Novosti u *current* -u

Novosti u vezi Slackware Linuxa

Moderator: Urednik

Post Reply

Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 30 Apr 2014, 12:35


29.04.2014.

Slackware 64bit:

Code: Select all

Tue Apr 29 23:35:59 UTC 2014
ap/screen-4.2.1-x86_64-1.txz: Upgraded.
l/qt-4.8.6-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-29.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.5.0-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Slackware 32bit:

Code: Select all

ap/screen-4.2.1-i486-1.txz: Upgraded.
l/qt-4.8.6-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.5.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 09 May 2014, 19:32


09.05.2014.

Zanimljiv update za current, imamo novi kernel 3.14.3 koji se pojavio pre svega nekoliko dana, zatim tu je svež gcc i još po nešto :)

Slackware 64bit:

Code: Select all

Fri May 9 01:47:42 UTC 2014
a/glibc-solibs-2.19-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.3-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.3-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.3-x86_64-1.txz: Upgraded.
d/binutils-2.24.51.0.3-x86_64-1.txz: Upgraded.
d/gcc-4.8.2-x86_64-2.txz: Rebuilt.
       Include libiberty.a since that's no longer in the binutils package.
d/gcc-g++-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-gfortran-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-gnat-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-go-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-java-4.8.2-x86_64-2.txz: Rebuilt.
d/gcc-objc-4.8.2-x86_64-2.txz: Rebuilt.
d/kernel-headers-3.14.3-x86-1.txz: Upgraded.
d/oprofile-0.9.7-x86_64-5.txz: Rebuilt.
k/kernel-source-3.14.3-noarch-1.txz: Upgraded.
l/glibc-2.19-x86_64-1.txz: Upgraded.
l/glibc-i18n-2.19-x86_64-1.txz: Upgraded.
l/glibc-profile-2.19-x86_64-1.txz: Upgraded.
n/libnftnl-1.0.1-x86_64-1.txz: Added.
n/nftables-0.2-x86_64-1.txz: Added.
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
       Patched to fix an issue with bash-4.3. Thanks to ponce.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:

Code: Select all

a/glibc-solibs-2.19-i486-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.3-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.3-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.3-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.3_smp-i686-1.txz: Upgraded.
d/binutils-2.24.51.0.3-i486-1.txz: Upgraded.
d/gcc-4.8.2-i486-2.txz: Rebuilt.
       Include libiberty.a since that's no longer in the binutils package.
d/gcc-g++-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gfortran-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gnat-4.8.2-i486-2.txz: Rebuilt.
d/gcc-go-4.8.2-i486-2.txz: Rebuilt.
d/gcc-java-4.8.2-i486-2.txz: Rebuilt.
d/gcc-objc-4.8.2-i486-2.txz: Rebuilt.
d/kernel-headers-3.14.3_smp-x86-1.txz: Upgraded.
d/oprofile-0.9.7-i486-5.txz: Rebuilt.
k/kernel-source-3.14.3_smp-noarch-1.txz: Upgraded.
l/glibc-2.19-i486-1.txz: Upgraded.
l/glibc-i18n-2.19-i486-1.txz: Upgraded.
l/glibc-profile-2.19-i486-1.txz: Upgraded.
n/libnftnl-1.0.1-i486-1.txz: Added.
n/nftables-0.2-i486-1.txz: Added.
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
       Patched to fix an issue with bash-4.3. Thanks to ponce.
extra/linux-3.14.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 12 May 2014, 08:27


12.05.2014.

Slackware 64bit:

Code: Select all

Mon May 12 02:24:36 UTC 2014
l/seamonkey-solibs-2.26-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-29.0.1-x86_64-1.txz: Upgraded.
xap/seamonkey-2.26-x86_64-1.tx: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
Slackware 32bit:

Code: Select all

l/seamonkey-solibs-2.26-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0.1-i486-1.txz: Upgraded.
xap/seamonkey-2.26-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 14 May 2014, 00:35


13.05.2014.

Slackware 64bit:

Code: Select all

Tue May 13 20:25:35 UTC 2014
a/kernel-generic-3.14.4-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.4-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.4-x86_64-1.txz: Upgraded.
d/gdb-7.7.1-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.4-x86-1.txz: Upgraded.
k/kernel-source-3.14.4-noarch-1.txz: Upgraded.
       Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
       other kernel debugging options. Besides fixing the nVidia issues, I wonder
       if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-x86_64-3.txz: Rebuilt.
       Symlink headers to /usr/include, since Mesa wants them there.
       Thanks to Robby Workman.
xap/ddd-3.3.12-x86_64-2.txz: Rebuilt.
       Patched to fix the machine code view. Thanks to Christopher Oliver.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:

Code: Select all

a/kernel-generic-3.14.4-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.4-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.4-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.4_smp-i686-1.txz: Upgraded.
d/gdb-7.7.1-i486-1.txz: Upgraded.
d/kernel-headers-3.14.4_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.4_smp-noarch-1.txz: Upgraded.
       Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
       other kernel debugging options. Besides fixing the nVidia issues, I wonder
       if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-i486-3.txz: Rebuilt.
       Symlink headers to /usr/include, since Mesa wants them there.
       Thanks to Robby Workman.
xap/ddd-3.3.12-i486-2.txz: Rebuilt.
       Patched to fix the machine code view. Thanks to Christopher Oliver.
extra/linux-3.14.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 02 Jun 2014, 03:30


01.06.2014.

Slackware 64bit:

Code: Select all

Sun Jun 1 19:48:54 UTC 2014
a/gawk-4.1.1-x86_64-2.txz: Rebuilt.
       Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
       Compressed the man pages in man3.
a/kernel-generic-3.14.5-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.5-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.5-x86_64-1.txz: Upgraded.
ap/mariadb-5.5.37-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
       (* Security fix *)
ap/nano-2.3.3-x86_64-1.txz: Upgraded.
d/gcc-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-g++-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-gnat-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-go-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-java-4.8.3-x86_64-1.txz: Upgraded.
d/gcc-objc-4.8.3-x86_64-1.txz: Upgraded.
d/kernel-headers-3.14.5-x86-1.txz: Upgraded.
d/make-3.82-x86_64-5.txz: Rebuilt.
       Patched to fix a bug with parallel builds.
       Thanks to Danny Schmarsel.
k/kernel-source-3.14.5-noarch-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Slackware 32bit:

Code: Select all

Sun Jun 1 19:48:54 UTC 2014
a/gawk-4.1.1-i486-2.txz: Rebuilt.
       Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
       Compressed the man pages in man3.
a/kernel-generic-3.14.5-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.5-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.5-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.5_smp-i686-1.txz: Upgraded.
ap/mariadb-5.5.37-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
       (* Security fix *)
ap/nano-2.3.3-i486-1.txz: Upgraded.
d/gcc-4.8.3-i486-1.txz: Upgraded.
d/gcc-g++-4.8.3-i486-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-i486-1.txz: Upgraded.
d/gcc-gnat-4.8.3-i486-1.txz: Upgraded.
d/gcc-go-4.8.3-i486-1.txz: Upgraded.
d/gcc-java-4.8.3-i486-1.txz: Upgraded.
d/gcc-objc-4.8.3-i486-1.txz: Upgraded.
d/kernel-headers-3.14.5_smp-x86-1.txz: Upgraded.
d/make-3.82-i486-5.txz: Rebuilt.
       Patched to fix a bug with parallel builds.
       Thanks to Danny Schmarsel.
k/kernel-source-3.14.5_smp-noarch-1.txz: Upgraded.
extra/linux-3.14.5-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 06 Jun 2014, 11:59


06.06.2014.

Slackware 64bit:

Code: Select all

Fri Jun 6 04:27:01 UTC 2014
a/openssl-solibs-1.0.1h-x86_64-1.txz: Upgraded.
       (* Security fix *)
ap/nano-2.3.4-x86_64-1.txz: Upgraded.
l/libtasn1-3.6-x86_64-1.txz: Upgraded.
       Multiple security issues have been corrected in the libtasn1 library.
       These errors allow a remote attacker to cause a denial of service, or
       possibly to execute arbitrary code.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/gnutls-3.2.15-x86_64-1.txz: Upgraded.
       A security issue has been corrected in gnutls. This vulnerability
       affects the client side of the gnutls library. A server that sends
       a specially crafted ServerHello could corrupt the memory of a requesting
       client. This may allow a remote attacker to execute arbitrary code.
       Additional vulnerabilities in the embedded libtasn1 library have also
       been patched.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/irssi-0.8.16-x86_64-1.txz: Upgraded.
n/openssl-1.0.1h-x86_64-1.txz: Upgraded.
       Multiple security issues have been corrected, including a possible
       man-in-the-middle attack where weak keying material is forced, denial
       of service, and the execution of arbitrary code.
       For more information, see:
       http://www.openssl.org/news/secadv_20140605.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
       (* Security fix *)
n/sendmail-8.14.9-x86_64-1.txz: Upgraded.
       This release fixes one security related bug by properly closing file
       descriptors (except stdin, stdout, and stderr) before executing programs.
       This bug could enable local users to interfere with an open SMTP
       connection if they can execute their own program for mail delivery
       (e.g., via procmail or the prog mailer).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
       (* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
Slackware 32bit:

Code: Select all

a/openssl-solibs-1.0.1h-i486-1.txz: Upgraded.
ap/nano-2.3.4-i486-1.txz: Upgraded.
l/libtasn1-3.6-i486-1.txz: Upgraded.
       Multiple security issues have been corrected in the libtasn1 library.
       These errors allow a remote attacker to cause a denial of service, or
       possibly to execute arbitrary code.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/gnutls-3.2.15-i486-1.txz: Upgraded.
       A security issue has been corrected in gnutls. This vulnerability
       affects the client side of the gnutls library. A server that sends
       a specially crafted ServerHello could corrupt the memory of a requesting
       client. This may allow a remote attacker to execute arbitrary code.
       Additional vulnerabilities in the embedded libtasn1 library have also
       been patched.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/irssi-0.8.16-i486-1.txz: Upgraded.
n/openssl-1.0.1h-i486-1.txz: Upgraded.
       Multiple security issues have been corrected, including a possible
       man-in-the-middle attack where weak keying material is forced, denial
       of service, and the execution of arbitrary code.
       For more information, see:
       http://www.openssl.org/news/secadv_20140605.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
       (* Security fix *)
n/sendmail-8.14.9-i486-1.txz: Upgraded.
       This release fixes one security related bug by properly closing file
       descriptors (except stdin, stdout, and stderr) before executing programs.
       This bug could enable local users to interfere with an open SMTP
       connection if they can execute their own program for mail delivery
       (e.g., via procmail or the prog mailer).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
       (* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 10 Jun 2014, 03:46


09.06.2014.

Slackware 64bit:

Code: Select all

Mon Jun 9 20:16:02 UTC 2014
n/php-5.4.29-x86_64-1.txz: Upgraded.
       This update fixes bugs and security issues, including a possible denial
       of service, and an issue where insecure default permissions on the FPM
       socket may allow local users to run arbitrary code as the apache user.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
       (* Security fix *)
Slackware 32bit:

Code: Select all

Mon Jun 9 20:16:02 UTC 2014
n/php-5.4.29-i486-1.txz: Upgraded.
       This update fixes bugs and security issues, including a possible denial
       of service, and an issue where insecure default permissions on the FPM
       socket may allow local users to run arbitrary code as the apache user.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 12 Jun 2014, 11:39


12.06.2014.

Slackware 64bit:

Code: Select all

Thu Jun 12 05:11:52 UTC 2014
ap/ddrescue-1.18.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-30.0-x86_64-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.6.0-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Slackware 32bit:

Code: Select all

ap/ddrescue-1.18.1-i486-1.txz: Upgraded.
xap/mozilla-firefox-30.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.6.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 19 Jun 2014, 09:29


17.06.2014.

Slackware 64bit:

Code: Select all

l/ncurses-5.9-x86_64-3.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20140308-patch.sh.
       Thanks to comet.berkeley.
n/yptools-2.14-x86_64-3.txz: Rebuilt.
       Corrected yppasswd patch that was causing password changes to fail.
       Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-x86_64-1.txz: Upgraded.
Slackware 32bit:

Code: Select all

l/ncurses-5.9-i486-3.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20140308-patch.sh.
       Thanks to comet.berkeley.
n/yptools-2.14-i486-3.txz: Rebuilt.
       Corrected yppasswd patch that was causing password changes to fail.
       Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-i486-1.txz: Upgraded.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”



Administrator
Administrator
offline
User avatar

Posts: 3451
Joined: 01 Apr 2012, 13:50
Location: Mlečni put

Post Napisano: 25 Jun 2014, 19:02


24.06.2014.

Slackware 64bit:

Code: Select all

Tue Jun 24 22:35:07 UTC 2014
ap/man-1.6g-x86_64-2.txz: Rebuilt.
       Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.26.1-x86_64-1.txz: Upgraded.
n/bind-9.9.5_P1-x86_64-1.txz: Upgraded.
       This fixes security issues and other bugs. Please note that the first
       CVE only affects Windows, and the second one was claimed to be fixed by
       an earlier version of BIND. But we'll update anyway just in case. :-)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
n/gnupg-1.4.17-x86_64-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/gnupg2-2.0.24-x86_64-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/samba-4.1.9-x86_64-1.txz: Upgraded.
       This update fixes bugs and security issues, including a flaw in Samba's
       internal DNS server which can be exploited to cause a denial of service,
       a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
       configurations that use shadow_copy* for vfs objects to reveal potentially
       private server information, a denial of service on the nmbd NetBIOS name
       services daemon, and a denial of service crash involving overwriting
       memory on an authenticated connection to the smbd file server.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
       (* Security fix *)
xap/seamonkey-2.26.1-x86_64-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
testing/packages/bind-9.10.0_P2-x86_64-1.txz: Added.
Slackware 32bit:

Code: Select all

ap/man-1.6g-i486-2.txz: Rebuilt.
       Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.26.1-i486-1.txz: Upgraded.
n/bind-9.9.5_P1-i486-1.txz: Upgraded.
       This fixes security issues and other bugs. Please note that the first
       CVE only affects Windows, and the second one was claimed to be fixed by
       an earlier version of BIND. But we'll update anyway just in case. :-)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
n/gnupg-1.4.17-i486-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/gnupg2-2.0.24-i486-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/samba-4.1.9-i486-1.txz: Upgraded.
       This update fixes bugs and security issues, including a flaw in Samba's
       internal DNS server which can be exploited to cause a denial of service,
       a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
       configurations that use shadow_copy* for vfs objects to reveal potentially
       private server information, a denial of service on the nmbd NetBIOS name
       services daemon, and a denial of service crash involving overwriting
       memory on an authenticated connection to the smbd file server.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
       (* Security fix *)
xap/seamonkey-2.26.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
testing/packages/bind-9.10.0_P2-i486-1.txz: Added.
Use the source, Luke
SSZ irc kanal
Spread the Word, “CHOOSE SLACK! and Don’t look back.”


Post Reply

Who is online

Users browsing this forum: No registered users and 38 guests