Code: Select all
Fri Jun 17 22:43:09 UTC 2016
xap/imagemagick-6.9.4_9-x86_64-1.txz: Upgraded.
Code: Select all
Fri Jun 17 22:43:09 UTC 2016
xap/imagemagick-6.9.4_9-i586-1.txz: Upgraded.
Moderator: Urednik
Code: Select all
Fri Jun 17 22:43:09 UTC 2016
xap/imagemagick-6.9.4_9-x86_64-1.txz: Upgraded.
Code: Select all
Fri Jun 17 22:43:09 UTC 2016
xap/imagemagick-6.9.4_9-i586-1.txz: Upgraded.
Code: Select all
Mon Jun 20 21:39:07 UTC 2016
a/aaa_elflibs-14.2-x86_64-21.txz: Rebuilt.
a/mkinitrd-1.4.8-x86_64-8.txz: Rebuilt.
In mkinitrd_command_generator.sh, include a few more modules that might be
needed to unlock a LUKS partition using a USB keyboard.
Thanks to Eric Hameleers.
l/cairo-1.14.6-x86_64-2.txz: Rebuilt.
Patched an issue that was causing GTK3 applets to crash.
See: https://github.com/mate-desktop/mate-panel/issues/369
Thanks to Willy Sudiarto Raharjo.
l/libarchive-3.2.1-x86_64-1.txz: Upgraded.
This release fixes several critical bugs, including some with security
implications.
(* Security fix *)
l/pcre-8.39-x86_64-1.txz: Upgraded.
This release fixes bugs (including a couple of DoS security issues), and
retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
(* Security fix *)
Code: Select all
a/aaa_elflibs-14.2-i586-21.txz: Rebuilt.
a/mkinitrd-1.4.8-i586-8.txz: Rebuilt.
In mkinitrd_command_generator.sh, include a few more modules that might be
needed to unlock a LUKS partition using a USB keyboard.
Thanks to Eric Hameleers.
l/cairo-1.14.6-i586-2.txz: Rebuilt.
Patched an issue that was causing GTK3 applets to crash.
See: https://github.com/mate-desktop/mate-panel/issues/369
Thanks to Willy Sudiarto Raharjo.
l/libarchive-3.2.1-i586-1.txz: Upgraded.
This release fixes several critical bugs, including some with security
implications.
(* Security fix *)
l/pcre-8.39-i586-1.txz: Upgraded.
This release fixes bugs (including a couple of DoS security issues), and
retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
(* Security fix *)
Code: Select all
Tue Jun 21 17:50:21 UTC 2016
a/aaa_elflibs-14.2-x86_64-22.txz: Rebuilt.
l/gmp-6.1.1-x86_64-1.txz: Upgraded.
testing/packages/screen-4.4.0-x86_64-1.txz: Added.
a/bash-4.3.046-x86_64-1.txz: Upgraded.
Code: Select all
Tue Jun 21 17:50:21 UTC 2016
a/aaa_elflibs-14.2-i586-22.txz: Rebuilt.
l/gmp-6.1.1-i586-1.txz: Upgraded.
testing/packages/screen-4.4.0-i586-1.txz: Added.
a/bash-4.3.046-i586-1.txz: Upgraded.
Code: Select all
Wed Jun 22 21:56:53 UTC 2016
a/etc-14.2-x86_64-7.txz: Rebuilt.
Added root to the audio group.
a/kernel-firmware-20160622git-noarch-1.txz: Upgraded.
ap/nano-2.6.0-x86_64-1.txz: Upgraded.
d/llvm-3.8.0-x86_64-2.txz: Rebuilt.
Don't remove LLVMHello.so as it is referenced in LLVMExports.cmake breaking
builds that use "find_package(LLVM 3.8 CONFIG)". Thanks to Hunter S.
l/pulseaudio-9.0-x86_64-1.txz: Upgraded.
This release fixes many bugs, including this one that was commonly reported
during the Slackware 14.2 development cycle:
"Automatic routing improvements:
In 8.0, PulseAudio started to automatically switch to another profile when
the device associated with the current profile is unplugged. That seemingly
smart thing had some serious unintended consequences. One typical issue was
that when unplugging headphones, PulseAudio might switch to S/PDIF output
and not switch back to headphones when they are plugged in again. Another
issue was that HDMI in many cases appears to get temporarily unplugged when
the monitor goes to sleep mode, or even when switching the refresh rate of
the monitor -- PulseAudio 8.0 would move audio away from the HDMI monitor in
these cases and not move the audio back to HDMI when the monitor becomes
available again. These issues are now fixed."
l/sip-4.18-x86_64-1.txz: Upgraded.
xfce/xfce4-pulseaudio-plugin-0.2.4-x86_64-2.txz: Rebuilt.
Applied a patch to make the icon background match the theme (although this
will only work if the theme has a GTK+3 subtheme). Thanks to DarkVision.
Code: Select all
Wed Jun 22 21:56:53 UTC 2016
a/etc-14.2-i586-7.txz: Rebuilt.
Added root to the audio group.
a/kernel-firmware-20160622git-noarch-1.txz: Upgraded.
ap/nano-2.6.0-i586-1.txz: Upgraded.
d/llvm-3.8.0-i586-2.txz: Rebuilt.
Don't remove LLVMHello.so as it is referenced in LLVMExports.cmake breaking
builds that use "find_package(LLVM 3.8 CONFIG)". Thanks to Hunter S.
l/pulseaudio-9.0-i586-1.txz: Upgraded.
This release fixes many bugs, including this one that was commonly reported
during the Slackware 14.2 development cycle:
"Automatic routing improvements:
In 8.0, PulseAudio started to automatically switch to another profile when
the device associated with the current profile is unplugged. That seemingly
smart thing had some serious unintended consequences. One typical issue was
that when unplugging headphones, PulseAudio might switch to S/PDIF output
and not switch back to headphones when they are plugged in again. Another
issue was that HDMI in many cases appears to get temporarily unplugged when
the monitor goes to sleep mode, or even when switching the refresh rate of
the monitor -- PulseAudio 8.0 would move audio away from the HDMI monitor in
these cases and not move the audio back to HDMI when the monitor becomes
available again. These issues are now fixed."
l/sip-4.18-i586-1.txz: Upgraded.
xfce/xfce4-pulseaudio-plugin-0.2.4-i586-2.txz: Rebuilt.
Applied a patch to make the icon background match the theme (although this
will only work if the theme has a GTK+3 subtheme). Thanks to DarkVision.
Code: Select all
Thu Jun 23 08:04:53 UTC 2016
kde/kde-workspace-4.11.22-x86_64-4.txz: Rebuilt.
Fixed a bug with generating the initial panel where two Konqueror launchers
would be created. Instead, there will be one launcher each for Dolphin,
Konqueror, Firefox, and Konsole. Thanks to Eric Hameleers.
ap/cups-filters-1.9.0-x86_64-2.txz: Rebuilt.
Recompiled against poppler-0.45.0.
kde/calligra-2.9.11-x86_64-5.txz: Rebuilt.
Recompiled against poppler-0.45.0.
l/poppler-0.45.0-x86_64-1.txz: Upgraded.
xfce/tumbler-0.1.31-x86_64-8.txz: Rebuilt.
Recompiled against poppler-0.45.0.
Code: Select all
Thu Jun 23 08:04:53 UTC 2016
kde/kde-workspace-4.11.22-i586-4.txz: Rebuilt.
Fixed a bug with generating the initial panel where two Konqueror launchers
would be created. Instead, there will be one launcher each for Dolphin,
Konqueror, Firefox, and Konsole. Thanks to Eric Hameleers.
ap/cups-filters-1.9.0-i586-2.txz: Rebuilt.
Recompiled against poppler-0.45.0.
kde/calligra-2.9.11-i586-5.txz: Rebuilt.
Recompiled against poppler-0.45.0.
l/poppler-0.45.0-i586-1.txz: Upgraded.
xfce/tumbler-0.1.31-i586-8.txz: Rebuilt.
Recompiled against poppler-0.45.0.
Code: Select all
Sorry about the delay, but we had to wait for this kernel. At least we were
able to get some other good fixes in this week while we were waiting. :-)
a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt.
a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded.
ap/mariadb-10.0.26-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.14-x86-1.txz: Upgraded.
k/kernel-source-4.4.14-noarch-1.txz: Upgraded.
This kernel release fixes two security issues:
Corrupted offset allows for arbitrary decrements in compat
IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory
corruption, leading to elevation of privileges or kernel code execution.
This occurs in a compat_setsockopt() call that is normally restricted to
root, however, Linux 3/4 kernels that support user and network namespaces
can allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
Risk: Medium. Impact: Out of bounds heap memory access, leading to a
Denial of Service (or possibly heap disclosure or further impact).
This occurs in a setsockopt() call that is normally restricted to root,
however, Linux 3/4 kernels that support user and network namespaces can
allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
For more information, see:
http://www.openwall.com/lists/oss-security/2016/06/24/5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
(* Security fix *)
l/libpng-1.6.23-x86_64-1.txz: Upgraded.
l/librsvg-2.40.16-x86_64-1.txz: Upgraded.
n/php-5.6.23-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Code: Select all
Sorry about the delay, but we had to wait for this kernel. At least we were
able to get some other good fixes in this week while we were waiting. :-)
a/aaa_elflibs-14.2-i586-23.txz: Rebuilt.
a/kernel-generic-4.4.14-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.14_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.14-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.14_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.14-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.14_smp-i686-1.txz: Upgraded.
ap/mariadb-10.0.26-i586-1.txz: Upgraded.
d/kernel-headers-4.4.14_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.14_smp-noarch-1.txz: Upgraded.
This kernel release fixes two security issues:
Corrupted offset allows for arbitrary decrements in compat
IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory
corruption, leading to elevation of privileges or kernel code execution.
This occurs in a compat_setsockopt() call that is normally restricted to
root, however, Linux 3/4 kernels that support user and network namespaces
can allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
Risk: Medium. Impact: Out of bounds heap memory access, leading to a
Denial of Service (or possibly heap disclosure or further impact).
This occurs in a setsockopt() call that is normally restricted to root,
however, Linux 3/4 kernels that support user and network namespaces can
allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
For more information, see:
http://www.openwall.com/lists/oss-security/2016/06/24/5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
(* Security fix *)
l/libpng-1.6.23-i586-1.txz: Upgraded.
l/librsvg-2.40.16-i586-1.txz: Upgraded.
n/php-5.6.23-i586-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
extra/linux-4.4.14-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Code: Select all
Sun Jun 26 01:28:27 UTC 2016
ap/screen-4.4.0-x86_64-1.txz: Upgraded.
xfce/xfce4-pulseaudio-plugin-0.2.4-x86_64-3.txz: Rebuilt.
Reverted the icon background color patch, which was causing artifacts around
the icon or other issues such as the icon being too wide. These seemed
worse than the background color issue, which at least doesn't affect the
default Xfce theme. The patch remains in the source directory, commented
out in case anyone wants to try it. Also, an alternate patch from
Jean-Philippe Guillemin has been added to the source directory (commented
out).
Code: Select all
Sun Jun 26 01:28:27 UTC 2016
ap/screen-4.4.0-i586-1.txz: Upgraded.
xfce/xfce4-pulseaudio-plugin-0.2.4-i586-3.txz: Rebuilt.
Reverted the icon background color patch, which was causing artifacts around
the icon or other issues such as the icon being too wide. These seemed
worse than the background color issue, which at least doesn't affect the
default Xfce theme. The patch remains in the source directory, commented
out in case anyone wants to try it. Also, an alternate patch from
Jean-Philippe Guillemin has been added to the source directory (commented
out).
Code: Select all
Wed Jun 29 00:23:01 UTC 2016
a/sysklogd-1.5.1-x86_64-2.txz: Rebuilt.
Add a new -c option to disable suppression of repeated messages, which helps
log parsing tools such as fail2ban work better.
ap/at-3.1.19-x86_64-2.txz: Rebuilt.
Removed broken at_deny.5 man page symlink.
a/kernel-firmware-20160628git-noarch-1.txz: Upgraded.
Code: Select all
Wed Jun 29 00:23:01 UTC 2016
a/sysklogd-1.5.1-i586-2.txz: Rebuilt.
Add a new -c option to disable suppression of repeated messages, which helps
log parsing tools such as fail2ban work better.
ap/at-3.1.19-i586-2.txz: Rebuilt.
Removed broken at_deny.5 man page symlink.
a/kernel-firmware-20160628git-noarch-1.txz: Upgraded.
Code: Select all
Thu Jun 30 17:25:39 UTC 2016
testing/packages/kernel-module-ecryptfs-4.4.14-x86_64-1.txz: Added.
This package contains a fixed version of the eCryptfs kernel module.
Code: Select all
Thu Jun 30 17:25:39 UTC 2016
testing/packages/kernel-module-ecryptfs-4.4.14-i586-1.txz: Added.
This package contains a fixed version of the eCryptfs kernel module.
testing/packages/kernel-module-ecryptfs-4.4.14_smp-i686-1.txz: Added.
This package contains a fixed version of the eCryptfs kernel module.
Code: Select all
Thu Jun 30 20:26:57 UTC 2016
Slackware 14.2 x86_64 stable is released!
The long development cycle (the Linux community has lately been living in
"interesting times", as they say) is finally behind us, and we're proud to
announce the release of Slackware 14.2. The new release brings many updates
and modern tools, has switched from udev to eudev (no systemd), and adds
well over a hundred new packages to the system. Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.
The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware
project by picking up a copy from store.slackware.com. We're taking
pre-orders now, and offer a discount if you sign up for a subscription.
Have fun! :-)
Users browsing this forum: No registered users and 48 guests