Novosti u vezi Slackware Linuxa
Moderator: Urednik
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 07 Aug 2016, 13:54
Slackware 64-bit
Code: Select all
Sat Aug 6 19:29:16 UTC 2016
n/curl-7.50.1-x86_64-1.txz: Upgraded.
This release fixes security issues:
TLS: switch off SSL session id when client cert is used
TLS: only reuse connections with the same client cert
curl_multi_cleanup: clear connection pointer for easy handles
For more information, see:
https://curl.haxx.se/docs/adv_20160803A.html
https://curl.haxx.se/docs/adv_20160803B.html
https://curl.haxx.se/docs/adv_20160803C.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
(* Security fix *)
n/mutt-1.6.2-x86_64-1.txz: Upgraded.
n/openssh-7.3p1-x86_64-1.txz: Upgraded.
This is primarily a bugfix release, and also addresses security issues.
sshd(8): Mitigate a potential denial-of-service attack against the system's
crypt(3) function via sshd(8).
sshd(8): Mitigate timing differences in password authentication that could
be used to discern valid from invalid account names when long passwords were
sent and particular password hashing algorithms are in use on the server.
ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
countermeasures.
ssh(1), sshd(8): Improve operation ordering of MAC verification for
Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
before decrypting any ciphertext.
sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
For more information, see:
http://www.openssh.com/txt/release-7.3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
(* Security fix *)
n/stunnel-5.35-x86_64-1.txz: Upgraded.
Fixes security issues:
Fixed malfunctioning "verify = 4".
Fixed incorrectly enforced client certificate requests.
(* Security fix *)
Slackware 32-bit
Code: Select all
Sat Aug 6 19:29:16 UTC 2016
n/curl-7.50.1-i586-1.txz: Upgraded.
This release fixes security issues:
TLS: switch off SSL session id when client cert is used
TLS: only reuse connections with the same client cert
curl_multi_cleanup: clear connection pointer for easy handles
For more information, see:
https://curl.haxx.se/docs/adv_20160803A.html
https://curl.haxx.se/docs/adv_20160803B.html
https://curl.haxx.se/docs/adv_20160803C.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
(* Security fix *)
n/mutt-1.6.2-i586-1.txz: Upgraded.
n/openssh-7.3p1-i586-1.txz: Upgraded.
This is primarily a bugfix release, and also addresses security issues.
sshd(8): Mitigate a potential denial-of-service attack against the system's
crypt(3) function via sshd(8).
sshd(8): Mitigate timing differences in password authentication that could
be used to discern valid from invalid account names when long passwords were
sent and particular password hashing algorithms are in use on the server.
ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
countermeasures.
ssh(1), sshd(8): Improve operation ordering of MAC verification for
Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
before decrypting any ciphertext.
sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
For more information, see:
http://www.openssh.com/txt/release-7.3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
(* Security fix *)
n/stunnel-5.35-i586-1.txz: Upgraded.
Fixes security issues:
Fixed malfunctioning "verify = 4".
Fixed incorrectly enforced client certificate requests.
(* Security fix *)
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 11 Aug 2016, 23:59
Slackware 64-bit
Code: Select all
Thu Aug 11 18:24:29 UTC 2016
a/glibc-solibs-2.24-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2016f-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.17-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.17-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.17-x86_64-1.txz: Upgraded.
ap/diffutils-3.4-x86_64-1.txz: Upgraded.
ap/vim-7.4.2196-x86_64-1.txz: Upgraded.
d/binutils-2.27-x86_64-1.txz: Upgraded.
d/gcc-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-g++-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-go-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-java-5.4.0-x86_64-1.txz: Upgraded.
d/gcc-objc-5.4.0-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.17-x86-1.txz: Upgraded.
d/llvm-3.8.1-x86_64-1.txz: Upgraded.
d/oprofile-1.1.0-x86_64-2.txz: Rebuilt.
k/kernel-source-4.4.17-noarch-1.txz: Upgraded.
l/glibc-2.24-x86_64-1.txz: Upgraded.
l/glibc-i18n-2.24-x86_64-1.txz: Upgraded.
l/glibc-profile-2.24-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-48.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/vim-gvim-7.4.2196-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Current (pre-release) ChangeLog for x86 (32-bit)
Thu Aug 11 18:24:29 UTC 2016
a/glibc-solibs-2.24-i586-1.txz: Upgraded.
a/glibc-zoneinfo-2016f-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.17-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.17-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.17-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.17_smp-i686-1.txz: Upgraded.
ap/diffutils-3.4-i586-1.txz: Upgraded.
ap/vim-7.4.2196-i586-1.txz: Upgraded.
d/binutils-2.27-i586-1.txz: Upgraded.
d/gcc-5.4.0-i586-1.txz: Upgraded.
d/gcc-g++-5.4.0-i586-1.txz: Upgraded.
d/gcc-gfortran-5.4.0-i586-1.txz: Upgraded.
d/gcc-gnat-5.4.0-i586-1.txz: Upgraded.
d/gcc-go-5.4.0-i586-1.txz: Upgraded.
d/gcc-java-5.4.0-i586-1.txz: Upgraded.
d/gcc-objc-5.4.0-i586-1.txz: Upgraded.
d/kernel-headers-4.4.17_smp-x86-1.txz: Upgraded.
d/llvm-3.8.1-i586-1.txz: Upgraded.
d/oprofile-1.1.0-i586-2.txz: Rebuilt.
k/kernel-source-4.4.17_smp-noarch-1.txz: Upgraded.
l/glibc-2.24-i586-1.txz: Upgraded.
l/glibc-i18n-2.24-i586-1.txz: Upgraded.
l/glibc-profile-2.24-i586-1.txz: Upgraded.
xap/mozilla-firefox-48.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/vim-gvim-7.4.2196-i586-1.txz: Upgraded.
extra/linux-4.4.17-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 24 Aug 2016, 12:29
Slackware 64-bit
Code: Select all
Tue Aug 23 19:45:33 UTC 2016
a/glibc-solibs-2.24-x86_64-2.txz: Rebuilt.
a/kernel-firmware-20160823git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.19-x86_64-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-huge-4.4.19-x86_64-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-modules-4.4.19-x86_64-1.txz: Upgraded.
ap/diffutils-3.5-x86_64-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.72-x86_64-1.txz: Upgraded.
Thanks to Stuart Winter.
ap/screen-4.4.0-x86_64-2.txz: Rebuilt.
Reverted a change to /etc/screenrc.new that prevented the console from being
cleared when a screen session was detached. Thanks to Stuart Winter.
d/binutils-2.27-x86_64-2.txz: Rebuilt.
Recompiled with --disable-compressed-debug-sections, since other tools are
not yet capable of parsing that.
Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter.
d/kernel-headers-4.4.19-x86-1.txz: Upgraded.
k/kernel-source-4.4.19-noarch-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
l/glib2-2.46.2-x86_64-3.txz: Rebuilt.
Applied upstream patch to fix a use-before-allocate bug in libgio. Without
this fix, Thunar will crash if $HOME is on an NFS volume.
Thanks to Jonathan Woithe.
l/glibc-2.24-x86_64-2.txz: Rebuilt.
If libm.so is a linker script, don't clobber it with a symlink.
Thanks to guanx.
l/glibc-i18n-2.24-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.24-x86_64-2.txz: Rebuilt.
n/gnupg-1.4.21-x86_64-1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
n/libgcrypt-1.7.3-x86_64-1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
n/network-scripts-14.2-noarch-3.txz: Rebuilt.
In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
to speed up the boot time slightly.
Thanks to Amritpal Bath.
n/stunnel-5.35-x86_64-2.txz: Rebuilt.
Fixed incorrect config file name in generate-stunnel-key.sh.
Thanks to Ebben Aries.
xap/mozilla-firefox-48.0.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Tue Aug 23 19:45:33 UTC 2016
a/glibc-solibs-2.24-i586-2.txz: Rebuilt.
a/kernel-firmware-20160823git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.19-i586-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-generic-smp-4.4.19_smp-i686-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-huge-4.4.19-i586-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-huge-smp-4.4.19_smp-i686-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
a/kernel-modules-4.4.19-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.19_smp-i686-1.txz: Upgraded.
ap/diffutils-3.5-i586-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.72-i586-1.txz: Upgraded.
Thanks to Stuart Winter.
ap/screen-4.4.0-i586-2.txz: Rebuilt.
Reverted a change to /etc/screenrc.new that prevented the console from being
cleared when a screen session was detached. Thanks to Stuart Winter.
d/binutils-2.27-i586-2.txz: Rebuilt.
Recompiled with --disable-compressed-debug-sections, since other tools are
not yet capable of parsing that.
Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter.
d/kernel-headers-4.4.19_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.19_smp-noarch-1.txz: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *)
l/glib2-2.46.2-i586-3.txz: Rebuilt.
Applied upstream patch to fix a use-before-allocate bug in libgio. Without
this fix, Thunar will crash if $HOME is on an NFS volume.
Thanks to Jonathan Woithe.
l/glibc-2.24-i586-2.txz: Rebuilt.
If libm.so is a linker script, don't clobber it with a symlink.
Thanks to guanx.
l/glibc-i18n-2.24-i586-2.txz: Rebuilt.
l/glibc-profile-2.24-i586-2.txz: Rebuilt.
n/gnupg-1.4.21-i586-1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
n/libgcrypt-1.7.3-i586-1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
n/network-scripts-14.2-noarch-3.txz: Rebuilt.
In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
to speed up the boot time slightly.
Thanks to Amritpal Bath.
n/stunnel-5.35-i586-2.txz: Rebuilt.
Fixed incorrect config file name in generate-stunnel-key.sh.
Thanks to Ebben Aries.
xap/mozilla-firefox-48.0.1-i586-1.txz: Upgraded.
extra/linux-4.4.19-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 25 Aug 2016, 07:27
Slackware 64-bit
Code: Select all
Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-x86_64-1.txz: Upgraded.
Slackware 32-bit
Code: Select all
Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-i586-1.txz: Upgraded.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 30 Aug 2016, 13:19
Slackware 64-bit
Code: Select all
Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-x86_64-1.txz: Upgraded.
l/gsl-2.2-x86_64-1.txz: Upgraded.
Slackware 32-bit
Code: Select all
Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-i586-1.txz: Upgraded.
l/gsl-2.2-i586-1.txz: Upgraded.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 31 Aug 2016, 06:27
Slackware 64-bit
Code: Select all
Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-go-6.2.0-x86_64-1.txz: Added.
testing/packages/gcc-java-6.2.0-x86_64-1.txz: Added.
Please note that if you install this package, gettext (specifically the
gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-x86_64-1.txz: Added.
Slackware 32-bit
Code: Select all
Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-i586-1.txz: Added.
testing/packages/gcc-g++-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gfortran-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gnat-6.2.0-i586-1.txz: Added.
testing/packages/gcc-go-6.2.0-i586-1.txz: Added.
testing/packages/gcc-java-6.2.0-i586-1.txz: Added.
Please note that if you install this package, gettext (specifically the
gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-i586-1.txz: Added.
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 01 Sep 2016, 06:06
Slackware 64-bit
Code: Select all
Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-45.3.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
Slackware 32-bit
Code: Select all
Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.3.0-i586-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 09 Sep 2016, 06:02
Slackware 64-bit
Code: Select all
Thu Sep 8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.20-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.20-x86_64-1.txz: Upgraded.
a/kmod-23-x86_64-2.txz: Rebuilt.
a/util-linux-2.28.2-x86_64-1.txz: Upgraded.
ap/hplip-3.16.8-x86_64-1.txz: Upgraded.
ap/nano-2.7.0-x86_64-1.txz: Upgraded.
ap/pamixer-1.3.1-x86_64-2.txz: Rebuilt.
ap/rpm-4.12.0.1-x86_64-2.txz: Rebuilt.
ap/vim-7.4.2342-x86_64-1.txz: Upgraded.
d/Cython-0.24.1-x86_64-1.txz: Upgraded.
d/gdb-7.11.1-x86_64-2.txz: Rebuilt.
d/kernel-headers-4.4.20-x86-1.txz: Upgraded.
d/mercurial-3.9.1-x86_64-1.txz: Upgraded.
d/python-2.7.12-x86_64-1.txz: Upgraded.
Compiled using --enable-unicode=ucs4.
The upstream default for Python Unicode is ucs2, but ucs4 is more widely
used and recommended now. Any Python scripts or binaries that use UCS-2
will need to be recompiled. These can be identified with the following
grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20-noarch-1.txz: Upgraded.
kde/calligra-2.9.11-x86_64-6.txz: Rebuilt.
kde/kate-4.14.3-x86_64-3.txz: Rebuilt.
kde/kdev-python-1.7.2-x86_64-2.txz: Rebuilt.
kde/kig-4.14.3-x86_64-4.txz: Rebuilt.
kde/kross-interpreters-4.14.3-x86_64-3.txz: Rebuilt.
kde/pykde4-4.14.3-x86_64-4.txz: Rebuilt.
kde/superkaramba-4.14.3-x86_64-3.txz: Rebuilt.
l/PyQt-4.11.4-x86_64-2.txz: Rebuilt.
l/akonadi-1.13.0-x86_64-3.txz: Rebuilt.
l/boost-1.61.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/dbus-python-1.2.4-x86_64-2.txz: Rebuilt.
l/gdbm-1.12-x86_64-2.txz: Rebuilt.
l/glib2-2.46.2-x86_64-4.txz: Rebuilt.
l/gobject-introspection-1.46.0-x86_64-2.txz: Rebuilt.
l/libxml2-2.9.4-x86_64-3.txz: Rebuilt.
l/pilot-link-0.12.5-x86_64-11.txz: Rebuilt.
l/pycups-1.9.73-x86_64-2.txz: Rebuilt.
l/pycurl-7.43.0-x86_64-2.txz: Rebuilt.
l/pygobject-2.28.6-x86_64-3.txz: Rebuilt.
l/pygobject3-3.18.2-x86_64-2.txz: Rebuilt.
l/pygtk-2.24.0-x86_64-3.txz: Rebuilt.
l/python-pillow-3.0.0-x86_64-2.txz: Rebuilt.
l/sip-4.18.1-x86_64-1.txz: Upgraded.
n/php-5.6.25-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.25
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
(* Security fix *)
n/samba-4.5.0-x86_64-1.txz: Upgraded.
xap/blueman-2.0.4-x86_64-2.txz: Rebuilt.
xap/gimp-2.8.18-x86_64-2.txz: Rebuilt.
xap/vim-gvim-7.4.2342-x86_64-1.txz: Upgraded.
extra/brltty/brltty-5.4-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32-bit
Code: Select all
Thu Sep 8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.20-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.20-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kmod-23-i586-2.txz: Rebuilt.
a/util-linux-2.28.2-i586-1.txz: Upgraded.
ap/hplip-3.16.8-i586-1.txz: Upgraded.
ap/nano-2.7.0-i586-1.txz: Upgraded.
ap/pamixer-1.3.1-i586-2.txz: Rebuilt.
ap/rpm-4.12.0.1-i586-2.txz: Rebuilt.
ap/vim-7.4.2342-i586-1.txz: Upgraded.
d/Cython-0.24.1-i586-1.txz: Upgraded.
d/gdb-7.11.1-i586-2.txz: Rebuilt.
d/kernel-headers-4.4.20_smp-x86-1.txz: Upgraded.
d/mercurial-3.9.1-i586-1.txz: Upgraded.
d/python-2.7.12-i586-1.txz: Upgraded.
Compiled using --enable-unicode=ucs4.
The upstream default for Python Unicode is ucs2, but ucs4 is more widely
used and recommended now. Any Python scripts or binaries that use UCS-2
will need to be recompiled. These can be identified with the following
grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20_smp-noarch-1.txz: Upgraded.
kde/calligra-2.9.11-i586-6.txz: Rebuilt.
kde/kate-4.14.3-i586-3.txz: Rebuilt.
kde/kdev-python-1.7.2-i586-2.txz: Rebuilt.
kde/kig-4.14.3-i586-4.txz: Rebuilt.
kde/kross-interpreters-4.14.3-i586-3.txz: Rebuilt.
kde/pykde4-4.14.3-i586-4.txz: Rebuilt.
kde/superkaramba-4.14.3-i586-3.txz: Rebuilt.
l/PyQt-4.11.4-i586-2.txz: Rebuilt.
l/akonadi-1.13.0-i586-3.txz: Rebuilt.
l/boost-1.61.0-i586-1.txz: Upgraded.
Shared library .so-version bump.
l/dbus-python-1.2.4-i586-2.txz: Rebuilt.
l/gdbm-1.12-i586-2.txz: Rebuilt.
l/glib2-2.46.2-i586-4.txz: Rebuilt.
l/gobject-introspection-1.46.0-i586-2.txz: Rebuilt.
l/libxml2-2.9.4-i586-3.txz: Rebuilt.
l/pilot-link-0.12.5-i586-11.txz: Rebuilt.
l/pycups-1.9.73-i586-2.txz: Rebuilt.
l/pycurl-7.43.0-i586-2.txz: Rebuilt.
l/pygobject-2.28.6-i486-3.txz: Rebuilt.
l/pygobject3-3.18.2-i586-2.txz: Rebuilt.
l/pygtk-2.24.0-i586-3.txz: Rebuilt.
l/python-pillow-3.0.0-i586-2.txz: Rebuilt.
l/sip-4.18.1-i586-1.txz: Upgraded.
n/php-5.6.25-i586-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.25
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
(* Security fix *)
n/samba-4.5.0-i586-1.txz: Upgraded.
xap/blueman-2.0.4-i586-2.txz: Rebuilt.
xap/gimp-2.8.18-i586-2.txz: Rebuilt.
xap/vim-gvim-7.4.2342-i586-1.txz: Upgraded.
extra/brltty/brltty-5.4-i586-1.txz: Upgraded.
extra/linux-4.4.20-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
-
- Posts: 4591
- Joined: 04 Feb 2011, 20:32
- Location: Beograd
-
Contact:
Post
Napisano: 10 Sep 2016, 13:14
Pre instalacije ovog poslednjeg update-a, obratite pažnju na sledeće:
Code: Select all
Compiled using --enable-unicode=ucs4.
The upstream default for Python Unicode is ucs2, but ucs4 is more widely
used and recommended now. Any Python scripts or binaries that use UCS-2
will need to be recompiled. These can be identified with the following
grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
-
- Posts: 1680
- Joined: 07 Jun 2012, 18:01
- Location: Najlipši grad na svitu :)
Post
Napisano: 12 Sep 2016, 10:27
Slackware 64-bit
Code: Select all
Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-x86_64-1.txz: Upgraded.
This update fixes a security issue: Integer overflow in the
gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
attackers to cause a denial of service (crash) via a large image file,
which triggers a large memory allocation.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
(* Security fix *)
n/gnutls-3.4.15-x86_64-1.txz: Upgraded.
libgnutls: Corrected the comparison of the serial size in OCSP response.
Previously the OCSP certificate check wouldn't verify the serial length
and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
Reported by Stefan Buehler.
For more information, see:
https://www.gnutls.org/security.html
(* Security fix *)
Slackware 32-bit
Code: Select all
Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-i586-1.txz: Upgraded.
This update fixes a security issue: Integer overflow in the
gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
attackers to cause a denial of service (crash) via a large image file,
which triggers a large memory allocation.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
(* Security fix *)
n/gnutls-3.4.15-i586-1.txz: Upgraded.
libgnutls: Corrected the comparison of the serial size in OCSP response.
Previously the OCSP certificate check wouldn't verify the serial length
and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
Reported by Stefan Buehler.
For more information, see:
https://www.gnutls.org/security.html
(* Security fix *)
Who is online
Users browsing this forum: No registered users and 85 guests