rlh   img   mp3   nfo   pro  
./nfo/linux/slackware/slackwarearm-14.1.changelog.inc
Slackwarearm-14.1 ChangeLog Wed, 24 Jul 2019 01:18:22 +0200
arm.slackware.com
Thu Sep 1 08:07:06 UTC 2016

################################################################################
#         END OF LIFE ("EOL") FOR SLACKWARE ARM v14.1                          #
#                                                                              #
#  Security patches and fixes are no longer provided for Slackware ARM v14.1   #
#                                                                              #
# If you are still running this version, you should upgrade to the latest      #
# stable release (Slackware 14.2).                                             #
# Alternately, you may make arrangements to handle your own security patches.  #
################################################################################

patches/packages/linux-3.10.103/*:  Upgraded.
  A flaw was found in the implementation of the Linux kernels handling of
  networking challenge ack where an attacker is able to determine the shared
  counter.  This may allow an attacker located on different subnet to inject
  or take over a TCP connection between a server and client without having to
  be a traditional Man In the Middle (MITM) style attack.
+--------------------------+
Wed Aug 24 02:03:04 UTC 2016
patches/packages/gnupg-1.4.21-arm-1_slack14.1.txz:  Upgraded.
  Fix critical security bug in the RNG [CVE-2016-6313].  An attacker who
  obtains 580 bytes from the standard RNG can trivially predict the next
  20 bytes of output.  (This is according to the NEWS file included in the
  source.  According to the annoucement linked below, an attacker who obtains
  4640 bits from the RNG can trivially predict the next 160 bits of output.)
  Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
  For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
  (* Security fix *)
patches/packages/libgcrypt-1.5.6-arm-1_slack14.1.txz:  Upgraded.
  Fix critical security bug in the RNG [CVE-2016-6313].  An attacker who
  obtains 580 bytes from the standard RNG can trivially predict the next
  20 bytes of output.  (This is according to the NEWS file included in the
  source.  According to the annoucement linked below, an attacker who obtains
  4640 bits from the RNG can trivially predict the next 160 bits of output.)
  Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
  For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
  (* Security fix *)
patches/packages/stunnel-5.35-arm-2_slack14.1.txz:  Rebuilt.
  Fixed incorrect config file name in generate-stunnel-key.sh.
  Thanks to Ebben Aries.
+--------------------------+
Tue Aug 16 19:05:54 UTC 2016
patches/packages/glibc-zoneinfo-2016f-arm-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
+--------------------------+
Mon Aug  8 19:20:21 UTC 2016
patches/packages/curl-7.50.1-arm-1_slack14.1.txz:  Upgraded.
  This release fixes security issues:
  TLS: switch off SSL session id when client cert is used
  TLS: only reuse connections with the same client cert
  curl_multi_cleanup: clear connection pointer for easy handles
  For more information, see:
    https://curl.haxx.se/docs/adv_20160803A.html
    https://curl.haxx.se/docs/adv_20160803B.html
    https://curl.haxx.se/docs/adv_20160803C.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
  (* Security fix *)
patches/packages/openssh-7.3p1-arm-1_slack14.1.txz:  Upgraded.
  This is primarily a bugfix release, and also addresses security issues.
  sshd(8): Mitigate a potential denial-of-service attack against the system's
  crypt(3) function via sshd(8).
  sshd(8): Mitigate timing differences in password authentication that could
  be used to discern valid from invalid account names when long passwords were
  sent and particular password hashing algorithms are in use on the server.
  ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
  countermeasures.
  ssh(1), sshd(8): Improve operation ordering of MAC verification for
  Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
  before decrypting any ciphertext.
  sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
  For more information, see:
    http://www.openssh.com/txt/release-7.3
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
  (* Security fix *)
patches/packages/stunnel-5.35-arm-1_slack14.1.txz:  Upgraded.
  Fixes security issues:
  Fixed malfunctioning "verify = 4".
  Fixed incorrectly enforced client certificate requests.
  (* Security fix *)
+--------------------------+
Fri Jul 29 07:08:09 UTC 2016
patches/packages/libidn-1.33-arm-1_slack14.1.txz:  Upgraded.
  Fixed out-of-bounds read bugs.  Fixed crashes on invalid UTF-8.
  Thanks to Hanno Böck.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
  (* Security fix *)
+--------------------------+
Sun Jul 24 16:17:18 UTC 2016
patches/packages/device-tree-compiler-1.4.1-arm-1_slack14.1.txz:  Upgraded.
  u-boot v2016 requires this version of dtc.
+--------------------------+
Sat Jul 23 21:21:21 UTC 2016
patches/packages/bind-9.9.9_P2-arm-1_slack14.1.txz:  Upgraded.
  Fixed a security issue:
  getrrsetbyname with a non absolute name could trigger an infinite
    recursion bug in lwresd and named with lwres configured if when
    combined with a search list entry the resulting name is too long.
    (CVE-2016-2775) [RT #42694]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
  (* Security fix *)
patches/packages/gimp-2.8.18-arm-1_slack14.1.txz:  Upgraded.
  This release fixes a security issue:
  Use-after-free vulnerability in the xcf_load_image function in
  app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of
  service (program crash) or possibly execute arbitrary code via a crafted
  XCF file.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994
  (* Security fix *)
patches/packages/php-5.6.24-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.24
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
  (* Security fix *)
+--------------------------+
Sat Jul  9 07:37:07 UTC 2016
patches/packages/samba-4.2.14-arm-1_slack14.1.txz:  Upgraded.
  This release fixes a security issue:
  Client side SMB2/3 required signing can be downgraded.
  It's possible for an attacker to downgrade the required signing for an
  SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
  SMB2_SESSION_FLAG_IS_NULL flags.  This means that the attacker can
  impersonate a server being connected to by Samba, and return malicious
  results.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
  (* Security fix *)
+--------------------------+
Sat Jun 25 16:19:55 UTC 2016
patches/packages/php-5.6.23-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.23
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
  (* Security fix *)
+--------------------------+
Tue Jun 21 18:49:14 UTC 2016
patches/packages/libarchive-3.2.1-arm-1_slack14.1.txz:  Upgraded.
   This release fixes several critical bugs, including some with security
   implications.
   (* Security fix *)
patches/packages/pcre-8.39-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs (including a couple of DoS security issues), and
  retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
  (* Security fix *)
+--------------------------+
Wed Jun 15 16:17:18 UTC 2016
patches/packages/glibc-zoneinfo-2016e-arm-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
patches/packages/pidgin-2.10.12-arm-1_slack14.1.txz:  Upgraded.
  Use the much larger collection of SSL certs in /etc/ssl/certs rather
  than the ones that ship with Pidgin, otherwise certificates issued by
  Let's Encrypt (and others) cannot be verified.  Thanks to Cesare.
patches/packages/wget-1.18-arm-1_slack14.1.txz:  Upgraded.
  This version fixes a security vulnerability present in all old versions
  of wget.  On a server redirect from HTTP to a FTP resource, wget would
  trust the HTTP server and use the name in the redirected URL as the
  destination filename.  This behaviour was changed and now it works
  similarly as a redirect from HTTP to another HTTP resource so the original
  name is used as the destination file.  To keep the previous behaviour the
  user must provide --trust-server-names.
  The vulnerability was discovered by Dawid Golunski and was reported by
  Beyond Security's SecuriTeam.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
  (* Security fix *)
+--------------------------+
Sat Jun  4 14:15:16 UTC 2016
patches/packages/libxml2-2.9.4-arm-2_slack14.1.txz:  Rebuilt.
  Fix attribute decoding during XML schema validation.
  Thanks to Andreas V?gele.
patches/packages/ntp-4.2.8p8-arm-1_slack14.1.txz:  Upgraded.
  This release patches one high and four low severity security issues:
  CVE-2016-4957: Crypto-NAK crash
  CVE-2016-4953: Bad authentication demobilizes ephemeral associations
  CVE-2016-4954: Processing spoofed server packets
  CVE-2016-4955: Autokey association reset
  CVE-2016-4956: Broadcast interleave
  For more information, see:
    http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
  (* Security fix *)
+--------------------------+
Thu Jun  2 07:07:07 UTC 2016
patches/packages/imagemagick-6.8.6_10-arm-3_slack14.1.txz:  Rebuilt.
  Removed popen() support to prevent another shell vulnerability.  This
  issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
  (* Security fix *)
patches/packages/xscreensaver-5.35-arm-1_slack14.1.txz:  Upgraded.
  Here's an upgrade to the latest xscreensaver.
+--------------------------+
Sat May 28 19:20:21 UTC 2016
patches/packages/libxml2-2.9.4-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues:
  Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
  Format string vulnerability (CVE-2016-4448).
  Inappropriate fetch of entities content (CVE-2016-4449).
  For more information, see:
    http://xmlsoft.org/news.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
  (* Security fix *)
patches/packages/libxslt-1.1.29-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and a security issue:
  Fix for type confusion in preprocessing attributes (Daniel Veillard).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
  (* Security fix *)
patches/packages/php-5.6.22-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.22
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
  (* Security fix *)
+--------------------------+
Wed May 25 06:06:03 UTC 2016
patches/packages/libarchive-3.1.2-arm-2_slack14.1.txz:  Rebuilt.
  Patched an issue with Zip archive handling that could allow an attacker
  to overwrite parts of the heap in a controlled fashion and execute
  arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541
  (* Security fix *)
+--------------------------+
Sat May 21 13:13:13 UTC 2016
patches/packages/curl-7.49.0-arm-1_slack14.1.txz:  Upgraded.
  Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
  For more information, see:
    https://curl.haxx.se/docs/adv_20160518.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
  (* Security fix *)
+--------------------------+
Wed May 11 00:01:02 UTC 2016
patches/packages/git-2.8.2-arm-1_slack14.1.txz:  Upgraded.
  This is a bugfix package update to change color "lime" to "00FF00" in
  gitk.  Otherwise it might not start if "lime" is not defined.
  Thanks to AlvaroG.
patches/packages/imagemagick-6.8.6_10-arm-2_slack14.1.txz:  Rebuilt.
  This update addresses several security issues in ImageMagick, including:
  Insufficient shell characters filtering allows code execution (CVE-2016-3714)
  Server Side Request Forgery (CVE-2016-3718)
  File deletion (CVE-2016-3715)
  File moving (CVE-2016-3716)
  Local file read (CVE-2016-3717)
  To mitigate these issues, the default policy.xml config file has been
  modified to disable all of the vulnerable coders.
  For more information, see:
    https://imagetragick.com
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
  (* Security fix *)
+--------------------------+
Wed May  4 07:07:70 UTC 2016
patches/packages/openssl-1.0.1t-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
  Memory corruption in the ASN.1 encoder (CVE-2016-2108)
  Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
  EVP_EncodeUpdate overflow (CVE-2016-2105)
  EVP_EncryptUpdate overflow (CVE-2016-2106)
  ASN.1 BIO excessive memory allocation (CVE-2016-2109)
  EBCDIC overread (CVE-2016-2176)
  For more information, see:
    https://www.openssl.org/news/secadv/20160503.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1t-arm-1_slack14.1.txz:  Upgraded.
+--------------------------+
Tue May  3 01:01:01 UTC 2016
patches/packages/mercurial-3.8.1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes possible arbitrary code execution when converting Git
  repos.  Mercurial prior to 3.8 allowed arbitrary code execution when using
  the convert extension on Git repos with hostile names.  This could affect
  automated code conversion services that allow arbitrary repository names.
  This is a further side-effect of Git CVE-2015-7545.
  Reported and fixed by Blake Burkhart.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105
  (* Security fix *)
patches/packages/samba-4.2.12-arm-1_slack14.1.txz:  Upgraded.
  This is a bugfix release.
+--------------------------+
Mon May  2 02:03:02 UTC 2016
patches/packages/ntp-4.2.8p7-arm-1_slack14.1.txz:  Upgraded.
  This release patches several low and medium severity security issues:
  CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering
  CVE-2016-1549: Sybil vulnerability: ephemeral association attack,
    AKA: ntp-sybil - MITIGATION ONLY
  CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion
    botch
  CVE-2016-2517: Remote configuration trustedkey/requestkey values are not
    properly validated
  CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with
    MATCH_ASSOC
  CVE-2016-2519: ctl_getitem() return value not always checked
  CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos
  CVE-2016-1548: Interleave-pivot - MITIGATION ONLY
  CVE-2015-7704: KoD fix: peer associations were broken by the fix for
    NtpBug2901, AKA: Symmetric active/passive mode is broken
  CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks
  CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,
    authdecrypt-timing, AKA: authdecrypt-timing
  For more information, see:
    http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519
  (* Security fix *)
patches/packages/php-5.6.21-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.21
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
  (* Security fix *)
patches/packages/subversion-1.7.22-arm-2_slack14.1.txz:  Rebuilt.
  This update patches two security issues:
  CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm.
  CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn
    during COPY/MOVE authorization check.
  For more information, see:
    http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
    http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
  (* Security fix *)
+--------------------------+
Tue Apr 26 08:08:08 UTC 2016
patches/packages/ca-certificates-20160104-arm-1_slack14.1.txz:  Upgraded.
  This update provides the latest CA certificates to check for the
  authenticity of SSL connections.
+--------------------------+
Wed Apr 20 07:08:07 UTC 2016
patches/packages/glibc-zoneinfo-2016d-arm-1.txz:  Upgraded.
  This package provides the latest timezone updates.
patches/packages/samba-4.2.11-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the security issues known as "badlock" (or "sadlock"),
  which may allow man-in-the-middle or denial-of-service attacks:
    CVE-2015-5370 (Multiple errors in DCE-RPC code)
    CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)
    CVE-2016-2111 (NETLOGON Spoofing Vulnerability)
    CVE-2016-2112 (LDAP client and server don't enforce integrity)
    CVE-2016-2113 (Missing TLS certificate validation)
    CVE-2016-2114 ("server signing = mandatory" not enforced)
    CVE-2016-2115 (SMB IPC traffic is not integrity protected)
    CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
  (* Security fix *)
+--------------------------+
Thu Apr  7 07:07:07 UTC 2016
patches/packages/subversion-1.7.22-arm-1_slack14.1.txz:  Upgraded.
  Subversion servers and clients are vulnerable to a remotely triggerable
  heap-based buffer overflow and out-of-bounds read that may allow remote
  attackers to cause a denial of service or possibly execute arbitrary code
  under the context of the targeted process.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343
  (* Security fix *)
+--------------------------+
Sat Apr  2 16:17:18 UTC 2016
patches/packages/dhcp-4.3.4-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and (previously patched) security issues.
patches/packages/mercurial-3.7.3-arm-1_slack14.1.txz:  Upgraded.
  This update fixes security issues and bugs, including remote code execution
  in binary delta decoding, arbitrary code execution with Git subrepos, and
  arbitrary code execution when converting Git repos.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069
  (* Security fix *)
patches/packages/php-5.6.20-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.20
  (* Security fix *)
+--------------------------+
Sat Mar 26 12:13:14 UTC 2016
patches/packages/glibc-zoneinfo-2016c-arm-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
patches/packages/libevent-2.0.22-arm-1_slack14.1.txz:  Upgraded.
  Multiple integer overflows in the evbuffer API allow context-dependent
  attackers to cause a denial of service or possibly have other unspecified
  impact via "insanely large inputs" to the (1) evbuffer_add,
  (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a
  heap-based buffer overflow or an infinite loop.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272
  (* Security fix *)
+--------------------------+
Sun Mar 20 23:22:23 UTC 2016
patches/packages/git-2.7.4-arm-1_slack14.1.txz:  Upgraded.
  NOTE:  Issuing this patch again since the bug reporter listed the
  wrong git version (2.7.1) as fixed.  The vulnerability was actually
  patched in git-2.7.4.
  Fixed buffer overflows allowing server and client side remote code
  execution in all git versions before 2.7.4.
  For more information, see:
    http://seclists.org/oss-sec/2016/q1/645
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
  (* Security fix *)
+--------------------------+
Thu Mar 17 00:00:00 UTC 2016
patches/packages/git-2.7.3-arm-1_slack14.1.txz:  Upgraded.
  Fixed buffer overflows allowing server and client side remote code
  execution in all git versions before 2.7.1.
  For more information, see:
    http://seclists.org/oss-sec/2016/q1/645
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
  (* Security fix *)
patches/packages/glibc-zoneinfo-2016b-arm-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
+--------------------------+
Fri Mar 11 03:04:05 UTC 2016
patches/packages/bind-9.9.8_P4-arm-1_slack14.1.txz:  Upgraded.
  Fixed security issues:
  Fix resolver assertion failure due to improper DNAME handling when
    parsing fetch reply messages.  (CVE-2016-1286) [RT #41753]
  Malformed control messages can trigger assertions in named and rndc.
    (CVE-2016-1285) [RT #41666]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285
  (* Security fix *)
patches/packages/mozilla-nss-3.23-arm-1_slack14.1.txz:  Upgraded.
  Upgraded to nss-3.23 and nspr-4.12.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/nss.html
  (* Security fix *)
patches/packages/openssh-7.2p2-arm-1_slack14.1.txz:  Upgraded.
  This release fixes a security bug:
    sshd(8): sanitise X11 authentication credentials to avoid xauth
    command injection when X11Forwarding is enabled.
  For more information, see:
    http://www.openssh.com/txt/x11fwd.adv
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115
  (* Security fix *)
+--------------------------+
Wed Mar  9 19:20:21 UTC 2016
patches/packages/php-5.6.19-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.19
  (* Security fix *)
patches/packages/samba-4.1.23-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs, and two security issues:
  Incorrect ACL get/set allowed on symlink path (CVE-2015-7560).
  Out-of-bounds read in internal DNS server (CVE-2016-0771).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
  (* Security fix *)
+--------------------------+
Sat Mar  5 03:30:03 UTC 2016
patches/packages/mailx-12.5-arm-4_slack14.1.txz:  Rebuilt.
  Drop SSLv2 support (no longer supported by OpenSSL), and fix security issues
  that could allow a local attacker to cause mailx to execute arbitrary
  shell commands through the use of a specially-crafted email address.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844
  (* Security fix *)
patches/packages/openssl-1.0.1s-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
  Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
  Double-free in DSA code (CVE-2016-0705)
  Memory leak in SRP database lookups (CVE-2016-0798)
  BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
  Fix memory issues in BIO_*printf functions (CVE-2016-0799)
  Side channel attack on modular exponentiation (CVE-2016-0702)
  To avoid breaking the ABI, "enable-ssl2" is used, but all the vulnerable or
  weak ciphers have been removed.
  For more information, see:
    https://www.openssl.org/news/secadv/20160301.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1s-arm-1_slack14.1.txz:  Upgraded.
patches/packages/php-5.6.18-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  For more information, see:
    http://php.net/ChangeLog-5.php#5.6.18
  (* Security fix *)
+--------------------------+
Sun Feb 28 19:20:21 UTC 2016
patches/packages/libssh-0.7.3-arm-1_slack14.1.txz:  Upgraded.
  Fixed weak key generation.  Due to a bug in the ephemeral secret key
  generation for the diffie-hellman-group1 and diffie-hellman-group14
  methods, ephemeral secret keys of size 128 bits are generated, instead
  of the recommended sizes of 1024 and 2048 bits, giving a practical
  security of 63 bits.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
  (* Security fix *)
+--------------------------+
Wed Feb 24 19:20:21 UTC 2016
patches/packages/bind-9.9.8_P3-arm-1_slack14.1.txz:  Upgraded.
  This release fixes two possible denial-of-service issues:
    render_ecs errors were mishandled when printing out a OPT record resulting
    in a assertion failure.  (CVE-2015-8705) [RT #41397]
    Specific APL data could trigger a INSIST.  (CVE-2015-8704) [RT #41396]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705
  (* Security fix *)
patches/packages/glibc-2.17-arm-17_slack14.1.txz:  Rebuilt.
  This update provides a patch to fix the stack-based buffer overflow in
  libresolv that could allow specially crafted DNS responses to seize
  control of execution flow in the DNS client (CVE-2015-7547).  However,
  due to a patch applied to Slackware's glibc back in 2009 (don't use the
  gethostbyname4() lookup method as it was causing some cheap routers to
  misbehave), we were not vulnerable to that issue.  Nevertheless it seems
  prudent to patch the overflows anyway even if we're not currently using
  the code in question.  Thanks to mancha for the backported patch.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
  (* Security fix *)
patches/packages/glibc-i18n-2.17-arm-17_slack14.1.txz:  Rebuilt.
patches/packages/glibc-profile-2.17-arm-17_slack14.1.txz:  Rebuilt.
patches/packages/glibc-solibs-2.17-arm-17_slack14.1.txz:  Rebuilt.
patches/packages/libgcrypt-1.5.5-arm-1_slack14.1.txz:  Upgraded.
  Mitigate chosen cipher text attacks on ECDH with Weierstrass curves.
  Use ciphertext blinding for Elgamal decryption.
  For more information, see:
    http://www.cs.tau.ac.IL/~tromer/ecdh/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
  (* Security fix *)
patches/packages/ntp-4.2.8p6-arm-1_slack14.1.txz:  Upgraded.
  In addition to bug fixes and enhancements, this release fixes
  several low and medium severity vulnerabilities.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
  (* Security fix *)
+--------------------------+
Tue Feb  9 05:04:03 UTC 2016
patches/packages/curl-7.47.1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue where NTLM credentials are not checked
  for proxy connection reuse.  The effects of this flaw is that the application
  could be reusing a proxy connection using the previously used credentials
  and thus it could be given to or prevented access from resources that it
  wasn't intended to.  Thanks to Isaac Boukris.
  For more information, see:
    https://curl.haxx.se/docs/adv_20160127A.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
  (* Security fix *)
patches/packages/flac-1.3.1-arm-1_slack14.1.txz:  Upgraded.
  This update is needed by the latest version of libsndfile.
patches/packages/libsndfile-1.0.26-arm-1_slack14.1.txz:  Upgraded.
  This release fixes security issues which may allow attackers to cause
  a denial of service, or possibly execute arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805
  (* Security fix *)
+--------------------------+
Sun Feb  7 23:23:32 UTC 2016
patches/packages/MPlayer-20160125-arm-1_slack14.1.txz:  Upgraded.
  This is the latest MPlayer-1.2 branch, identical to the 1.2.1 stable release.
  The bundled ffmpeg has been upgraded to 2.8.5, which fixes two security
  issues by which a remote attacker may conduct a cross-origin attack and read
  arbitrary files on the system.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898
  (* Security fix *)
patches/packages/glibc-zoneinfo-2016a-arm-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
patches/packages/openssl-1.0.1r-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issue:
  SSLv2 doesn't block disabled ciphers (CVE-2015-3197).
  For more information, see:
    https://openssl.org/news/secadv/20160128.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1r-arm-1_slack14.1.txz:  Upgraded.
patches/packages/php-5.6.17-arm-1_slack14.1.txz:  Upgraded.
  This release fixes bugs and security issues.
  *****************************************************************
  * IMPORTANT:  READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
  *****************************************************************
  PHP 5.4.x has been declared EOL (end of life) and is no longer receiving
  upstream support.  PHP 5.5.x is also no longer on active support status and
  security fixes will continue only until 5 months from now.  For this reason
  we have provided PHP 5.6 packages as security updates.  Be aware that PHP
  5.6 is not 100% compatible with PHP 5.4, and some changes may be required
  to existing web pages written for PHP 5.4.
  For information on how to migrate from PHP 5.4, please see:
    http://php.net/manual/en/migration55.php
    http://php.net/manual/en/migration56.php
  The final PHP 5.4 packages may be found in /pasture in case there is a need
  to revert this update.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
  (* Security fix *)
pasture/php-5.4.45-arm-1_slack14.1.txz:  Added.
  Moved from /patches/packages/
  This is here only if you cannot migrate your PHP applications to PHP-5.6:
  this version is insecure.
+--------------------------+
Fri Jan 15 10:10:10 UTC 2016
patches/packages/dhcp-4.3.3-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a denial-of-service vulnerability.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605
  (* Security fix *)
patches/packages/openssh-7.1p2-arm-1_slack14.1.txz:  Upgraded.
  This update fixes an information leak and a buffer overflow.  In particular,
  the information leak allows a malicious SSH server to steal the client's
  private keys.  Thanks to Qualys for reporting this issue.
  For more information, see:
    https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778
  *****************************************************************
  * IMPORTANT:  READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
  *****************************************************************
  Rather than backport the fix for the information leak (which is the only
  hazardous flaw), we have upgraded to the latest OpenSSH.  As of version
  7.0, OpenSSH has deprecated some older (and presumably less secure)
  algorithms, and also (by default) only allows root login by public-key,
  hostbased and GSSAPI authentication.  Make sure that your keys and
  authentication method will allow you to continue accessing your system
  after the upgrade.
  The release notes for OpenSSH 7.0 list the following incompatible changes
  to be aware of:
  * Support for the legacy SSH version 1 protocol is disabled by
    default at compile time.
  * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
    is disabled by default at run-time. It may be re-enabled using
    the instructions at http://www.openssh.com/legacy.html
  * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
    by default at run-time. These may be re-enabled using the
    instructions at http://www.openssh.com/legacy.html
  * Support for the legacy v00 cert format has been removed.
  * The default for the sshd_config(5) PermitRootLogin option has
    changed from "yes" to "prohibit-password".
  * PermitRootLogin=without-password/prohibit-password now bans all
    interactive authentication methods, allowing only public-key,
    hostbased and GSSAPI authentication (previously it permitted
    keyboard-interactive and password-less authentication if those
    were enabled).
  (* Security fix *)
patches/packages/xscreensaver-5.34-arm-1_slack14.1.txz:  Upgraded.
  Patrick promised jwz that he'd keep this updated in -stable when he removed
  (against his wishes) the nag screen that complains if a year has passed since
  that version was released.  So, here's the latest one.
+--------------------------+
Thu Dec 24 01:02:03 UTC 2015
patches/packages/blueman-r708-arm-4_slack14.1.txz:  Rebuilt.
  This update fixes a local privilege escalation vulnerability.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612
  (* Security fix *)
+--------------------------+
Sat Dec 19 08:04:02 UTC 2015
patches/packages/libpng-1.4.19-arm-1_slack14.1.txz:  Upgraded.
  Fixed an out-of-range read in png_check_keyword().  Thanks to Qixue Xiao.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
  (* Security fix *)
+--------------------------+
Wed Dec 16 01:03:01 UTC 2015
patches/packages/bind-9.9.8_P2-arm-1_slack14.1.txz:  Upgraded.
  This update fixes three security issues:
  Update allowed OpenSSL versions as named is potentially vulnerable
  to CVE-2015-3193.
  Insufficient testing when parsing a message allowed records with an
  incorrect class to be be accepted, triggering a REQUIRE failure when
  those records were subsequently cached. (CVE-2015-8000)
  Address fetch context reference count handling error on socket error.
  (CVE-2015-8461)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8461
  (* Security fix *)
patches/packages/libpng-1.4.18-arm-1_slack14.1.txz:  Upgraded.
  Fixed incorrect implementation of png_set_PLTE() that uses png_ptr
  not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126
  vulnerability.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472
  (* Security fix *)
patches/packages/openssl-1.0.1q-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
  BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193).
  Certificate verify crash with missing PSS parameter (CVE-2015-3194).
  X509_ATTRIBUTE memory leak (CVE-2015-3195).
  Race condition handling PSK identify hint (CVE-2015-3196).
  Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794).
  For more information, see:
    https://openssl.org/news/secadv_20151203.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1q-arm-1_slack14.1.txz:  Upgraded.
+--------------------------+
Fri Dec  4 14:14:14 UTC 2015
patches/packages/libpng-1.4.17-arm-1_slack14.1.txz:  Upgraded.
  Fixed buffer overflows in the png_set_PLTE(), png_get_PLTE(),
  png_set_tIME(), and png_convert_to_rfc1123() functions that allow
  attackers to cause a denial of service (application crash) or
  possibly have unspecified other impact via a small bit-depth value
  in an IHDR (aka image header) chunk in a PNG image.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126.
  (* Security fix *)
+--------------------------+
Thu Nov 26 01:01:01 UTC 2015
patches/packages/pcre-8.38-arm-1_slack14.1.txz:  Upgraded.
  Fixed overflows that could lead to a denial of service or the execution
  of arbitrary code.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210
  (* Security fix *)
+--------------------------+
Fri Nov  6 22:33:44 UTC 2015
patches/packages/kernel-modules-armv7-3.10.92_armv7-arm-1_slack14.1.txz:  Upgraded.
patches/packages/kernel-modules-kirkwood-3.10.92_kirkwood-arm-1_slack14.1.txz:  Upgraded.
patches/packages/kernel-modules-versatile-3.10.92_versatile-arm-1_slack14.1.txz:  Upgraded.
patches/packages/kernel_armv7-3.10.92-arm-1_slack14.1.txz:  Upgraded.
patches/packages/kernel_kirkwood-3.10.92-arm-1_slack14.1.txz:  Upgraded.
patches/packages/kernel_versatile-3.10.92-arm-1_slack14.1.txz:  Upgraded.
patches/packages/mozilla-nss-3.20.1-arm-1_slack14.1.txz:  Upgraded.
  Upgraded to nss-3.20.1 and nspr-4.10.10.
  This release contains security fixes and improvements.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
  (* Security fix *)
+--------------------------+
Fri Oct 30 01:01:01 UTC 2015
patches/packages/curl-7.45.0-arm-1_slack14.1.txz:  Upgraded.
  Fixes some security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
  (* Security fix *)
patches/packages/jasper-1.900.1-arm-5_slack14.1.txz:  Rebuilt.
  Applied many security and bug fixes.
  Thanks to Heinz Wiesinger.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029
  (* Security fix *)
patches/packages/ntp-4.2.8p4-arm-1_slack14.1.txz:  Upgraded.
  In addition to bug fixes and enhancements, this release fixes
  several low and medium severity vulnerabilities.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
  (* Security fix *)
+--------------------------+
Tue Oct  6 17:18:19 UTC 2015
patches/packages/glibc-zoneinfo-2015g-noarch-1_slack14.1.txz:  Upgraded.
  This package provides the latest timezone updates.
+--------------------------+
Sat Oct  3 23:24:25 UTC 2015
patches/packages/php-5.4.45-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838
  (* Security fix *)
+--------------------------+
Mon Sep 21 03:02:01 UTC 2015
patches/packages/rp-pppoe-3.11-arm-2_slack14.1.txz:  Rebuilt.
  Rebuilt to add the missing /etc/ppp/plugins/rp-pppoe.so plugin library.
  Thanks to halinux on LQ for the bug report.
+--------------------------+
Tue Sep 15 11:11:11 UTC 2015
patches/packages/ca-certificates-20150426-noarch-2_slack14.1.txz:  Rebuilt.
  Patched update-ca-certificates to remove incompatible command operators
  used to call 'run-parts'.  Thanks to Stuart Winter.
+--------------------------+
Thu Sep  3 08:06:04 UTC 2015
patches/packages/bind-9.9.7_P3-arm-1_slack14.1.txz:  Upgraded.
  This update fixes two denial-of-service vulnerabilities:
  + CVE-2015-5722 is a denial-of-service vector which can be
  exploited remotely against a BIND server that is performing
  validation on DNSSEC-signed records.  Validating recursive
  resolvers are at the greatest risk from this defect, but it has not
  been ruled out that it could be exploited against an
  authoritative-only nameserver under limited conditions.  Servers
  that are not performing validation are not vulnerable.  However,
  ISC does not recommend disabling validation as a workaround to
  this issue as it exposes the server to other types of attacks.
  Upgrading to the patched versions is the recommended solution.
  All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722.
  + CVE-2015-5986 is a denial-of-service vector which can be used
  against a BIND server that is performing recursion.  Validation
  is not required.  Recursive resolvers are at the greatest risk
  from this defect, but it has not been ruled out that it could
  be exploited against an authoritative-only nameserver under
  limited conditions.
  Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to
  CVE-2015-5986.
  For more information, see:
    https://kb.isc.org/article/AA-01287/0
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
    https://kb.isc.org/article/AA-01291/0
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
  (* Security fix *)
patches/packages/gdk-pixbuf2-2.28.2-arm-2_slack14.1.txz:  Rebuilt.
  Gustavo Grieco discovered a heap overflow in the processing of BMP images
  which may result in the execution of arbitrary code if a malformed image
  is opened.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
  (* Security fix *)
+--------------------------+
Tue Sep  1 17:18:19 UTC 2015
patches/packages/slackpkg-2.82.0-noarch-16_slack14.1.txz:  Rebuilt.
  Removed superflous file left over from the build process.
+--------------------------+
Sat Aug 22 08:07:06 UTC 2015
patches/packages/gnutls-3.3.17.1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some bugs and security issues.
  For more information, see:
    http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
    http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
  (* Security fix *)
+--------------------------+
Mon Aug 10 12:23:34 UTC 2015
patches/packages/slackpkg-2.82.0-noarch-15_slack14.1.txz:  Rebuilt.
  Patched to avoid false package name matches when the full name of a
  package is a substring of another package's name, as happened recently
  with atk-2.16.0 and at-spi2-atk-2.16.0.  Thanks to Eric Hameleers.
+--------------------------+
Sat Aug  8 11:22:33 UTC 2015
patches/packages/ca-certificates-20150426-noarch-1_slack14.1.txz:  Upgraded.
  This package updates to the latest CA certificates.
patches/packages/mozilla-nss-3.19.2-arm-1_slack14.1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/nss.html
  (* Security fix *)
+--------------------------+
Fri Jul 31 22:39:46 UTC 2015
patches/packages/bind-9.9.7_P2-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue where an error in the handling of TKEY
  queries can be exploited by an attacker for use as a denial-of-service
  vector, as a constructed packet can use the defect to trigger a REQUIRE
  assertion failure, causing BIND to exit.
  Impact:
  Both recursive and authoritative servers are vulnerable to this defect.
  Additionally, exposure is not prevented by either ACLs or configuration
  options limiting or denying service because the exploitable code occurs
  early in the packet handling, before checks enforcing those boundaries.
  Operators should take steps to upgrade to a patched version as soon as
  possible.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
    https://kb.isc.org/article/AA-01272
  (* Security fix *)
patches/packages/slackpkg-2.82.0-noarch-14_slack14.1.txz:  Rebuilt.
  Patched to abort immediately if the date is not recent (at least July 2015).
  This is usually a problem with Raspberry Pi systems that do not have an RTC,
  and where no NTP client has been configured: resulting in the system's date
  being at UNIX Epoch time (1970).
  With the date so far in the past, GPG fails with a generic verification
  failure message, resulting in confusion as to whether the packages or keys
  have been tampered with.
ap/slackpkg-2.82.0-noarch-14_slack14.1.txz:  Rebuilt.
  Patched to abort immediately if the date is not recent (at least July 2015).
  This is usually a problem with Raspberry Pi systems that do not have an RTC,
  and where no NTP client has been configured: resulting in the system's date
  being at UNIX Epoch time (1970).
  With the date so far in the past, GPG fails with a generic verification
  failure message, resulting in confusion as to whether the packages or keys
  have been tampered with.
  This build also expects the updated Slackware ARM GPG key rather than the old
  ARMedslack key.   Ordinarily after a Slackware release, the original
  'slackware' tree would never be modified; but users are installing Slackware
  ARM 14.1 and attempting to update using slackpkg, but are finding that it fails
  either due to the GPG key mismatch or due to the date being wrong, or both!
  It's worth reiterating that on ARM, you _must_ read the Change log and not
  blindly update packages: failure to do so could render your machine unbootable,
  particularly for the Kernel packages!
+--------------------------+
Sat Jul 18 21:09:05 UTC 2015
patches/packages/httpd-2.4.16-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
  * CVE-2015-0253:  Fix a crash with ErrorDocument 400 pointing to a local
    URL-path with the INCLUDES filter active, introduced in 2.4.11.
  * CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a
    script calls r:wsupgrade() can cause a child process crash.
  * CVE-2015-3183: core: Fix chunk header parsing defect.  Remove
    apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
    filter, parse chunks in a single pass with zero copy.  Limit accepted
    chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
  * CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
    httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
  (* Security fix *)
patches/packages/php-5.4.43-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
  (* Security fix *)
+--------------------------+
Fri Jul 10 06:25:04 UTC 2015
patches/packages/bind-9.9.7_P1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue where an attacker who can cause
  a validating resolver to query a zone containing specifically constructed
  contents can cause that resolver to fail an assertion and terminate due
  to a defect in validation code.  This means that a recursive resolver that
  is performing DNSSEC validation can be deliberately stopped by an attacker
  who can cause the resolver to perform a query against a
  maliciously-constructed zone.  This will result in a denial of service to
  clients who rely on that resolver.
  For more information, see:
    https://kb.isc.org/article/AA-01267/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
  (* Security fix *)
patches/packages/cups-1.5.4-arm-3_slack14.1.txz:  Rebuilt.
  This release fixes a security issue:
  CWE-911: Improper Update of Reference Count - CVE-2015-1158
    This bug could allow an attacker to upload a replacement CUPS
    configuration file and mount further attacks.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
  (* Security fix *)
patches/packages/ntp-4.2.8p3-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue where under specific circumstances an
  attacker can send a crafted packet to cause a vulnerable ntpd instance to
  crash.  Since this requires 1) ntpd set up to allow remote configuration
  (not allowed by default), and 2) knowledge of the configuration password,
  and 3) access to a computer entrusted to perform remote configuration,
  the vulnerability is considered low-risk.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
  (* Security fix *)
patches/packages/openssl-1.0.1p-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issue:
  Alternative chains certificate forgery (CVE-2015-1793).
  During certificate verification, OpenSSL (starting from version 1.0.1n and
  1.0.2b) will attempt to find an alternative certificate chain if the first
  attempt to build such a chain fails.  An error in the implementation of this
  logic can mean that an attacker could cause certain checks on untrusted
  certificates to be bypassed, such as the CA flag, enabling them to use a
  valid leaf certificate to act as a CA and "issue" an invalid certificate.
  This issue will impact any application that verifies certificates including
  SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
  This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
  This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
  Benjamin (Google/BoringSSL).  The fix was developed by the BoringSSL project.
  For more information, see:
    https://openssl.org/news/secadv_20150709.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1p-arm-1_slack14.1.txz:  Upgraded.
+--------------------------+
Sat Jun 13 21:00:00 UTC 2015
patches/packages/openssl-1.0.1o-arm-1_slack14.1.txz:  Upgraded.
  Fixes several bugs and security issues:
   o Malformed ECParameters causes infinite loop (CVE-2015-1788)
   o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
   o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
   o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
   o Race condition handling NewSessionTicket (CVE-2015-1791)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1o-arm-1_slack14.1.txz:  Upgraded.
patches/packages/php-5.4.41-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
  (* Security fix *)
patches/packages/qt-4.8.7-arm-1_slack14.1.txz:  Upgraded.
  This is a bugfix release.
+--------------------------+
Thu May 14 06:05:11 UTC 2015
patches/packages/mariadb-5.5.43-arm-1_slack14.1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
  (* Security fix *)
patches/packages/qt-4.8.6-arm-2_slack14.1.txz:  Rebuilt.
  QNAM: Fix upload corruptions when server closes connection
  This patch fixes several upload corruptions if the server closes the
  connection while/before we send data into it.
  cherry picked from commit:  qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
patches/packages/wpa_supplicant-2.4-arm-1_slack14.1.txz:  Upgraded.
  This update fixes potential denial of service issues.
  For more information, see:
    http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
    http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
    http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
    http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
  (* Security fix *)
+--------------------------+
Wed Apr 29 21:18:18 UTC 2015
patches/packages/gnupg-1.4.19-arm-2_slack14.1.txz:  Rebuilt.
  Patched to fix spurious debug messages that may break sbopkg and slackpkg.
  Thanks to Willy Sudiarto Raharjo.
+--------------------------+
Sat Apr 25 07:48:14 UTC 2015
patches/packages/bind-9.9.6_P2-arm-1_slack14.1.txz:  Upgraded.
  Fix some denial-of-service and other security issues.
  For more information, see:
    https://kb.isc.org/article/AA-01166/
    https://kb.isc.org/article/AA-01161/
    https://kb.isc.org/article/AA-01167/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214
  (* Security fix *)
patches/packages/gnupg-1.4.19-arm-1_slack14.1.txz:  Upgraded.
  * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
    See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  * Fixed data-dependent timing variations in modular exponentiation
    [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
    are Practical].
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
  (* Security fix *)
patches/packages/httpd-2.4.12-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
   * CVE-2014-3583 mod_proxy_fcgi:  Fix a potential crash due to buffer
     over-read, with response headers' size above 8K.
   * CVE-2014-3581 mod_cache:  Avoid a crash when Content-Type has an
     empty value.  PR 56924.
   * CVE-2014-8109 mod_lua:  Fix handling of the Require line when a
     LuaAuthzProvider is used in multiple Require directives with
     different arguments.  PR57204.
   * CVE-2013-5704 core:  HTTP trailers could be used to replace HTTP
     headers late during request processing, potentially undoing or
     otherwise confusing modules that examined or modified request
     headers earlier.  Adds "MergeTrailers" directive to restore legacy
     behavior.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
  (* Security fix *)
patches/packages/libssh-0.6.4-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
  (* Security fix *)
patches/packages/mutt-1.5.23-arm-2_slack14.1.txz:  Rebuilt.
  Patched a vulnerability where malformed headers can cause mutt to crash.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
  (* Security fix *)
patches/packages/ntp-4.2.8p2-arm-1_slack14.1.txz:  Upgraded.
  In addition to bug fixes and enhancements, this release fixes the
  following medium-severity vulnerabilities involving private key
  authentication:
  * ntpd accepts unauthenticated packets with symmetric key crypto.
  * Authentication doesn't protect symmetric associations against DoS attacks.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
  (* Security fix *)
patches/packages/openssl-1.0.1m-arm-1_slack14.1.txz:  Upgraded.
  Fixes several bugs and security issues:
   o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
   o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
   o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
   o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
   o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
   o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
   o Removed the export ciphers from the DEFAULT ciphers
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1m-arm-1_slack14.1.txz:  Upgraded.
patches/packages/php-5.4.40-arm-1_slack14.1.txz:  Upgraded.
  This update fixes some security issues.
  Please note that this package build also moves the configuration files
  from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
  (* Security fix *)
patches/packages/ppp-2.4.5-arm-4_slack14.1.txz:  Rebuilt.
  Fixed a potential security issue in parsing option files.
  Fixed remotely triggerable PID overflow that causes pppd to crash.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310
  (* Security fix *)
patches/packages/proftpd-1.3.4e-arm-1_slack14.1.txz:  Upgraded.
  Patched an issue where mod_copy allowed unauthenticated copying
  of files via SITE CPFR/CPTO.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
  (* Security fix *)
patches/packages/qt-4.8.6-arm-1_slack14.1.txz:  Upgraded.
  Fixed issues with BMP, ICO, and GIF handling that could lead to a denial
  of service or the execution of arbitrary code when processing malformed
  images.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860
  (* Security fix *)
+--------------------------+
Sat Apr  4 11:18:55 UTC 2015
patches/packages/glibc-solibs-2.17-arm-16_slack14.1.txz:  Rebuilt.
  This package had been missed from the previous set of glibc updates.  Thanks
  to the3dfxdude on LQ for making me aware of this:-
  This update patches a security issue __nss_hostname_digits_dots() function
  of glibc which may be triggered through the gethostbyname*() set of
  functions.  This flaw could allow local or remote attackers to take control
  of a machine running a vulnerable version of glibc.  Thanks to Qualys for
  discovering this issue (also known as the GHOST vulnerability.)
  For more information, see:
    https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
  (* Security fix *)
+--------------------------+
Fri Mar  6 19:57:14 UTC 2015
patches/packages/samba-4.1.17-arm-1_slack14.1.txz:  Upgraded.
  This package fixes security issues since the last update:
    BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer
    in netlogon server could lead to security vulnerability.
    BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference
    a NULL pointer.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
  (* Security fix *)
+--------------------------+
Wed Feb 18 21:20:11 UTC 2015
patches/packages/btrfs-progs-20150213-arm-1_slack14.1.txz:  Upgraded.
  Added the header files to the package.  Thanks to Vincent Batts.
patches/packages/patch-2.7.4-arm-1_slack14.1.txz:  Upgraded.
  Patch no longer follows symbolic links to input and output files.  This
  ensures that symbolic links created by git-style patches cannot cause
  patch to write outside the working directory.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
  (* Security fix *)
patches/packages/sudo-1.8.12-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a potential security issue by only passing the TZ
  environment variable it is considered safe.  This prevents exploiting bugs
  in glibc's TZ parser that could be used to read files that the user does
  not have access to, or to cause a denial of service.
  For more information, see:
    http://www.sudo.ws/sudo/alerts/tz.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
  (* Security fix *)
+--------------------------+
Thu Feb 12 08:18:35 UTC 2015
patches/packages/gcc-4.8.4-arm-1_slack14.1.txz:  Upgraded.
  In October 2014, the ARM Kernel developers blacklisted GCC versions 4.8.0 
  up to GCC 4.8.2 (inclusive) because those versions were building kernels that
  were corrupting file systems.  See this post for more details:
  http://article.gmane.org/gmane.linux.ports.arm.omap/119412
  You'll need to upgrade to these GCC packages if you want to build
  Linux version 3.18 or higher.
  Thanks to dowelld for the report.
patches/packages/gcc-g++-4.8.4-arm-1_slack14.1.txz:  Upgraded.
patches/packages/gcc-gfortran-4.8.4-arm-1_slack14.1.txz:  Upgraded.
patches/packages/gcc-gnat-4.8.4-arm-1_slack14.1.txz:  Upgraded.
patches/packages/gcc-go-4.8.4-arm-1_slack14.1.txz:  Upgraded.
patches/packages/gcc-java-4.8.4-arm-1_slack14.1.txz:  Upgraded.
patches/packages/gcc-objc-4.8.4-arm-1_slack14.1.txz:  Upgraded.
+--------------------------+
Thu Jan 29 20:32:42 UTC 2015
patches/packages/glibc-2.17-arm-16_slack14.1.txz:  Rebuilt.
  This update patches a security issue __nss_hostname_digits_dots() function
  of glibc which may be triggered through the gethostbyname*() set of
  functions.  This flaw could allow local or remote attackers to take control
  of a machine running a vulnerable version of glibc.  Thanks to Qualys for
  discovering this issue (also known as the GHOST vulnerability.)
  For more information, see:
    https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
  (* Security fix *)
patches/packages/glibc-i18n-2.17-arm-16_slack14.1.txz:  Rebuilt.
patches/packages/glibc-profile-2.17-arm-16_slack14.1.txz:  Rebuilt.
patches/packages/glibc-zoneinfo-2014j-noarch-1.txz:  Upgraded.
  Upgraded to tzcode2014j and tzdata2014j.
+--------------------------+
Mon Jan 26 19:51:04 UTC 2015
patches/packages/samba-4.1.16-arm-1_slack14.1.txz:  Upgraded.
  This update is a security release in order to address CVE-2014-8143
  (Elevation of privilege to Active Directory Domain Controller).
  Samba's AD DC allows the administrator to delegate creation of user or
  computer accounts to specific users or groups.  However, all released
  versions of Samba's AD DC did not implement the additional required
  check on the UF_SERVER_TRUST_ACCOUNT bit in the userAccountControl
  attributes.  Most Samba deployments are not of the AD Domain Controller,
  but are of the classic domain controller, the file server or print server.
  Only the Active Directory Domain Controller is affected by this issue.
  Additionally, most sites running the AD Domain Controller do not configure
  delegation for the creation of user or computer accounts, and so are not
  vulnerable to this issue, as no writes are permitted to the
  userAccountControl attribute, no matter what the value.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
  (* Security fix *)
patches/packages/freetype-2.5.5-arm-1_slack14.1.txz:  Upgraded.
  This release fixes a security bug that could cause freetype to crash
  or run programs upon opening a specially crafted file.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
  (* Security fix *)
+--------------------------+
Mon Jan 12 21:53:16 UTC 2015
patches/packages/openssl-solibs-1.0.1k-arm-1_slack14.1.txz:  Upgraded.
  (* Security fix *)
patches/packages/openssl-1.0.1k-arm-1_slack14.1.txz:  Upgraded.
  This update fixes several security issues:
    DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
    DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
    no-ssl3 configuration sets method to NULL (CVE-2014-3569)
    ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
    RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
    DH client certificates accepted without verification [Server] (CVE-2015-0205)
    Certificate fingerprints can be modified (CVE-2014-8275)
    Bignum squaring may produce incorrect results (CVE-2014-3570)
  For more information, see:
    https://www.openssl.org/news/secadv_20150108.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
  (* Security fix *)
+--------------------------+
Sat Dec 27 09:31:39 UTC 2014
patches/packages/ntp-4.2.8-arm-1_slack14.1.txz:  Upgraded.
  In addition to bug fixes and enhancements, this release fixes
  several high-severity vulnerabilities discovered by Neel Mehta
  and Stephen Roettger of the Google Security Team.
  For more information, see:
    https://www.kb.cert.org/vuls/id/852879
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
  (* Security fix *)
patches/packages/php-5.4.36-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues.
  #68545 (NULL pointer dereference in unserialize.c).
  #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142)
  #68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
  (* Security fix *)
patches/packages/xorg-server-1.14.3-arm-3.txz:  Rebuilt.
  This update fixes many security issues discovered by Ilja van Sprundel,
  a security researcher with IOActive.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.14.3-arm-3.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.14.3-arm-3.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.14.3-arm-3.txz:  Rebuilt.
+--------------------------+
Tue Dec 16 19:08:50 UTC 2014
patches/packages/bind-9.9.6_P1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue where a failure to place limits on
  delegation chaining can allow an attacker to crash BIND or cause memory
  exhaustion.
  For more information, see:
    https://kb.isc.org/article/AA-01216
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
  (* Security fix *)
patches/packages/openssh-6.7p1-arm-2_slack14.1.txz:  Rebuilt.
  Restored support for tcpwrappers that was dropped by upstream.
  Thanks to mancha.
patches/packages/openvpn-2.3.6-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue that allows remote authenticated
  users to cause a denial of service (server crash) via a small control
  channel packet.
  For more information, see:
    https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104
  (* Security fix *)
patches/packages/pidgin-2.10.11-arm-1_slack14.1.txz:  Upgraded.
  This update contains login fixes for MSN and some XMPP servers.
patches/packages/wpa_supplicant-2.3-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a remote command-execution vulnerability caused by a
  failure to adequately sanitize user-supplied input.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686
  (* Security fix *)
+--------------------------+
Fri Nov 14 19:59:14 UTC 2014
patches/packages/mariadb-5.5.40-arm-2_slack14.1.txz:  Rebuilt.
  Reverted change to my_config.h that breaks compiling many applications
  that link against the MariaDB libraries.
  Thanks to Willy Sudiarto Raharjo.
patches/packages/pidgin-2.10.10-arm-2_slack14.1.txz:  Rebuilt.
  Fix Gadu-Gadu protocol when GnuTLS is not used.  Thanks to mancha.
+--------------------------+
Sat Nov  8 16:33:43 UTC 2014
patches/packages/bash-4.2.053-arm-1_slack14.1.txz:  Upgraded.
  Applied all upstream patches.  The previously applied patch requiring
  a specific prefix/suffix in order to parse variables for functions
  closed all of the known vulnerabilities anyway, but it's clear that
  until all the patches were applied that the "is this still vulnerable"
  questions were not going to end...
patches/packages/xfce4-weather-plugin-0.8.4-arm-1_slack14.1.txz:  Upgraded.
  Package upgraded to fix the API used to fetch weather data.
+--------------------------+
Fri Nov  7 21:32:19 UTC 2014
patches/packages/mariadb-5.5.40-arm-1_slack14.1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
  (* Security fix *)
patches/packages/php-5.4.34-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues.
  #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
  #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
  #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
  (* Security fix *)
patches/packages/wget-1.14-arm-3_slack14.1.txz:  Rebuilt.
  This update fixes a symlink vulnerability that could allow an attacker
  to write outside of the expected directory.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
  (* Security fix *)
+--------------------------+
Fri Oct 24 21:43:53 UTC 2014
patches/packages/glibc-2.17-arm-15_slack14.1.txz:  Rebuilt.
  This update fixes several security issues, and adds an extra security
  hardening patch from Florian Weimer.  Thanks to mancha for help with
  tracking and backporting patches.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
  (* Security fix *)
patches/packages/glibc-i18n-2.17-arm-15_slack14.1.txz:  Rebuilt.
patches/packages/glibc-profile-2.17-arm-15_slack14.1.txz:  Rebuilt.
patches/packages/glibc-solibs-2.17-arm-15_slack14.1.txz:  Rebuilt.
patches/packages/glibc-zoneinfo-2014i-noarch-15_slack14.1.txz:  Rebuilt.
  Upgraded to tzcode2014i and tzdata2014i.
patches/packages/pidgin-2.10.10-arm-1_slack14.1.txz:  Upgraded.
  This update fixes several security issues:
  Insufficient SSL certificate validation (CVE-2014-3694)
  Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
  Remote crash parsing malformed Groupwise message (CVE-2014-3696)
  Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
  Potential information leak from XMPP (CVE-2014-3698)
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
  (* Security fix *)
+--------------------------+
Wed Oct 22 08:00:52 UTC 2014
patches/packages/openssh-6.7p1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue that allows remote servers to trigger
  the skipping of SSHFP DNS RR checking by presenting an unacceptable
  HostCertificate.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
  (* Security fix *)
+--------------------------+
Fri Oct 17 11:22:15 UTC 2014
patches/packages/openssl-solibs-1.0.1j-arm-1_slack14.1.txz:  Upgraded.
  (* Security fix *)
patches/packages/openssl-1.0.1j-arm-1_slack14.1.txz:  Upgraded.
  This update fixes several security issues:
  SRTP Memory Leak (CVE-2014-3513):
    A flaw in the DTLS SRTP extension parsing code allows an attacker, who
    sends a carefully crafted handshake message, to cause OpenSSL to fail
    to free up to 64k of memory causing a memory leak. This could be
    exploited in a Denial Of Service attack.
  Session Ticket Memory Leak (CVE-2014-3567):
    When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
    integrity of that ticket is first verified. In the event of a session
    ticket integrity check failing, OpenSSL will fail to free memory
    causing a memory leak. By sending a large number of invalid session
    tickets an attacker could exploit this issue in a Denial Of Service
    attack.
  SSL 3.0 Fallback protection:
    OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
    to block the ability for a MITM attacker to force a protocol
    downgrade.
    Some client applications (such as browsers) will reconnect using a
    downgraded protocol to work around interoperability bugs in older
    servers. This could be exploited by an active man-in-the-middle to
    downgrade connections to SSL 3.0 even if both sides of the connection
    support higher protocols. SSL 3.0 contains a number of weaknesses
    including POODLE (CVE-2014-3566).
  Build option no-ssl3 is incomplete (CVE-2014-3568):
    When OpenSSL is configured with "no-ssl3" as a build option, servers
    could accept and complete a SSL 3.0 handshake, and clients could be
    configured to send them.
  For more information, see:
    https://www.openssl.org/news/secadv_20141015.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
  (* Security fix *)
+--------------------------+
Tue Sep 30 17:13:28 UTC 2014
patches/packages/bash-4.2.050-arm-1_slack14.1.txz:  Upgraded.
  Another bash update.  Here's some information included with the patch:
    "This patch changes the encoding bash uses for exported functions to avoid
    clashes with shell variables and to avoid depending only on an environment
    variable's contents to determine whether or not to interpret it as a shell
    function."
  After this update, an environment variable will not go through the parser
  unless it follows this naming structure:  BASH_FUNC_*%%
  Most scripts never expected to import functions from environment variables,
  so this change (although not backwards compatible) is not likely to break
  many existing scripts.  It will, however, close off access to the parser as
  an attack surface in the vast majority of cases.  There's already another
  vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
  but this hardening patch prevents it (and likely many more similar ones).
  Thanks to Florian Weimer and Chet Ramey.
  (* Security fix *)
+--------------------------+
Sat Sep 27 14:08:36 UTC 2014
patches/packages/bash-4.2.049-arm-1_slack14.1.txz:  Upgraded.
  This is essentially a rebuild as the preliminary patch for CVE-2014-7169
  has been accepted by upstream and is now signed.  This also bumps the
  patchlevel, making it easy to tell this is the fixed version.
  Possibly more changes to come, given the ongoing discussions on oss-sec.
+--------------------------+
Thu Sep 25 21:50:49 UTC 2014
patches/packages/bash-4.2.048-arm-2_slack14.1.txz:  Rebuilt.
  Patched an additional trailing string processing vulnerability discovered
  by Tavis Ormandy.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
  (* Security fix *)
+--------------------------+
Thu Sep 25 17:26:04 UTC 2014
patches/packages/bash-4.2.048-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a vulnerability in bash related to how environment
  variables are processed:  trailing code in function definitions was
  executed, independent of the variable name.  In many common configurations
  (such as the use of CGI scripts), this vulnerability is exploitable over
  the network.  Thanks to Stephane Chazelas for discovering this issue.
  For more information, see:
    http://seclists.org/oss-sec/2014/q3/650
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
  (* Security fix *)
patches/packages/mozilla-nss-3.16.5-arm-1_slack14.1.txz:  Upgraded.
  Fixed an RSA Signature Forgery vulnerability.
  For more information, see:
    https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
  (* Security fix *)
+--------------------------+
Mon Sep  8 10:27:42 UTC 2014
patches/packages/mozilla-nss-3.16.4-arm-1_slack14.1.txz:  Upgraded.
  Upgraded to nss-3.16.4 and nspr-4.10.7.
patches/packages/php-5.4.32-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
  (* Security fix *)
+--------------------------+
Sun Aug 10 08:20:55 UTC 2014
patches/packages/dhcpcd-6.0.5-arm-3_slack14.1.txz:  Rebuilt.
  This update fixes a security issue where a specially crafted packet
  received from a malicious DHCP server causes dhcpcd to enter an infinite
  loop causing a denial of service.
  Thanks to Tobias Stoeckmann for the bug report.
  (* Security fix *)
patches/packages/openssl-1.0.1i-arm-1_slack14.1.txz:  Upgraded.
  This update fixes several security issues:
  Double Free when processing DTLS packets (CVE-2014-3505)
  DTLS memory exhaustion (CVE-2014-3506)
  DTLS memory leak from zero-length fragments (CVE-2014-3507)
  Information leak in pretty printing functions (CVE-2014-3508)
  Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
  OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
  OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
  SRP buffer overrun (CVE-2014-3512)
  Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
  For more information, see:
    https://www.openssl.org/news/secadv_20140806.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1i-arm-1_slack14.1.txz:  Upgraded.
  (* Security fix *)
patches/packages/samba-4.1.11-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a remote code execution attack on unauthenticated nmbd
  NetBIOS name services.  A malicious browser can send packets that may
  overwrite the heap of the target nmbd NetBIOS name services daemon.
  It may be possible to use this to generate a remote code execution
  vulnerability as the superuser (root).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
  (* Security fix *)
patches/packages/xscreensaver-5.29-arm-1_slack14.1.txz:  Upgraded.
  Disabled nag screen that says "This version of XScreenSaver is very old!
  Please upgrade!" when the age of the software exceeds 12 months.
+--------------------------+
Sun Jul 27 17:48:06 UTC 2014
patches/packages/httpd-2.4.10-arm-1_slack14.1.txz:  Upgraded.
  This update fixes the following security issues:
  *) SECURITY: CVE-2014-0117 (cve.mitre.org)
     mod_proxy: Fix crash in Connection header handling which
     allowed a denial of service attack against a reverse proxy
     with a threaded MPM.  [Ben Reser]
  *) SECURITY: CVE-2014-0118 (cve.mitre.org)
     mod_deflate: The DEFLATE input filter (inflates request bodies) now
     limits the length and compression ratio of inflated request bodies to
     avoid denial of sevice via highly compressed bodies.  See directives
     DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
     and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
  *) SECURITY: CVE-2014-0226 (cve.mitre.org)
     Fix a race condition in scoreboard handling, which could lead to
     a heap buffer overflow.  [Joe Orton, Eric Covener]
  *) SECURITY: CVE-2014-0231 (cve.mitre.org)
     mod_cgid: Fix a denial of service against CGI scripts that do
     not consume stdin that could lead to lingering HTTPD child processes
     filling up the scoreboard and eventually hanging the server.  By
     default, the client I/O timeout (Timeout directive) now applies to
     communication with scripts.  The CGIDScriptTimeout directive can be
     used to set a different timeout for communication with scripts.
     [Rainer Jung, Eric Covener, Yann Ylavic]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
  (* Security fix *)
+--------------------------+
Tue Jul 15 06:48:11 UTC 2014
patches/packages/php-5.4.30-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
  (* Security fix *)
+--------------------------+
Sat Jun 28 10:26:22 UTC 2014
patches/packages/bind-9.9.5_P1-arm-1_slack14.1.txz:  Upgraded.
  This fixes security issues and other bugs.  Please note that the first
  CVE only affects Windows, and the second one was claimed to be fixed by
  an earlier version of BIND.  But we'll update anyway just in case.  :-)
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
  (* Security fix *)
patches/packages/gnupg-1.4.17-arm-1_slack14.1.txz:  Upgraded.
  This release includes a security fix to stop a denial of service using
  garbled compressed data packets which can be used to put gpg into an
  infinite loop.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
  (* Security fix *)
patches/packages/gnupg2-2.0.24-arm-1_slack14.1.txz:  Upgraded.
  This release includes a security fix to stop a denial of service using
  garbled compressed data packets which can be used to put gpg into an
  infinite loop.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
  (* Security fix *)
patches/packages/samba-4.1.9-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues, including a flaw in Samba's
  internal DNS server which can be exploited to cause a denial of service,
  a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
  configurations that use shadow_copy* for vfs objects to reveal potentially
  private server information, a denial of service on the nmbd NetBIOS name
  services daemon, and a denial of service crash involving overwriting
  memory on an authenticated connection to the smbd file server.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
  (* Security fix *)
patches/packages/yptools-2.14-arm-3_slack14.1.txz:  Rebuilt.
  Corrected yppasswd patch that was causing password changes to fail.
  Thanks to Henrik Carlqvist.
+--------------------------+
Mon Jun 16 17:08:03 UTC 2014
/GPG-KEY:  Replaced.
  The previous PGP key used an @armedslack.org email address, which is set to
  be retired.

  All packages for supported versions of Slackware ARM have now been re-signed
  with the new PGP key.

  For reference, the old ARMedslack PGP key used to sign the packages can be
  found here:
  http://arm.slackware.com/pgp-keys/GPG-KEY-armedslack

patches/packages/slackpkg-2.82.0-noarch-12_slack14.1.txz:  Rebuilt.
  Changed the default config to recognise the new Slackware ARM GPG key.
+--------------------------+
Thu Jun 12 05:12:03 UTC 2014
patches/packages/php-5.4.29-arm-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues, including a possible denial
  of service, and an issue where insecure default permissions on the FPM
  socket may allow local users to run arbitrary code as the apache user.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
  (* Security fix *)
+--------------------------+
Sat Jun  7 17:01:19 UTC 2014
patches/packages/gnutls-3.1.25-arm-1_slack14.1.txz:  Upgraded.
  A security issue has been corrected in gnutls.  This vulnerability
  affects the client side of the gnutls library.  A server that sends
  a specially crafted ServerHello could corrupt the memory of a requesting
  client.  This may allow a remote attacker to execute arbitrary code.
  Additional vulnerabilities in the embedded libtasn1 library have also
  been patched.
  Thanks to mancha for the backported patches.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
  (* Security fix *)
patches/packages/libtasn1-3.6-arm-1_slack14.1.txz:  Upgraded.
  Multiple security issues have been corrected in the libtasn1 library.
  These errors allow a remote attacker to cause a denial of service, or
  possibly to execute arbitrary code.
  For more information, see:
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
  (* Security fix *)
patches/packages/mariadb-5.5.37-arm-1_slack14.1.txz:  Upgraded.
  This update contains security fixes and improvements.
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
  (* Security fix *)
patches/packages/openssl-1.0.1h-arm-1_slack14.1.txz:  Upgraded.
  Multiple security issues have been corrected, including a possible
  man-in-the-middle attack where weak keying material is forced, denial
  of service, and the execution of arbitrary code.
  For more information, see:
    http://www.openssl.org/news/secadv_20140605.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1h-arm-1_slack14.1.txz:  Upgraded.
patches/packages/sendmail-8.14.9-arm-1_slack14.1.txz:  Upgraded.
  This release fixes one security related bug by properly closing file
  descriptors (except stdin, stdout, and stderr) before executing programs.
  This bug could enable local users to interfere with an open SMTP
  connection if they can execute their own program for mail delivery
  (e.g., via procmail or the prog mailer).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
  (* Security fix *)
patches/packages/sendmail-cf-8.14.9-noarch-1_slack14.1.txz:  Upgraded.
+--------------------------+
Fri Apr 25 18:37:07 UTC 2014
patches/packages/libyaml-0.1.6-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
  where a specially crafted string could cause a heap overflow leading to
  arbitrary code execution.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
    https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
  (* Security fix *)
patches/packages/openssh-6.6p1-arm-2_slack14.1.txz:  Rebuilt.
  Fixed a bug with curve25519-sha256 that caused a key exchange failure in
  about 1 in 512 connection attempts.
patches/packages/php-5.4.27-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue in the in the awk script detector
  which allows context-dependent attackers to cause a denial of service
  (CPU consumption) via a crafted ASCII file that triggers a large amount
  of backtracking.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
  (* Security fix *)
+--------------------------+
Tue Apr  8 19:00:11 UTC 2014
patches/packages/openssl-1.0.1g-arm-1_slack14.1.txz:  Upgraded.
  This update fixes two security issues:
  A missing bounds check in the handling of the TLS heartbeat extension
  can be used to reveal up to 64k of memory to a connected client or server.
  Thanks for Neel Mehta of Google Security for discovering this bug and to
  Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
  preparing the fix.
  Fix for the attack described in the paper "Recovering OpenSSL
  ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
  by Yuval Yarom and Naomi Benger. Details can be obtained from:
  http://eprint.iacr.org/2014/140
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1g-arm-1_slack14.1.txz:  Upgraded.
+--------------------------+
Wed Apr  2 19:27:55 UTC 2014
patches/packages/apr-1.5.0-arm-1_slack14.1.txz:  Upgraded.
patches/packages/apr-util-1.5.3-arm-1_slack14.1.txz:  Upgraded.
patches/packages/curl-7.36.0-arm-1_slack14.1.txz:  Upgraded.
  This update fixes four security issues.
  For more information, see:
    http://curl.haxx.se/docs/adv_20140326A.html
    http://curl.haxx.se/docs/adv_20140326B.html
    http://curl.haxx.se/docs/adv_20140326C.html
    http://curl.haxx.se/docs/adv_20140326D.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
  (* Security fix *)
patches/packages/httpd-2.4.9-arm-1_slack14.1.txz:  Upgraded.
  This update addresses two security issues.
  Segfaults with truncated cookie logging. mod_log_config:  Prevent segfaults
    when logging truncated cookies.  Clean up the cookie logging parser to
    recognize only the cookie=value pairs, not valueless cookies.
  mod_dav:  Keep track of length of cdata properly when removing leading
    spaces. Eliminates a potential denial of service from specifically crafted
    DAV WRITE requests.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
  (* Security fix *)
patches/packages/mozilla-nss-3.16-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue:
  The cert_TestHostName function in lib/certdb/certdb.c in the
  certificate-checking implementation in Mozilla Network Security Services
  (NSS) before 3.16 accepts a wildcard character that is embedded in an
  internationalized domain name's U-label, which might allow man-in-the-middle
  attackers to spoof SSL servers via a crafted certificate.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
  (* Security fix *)
patches/packages/openssh-6.6p1-arm-1_slack14.1.txz:  Upgraded.
  This update fixes a security issue when using environment passing with
  a sshd_config(5) AcceptEnv pattern with a wildcard.  OpenSSH could be
  tricked into accepting any environment variable that contains the
  characters before the wildcard character.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
  (* Security fix *)
+--------------------------+
Tue Mar 18 08:15:07 UTC 2014
patches/packages/gnutls-3.1.22-arm-1_slack14.1.tgz:  Upgraded.
  Fixed a security issue where a specially crafted certificate could
  bypass certificate validation checks.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
  (* Security fix *)
patches/packages/mutt-1.5.23-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a buffer overflow where malformed RFC2047 header
  lines could result in denial of service or potentially the execution
  of arbitrary code as the user running mutt.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
  (* Security fix *)
patches/packages/php-5.4.26-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a flaw where a specially crafted data file may cause a
  segfault or 100% CPU consumption when a web page uses fileinfo() on it.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
  (* Security fix *)
patches/packages/samba-4.1.6-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes two security issues:
  CVE-2013-4496:
  Samba versions 3.4.0 and above allow the administrator to implement
  locking out Samba accounts after a number of bad password attempts.
  However, all released versions of Samba did not implement this check for
  password changes, such as are available over multiple SAMR and RAP
  interfaces, allowing password guessing attacks.
  CVE-2013-6442:
  Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
  smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
  command options it will remove the existing ACL on the object being
  modified, leaving the file or directory unprotected.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
  (* Security fix *)
patches/packages/udisks-1.0.5-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a stack-based buffer overflow when handling long path
  names.  A malicious, local user could use this flaw to create a
  specially-crafted directory structure that could lead to arbitrary code
  execution with the privileges of the udisks daemon (root).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
  (* Security fix *)
patches/packages/udisks2-2.1.3-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a stack-based buffer overflow when handling long path
  names.  A malicious, local user could use this flaw to create a
  specially-crafted directory structure that could lead to arbitrary code
  execution with the privileges of the udisks daemon (root).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
  (* Security fix *)
+--------------------------+
Fri Feb 28 21:51:45 UTC 2014
patches/packages/subversion-1.7.16-arm-1_slack14.1.tgz:  Upgraded.
  Fix denial of service bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
  (* Security fix *)
+--------------------------+
Tue Feb 25 20:33:42 UTC 2014
patches/packages/gnutls-3.1.21-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a flaw where a version 1 intermediate certificate would be
  considered as a CA certificate by GnuTLS by default.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
  (* Security fix *)
patches/packages/mariadb-5.5.35-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a buffer overflow in the mysql command line client which
  may allow malicious or compromised database servers to cause a denial of
  service (crash) and possibly execute arbitrary code via a long server
  version string.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
  (* Security fix *)
patches/packages/shadow-4.1.5.1-arm-3_slack14.1.tgz:  Rebuilt.
  Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c"
  (CVE-2005-4890) by detaching the controlling terminal in the non-PAM
  case via a TIOCNOTTY request.  Bi-directional protection is excessive
  and breaks a commonly-used methods for privilege escalation on non-PAM
  systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript).
  This update relaxes the restriction and only detaches the controlling
  tty when the callee is not root (which is, after all, the threat vector).
  Thanks to mancha for the patch (and the above information).
+--------------------------+
Fri Feb 14 19:31:41 UTC 2014
patches/packages/cairo-1.12.16-arm-1_slack14.1.tgz:  Upgraded.
  This is a bugfix update that was tested in -current and found to resolve
  some outstanding issues with the package that shipped in Slackware 14.1.
  Removed --enable-xcb-shm (may cause instability with GTK+3).
  Removed --enable-xlib-xcb (causes GIMP slowdown).
  Added --enable-ft and --enable-gl.
patches/packages/curl-7.35.0-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a flaw where libcurl could, in some circumstances, reuse
  the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
  request.
  For more information, see:
    http://curl.haxx.se/docs/adv_20140129.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
  (* Security fix *)
patches/packages/ntp-4.2.6p5-arm-5_slack14.1.tgz:  Rebuilt.
  All stable versions of NTP remain vulnerable to a remote attack where the
  "ntpdc -c monlist" command can be used to amplify network traffic as part
  of a denial of service attack.  By default, Slackware is not vulnerable
  since it includes "noquery" as a default restriction.  However, it is
  vulnerable if this restriction is removed.  To help mitigate this flaw,
  "disable monitor" has been added to the default ntp.conf (which will disable
  the monlist command even if other queries are allowed), and the default
  restrictions have been extended to IPv6 as well.
  All users of the NTP daemon should make sure that their ntp.conf contains
  "disable monitor" to prevent misuse of the NTP service.  The new ntp.conf
  file will be installed as /etc/ntp.conf.new with a package upgrade, but the
  changes will need to be merged into any existing ntp.conf file by the admin.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
    http://www.kb.cert.org/vuls/id/348126
  (* Security fix *)
patches/packages/pidgin-2.10.9-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes various security issues and other bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
  (* Security fix *)
+--------------------------+
Wed Jan 29 19:07:47 UTC 2014
patches/packages/bind-9.9.4_P2-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a defect in the handling of NSEC3-signed zones that can
  cause BIND to be crashed by a specific set of queries.
  NOTE:  According to the second link below, Slackware is probably not
  vulnerable since we aren't using glibc-2.18 yet.  Might as well fix it
  anyway, though.
  For more information, see:
    https://kb.isc.org/article/AA-01078
    https://kb.isc.org/article/AA-01085
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
  (* Security fix *)
patches/packages/mozilla-nss-3.15.4-arm-1_slack14.1.tgz:  Upgraded.
  Upgraded to nss-3.15.4 and nspr-4.10.3.
  Fixes a possible man-in-the-middle issue.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
  (* Security fix *)
+--------------------------+
Tue Jan 14 23:13:25 UTC 2014
patches/packages/libXfont-1.4.7-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a stack overflow when reading a BDF font file containing
  a longer than expected string, which could lead to crashes or privilege
  escalation.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
  (* Security fix *)
patches/packages/openssl-solibs-1.0.1f-arm-1_slack14.1.tgz:  Upgraded.
patches/packages/openssl-1.0.1f-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes the following security issues:
    Fix for TLS record tampering bug CVE-2013-4353
    Fix for TLS version checking bug CVE-2013-6449
    Fix for DTLS retransmission bug CVE-2013-6450
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
  (* Security fix *)
patches/packages/php-5.4.24-arm-1_slack14.1.tgz:  Upgraded.
  The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
  5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
  parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
  which allows remote attackers to execute arbitrary code or cause a denial
  of service (memory corruption) via a crafted certificate that is not
  properly handled by the openssl_x509_parse function.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
  (* Security fix *)
patches/packages/samba-4.1.4-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a heap-based buffer overflow that may allow AD domain
  controllers to execute arbitrary code via an invalid fragment length in
  a DCE-RPC packet.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
  (* Security fix *)
+--------------------------+
Sun Dec 22 19:46:02 UTC 2013
patches/packages/gnupg-1.4.16-arm-1_slack14.1.tgz:  
  Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
  Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
  For more information, see:
    http://www.cs.tau.ac.il/~tromer/acoustic/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
  (* Security fix *)
+--------------------------+
Wed Dec 18 20:15:44 UTC 2013
patches/packages/libiodbc-3.52.8-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes an rpath pointing to a location in /tmp that was found in
  two test programs (iodbctest and iodbctestw).  This could have allowed a
  local attacker with write access to /tmp to add modified libraries (and
  execute arbitrary code) as any user running the test programs.
  Thanks to Christopher Oliver for the bug report.
  (* Security fix *)
patches/packages/libjpeg-v8a-arm-3_slack14.1.tgz:  Rebuilt.
  Fix use of uninitialized memory when decoding images with missing SOS data
  for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
  This could allow remote attackers to obtain sensitive information from
  uninitialized memory locations via a crafted JPEG image.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
  (* Security fix *)
patches/packages/llvm-3.3-arm-3_slack14.1.tgz:  Rebuilt.
  The LLVM package included binaries with an rpath pointing to the build
  location in /tmp.   This allows an attacker with write access to /tmp to
  add modified libraries (and execute arbitrary code) as any user running
  the LLVM binaries.  This updated package rebuilds LLVM to exclude the
  build directories from the rpath information.
  Thanks to Christopher Oliver for the bug report.
  (* Security fix *)
patches/packages/ruby-1.9.3_p484-arm-1_slack14.1.tgz:  Upgraded.
  This update fixes a heap overflow in floating point parsing.  A specially
  crafted string could cause a heap overflow leading to a denial of service
  attack via segmentation faults and possibly arbitrary code execution.
  For more information, see:
    https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
  (* Security fix *)
+--------------------------+
Fri Dec  6 19:50:28 UTC 2013
patches/packages/mozilla-nss-3.15.3-arm-1_slack14.1.tgz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
  (* Security fix *)
+--------------------------+
Sun Nov 24 09:33:41 UTC 2013
patches/packages/scim-1.4.14-arm-5_slack14.1.tgz:  Rebuilt.
  --prefix=/usr had been omitted from the build-time configuration, resulting in
  some files being placed into /usr/local.
  Thanks to J?r?me Pinot
+--------------------------+
Wed Nov 20 21:26:49 UTC 2013
patches/packages/openssh-6.4p1-arm-1_slack14.1.tgz:  Upgraded.
       sshd(8): fix a memory corruption problem triggered during rekeying
       when an AES-GCM cipher is selected.
       For more information, see:
       http://www.openssh.com/txt/gcmrekey.adv
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
       (* Security fix *)
patches/packages/php-5.4.22-arm-1_slack14.1.tgz:  Upgraded.
       This is a bugfix release.
patches/packages/samba-4.1.1-arm-1_slack14.1.tgz:  Upgraded.
       This update fixes two security issues:
       * Samba versions 3.2.0 and above do not check the underlying file or
       directory ACL when opening an alternate data stream.
       * In setups which provide ldap(s) and/or https services, the private key
       for SSL/TLS encryption might be world readable. This typically happens
       in active directory domain controller setups.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
       (* Security fix *)
       Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini.
+--------------------------+
Mon Nov  4 19:50:32 UTC 2013

Slackware 14.1 ARM stable is released!

It's been another interesting release cycle here at Slackware bringing
updated compilers and development tools, the switch from MySQL to MariaDB,
and many more improvements throughout the system.  Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.

Please consider supporting the Slackware project by purchasing goodies 
from the Slackware Store - http://store.slackware.com
If you're an x86/x86_64 user, you can pick up a DVD copy and a subscription
too!

For donations to Slackware ARM specifically, a donations function exists
via PayPal:
  http://arm.slackware.com/sponsor/

Enjoy this release!
+--------------------------+
Sat Nov  2 08:59:41 UTC 2013
ap/dc3dd-7.1.614-arm-1.tgz:  Upgraded.
kde/kdevelop-4.5.2-arm-1.tgz:  Upgraded.
kde/kdevelop-php-1.5.2-arm-1.tgz:  Upgraded.
kde/kdevelop-php-docs-1.5.2-arm-1.tgz:  Upgraded.
kde/kdevplatform-1.5.2-arm-1.tgz:  Upgraded.
kde/lskat-4.10.5-arm-2.tgz:  Rebuilt.
  Fixed a typo in slack-desc.
n/gnutls-3.1.16-arm-1.tgz:  Upgraded.
n/network-scripts-14.1-noarch-2.tgz:  Rebuilt.
  Fixed a typo in netconfig.
isolinux/*:  Rebuilt.
  Don't produce a flash of screen output when scanning for LVM volumes
  after completing the package installation.
+--------------------------+
Tue Oct 29 18:05:25 UTC 2013
a/mkinitrd-1.4.8-arm-2.tgz:  Rebuilt.
  In mkinitrd_command_generator.sh, if a USB keyboard is detected add the
  hid_generic module (in addition to usbhid).  Recent kernels need this.
  Thanks to mario.
kde/calligra-2.7.4-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca@valencia-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-cs-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-da-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ia-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-it-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.7.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.7.4-noarch-1.tgz:  Upgraded.
xap/xscreensaver-5.22-arm-2.tgz:  Rebuilt.
  Recompiled to pick up the GPL text (which is used by several screensavers)
  from libX11's docs.  After the last libX11 upgrade the old location was no
  longer valid.
+--------------------------+
Mon Oct 28 21:04:16 UTC 2013

This is Slackware ARM v14.1 release candidate 3.

a/glibc-solibs-2.17-arm-14.tgz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-14.tgz:  Rebuilt.
a/kernel-modules-armv7-3.10.17_armv7-arm-2.tgz:  Rebuilt.
a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-2.tgz:  Rebuilt.
a/kernel-modules-versatile-3.10.17_versatile-arm-2.tgz:  Rebuilt.
a/kernel_armv7-3.10.17-arm-2.tgz:  Rebuilt.
a/kernel_kirkwood-3.10.17-arm-2.tgz:  Rebuilt.
a/kernel_versatile-3.10.17-arm-2.tgz:  Rebuilt.
a/sysvinit-scripts-2.0-noarch-16.tgz:  Rebuilt.
  Check for devtmpfs (not tmpfs) before starting udev.
  Remove obsolete reference to rc.optical-symlinks in rc.M.
  Thanks to GazL.
ap/pm-utils-1.4.1-arm-5.tgz:  Rebuilt.
  Set all the hooks in the power.d directory to non-executable.  This package
  shouldn't be playing games with the user's settings.  Thanks to jtsn.
d/kernel-headers-3.10.17-arm-2.tgz:  Rebuilt.
k/kernel-source-3.10.17-arm-2.tgz:  Rebuilt.
l/glibc-2.17-arm-14.tgz:  Rebuilt.
  Built against Linux 3.10.17 kernel headers.
l/glibc-i18n-2.17-arm-14.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-14.tgz:  Rebuilt.
l/poppler-0.24.3-arm-1.tgz:  Upgraded.
n/gnutls-3.1.15-arm-1.tgz:  Upgraded.
  Fixed an issue where a server that returns more 4 DANE entries could corrupt
  the memory of a requesting client.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4466
  (* Security fix *)
xap/xine-ui-0.99.7-arm-1.tgz:  Upgraded.
  Fixed file open dialog with a patch from BLFS.
  Thanks to mats_b_tegner.
isolinux/:  Rebuilt.
kernels/:  Rebuilt.
+--------------------------+
Sat Oct 26 12:46:44 UTC 2013
a/pciutils-3.2.0-arm-1.tgz:  Upgraded.
  Thanks to J?r?me Pinot.
a/usbutils-007-arm-1.tgz:  Upgraded.
  Thanks to J?r?me Pinot.
ap/acct-6.5.4-arm-3.tgz:  Rebuilt.
  Patched to fix broken sa output. Thanks to ktreadway.
n/lftp-4.4.9-arm-1.tgz:  Upgraded.
  Reverted to lftp-4.4.9 due to a regression in the mirror function.
x/scim-1.4.14-arm-4.tgz:  Rebuilt.
  Put the Qt module in the proper inputmethods directory, and enable the
  plugin in /etc/profile.d/scim.{csh,sh}.  Thanks to guanx.
x/xterm-297-arm-1.tgz:  Upgraded.
+--------------------------+
Tue Oct 22 21:00:56 UTC 2013

This is Slackware ARM v14.1 release candidate 2.
glibc and the Linux kernel need rebuilding with the new gcc version, but
this will wait until a new kernel version is released at kernel.org
(the release schedule is frequent so I don't expect to have to wait
for too long).

The mini root filesystem for -current has been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

a/sharutils-4.14-arm-1.tgz:  Upgraded.
a/usb_modeswitch-2.0.1-arm-1.tgz:  Upgraded.
ap/slackpkg-2.82.0-noarch-11.tgz:  Rebuilt.
  Corrected typos in the slackpkg man page.
  Thanks to sycamorex.
d/gcc-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-g++-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-gfortran-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-gnat-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-go-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-java-4.8.2-arm-1.tgz:  Upgraded.
d/gcc-objc-4.8.2-arm-1.tgz:  Upgraded.
d/libtool-2.4.2-arm-2.tgz:  Rebuilt.
  Rebuilt to update GCC version, which is detected at compile time.
  Thanks to Larry Hajali.
kde/kdelibs-4.10.5-arm-3.tgz:  Rebuilt.
  Reverted three upstream commits which (although technically correct) have
  the effect of causing KDE to display the wrong icons in some cases.
  Thanks to alienBOB.
l/qt-4.8.5-arm-2.tgz:  Rebuilt.
  Adjusted the SlackBuild to make sure that libwebcore (which is used
  internally for the Qt build) doesn't end up in QtWebKit.pc.
  Thanks to Larry Hajali.
n/mutt-1.5.22-arm-1.tgz:  Upgraded.
  Thanks to Markus Reichelt for the updates to the ./configure options.
n/samba-4.1.0-arm-2.tgz:  Rebuilt.
  Added symlinks for libtalloc.so and libpytalloc-util.so.
  Thanks to Adis Nezirovic.
x/mesa-9.1.7-arm-1.tgz:  Upgraded.
xap/MPlayer-1.1_20130819-arm-2.tgz:  Rebuilt.
  Added a patch to fix subtitles in the case where MPlayer is recompiled
  on a system that has libass.  Thanks to Marin Glibic.
xap/rdesktop-1.8.0-arm-2.tgz:  Rebuilt.
  Patched to fix crash with -P and/or -N.
  Thanks to mancha.
+--------------------------+
Sun Oct 20 07:18:53 UTC 2013
a/glibc-solibs-2.17-arm-13.tgz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-13.tgz:  Rebuilt.
a/kernel-firmware-20131019git-noarch-1.tgz:  Upgraded.
a/kernel-modules-armv7-3.10.17_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.17_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.17-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.17-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.17-arm-1.tgz:  Upgraded.
ap/hplip-3.13.10-arm-1.tgz:  Upgraded.
  This fixes a polkit race condition that could allow local users to bypass
  intended access restrictions.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
  (* Security fix *)
d/kernel-headers-3.10.17-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.17-arm-1.tgz:  Upgraded.
l/glibc-2.17-arm-13.tgz:  Rebuilt.
  Rebuilt against Linux 3.10.17 kernel headers.
l/glibc-i18n-2.17-arm-13.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-13.tgz:  Rebuilt.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Fri Oct 18 21:17:38 UTC 2013

This is Slackware ARM 14.1 release candidate 1.

a/aaa_base-14.1-arm-1.tgz:  Upgraded.
a/aaa_elflibs-14.1-arm-3.tgz:  Rebuilt.
a/cups-1.5.4-arm-2.tgz:  Rebuilt.
  Use a newer backport of the USB quirks patch.  Thanks to mancha.
  Blacklist the usblp module just in case.
a/gettext-0.18.2.1-arm-3.tgz:  Rebuilt.
a/gptfdisk-0.8.7-arm-1.tgz:  Upgraded.
a/kernel-firmware-20131015git-noarch-1.tgz:  Upgraded.
a/kernel-modules-armv7-3.10.16_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.16_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.16_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.16-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.16-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.16-arm-1.tgz:  Upgraded.
a/logrotate-3.8.6-arm-1.tgz:  Upgraded.
a/minicom-2.6.2-arm-1.tgz:  Upgraded.
a/pkgtools-14.1-noarch-2.tgz:  Rebuilt.
  Removed obsolete makebootdisk script.
  Added an /sbin/makebootstick symlink for making a USB boot stick.
a/shadow-4.1.5.1-arm-2.tgz:  Rebuilt.
  Updated crypt() patch.  Thanks to mancha.
a/sysvinit-scripts-2.0-noarch-15.tgz:  Rebuilt.
  Clean up stale cron directories in /var/spool/cron.
  Create lock/run directories for LVM.
  Thanks to GazL.
  Mount cgroup controllers in subfolders.
  Thanks to Matteo Bernardini.
ap/diffutils-3.3-arm-1.tgz:  Upgraded.
ap/mc-4.8.10-arm-2.tgz:  Rebuilt.
  Upstream fix for crash when moving directories.
  Upstream fix for command line directory handling.
ap/powertop-2.4-arm-1.tgz:  Upgraded.
ap/slackpkg-2.82.0-noarch-10.tgz:  Rebuilt.
  Verified and corrected the mirrors lists for x86 and x86_64.
  Changed version numbers from 14.0 to 14.1 in preparation for the upcoming
  Slackware 14.1 release.
  Corrected a manpage bug in the file-search section.
ap/tmux-1.8-arm-1.tgz:  Upgraded.
d/cmake-2.8.12-arm-1.tgz:  Upgraded.
d/gettext-tools-0.18.2.1-arm-3.tgz:  Rebuilt.
d/guile-2.0.9-arm-1.tgz:  Upgraded.
d/kernel-headers-3.10.16-arm-1.tgz:  Upgraded.
d/mercurial-2.7.2-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.16-arm-1.tgz:  Upgraded.
kde/ark-4.10.5-arm-2.tgz:  Rebuilt.
kde/calligra-2.7.3-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0.9-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-cs-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-da-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ia-2.7.3-noarch-1.tgz:  Added.
kdei/calligra-l10n-it-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.7.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.7.3-noarch-1.tgz:  Upgraded.
l/dconf-0.18.0-arm-1.tgz:  Upgraded.
l/gc-7.2d-arm-1.tgz:  Added.
  New dependency for guile.
l/gvfs-1.16.3-arm-2.tgz:  Rebuilt.
l/libarchive-3.1.2-arm-1.tgz:  Upgraded.
l/libevent-2.0.21-arm-1.tgz:  Added.
l/libproxy-0.4.11-arm-3.tgz:  Rebuilt.
l/libtiff-3.9.7-arm-1.tgz:  Upgraded.
  Patched overflows, crashes, and out of bounds writes.
  Thanks to mancha for the backported patches.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244
  (* Security fix *)
l/libunistring-0.9.3-arm-1.tgz:  Added.
  New dependency for guile.
l/mozilla-nss-3.15.2-arm-2.tgz:  Rebuilt.
  Recompiled with NSS_ENABLE_ECC=1.
  Thanks to Janusz Dziemidowicz.
n/ModemManager-1.0.0-arm-1.tgz:  Upgraded.
n/NetworkManager-0.9.8.8-arm-1.tgz:  Upgraded.
n/alpine-2.11-arm-1.tgz:  Upgraded.
n/conntrack-tools-1.4.2-arm-1.tgz:  Added.
n/ebtables-2.0.10-arm-1.tgz:  Added.
n/epic5-1.1.6-arm-1.tgz:  Upgraded.
n/gnupg-1.4.15-arm-1.tgz:  Upgraded.
  Fixed possible infinite recursion in the compressed packet
  parser. [CVE-2013-4402]
  Protect against rogue keyservers sending secret keys.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
  (* Security fix *)
n/gnupg2-2.0.22-arm-1.tgz:  Upgraded.
  Fixed possible infinite recursion in the compressed packet
  parser. [CVE-2013-4402]
  Protect against rogue keyservers sending secret keys.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
  (* Security fix *)
n/gnutls-3.1.14-arm-1.tgz:  Upgraded.
n/imapd-2.11-arm-1.tgz:  Upgraded.
n/iproute2-3.10.0-arm-2.tgz:  Rebuilt.
n/ipset-6.20-arm-1.tgz:  Added.
n/iptables-1.4.20-arm-1.tgz:  Upgraded.
n/iptraf-ng-1.1.4-arm-1.tgz:  Upgraded.
n/iputils-s20121221-arm-1.tgz:  Upgraded.
n/lftp-4.4.10-arm-1.tgz:  Upgraded.
n/libmbim-1.4.0-arm-1.tgz:  Added.
n/libmnl-1.0.3-arm-1.tgz:  Added.
n/libnetfilter_acct-1.0.2-arm-1.tgz:  Added.
n/libnetfilter_conntrack-1.0.4-arm-1.tgz:  Added.
n/libnetfilter_cthelper-1.0.0-arm-1.tgz:  Added.
n/libnetfilter_cttimeout-1.0.0-arm-1.tgz:  Added.
n/libnetfilter_log-1.0.1-arm-1.tgz:  Added.
n/libnetfilter_queue-1.0.2-arm-1.tgz:  Added.
n/libnfnetlink-1.0.1-arm-1.tgz:  Added.
n/libqmi-1.4.0-arm-1.tgz:  Added.
n/mtr-0.85-arm-1.tgz:  Upgraded.
n/nfacct-1.0.1-arm-1.tgz:  Added.
n/ntp-4.2.6p5-arm-4.tgz:  Rebuilt.
  If the hardware clock is kept in localtime, save the time to the hardware
  clock after starting ntpd.  This prevents the kernel from saving the system
  time to the hardware clock every 11 minutes, which would cause the hardware
  clock to be off by the difference between localtime and UTC.
  Thanks to tux_dude.
n/openssh-6.3p1-arm-1.tgz:  Upgraded.
n/openvpn-2.3.2-arm-1.tgz:  Upgraded.
  Added configure option --enable-password-save.  Thanks to Mario.
n/php-5.4.20-arm-1.tgz:  Upgraded.
n/rfkill-0.5-arm-1.tgz:  Upgraded.
n/samba-4.1.0-arm-1.tgz:  Upgraded.
n/tftp-hpa-5.2-arm-1.tgz:  Upgraded.
n/ulogd-2.0.2-arm-1.tgz:  Added.
n/yptools-2.14-arm-2.tgz:  Rebuilt.
  Updated yp-tools crypt() patch.  Thanks to mancha.
tcl/tcl-8.6.1-arm-1.tgz:  Upgraded.
tcl/tk-8.6.1-arm-1.tgz:  Upgraded.
x/xauth-1.0.8-arm-1.tgz:  Upgraded.
x/xbacklight-1.2.1-arm-1.tgz:  Upgraded.
x/xcompmgr-1.1.6-arm-1.tgz:  Upgraded.
x/xf86-input-evdev-2.8.2-arm-1.tgz:  Upgraded.
x/xf86-video-armsoc-dcf32bd-arm-1.tgz:  Upgraded.
x/xf86-video-fbdev-0.4.4-arm-1.tgz:  Upgraded.
x/xf86-video-r128-6.9.2-arm-1.tgz:  Upgraded.
x/xf86-video-savage-2.3.7-arm-1.tgz:  Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-7.tgz:  Rebuilt.
x/xorg-server-1.14.3-arm-2.tgz:  Rebuilt.
  Patched a use-after-free bug that can cause an X server crash or
  memory corruption.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
  (* Security fix *)
x/xorg-server-xephyr-1.14.3-arm-2.tgz:  Rebuilt.
x/xorg-server-xnest-1.14.3-arm-2.tgz:  Rebuilt.
x/xorg-server-xvfb-1.14.3-arm-2.tgz:  Rebuilt.
xap/network-manager-applet-0.9.8.4-arm-1.tgz:  Upgraded.
xap/rdesktop-1.8.0-arm-1.tgz:  Upgraded.
xap/sane-1.0.24-arm-1.tgz:  Upgraded.
  Upgraded to sane-backends-1.0.24.
xfce/exo-0.10.2-arm-2.tgz:  Rebuilt.
  Fix URL handling to not reject magnet links.
  Thanks to Larry Hajali.
extra/tightvnc/tightvnc-1.3.10-arm-6.tgz:  Removed.
extra/tigervnc/tigervnc-1.1.0-arm-1.tgz:  Added.
  Thanks to alienBOB.
extra/x11vnc/x11vnc-0.9.13-arm-2.tgz:  Rebuilt.
extra/openjdk/*:  Removed.
  This package cannot be maintained on ARMv5 hardware (I don't know why this is,
  but I always get a segfault building on ARMv5) and therefore it has to go.

  I've moved the previous packages to the 'unsupported' directory.  They're
  currently out of date and contain many known security vulnerabilities.  I may
  update these in the future if there's demand.

ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/openjdk

isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sun Oct 13 16:39:51 UTC 2013
a/kernel-modules-armv7-3.10.15_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.15_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.15_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.15-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.15-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.15-arm-1.tgz:  Upgraded.
d/kernel-headers-3.10.15-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.15-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Thu Oct  3 19:22:44 UTC 2013
a/etc-14.1-arm-2.tgz:  Rebuilt.
  Added /lib{,64} and /usr/lib{,64} paths to the top of ld.so.conf.
a/getty-ps-2.1.0b-arm-3.tgz:  Rebuilt.
  Patched crash bug.  Thanks to mancha.
a/kernel-modules-armv7-3.10.14_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.14_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.14_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.14-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.14-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.14-arm-1.tgz:  Upgraded.
a/pkgtools-14.1-noarch-1.tgz:  Upgraded.
a/sed-4.2.2-arm-1.tgz:  Upgraded.
ap/mc-4.8.10-arm-1.tgz:  Upgraded.
ap/vim-7.4.050-arm-1.tgz:  Upgraded.
d/kernel-headers-3.10.14-arm-1.tgz:  Upgraded.
d/rcs-5.9.0-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.14-arm-1.tgz:  Upgraded.
l/gmp-5.1.3-arm-1.tgz:  Upgraded.
l/mozilla-nss-3.15.2-arm-1.tgz:  Upgraded.
  Upgraded to nss-3.15.2 and nspr-4.10.1.
n/ca-certificates-20130906-noarch-1.tgz:  Upgraded.
n/rsync-3.1.0-arm-1.tgz:  Upgraded.
xap/vim-gvim-7.4.050-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sun Sep 29 08:45:08 UTC 2013
a/udev-182-arm-5.tgz:  Rebuilt.
  Fix compilation.  Thanks to alienBOB.
ap/lm_sensors-3.3.4-arm-1.tgz:  Upgraded.
d/m4-1.4.17-arm-1.tgz:  Upgraded.
n/sendmail-8.14.7-arm-1.tgz:  Upgraded.
n/sendmail-cf-8.14.7-noarch-1.tgz:  Upgraded.
n/traceroute-2.0.19-arm-1.tgz:  Upgraded.
x/mesa-9.1.6-arm-2.tgz:  Rebuilt.
  Recompiled with --enable-osmesa.
+--------------------------+
Mon Sep 23 19:34:29 UTC 2013
a/sysvinit-scripts-2.0-noarch-14.tgz:  Rebuilt.
  Fix entropy carry in rc.S and rc.6, since /proc/sys/kernel/random/poolsize
  now gives the pool size in bits rather than bytes.
  Thanks to Frank Molzahn.
a/u-boot-tools-2013.04-arm-2.tgz:  Rebuilt.
  Added offets for Pogoplug and Dockstar systems to /etc/fw_env.config
  Thanks to Rich Lapointe.
n/links-2.8-arm-1.tgz:  Upgraded.
n/samba-4.0.9-arm-2.tgz:  Rebuilt.
  Added talloc.h, pytalloc-util.pc, and talloc.pc.
x/dejavu-fonts-ttf-2.34-noarch-1.tgz:  Upgraded.
x/xf86-video-armsoc-a7e316f-arm-1.tgz:  Upgraded.
+--------------------------+
Fri Sep 20 18:28:30 UTC 2013
a/lrzip-0.616-arm-1.tgz:  Upgraded.
ap/cdrtools-3.01a17-arm-1.tgz:  Upgraded.
t/transfig-3.2.5e-arm-1.tgz:  Upgraded.
t/xfig-3.2.5c-arm-1.tgz:  Upgraded.
x/libX11-1.6.2-arm-1.tgz:  Upgraded.
x/libXaw-1.0.12-arm-1.tgz:  Upgraded.
x/libXmu-1.1.2-arm-1.tgz:  Upgraded.
x/libXpm-3.5.11-arm-1.tgz:  Upgraded.
x/libXrandr-1.4.2-arm-1.tgz:  Upgraded.
x/libXv-1.0.10-arm-1.tgz:  Upgraded.
x/twm-1.0.8-arm-1.tgz:  Upgraded.
x/util-macros-1.17.1-arm-1.tgz:  Upgraded.
x/xclipboard-1.1.3-arm-1.tgz:  Upgraded.
x/xclock-1.0.7-arm-1.tgz:  Upgraded.
x/xf86-video-armsoc-4c57279-arm-2.tgz:  Rebuilt.
x/xf86-video-dummy-0.3.7-arm-1.tgz:  Upgraded.
x/xf86-video-fbdev-0.4.3-arm-7.tgz:  Rebuilt.
x/xf86-video-vesa-2.3.3-arm-1.tgz:  Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-6.tgz:  Rebuilt.
x/xinit-1.3.3-arm-1.tgz:  Upgraded.
x/xinput-1.6.1-arm-1.tgz:  Upgraded.
x/xkill-1.0.4-arm-1.tgz:  Upgraded.
x/xlsclients-1.1.3-arm-1.tgz:  Upgraded.
x/xman-1.1.3-arm-1.tgz:  Upgraded.
x/xmodmap-1.0.8-arm-1.tgz:  Upgraded.
x/xorg-server-1.14.3-arm-1.tgz:  Upgraded.
x/xorg-server-xephyr-1.14.3-arm-1.tgz:  Upgraded.
x/xorg-server-xnest-1.14.3-arm-1.tgz:  Upgraded.
x/xorg-server-xvfb-1.14.3-arm-1.tgz:  Upgraded.
x/xrdb-1.1.0-arm-1.tgz:  Upgraded.
xap/imagemagick-6.8.6_10-arm-1.tgz:  Upgraded.
xap/windowmaker-0.95.5-arm-1.tgz:  Upgraded.
extra/tightvnc/tightvnc-1.3.10-arm-6.tgz:  Rebuilt.
+--------------------------+
Wed Sep 18 19:29:08 UTC 2013

This is beta 1 of Slackware ARM v14.1.

a/glibc-solibs-2.17-arm-12.tgz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-12.tgz:  Rebuilt.
ap/slackpkg-2.82.0-noarch-9.tgz:  Rebuilt.
  Patched core-functions.sh to fix searching for qt, phonon, and other
  packages in cases where package names overlap.
  Thanks to S´┐Żbastien Ballet.
d/kernel-headers-3.10.12-arm-1.tgz:  Upgraded.
l/dconf-0.16.1-arm-2.tgz:  Rebuilt.
  Don't try to restart D-Bus from the installer.  All it does is create
  noise on the console.
l/glibc-2.17-arm-12.tgz:  Rebuilt.
  Built against Linux 3.10.12 kernel headers.
  Patched to fix integer overflows in pvalloc, valloc, and
  posix_memalign/memalign/aligned_alloc.
  Thanks to mancha for the backported patch.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
  (* Security fix *)
l/glibc-i18n-2.17-arm-12.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-12.tgz:  Rebuilt.
l/gnome-themes-standard-3.8.4-arm-1.tgz:  Upgraded.
l/system-config-printer-1.3.13-arm-1.tgz:  Upgraded.
+--------------------------+
Tue Sep 17 20:39:11 UTC 2013
x/libXxf86dga-1.1.4-arm-2.tgz:  Rebuilt.
x/libXxf86misc-1.0.3-arm-2.tgz:  Rebuilt.
x/libXxf86vm-1.1.3-arm-2.tgz:  Rebuilt.
x/xf86-video-armsoc-4c57279-arm-1.tgz:  Upgraded.
  Built with './configure --with-drmmode=exynos' since I'd intended this driver
  to be used for the Samsung Chromebook.
x/xf86-video-fbdev-0.4.3-arm-6.tgz:  Rebuilt.
  This was missed in the last round of rebuilds.  Thanks to openpandora.
x/xf86-video-nouveau-1.0.9-arm-1.tgz:  Upgraded.
x/xf86bigfontproto-1.2.0-arm-2.tgz:  Rebuilt.
x/xf86dga-1.0.3-arm-2.tgz:  Rebuilt.
x/xf86dgaproto-2.1-arm-2.tgz:  Rebuilt.
x/xf86driproto-2.1.1-arm-2.tgz:  Rebuilt.
x/xf86miscproto-0.9.3-arm-2.tgz:  Rebuilt.
x/xf86vidmodeproto-2.3.1-arm-2.tgz:  Rebuilt.
+--------------------------+
Sun Sep 15 15:11:07 UTC 2013
a/infozip-6.0-arm-3.tgz:  Rebuilt.
  Fixed bzip2 and UID/GID support in unzip.
  Thanks to Ruar? ?degaard.
a/kernel-firmware-20130914git-noarch-1.tgz:  Upgraded.
a/kernel-modules-armv7-3.10.12_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.12_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.12_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.12-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.12-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.12-arm-1.tgz:  Upgraded.
d/help2man-1.43.3-arm-1.tgz:  Added.
k/kernel-source-3.10.12-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Wed Sep 11 19:15:19 UTC 2013
a/dosfstools-3.0.22-arm-1.tgz:  Upgraded.
a/glibc-solibs-2.17-arm-11.tgz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-11.tgz:  Rebuilt.
a/hdparm-9.43-arm-1.tgz:  Upgraded.
a/kernel-modules-armv7-3.10.11_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.11_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.11_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.11-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.11-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.11-arm-1.tgz:  Upgraded.
  Patched to work with QEMU-1.6.0.  This kernel has  _only_ been
  tested with QEMU-1.6.0, so please upgrade your QEMU installation
  if you'd like to use this kernel.
  Thanks to Keith C. Perry for the report.
a/os-prober-1.63-arm-1.tgz:  Added.
  This is a simple tool that searches partitions for bootable operating
  systems.
d/device-tree-compiler-1.4.0-arm-1.tgz:  Upgraded.
d/gcc-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-g++-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-gfortran-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-gnat-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-go-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-java-4.8.1-arm-2.tgz:  Rebuilt.
d/gcc-objc-4.8.1-arm-2.tgz:  Rebuilt.
d/git-1.8.4-arm-1.tgz:  Upgraded.
d/kernel-headers-3.10.11-arm-1.tgz:  Upgraded.
d/perl-5.18.1-arm-1.tgz:  Upgraded.
  Upgraded to DBI-1.628.  Added gettext-1.05.
d/subversion-1.7.13-arm-1.tgz:  Upgraded.
  This update fixes a local privilege escalation vulnerability via
  symlink attack.
  For more information, see:
    http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277
  (* Security fix *)
k/kernel-source-3.10.11-arm-1.tgz:  Upgraded.
l/glibc-2.17-arm-11.tgz:  Rebuilt.
  Compiled against Linux-3.10.11 headers.
  Patched to remove pt_chown.  Thanks to mancha.
  Note that while this patches CVE-2013-2207 (a local privilege escalation
  vulnerability), the vulnerability depends upon insecure and non-default
  settings ("user_allow_other" in /etc/fuse.conf) and the patch is not
  trivial to port to older versions of glibc.  For older versions, the
  best approach is to not set that option in fuse.conf, as it likely opens
  up other holes as well.  Another approach to mitigate this is to make
  pt_chown a symlink to /bin/true, as the kernel has handled chowning
  pseudo terminals for a long time and pt_chown isn't needed at all.
l/glibc-i18n-2.17-arm-11.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-11.tgz:  Rebuilt.
l/gnome-icon-theme-3.8.3-arm-1.tgz:  Upgraded.
l/libwnck-2.30.7-arm-4.tgz:  Rebuilt.
l/startup-notification-0.12-arm-3.tgz:  Rebuilt.
l/taglib-1.8-arm-2.tgz:  Rebuilt.
  Compile with -DCMAKE_BUILD_TYPE=Release to silence debug messages meant for
  developers.  Thanks to Seb.
x/libxcb-1.9.1-arm-1.tgz:  Upgraded.
x/xbacklight-1.2.0-arm-2.tgz:  Rebuilt.
x/xcb-util-0.3.9-arm-1.tgz:  Upgraded.
  This update bumps the shared library version, requiring some rebuilds.
x/xcb-util-cursor-0.1.0-arm-1.tgz:  Upgraded.
x/xcb-util-image-0.3.9-arm-2.tgz:  Rebuilt.
x/xf86-input-acecad-1.5.0-arm-5.tgz:  Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-5.tgz:  Rebuilt.
x/xf86-input-evdev-2.8.1-arm-2.tgz:  Rebuilt.
x/xf86-input-joystick-1.6.1-arm-5.tgz:  Rebuilt.
x/xf86-input-keyboard-1.7.0-arm-3.tgz:  Rebuilt.
x/xf86-input-mouse-1.9.0-arm-3.tgz:  Rebuilt.
x/xf86-input-penmount-1.5.0-arm-5.tgz:  Rebuilt.
x/xf86-input-synaptics-1.7.1-arm-2.tgz:  Rebuilt.
x/xf86-input-void-1.4.0-arm-5.tgz:  Rebuilt.
x/xf86-input-wacom-0.19.0-arm-4.tgz:  Rebuilt.
x/xf86-video-apm-1.2.5-arm-4.tgz:  Rebuilt.
x/xf86-video-ark-0.7.5-arm-4.tgz:  Rebuilt.
x/xf86-video-ast-0.98.0-arm-2.tgz:  Rebuilt.
x/xf86-video-ati-7.2.0-arm-2.tgz:  Rebuilt.
x/xf86-video-chips-1.2.5-arm-4.tgz:  Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-4.tgz:  Rebuilt.
x/xf86-video-dummy-0.3.6-arm-4.tgz:  Rebuilt.
x/xf86-video-glint-1.2.8-arm-4.tgz:  Rebuilt.
x/xf86-video-i128-1.3.6-arm-4.tgz:  Rebuilt.
x/xf86-video-i740-1.3.4-arm-4.tgz:  Rebuilt.
x/xf86-video-mach64-6.9.4-arm-4.tgz:  Rebuilt.
x/xf86-video-mga-1.6.2-arm-4.tgz:  Rebuilt.
x/xf86-video-modesetting-0.8.0-arm-2.tgz:  Rebuilt.
x/xf86-video-neomagic-1.2.8-arm-2.tgz:  Rebuilt.
x/xf86-video-nv-2.1.20-arm-5.tgz:  Rebuilt.
x/xf86-video-openchrome-0.3.3-arm-2.tgz:  Rebuilt.
x/xf86-video-r128-6.9.1-arm-5.tgz:  Rebuilt.
x/xf86-video-rendition-4.2.5-arm-4.tgz:  Rebuilt.
x/xf86-video-s3-0.6.5-arm-4.tgz:  Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-5.tgz:  Rebuilt.
x/xf86-video-savage-2.3.6-arm-5.tgz:  Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-5.tgz:  Rebuilt.
x/xf86-video-sis-0.10.7-arm-4.tgz:  Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-4.tgz:  Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-4.tgz:  Rebuilt.
x/xf86-video-tga-1.2.2-arm-4.tgz:  Rebuilt.
x/xf86-video-trident-1.3.6-arm-4.tgz:  Rebuilt.
x/xf86-video-tseng-1.2.5-arm-4.tgz:  Rebuilt.
x/xf86-video-v4l-0.2.0-arm-5.tgz:  Rebuilt.
x/xf86-video-vesa-2.3.2-arm-4.tgz:  Rebuilt.
x/xf86-video-vmware-13.0.1-arm-3.tgz:  Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-5.tgz:  Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-5.tgz:  Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-4.tgz:  Rebuilt.
x/xorg-server-1.14.2-arm-1.tgz:  Upgraded.
x/xorg-server-xephyr-1.14.2-arm-1.tgz:  Upgraded.
x/xorg-server-xnest-1.14.2-arm-1.tgz:  Upgraded.
x/xorg-server-xvfb-1.14.2-arm-1.tgz:  Upgraded.
xap/blueman-r708-arm-3.tgz:  Rebuilt.
xfce/Thunar-1.6.3-arm-2.tgz:  Rebuilt.
xfce/libxfce4ui-4.10.0-arm-2.tgz:  Rebuilt.
xfce/libxfcegui4-4.10.0-arm-2.tgz:  Rebuilt.
xfce/xfce4-clipman-plugin-1.2.3-arm-2.tgz:  Rebuilt.
xfce/xfce4-panel-4.10.1-arm-2.tgz:  Rebuilt.
xfce/xfce4-power-manager-1.2.0-arm-2.tgz:  Rebuilt.
xfce/xfce4-screenshooter-1.8.1-arm-2.tgz:  Rebuilt.
xfce/xfce4-session-4.10.1-arm-2.tgz:  Rebuilt.
xfce/xfce4-systemload-plugin-1.1.1-arm-2.tgz:  Rebuilt.
xfce/xfce4-taskmanager-1.0.0-arm-2.tgz:  Rebuilt.
xfce/xfce4-weather-plugin-0.8.3-arm-2.tgz:  Rebuilt.
xfce/xfwm4-4.10.1-arm-2.tgz:  Rebuilt.
extra/brltty/brltty-4.5-arm-1.tgz:  Upgraded.
extra/emacspeak/emacspeak-38.0-arm-1.tgz:  Upgraded.
extra/tightvnc/tightvnc-1.3.10-arm-5.tgz:  Rebuilt.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sat Aug 31 15:31:16 UTC 2013
a/kernel-modules-armv7-3.10.10_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.10_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.10_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.10-arm-1.tgz:  Upgraded.
  Added kernel debugger support:
  CONFIG_KGDB=y
  CONFIG_KGDB_SERIAL_CONSOLE=y
a/kernel_kirkwood-3.10.10-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.10-arm-1.tgz:  Upgraded.
a/kmod-15-arm-1.tgz:  Upgraded.
a/lvm2-2.02.100-arm-1.tgz:  Upgraded.
a/mtd-utils-260813-arm-1.tgz:  Upgraded.
ap/hplip-3.13.8-arm-2.tgz:  Rebuilt.
  Upstream added nohup to 56-hpmud.rules but didn't background the command,
  which caused the startup delay to return.  Adding '&' to fix this.
  Thanks to burdi01.
ap/man-pages-3.53-noarch-1.tgz:  Upgraded.
d/doxygen-1.8.5-arm-1.tgz:  Upgraded.
d/gdb-7.6.1-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.10-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.4.0-arm-1.tgz:  Upgraded.
kde/oxygen-gtk3-1.2.0-arm-1.tgz:  Upgraded.
l/boost-1.54.0-arm-3.tgz:  Rebuilt.
  Applied upstream patch to fix "long long" detection with glibc-2.17
  or newer.
n/bluez-4.99-arm-4.tgz:  Rebuilt.
  Check executable status of rc.bluetooth before allowing a hotplugged
  device to load modules and start bluetoothd.
  Thanks to Robby Workman.
n/gnupg2-2.0.21-arm-1.tgz:  Upgraded.
n/gnutls-3.0.31-arm-1.tgz:  Upgraded.
  This update prevents a side-channel attack which may allow remote attackers
  to conduct distinguishing attacks and plaintext recovery attacks using
  statistical analysis of timing data for crafted packets.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
  (* Security fix *)
n/lftp-4.4.9-arm-1.tgz:  Upgraded.
n/nettle-2.7.1-arm-1.tgz:  Upgraded.
n/php-5.4.19-arm-1.tgz:  Upgraded.
  Fixed handling null bytes in subjectAltName (CVE-2013-4248).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
  (* Security fix *)
n/samba-4.0.9-arm-1.tgz:  Upgraded.
x/xfs-1.1.3-arm-1.tgz:  Upgraded.
xap/xlockmore-5.43-arm-1.tgz:  Upgraded.
xap/xscreensaver-5.22-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sun Aug 25 15:58:25 UTC 2013
a/kernel-modules-armv7-3.10.9_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.9_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.9_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.9-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.9-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.9-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.9-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Fri Aug 23 07:41:27 UTC 2013
ap/hplip-3.13.8-arm-1.tgz:  Upgraded.
  This update fixes a stack-based buffer overflow in the hpmud_get_pml
  function that can allow remote attackers to cause a denial of service
  (crash) and possibly execute arbitrary code via a crafted SNMP response
  with a large length value.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
  (* Security fix *)
kde/calligra-2.7.2-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-cs-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-da-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-it-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.7.2-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.7.2-noarch-1.tgz:  Upgraded.
l/poppler-0.24.0-arm-1.tgz:  Upgraded.
  Sanitize error messages to remove escape sequences that could be used to
  exploit vulnerable terminal emulators.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
  (* Security fix *)
l/poppler-data-0.4.6-noarch-1.tgz:  Upgraded.
l/zlib-1.2.8-arm-1.tgz:  Upgraded.
x/xf86-video-ast-0.98.0-arm-1.tgz:  Upgraded.
x/xf86-video-ati-7.2.0-arm-1.tgz:  Upgraded.
x/xf86-video-neomagic-1.2.8-arm-1.tgz:  Upgraded.
x/xload-1.1.2-arm-1.tgz:  Upgraded.
x/xprop-1.2.2-arm-1.tgz:  Upgraded.
x/xset-1.2.3-arm-1.tgz:  Upgraded.
x/xwd-1.0.6-arm-1.tgz:  Upgraded.
xap/xpdf-3.03-arm-2.tgz:  Rebuilt.
  Sanitize error messages to remove escape sequences that could be used to
  exploit vulnerable terminal emulators.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
  Thanks to mancha.
  (* Security fix *)
xfce/tumbler-0.1.25-arm-3.tgz:  Rebuilt.
+--------------------------+
Tue Aug 20 19:55:46 UTC 2013
d/strace-4.8-arm-1.tgz:  Upgraded.
l/qt-4.8.5-arm-1.tgz:  Upgraded.
xap/MPlayer-1.1_20130819-arm-1.tgz:  Upgraded.
+--------------------------+
Sat Aug 17 22:54:12 UTC 2013
a/bash-4.2.045-arm-1.tgz:  Upgraded.
a/dialog-1.2_20130523-arm-1.tgz:  Upgraded.
a/e2fsprogs-1.42.8-arm-2.tgz:  Rebuilt.
  Moved /sbin/fsck to /sbin/fsck-e2fsprogs to eliminate package overlap
  with util-linux.  Thanks to Sl4ck3ver.
a/kernel-modules-armv7-3.10.7_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.7_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.7_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.7-arm-1.tgz:  Upgraded.
  Added support for:
   * OMAP2/3/4/5
   * ARM Versatile Express
a/kernel_kirkwood-3.10.7-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.7-arm-1.tgz:  Upgraded.
a/sysvinit-2.88dsf-arm-4.tgz:  Rebuilt.
  Removed /usr/bin/mountpoint, since this utility is part of util-linux.
  Thanks to Sl4ck3ver.
ap/mariadb-5.5.32-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.7-arm-1.tgz:  Upgraded.
kde/amarok-2.8.0-arm-1.tgz:  Upgraded.
l/boost-1.54.0-arm-2.tgz:  Rebuilt.
  Reverted changeset 82498 to fix building the OQGRAPH Engine for MariaDB.
n/dhcpcd-6.0.5-arm-2.tgz:  Rebuilt.
  Don't run the wpa_supplicant hook, since rc.inet1, NetworkManager, and wicd
  will all do that already, and running it with WEP breaks the network.
  Properly consider the search list (upstream patch).
  Thanks to Robby Workman.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Tue Aug 13 08:04:24 UTC 2013
a/kernel-modules-armv7-3.10.6_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.6_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.6_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.6-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.6-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.6-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.6-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Fri Aug  9 19:36:43 UTC 2013
ap/slackpkg-2.82.0-noarch-8.tgz:  Rebuilt.
  Added USA, Australia, Brazil and Russia mirrors to the default mirrors list.
  Thanks to Timo Jacob for providing the new mirror servers.
+--------------------------+
Fri Aug  9 06:27:42 UTC 2013
a/util-linux-2.21.2-arm-4.txz:  Rebuilt.
  Fixed data type in partx.h to prevent partx from silently truncating
  kernel table partition sizes/offsets to 4GB on 32-bit platforms.
  Thanks to Sl4ck3ver.
l/glib2-2.36.4-arm-1.txz:  Upgraded.
+--------------------------+
Tue Aug  6 21:39:12 UTC 2013
n/bind-9.9.3_P2-arm-1.tgz:  Upgraded.
  This update fixes a security issue where a specially crafted query can cause
  BIND to terminate abnormally, resulting in a denial of service.
  For more information, see:
    https://kb.isc.org/article/AA-01015
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
  (* Security fix *)
n/httpd-2.4.6-arm-1.tgz:  Upgraded.
  This update addresses two security issues:
  * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against
    a URI handled by mod_dav_svn with the source href (sent as part of the
    request body as XML) pointing to a URI that is not configured for DAV
    will trigger a segfault.
  * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that
    dirty flag is respected when saving sessions, and ensure the session ID
    is changed each time the session changes.  This changes the format of the
    updatesession SQL statement.  Existing configurations must be changed.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
  (* Security fix *)
n/samba-4.0.8-arm-1.tgz:  Upgraded.
  This update fixes missing integer wrap protection in an EA list reading
  that can allow authenticated or guest connections to cause the server to
  loop, resulting in a denial of service.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
  (* Security fix *)
+--------------------------+
Mon Aug  5 21:35:13 UTC 2013
a/aaa_base-14.0-arm-5.tgz:  Rebuilt.
  Updated /etc/os-release to include the new URL for the Slackware ARM web site.
a/etc-14.1-arm-1.tgz:  Upgraded.
  Disabled '.' at the end of non-root path, but added new scripts
  in /etc/profile.d/ to allow enabling it systemwide if desired.
a/floppy-5.5-arm-3.tgz:  Rebuilt.
  Upgraded to mtools-4.0.18.
a/glibc-solibs-2.17-arm-10.tgz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-10.tgz:  Rebuilt.
  Upgraded to tzcode2013d and tzdata2013d.
a/kernel-modules-armv7-3.10.5_armv7-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.10.5_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.10.5_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.5-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.10.5-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.5-arm-1.tgz:  Upgraded.
d/kernel-headers-3.10.5-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.5-arm-1.tgz:  Upgraded.
kde/calligra-2.7.1-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca@valencia-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-cs-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-da-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-it-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.7.1-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.7.1-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-10.tgz:  Rebuilt.
  Built against Linux 3.10.5 Kernel headers.
l/glibc-i18n-2.17-arm-10.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-10.tgz:  Rebuilt.
n/dhcpcd-6.0.5-arm-1.tgz:  Upgraded.
  Thanks to Roy Marples and Robby Workman for the fixes in this new
  upstream release.
n/ethtool-3.10-arm-1.tgz:  Upgraded.
n/gnupg-1.4.14-arm-1.tgz:  Upgraded.
  Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
  secret keys.
  For more information, see:
    http://eprint.iacr.org/2013/448
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
  (* Security fix *)
n/iproute2-3.10.0-arm-1.tgz:  Upgraded.
n/libgcrypt-1.5.3-arm-1.tgz:  Upgraded.
  Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
  secret keys.
  For more information, see:
    http://eprint.iacr.org/2013/448
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
  (* Security fix *)
x/iceauth-1.0.6-arm-1.tgz:  Upgraded.
x/libX11-1.6.1-arm-1.tgz:  Upgraded.
x/libXfont-1.4.6-arm-1.tgz:  Upgraded.
x/libdrm-2.4.46-arm-1.tgz:  Upgraded.
x/libpciaccess-0.13.2-arm-1.tgz:  Upgraded.
x/mesa-9.1.6-arm-1.tgz:  Upgraded.
x/mkfontscale-1.1.1-arm-1.tgz:  Upgraded.
x/videoproto-2.3.2-arm-1.tgz:  Upgraded.
x/xconsole-1.0.6-arm-1.tgz:  Upgraded.
x/xcursor-themes-1.0.4-arm-1.tgz:  Upgraded.
x/xf86-input-evdev-2.8.1-arm-1.tgz:  Upgraded.
x/xfd-1.1.2-arm-1.tgz:  Upgraded.
x/xhost-1.0.6-arm-1.tgz:  Upgraded.
x/xrandr-1.4.1-arm-1.tgz:  Upgraded.
x/xterm-296-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Wed Jul 31 19:56:31 UTC 2013

Thanks to Robby Workman for updates on libnl*, dhcpcd, and wpa_supplicant.

/INSTALL_TEGRA.TXT:  Updated.
  In the Kernel and initial RAM disk file names, switch '-tegra' with '-armv7'
  to support the new generic ARMv7 kernel.
a/gawk-4.1.0-arm-2.tgz:  Rebuilt.
  Fixed --libdir.  Thanks to Speek.
a/kernel_tegra-3.9.10-arm-1.tgz:  Removed.
  These packages have been replaced by a generic Kernel that supports a range of
  systems that have an ARMv7 or greater CPU.  If you're a Tegra20 (principally a
  Compulab TrimSlice) user, you'll need to upgrade the packages like this:

   # upgradepkg kernel_tegra%kernel_armv7-3.10.4-arm-1.tgz
   # upgradepkg kernel-modules_tegra%kernel-modules-armv7-3.10.4_armv7-arm-1.tgz

  Also see section 5.0 ('Booting the Slackware ARM OS') of /INSTALL_TEGRA.TXT to
  adjust your U-Boot parameters to support the new 'armv7' name.
  Look for the U-Boot configuration line below the text:
     'Configure the U-Boot loader to load the Kernel and Initial RAM disk:'
  Essentially we've just switched the Kernel and initial RAM disk files from
  '-tegra' to '-armv7'.
  You will need to reboot your device into the U-Boot prompt in order to change
  the U-Boot configuration.
a/kernel-modules-armv7-3.10.4_armv7-arm-1.tgz:  Added.
a/kernel-modules-kirkwood-3.10.4_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz:  Removed.
a/kernel-modules-versatile-3.10.4_versatile-arm-1.tgz:  Upgraded.
a/kernel_armv7-3.10.4-arm-1.tgz:  Added.
  This is a generic ARMv7 kernel to support the multitude of devices out there
  which have an ARMv7 or higher CPU.  This is the first version of this generic
  kernel, so I expect to add new device support over time.
a/kernel_kirkwood-3.10.4-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.10.4-arm-1.tgz:  Upgraded.
ap/sqlite-3071700-arm-1.tgz:  Upgraded.
k/kernel-source-3.10.4-arm-1.tgz:  Upgraded.
l/libnl-1.1.4-arm-1.tgz:  Upgraded.
l/libnl3-3.2.21-arm-1.tgz:  Upgraded.
n/NetworkManager-0.9.8.2-arm-2.tgz:  Rebuilt.
  Switched back to dhcpcd instead of dhclient as the default DHCP client in
  the NetworkManager.conf file.  Either one will work, but it's probably
  better to use dhcpcd by default to avoid a nasty surprise for people who
  didn't install the dhcp package since they aren't running a DHCP server.
n/dhcpcd-6.0.4-arm-1.tgz:  Upgraded.
n/nmap-6.40-arm-1.tgz:  Upgraded.
  Thanks to ponce for the SlackBuild patch.
n/wpa_supplicant-2.0-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
isolinux/uinitrd-tegra.img:  Removed.
  Replaced with uinitrd-armv7.img.
kernels/tegra:  Removed.
  Replaced with armv7.
kernels/*:  Upgraded.
+--------------------------+
Sat Jul 27 07:50:05 UTC 2013
d/llvm-3.3-arm-2.tgz:  Rebuilt.
  Recompiled with --enable-experimental-targets=R600.
  Thanks to Nick Blizzard.
l/dconf-0.16.1-arm-1.tgz:  Upgraded.
l/gnome-themes-standard-3.8.2-arm-1.tgz:  Upgraded.
l/gstreamer-0.10.36-arm-3.tgz:  Rebuilt.
  Recompiled with --enable-glib-asserts=no to reduce debugging output.
  Thanks to Willy Sudiarto Raharjo.
l/gtk+2-2.24.20-arm-1.tgz:  Upgraded.
  This moves immodules.cache (formerly gtk.immodules) under libdir, allowing
  us to drop the hostname triplet patch that was needed for multilib.
  Thanks to Robby Workman.
l/gtk+3-3.8.2-arm-2.tgz:  Rebuilt.
  Dropped the host triplet patch since GTK+3 will use a reasonable directory
  for immodules.cache by default.  Fixed the update script to work properly.
  Thanks to Robby Workman.
l/media-player-info-18-arm-1.tgz:  Upgraded.
n/ca-certificates-20130610-noarch-2.tgz:  Rebuilt.
  Fixed packaging bug that resulted in missing cacert.org certs.
  Thanks to mancha.
x/mesa-9.1.5-arm-1.tgz:  Upgraded.
+--------------------------+
Thu Jul 18 06:40:02 UTC 2013
a/kernel-modules-kirkwood-3.9.10_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.10_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.10-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.9.10-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.9.10-arm-1.tgz:  Upgraded.
a/mtd-utils-170713-arm-1.tgz:  Upgraded.
a/u-boot-tools-2013.04-arm-1.tgz:  Upgraded.
ap/ddrescue-1.17-arm-1.tgz:  Upgraded.
ap/mc-4.8.9-arm-1.tgz:  Upgraded.
k/kernel-source-3.9.10-arm-1.tgz:  Upgraded.
n/cyrus-sasl-2.1.23-arm-4.tgz:  Rebuilt.
  Patched for new glibc crypt().  Thanks to mancha.
n/php-5.4.17-arm-1.tgz:  Upgraded.
  This update fixes an issue where XML in PHP does not properly consider
  parsing depth, which allows remote attackers to cause a denial of service
  (heap memory corruption) or possibly have unspecified other impact via a
  crafted document that is processed by the xml_parse_into_struct function.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113
  (* Security fix *)
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Thu Jul 11 18:18:30 UTC 2013
a/acpid-2.0.19-arm-1.tgz:  Upgraded.
a/dbus-1.6.12-arm-1.tgz:  Upgraded.
  This update fixes a security issue where misuse of va_list could be used to
  cause a denial of service for system services.
  Vulnerability reported by Alexandru Cornea.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
  (* Security fix *)
a/kernel-firmware-20130708git-noarch-1.tgz:  Upgraded.
a/lvm2-2.02.98-arm-1.tgz:  Upgraded.
a/reiserfsprogs-3.6.23-arm-1.tgz:  Upgraded.
a/sdparm-1.08-arm-1.tgz:  Upgraded.
a/xz-5.0.5-arm-1.tgz:  Upgraded.
ap/lsscsi-0.27-arm-1.tgz:  Upgraded.
d/cvs-1.11.23-arm-2.tgz:  Rebuilt.
  Patched for new glibc crypt().  Thanks to mancha.
d/doxygen-1.8.4-arm-1.tgz:  Upgraded.
d/git-1.8.3.2-arm-1.tgz:  Upgraded.
d/llvm-3.3-arm-1.tgz:  Upgraded.
kde/amarok-2.7.1-arm-4.tgz:  Rebuilt.
kde/ark-4.10.5-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.5-arm-1.tgz:  Upgraded.
kde/bluedevil-1.3.1-arm-5.tgz:  Rebuilt.
kde/bomber-4.10.5-arm-1.tgz:  Upgraded.
kde/bovo-4.10.5-arm-1.tgz:  Upgraded.
kde/calligra-2.6.4-arm-3.tgz:  Rebuilt.
kde/dragon-4.10.5-arm-1.tgz:  Upgraded.
kde/filelight-4.10.5-arm-1.tgz:  Upgraded.
kde/granatier-4.10.5-arm-1.tgz:  Upgraded.
kde/gwenview-4.10.5-arm-1.tgz:  Upgraded.
kde/juk-4.10.5-arm-1.tgz:  Upgraded.
kde/k3b-2.0.2_20120226.git-arm-5.tgz:  Rebuilt.
kde/kaccessible-4.10.5-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.5-arm-1.tgz:  Upgraded.
kde/kamera-4.10.5-arm-1.tgz:  Upgraded.
kde/kapman-4.10.5-arm-1.tgz:  Upgraded.
kde/kate-4.10.5-arm-1.tgz:  Upgraded.
kde/katomic-4.10.5-arm-1.tgz:  Upgraded.
kde/kaudiocreator-1.3-arm-5.tgz:  Rebuilt.
kde/kblackbox-4.10.5-arm-1.tgz:  Upgraded.
kde/kblocks-4.10.5-arm-1.tgz:  Upgraded.
kde/kbounce-4.10.5-arm-1.tgz:  Upgraded.
kde/kbreakout-4.10.5-arm-1.tgz:  Upgraded.
kde/kcalc-4.10.5-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.5-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.5-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.5-arm-1.tgz:  Upgraded.
kde/kde-baseapps-4.10.5-arm-1.tgz:  Upgraded.
kde/kde-runtime-4.10.5-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.5-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.5-arm-1.tgz:  Upgraded.
kde/kdeadmin-4.10.5-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.5-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.5-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.5-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.5-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.5-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.5-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.5-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.5-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.5-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.5-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.5-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.5-arm-1.tgz:  Upgraded.
kde/kdevelop-4.5.1-arm-3.tgz:  Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-5.tgz:  Rebuilt.
kde/kdevelop-php-1.5.1-arm-3.tgz:  Rebuilt.
kde/kdevelop-php-docs-1.5.1-arm-3.tgz:  Rebuilt.
kde/kdevplatform-1.5.1-arm-3.tgz:  Rebuilt.
kde/kdewebdev-4.10.5-arm-1.tgz:  Upgraded.
kde/kdf-4.10.5-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.5-arm-1.tgz:  Upgraded.
kde/kfloppy-4.10.5-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.5-arm-1.tgz:  Upgraded.
kde/kgamma-4.10.5-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.5-arm-1.tgz:  Upgraded.
kde/kgpg-4.10.5-arm-1.tgz:  Upgraded.
kde/kigo-4.10.5-arm-1.tgz:  Upgraded.
kde/killbots-4.10.5-arm-1.tgz:  Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-5.tgz:  Rebuilt.
kde/kiriki-4.10.5-arm-1.tgz:  Upgraded.
kde/kjumpingcube-4.10.5-arm-1.tgz:  Upgraded.
kde/klickety-4.10.5-arm-1.tgz:  Upgraded.
kde/klines-4.10.5-arm-1.tgz:  Upgraded.
kde/kmag-4.10.5-arm-1.tgz:  Upgraded.
kde/kmahjongg-4.10.5-arm-1.tgz:  Upgraded.
kde/kmines-4.10.5-arm-1.tgz:  Upgraded.
kde/kmix-4.10.5-arm-1.tgz:  Upgraded.
kde/kmousetool-4.10.5-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.5-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.5-arm-1.tgz:  Upgraded.
kde/knetwalk-4.10.5-arm-1.tgz:  Upgraded.
kde/kolf-4.10.5-arm-1.tgz:  Upgraded.
kde/kollision-4.10.5-arm-1.tgz:  Upgraded.
kde/kolourpaint-4.10.5-arm-1.tgz:  Upgraded.
kde/konquest-4.10.5-arm-1.tgz:  Upgraded.
kde/konsole-4.10.5-arm-1.tgz:  Upgraded.
kde/korundum-4.10.5-arm-1.tgz:  Upgraded.
kde/kpat-4.10.5-arm-1.tgz:  Upgraded.
kde/kplayer-0.7.2-arm-5.tgz:  Rebuilt.
kde/kremotecontrol-4.10.5-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.5-arm-1.tgz:  Upgraded.
kde/kross-interpreters-4.10.5-arm-1.tgz:  Upgraded.
kde/kruler-4.10.5-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.5-arm-1.tgz:  Upgraded.
kde/kscreen-1.0-arm-2.tgz:  Rebuilt.
kde/kshisen-4.10.5-arm-1.tgz:  Upgraded.
kde/ksirk-4.10.5-arm-1.tgz:  Upgraded.
kde/ksnakeduel-4.10.5-arm-1.tgz:  Upgraded.
kde/ksnapshot-4.10.5-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.5-arm-1.tgz:  Upgraded.
kde/ksquares-4.10.5-arm-1.tgz:  Upgraded.
kde/ksudoku-4.10.5-arm-1.tgz:  Upgraded.
kde/ktimer-4.10.5-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-5.tgz:  Rebuilt.
kde/ktuberling-4.10.5-arm-1.tgz:  Upgraded.
kde/kubrick-4.10.5-arm-1.tgz:  Upgraded.
kde/kwallet-4.10.5-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.3.2-arm-5.tgz:  Rebuilt.
kde/libkcddb-4.10.5-arm-1.tgz:  Upgraded.
kde/libkcompactdisc-4.10.5-arm-1.tgz:  Upgraded.
kde/libkdcraw-4.10.5-arm-1.tgz:  Upgraded.
kde/libkdegames-4.10.5-arm-1.tgz:  Upgraded.
kde/libkexiv2-4.10.5-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.5-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.5-arm-1.tgz:  Upgraded.
kde/libksane-4.10.5-arm-1.tgz:  Upgraded.
kde/libkscreen-1.0-arm-2.tgz:  Rebuilt.
kde/libktorrent-1.3.1-arm-10.tgz:  Rebuilt.
kde/lskat-4.10.5-arm-1.tgz:  Upgraded.
kde/mplayerthumbs-4.10.5-arm-1.tgz:  Upgraded.
kde/nepomuk-core-4.10.5-arm-1.tgz:  Upgraded.
kde/nepomuk-widgets-4.10.5-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0.8-arm-5.tgz:  Rebuilt.
kde/okular-4.10.5-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.4-arm-3.tgz:  Rebuilt.
kde/oxygen-gtk3-1.1.4-arm-3.tgz:  Rebuilt.
kde/oxygen-icons-4.10.5-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.5-arm-1.tgz:  Upgraded.
kde/perlkde-4.10.5-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.5-arm-1.tgz:  Upgraded.
kde/picmi-4.10.5-arm-1.tgz:  Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-5.tgz:  Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-5.tgz:  Rebuilt.
kde/print-manager-4.10.5-arm-1.tgz:  Upgraded.
kde/qtruby-4.10.5-arm-1.tgz:  Upgraded.
kde/skanlite-1.0-arm-5.tgz:  Rebuilt.
kde/smokegen-4.10.5-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.5-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.5-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.5-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.5-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.5-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-5.tgz:  Rebuilt.
kdei/kde-l10n-ar-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bg-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bs-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca@valencia-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-cs-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-da-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-de-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-el-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-en_GB-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-es-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-et-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-eu-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fa-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fi-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fr-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ga-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-gl-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-he-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hi-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hr-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hu-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ia-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-is-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-it-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ja-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-kk-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-km-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ko-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lt-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lv-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-mr-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nb-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nds-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nl-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nn-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pa-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pl-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt_BR-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ro-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ru-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-si-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sk-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sl-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sr-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sv-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tg-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-th-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tr-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ug-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-uk-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-vi-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-wa-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_CN-4.10.5-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_TW-4.10.5-noarch-1.tgz:  Upgraded.
l/akonadi-1.9.2-arm-1.tgz:  Upgraded.
l/alsa-lib-1.0.27.2-arm-1.tgz:  Upgraded.
l/boost-1.54.0-arm-1.tgz:  Upgraded.
l/dbus-python-1.2.0-arm-1.tgz:  Upgraded.
l/freetype-2.5.0.1-arm-1.tgz:  Upgraded.
l/libpcap-1.4.0-arm-1.tgz:  Upgraded.
l/sg3_utils-1.36-arm-1.tgz:  Upgraded.
n/ModemManager-0.6.2.0-arm-1.tgz:  Upgraded.
n/NetworkManager-0.9.8.2-arm-1.tgz:  Upgraded.
n/ca-certificates-20130610-noarch-1.tgz:  Upgraded.
n/dirmngr-1.1.1-arm-1.tgz:  Upgraded.
n/epic5-1.1.3-arm-3.tgz:  Rebuilt.
  Configured using --with-tcl=/usr/lib${LIBDIRSUFFIX}/tclConfig.sh.
n/gnupg-1.4.13-arm-1.tgz:  Upgraded.
n/gnupg2-2.0.20-arm-1.tgz:  Upgraded.
n/gpa-0.9.4-arm-1.tgz:  Upgraded.
n/gpgme-1.4.1-arm-1.tgz:  Upgraded.
n/libassuan-2.1.0-arm-1.tgz:  Upgraded.
n/libgcrypt-1.5.2-arm-1.tgz:  Upgraded.
n/libgpg-error-1.11-arm-1.tgz:  Upgraded.
n/libksba-1.3.0-arm-1.tgz:  Upgraded.
n/pinentry-0.8.3-arm-1.tgz:  Upgraded.
n/samba-4.0.7-arm-1.tgz:  Upgraded.
n/tcpdump-4.4.0-arm-1.tgz:  Upgraded.
n/whois-5.0.25-arm-1.tgz:  Upgraded.
x/libXi-1.7.2-arm-1.tgz:  Upgraded.
x/mesa-9.1.4-arm-1.tgz:  Upgraded.
x/xdm-1.1.11-arm-3.tgz:  Rebuilt.
  Patched for new glibc crypt().  Thanks to mancha.
x/xterm-295-arm-1.tgz:  Upgraded.
xap/network-manager-applet-0.9.8.2-arm-1.tgz:  Upgraded.
xap/xscreensaver-5.21-arm-2.tgz:  Rebuilt.
  Recompiled to fix the path to the GPL for various screensavers that use it
  as a source of text.
+--------------------------+
Fri Jul  5 07:34:33 UTC 2013
a/kernel-modules-kirkwood-3.9.9_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.9_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.9_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.9-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.9.9-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.9.9-arm-1.tgz:  Upgraded.
k/kernel-source-3.9.9-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Fri Jun 28 06:50:35 UTC 2013
a/aaa_elflibs-14.1-arm-2.tgz:  Rebuilt.
a/bash-4.2.037-arm-2.tgz:  Rebuilt.
a/cxxlibs-6.0.18-arm-1.tgz:  Upgraded.
a/dosfstools-3.0.20-arm-1.tgz:  Upgraded.
a/e2fsprogs-1.42.8-arm-1.tgz:  Upgraded.
a/ed-1.9-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.9.8_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.8_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.8_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.8-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.9.8-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.9.8-arm-1.tgz:  Upgraded.
a/mdadm-3.2.6-arm-1.tgz:  Upgraded.
a/mkinitrd-1.4.8-arm-1.tgz:  Upgraded.
  New busybox, changes to mdadm handling.
  Thanks to Robby Workman.
  Bugfix for new file command in mkinitrd_command_generator.sh.
  Thanks to Eric Hameleers.
a/procps-3.2.8-arm-4.tgz:  Rebuilt.
  Include header files.  Thanks to mancha.
a/sysklogd-1.5-arm-5.tgz:  Rebuilt.
  On new installations, restrict the ability to read logs to members of the
  root group.  Thanks to Kees Theunissen.
ap/alsa-utils-1.0.27.1-arm-1.tgz:  Upgraded.
ap/cdrtools-3.01a15-arm-1.tgz:  Upgraded.
ap/jed-0.99_19-arm-3.tgz:  Rebuilt.
ap/linuxdoc-tools-0.9.68-arm-4.tgz:  Rebuilt.
ap/lxc-0.9.0-arm-1.tgz:  Upgraded.
ap/mpg123-1.15.4-arm-1.tgz:  Upgraded.
ap/pm-utils-1.4.1-arm-4.tgz:  Rebuilt.
  Merged various patches.  Thanks to Robby Workman.
  Documentation fixes.  Thanks to Fabio Sangiovanni.
  Removed hooks that cause repeated commit=0 mount options with ext
  filesystems after suspend/resume.  Thanks to Marin Glibic.
  In the 49bluetooth-generic hook, don't take action unless the kernel supports
  rfkill, the rfkill binary is present, and rc.bluetooth is executable.
  Thanks to Grifulkin and Darth Vader for the bug report.
d/ruby-1.9.3_p448-arm-1.tgz:  Upgraded.
  This update patches a vulnerability in Ruby's SSL client that could allow
  man-in-the-middle attackers to spoof SSL servers via a valid certificate
  issued by a trusted certification authority.
  For more information, see:
    http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
  (* Security fix *)
k/kernel-source-3.9.8-arm-1.tgz:  Upgraded.
kde/amarok-2.7.1-arm-3.tgz:  Rebuilt.
kde/ark-4.10.4-arm-2.tgz:  Rebuilt.
kde/audiocd-kio-4.10.4-arm-2.tgz:  Rebuilt.
kde/bluedevil-1.3.1-arm-4.tgz:  Rebuilt.
kde/bomber-4.10.4-arm-2.tgz:  Rebuilt.
kde/bovo-4.10.4-arm-2.tgz:  Rebuilt.
kde/calligra-2.6.4-arm-2.tgz:  Rebuilt.
kde/dragon-4.10.4-arm-2.tgz:  Rebuilt.
kde/filelight-4.10.4-arm-2.tgz:  Rebuilt.
kde/granatier-4.10.4-arm-2.tgz:  Rebuilt.
kde/gwenview-4.10.4-arm-2.tgz:  Rebuilt.
kde/juk-4.10.4-arm-2.tgz:  Rebuilt.
kde/k3b-2.0.2_20120226.git-arm-4.tgz:  Rebuilt.
kde/kaccessible-4.10.4-arm-2.tgz:  Rebuilt.
kde/kactivities-4.10.4-arm-2.tgz:  Rebuilt.
kde/kamera-4.10.4-arm-3.tgz:  Rebuilt.
kde/kapman-4.10.4-arm-2.tgz:  Rebuilt.
kde/kate-4.10.4-arm-2.tgz:  Rebuilt.
kde/katomic-4.10.4-arm-2.tgz:  Rebuilt.
kde/kaudiocreator-1.3-arm-4.tgz:  Rebuilt.
kde/kblackbox-4.10.4-arm-2.tgz:  Rebuilt.
kde/kblocks-4.10.4-arm-2.tgz:  Rebuilt.
kde/kbounce-4.10.4-arm-2.tgz:  Rebuilt.
kde/kbreakout-4.10.4-arm-2.tgz:  Rebuilt.
kde/kcalc-4.10.4-arm-2.tgz:  Rebuilt.
kde/kcharselect-4.10.4-arm-2.tgz:  Rebuilt.
kde/kcolorchooser-4.10.4-arm-2.tgz:  Rebuilt.
kde/kde-base-artwork-4.10.4-arm-2.tgz:  Rebuilt.
kde/kde-baseapps-4.10.4-arm-4.tgz:  Rebuilt.
kde/kde-runtime-4.10.4-arm-3.tgz:  Rebuilt.
kde/kde-wallpapers-4.10.4-noarch-2.tgz:  Rebuilt.
kde/kde-workspace-4.10.4-arm-4.tgz:  Rebuilt.
kde/kdeadmin-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdeartwork-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdegraphics-mobipocket-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdegraphics-strigi-analyzer-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdegraphics-thumbnailers-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdelibs-4.10.4-arm-4.tgz:  Rebuilt.
kde/kdenetwork-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdepim-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdepim-runtime-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdepimlibs-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdeplasma-addons-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdesdk-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdetoys-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdevelop-4.5.1-arm-2.tgz:  Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-4.tgz:  Rebuilt.
kde/kdevelop-php-1.5.1-arm-2.tgz:  Rebuilt.
kde/kdevelop-php-docs-1.5.1-arm-2.tgz:  Rebuilt.
kde/kdevplatform-1.5.1-arm-2.tgz:  Rebuilt.
kde/kdewebdev-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdf-4.10.4-arm-2.tgz:  Rebuilt.
kde/kdiamond-4.10.4-arm-2.tgz:  Rebuilt.
kde/kfloppy-4.10.4-arm-2.tgz:  Rebuilt.
kde/kfourinline-4.10.4-arm-2.tgz:  Rebuilt.
kde/kgamma-4.10.4-arm-2.tgz:  Rebuilt.
kde/kgoldrunner-4.10.4-arm-2.tgz:  Rebuilt.
kde/kgpg-4.10.4-arm-2.tgz:  Rebuilt.
kde/kigo-4.10.4-arm-2.tgz:  Rebuilt.
kde/killbots-4.10.4-arm-2.tgz:  Rebuilt.
kde/kio-mtp-fae62fc_20121225git-arm-4.tgz:  Rebuilt.
kde/kiriki-4.10.4-arm-2.tgz:  Rebuilt.
kde/kjumpingcube-4.10.4-arm-2.tgz:  Rebuilt.
kde/klickety-4.10.4-arm-2.tgz:  Rebuilt.
kde/klines-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmag-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmahjongg-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmines-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmix-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmousetool-4.10.4-arm-2.tgz:  Rebuilt.
kde/kmouth-4.10.4-arm-2.tgz:  Rebuilt.
kde/knavalbattle-4.10.4-arm-2.tgz:  Rebuilt.
kde/knetwalk-4.10.4-arm-2.tgz:  Rebuilt.
kde/kolf-4.10.4-arm-2.tgz:  Rebuilt.
kde/kollision-4.10.4-arm-2.tgz:  Rebuilt.
kde/kolourpaint-4.10.4-arm-2.tgz:  Rebuilt.
kde/konquest-4.10.4-arm-2.tgz:  Rebuilt.
kde/konsole-4.10.4-arm-2.tgz:  Rebuilt.
kde/korundum-4.10.4-arm-2.tgz:  Rebuilt.
kde/kpat-4.10.4-arm-2.tgz:  Rebuilt.
kde/kplayer-0.7.2-arm-4.tgz:  Rebuilt.
kde/kremotecontrol-4.10.4-arm-2.tgz:  Rebuilt.
kde/kreversi-4.10.4-arm-2.tgz:  Rebuilt.
kde/kross-interpreters-4.10.4-arm-2.tgz:  Rebuilt.
kde/kruler-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksaneplugin-4.10.4-arm-2.tgz:  Rebuilt.
kde/kscreen-1.0-arm-1.tgz:  Upgraded.
kde/kshisen-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksirk-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksnakeduel-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksnapshot-4.10.4-arm-2.tgz:  Rebuilt.
kde/kspaceduel-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksquares-4.10.4-arm-2.tgz:  Rebuilt.
kde/ksudoku-4.10.4-arm-2.tgz:  Rebuilt.
kde/ktimer-4.10.4-arm-2.tgz:  Rebuilt.
kde/ktorrent-4.3.1-arm-4.tgz:  Rebuilt.
kde/ktuberling-4.10.4-arm-2.tgz:  Rebuilt.
kde/kubrick-4.10.4-arm-2.tgz:  Rebuilt.
kde/kwallet-4.10.4-arm-2.tgz:  Rebuilt.
kde/kwebkitpart-1.3.2-arm-4.tgz:  Rebuilt.
kde/libkcddb-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkcompactdisc-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkdcraw-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkdegames-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkexiv2-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkipi-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkmahjongg-4.10.4-arm-2.tgz:  Rebuilt.
kde/libksane-4.10.4-arm-2.tgz:  Rebuilt.
kde/libkscreen-1.0-arm-1.tgz:  Upgraded.
kde/libktorrent-1.3.1-arm-8.tgz:  Rebuilt.
kde/lskat-4.10.4-arm-2.tgz:  Rebuilt.
kde/mplayerthumbs-4.10.4-arm-2.tgz:  Rebuilt.
kde/nepomuk-core-4.10.4-arm-4.tgz:  Rebuilt.
kde/nepomuk-widgets-4.10.4-arm-2.tgz:  Rebuilt.
kde/networkmanagement-0.9.0.8-arm-4.tgz:  Rebuilt.
kde/okular-4.10.4-arm-2.tgz:  Rebuilt.
kde/oxygen-gtk2-1.3.4-arm-2.tgz:  Rebuilt.
kde/oxygen-gtk3-1.1.4-arm-2.tgz:  Rebuilt.
kde/oxygen-icons-4.10.4-arm-2.tgz:  Rebuilt.
kde/palapeli-4.10.4-arm-2.tgz:  Rebuilt.
kde/perlkde-4.10.4-arm-2.tgz:  Rebuilt.
kde/perlqt-4.10.4-arm-2.tgz:  Rebuilt.
kde/picmi-4.10.4-arm-2.tgz:  Rebuilt.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-4.tgz:  Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-4.tgz:  Rebuilt.
kde/print-manager-4.10.4-arm-2.tgz:  Rebuilt.
kde/qtruby-4.10.4-arm-2.tgz:  Rebuilt.
kde/skanlite-1.0-arm-4.tgz:  Rebuilt.
kde/smokegen-4.10.4-arm-2.tgz:  Rebuilt.
kde/smokekde-4.10.4-arm-2.tgz:  Rebuilt.
kde/smokeqt-4.10.4-arm-2.tgz:  Rebuilt.
kde/superkaramba-4.10.4-arm-2.tgz:  Rebuilt.
kde/svgpart-4.10.4-arm-2.tgz:  Rebuilt.
kde/sweeper-4.10.4-arm-2.tgz:  Rebuilt.
kde/wicd-kde-0.3.0_bcf27d8-arm-4.tgz:  Rebuilt.
l/aalib-1.4rc5-arm-4.tgz:  Rebuilt.
  Patched aalib.m4 to fix linking problems.  Thanks to gmgf.
l/alsa-lib-1.0.27.1-arm-1.tgz:  Upgraded.
l/gdk-pixbuf2-2.28.2-arm-1.tgz:  Upgraded.
l/glib2-2.36.3-arm-1.tgz:  Upgraded.
l/gnome-icon-theme-3.8.2-arm-2.tgz:  Rebuilt.
  Upgraded to gnome-icon-theme-symbolic-3.8.3.
l/gst-plugins-good-0.10.31-arm-3.tgz:  Rebuilt.
l/gtk+2-2.24.19-arm-1.tgz:  Upgraded.
l/gvfs-1.16.3-arm-1.tgz:  Upgraded.
l/pcre-8.33-arm-1.tgz:  Upgraded.
  Add --enable-pcre16 and --enable-pcre32 options, needed to build Qt5 with
  the system PCRE library.  Thanks to Larry Hajali.
l/qtscriptgenerator-0.2.0-arm-2.tgz:  Rebuilt.
  Packaged libqtscript_uitools.  Thanks to Luigi Trovato.
l/v4l-utils-0.9.5-arm-1.tgz:  Upgraded.
n/curl-7.31.0-arm-1.tgz:  Upgraded.
  This fixes a minor security issue where a decode buffer boundary flaw in
  libcurl could lead to heap corruption.
  For more information, see:
    http://curl.haxx.se/docs/adv_20130622.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
  (* Security fix *)
n/links-2.7-arm-2.tgz:  Rebuilt.
n/openssh-6.2p2-arm-1.tgz:  Upgraded.
x/libFS-1.0.5-arm-1.tgz:  Upgraded.
x/libX11-1.6.0-arm-1.tgz:  Upgraded.
x/libXau-1.0.8-arm-1.tgz:  Upgraded.
x/libXcursor-1.1.14-arm-1.tgz:  Upgraded.
x/libXext-1.3.2-arm-1.tgz:  Upgraded.
x/libXfixes-5.0.1-arm-1.tgz:  Upgraded.
x/libXinerama-1.1.3-arm-1.tgz:  Upgraded.
x/libXp-1.0.2-arm-1.tgz:  Upgraded.
x/libXrandr-1.4.1-arm-1.tgz:  Upgraded.
x/libXrender-0.9.8-arm-1.tgz:  Upgraded.
x/libXres-1.0.7-arm-1.tgz:  Upgraded.
x/libXt-1.1.4-arm-1.tgz:  Upgraded.
x/libXtst-1.2.2-arm-1.tgz:  Upgraded.
x/libXv-1.0.8-arm-1.tgz:  Upgraded.
x/libXvMC-1.0.8-arm-1.tgz:  Upgraded.
x/libXxf86dga-1.1.4-arm-1.tgz:  Upgraded.
x/libXxf86vm-1.1.3-arm-1.tgz:  Upgraded.
x/libdmx-1.1.3-arm-1.tgz:  Upgraded.
x/mesa-9.1.3-arm-1.tgz:  Upgraded.
x/xdpyinfo-1.3.1-arm-1.tgz:  Upgraded.
x/xf86-video-modesetting-0.8.0-arm-1.tgz:  Upgraded.
x/xf86-video-nouveau-1.0.8-arm-1.tgz:  Upgraded.
x/xf86-video-openchrome-0.3.3-arm-1.tgz:  Upgraded.
x/xterm-293-arm-1.tgz:  Upgraded.
xap/gimp-2.8.6-arm-1.tgz:  Upgraded.
xap/xine-ui-0.99.6-arm-2.tgz:  Rebuilt.
isolinux/*:  Rebuilt
kernels/*:  Upgraded.
+--------------------------+
Sun Jun 16 10:06:50 UTC 2013

Finally I've been able to get gcc-4.8.1 to compile a _bootable_ and stable Linux
Kernel version 3.9.6, so we now have gcc-4.8.1 in the D series!
(I've stowed gcc-4.7.2 away in '/pasture' just incase!)

In the kernel packages I have added module "crc32c" into the initrd to support
the "xfs" file system driver.  This should have automatically been added to the
initrd but due to a lack of an implicitly stated dependency, it is not.  For
more details, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608538 
If anybody sees any other modules failing to load due to missing symbols 
(everything looks fine in this Kernel version, but some may slip through in
future versions), please let me know.

The mini root filesystem for -current has also been updated:
 ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

 - Stuart.

/INSTALL_RASPBERRYPI.TXT:  Updated.
  The Raspberry Pi support information has been moved to the ARM section of
  the Slackware Documentation Project, so that it can be maintained by the 
  community:
    http://docs.slackware.com/howtos:hardware:arm:raspberrypi
a/glibc-solibs-2.17-arm-9.tgz:  Rebuilt.
a/glibc-zoneinfo-2013c-noarch-9.tgz:  Rebuilt.
a/kernel-modules-kirkwood-3.9.6_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.6_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.6_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.6-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.9.6-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.9.6-arm-1.tgz:  Upgraded.
a/sysvinit-scripts-2.0-noarch-13.tgz:  Rebuilt.
  Fixed detection of the ARM Versatile and Raspberry Pi devices when being
  installed from the Slackware Installer.
d/gcc-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-g++-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-gfortran-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-gnat-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-go-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-java-4.8.1-arm-1.tgz:  Upgraded.
d/gcc-objc-4.8.1-arm-1.tgz:  Upgraded.
d/kernel-headers-3.9.6-arm-1.tgz:  Upgraded.
k/kernel-source-3.9.6-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-cs-2.6.4-noarch-1.tgz:  Added.
kdei/calligra-l10n-da-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-en_GB-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-it-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.6.4-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.6.4-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-9.tgz:  Rebuilt.
  Built against Linux 3.9.6 Kernel headers and compiled with gcc-4.8.1.
l/glibc-i18n-2.17-arm-9.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-9.tgz:  Rebuilt.
isolinux/*:  Rebuilt.
  When installing on a Raspberry Pi, suggest to the user that they disable fsck
  checks; since without an RTC, a time-based fsck will run whenever the OS is
  booted.  This is the same check you may have seen when installing on the
  QEMU/ARM Versatile platform.
  Thanks to stanley garvey for the suggestion.
kernels/*:  Upgraded.
pasture/gcc-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-g++-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-gfortran-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-gnat-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-go-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-java-4.7.2-arm-4.tgz:  Moved here from the D series.
pasture/gcc-objc-4.7.2-arm-4.tgz:  Moved here from the D series.
+--------------------------+
Wed Jun 12 18:34:41 UTC 2013
a/gzip-1.6-arm-1.tgz:  Upgraded.
a/kernel-firmware-20130610git-noarch-1.tgz:  Upgraded.
a/ntfs-3g-2013.1.13-arm-1.tgz:  Upgraded.
  Removed the HAL 10-ntfs-3g-policy.fdi file.
a/sysvinit-scripts-2.0-noarch-12.tgz:  Rebuilt.
  Open a login process on /dev/ttyAMA0 when this package is installed upon 
  the Raspberry Pi.
  Thanks to stanley garvey.
ap/gphoto2-2.5.2-arm-1.tgz:  Upgraded.
ap/hplip-3.13.5-arm-3.tgz:  Rebuilt.
  Recompiled against libgphoto2-2.5.2.
ap/ksh93-2012_08_01-arm-1.tgz:  Upgraded.
kde/kamera-4.10.4-arm-2.tgz:  Rebuilt.
  Recompiled against libgphoto2-2.5.2.
kde/kde-runtime-4.10.4-arm-2.tgz:  Rebuilt.
  Use -DSAMBA_INCLUDE_DIR=/usr/include/samba-4.0 with cmake to fix
  building kio_smb.so.  Thanks to alienBOB.
l/gvfs-1.16.2-arm-2.tgz:  Rebuilt.
  Recompiled against libgphoto2-2.5.2.
l/libgphoto2-2.5.2-arm-1.tgz:  Upgraded.
l/libxml2-2.9.1-arm-1.tgz:  Upgraded.
l/libxslt-1.1.28-arm-1.tgz:  Upgraded.
l/pil-1.1.7-arm-4.tgz:  Rebuilt.
  Recompiled against libgphoto2-2.5.2.
n/php-5.4.16-arm-1.tgz:  Upgraded.
  This is a bugfix release.  It also fixes a security issue -- a heap-based
  overflow in the quoted_printable_encode() function, which could be used by
  a remote attacker to crash PHP or execute code as the 'apache' user.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
  (* Security fix *)
x/mesa-9.1.2-arm-2.tgz:  Rebuilt.
  Recompiled adding the configuration option '--enable-xa'.
x/xdg-utils-1.1.0_rc1-arm-3.tgz:  Rebuilt.
  Support the MATE DE.  Thanks to T3slider.
xap/sane-1.0.23-arm-2.tgz:  Rebuilt.
  Recompiled against libgphoto2-2.5.2.
  Removed the HAL 10-libsane.fdi file.
  Modified the udev rules so they'll be processed on change actions as well
  as add actions, which might fix the device permissions errors some people
  have reported.  Thanks to Phil Bevan.
+--------------------------+
Sun Jun  9 07:18:28 UTC 2013
a/kernel-modules-kirkwood-3.9.5_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.5_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.5_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.5-arm-1.tgz:  Upgraded.
  Compiled I2C into the kernel to keep aligned with the Tegra kernel.
a/kernel_tegra-3.9.5-arm-1.tgz:  Upgraded.
  Compiled 'rtc-em3027' into the kernel to support the RTC on the Trimslice.
  We previously had this loaded as a module from the installer and the initrd
  but it seemed to have trouble reading and setting the clock, so I've compiled
  it in to see if it helps (I'm not sure why it should help, but back in
  1996 this sort of approach was the cure ;-) )
  Compiled I2C into the kernel (rather than as a module) to satisfy dependencies.
a/kernel_versatile-3.9.5-arm-1.tgz:  Upgraded.
ap/hplip-3.13.5-arm-2.tgz:  Rebuilt.
  Background the udev hp-config_usb_printer process to avoid long delays.
  Thanks to timkb4cq.
ap/linuxdoc-tools-0.9.68-arm-3.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
ap/vim-7.3.1087-arm-1.tgz:  Upgraded.
  Vim patch 7.0.88 rewrote the regexp engine.  Unfortunately the new
  implementation was causing long delays of 10 seconds or more when opening or
  scrolling any file of a type for which vim does color syntax highlighting.
  Patch 7.3.1110 attempted to fix this, and more patches released today
  correct other bugs in this new regexp engine (including patch 7.3.1111 which
  doesn't even fully apply correctly).  Even with all the fixes applied, the
  new engine is grossly inefficient when compared with the old one, and it is
  obvious that vim is running much more slowly even on my fastest machine.
  It seems like the best course of action is to take all the patches before
  the one that changed the regexp engine and then give upstream some time to
  figure this all out.  Thanks to Benjamin Trigona-Harany for the bug report.
d/git-1.8.3-arm-1.tgz:  Upgraded.
d/perl-5.18.0-arm-1.tgz:  Upgraded.
d/subversion-1.7.10-arm-1.tgz:  Upgraded.
d/swig-2.0.10-arm-1.tgz:  Upgraded.
k/kernel-source-3.9.5-arm-1.tgz:  Upgraded.
kde/amarok-2.7.1-arm-2.tgz:  Rebuilt.
kde/ark-4.10.4-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.4-arm-1.tgz:  Upgraded.
kde/bluedevil-1.3.1-arm-3.tgz:  Rebuilt.
kde/bomber-4.10.4-arm-1.tgz:  Upgraded.
kde/bovo-4.10.4-arm-1.tgz:  Upgraded.
kde/calligra-2.6.4-arm-1.tgz:  Upgraded.
kde/dragon-4.10.4-arm-1.tgz:  Upgraded.
kde/filelight-4.10.4-arm-1.tgz:  Upgraded.
kde/granatier-4.10.4-arm-1.tgz:  Upgraded.
kde/gwenview-4.10.4-arm-1.tgz:  Upgraded.
kde/juk-4.10.4-arm-1.tgz:  Upgraded.
kde/k3b-2.0.2_20120226.git-arm-3.tgz:  Rebuilt.
kde/kaccessible-4.10.4-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.4-arm-1.tgz:  Upgraded.
kde/kamera-4.10.4-arm-1.tgz:  Upgraded.
kde/kapman-4.10.4-arm-1.tgz:  Upgraded.
kde/kate-4.10.4-arm-1.tgz:  Upgraded.
kde/katomic-4.10.4-arm-1.tgz:  Upgraded.
kde/kaudiocreator-1.3-arm-3.tgz:  Rebuilt.
kde/kblackbox-4.10.4-arm-1.tgz:  Upgraded.
kde/kblocks-4.10.4-arm-1.tgz:  Upgraded.
kde/kbounce-4.10.4-arm-1.tgz:  Upgraded.
kde/kbreakout-4.10.4-arm-1.tgz:  Upgraded.
kde/kcalc-4.10.4-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.4-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.4-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.4-arm-1.tgz:  Upgraded.
kde/kde-baseapps-4.10.4-arm-1.tgz:  Upgraded.
kde/kde-runtime-4.10.4-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.4-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.4-arm-1.tgz:  Upgraded.
kde/kdeadmin-4.10.4-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.4-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.4-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.4-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.4-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.4-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.4-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.4-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.4-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.4-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.4-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.4-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.4-arm-1.tgz:  Upgraded.
kde/kdevelop-4.5.1-arm-1.tgz:  Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-3.tgz:  Rebuilt.
kde/kdevelop-php-1.5.1-arm-1.tgz:  Upgraded.
kde/kdevelop-php-docs-1.5.1-arm-1.tgz:  Upgraded.
kde/kdevplatform-1.5.1-arm-1.tgz:  Upgraded.
kde/kdewebdev-4.10.4-arm-1.tgz:  Upgraded.
kde/kdf-4.10.4-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.4-arm-1.tgz:  Upgraded.
kde/kfloppy-4.10.4-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.4-arm-1.tgz:  Upgraded.
kde/kgamma-4.10.4-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.4-arm-1.tgz:  Upgraded.
kde/kgpg-4.10.4-arm-1.tgz:  Upgraded.
kde/kigo-4.10.4-arm-1.tgz:  Upgraded.
kde/killbots-4.10.4-arm-1.tgz:  Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-3.tgz:  Rebuilt.
kde/kiriki-4.10.4-arm-1.tgz:  Upgraded.
kde/kjumpingcube-4.10.4-arm-1.tgz:  Upgraded.
kde/klickety-4.10.4-arm-1.tgz:  Upgraded.
kde/klines-4.10.4-arm-1.tgz:  Upgraded.
kde/kmag-4.10.4-arm-1.tgz:  Upgraded.
kde/kmahjongg-4.10.4-arm-1.tgz:  Upgraded.
kde/kmines-4.10.4-arm-1.tgz:  Upgraded.
kde/kmix-4.10.4-arm-1.tgz:  Upgraded.
kde/kmousetool-4.10.4-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.4-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.4-arm-1.tgz:  Upgraded.
kde/knetwalk-4.10.4-arm-1.tgz:  Upgraded.
kde/kolf-4.10.4-arm-1.tgz:  Upgraded.
kde/kollision-4.10.4-arm-1.tgz:  Upgraded.
kde/kolourpaint-4.10.4-arm-1.tgz:  Upgraded.
kde/konquest-4.10.4-arm-1.tgz:  Upgraded.
kde/konsole-4.10.4-arm-1.tgz:  Upgraded.
kde/korundum-4.10.4-arm-1.tgz:  Upgraded.
kde/kpat-4.10.4-arm-1.tgz:  Upgraded.
kde/kplayer-0.7.2-arm-3.tgz:  Rebuilt.
kde/kremotecontrol-4.10.4-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.4-arm-1.tgz:  Upgraded.
kde/kross-interpreters-4.10.4-arm-1.tgz:  Upgraded.
kde/kruler-4.10.4-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.4-arm-1.tgz:  Upgraded.
kde/kscreen-0.0.71-arm-3.tgz:  Rebuilt.
kde/kshisen-4.10.4-arm-1.tgz:  Upgraded.
kde/ksirk-4.10.4-arm-1.tgz:  Upgraded.
kde/ksnakeduel-4.10.4-arm-1.tgz:  Upgraded.
kde/ksnapshot-4.10.4-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.4-arm-1.tgz:  Upgraded.
kde/ksquares-4.10.4-arm-1.tgz:  Upgraded.
kde/ksudoku-4.10.4-arm-1.tgz:  Upgraded.
kde/ktimer-4.10.4-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-3.tgz:  Rebuilt.
kde/ktuberling-4.10.4-arm-1.tgz:  Upgraded.
kde/kubrick-4.10.4-arm-1.tgz:  Upgraded.
kde/kwallet-4.10.4-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.3.2-arm-3.tgz:  Rebuilt.
kde/libkcddb-4.10.4-arm-1.tgz:  Upgraded.
kde/libkcompactdisc-4.10.4-arm-1.tgz:  Upgraded.
kde/libkdcraw-4.10.4-arm-1.tgz:  Upgraded.
kde/libkdegames-4.10.4-arm-1.tgz:  Upgraded.
kde/libkexiv2-4.10.4-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.4-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.4-arm-1.tgz:  Upgraded.
kde/libksane-4.10.4-arm-1.tgz:  Upgraded.
kde/libkscreen-0.0.71-arm-3.tgz:  Rebuilt.
kde/libktorrent-1.3.1-arm-6.tgz:  Rebuilt.
kde/lskat-4.10.4-arm-1.tgz:  Upgraded.
kde/mplayerthumbs-4.10.4-arm-1.tgz:  Upgraded.
kde/nepomuk-core-4.10.4-arm-1.tgz:  Upgraded.
kde/nepomuk-widgets-4.10.4-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0.8-arm-3.tgz:  Rebuilt.
kde/okular-4.10.4-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.4-arm-1.tgz:  Upgraded.
kde/oxygen-gtk3-1.1.4-arm-1.tgz:  Upgraded.
kde/oxygen-icons-4.10.4-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.4-arm-1.tgz:  Upgraded.
kde/perlkde-4.10.4-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.4-arm-1.tgz:  Upgraded.
kde/picmi-4.10.4-arm-1.tgz:  Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-3.tgz:  Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-3.tgz:  Rebuilt.
kde/print-manager-4.10.4-arm-1.tgz:  Upgraded.
kde/qtruby-4.10.4-arm-1.tgz:  Upgraded.
kde/skanlite-1.0-arm-3.tgz:  Rebuilt.
kde/smokegen-4.10.4-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.4-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.4-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.4-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.4-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.4-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-3.tgz:  Rebuilt.
kdei/kde-l10n-ar-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bg-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bs-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca@valencia-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-cs-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-da-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-de-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-el-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-en_GB-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-es-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-et-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-eu-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fa-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fi-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fr-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ga-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-gl-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-he-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hi-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hr-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hu-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ia-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-is-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-it-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ja-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-kk-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-km-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ko-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lt-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lv-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-mr-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nb-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nds-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nl-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nn-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pa-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pl-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt_BR-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ro-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ru-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-si-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sk-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sl-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sr-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sv-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tg-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-th-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tr-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ug-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-uk-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-vi-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-wa-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_CN-4.10.4-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_TW-4.10.4-noarch-1.tgz:  Upgraded.
l/icu4c-51.2-arm-1.tgz:  Upgraded.
l/libffi-3.0.13-arm-2.tgz:  Rebuilt.
  Patched to move the ffi include files back to /usr/include, and patched
  the pkgconfig file to point there as well.  The relocation of the include
  files to be outside of /usr/include worked for programs that used
  pkgconfig, but there are many programs that do not and this change broke
  compiling them.  Thanks to gmgf.
l/libical-1.0-arm-1.tgz:  Upgraded.
l/libproxy-0.4.11-arm-2.tgz:  Rebuilt.
l/pilot-link-0.12.5-arm-8.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
n/irssi-0.8.15-arm-7.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
n/net-snmp-5.7.2-arm-2.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
n/obexftp-0.23-arm-9.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
n/samba-4.0.6-arm-2.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
xap/imagemagick-6.8.5_9-arm-1.tgz:  Upgraded.
xap/pidgin-2.10.7-arm-3.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
xap/vim-gvim-7.3.1087-arm-1.tgz:  Upgraded.
xap/xchat-2.8.8-arm-8.tgz:  Rebuilt.
  Recompiled against perl-5.18.0.
xfce/orage-4.8.4-arm-2.tgz:  Rebuilt.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Tue Jun  4 19:40:11 UTC 2013
ap/vim-7.3.1109-arm-1.tgz:  Upgraded.
d/open-cobol-1.1-arm-2.tgz:  Rebuilt.
  Fixed slack-desc typo.
xap/vim-gvim-7.3.1109-arm-1.tgz:  Upgraded.
+--------------------------+
Sun Jun  2 08:34:06 UTC 2013
a/glibc-solibs-2.17-arm-8.tgz:  Rebuilt.
  Build against Linux 3.9.4 kernel headers.
a/glibc-zoneinfo-2013c-noarch-8.tgz:  Rebuilt.
a/kernel-modules-kirkwood-3.9.4_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.9.4_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.9.4_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.9.4-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.9.4-arm-1.tgz:  Upgraded.
  For some reason, upon reboot, this kernel will not cause the system to 
  actually reboot the device.  You'll need to manually hold down the power 
  button for a few seconds and cold start it.  I've checked the kernel options
  and cannot see anything odd.  I suspect it's a kernel bug.
a/kernel_versatile-3.9.4-arm-1.tgz:  Upgraded.
ap/mariadb-5.5.31-arm-1.tgz:  Upgraded.
ap/mc-4.8.8-arm-1.tgz:  Upgraded.
ap/vim-7.3.645-arm-1.tgz:  Upgraded.
d/kernel-headers-3.9.4-arm-1.tgz:  Upgraded.
d/python-2.7.5-arm-1.tgz:  Upgraded.
k/kernel-source-3.9.4-arm-1.tgz:  Upgraded.
l/glibc-2.17-arm-8.tgz:  Rebuilt.
  Build against Linux 3.9.4 kernel headers.
l/glibc-i18n-2.17-arm-8.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-8.tgz:  Rebuilt.
n/samba-4.0.6-arm-1.tgz:  Upgraded.
xap/vim-gvim-7.3.645-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Tue May 28 19:24:39 UTC 2013
a/aaa_elflibs-14.1-arm-1.tgz:  Upgraded.
a/file-5.14-arm-1.tgz:  Upgraded.
  Use magic.mgc instead of the flat magic files.
a/gawk-4.1.0-arm-1.tgz:  Upgraded.
a/sysvinit-scripts-2.0-noarch-11.tgz:  Rebuilt.
  Update glib schemas in rc.M.
a/tcsh-6.18.01-arm-2.tgz:  Rebuilt.
  Patched for new glibc crypt().  Thanks to mancha.
ap/ghostscript-9.07-arm-2.tgz:  Rebuilt.
  Applied upstream patch to add Trio library and use the included sprintf()
  function.  This fixes a rendering failure with locales that use commas
  for decimal.  Thanks to Heinz Wiesinger for the heads-up on this.
ap/hplip-3.13.5-arm-1.tgz:  Upgraded.
ap/itstool-1.2.0-arm-1.tgz:  Added.
  New dependency for gucharmap.
ap/slackpkg-2.82.0-noarch-7.tgz:  Rebuilt.
  Set DOWNLOAD_ALL=on in slackpkg.conf by default to avoid script failures
  caused by programs (wget is an example) that may require library updates.
  Without this option, a program might be needed again before the supporting
  libraries have been upgraded.
d/gdb-7.6-arm-1.tgz:  Upgraded.
d/open-cobol-1.1-arm-1.tgz:  Added.
  We're finally a mature operating system.  Enjoy.  :)
d/slacktrack-2.15-arm-1.tgz:  Upgraded.
d/swig-2.0.9-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.3-arm-2.tgz:  Rebuilt.
  Recompiled against pcre-8.32.
kde/kajongg-4.10.3-arm-1.tgz:  Removed.
  This requires some libraries that we don't ship, and that aren't worth
  adding just for a single game.
l/at-spi2-atk-2.8.1-arm-1.tgz:  Upgraded.
l/at-spi2-core-2.8.0-arm-1.tgz:  Upgraded.
l/atk-2.8.0-arm-1.tgz:  Upgraded.
l/dconf-0.16.0-arm-1.tgz:  Upgraded.
l/gcr-3.8.2-arm-1.tgz:  Upgraded.
l/gdk-pixbuf2-2.28.1-arm-1.tgz:  Upgraded.
l/glib-networking-2.36.2-arm-1.tgz:  Upgraded.
l/glib2-2.36.2-arm-1.tgz:  Upgraded.
l/gmp-5.1.2-arm-1.tgz:  Upgraded.
l/gnome-icon-theme-3.8.2-noarch-1.tgz:  Upgraded.
l/gnome-keyring-3.8.2-arm-1.tgz:  Upgraded.
l/gnome-themes-standard-3.8.1-arm-1.tgz:  Added.
  New dependency for gtk+3.
l/gobject-introspection-1.36.0-arm-1.tgz:  Upgraded.
l/gsettings-desktop-schemas-3.8.2-arm-1.tgz:  Upgraded.
l/gtk+2-2.24.18-arm-1.tgz:  Upgraded.
l/gtk+3-3.8.2-arm-1.tgz:  Upgraded.
l/gvfs-1.16.2-arm-1.tgz:  Upgraded.
l/harfbuzz-0.9.16-arm-1.tgz:  Added.
  New dependency for pango.
l/libcroco-0.6.8-arm-1.tgz:  Upgraded.
l/libgnome-keyring-3.8.0-arm-1.tgz:  Upgraded.
l/libsecret-0.15-arm-1.tgz:  Upgraded.
l/libsoup-2.42.2-arm-1.tgz:  Upgraded.
l/libtasn1-3.3-arm-1.tgz:  Upgraded.
l/pango-1.34.1-arm-1.tgz:  Upgraded.
l/pcre-8.32-arm-1.tgz:  Upgraded.
l/popt-1.16-arm-2.tgz:  Rebuilt.
  Make sure pkgconfig directory is in the right location.
l/slang-2.2.4-arm-3.tgz:  Rebuilt.
  Recompiled against pcre-8.32.
n/epic5-1.1.3-arm-2.tgz:  Rebuilt.
n/httpd-2.4.4-arm-2.tgz:  Rebuilt.
  Patched htpasswd hash generation bug.
  Thanks to MadMaverick9.
n/nettle-2.7-arm-1.tgz:  Upgraded.
n/network-scripts-14.1-noarch-1.tgz:  Upgraded.
  Handle ipv6 forwarding in rc.ip_forward.
  Thanks to ricky_cardo.
n/nfs-utils-1.2.8-arm-1.tgz:  Upgraded.
n/nmap-6.25-arm-2.tgz:  Rebuilt.
  Recompiled against pcre-8.32.
n/p11-kit-0.16.4-arm-1.tgz:  Upgraded.
n/php-5.4.15-arm-1.tgz:  Upgraded.
  Moved php-fpm.conf.default to /etc/php-fpm/.
  Thanks to Hristo Simeonov.
n/popa3d-1.0.2-arm-3.tgz:  Rebuilt.
  Patched for new glibc crypt().  Thanks to mancha.
n/wget-1.14-arm-2.tgz:  Rebuilt.
  Recompiled against pcre-8.32.
n/yptools-2.14-arm-1.tgz:  Upgraded.
  Upgraded to yp-tools-2.14, ypbind-mt-1.37.1, and ypserv-2.31.
  Patched for new glibc crypt().  Thanks to mancha.
tcl/tclx-8.4.1-arm-3.tgz:  Rebuilt.
x/appres-1.0.4-arm-1.tgz:  Upgraded.
x/bitmap-1.0.7-arm-1.tgz:  Upgraded.
x/fontconfig-2.10.93-arm-1.tgz:  Upgraded.
x/libfontenc-1.1.2-arm-1.tgz:  Upgraded.
x/pixman-0.30.0-arm-1.tgz:  Upgraded.
x/transset-1.0.1-arm-1.tgz:  Upgraded.
x/wqy-zenhei-font-ttf-0.8.38_1-noarch-2.tgz:  Upgraded.
  The package reverts to the 0.8.38 version due to reports that the newer
  version causes rendering issues with Japanese and Korean fonts.  I've
  found many references to this issue online, and have yet to see any
  solution for it besides reverting or removing the wqy-zenhei-font-ttf
  package altogether.  Some people have suggested dropping wqy-zenhei in
  favor of Droid Sans Fallback, but the glyph coverage is not as good with
  that font.  Probably the best solution for now is to go back to the
  version that seems to work (with a patch to the .conf file for
  compatibility with recent versions of fontconfig).
x/xf86-input-synaptics-1.7.1-arm-1.tgz:  Upgraded.
x/xfontsel-1.0.5-arm-1.tgz:  Upgraded.
x/xrefresh-1.0.5-arm-1.tgz:  Upgraded.
x/xterm-292-arm-1.tgz:  Upgraded.
x/xwininfo-1.1.3-arm-1.tgz:  Upgraded.
xap/gucharmap-3.8.2-arm-1.tgz:  Upgraded.
xfce/Thunar-1.6.3-arm-1.tgz:  Upgraded.
xfce/garcon-0.2.1-arm-1.tgz:  Upgraded.
xfce/libxfce4util-4.10.1-arm-1.tgz:  Upgraded.
xfce/xfce4-appfinder-4.10.1-arm-1.tgz:  Upgraded.
xfce/xfce4-notifyd-0.2.4-arm-1.tgz:  Upgraded.
xfce/xfce4-panel-4.10.1-arm-1.tgz:  Upgraded.
xfce/xfce4-session-4.10.1-arm-1.tgz:  Upgraded.
xfce/xfce4-settings-4.10.1-arm-1.tgz:  Upgraded.
xfce/xfce4-terminal-0.6.2-arm-1.tgz:  Upgraded.
xfce/xfwm4-4.10.1-arm-1.tgz:  Upgraded.
+--------------------------+
Sun May 19 20:49:51 UTC 2013

Hola! I've played around with Linux 3.9.x and had success with the kirkwood
platform, but on the Tegra20 (Trimslice) the NIC stops working after a couple
of seconds of network traffic; so for the time being we're sticking with the
3.8 series.  I will continue to look in to this.

a/glibc-solibs-2.17-arm-7.tgz:  Rebuilt.
a/glibc-zoneinfo-2013c-noarch-7.tgz:  Rebuilt.
a/kernel-firmware-20130505git-noarch-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.8.13_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.13_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.13_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.8.13-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.13-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.8.13-arm-1.tgz:  Upgraded.
a/shadow-4.1.5.1-arm-1.tgz:  Upgraded.
  Thanks to mancha for the improved crypt() NULL handling patch.
a/xfsprogs-3.1.11-arm-1.tgz:  Upgraded.
ap/aumix-2.9.1-arm-2.tgz:  Removed.
  This only works with OSS (or the ALSA OSS compatibility modules, which are
  now disabled by default).  Moving to /pasture.
ap/dmapi-2.2.12-arm-1.tgz:  Upgraded.
ap/rexima-1.4-arm-2.tgz:  Removed.
  This only works with OSS (or the ALSA OSS compatibility modules, which are
  now disabled by default).  Moving to /pasture.
ap/screen-4.0.3-arm-4.tgz:  Rebuilt.
  Patched for newer glibc crypt().
ap/sudo-1.8.6p8-arm-1.tgz:  Upgraded.
ap/xfsdump-3.1.3-arm-1.tgz:  Upgraded.
d/ccache-3.1.9-arm-1.tgz:  Upgraded.
d/kernel-headers-3.8.13-arm-1.tgz:  Upgraded.
d/python-2.7.4-arm-2.tgz:  Rebuilt.
d/ruby-1.9.3_p429-arm-1.tgz:  Upgraded.
  This update fixes a security issue in DL and Fiddle included in Ruby where
  tainted strings can be used by system calls regardless of the $SAFE level
  setting.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065
    http://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
  (* Security fix *)
d/slacktrack-2.14-arm-1.tgz:  Upgraded.
k/kernel-source-3.8.13-arm-1.tgz:  Upgraded.
kde/amarok-2.7.1-arm-1.tgz:  Upgraded.
kde/ark-4.10.3-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.3-arm-1.tgz:  Upgraded.
kde/bluedevil-1.3.1-arm-2.tgz:  Rebuilt.
kde/bomber-4.10.3-arm-1.tgz:  Upgraded.
kde/bovo-4.10.3-arm-1.tgz:  Upgraded.
kde/calligra-2.6.3-arm-2.tgz:  Rebuilt.
kde/dragon-4.10.3-arm-1.tgz:  Upgraded.
kde/filelight-4.10.3-arm-1.tgz:  Upgraded.
kde/granatier-4.10.3-arm-1.tgz:  Upgraded.
kde/gwenview-4.10.3-arm-1.tgz:  Upgraded.
kde/juk-4.10.3-arm-1.tgz:  Upgraded.
kde/k3b-2.0.2_20120226.git-arm-2.tgz:  Rebuilt.
kde/kaccessible-4.10.3-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.3-arm-1.tgz:  Upgraded.
kde/kajongg-4.10.3-arm-1.tgz:  Upgraded.
kde/kamera-4.10.3-arm-1.tgz:  Upgraded.
kde/kapman-4.10.3-arm-1.tgz:  Upgraded.
kde/kate-4.10.3-arm-1.tgz:  Upgraded.
kde/katomic-4.10.3-arm-1.tgz:  Upgraded.
kde/kaudiocreator-1.3-arm-2.tgz:  Rebuilt.
kde/kblackbox-4.10.3-arm-1.tgz:  Upgraded.
kde/kblocks-4.10.3-arm-1.tgz:  Upgraded.
kde/kbounce-4.10.3-arm-1.tgz:  Upgraded.
kde/kbreakout-4.10.3-arm-1.tgz:  Upgraded.
kde/kcalc-4.10.3-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.3-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.3-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.3-arm-1.tgz:  Upgraded.
kde/kde-baseapps-4.10.3-arm-2.tgz:  Rebuilt.
kde/kde-runtime-4.10.3-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.3-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.3-arm-2.tgz:  Rebuilt.
kde/kdeadmin-4.10.3-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.3-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.3-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.3-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.3-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.3-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.3-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.3-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.3-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.3-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.3-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.3-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.3-arm-1.tgz:  Upgraded.
kde/kdevelop-4.5.0-arm-2.tgz:  Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-2.tgz:  Rebuilt.
kde/kdevplatform-1.5.0-arm-2.tgz:  Rebuilt.
kde/kdewebdev-4.10.3-arm-1.tgz:  Upgraded.
kde/kdf-4.10.3-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.3-arm-1.tgz:  Upgraded.
kde/kfloppy-4.10.3-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.3-arm-1.tgz:  Upgraded.
kde/kgamma-4.10.3-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.3-arm-1.tgz:  Upgraded.
kde/kgpg-4.10.3-arm-1.tgz:  Upgraded.
kde/kigo-4.10.3-arm-1.tgz:  Upgraded.
kde/killbots-4.10.3-arm-1.tgz:  Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-2.tgz:  Rebuilt.
kde/kiriki-4.10.3-arm-1.tgz:  Upgraded.
kde/kjumpingcube-4.10.3-arm-1.tgz:  Upgraded.
kde/klickety-4.10.3-arm-1.tgz:  Upgraded.
kde/klines-4.10.3-arm-1.tgz:  Upgraded.
kde/kmag-4.10.3-arm-1.tgz:  Upgraded.
kde/kmahjongg-4.10.3-arm-1.tgz:  Upgraded.
kde/kmines-4.10.3-arm-1.tgz:  Upgraded.
kde/kmix-4.10.3-arm-1.tgz:  Upgraded.
kde/kmousetool-4.10.3-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.3-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.3-arm-1.tgz:  Upgraded.
kde/knetwalk-4.10.3-arm-1.tgz:  Upgraded.
kde/kolf-4.10.3-arm-1.tgz:  Upgraded.
kde/kollision-4.10.3-arm-1.tgz:  Upgraded.
kde/kolourpaint-4.10.3-arm-1.tgz:  Upgraded.
kde/konquest-4.10.3-arm-1.tgz:  Upgraded.
kde/konsole-4.10.3-arm-1.tgz:  Upgraded.
kde/korundum-4.10.3-arm-1.tgz:  Upgraded.
kde/kpat-4.10.3-arm-1.tgz:  Upgraded.
kde/kplayer-0.7.2-arm-2.tgz:  Rebuilt.
kde/kremotecontrol-4.10.3-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.3-arm-1.tgz:  Upgraded.
kde/kross-interpreters-4.10.3-arm-1.tgz:  Upgraded.
kde/kruler-4.10.3-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.3-arm-1.tgz:  Upgraded.
kde/kscreen-0.0.71-arm-2.tgz:  Rebuilt.
kde/kshisen-4.10.3-arm-1.tgz:  Upgraded.
kde/ksirk-4.10.3-arm-1.tgz:  Upgraded.
kde/ksnakeduel-4.10.3-arm-1.tgz:  Upgraded.
kde/ksnapshot-4.10.3-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.3-arm-1.tgz:  Upgraded.
kde/ksquares-4.10.3-arm-1.tgz:  Upgraded.
kde/ksudoku-4.10.3-arm-1.tgz:  Upgraded.
kde/ktimer-4.10.3-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-2.tgz:  Rebuilt.
kde/ktuberling-4.10.3-arm-1.tgz:  Upgraded.
kde/kubrick-4.10.3-arm-1.tgz:  Upgraded.
kde/kwallet-4.10.3-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.3.2-arm-2.tgz:  Rebuilt.
kde/libkcddb-4.10.3-arm-1.tgz:  Upgraded.
kde/libkcompactdisc-4.10.3-arm-1.tgz:  Upgraded.
kde/libkdcraw-4.10.3-arm-1.tgz:  Upgraded.
kde/libkdegames-4.10.3-arm-1.tgz:  Upgraded.
kde/libkexiv2-4.10.3-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.3-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.3-arm-1.tgz:  Upgraded.
kde/libksane-4.10.3-arm-1.tgz:  Upgraded.
kde/libkscreen-0.0.71-arm-2.tgz:  Rebuilt.
kde/libktorrent-1.3.1-arm-4.tgz:  Rebuilt.
kde/lskat-4.10.3-arm-1.tgz:  Upgraded.
kde/mplayerthumbs-4.10.3-arm-1.tgz:  Upgraded.
kde/nepomuk-core-4.10.3-arm-2.tgz:  Rebuilt.
kde/nepomuk-widgets-4.10.3-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0.8-arm-2.tgz:  Rebuilt.
kde/okular-4.10.3-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.3-arm-1.tgz:  Upgraded.
kde/oxygen-gtk3-1.1.3-arm-1.tgz:  Upgraded.
kde/oxygen-icons-4.10.3-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.3-arm-1.tgz:  Upgraded.
kde/perlkde-4.10.3-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.3-arm-1.tgz:  Upgraded.
kde/picmi-4.10.3-arm-1.tgz:  Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz:  Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz:  Rebuilt.
kde/print-manager-4.10.3-arm-1.tgz:  Upgraded.
kde/qtruby-4.10.3-arm-1.tgz:  Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz:  Removed.
  I think this is finally dead since it no longer compiles against the new
  version of kdevplatform.
kde/skanlite-1.0-arm-2.tgz:  Rebuilt.
kde/smokegen-4.10.3-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.3-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.3-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.3-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.3-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.3-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz:  Rebuilt.
kdei/kde-l10n-ar-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bg-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bs-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca@valencia-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-cs-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-da-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-de-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-el-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-en_GB-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-es-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-et-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-eu-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fa-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fi-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fr-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ga-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-gl-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-he-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hi-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hr-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hu-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ia-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-is-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-it-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ja-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-kk-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-km-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ko-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lt-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lv-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-mr-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nb-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nds-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nl-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nn-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pa-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pl-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt_BR-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ro-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ru-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-si-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sk-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sl-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sr-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sv-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tg-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-th-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tr-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ug-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-uk-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-vi-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-wa-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_CN-4.10.3-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_TW-4.10.3-noarch-1.tgz:  Upgraded.
l/alsa-lib-1.0.27-arm-2.tgz:  Rebuilt.
  Use __inline__ in the include files, not inline.  Otherwise programs that use
  c90 won't compile (noticed with libkcompactdisc).
l/clucene-2.3.3.4-arm-2.tgz:  Rebuilt.
  Include contrib-libs.  Thanks to Thomas Choi.
l/glibc-2.17-arm-7.tgz:  Rebuilt.
  Built against Linux 3.8.13 kernel headers.
l/glibc-i18n-2.17-arm-7.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-7.tgz:  Rebuilt.
l/mozilla-nss-3.14.3-arm-1.tgz:  Upgraded.
  Upgraded to nss-3.14.3 with nspr-4.9.6.
l/ncurses-5.9-arm-4.tgz:  Rebuilt.
  Applied all upstream patches for ncurses-5.9 and installed pkgconfig files.
  Thanks to Marin Glibic.
l/pil-1.1.7-arm-3.tgz:  Rebuilt.
n/ppp-2.4.5-arm-3.tgz:  Rebuilt.
  Patched for newer glibc crypt().
  Removed internal header file that conflicts with recent kernels.
n/samba-4.0.5-arm-1.tgz:  Upgraded.
n/tin-2.0.1-arm-1.tgz:  Upgraded.
tcl/expect-5.44.1.15-arm-2.tgz:  Rebuilt.
tcl/hfsutils-3.2.6-arm-3.tgz:  Rebuilt.
tcl/tcl-8.6.0-arm-1.tgz:  Upgraded.
tcl/tclx-8.4.1-arm-1.tgz:  Upgraded.
tcl/tix-8.4.3-arm-3.tgz:  Rebuilt.
tcl/tk-8.6.0-arm-1.tgz:  Upgraded.
xap/gnuchess-6.0.3-arm-2.tgz:  Rebuilt.
  Upgraded xboard to version 4.7.1.
xap/pidgin-2.10.7-arm-2.tgz:  Rebuilt.
xap/xchat-2.8.8-arm-7.tgz:  Rebuilt.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
pasture/aumix-2.9.1-arm-2.tgz:  Moved here from the AP series.
pasture/rexima-1.4-arm-2.tgz:  Moved here from the AP series.
+--------------------------+
Fri May  3 19:21:39 UTC 2013
ap/alsa-utils-1.0.27-arm-1.tgz:  Upgraded.
  Added rc.alsa-oss script, disabled by default so that applications that try
  to use OSS compatibility when they could be using ALSA won't steal exclusive
  access to the audio device.  Thanks to B. Watson.
l/alsa-lib-1.0.27-arm-1.tgz:  Upgraded.
x/mesa-9.1.2-arm-1.tgz:  Upgraded.
xap/imagemagick-6.8.5_4-arm-1.tgz:  Upgraded.
  Patched to fix an issue detecting the glib2 version at compile time.
  This should get SVG support working again.  Thanks to GazL.
xap/xmms-1.2.11-arm-4.tgz:  Rebuilt.
  Patched to use ALSA by default.  Thanks to B. Watson.
+--------------------------+
Wed May  1 19:03:27 UTC 2013
a/kernel-firmware-20130430git-noarch-1.tgz:  Upgraded.
kde/kdevelop-4.5.0-arm-1.tgz:  Upgraded.
kde/kdevplatform-1.5.0-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.3.2-arm-1.tgz:  Upgraded.
l/expat-2.1.0-arm-1.tgz:  Upgraded.
n/curl-7.30.0-arm-1.tgz:  Upgraded.
xap/gnuplot-4.6.3-arm-1.tgz:  Upgraded.
xap/imagemagick-6.8.5_3-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-4.8.0-arm-3.tgz:  Rebuilt.
  Patched to fix a bug that was breaking WINE with -O2 on x86_64, and probably
  affected other programs as well.  Thanks to Kirill Smirnov.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-3.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-3.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-3.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-3.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-3.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-3.tgz:  Rebuilt.
+--------------------------+
Mon Apr 29 19:17:41 UTC 2013
a/btrfs-progs-20130418-arm-1.tgz:  Upgraded.
  Make fsck.btrfs a link to /bin/true as recommended on the btrfs wiki.
a/glibc-solibs-2.17-arm-6.tgz:  Rebuilt.
a/glibc-zoneinfo-2013b-noarch-6.tgz:  Rebuilt.
a/kernel-firmware-20130426git-noarch-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.8.10_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.10_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.10_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.8.10-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.10-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.8.10-arm-1.tgz:  Upgraded.
d/kernel-headers-3.8.10-arm-1.tgz:  Upgraded.
e/emacs-24.3-arm-3.tgz:  Rebuilt.
  Recompiled using --with-x-toolkit=gtk2.
k/kernel-source-3.8.10-arm-1.tgz:  Upgraded.
l/glibc-2.17-arm-6.tgz:  Rebuilt.
  Built against Linux 3.8.10 kernel headers.
  Patched two crash bugs (CVE-2013-0242, CVE-2013-1914).  These do not allow
  code execution, and upstream agrees that they are low priority/severity.
  They are patched here since glibc was due for a kernel related rebuild
  anyway, but given the low priority/severity and possibility of introducing
  problems in production versions of glibc, they will backported only if
  further review indicates a necessity.
l/glibc-i18n-2.17-arm-6.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-6.tgz:  Rebuilt.
l/qt-4.8.4-arm-4.tgz:  Rebuilt.
  Patched to fix a plasma crash in KDE.
n/autofs-5.0.7-arm-2.tgz:  Rebuilt.
  Added /etc/auto.master.d directory.  Thanks to GazL.
n/proftpd-1.3.4c-arm-1.tgz:  Upgraded.
  Added mod_radius to the build as requested by chemfire.  I wasn't sure about
  this at first since it's a non-default and seldom used module, but since it
  doesn't do anything unless it has been configured it should be safe to
  include.
x/xf86-input-acecad-1.5.0-arm-4.tgz:  Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-4.tgz:  Rebuilt.
x/xf86-input-evdev-2.8.0-arm-2.tgz:  Rebuilt.
x/xf86-input-joystick-1.6.1-arm-4.tgz:  Rebuilt.
x/xf86-input-keyboard-1.7.0-arm-2.tgz:  Rebuilt.
x/xf86-input-mouse-1.9.0-arm-2.tgz:  Rebuilt.
x/xf86-input-penmount-1.5.0-arm-4.tgz:  Rebuilt.
x/xf86-input-synaptics-1.7.0-arm-2.tgz:  Rebuilt.
x/xf86-input-void-1.4.0-arm-4.tgz:  Rebuilt.
x/xf86-input-wacom-0.19.0-arm-3.tgz:  Rebuilt.
x/xf86-video-apm-1.2.5-arm-3.tgz:  Rebuilt.
x/xf86-video-ark-0.7.5-arm-3.tgz:  Rebuilt.
x/xf86-video-ast-0.97.0-arm-3.tgz:  Rebuilt.
x/xf86-video-ati-7.1.0-arm-3.tgz:  Rebuilt.
x/xf86-video-chips-1.2.5-arm-3.tgz:  Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-3.tgz:  Rebuilt.
x/xf86-video-dummy-0.3.6-arm-3.tgz:  Rebuilt.
x/xf86-video-fbdev-0.4.3-arm-5.tgz:  Rebuilt.
x/xf86-video-glint-1.2.8-arm-3.tgz:  Rebuilt.
x/xf86-video-i128-1.3.6-arm-3.tgz:  Rebuilt.
x/xf86-video-i740-1.3.4-arm-3.tgz:  Rebuilt.
x/xf86-video-mach64-6.9.4-arm-3.tgz:  Rebuilt.
x/xf86-video-mga-1.6.2-arm-3.tgz:  Rebuilt.
x/xf86-video-modesetting-0.7.0-arm-2.tgz:  Rebuilt.
x/xf86-video-neomagic-1.2.7-arm-3.tgz:  Rebuilt.
x/xf86-video-nouveau-1.0.7-arm-2.tgz:  Rebuilt.
x/xf86-video-nv-2.1.20-arm-4.tgz:  Rebuilt.
x/xf86-video-openchrome-0.3.2-arm-2.tgz:  Rebuilt.
x/xf86-video-r128-6.9.1-arm-4.tgz:  Rebuilt.
x/xf86-video-rendition-4.2.5-arm-3.tgz:  Rebuilt.
x/xf86-video-s3-0.6.5-arm-3.tgz:  Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-4.tgz:  Rebuilt.
x/xf86-video-savage-2.3.6-arm-4.tgz:  Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-4.tgz:  Rebuilt.
x/xf86-video-sis-0.10.7-arm-3.tgz:  Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-3.tgz:  Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-3.tgz:  Rebuilt.
x/xf86-video-tga-1.2.2-arm-3.tgz:  Rebuilt.
x/xf86-video-trident-1.3.6-arm-3.tgz:  Rebuilt.
x/xf86-video-tseng-1.2.5-arm-3.tgz:  Rebuilt.
x/xf86-video-v4l-0.2.0-arm-4.tgz:  Rebuilt.
x/xf86-video-vesa-2.3.2-arm-3.tgz:  Rebuilt.
x/xf86-video-vmware-13.0.1-arm-2.tgz:  Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-4.tgz:  Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-4.tgz:  Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-3.tgz:  Rebuilt.
x/xorg-server-1.13.4-arm-1.tgz:  Upgraded.
  This update fixes an input flush bug with evdev.  Under exceptional
  conditions (keyboard input during device hotplugging), this could leak
  a small amount of information intended for the X server.
  This issue was evaluated to be of low impact.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
    http://lists.x.org/archives/xorg-devel/2013-April/036014.html
  (* Security fix *)
x/xorg-server-xephyr-1.13.4-arm-1.tgz:  Upgraded.
x/xorg-server-xnest-1.13.4-arm-1.tgz:  Upgraded.
x/xorg-server-xvfb-1.13.4-arm-1.tgz:  Upgraded.
xap/imagemagick-6.8.4_10-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sat Apr 13 11:27:53 UTC 2013
a/kernel-modules-kirkwood-3.8.7_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.7_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.7_versatile-arm-1.tgz:  Upgraded.
  Patched for re-implement the legacy behaviour, allowing Linux to work with
  QEMU's emulation of the 'ARM Versatile' platform.
  I've performed a successful installation using QEMU-1.4.0 and this kernel
  and set of installer images.
  Thanks to Rob Landley for the patch and the explanation.
a/kernel_kirkwood-3.8.7-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.7-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.8.7-arm-1.tgz:  Upgraded.
k/kernel-source-3.8.7-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Thu Apr 11 19:44:16 UTC 2013

A note about the Kernel updates:

The '/boot/dtb' (Device Tree Blob) directory is now a symlink to
   /boot/dtb-<kernel version>
This is the approach Fedora have taken and it also makes sense in Slackware ARM
since everything else in /boot is versioned.  This way you can easily retain a
previous complete versioned set of initrd, {z,u}Image and dtb files when you
upgrade to a newer kernel release package.  If your /boot directory is on a file
system that supports symlinks, you can upgradepkg to these kernels without having
to make any amendments to your device's U-Boot configuration.

/INSTALL_TEGRA.TXT:  Updated.
  Updated section 0.0 ('U-Boot Firmware Upgrade') to explain how to upgrade
  to the latest available U-Boot release for the 'TrimSlice' device.

  If you're running the previous U-Boot release that only presents 512MB RAM to
  your OS, you may now upgrade to the latest available U-Boot release and use
  the full 1GB RAM.
  Follow section 0.0, then section 5.0 ('Booting the Slackware ARM OS').
a/glibc-solibs-2.17-arm-5.tgz:  Rebuilt.
  Built against Linux 3.8.6 kernel headers.
  Minimum kernel is now Linux 3.1.0 as this is the common base Kernel
  version in use on the Raspberry Pi when running Slackware ARM 14.0.  This will
  permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware
  release.
a/glibc-zoneinfo-2013b-noarch-5.tgz:  Rebuilt.
a/kernel-modules-kirkwood-3.8.6_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.6_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.6_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.8.6-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.6-arm-1.tgz:  Upgraded.
  Added the kernel configuration options below:
      CONFIG_EARLY_PRINTK=y
      CONFIG_TEGRA_DEBUG_UARTA=y
  Adding 'earlyprintk' to the kernel command line will allow boot messages to be
  displayed to the serial port of the Trimslice before the regular serial console
  is activated.  This is necessary for debugging an unbootable kernel without
  additional hardware.
a/kernel_versatile-3.8.6-arm-1.tgz:  Upgraded.
ap/sox-14.4.1-arm-1.tgz:  Upgraded.
d/kernel-headers-3.8.6-arm-1.tgz:  Upgraded.
k/kernel-source-3.8.6-arm-1.tgz:  Upgraded.
kde/calligra-2.6.3-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-bs-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ca@valencia-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-da-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-de-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-el-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-en_GB-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-es-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-et-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fi-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-fr-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-gl-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-hu-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-it-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-kk-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nb-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nds-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-nl-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pl-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-pt_BR-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-ru-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sk-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sl-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-sv-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-uk-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_CN-2.6.3-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-zh_TW-2.6.3-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-5.tgz:  Rebuilt.
  Built against Linux 3.8.6 kernel headers.
  Minimum kernel is now Linux 3.1.0 as this is the common base Kernel
  version in use on the Raspberry Pi when running Slackware ARM 14.0.  This will
  permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware
  release.
l/glibc-i18n-2.17-arm-5.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-5.tgz:  Rebuilt.
x/libXi-1.7.1-arm-1.tgz:  Upgraded.
x/xf86-input-evdev-2.8.0-arm-1.tgz:  Upgraded.
x/xf86-input-keyboard-1.7.0-arm-1.tgz:  Upgraded.
x/xf86-input-mouse-1.9.0-arm-1.tgz:  Upgraded.
x/xf86-input-synaptics-1.7.0-arm-1.tgz:  Upgraded.
x/xf86-video-modesetting-0.7.0-arm-1.tgz:  Upgraded.
x/xf86-video-nouveau-1.0.7-arm-1.tgz:  Upgraded.
x/xf86-video-openchrome-0.3.2-arm-1.tgz:  Upgraded.
x/xf86-video-r128-6.9.1-arm-3.tgz:  Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-3.tgz:  Rebuilt.
x/xf86-video-savage-2.3.6-arm-3.tgz:  Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-3.tgz:  Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-3.tgz:  Rebuilt.
x/xproto-7.0.24-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Tue Apr  9 19:43:57 UTC 2013
ap/linuxdoc-tools-0.9.68-arm-2.tgz:  Rebuilt.
  Added VERSION.xsl -> VERSION symlink.
d/python-2.7.4-arm-1.tgz:  Upgraded.
d/slacktrack-2.13-arm-1.tgz:  Upgraded.
d/subversion-1.7.9-arm-1.tgz:  Upgraded.
  This update fixes some denial of service bugs:
    mod_dav_svn excessive memory usage from property changes
    mod_dav_svn crashes on LOCK requests against activity URLs
    mod_dav_svn crashes on LOCK requests against non-existant URLs
    mod_dav_svn crashes on PROPFIND requests against activity URLs
    mod_dav_svn crashes on out of range limit in log REPORT request
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884
  (* Security fix *)
kde/amarok-2.7.0-arm-4.tgz:  Rebuilt.
kde/ark-4.10.2-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.2-arm-1.tgz:  Upgraded.
kde/bluedevil-1.3.1-arm-1.tgz:  Upgraded.
kde/bomber-4.10.2-arm-1.tgz:  Upgraded.
kde/bovo-4.10.2-arm-1.tgz:  Upgraded.
kde/calligra-2.6.2-arm-1.tgz:  Upgraded.
kde/dragon-4.10.2-arm-1.tgz:  Upgraded.
kde/filelight-4.10.2-arm-1.tgz:  Upgraded.
kde/granatier-4.10.2-arm-1.tgz:  Upgraded.
kde/gwenview-4.10.2-arm-1.tgz:  Upgraded.
kde/juk-4.10.2-arm-1.tgz:  Upgraded.
kde/k3b-2.0.2_20120226.git-arm-1.tgz:  Upgraded.
kde/kaccessible-4.10.2-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.2-arm-1.tgz:  Upgraded.
kde/kajongg-4.10.2-arm-1.tgz:  Upgraded.
kde/kamera-4.10.2-arm-1.tgz:  Upgraded.
kde/kapman-4.10.2-arm-1.tgz:  Upgraded.
kde/kate-4.10.2-arm-1.tgz:  Upgraded.
kde/katomic-4.10.2-arm-1.tgz:  Upgraded.
kde/kaudiocreator-1.3-arm-1.tgz:  Upgraded.
kde/kblackbox-4.10.2-arm-1.tgz:  Upgraded.
kde/kblocks-4.10.2-arm-1.tgz:  Upgraded.
kde/kbounce-4.10.2-arm-1.tgz:  Upgraded.
kde/kbreakout-4.10.2-arm-1.tgz:  Upgraded.
kde/kcalc-4.10.2-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.2-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.2-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.2-arm-1.tgz:  Upgraded.
kde/kde-baseapps-4.10.2-arm-1.tgz:  Upgraded.
kde/kde-runtime-4.10.2-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.2-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.2-arm-1.tgz:  Upgraded.
kde/kdeadmin-4.10.2-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.2-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.2-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.2-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.2-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.2-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.2-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.2-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.2-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.2-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.2-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.2-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.2-arm-1.tgz:  Upgraded.
kde/kdevelop-4.4.1-arm-1.tgz:  Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-1.tgz:  Upgraded.
kde/kdevplatform-1.4.1-arm-1.tgz:  Upgraded.
kde/kdewebdev-4.10.2-arm-1.tgz:  Upgraded.
kde/kdf-4.10.2-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.2-arm-1.tgz:  Upgraded.
kde/kfloppy-4.10.2-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.2-arm-1.tgz:  Upgraded.
kde/kgamma-4.10.2-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.2-arm-1.tgz:  Upgraded.
kde/kgpg-4.10.2-arm-1.tgz:  Upgraded.
kde/kigo-4.10.2-arm-1.tgz:  Upgraded.
kde/killbots-4.10.2-arm-1.tgz:  Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-1.tgz:  Upgraded.
kde/kiriki-4.10.2-arm-1.tgz:  Upgraded.
kde/kjumpingcube-4.10.2-arm-1.tgz:  Upgraded.
kde/klickety-4.10.2-arm-1.tgz:  Upgraded.
kde/klines-4.10.2-arm-1.tgz:  Upgraded.
kde/kmag-4.10.2-arm-1.tgz:  Upgraded.
kde/kmahjongg-4.10.2-arm-1.tgz:  Upgraded.
kde/kmines-4.10.2-arm-1.tgz:  Upgraded.
kde/kmix-4.10.2-arm-1.tgz:  Upgraded.
kde/kmousetool-4.10.2-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.2-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.2-arm-1.tgz:  Upgraded.
kde/knetwalk-4.10.2-arm-1.tgz:  Upgraded.
kde/kolf-4.10.2-arm-1.tgz:  Upgraded.
kde/kollision-4.10.2-arm-1.tgz:  Upgraded.
kde/kolourpaint-4.10.2-arm-1.tgz:  Upgraded.
kde/konquest-4.10.2-arm-1.tgz:  Upgraded.
kde/konsole-4.10.2-arm-1.tgz:  Upgraded.
kde/korundum-4.10.2-arm-1.tgz:  Upgraded.
kde/kpat-4.10.2-arm-1.tgz:  Upgraded.
kde/kplayer-0.7.2-arm-1.tgz:  Upgraded.
kde/kremotecontrol-4.10.2-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.2-arm-1.tgz:  Upgraded.
kde/kross-interpreters-4.10.2-arm-1.tgz:  Upgraded.
kde/kruler-4.10.2-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.2-arm-1.tgz:  Upgraded.
kde/kscreen-0.0.71-arm-1.tgz:  Upgraded.
kde/kshisen-4.10.2-arm-1.tgz:  Upgraded.
kde/ksirk-4.10.2-arm-1.tgz:  Upgraded.
kde/ksnakeduel-4.10.2-arm-1.tgz:  Upgraded.
kde/ksnapshot-4.10.2-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.2-arm-1.tgz:  Upgraded.
kde/ksquares-4.10.2-arm-1.tgz:  Upgraded.
kde/ksudoku-4.10.2-arm-1.tgz:  Upgraded.
kde/ktimer-4.10.2-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-1.tgz:  Upgraded.
kde/ktuberling-4.10.2-arm-1.tgz:  Upgraded.
kde/kubrick-4.10.2-arm-1.tgz:  Upgraded.
kde/kwallet-4.10.2-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz:  Upgraded.
kde/libkcddb-4.10.2-arm-1.tgz:  Upgraded.
kde/libkcompactdisc-4.10.2-arm-1.tgz:  Upgraded.
kde/libkdcraw-4.10.2-arm-1.tgz:  Upgraded.
kde/libkdegames-4.10.2-arm-1.tgz:  Upgraded.
kde/libkexiv2-4.10.2-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.2-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.2-arm-1.tgz:  Upgraded.
kde/libksane-4.10.2-arm-1.tgz:  Upgraded.
kde/libkscreen-0.0.71-arm-1.tgz:  Upgraded.
kde/libktorrent-1.3.1-arm-2.tgz:  Rebuilt.
kde/lskat-4.10.2-arm-1.tgz:  Upgraded.
kde/mplayerthumbs-4.10.2-arm-1.tgz:  Upgraded.
kde/nepomuk-core-4.10.2-arm-1.tgz:  Upgraded.
kde/nepomuk-widgets-4.10.2-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0.8-arm-1.tgz:  Upgraded.
kde/okular-4.10.2-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.1-arm-1.tgz:  Upgraded.
kde/oxygen-gtk3-1.1.1-arm-1.tgz:  Upgraded.
kde/oxygen-icons-4.10.2-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.2-arm-1.tgz:  Upgraded.
kde/perlkde-4.10.2-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.2-arm-1.tgz:  Upgraded.
kde/picmi-4.10.2-arm-1.tgz:  Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz:  Upgraded.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz:  Upgraded.
kde/print-manager-4.10.2-arm-1.tgz:  Upgraded.
kde/qtruby-4.10.2-arm-1.tgz:  Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz:  Upgraded.
kde/skanlite-1.0-arm-1.tgz:  Upgraded.
kde/smokegen-4.10.2-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.2-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.2-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.2-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.2-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.2-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz:  Upgraded.
kdei/kde-l10n-ar-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bg-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-bs-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ca@valencia-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-cs-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-da-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-de-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-el-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-en_GB-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-es-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-et-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-eu-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fa-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fi-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-fr-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ga-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-gl-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-he-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hi-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hr-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-hu-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ia-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-is-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-it-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ja-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-kk-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-km-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ko-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lt-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-lv-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-mr-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nb-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nds-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nl-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-nn-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pa-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pl-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-pt_BR-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ro-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ru-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-si-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sk-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sl-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sr-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-sv-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tg-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-th-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-tr-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-ug-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-uk-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-vi-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-wa-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_CN-4.10.2-noarch-1.tgz:  Upgraded.
kdei/kde-l10n-zh_TW-4.10.2-noarch-1.tgz:  Upgraded.
l/libbluedevil-1.9.3-arm-1.tgz:  Upgraded.
l/liblastfm-1.0.7-arm-1.tgz:  Upgraded.
l/libmtp-1.1.6-arm-1.tgz:  Upgraded.
l/qt-4.8.4-arm-3.tgz:  Rebuilt.
  Removed dangling symlink in the docs directory.
n/autofs-5.0.7-arm-1.tgz:  Upgraded.
n/openssh-6.2p1-arm-2.tgz:  Rebuilt.
  Patched to remove warnings about missing identity files unless they were
  specified on the command line or in the config file.
n/openvpn-2.3.1-arm-1.tgz:  Upgraded.
xap/network-manager-applet-0.9.8.0-arm-2.tgz:  Rebuilt.
  Fixed sed on ce-page-general.ui to use GtkHBox, not GtkVBox.
extra/gcc-4.8.0/gcc-4.8.0-arm-2.tgz:  Rebuilt.
  Restored missing target.h, target.def, and target-hooks-macros.h headers.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-2.tgz:  Rebuilt.
+--------------------------+
Wed Apr  3 18:12:07 UTC 2013
ap/linuxdoc-tools-0.9.68-arm-1.tgz:  Upgraded.
  Upgraded to AsciiDoc-8.6.8
  Upgraded to DocBook XSL Stylesheets 1.78.1
  Removed dangling symlinks from /usr/doc.
d/binutils-2.23.52.0.1-arm-2.tgz:  Rebuilt.
  Export/install demangle.h.  Thanks to Jim Diamond.
  Patched addr2line to use dynamic symbol table if needed.
  Reverted an upstream change that broke linking dynamic libraries through
  weak symbols, requiring additions like -lpthread to the link line.
  Fixed texinfo files to be compatible with newer texinfo versions.
  Patched system headers to not complain about missing "config.h".
l/gtk+2-2.24.17-arm-2.tgz:  Rebuilt.
  Restored the missing /etc/gtk-2.0/$ARCH-slackware-linux/ directory.
  Thanks to Tim Thomas.
+--------------------------+
Tue Apr 2 19:44:54 UTC 2013

The mini root filesystem for -current has been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

The Mozilla suite of applications have been updated in the 'unsupported' tree:
ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/

a/mtd-utils-020413-arm-1.tgz:  Upgraded.
a/u-boot-tools-2013.01.01-arm-1.tgz:  Upgraded.
+--------------------------+
Mon Apr  1 18:13:44 UTC 2013

More updates, and several rebuilds due to bumped library versions in
the boost, icu4c, ilmbase, imagemagick, libzip, and net-snmp packages.
Thanks to Heinz Wiesinger for several of these library bumps, and to
Robby Workman for the initial work on lots of the updates in this batch.
The big news here is the removal of MySQL in favor of MariaDB. This
shouldn't really be a surprise on any level. Thanks are due to Heinz
Wiesinger for his work on transitioning the build script, testing, and
getting us all behind this move.

In the vast majority of situations, MariaDB is entirely compatible with
existing MySQL databases and will drop right in with no changes required.
There's an article available outlining the areas in which MariaDB differs
from MySQL that I'd recommend reading:
       https://kb.askmonty.org/v/mariadb-versus-mysql-compatibility/
Thanks to the MariaDB Foundation! We look forward to working with you.

GCC 4.8.0 has been added to /extra rather than the main tree.  This is 
because GCC 4.8.0 has not been able to produce a bootable Kernel here.
I tried reverting to the previous version of binutils and applying the 
latest SVN branch update, but to no avail -- so for now we're sticking
with GCC 4.7.2.

a/acpid-2.0.18-arm-1.tgz:  Upgraded.
a/dbus-1.6.8-arm-1.tgz:  Upgraded.
a/e2fsprogs-1.42.7-arm-1.tgz:  Upgraded.
a/gettext-0.18.2.1-arm-2.tgz:  Rebuilt.
a/glibc-solibs-2.17-arm-4.tgz:  Rebuilt.
a/glibc-zoneinfo-2013b-noarch-4.tgz:  Rebuilt.
a/kernel-modules-kirkwood-3.8.5_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.5_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.5_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.8.5-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.5-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.8.5-arm-1.tgz:  Upgraded.
a/kmod-12-arm-1.tgz:  Upgraded.
a/reiserfsprogs-3.6.22-arm-1.tgz:  Upgraded.
a/shadow-4.1.4.3-arm-7.tgz:  Rebuilt.
  Patched pw_encrypt() to fix "crypt:  Invalid argument" and immediate login
  failure when a non-existent user tries to log in.  This was caused by a
  change in the behavior of glibc's crypt() function.  When a user that does
  not exist tries to log in, the code in shadow calls crypt() with an invalid
  salt.  The old version of crypt() used the provided bad salt (always "!")
  to produce a DES hash with "!!" at the beginning, while the new one just
  returns NULL which isn't well-handled by the shadow code.  To fix this
  shadow bug, if the salt is invalid, we'll call crypt() using a good SHA512
  salt, prepend "!!" to the hash that we get back, and have pw_encrypt()
  return this as the result.  The effect is identical to the previous
  behavior -- unless the exact same malformed hash happens to be the hash in
  /etc/shadow (it won't be), the login will fail.  While I see no way that
  these 6 lines of code could be less secure than the original code, I
  welcome additional review.  Also, if anyone spots anything else that was
  adversely affected by the change to crypt()'s behavior, please let me know.
  Thanks to Michael L. Semon for information about the /bin/login problem.
  Patched to handle more than 16 supplemental groups.
  Thanks to Cal Peake.
a/sharutils-4.13.3-arm-2.tgz:  Rebuilt.
a/udisks-1.0.4-arm-2.tgz:  Rebuilt.
a/udisks2-2.1.0-arm-1.tgz:  Upgraded.
ap/ghostscript-9.07-arm-1.tgz:  Upgraded.
ap/hplip-3.13.3-arm-2.tgz:  Rebuilt.
ap/madplay-0.15.2b-arm-4.tgz:  Rebuilt.
ap/man-pages-3.50-noarch-1.tgz:  Upgraded.
ap/mysql-5.5.29-arm-1.tgz:  Removed.
ap/mariadb-5.5.30-arm-1.tgz:  Added.
ap/nano-2.3.2-arm-1.tgz:  Upgraded.
ap/normalize-0.7.7-arm-3.tgz:  Rebuilt.
d/binutils-2.23.52.0.1-arm-1.tgz:  Upgraded.
d/bison-2.7-arm-1.tgz:  Upgraded.
d/distcc-3.1-arm-4.tgz:  Rebuilt.
d/gcc-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-g++-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-gfortran-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-gnat-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-go-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-java-4.7.2-arm-4.tgz:  Rebuilt.
d/gcc-objc-4.7.2-arm-4.tgz:  Rebuilt.
d/gettext-tools-0.18.2.1-arm-2.tgz:  Rebuilt.
d/kernel-headers-3.8.5-arm-1.tgz:  Upgraded.
d/llvm-3.2-arm-3.tgz:  Rebuilt.
  Added /usr/bin/$ARCH-slackware-linux-{clang,clang++} symlinks.  If these
  are present, LLVM/clang will be used to compile itself.  Other programs
  might need them as well.
d/oprofile-0.9.7-arm-4.tgz:  Rebuilt.
e/emacs-24.3-arm-2.tgz:  Rebuilt.
k/kernel-source-3.8.5-arm-1.tgz:  Upgraded.
kde/amarok-2.7.0-arm-3.tgz:  Rebuilt.
  Rebuilt to use the dynamic embedded library in MariaDB.
kde/calligra-2.6.2-arm-3.tgz:  Rebuilt.
kde/kde-runtime-4.10.1-arm-2.tgz:  Rebuilt.
kde/kdelibs-4.10.1-arm-3.tgz:  Rebuilt.
kde/kig-4.10.1-arm-1.tgz:  Added.
kde/networkmanagement-0.9.0.8-arm-1.tgz:  Upgraded.
kde/quanta-29a3f8e_20111223git-arm-3.tgz:  Rebuilt.
kde/skanlite-1.0-arm-1.tgz:  Upgraded.
l/GConf-3.2.6-arm-1.tgz:  Upgraded.
l/akonadi-1.9.1-arm-1.tgz:  Upgraded.
l/at-spi2-atk-2.6.2-arm-1.tgz:  Added.
l/at-spi2-core-2.6.3-arm-1.tgz:  Added.
l/atk-2.6.0-arm-1.tgz:  Upgraded.
l/audiofile-0.3.6-arm-1.tgz:  Upgraded.
l/boost-1.53.0-arm-1.tgz:  Upgraded.
l/dbus-glib-0.100.2-arm-1.tgz:  Upgraded.
l/dbus-python-1.1.1-arm-1.tgz:  Upgraded.
l/dconf-0.14.1-arm-1.tgz:  Added.
l/desktop-file-utils-0.21-arm-1.tgz:  Upgraded.
l/ebook-tools-0.2.2-arm-2.tgz:  Rebuilt.
l/esound-0.2.41-arm-4.tgz:  Rebuilt.
l/fftw-3.3.3-arm-1.tgz:  Upgraded.
l/gcr-3.6.2-arm-1.tgz:  Upgraded.
l/gdk-pixbuf2-2.26.5-arm-1.tgz:  Upgraded.
l/gegl-0.2.0-arm-2.tgz:  Rebuilt.
l/glade3-3.8.3-arm-1.tgz:  Upgraded.
l/glib-networking-2.34.2-arm-1.tgz:  Upgraded.
l/glib2-2.34.3-arm-1.tgz:  Upgraded.
l/glibc-2.17-arm-4.tgz:  Rebuilt.
  Built against Linux 3.8.5 kernel headers.
l/glibc-i18n-2.17-arm-4.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-4.tgz:  Rebuilt.
l/gmime-2.6.15-arm-1.tgz:  Upgraded.
l/gmm-4.2-noarch-1.tgz:  Upgraded.
l/gnome-icon-theme-3.6.2-noarch-1.tgz:  Upgraded.
l/gnome-keyring-3.6.3-arm-1.tgz:  Upgraded.
l/gobject-introspection-1.34.2-arm-1.tgz:  Upgraded.
l/gsettings-desktop-schemas-3.6.1-arm-1.tgz:  Upgraded.
l/gtk+2-2.24.17-arm-1.tgz:  Upgraded.
l/gtk+3-3.6.4-arm-1.tgz:  Upgraded.
l/gvfs-1.14.2-arm-1.tgz:  Upgraded.
l/icu4c-51.1-arm-1.tgz:  Upgraded.
l/ilmbase-1.0.3-arm-1.tgz:  Upgraded.
l/iso-codes-3.41-arm-1.tgz:  Upgraded.
l/libffi-3.0.13-arm-1.tgz:  Upgraded.
l/libgnome-keyring-3.6.0-arm-1.tgz:  Upgraded.
l/libgsf-1.14.26-arm-1.tgz:  Upgraded.
l/libproxy-0.4.11-arm-1.tgz:  Upgraded.
l/librsvg-2.36.4-arm-1.tgz:  Upgraded.
l/libsecret-0.12-arm-1.tgz:  Added.
l/libsoup-2.40.3-arm-1.tgz:  Upgraded.
l/libspectre-0.2.7-arm-1.tgz:  Upgraded.
l/libssh-0.5.4-arm-1.tgz:  Upgraded.
  This update fixes a possible denial of service issue.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176
  (* Security fix *)
l/libxklavier-5.3-arm-1.tgz:  Upgraded.
l/libzip-0.10.1-arm-1.tgz:  Upgraded.
l/openexr-1.7.1-arm-1.tgz:  Upgraded.
l/parted-3.1-arm-1.tgz:  Upgraded.
l/popt-1.16-arm-1.tgz:  Upgraded.
l/qt-4.8.4-arm-2.tgz:  Rebuilt.
  Patched moc to fix issues with the latest boost library.
  Thanks to Corrado Franco.
l/raptor2-2.0.9-arm-1.tgz:  Upgraded.
l/rasqal-0.9.30-arm-1.tgz:  Upgraded.
l/redland-1.0.16-arm-1.tgz:  Upgraded.
l/sg3_utils-1.35-arm-1.tgz:  Upgraded.
l/virtuoso-ose-6.1.6-arm-2.tgz:  Rebuilt.
n/ModemManager-0.6.0.0-arm-1.tgz:  Upgraded.
n/NetworkManager-0.9.8.0-arm-1.tgz:  Upgraded.
n/bind-9.9.2_P2-arm-1.tgz:  Upgraded.
  This update fixes a critical defect in BIND 9 that allows an attacker
  to cause excessive memory consumption in named or other programs linked
  to libdns.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
    https://kb.isc.org/article/AA-00871
  (* Security fix *)
n/dhcp-4.2.5_P1-arm-1.tgz:  Upgraded.
  This update replaces the included BIND 9 code that the DHCP programs
  link against.  Those contained a defect that could possibly lead to
  excessive memory consumption and a denial of service.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
  (* Security fix *)
n/mcabber-0.10.2-arm-2.tgz:  Rebuilt.
n/net-snmp-5.7.2-arm-1.tgz:  Upgraded.
n/ntp-4.2.6p5-arm-3.tgz:  Rebuilt.
n/obex-data-server-0.4.6-arm-3.tgz:  Rebuilt.
n/openssh-6.2p1-arm-1.tgz:  Upgraded.
n/php-5.4.13-arm-1.tgz:  Upgraded.
  This release fixes two security issues in SOAP:
  Added check that soap.wsdl_cache_dir conforms to open_basedir.
  Disabled external entities loading.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
  (* Security fix *)
n/tin-1.8.3-arm-4.tgz:  Rebuilt.
x/xf86-video-nouveau-1.0.4-arm-1.tgz:  Upgraded.
xap/audacious-3.3.4-arm-1.tgz:  Upgraded.
xap/audacious-plugins-3.3.4-arm-1.tgz:  Upgraded.
xap/imagemagick-6.8.4_1-arm-1.tgz:  Upgraded.
xap/network-manager-applet-0.9.8.0-arm-1.tgz:  Upgraded.
  Patched for new version of GTK+.  Thanks to yenn.
xap/pan-0.139-arm-2.tgz:  Rebuilt.
xap/sane-1.0.23-arm-1.tgz:  Upgraded.
xap/windowmaker-0.95.4-arm-1.tgz:  Upgraded.
xap/xine-lib-1.1.21-arm-2.tgz:  Rebuilt.
xap/xlockmore-5.42-arm-1.tgz:  Upgraded.
xap/xpdf-3.03-arm-1.tgz:  Upgraded.
  Fixed patch to xpdfrc for Japanese language support.
  Thanks to ABE Shin-ichi.
xap/xsane-0.998-arm-4.tgz:  Rebuilt.
xap/xscreensaver-5.21-arm-1.tgz:  Upgraded.
xfce/Thunar-1.6.2-arm-1.tgz:  Upgraded.
xfce/exo-0.10.2-arm-1.tgz:  Upgraded.
xfce/gtk-xfce-engine-3.0.1-arm-1.tgz:  Upgraded.
xfce/orage-4.8.4-arm-1.tgz:  Upgraded.
xfce/tumbler-0.1.25-arm-2.tgz:  Rebuilt.
  Reverted to tumbler-0.1.25, since later versions require gstreamer-1.0, and
  patched a bug that caused tumbler to hold files open preventing volumes from
  being ejected.
xfe/Terminal-0.4.8-arm-1.tgz:  Removed.
xfce/xfce4-terminal-0.6.1-arm-1.tgz:  Added.
xfce/xfce4-weather-plugin-0.8.3-arm-1.tgz:  Upgraded.
xfce/xfdesktop-4.10.2-arm-1.tgz:  Upgraded.
xfce/xfwm4-4.10.0-arm-2.tgz:  Rebuilt.
  Patched mouse bug with GTK+3 apps.  Thanks to Per-Arne Hognert.
extra/brltty/brltty-4.4-arm-2.tgz:  Rebuilt.
extra/gcc-4.8.0/gcc-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-1.tgz:  Upgraded.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-1.tgz:  Upgraded.
extra/partitionmanager/partitionmanager-1.0.3_20130328svn-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Thu Mar 21 18:09:45 UTC 2013
a/ed-1.7-arm-1.tgz:  Upgraded.
a/gettext-0.18.2.1-arm-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.8.4_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.8.4_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.8.4_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.8.4-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.8.4-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.8.4-arm-1.tgz:  Upgraded.
ap/hplip-3.13.3-arm-1.tgz:  Upgraded.
ap/htop-1.0.2-arm-1.tgz:  Upgraded.
ap/sqlite-3071600-arm-1.tgz:  Upgraded.
ap/zsh-5.0.2-arm-1.tgz:  Upgraded.
d/doxygen-1.8.3.1-arm-1.tgz:  Upgraded.
d/flex-2.5.37-arm-1.tgz:  Upgraded.
d/gettext-tools-0.18.2.1-arm-1.tgz:  Upgraded.
k/kernel-source-3.8.4-arm-1.tgz:  Upgraded.
kde/calligra-2.6.2-arm-2.tgz:  Rebuilt.
l/loudmouth-1.5.0_20121201-arm-1.tgz:  Upgraded.
l/mpfr-3.1.2-arm-1.tgz:  Upgraded.
n/alpine-2.03-arm-1.tgz:  Upgraded.
n/bluez-4.99-arm-3.tgz:  Rebuilt.
  Install etc/bluetooth/rfcomm.conf as a '.new' file as it is on x86.
n/imapd-2.03-arm-1.tgz:  Upgraded.
n/iproute2-3.8.0-arm-1.tgz:  Upgraded.
n/lftp-4.4.5-arm-1.tgz:  Upgraded.
n/mcabber-0.10.2-arm-1.tgz:  Upgraded.
x/glew-1.9.0-arm-1.tgz:  Upgraded.
x/mesa-9.1.1-arm-1.tgz:  Upgraded.
xap/ddd-3.3.12-arm-1.tgz:  Added.
xap/xxgdb-1.12-arm-3.tgz:  Removed.
  This is old and unmaintained.  We've replaced it with ddd, a much better
  frontend for the gdb debugger.
xap/gnuchess-6.0.3-arm-1.tgz:  Upgraded.
  Upgraded to gnuchess-6.0.3 and xboard-4.7.0.
xap/gv-3.7.4-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Sun Mar 17 14:19:11 UTC 2013
a/dosfstools-3.0.16-arm-1.tgz:  Upgraded.
a/glibc-solibs-2.17-arm-3.tgz:  Rebuilt.
  Minimum kernel is now Linux 3.4.0.
a/sysvinit-scripts-2.0-noarch-10.tgz:  Rebuilt.
  Removed a crufty '.orig' file.
ap/slackpkg-2.82.0-arm-6.tgz:  Rebuilt.
  Added a new Slackware ARM mirror to the sample configuration.
d/git-1.8.2-arm-1.tgz:  Upgraded.
d/perl-5.16.3-arm-1.tgz:  Upgraded.
  This update fixes a flaw in the rehashing code that can be exploited
  to carry out a denial of service attack against code that uses arbitrary
  user input as hash keys.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
  (* Security fix *)
d/ruby-1.9.3_p392-arm-1.tgz:  Upgraded.
  This release includes security fixes about bundled JSON and REXML.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821
  (* Security fix *)
kde/calligra-2.6.2-arm-1.tgz:  Upgraded.
kdei/calligra-l10n-tr-2.6.2-noarch-1.tgz:  Added.
kdei/calligra-*-2.6.2-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-3.tgz:  Rebuilt.
  Minimum kernel is now Linux 3.4.0.
l/glibc-i18n-2.17-arm-3.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-3.tgz:  Rebuilt.
x/inputproto-2.3-arm-1.tgz:  Upgraded.
x/libXi-1.7-arm-1.tgz:  Upgraded.
x/scim-bridge-0.4.16-arm-4.tgz:  Removed.
  This functionality was included in scim-1.4.14.
x/scim-1.4.14-arm-3.tgz:  Rebuilt.
  Updated scim profile scripts to use scim as the GTK_IM_MODULE rather than
  scim-bridge (which was removed).  Thanks to Thomas Choi.
x/xf86-input-acecad-1.5.0-arm-3.tgz:  Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-3.tgz:  Rebuilt.
x/xf86-input-evdev-2.7.3-arm-2.tgz:  Rebuilt.
x/xf86-input-joystick-1.6.1-arm-3.tgz:  Rebuilt.
x/xf86-input-keyboard-1.6.2-arm-2.tgz:  Rebuilt.
x/xf86-input-mouse-1.8.1-arm-2.tgz:  Rebuilt.
x/xf86-input-penmount-1.5.0-arm-3.tgz:  Rebuilt.
x/xf86-input-synaptics-1.6.3-arm-2.tgz:  Rebuilt.
x/xf86-input-void-1.4.0-arm-3.tgz:  Rebuilt.
x/xf86-input-wacom-0.19.0-arm-2.tgz:  Rebuilt.
x/xf86-video-apm-1.2.5-arm-2.tgz:  Rebuilt.
x/xf86-video-ark-0.7.5-arm-2.tgz:  Rebuilt.
x/xf86-video-ast-0.97.0-arm-2.tgz:  Rebuilt.
x/xf86-video-ati-7.1.0-arm-2.tgz:  Rebuilt.
x/xf86-video-chips-1.2.5-arm-2.tgz:  Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-2.tgz:  Rebuilt.
x/xf86-video-dummy-0.3.6-arm-2.tgz:  Rebuilt.
x/xf86-video-fbdev-0.4.3-arm-4.tgz:  Rebuilt.
x/xf86-video-glint-1.2.8-arm-2.tgz:  Rebuilt.
x/xf86-video-i128-1.3.6-arm-2.tgz:  Rebuilt.
x/xf86-video-i740-1.3.4-arm-2.tgz:  Rebuilt.
x/xf86-video-mach64-6.9.4-arm-2.tgz:  Rebuilt.
x/xf86-video-mga-1.6.2-arm-2.tgz:  Rebuilt.
x/xf86-video-modesetting-0.6.0-arm-2.tgz:  Rebuilt.
x/xf86-video-neomagic-1.2.7-arm-2.tgz:  Rebuilt.
x/xf86-video-nv-2.1.20-arm-3.tgz:  Rebuilt.
x/xf86-video-openchrome-0.3.1-arm-2.tgz:  Rebuilt.
x/xf86-video-r128-6.9.1-arm-2.tgz:  Rebuilt.
x/xf86-video-rendition-4.2.5-arm-2.tgz:  Rebuilt.
x/xf86-video-s3-0.6.5-arm-2.tgz:  Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-2.tgz:  Rebuilt.
x/xf86-video-savage-2.3.6-arm-2.tgz:  Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-2.tgz:  Rebuilt.
x/xf86-video-sis-0.10.7-arm-2.tgz:  Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-2.tgz:  Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-2.tgz:  Rebuilt.
x/xf86-video-tga-1.2.2-arm-2.tgz:  Rebuilt.
x/xf86-video-trident-1.3.6-arm-2.tgz:  Rebuilt.
x/xf86-video-tseng-1.2.5-arm-2.tgz:  Rebuilt.
x/xf86-video-v4l-0.2.0-arm-3.tgz:  Rebuilt.
x/xf86-video-vesa-2.3.2-arm-2.tgz:  Rebuilt.
x/xf86-video-vmware-13.0.0-arm-2.tgz:  Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-2.tgz:  Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-3.tgz:  Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-2.tgz:  Rebuilt.
x/xorg-server-1.14.0-arm-1.tgz:  Upgraded.
  Dropped the broken randr patch for panning/scaling.  According to the
  release notes, a different fix was merged upstream.
  Dropped randr cleanup patch that was merged upstream.
x/xorg-server-xephyr-1.14.0-arm-1.tgz:  Upgraded.
x/xorg-server-xnest-1.14.0-arm-1.tgz:  Upgraded.
x/xorg-server-xvfb-1.14.0-arm-1.tgz:  Upgraded.
x/xterm-291-arm-1.tgz:  Upgraded.
+--------------------------+
Wed Mar 13 19:43:40 UTC 2013

The mini root filesystem for -current has also been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

a/glibc-solibs-2.17-arm-2.tgz:  Rebuilt.
a/glibc-zoneinfo-2013b-noarch-1.tgz:  Rebuilt.
a/vboot-utils-20130222gite6cf2c2-arm-1.tgz:  Added.
  These are tools to help install another Linux distribution (in our case,
  Slackware!) on to the Google/Samsung Chromebook 2012 ARM version.  I have 
  one of these arriving tomorrow so plan on working on this immediately!
e/emacs-24.3-arm-1.tgz:  Upgraded.
kde/amarok-2.7.0-arm-2.tgz:  Rebuilt.
kde/ark-4.10.1-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.1-arm-1.tgz:  Upgraded.
kde/blinken-4.10.1-arm-2.tgz:  Rebuilt.
kde/bluedevil-1.3-arm-2.tgz:  Rebuilt.
kde/bomber-4.10.1-arm-1.tgz:  Upgraded.
kde/bovo-4.10.1-arm-1.tgz:  Upgraded.
kde/calligra-2.6.1-arm-1.tgz:  Upgraded.
kde/cantor-4.10.1-arm-2.tgz:  Rebuilt.
kde/dragon-4.10.1-arm-1.tgz:  Upgraded.
kde/filelight-4.10.1-arm-1.tgz:  Upgraded.
kde/granatier-4.10.1-arm-1.tgz:  Upgraded.
kde/gwenview-4.10.1-arm-1.tgz:  Upgraded.
kde/juk-4.10.1-arm-1.tgz:  Upgraded.
kde/k3b-2.0.2_20120226.git-arm-2.tgz:  Rebuilt.
kde/kaccessible-4.10.1-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.1-arm-1.tgz:  Upgraded.
kde/kajongg-4.10.1-arm-1.tgz:  Upgraded.
kde/kamera-4.10.1-arm-1.tgz:  Upgraded.
kde/kapman-4.10.1-arm-1.tgz:  Upgraded.
kde/kate-4.10.1-arm-1.tgz:  Upgraded.
kde/katomic-4.10.1-arm-1.tgz:  Upgraded.
kde/kaudiocreator-1.3-arm-2.tgz:  Rebuilt.
kde/kblackbox-4.10.1-arm-1.tgz:  Upgraded.
kde/kblocks-4.10.1-arm-1.tgz:  Upgraded.
kde/kbounce-4.10.1-arm-1.tgz:  Upgraded.
kde/kbreakout-4.10.1-arm-1.tgz:  Upgraded.
kde/kcalc-4.10.1-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.1-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.1-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.1-arm-1.tgz:  Upgraded.
kde/kde-baseapps-4.10.1-arm-1.tgz:  Upgraded.
kde/kde-runtime-4.10.1-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.1-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.1-arm-1.tgz:  Upgraded.
kde/kdeadmin-4.10.1-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.1-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.1-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.1-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.1-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.1-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.1-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.1-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.1-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.1-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.1-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.1-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.1-arm-1.tgz:  Upgraded.
kde/kdevelop-4.4.1-arm-2.tgz:  Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-2.tgz:  Rebuilt.
kde/kdevplatform-1.4.1-arm-2.tgz:  Rebuilt.
kde/kdewebdev-4.10.1-arm-1.tgz:  Upgraded.
kde/kdf-4.10.1-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.1-arm-1.tgz:  Upgraded.
kde/kfloppy-4.10.1-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.1-arm-1.tgz:  Upgraded.
kde/kgamma-4.10.1-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.1-arm-1.tgz:  Upgraded.
kde/kgpg-4.10.1-arm-1.tgz:  Upgraded.
kde/kigo-4.10.1-arm-1.tgz:  Upgraded.
kde/killbots-4.10.1-arm-1.tgz:  Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-2.tgz:  Rebuilt.
kde/kiriki-4.10.1-arm-1.tgz:  Upgraded.
kde/kjumpingcube-4.10.1-arm-1.tgz:  Upgraded.
kde/klickety-4.10.1-arm-1.tgz:  Upgraded.
kde/klines-4.10.1-arm-1.tgz:  Upgraded.
kde/kmag-4.10.1-arm-1.tgz:  Upgraded.
kde/kmahjongg-4.10.1-arm-1.tgz:  Upgraded.
kde/kmines-4.10.1-arm-1.tgz:  Upgraded.
kde/kmix-4.10.1-arm-1.tgz:  Upgraded.
kde/kmousetool-4.10.1-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.1-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.1-arm-1.tgz:  Upgraded.
kde/knetwalk-4.10.1-arm-1.tgz:  Upgraded.
kde/kolf-4.10.1-arm-1.tgz:  Upgraded.
kde/kollision-4.10.1-arm-1.tgz:  Upgraded.
kde/kolourpaint-4.10.1-arm-1.tgz:  Upgraded.
kde/konquest-4.10.1-arm-1.tgz:  Upgraded.
kde/konsole-4.10.1-arm-1.tgz:  Upgraded.
kde/korundum-4.10.1-arm-1.tgz:  Upgraded.
kde/kpat-4.10.1-arm-1.tgz:  Upgraded.
kde/kplayer-0.7.2-arm-2.tgz:  Rebuilt.
kde/kremotecontrol-4.10.1-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.1-arm-1.tgz:  Upgraded.
kde/kross-interpreters-4.10.1-arm-1.tgz:  Upgraded.
kde/kruler-4.10.1-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.1-arm-1.tgz:  Upgraded.
kde/kscreen-0.0.71-arm-2.tgz:  Rebuilt.
kde/kshisen-4.10.1-arm-1.tgz:  Upgraded.
kde/ksirk-4.10.1-arm-1.tgz:  Upgraded.
kde/ksnakeduel-4.10.1-arm-1.tgz:  Upgraded.
kde/ksnapshot-4.10.1-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.1-arm-1.tgz:  Upgraded.
kde/ksquares-4.10.1-arm-1.tgz:  Upgraded.
kde/ksudoku-4.10.1-arm-1.tgz:  Upgraded.
kde/ktimer-4.10.1-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-2.tgz:  Rebuilt.
kde/ktuberling-4.10.1-arm-1.tgz:  Upgraded.
kde/kubrick-4.10.1-arm-1.tgz:  Upgraded.
kde/kwallet-4.10.1-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-2.tgz:  Rebuilt.
kde/libkcddb-4.10.1-arm-1.tgz:  Upgraded.
kde/libkcompactdisc-4.10.1-arm-1.tgz:  Upgraded.
kde/libkdcraw-4.10.1-arm-1.tgz:  Upgraded.
kde/libkdeedu-4.10.1-arm-2.tgz:  Rebuilt.
kde/libkdegames-4.10.1-arm-1.tgz:  Upgraded.
kde/libkexiv2-4.10.1-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.1-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.1-arm-1.tgz:  Upgraded.
kde/libksane-4.10.1-arm-1.tgz:  Upgraded.
kde/libkscreen-0.0.71-arm-2.tgz:  Rebuilt.
kde/libktorrent-1.3.1-arm-3.tgz:  Rebuilt.
kde/lskat-4.10.1-arm-1.tgz:  Upgraded.
kde/mplayerthumbs-4.10.1-arm-1.tgz:  Upgraded.
kde/nepomuk-core-4.10.1-arm-1.tgz:  Upgraded.
kde/nepomuk-widgets-4.10.1-arm-1.tgz:  Upgraded.
kde/networkmanagement-0.9.0-arm-2.tgz:  Rebuilt.
kde/okular-4.10.1-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.1-arm-2.tgz:  Rebuilt.
kde/oxygen-gtk3-1.1.1-arm-2.tgz:  Rebuilt.
kde/oxygen-icons-4.10.1-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.1-arm-1.tgz:  Upgraded.
kde/perlkde-4.10.1-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.1-arm-1.tgz:  Upgraded.
kde/picmi-4.10.1-arm-1.tgz:  Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz:  Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz:  Rebuilt.
kde/print-manager-4.10.1-arm-1.tgz:  Upgraded.
kde/qtruby-4.10.1-arm-1.tgz:  Upgraded.
kde/quanta-29a3f8e_20111223git-arm-2.tgz:  Rebuilt.
kde/rocs-4.10.1-arm-1.tgz:  Upgraded.
kde/skanlite-0.9-arm-2.tgz:  Rebuilt.
kde/smokegen-4.10.1-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.1-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.1-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.1-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.1-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.1-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz:  Rebuilt.
kdei/calligra-l10n-*-2.6.1-noarch-1.tgz:  Upgraded.
kdei/kde-*-4.10.1-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-2.tgz:  Rebuilt.
l/glibc-i18n-2.17-arm-2.tgz:  Rebuilt.
l/glibc-profile-2.17-arm-2.tgz:  Rebuilt.
+--------------------------+
Thu Mar  7 19:10:43 UTC 2013
ap/sudo-1.8.6p7-arm-1.tgz:  Upgraded.
  This update fixes security issues that could allow a user to run commands
  without authenticating after the password timeout has already expired.
  Note that the vulnerability did not permit a user to run commands other
  than those allowed by the sudoers policy.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776
  (* Security fix *)
+--------------------------+
Mon Mar  4 19:34:16 UTC 2013
ap/cdrtools-3.01a13-arm-1.tgz:  Upgraded.
l/apr-util-1.5.1-arm-1.tgz:  Upgraded.
n/httpd-2.4.4-arm-1.tgz:  Upgraded.
  This update provides bugfixes and enhancements.
  Two security issues are fixed:
  *  Various XSS flaws due to unescaped hostnames and URIs HTML output in
     mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
     [Jim Jagielski, Stefan Fritsch, Niels Heinen <heinenn google com>]
  *  XSS in mod_proxy_balancer manager interface. [Jim Jagielski,
     Niels Heinen <heinenn google com>]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
  (* Security fix *)
n/php-5.4.12-arm-1.tgz:  Upgraded.
x/fontconfig-2.10.2-arm-2.tgz:  Rebuilt.
  Applied patch from upstream git to fix 10-autohint.conf.
+--------------------------+
Fri Mar  1 19:01:23 UTC 2013

Lots of X updates in this batch!  We were finally able to upgrade to the
latest cairo (including the long-requested XCB backend), as the text
corruption bug that was preventing that was fixed in the upstream X server.
We've also upgraded to the latest libdrm and Mesa.  Don't miss the new glu
package -- that was previously part of Mesa, and there are a lot of things
that link to it.  Thanks to Robby Workman for all the help with this.

a/coreutils-8.21-arm-1.tgz:  Upgraded.
a/dosfstools-3.0.15-arm-1.tgz:  Upgraded.
a/eject-2.1.5-arm-5.tgz:  Rebuilt.
  Patched to fix -T.  Thanks to GazL.
a/libcgroup-0.38-arm-2.tgz:  Rebuilt.
  Use full path to /usr/sbin/cgclear, since /usr/sbin isn't in the $PATH
  when the script is called at shutdown/reboot.  Thanks to LukenShiro.
ap/groff-1.22.2-arm-1.tgz:  Upgraded.
d/git-1.8.1.4-arm-1.tgz:  Upgraded.
l/cairo-1.12.14-arm-1.tgz:  Upgraded.
l/slang-2.2.4-arm-2.tgz:  Rebuilt.
  Recompiled with -fno-tree-dse to avoid optimization bugs.
  Thanks to Petri Kaukasoina.
x/bdftopcf-1.0.4-arm-1.tgz:  Upgraded.
x/beforelight-1.0.5-arm-1.tgz:  Upgraded.
x/dri2proto-2.8-arm-1.tgz:  Upgraded.
x/editres-1.0.6-arm-1.tgz:  Upgraded.
x/fontconfig-2.10.2-arm-1.tgz:  Upgraded.
  Create the symlinks in doinst.sh before running fc-cache.
  Don't include /usr/share/fonts in the fonts.conf font directory list as that
  causes bitmapped fonts to be used.  Thanks to Iouri Kharon.
x/glproto-1.4.16-arm-1.tgz:  Upgraded.
x/glu-9.0.0-arm-1.tgz:  Added.
  This used to be part of Mesa, but was split out.
x/ico-1.0.4-arm-1.tgz:  Upgraded.
x/libXcm-0.5.2-arm-1.tgz:  Upgraded.
x/libXcomposite-0.4.4-arm-1.tgz:  Upgraded.
x/libXdamage-1.1.4-arm-1.tgz:  Upgraded.
x/libXi-1.6.2-arm-1.tgz:  Upgraded.
x/libXrandr-1.4.0-arm-1.tgz:  Upgraded.
x/libdrm-2.4.42-arm-1.tgz:  Upgraded.
x/libxcb-1.9-arm-1.tgz:  Upgraded.
x/mesa-9.1-arm-1.tgz:  Upgraded.
x/mtdev-1.1.3-arm-1.tgz:  Upgraded.
x/pixman-0.28.2-arm-1.tgz:  Upgraded.
x/randrproto-1.4.0-arm-1.tgz:  Upgraded.
x/rgb-1.0.5-arm-1.tgz:  Upgraded.
x/sessreg-1.0.8-arm-1.tgz:  Upgraded.
x/showfont-1.0.4-arm-1.tgz:  Upgraded.
x/ttf-indic-fonts-0.5.14-arm-1.tgz:  Upgraded.
x/viewres-1.0.4-arm-1.tgz:  Upgraded.
x/wqy-zenhei-font-ttf-0.9.45-noarch-1.tgz:  Upgraded.
x/xbacklight-1.2.0-arm-1.tgz:  Upgraded.
x/xcalc-1.0.5-arm-1.tgz:  Upgraded.
x/xcb-proto-1.8-arm-1.tgz:  Upgraded.
x/xcm-0.5.2-arm-1.tgz:  Added.
x/xconsole-1.0.5-arm-1.tgz:  Upgraded.
x/xditview-1.0.3-arm-1.tgz:  Upgraded.
x/xedit-1.2.1-arm-1.tgz:  Upgraded.
x/xf86-input-acecad-1.5.0-arm-2.tgz:  Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-2.tgz:  Rebuilt.
x/xf86-input-evdev-2.7.3-arm-1.tgz:  Upgraded.
x/xf86-input-joystick-1.6.1-arm-2.tgz:  Rebuilt.
x/xf86-input-keyboard-1.6.2-arm-1.tgz:  Upgraded.
x/xf86-input-mouse-1.8.1-arm-1.tgz:  Upgraded.
x/xf86-input-penmount-1.5.0-arm-2.tgz:  Rebuilt.
x/xf86-input-synaptics-1.6.3-arm-1.tgz:  Upgraded.
x/xf86-input-void-1.4.0-arm-2.tgz:  Rebuilt.
x/xf86-input-wacom-0.19.0-arm-1.tgz:  Upgraded.
x/xf86-video-apm-1.2.5-arm-1.tgz:  Upgraded.
x/xf86-video-ark-0.7.5-arm-1.tgz:  Upgraded.
x/xf86-video-ast-0.97.0-arm-1.tgz:  Upgraded.
x/xf86-video-ati-7.1.0-arm-1.tgz:  Upgraded.
x/xf86-video-chips-1.2.5-arm-1.tgz:  Upgraded.
x/xf86-video-cirrus-1.5.2-arm-1.tgz:  Upgraded.
x/xf86-video-dummy-0.3.6-arm-1.tgz:  Upgraded.
x/xf86-video-fbdev-0.4.3-arm-2.tgz:  Rebuilt.
x/xf86-video-glint-1.2.8-arm-1.tgz:  Upgraded.
x/xf86-video-i128-1.3.6-arm-1.tgz:  Upgraded.
x/xf86-video-i740-1.3.4-arm-1.tgz:  Upgraded.
x/xf86-video-mach64-6.9.4-arm-1.tgz:  Upgraded.
x/xf86-video-mga-1.6.2-arm-1.tgz:  Upgraded.
x/xf86-video-modesetting-0.6.0-arm-1.tgz:  Upgraded.
x/xf86-video-neomagic-1.2.7-arm-1.tgz:  Upgraded.
x/xf86-video-nv-2.1.20-arm-2.tgz:  Rebuilt.
x/xf86-video-openchrome-0.3.1-arm-1.tgz:  Upgraded.
  Merged upstream patch to fix lockups with some chipsets.
  Thanks to J. Scott Heppler.
x/xf86-video-r128-6.9.1-arm-1.tgz:  Upgraded.
x/xf86-video-rendition-4.2.5-arm-1.tgz:  Upgraded.
x/xf86-video-s3-0.6.5-arm-1.tgz:  Upgraded.
x/xf86-video-s3virge-1.10.6-arm-1.tgz:  Upgraded.
x/xf86-video-savage-2.3.6-arm-1.tgz:  Upgraded.
x/xf86-video-siliconmotion-1.7.7-arm-1.tgz:  Upgraded.
x/xf86-video-sis-0.10.7-arm-1.tgz:  Upgraded.
x/xf86-video-sisusb-0.9.6-arm-1.tgz:  Added.
x/xf86-video-tdfx-1.4.5-arm-1.tgz:  Upgraded.
x/xf86-video-tga-1.2.2-arm-1.tgz:  Upgraded.
x/xf86-video-trident-1.3.6-arm-1.tgz:  Upgraded.
x/xf86-video-tseng-1.2.5-arm-1.tgz:  Added.
x/xf86-video-v4l-0.2.0-arm-2.tgz:  Rebuilt.
x/xf86-video-vesa-2.3.2-arm-1.tgz:  Upgraded.
x/xf86-video-vmware-13.0.0-arm-1.tgz:  Upgraded.
x/xf86-video-voodoo-1.2.5-arm-1.tgz:  Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-2.tgz:  Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-1.tgz:  Added.
x/xfsinfo-1.0.4-arm-1.tgz:  Upgraded.
x/xkbutils-1.0.4-arm-1.tgz:  Upgraded.
x/xmag-1.0.5-arm-1.tgz:  Upgraded.
x/xmessage-1.0.4-arm-1.tgz:  Upgraded.
x/xorg-server-1.13.2-arm-2.tgz:  Rebuilt.
  Clean up randr provider removal, fixing a number of random server crashes
  on shutdown.  Thanks to Richard David Sherman and Robby Workman.
  Applied a patch to fix panning and scaling.
  Thanks to David Allen and Luigi Genoni.
x/xorg-server-xephyr-1.13.2-arm-2.tgz:  Rebuilt.
x/xorg-server-xnest-1.13.2-arm-2.tgz:  Rebuilt.
x/xorg-server-xvfb-1.13.2-arm-2.tgz:  Rebuilt.
x/xrandr-1.4.0-arm-1.tgz:  Upgraded.
x/xscope-1.4-arm-1.tgz:  Upgraded.
x/xsetroot-1.1.1-arm-1.tgz:  Upgraded.
x/xsm-1.0.3-arm-1.tgz:  Upgraded.
x/xstdcmap-1.0.3-arm-1.tgz:  Upgraded.
x/xterm-290-arm-1.tgz:  Upgraded.
x/xvidtune-1.0.3-arm-1.tgz:  Upgraded.
x/xvinfo-1.1.2-arm-1.tgz:  Upgraded.
+--------------------------+
Wed Feb 20 08:14:16 UTC 2013
a/gpm-1.20.7-arm-2.tgz:  Rebuilt.
  Fixed libgpm.so symlink.
ap/terminus-font-4.38-noarch-1.tgz:  Added.
extra/openjdk/openjdk-7u13_b20-armhfp-1.txz:  Upgraded.
  Please note that these packages are named "hfp" because I believe that, from
  testing, they only run on machines with a hardware floating point unit.  
  We've been unable to help determine why these packages do not work nor build 
  on armv5 machines.

  These OpenJDK/JRE packages fix many security issues:
  S6563318, CVE-2013-0424: RMI data sanitization.
  S6664509, CVE-2013-0425: Add logging context.
  S6664528, CVE-2013-0426: Find log level matching its name or value given
                           at construction time.
  S6776941, CVE-2013-0427: Improve thread pool shutdown.
  S7141694, CVE-2013-0429: Improving CORBA internals.
  S7173145: Improve in-memory representation of splashscreens.
  S7186945: Unpack200 improvement.
  S7186946: Refine unpacker resource usage.
  S7186948: Improve Swing data validation.
  S7186952, CVE-2013-0432: Improve clipboard access.
  S7186954: Improve connection performance.
  S7186957: Improve Pack200 data validation.
  S7192392, CVE-2013-0443: Better validation of client keys.
  S7192393, CVE-2013-0440: Better Checking of order of TLS Messages.
  S7192977, CVE-2013-0442: Issue in toolkit thread.
  S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies.
  S7200491: Tighten up JTable layout code.
  S7200500: Launcher better input validation.
  S7201064: Better dialogue checking.
  S7201066, CVE-2013-0441: Change modifiers on unused fields.
  S7201068, CVE-2013-0435: Better handling of UI elements.
  S7201070: Serialization to conform to protocol.
  S7201071, CVE-2013-0433: InetSocketAddress serialization issue.
  S8000210: Improve JarFile code quality.
  S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class.
  S8000540, CVE-2013-1475: Improve IIOP type reuse management.
  S8000631, CVE-2013-1476: Restrict access to class constructor.
  S8001235, CVE-2013-0434: Improve JAXP HTTP handling.
  S8001242: Improve RMI HTTP conformance.
  S8001307: Modify ACC_SUPER behavior.
  S8001972, CVE-2013-1478: Improve image processing.
  S8002325, CVE-2013-1480: Improve management of images.
  (* Security fix *)
extra/openjdk/openjre-7u13_b20-armhfp-1.txz:  Upgraded.
  (* Security fix *)
+--------------------------+
Mon Feb 18 20:38:09 UTC 2013

KDE has been upgraded to version 4.10.0.  The 'kdeedu' packages are missing
because 'analitza' would not build on ARM.  I will revisit this later. 'KWin' 
also segfaults upon launching KDE as with the previous KDE versions, but seems to
cause no ill effects after closing the dialog box!

I've been keen to get the 'gcc-go' package built (it had been absent because it
required a minimum of glibc-2.16 on ARM), so glibc has been upgraded to
version 2.17.  We've jumped the gun a little here since Slackware x86 hasn't yet
made this jump.  However, the 2.17 components should more or less the same sources
that make it into the x86 tree in the near future.

The mini root filesystem for -current has also been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/

a/glibc-solibs-2.17-arm-1.tgz:  Upgraded.
  You must be running at least Linux 3.4.11 before applying this update.
a/glibc-zoneinfo-2012j-noarch-1.tgz:  Upgraded.
a/gpm-1.20.7-arm-1.tgz:  Upgraded.
  This bumps the shared library version number, and will require
  several other packages to be recompiled.  This will be done after
  there's been some time to test this in -current.  Meanwhile, things
  should continue to work normally with the old shared library in
  the aaa_elflibs package.
a/kernel-modules-kirkwood-3.7.9_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.7.9_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.7.9_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.7.9-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.7.9-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.7.9-arm-1.tgz:  Upgraded.
ap/hplip-3.13.2-arm-1.tgz:  Upgraded.
d/gcc-4.7.2-arm-3.tgz:  Rebuilt.
d/gcc-g++-4.7.2-arm-3.tgz:  Rebuilt.
d/gcc-gfortran-4.7.2-arm-3.tgz:  Rebuilt.
d/gcc-gnat-4.7.2-arm-3.tgz:  Rebuilt.
d/gcc-go-4.7.2-arm-3.tgz:  Added.
d/gcc-java-4.7.2-arm-3.tgz:  Rebuilt.
d/gcc-objc-4.7.2-arm-3.tgz:  Rebuilt.
d/git-1.8.1.3-arm-1.tgz:  Upgraded.
d/kernel-headers-3.7.9-arm-1.tgz:  Upgraded.
k/kernel-source-3.7.9-arm-1.tgz:  Upgraded.
kde/amarok-2.7.0-arm-1.tgz:  Upgraded.
kde/ark-4.10.0-arm-1.tgz:  Upgraded.
kde/audiocd-kio-4.10.0-arm-1.tgz:  Added.
kde/bluedevil-1.3-arm-1.tgz:  Upgraded.
kde/bomber-4.10.0-arm-1.tgz:  Added.
kde/bovo-4.10.0-arm-1.tgz:  Added.
kde/calligra-2.6.0-arm-1.tgz:  Upgraded.
kde/dragon-4.10.0-arm-1.tgz:  Added.
kde/filelight-4.10.0-arm-1.tgz:  Upgraded.
kde/granatier-4.10.0-arm-1.tgz:  Added.
kde/gwenview-4.10.0-arm-1.tgz:  Upgraded.
kde/juk-4.10.0-arm-1.tgz:  Added.
kde/k3b-2.0.2_20120226.git-arm-1.tgz:  Upgraded.
kde/kaccessible-4.10.0-arm-1.tgz:  Upgraded.
kde/kactivities-4.10.0-arm-1.tgz:  Upgraded.
kde/kajongg-4.10.0-arm-1.tgz:  Added.
kde/kamera-4.10.0-arm-1.tgz:  Upgraded.
kde/kapman-4.10.0-arm-1.tgz:  Added.
kde/kate-4.10.0-arm-1.tgz:  Upgraded.
kde/katomic-4.10.0-arm-1.tgz:  Added.
kde/kaudiocreator-1.3-arm-1.tgz:  Upgraded.
kde/kblackbox-4.10.0-arm-1.tgz:  Added.
kde/kblocks-4.10.0-arm-1.tgz:  Added.
kde/kbounce-4.10.0-arm-1.tgz:  Added.
kde/kbreakout-4.10.0-arm-1.tgz:  Added.
kde/kcalc-4.10.0-arm-1.tgz:  Upgraded.
kde/kcharselect-4.10.0-arm-1.tgz:  Upgraded.
kde/kcolorchooser-4.10.0-arm-1.tgz:  Upgraded.
kde/kde-base-artwork-4.10.0-arm-1.tgz:  Added.
kde/kde-baseapps-4.10.0-arm-1.tgz:  Upgraded.
kde/kde-runtime-4.10.0-arm-1.tgz:  Upgraded.
kde/kde-wallpapers-4.10.0-noarch-1.tgz:  Upgraded.
kde/kde-workspace-4.10.0-arm-1.tgz:  Upgraded.
kde/kdeadmin-4.10.0-arm-1.tgz:  Upgraded.
kde/kdeartwork-4.10.0-arm-1.tgz:  Upgraded.
kde/kdegraphics-mobipocket-4.10.0-arm-1.tgz:  Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.0-arm-1.tgz:  Upgraded.
kde/kdegraphics-thumbnailers-4.10.0-arm-1.tgz:  Upgraded.
kde/kdelibs-4.10.0-arm-1.tgz:  Upgraded.
kde/kdenetwork-4.10.0-arm-1.tgz:  Upgraded.
kde/kdepim-4.10.0-arm-1.tgz:  Upgraded.
kde/kdepim-runtime-4.10.0-arm-1.tgz:  Upgraded.
kde/kdepimlibs-4.10.0-arm-1.tgz:  Upgraded.
kde/kdeplasma-addons-4.10.0-arm-1.tgz:  Upgraded.
kde/kdesdk-4.10.0-arm-1.tgz:  Upgraded.
kde/kdetoys-4.10.0-arm-1.tgz:  Upgraded.
kde/kdevelop-4.4.1-arm-1.tgz:  Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-1.tgz:  Upgraded.
kde/kdevplatform-1.4.1-arm-1.tgz:  Upgraded.
kde/kdewebdev-4.10.0-arm-1.tgz:  Upgraded.
kde/kdf-4.10.0-arm-1.tgz:  Upgraded.
kde/kdiamond-4.10.0-arm-1.tgz:  Added.
kde/kfloppy-4.10.0-arm-1.tgz:  Upgraded.
kde/kfourinline-4.10.0-arm-1.tgz:  Added.
kde/kgamma-4.10.0-arm-1.tgz:  Upgraded.
kde/kgoldrunner-4.10.0-arm-1.tgz:  Added.
kde/kgpg-4.10.0-arm-1.tgz:  Upgraded.
kde/kigo-4.10.0-arm-1.tgz:  Added.
kde/killbots-4.10.0-arm-1.tgz:  Added.
kde/kio-mtp-fae62fc_20121225git-arm-1.tgz:  Added.
kde/kiriki-4.10.0-arm-1.tgz:  Added.
kde/kjumpingcube-4.10.0-arm-1.tgz:  Added.
kde/klickety-4.10.0-arm-1.tgz:  Added.
kde/klines-4.10.0-arm-1.tgz:  Added.
kde/kmag-4.10.0-arm-1.tgz:  Added.
kde/kmahjongg-4.10.0-arm-1.tgz:  Added.
kde/kmines-4.10.0-arm-1.tgz:  Added.
kde/kmix-4.10.0-arm-1.tgz:  Added.
kde/kmousetool-4.10.0-arm-1.tgz:  Upgraded.
kde/kmouth-4.10.0-arm-1.tgz:  Upgraded.
kde/knavalbattle-4.10.0-arm-1.tgz:  Added.
kde/knetwalk-4.10.0-arm-1.tgz:  Added.
kde/kolf-4.10.0-arm-1.tgz:  Added.
kde/kollision-4.10.0-arm-1.tgz:  Added.
kde/kolourpaint-4.10.0-arm-1.tgz:  Upgraded.
kde/konquest-4.10.0-arm-1.tgz:  Added.
kde/konsole-4.10.0-arm-1.tgz:  Upgraded.
kde/korundum-4.10.0-arm-1.tgz:  Upgraded.
kde/kpat-4.10.0-arm-1.tgz:  Added.
kde/kplayer-0.7.2-arm-1.tgz:  Upgraded.
kde/kremotecontrol-4.10.0-arm-1.tgz:  Upgraded.
kde/kreversi-4.10.0-arm-1.tgz:  Added.
kde/kross-interpreters-4.10.0-arm-1.tgz:  Added.
kde/kruler-4.10.0-arm-1.tgz:  Upgraded.
kde/ksaneplugin-4.10.0-arm-1.tgz:  Upgraded.
kde/kscreen-0.0.71-arm-1.tgz:  Added.
kde/kshisen-4.10.0-arm-1.tgz:  Added.
kde/ksirk-4.10.0-arm-1.tgz:  Added.
kde/ksnakeduel-4.10.0-arm-1.tgz:  Added.
kde/ksnapshot-4.10.0-arm-1.tgz:  Upgraded.
kde/kspaceduel-4.10.0-arm-1.tgz:  Added.
kde/ksquares-4.10.0-arm-1.tgz:  Added.
kde/ksudoku-4.10.0-arm-1.tgz:  Added.
kde/ktimer-4.10.0-arm-1.tgz:  Upgraded.
kde/ktorrent-4.3.1-arm-1.tgz:  Upgraded.
kde/ktuberling-4.10.0-arm-1.tgz:  Added.
kde/kubrick-4.10.0-arm-1.tgz:  Added.
kde/kwallet-4.10.0-arm-1.tgz:  Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz:  Upgraded.
kde/libkcddb-4.10.0-arm-1.tgz:  Added.
kde/libkcompactdisc-4.10.0-arm-1.tgz:  Added.
kde/libkdcraw-4.10.0-arm-1.tgz:  Added.
kde/libkdegames-4.10.0-arm-1.tgz:  Added.
kde/libkexiv2-4.10.0-arm-1.tgz:  Upgraded.
kde/libkipi-4.10.0-arm-1.tgz:  Upgraded.
kde/libkmahjongg-4.10.0-arm-1.tgz:  Added.
kde/libksane-4.10.0-arm-1.tgz:  Upgraded.
kde/libkscreen-0.0.71-arm-1.tgz:  Added.
kde/libktorrent-1.3.1-arm-1.tgz:  Upgraded.
kde/lskat-4.10.0-arm-1.tgz:  Added.
kde/mplayerthumbs-4.10.0-arm-1.tgz:  Added.
kde/nepomuk-core-4.10.0-arm-1.tgz:  Added.
kde/nepomuk-widgets-4.10.0-arm-1.tgz:  Added.
kde/networkmanagement-0.9.0-arm-1.tgz:  Upgraded.
kde/okular-4.10.0-arm-1.tgz:  Upgraded.
kde/oxygen-gtk2-1.3.1-arm-1.tgz:  Upgraded.
kde/oxygen-gtk3-1.1.1-arm-1.tgz:  Added.
kde/oxygen-icons-4.10.0-arm-1.tgz:  Upgraded.
kde/palapeli-4.10.0-arm-1.tgz:  Added.
kde/perlkde-4.10.0-arm-1.tgz:  Upgraded.
kde/perlqt-4.10.0-arm-1.tgz:  Upgraded.
kde/picmi-4.10.0-arm-1.tgz:  Added.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz:  Upgraded.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz:  Upgraded.
kde/print-manager-4.10.0-arm-1.tgz:  Added.
kde/qtruby-4.10.0-arm-1.tgz:  Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz:  Upgraded.
kde/skanlite-0.9-arm-1.tgz:  Upgraded.
kde/smokegen-4.10.0-arm-1.tgz:  Upgraded.
kde/smokekde-4.10.0-arm-1.tgz:  Upgraded.
kde/smokeqt-4.10.0-arm-1.tgz:  Upgraded.
kde/superkaramba-4.10.0-arm-1.tgz:  Upgraded.
kde/svgpart-4.10.0-arm-1.tgz:  Upgraded.
kde/sweeper-4.10.0-arm-1.tgz:  Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz:  Upgraded.
kdei/kde-l10n-*-4.10.0-noarch-1.tgz:  Upgraded.
kdei/calligra-l10n-*-2.6.0-noarch-1.tgz:  Upgraded.
l/glibc-2.17-arm-1.tgz:  Upgraded.
  glibc now requires a *minimum* running version of Linux kernel 3.4.11. This
  enables an upgrade from Slackware ARM 14.0.  If you do not have at least Linux
  3.4.11 running on your system, you should not apply this batch or any further
  updates from slackwarearm-current until you have upgraded the kernel on your
  system.
l/glibc-i18n-2.17-arm-1.tgz:  Upgraded.
l/glibc-profile-2.17-arm-1.tgz:  Upgraded.
l/polkit-0.105-arm-4.tgz:  Rebuilt.
  Reverted a patch that set the members of the wheel group as the
  authorized administrators.  On Slackware, root is the administrator
  and the wheel group is mostly unused.  Thanks to G?rard Monpontet.
l/QScintilla-2.6.1-arm-4.tgz:  Rebuilt.
  Recompiled against the new sip to fix API incompatibilities.
  Thanks to ecoslacker and alienBOB.
l/slang-2.2.4-arm-1.tgz:  Upgraded.
n/slrn-1.0.1-arm-1.tgz:  Upgraded.
xap/fluxbox-1.3.5-arm-1.tgz:  Upgraded.
xap/pidgin-2.10.7-arm-1.tgz:  Upgraded.
  This update fixes several security issues:
  Remote MXit user could specify local file path.
  MXit buffer overflow reading data from network.
  Sametime crash with long user IDs.
  Crash when receiving a UPnP response with abnormally long values.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
  (* Security fix *)
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Wed Feb 13 21:19:08 UTC 2013
a/openssl-solibs-1.0.1e-arm-1.tgz:  Upgraded.
ap/lm_sensors-3.3.3-arm-1.tgz:  Upgraded.
l/PyQt-4.9.6-arm-1.tgz:  Upgraded.
l/akonadi-1.9.0-arm-1.tgz:  Upgraded.
l/attica-0.4.1-arm-1.tgz:  Upgraded.
l/boost-1.52.0-arm-1.tgz:  Upgraded.
l/ebook-tools-0.2.2-arm-1.tgz:  Upgraded.
l/enchant-1.6.0-arm-1.tgz:  Upgraded.
l/grantlee-0.3.0-arm-1.tgz:  Upgraded.
l/liblastfm-1.0.3-arm-1.tgz:  Upgraded.
l/libmtp-1.1.5-arm-1.tgz:  Upgraded.
l/libplist-1.8-arm-1.tgz:  Upgraded.
l/libsamplerate-0.1.8-arm-1.tgz:  Upgraded.
l/libsndfile-1.0.25-arm-1.tgz:  Upgraded.
l/libwpd-0.9.6-arm-1.tgz:  Upgraded.
l/qjson-0.8.1-arm-1.tgz:  Added.
l/qt-4.8.4-arm-1.tgz:  Upgraded.
l/shared-desktop-ontologies-0.10.0-arm-1.tgz:  Upgraded.
l/sip-4.14.2-arm-1.tgz:  Upgraded.
l/soprano-2.9.0-arm-1.tgz:  Upgraded.
l/virtuoso-ose-6.1.6-arm-1.tgz:  Upgraded.
n/curl-7.29.0-arm-2.tgz:  Rebuilt.
  Patched to fix a segfault when closing an unused multi.
  Thanks to Willy Sudiarto Raharjo.
n/openssl-1.0.1e-arm-1.tgz:  Upgraded.
  This release fixes a regression in openssl-1.0.1d, where the fix for
  CVE-2013-0169 caused data corruption on CPUs with AES-NI support.
n/sendmail-8.14.6-arm-1.tgz:  Upgraded.
n/sendmail-cf-8.14.6-noarch-1.tgz:  Upgraded.
xap/fluxbox-1.3.4-arm-1.tgz:  Upgraded.
xap/gimp-2.8.4-arm-1.tgz:  Upgraded.
+--------------------------+
Sun Feb 10 10:11:49 UTC 2013
a/openssl-solibs-1.0.1d-arm-1.tgz:  Upgraded.
  (* Security fix *)
a/slocate-3.1-arm-4.tgz:  Rebuilt.
  Fixed incorrect ownerships and permissions.
  Thanks to Guan Xin.
ap/slackpkg-2.82.0-arm-5.tgz:  Rebuilt.
  Updated the FTP site addresses for Slackware ARM.
l/phonon-gstreamer-4.6.3-arm-1.tgz:  Upgraded.
n/openssl-1.0.1d-arm-1.tgz:  Upgraded.
    Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
  This addresses the flaw in CBC record processing discovered by
  Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
  at: http://www.isg.rhul.ac.uk/tls/
  Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
  Security Group at Royal Holloway, University of London
  (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
  Emilia K?sper for the initial patch.
  (CVE-2013-0169)
  [Emilia K?sper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
    Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode
  ciphersuites which can be exploited in a denial of service attack.
  Thanks go to and to Adam Langley <agl@chromium.org> for discovering
  and detecting this bug and to Wolfgang Ettlinger
  <wolfgang.ettlinger@gmail.com> for independently discovering this issue.
  (CVE-2012-2686)
  [Adam Langley]
    Return an error when checking OCSP signatures when key is NULL.
  This fixes a DoS attack. (CVE-2013-0166)
  [Steve Henson]
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
  (* Security fix *)
+--------------------------+
Fri Feb  8 21:36:28 UTC 2013
l/sdl-1.2.15-arm-1.tgz:  Upgraded.
  Upgraded to SDL-1.2.15, SDL_image-1.2.12, SDL_mixer-1.2.12,
  SDL_net-1.2.8, and SDL_ttf-2.0.11.
  Patched resizing and mouse clicking bugs.
n/curl-7.29.0-arm-1.tgz:  Upgraded.
  When negotiating SASL DIGEST-MD5 authentication, the function
  Curl_sasl_create_digest_md5_message() uses the data provided from the
  server without doing the proper length checks and that data is then
  appended to a local fixed-size buffer on the stack.  This vulnerability
  can be exploited by someone who is in control of a server that a libcurl
  based program is accessing with POP3, SMTP or IMAP.  For applications
  that accept user provided URLs, it is also thinkable that a malicious
  user would feed an application with a URL to a server hosting code
  targeting this flaw.
  Affected versions: curl 7.26.0 to and including 7.28.1
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
  (* Security fix *)
+--------------------------+
Wed Feb  6 20:36:35 UTC 2013
a/kernel-modules-kirkwood-3.7.5_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.7.5_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.7.5_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.7.5-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.7.5-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.7.5-arm-1.tgz:  Upgraded.
a/sharutils-4.13.3-arm-1.tgz:  Upgraded.
ap/hplip-3.12.11-arm-2.tgz:  Rebuilt.
  Recompiled with --enable-cups-ppd-install.  Thanks to guanx.
ap/moc-2.5.0_beta1-arm-1.tgz:  Upgraded.
d/gcc-4.7.2-arm-2.tgz:  Rebuilt.
d/gcc-g++-4.7.2-arm-2.tgz:  Rebuilt.
d/gcc-gfortran-4.7.2-arm-2.tgz:  Rebuilt.
d/gcc-gnat-4.7.2-arm-2.tgz:  Rebuilt.
d/gcc-java-4.7.2-arm-2.tgz:  Rebuilt.
d/gcc-objc-4.7.2-arm-2.tgz:  Rebuilt.
d/llvm-3.2-arm-2.tgz:  Rebuilt.
  Removed dependency on GCC include files, and cleaned up some other paths.  
  Thanks to Heinz Wiesinger.
d/make-3.82-arm-4.tgz:  Rebuilt.
  Applied patch containing upstream bugfixes.
k/kernel-source-3.7.5-arm-1.tgz:  Upgraded.
l/taglib-1.8-arm-1.tgz:  Upgraded.
n/dhcp-4.2.5-arm-1.tgz:  Upgraded.
n/dhcpcd-5.6.6-arm-1.tgz:  Upgraded.
n/iproute2-3.6.0-arm-1.tgz:  Upgraded.
n/iptables-1.4.17-arm-1.tgz:  Upgraded.
n/nmap-6.25-arm-1.tgz:  Upgraded.
extra/brandy/brandy-1.20pre5-arm-1.tgz:  Added.
  This is a BBC BASIC interpreter.
isolinux/*:  Upgraded.
kernels/*:  Upgraded.
+--------------------------+
Fri Jan 25 19:25:38 UTC 2013
a/sysvinit-2.88dsf-arm-3.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
a/udev-182-arm-4.tgz:  Rebuilt.
  The upgrade to the 3.7.1 kernel broke the generation of persistent optical
  device rules, and existing rules in 70-persistent-cd.rules no longer worked.
  This update fixes the issue by basing the rules on ID_SERIAL rather than
  ID_PATH (which is not supported by the new kernel's libata transport class).
  After upgrading the package, remove /etc/udev/rules.d/70-persistent-cd.rules
  and reboot the machine.  This will create a working rules file and restore
  the expected symbolic links to optical devices in /dev.
a/xfsprogs-3.1.8-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
ap/hplip-3.12.11-arm-1.tgz:  Upgraded.
ap/ksh93-2012_07_27-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
ap/mysql-5.5.29-arm-1.tgz:  Upgraded.
  Upgraded to the latest upstream version to fix security issues and provide
  other bug fixes and improvements.  Note that some of the changes may
  possibly introduce incompatibilities with the previous package.
  (* Security fix *)
ap/vim-7.3.645-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
d/perl-5.16.1-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
l/gtk+2-2.24.10-arm-3.tgz:  Rebuilt.
  Added missing /etc/profile.d shell profile scripts.
l/librsvg-2.36.1-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
l/ncurses-5.9-arm-3.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
n/bootp-2.4.3-arm-3.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
n/mailx-12.5-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
n/php-5.4.11-arm-1.tgz:  Upgraded.
tcl/tk-8.5.11-arm-2.tgz:  Rebuilt.
  Fixed broken symlinks.  Thanks to Andrew Kroll.
xap/gucharmap-3.4.1-arm-2.tgz:  Rebuilt.
  Install the doinst.sh header properly, and use chroot to run
  update-desktop-database and glib-compile-schemas to insure the package is
  installed correctly during an initial installation.
  Thanks to David Gabriel Rodriguez Castillo and Matteo Bernardini.
+--------------------------+
Fri Jan 18 19:48:50 UTC 2013

The previous builds were marked as 'arm', but it has surfaced that these and the
previous packages only work on machines with a hardware floating point, so the
packages have been re-classifed as such.  I haven't been able to determine how
or what to change in order to get them building for machines without an FPU;
may be when time permits I'll look further into it.

extra/openjdk/openjdk-7u9_b30-armhfp-2.txz:  Rebuilt.
  This release fixes issues with an improper permission check in the
  reflection API in OpenJDK.  An untrusted Java application or applet
  could use these flaws to bypass Java sandbox restrictions.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174
  (* Security fix *)
extra/openjdk/openjre-7u9_b30-armhfp-2.txz:  Rebuilt.
  This release fixes issues with an improper permission check in the
  reflection API in OpenJDK.  An untrusted Java application or applet
  could use these flaws to bypass Java sandbox restrictions.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174
  (* Security fix *)
+--------------------------+
Wed Jan 16 19:16:02 UTC 2013
l/freetype-2.4.11-arm-1.tgz:  Upgraded.
  This release fixes several security bugs that could cause freetype to
  crash or run programs upon opening a specially crafted file.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
  (* Security fix *)
+--------------------------+
Sun Jan 13 16:06:46 UTC 2013

I have built the latest Mozilla packages for -current only, and placed them out of
the main tree here:

ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages

These are built for minimum target of 'armv6j'.  I can only build these because 
my '-current' build host is an ARMv7 machine with a hardware FPU.  The build hosts
for the stable releases of Slackware ARM are ARMv5 machines, upon which these
packages cannot be built, thus cannot be maintained.  Therefore, I will maintain
the Mozilla packages *only* for users who follow -current closely, but will no
longer provide any new Mozilla packages for any stable releases (apart from 13.37
which uses Firefox v3).  The reason for moving the new versions of the packages
out of the main tree is because anything in -current ordinarily implies that it
will be present in the next stable release, which of course cannot happen if they
can't be built on the hardware used to maintain stable releases.
+--------------------------+
Sat Jan 12 18:06:46 UTC 2013

Please note that the Mozilla suite of packages ('FireFox', 'Thunderbird' and
'Seamonkey') have been removed from Slackware ARM in this batch of updates. 
This is due to these applications not supporting the ARMv5 platform.  I cannot
build versions greater than 17.x, so I have removed them.  I've considered the
ESR versions of Firefox but these just postpone the inevitable removal, since at
a later point in time, we'd still be trying to build a newer release of an app
that does not compile.  The previous packages will remain in 'pasture', but be
aware that they are now not considered 'secure'.

d/binutils-2.23.51.0.6-arm-2.tgz:  Rebuilt.
  Removed "/usr/bin/windres".
  This was causing some builds to fail, as on ARM it fails with 
  "cannot detect architecture".
  Thanks to Richard Lapointe.
d/cmake-2.8.10.2-arm-1.tgz:  Upgraded.
d/llvm-3.2-arm-1.tgz:  Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-2.tgz:  Removed.
  Moved to /pasture.
  Nothing in Slackware ARM relies upon this library ('mozilla-nss' is used),
  so this is a safe removal.  If you had a 3rd party/your own packages linking
  against the libraries in this package, you could rebuild it against
  'l/mozilla-nss'.
n/php-5.4.7-arm-2.tgz:  Rebuilt.
  Corrected the permissions on /var/lib/php (chmod 770).
  Thanks to Hans de Bruin.
xap/mozilla-firefox-17.0.1-armhfp-2.tgz:  Removed.
  Moved to /pasture.
xap/mozilla-thunderbird-17.0-armhfp-3.tgz:  Removed.
  Moved to /pasture.
xap/seamonkey-2.14.1-armhfp-2.tgz:  Removed.
  Moved to /pasture.
extra/autoconf213/autoconf-2.13-noarch-2.tgz:  Rebuilt.
  Added versioned symlinks as some apps search for them explicitly.
pasture/mozilla-firefox-17.0.1-armhfp-2.tgz:  Moved to /pasture.
pasture/mozilla-thunderbird-17.0-armhfp-3.tgz:  Moved to /pasture.
pasture/seamonkey-2.14.1-armhfp-2.tgz:  Moved to /pasture.
pasture/seamonkey-solibs-2.14.1-armhfp-2.tgz:  Moved to /pasture.
+--------------------------+
Tue Jan  1 01:20:13 UTC 2013

Toolchain and Kernel updates!  This is the first time I've provided Kernels 
with support for the Flattened Device Tree ('FTD').  I've shipped each Kernel
package with all of the '.dtb' files for the corresponding architecture - you'll
find them in '/boot/dtb'.  The Kernels also _support_ having a DTB appended to
the Kernel zImage in case your version of U-Boot does not support FDT.  If this
is the case, please read '/kernels/README.TXT' -- but note that none of the 
Kernels actually have any DTB appended.

I've been running the 3.7.1 Kernels for just over two weeks here on the Tegra20
and Kirkwood platforms, and they've proven to be stable.  Unfortunately I've not
been able to get the 'versatile' Kernel in a good state due to a problem with the
'SYM53C8XX' SCSI driver (see below).  If anyone can help fix that, please let me
know and send the fix upstream too.

Make sure you read and fully understand the notes for the 'Tegra/Trimslice' 
kernels, otherwise you might get grumpy! ;-)

Happy new year!

 Stuart.

/INSTALL_TEGRA.TXT:  Updated.
  Updated boot configuration settings to use DTB (Device Tree Blob) files.
  You will need to upgrade the version of 'U-Boot' on your Trimslice in order
  to boot the latest kernel provided in this batch.
  I suggest first upgrading the kernel, then rebooting into the U-Boot command
  prompt; upgrading the U-Boot firmware, reconfiguring then rebooting into the
  new kernel.
  See the first section of this document for more details.
a/kernel-firmware-20121228git-noarch-1.tgz:  Upgraded.
a/kernel-modules-kirkwood-3.7.1_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.7.1_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.7.1_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.7.1-arm-1.tgz:  Upgraded.
  Tested on booting on:
  OpenRD Client
   "U-Boot 1.1.4 (Oct 27 2009 - 21:57:24) Marvell version: 3.4.19"
  SheevaPlug Development Kit:
   "U-Boot 1.1.4 (Dec 27 2009 - 22:03:21) Marvell version: 3.4.27"
  I would assume that since these old versions of U-Boot support booting this
  new kernel, any newer versions of U-Boot will also work correctly.  
  For this Kirkwood kernel upgrade, you should be safe to just upgrade the
  kernel and reboot.
a/kernel_tegra-3.7.1-arm-1.tgz:  Upgraded.
  Once you have updated your U-Boot configuration (see above)
  you need to update U-Boot config - refer to section 5.0 ("Booting the Slackware
  ARM OS") in the '/INSTALL_TEGRA.TXT' document.  You will need to ensure you're
  familiar with your existing partitioning scheme and adjust the settings
  accordingly, as you would have originally when you installed Slackware on to
  your TrimSlice.  If you followed the partitioning scheme as described in the
  documents, you can safely paste in the lines exactly as in the revised version
  of the same document, save, and reboot.

  Important note:  You MUST remove all instances of memory configuration
  values from your U-Boot settings.  The Tegra install document (above)
  contains values such as:
       mem=384M@0M mem=512M@512M nvmem=128M@384M vmalloc=248M video=tegrafb

  If you have any of those settings in your U-Boot configuration, they will
  prevent the kernel from booting.   Use the U-Boot 'printenv' command to
  view your current settings, and 'setenv' to adjust the variables to remove
  any instances of the above, then 'save;reset' to conclude the changes.

  Whilst it's certainly not ideal to lose half of your useable RAM, it is
  currently the only option until the Trimslice developers provide a new
  U-Boot.

a/kernel_versatile-3.7.1-arm-1.tgz:  Upgraded.
  Tested with QEMU-1.3.0.
  The SCSI driver ('SYM53C8XX') is broken in this release, so this kernel
  is of limited  value.  I tried compiling it as a module and into the
  kernel, but it fails:
   [  127.124417] sym0: SCSI BUS has been reset.
   [  132.117466] scsi 0:0:2:0: HOST RESET operation timed-out.
   [  132.117640] scsi 0:0:2:0: Device offlined - not ready after error recovery
   [  153.157485] scsi 0:0:3:0: ABORT operation started

  Please do let me know if you know how to fix it!

  Other than this particular issue with this driver, the kernel seems reliable.

ap/slackpkg-2.82.0-arm-4.tgz:  Rebuilt.
  Added the up to date mirror list from http://www.armedslack.org/getslack/
d/binutils-2.23.51.0.6-arm-1.tgz:  Upgraded.
d/device-tree-compiler-1.3.0-arm-1.tgz:  Added.
  This tool is for working with Flattened Device Tree (FTD) and
  Device Tree Source (DTS).  For more information on Device Trees, see:
    http://elinux.org/Device_Trees
    http://www.devicetree.org
    http://www.informit.com/articles/article.aspx?p=1647051&seqNum=5
    http://elinux.org/images/4/48//Experiences_With_Device_Tree_Support_Development_For_ARM-Based_SOC's.pdf
  You need this to be installed in order to build the 'DTB' files that are now
  shipped with the Slackware ARM kernels.
d/gcc-4.7.2-arm-1.tgz:  Upgraded.
d/gcc-g++-4.7.2-arm-1.tgz:  Upgraded.
d/gcc-gfortran-4.7.2-arm-1.tgz:  Upgraded.
d/gcc-gnat-4.7.2-arm-1.tgz:  Upgraded.
d/gcc-java-4.7.2-arm-1.tgz:  Upgraded.
d/gcc-objc-4.7.2-arm-1.tgz:  Upgraded.
d/kernel-headers-3.7.1-arm-1.tgz:  Upgraded.
d/oprofile-0.9.7-arm-3.tgz:  Rebuilt.
k/kernel-source-3.7.1-arm-1.tgz:  Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-2.tgz:  Rebuilt.
xap/mozilla-firefox-17.0.1-armhfp-2.tgz:  Rebuilt.
xap/mozilla-thunderbird-17.0-armhfp-3.tgz:  Rebuilt.
xap/seamonkey-2.14.1-armhfp-2.tgz:  Rebuilt.
  I had previously built these packages with optimisations for the ARMv6 CPU.
  However, I have now reverted the optimisations to 'armv5t'.  This is due to
  Slackware ARM stable releases being maintained on ARMv5 hardware.  
  The packages are still named 'hfp' since in order to run the packages, you still
  need a hardware floating point unit (although they can still be _compiled_ on
  systems without an FPU).
extra/kpartx/kpartx-0.4.9+git0.4dfdaf2b.6-arm-1.tgz:  Added.
  kpartx is part of the Linux 'multipath-tools' package.  It's particularly useful
  for creating device mappings to the partitions within disk 'image' files.  You 
  can then loopback mount the newly created device mappings to access the contents.
isolinux/*:  Rebuilt.
  You may notice that the size of the installer images has decreased.  This is 
  because I have removed the unnecessary firmware from /lib/firmware.  All of it
  was for network interface cards that do not exist on the supported platforms,
  and just wastes RAM when the installer is running.
kernels/README.TXT:  Updated.
  Added a section describing how to extract the 'zImage' from the U-Boot 'uImage'
  files, and how to append a DTB (Device Tree Blob) to the zImage.  You may need
  to do this if your U-Boot does not support loading DTBs directly and cannot be
  upgraded.
kernels/*/dtb/*:  Added.
  Added the 'DTB' files for each supported architecture.
  The DTB files are generated from the 'linux-x.x/arch/arm/boot/dts' directory
  within the Linux kernel source, and are refreshed every time a kernel package
  is built.
+--------------------------+
Tue Dec 11 18:34:24 UTC 2012
/INSTALL_KIRKWOOD.TXT:  Amended.
/INSTALL_QEMU.TXT:  Amended.
/INSTALL_TEGRA.TXT:  Amended.
  Added instructions for a local HTTP installation option.
  Thanks to dlachausse on linuxquestions.org.
  Adjusted the parameter names used to control the delay before attempting to
  mount the root file system, and the root file system type.
  You do not need to adjust your u-boot settings, as the original parameters
  continue to be supported by the initrd.
  Thanks to Thorsten M?hlfelder and Richard Lapointe for the suggestion.
a/kernel-modules-kirkwood-3.4.23_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.4.23_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.4.23_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.4.23-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.4.23-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.4.23-arm-1.tgz:  Upgraded.
a/mkinitrd-1.4.7-arm-3.tgz:  Rebuilt.
  Added support for the parameter names that control the delay before attempting
  to mount the root filesystem, and the root file system type: 'rootdelay' and
  'rootfstype' respectively.  These are the official/documented parameters in
  the Kernel documentation. The original parameters ('rootfs' and 'waitforroot')
  may still be used.
  Thanks to Thorsten M?hlfelder and Richard Lapointe for the suggestion.
  Unless specified when the initrd is built, or at boot time as a kernel
  parameter, wait a minimum of four seconds for the root device to become ready.
  Thanks to Jirtme Pinot for the suggestion and the patch.
k/kernel-source-3.4.23-arm-1.tgz:  Upgraded.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Fri Dec  7 19:56:05 UTC 2012
ap/sqlite-3.7.14.1-arm-1.tgz:  Upgraded.
  This is a bugfix release.
d/ruby-1.9.3_p327-arm-1.tgz:  Upgraded.
  This release fixes a hash-flooding DoS vulnerability and many other bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371
  (* Security fix *)
l/libssh-0.5.3-arm-1.tgz:  Upgraded.
  This release fixes several security bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562
  (* Security fix *)
l/libxml2-2.8.0-arm-2.tgz:  Rebuilt.
  Patched a heap-based buffer underflow in the xmlParseAttValueComplex
  function in parser.c in libxml2 2.9.0 and earlier that could allow a
  remote attacker to cause a denial of service or possibly execute
  arbitrary code via crafted entities in an XML document.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
  (* Security fix *)
n/bind-9.9.2_P1-arm-1.tgz:  Upgraded.
  This release addresses some denial-of-service and other bugs.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868
    https://kb.isc.org/article/AA-00829
  (* Security fix *)
+--------------------------+
Wed Dec  5 19:54:22 UTC 2012
a/kernel-modules-kirkwood-3.4.21_kirkwood-arm-1.tgz:  Upgraded.
a/kernel-modules-tegra-3.4.21_tegra-arm-1.tgz:  Upgraded.
a/kernel-modules-versatile-3.4.21_versatile-arm-1.tgz:  Upgraded.
a/kernel_kirkwood-3.4.21-arm-1.tgz:  Upgraded.
a/kernel_tegra-3.4.21-arm-1.tgz:  Upgraded.
a/kernel_versatile-3.4.21-arm-1.tgz:  Upgraded.
k/kernel-source-3.4.21-arm-1.tgz:  Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-1.tgz:  Upgraded.
a/mtd-utils-051212-arm-1.tgz:  Upgraded.
xap/mozilla-firefox-17.0.1-armv6j-1.tgz:  Upgraded.
  This is a bugfix release.
xap/seamonkey-2.14.1-armhfp-1.tgz:  Upgraded.
  This is a bugfix release.
isolinux/*:  Rebuilt.
kernels/*:  Upgraded.
+--------------------------+
Wed Nov 28 20:07:10 UTC 2012
a/glibc-solibs-2.15-arm-9.tgz:  Rebuilt.
a/glibc-zoneinfo-2012f_2012f-noarch-9.tgz:  Rebuilt.
l/glibc-2.15-arm-9.tgz:  Rebuilt.
l/glibc-i18n-2.15-arm-9.tgz:  Rebuilt.
l/glibc-profile-2.15-arm-9.tgz:  Rebuilt.
xap/mozilla-firefox-17.0-armv6j-2.tgz:  Rebuilt.
  Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages
  with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and
  gain any speed optimisations.
  Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built
  with these optimisations.
xap/mozilla-thunderbird-17.0-armv6j-2.tgz:  Rebuilt.
  Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages
  with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and
  gain any speed optimisations.
  Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built
  with these optimisations.
+--------------------------+
Fri Nov 23 18:03:14 UTC 2012
l/seamonkey-solibs-2.14-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
xap/mozilla-firefox-17.0-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-17.0-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
xap/seamonkey-2.14-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
+--------------------------+
Fri Nov  9 18:13:47 UTC 2012

I've added OpenJDK (Java Development Kit) and OpenJRE (Java Runtime Environment)
packages.  Thanks to Eric Hameleers.

a/kernel-firmware-20121030git-noarch-1.tgz:  Upgraded.
  Rather than take the firmware blobs from the kernel source tree, we now
  re-package the firmware package from Slackware x86, which takes its firmware
  from a different repository that includes additional firmware blobs.
  Thanks to Frank Donkers.
l/lcms2-2.4-arm-1.tgz:  Upgraded.
l/seamonkey-solibs-2.13.2-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
n/bind-9.9.2-arm-1.tgz:  Upgraded.
  Fixes these security issues:
  A certain combination of records in the RBT could cause named to hang
  while populating the additional section of a response. [RT #31090]
  Named could die on specially crafted record.  [RT #30416]
  (* Security fix *)
n/iptables-1.4.14-arm-2.tgz:  Rebuilt.
  Patched to fix a compiler related bug in iptables-restore.
  Thanks to linuxxer for the report and David Somero for a link to the patch.
n/pssh-2.3.1-arm-2.tgz:  Rebuilt.
  Correctly place docs into /usr/doc rather than /doc
  Thanks to Jirtme Pinot.
n/rp-pppoe-3.11-arm-1.tgz:  Upgraded.
xap/mozilla-firefox-16.0.2-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/firefox.html
  (* Security fix *)
xap/mozilla-thunderbird-16.0.2-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
  (* Security fix *)
xap/seamonkey-2.13.2-armhfp-1.tgz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
extra/openjdk/openjdk-7u9_b30-arm-1.txz:  Added.
  The Java Development Kit. If you want to develop in Java, this package plus
  'rhino' (below) will suit your needs.
extra/openjdk/openjre-7u9_b30-arm-1.txz:  Added.
  The Java Runtime Environment.  Unless you're developing Java code, this package
  will plus 'rhino' (below) suffice to run Java binaries.
extra/openjdk/icedtea-web-20120225-arm-1.txz:  Added.
  This is a web browser plugin to enable the execution of Java Applets.
extra/openjdk/rhino-1_7R3-noarch-1.txz:  Added.
  This is a run-time dependency for OpenJDK/OpenJRE.
extra/tightvnc/tightvnc-1.3.10-arm-4.tgz:  Rebuilt.
  Added missing 'Xvnc'.
  Thanks to Frank Boehm for the report and bug fix.
+--------------------------+
Thu Oct  4 19:43:34 UTC 2012
/INSTALL_KIRKWOOD.TXT:  Amended.
  Minor adjustments in the U-Boot configuration parameters to assume that the
  'Plug' devices are running the upstream 'DENX' U-Boot rather than the older
  releases from 'Marvell'.  The Marvell versions of U-Boot (and even some older
  versions of the upstream releases) are not so robust in some situations, so it
  makes sense (particularly for new Slackware ARM users) to upgrade their U-Boot
  to a known-good release.

  If you are using a GuruPlug, or SheevaPlug eSATA you are recommended to upgrade
  U-Boot if it's older than the recommended version.  This is due to a bug in 
  older U-Boot releases that may cause trouble booting newer Linux kernels such
  as the version in Slackware ARM 14.0.

  However, if you are happy with the version of U-Boot on your plugs, there's no
  need to upgrade U-Boot: if you're going to reformat and reinstall with the same
  disk partitioning scheme, you can boot the Slackware installer and reinstall
  without changing any U-Boot configuration.  If you've already installed
  Slackware 14.0 on your system and it's working, you won't need to upgrade
  U-Boot unless you are having some intermittent problems and would like to see
  whether these are fixed by the new version.

  Martin Michlmayr from Debian has always maintained a page with the stable
  release of U-Boot for the Plugs, so it makes sense to me be refer to his
  work in this area.

  For details about upgrading U-Boot on your Plug, see
     http://www.armedslack.org/maint_kirkwooduboot/ 
  
  Thanks to Michael Langfinger for the suggestion.
a/openssl-solibs-1.0.1c-arm-3.tgz:  Rebuilt.
n/openssl-1.0.1c-arm-3.tgz:  Rebuilt.
 Rebuilt to use ARM assembler optimisations which provides impressive
 performance increases.
 For more details see http://www.raspberrypi.org/phpBB3/viewtopic.php?f=66&t=8433
 Thanks to Michael Langfinger for the suggestion.
pasture/*:  Removed.
  If you want anything that was in here, it can be found in the 14.0 release.
+--------------------------+
Wed Sep 26 07:50:13 UTC 2012

Slackware 14.0 ARM stable is released!

We're perfectionists here at Slackware, so this release has been a long time
a-brewing.  But we think you'll agree that it was worth the wait. 
Slackware 14.0 combines modern components, ease of use, and flexible
configuration... our "KISS" philosophy demands it.

Once you find yourself enjoying using the ARM port of Slackware, please take a
few moments to show your appreciation by sponsoring through Paypal.  
Please visit the URL below to learn more:

  http://www.armedslack.org/sponsor/

  Thanks to those who have already made donations!

Thanks to everyone who helped make this happen.  The Slackware team, the
upstream developers, and (of course) the awesome Slackware user community.

Have fun!  :-)

+--------------------------+
[..]