response.
       Previously the OCSP certificate check wouldn't verify the serial length
       and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
       Reported by Stefan Buehler.
       For more information, see:
       https://www.gnutls.org/security.html
       (* Security fix *)
Slackware 32-bit

Code: Select all

Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-i586-1.txz: Upgraded.
       This update fixes a security issue: Integer overflow in the
       gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
       attackers to cause a denial of service (crash) via a large image file,
       which triggers a large memory allocation.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
       (* Security fix *)
n/gnutls-3.4.15-i586-1.txz: Upgraded.
       libgnutls: Corrected the comparison of the serial size in OCSP response.
       Previously the OCSP certificate check wouldn't verify the serial length
       and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
       Reported by Stefan Buehler.
       For more information, see:
       https://www.gnutls.org/security.html
       (* Security fix *)
Udruga SOK - službena stranica
Spreman sam umrijeti časno, ali ako nečasno, onda ništa


Post Reply

Who is online

Users browsing this forum: No registered users and 47 guests