./nfo/linux/slackware/slackwarearm-14.1.changelog.inc
Slackwarearm-14.1 ChangeLog Fri, 24 Jan 2025 10:56:46 +0100
arm.slackware.com
Thu Sep 1 08:07:06 UTC 2016
################################################################################
# END OF LIFE ("EOL") FOR SLACKWARE ARM v14.1 #
# #
# Security patches and fixes are no longer provided for Slackware ARM v14.1 #
# #
# If you are still running this version, you should upgrade to the latest #
# stable release (Slackware 14.2). #
# Alternately, you may make arrangements to handle your own security patches. #
################################################################################
patches/packages/linux-3.10.103/*: Upgraded.
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
+--------------------------+
Wed Aug 24 02:03:04 UTC 2016
patches/packages/gnupg-1.4.21-arm-1_slack14.1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
patches/packages/libgcrypt-1.5.6-arm-1_slack14.1.txz: Upgraded.
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)
patches/packages/stunnel-5.35-arm-2_slack14.1.txz: Rebuilt.
Fixed incorrect config file name in generate-stunnel-key.sh.
Thanks to Ebben Aries.
+--------------------------+
Tue Aug 16 19:05:54 UTC 2016
patches/packages/glibc-zoneinfo-2016f-arm-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
+--------------------------+
Mon Aug 8 19:20:21 UTC 2016
patches/packages/curl-7.50.1-arm-1_slack14.1.txz: Upgraded.
This release fixes security issues:
TLS: switch off SSL session id when client cert is used
TLS: only reuse connections with the same client cert
curl_multi_cleanup: clear connection pointer for easy handles
For more information, see:
https://curl.haxx.se/docs/adv_20160803A.html
https://curl.haxx.se/docs/adv_20160803B.html
https://curl.haxx.se/docs/adv_20160803C.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
(* Security fix *)
patches/packages/openssh-7.3p1-arm-1_slack14.1.txz: Upgraded.
This is primarily a bugfix release, and also addresses security issues.
sshd(8): Mitigate a potential denial-of-service attack against the system's
crypt(3) function via sshd(8).
sshd(8): Mitigate timing differences in password authentication that could
be used to discern valid from invalid account names when long passwords were
sent and particular password hashing algorithms are in use on the server.
ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
countermeasures.
ssh(1), sshd(8): Improve operation ordering of MAC verification for
Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
before decrypting any ciphertext.
sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
For more information, see:
http://www.openssh.com/txt/release-7.3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
(* Security fix *)
patches/packages/stunnel-5.35-arm-1_slack14.1.txz: Upgraded.
Fixes security issues:
Fixed malfunctioning "verify = 4".
Fixed incorrectly enforced client certificate requests.
(* Security fix *)
+--------------------------+
Fri Jul 29 07:08:09 UTC 2016
patches/packages/libidn-1.33-arm-1_slack14.1.txz: Upgraded.
Fixed out-of-bounds read bugs. Fixed crashes on invalid UTF-8.
Thanks to Hanno Böck.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
(* Security fix *)
+--------------------------+
Sun Jul 24 16:17:18 UTC 2016
patches/packages/device-tree-compiler-1.4.1-arm-1_slack14.1.txz: Upgraded.
u-boot v2016 requires this version of dtc.
+--------------------------+
Sat Jul 23 21:21:21 UTC 2016
patches/packages/bind-9.9.9_P2-arm-1_slack14.1.txz: Upgraded.
Fixed a security issue:
getrrsetbyname with a non absolute name could trigger an infinite
recursion bug in lwresd and named with lwres configured if when
combined with a search list entry the resulting name is too long.
(CVE-2016-2775) [RT #42694]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
(* Security fix *)
patches/packages/gimp-2.8.18-arm-1_slack14.1.txz: Upgraded.
This release fixes a security issue:
Use-after-free vulnerability in the xcf_load_image function in
app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of
service (program crash) or possibly execute arbitrary code via a crafted
XCF file.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994
(* Security fix *)
patches/packages/php-5.6.24-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.24
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
(* Security fix *)
+--------------------------+
Sat Jul 9 07:37:07 UTC 2016
patches/packages/samba-4.2.14-arm-1_slack14.1.txz: Upgraded.
This release fixes a security issue:
Client side SMB2/3 required signing can be downgraded.
It's possible for an attacker to downgrade the required signing for an
SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can
impersonate a server being connected to by Samba, and return malicious
results.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
(* Security fix *)
+--------------------------+
Sat Jun 25 16:19:55 UTC 2016
patches/packages/php-5.6.23-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
+--------------------------+
Tue Jun 21 18:49:14 UTC 2016
patches/packages/libarchive-3.2.1-arm-1_slack14.1.txz: Upgraded.
This release fixes several critical bugs, including some with security
implications.
(* Security fix *)
patches/packages/pcre-8.39-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs (including a couple of DoS security issues), and
retrofits to PCRE1 some appropriate JIT improvements from PCRE2.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
(* Security fix *)
+--------------------------+
Wed Jun 15 16:17:18 UTC 2016
patches/packages/glibc-zoneinfo-2016e-arm-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/pidgin-2.10.12-arm-1_slack14.1.txz: Upgraded.
Use the much larger collection of SSL certs in /etc/ssl/certs rather
than the ones that ship with Pidgin, otherwise certificates issued by
Let's Encrypt (and others) cannot be verified. Thanks to Cesare.
patches/packages/wget-1.18-arm-1_slack14.1.txz: Upgraded.
This version fixes a security vulnerability present in all old versions
of wget. On a server redirect from HTTP to a FTP resource, wget would
trust the HTTP server and use the name in the redirected URL as the
destination filename. This behaviour was changed and now it works
similarly as a redirect from HTTP to another HTTP resource so the original
name is used as the destination file. To keep the previous behaviour the
user must provide --trust-server-names.
The vulnerability was discovered by Dawid Golunski and was reported by
Beyond Security's SecuriTeam.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
(* Security fix *)
+--------------------------+
Sat Jun 4 14:15:16 UTC 2016
patches/packages/libxml2-2.9.4-arm-2_slack14.1.txz: Rebuilt.
Fix attribute decoding during XML schema validation.
Thanks to Andreas V?gele.
patches/packages/ntp-4.2.8p8-arm-1_slack14.1.txz: Upgraded.
This release patches one high and four low severity security issues:
CVE-2016-4957: Crypto-NAK crash
CVE-2016-4953: Bad authentication demobilizes ephemeral associations
CVE-2016-4954: Processing spoofed server packets
CVE-2016-4955: Autokey association reset
CVE-2016-4956: Broadcast interleave
For more information, see:
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
(* Security fix *)
+--------------------------+
Thu Jun 2 07:07:07 UTC 2016
patches/packages/imagemagick-6.8.6_10-arm-3_slack14.1.txz: Rebuilt.
Removed popen() support to prevent another shell vulnerability. This
issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
(* Security fix *)
patches/packages/xscreensaver-5.35-arm-1_slack14.1.txz: Upgraded.
Here's an upgrade to the latest xscreensaver.
+--------------------------+
Sat May 28 19:20:21 UTC 2016
patches/packages/libxml2-2.9.4-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues:
Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
Format string vulnerability (CVE-2016-4448).
Inappropriate fetch of entities content (CVE-2016-4449).
For more information, see:
http://xmlsoft.org/news.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
(* Security fix *)
patches/packages/libxslt-1.1.29-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and a security issue:
Fix for type confusion in preprocessing attributes (Daniel Veillard).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
(* Security fix *)
patches/packages/php-5.6.22-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.22
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
(* Security fix *)
+--------------------------+
Wed May 25 06:06:03 UTC 2016
patches/packages/libarchive-3.1.2-arm-2_slack14.1.txz: Rebuilt.
Patched an issue with Zip archive handling that could allow an attacker
to overwrite parts of the heap in a controlled fashion and execute
arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541
(* Security fix *)
+--------------------------+
Sat May 21 13:13:13 UTC 2016
patches/packages/curl-7.49.0-arm-1_slack14.1.txz: Upgraded.
Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
For more information, see:
https://curl.haxx.se/docs/adv_20160518.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
(* Security fix *)
+--------------------------+
Wed May 11 00:01:02 UTC 2016
patches/packages/git-2.8.2-arm-1_slack14.1.txz: Upgraded.
This is a bugfix package update to change color "lime" to "00FF00" in
gitk. Otherwise it might not start if "lime" is not defined.
Thanks to AlvaroG.
patches/packages/imagemagick-6.8.6_10-arm-2_slack14.1.txz: Rebuilt.
This update addresses several security issues in ImageMagick, including:
Insufficient shell characters filtering allows code execution (CVE-2016-3714)
Server Side Request Forgery (CVE-2016-3718)
File deletion (CVE-2016-3715)
File moving (CVE-2016-3716)
Local file read (CVE-2016-3717)
To mitigate these issues, the default policy.xml config file has been
modified to disable all of the vulnerable coders.
For more information, see:
https://imagetragick.com
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
(* Security fix *)
+--------------------------+
Wed May 4 07:07:70 UTC 2016
patches/packages/openssl-1.0.1t-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
Memory corruption in the ASN.1 encoder (CVE-2016-2108)
Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
EVP_EncodeUpdate overflow (CVE-2016-2105)
EVP_EncryptUpdate overflow (CVE-2016-2106)
ASN.1 BIO excessive memory allocation (CVE-2016-2109)
EBCDIC overread (CVE-2016-2176)
For more information, see:
https://www.openssl.org/news/secadv/20160503.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176
(* Security fix *)
patches/packages/openssl-solibs-1.0.1t-arm-1_slack14.1.txz: Upgraded.
+--------------------------+
Tue May 3 01:01:01 UTC 2016
patches/packages/mercurial-3.8.1-arm-1_slack14.1.txz: Upgraded.
This update fixes possible arbitrary code execution when converting Git
repos. Mercurial prior to 3.8 allowed arbitrary code execution when using
the convert extension on Git repos with hostile names. This could affect
automated code conversion services that allow arbitrary repository names.
This is a further side-effect of Git CVE-2015-7545.
Reported and fixed by Blake Burkhart.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105
(* Security fix *)
patches/packages/samba-4.2.12-arm-1_slack14.1.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Mon May 2 02:03:02 UTC 2016
patches/packages/ntp-4.2.8p7-arm-1_slack14.1.txz: Upgraded.
This release patches several low and medium severity security issues:
CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering
CVE-2016-1549: Sybil vulnerability: ephemeral association attack,
AKA: ntp-sybil - MITIGATION ONLY
CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion
botch
CVE-2016-2517: Remote configuration trustedkey/requestkey values are not
properly validated
CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with
MATCH_ASSOC
CVE-2016-2519: ctl_getitem() return value not always checked
CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos
CVE-2016-1548: Interleave-pivot - MITIGATION ONLY
CVE-2015-7704: KoD fix: peer associations were broken by the fix for
NtpBug2901, AKA: Symmetric active/passive mode is broken
CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks
CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,
authdecrypt-timing, AKA: authdecrypt-timing
For more information, see:
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519
(* Security fix *)
patches/packages/php-5.6.21-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.21
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
(* Security fix *)
patches/packages/subversion-1.7.22-arm-2_slack14.1.txz: Rebuilt.
This update patches two security issues:
CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm.
CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn
during COPY/MOVE authorization check.
For more information, see:
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
(* Security fix *)
+--------------------------+
Tue Apr 26 08:08:08 UTC 2016
patches/packages/ca-certificates-20160104-arm-1_slack14.1.txz: Upgraded.
This update provides the latest CA certificates to check for the
authenticity of SSL connections.
+--------------------------+
Wed Apr 20 07:08:07 UTC 2016
patches/packages/glibc-zoneinfo-2016d-arm-1.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/samba-4.2.11-arm-1_slack14.1.txz: Upgraded.
This update fixes the security issues known as "badlock" (or "sadlock"),
which may allow man-in-the-middle or denial-of-service attacks:
CVE-2015-5370 (Multiple errors in DCE-RPC code)
CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)
CVE-2016-2111 (NETLOGON Spoofing Vulnerability)
CVE-2016-2112 (LDAP client and server don't enforce integrity)
CVE-2016-2113 (Missing TLS certificate validation)
CVE-2016-2114 ("server signing = mandatory" not enforced)
CVE-2016-2115 (SMB IPC traffic is not integrity protected)
CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
(* Security fix *)
+--------------------------+
Thu Apr 7 07:07:07 UTC 2016
patches/packages/subversion-1.7.22-arm-1_slack14.1.txz: Upgraded.
Subversion servers and clients are vulnerable to a remotely triggerable
heap-based buffer overflow and out-of-bounds read that may allow remote
attackers to cause a denial of service or possibly execute arbitrary code
under the context of the targeted process.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343
(* Security fix *)
+--------------------------+
Sat Apr 2 16:17:18 UTC 2016
patches/packages/dhcp-4.3.4-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and (previously patched) security issues.
patches/packages/mercurial-3.7.3-arm-1_slack14.1.txz: Upgraded.
This update fixes security issues and bugs, including remote code execution
in binary delta decoding, arbitrary code execution with Git subrepos, and
arbitrary code execution when converting Git repos.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069
(* Security fix *)
patches/packages/php-5.6.20-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.20
(* Security fix *)
+--------------------------+
Sat Mar 26 12:13:14 UTC 2016
patches/packages/glibc-zoneinfo-2016c-arm-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/libevent-2.0.22-arm-1_slack14.1.txz: Upgraded.
Multiple integer overflows in the evbuffer API allow context-dependent
attackers to cause a denial of service or possibly have other unspecified
impact via "insanely large inputs" to the (1) evbuffer_add,
(2) evbuffer_expand, or (3) bufferevent_write function, which triggers a
heap-based buffer overflow or an infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272
(* Security fix *)
+--------------------------+
Sun Mar 20 23:22:23 UTC 2016
patches/packages/git-2.7.4-arm-1_slack14.1.txz: Upgraded.
NOTE: Issuing this patch again since the bug reporter listed the
wrong git version (2.7.1) as fixed. The vulnerability was actually
patched in git-2.7.4.
Fixed buffer overflows allowing server and client side remote code
execution in all git versions before 2.7.4.
For more information, see:
http://seclists.org/oss-sec/2016/q1/645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
(* Security fix *)
+--------------------------+
Thu Mar 17 00:00:00 UTC 2016
patches/packages/git-2.7.3-arm-1_slack14.1.txz: Upgraded.
Fixed buffer overflows allowing server and client side remote code
execution in all git versions before 2.7.1.
For more information, see:
http://seclists.org/oss-sec/2016/q1/645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
(* Security fix *)
patches/packages/glibc-zoneinfo-2016b-arm-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
+--------------------------+
Fri Mar 11 03:04:05 UTC 2016
patches/packages/bind-9.9.8_P4-arm-1_slack14.1.txz: Upgraded.
Fixed security issues:
Fix resolver assertion failure due to improper DNAME handling when
parsing fetch reply messages. (CVE-2016-1286) [RT #41753]
Malformed control messages can trigger assertions in named and rndc.
(CVE-2016-1285) [RT #41666]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285
(* Security fix *)
patches/packages/mozilla-nss-3.23-arm-1_slack14.1.txz: Upgraded.
Upgraded to nss-3.23 and nspr-4.12.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/nss.html
(* Security fix *)
patches/packages/openssh-7.2p2-arm-1_slack14.1.txz: Upgraded.
This release fixes a security bug:
sshd(8): sanitise X11 authentication credentials to avoid xauth
command injection when X11Forwarding is enabled.
For more information, see:
http://www.openssh.com/txt/x11fwd.adv
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115
(* Security fix *)
+--------------------------+
Wed Mar 9 19:20:21 UTC 2016
patches/packages/php-5.6.19-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.19
(* Security fix *)
patches/packages/samba-4.1.23-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs, and two security issues:
Incorrect ACL get/set allowed on symlink path (CVE-2015-7560).
Out-of-bounds read in internal DNS server (CVE-2016-0771).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771
(* Security fix *)
+--------------------------+
Sat Mar 5 03:30:03 UTC 2016
patches/packages/mailx-12.5-arm-4_slack14.1.txz: Rebuilt.
Drop SSLv2 support (no longer supported by OpenSSL), and fix security issues
that could allow a local attacker to cause mailx to execute arbitrary
shell commands through the use of a specially-crafted email address.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844
(* Security fix *)
patches/packages/openssl-1.0.1s-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
Double-free in DSA code (CVE-2016-0705)
Memory leak in SRP database lookups (CVE-2016-0798)
BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
Fix memory issues in BIO_*printf functions (CVE-2016-0799)
Side channel attack on modular exponentiation (CVE-2016-0702)
To avoid breaking the ABI, "enable-ssl2" is used, but all the vulnerable or
weak ciphers have been removed.
For more information, see:
https://www.openssl.org/news/secadv/20160301.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
(* Security fix *)
patches/packages/openssl-solibs-1.0.1s-arm-1_slack14.1.txz: Upgraded.
patches/packages/php-5.6.18-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.18
(* Security fix *)
+--------------------------+
Sun Feb 28 19:20:21 UTC 2016
patches/packages/libssh-0.7.3-arm-1_slack14.1.txz: Upgraded.
Fixed weak key generation. Due to a bug in the ephemeral secret key
generation for the diffie-hellman-group1 and diffie-hellman-group14
methods, ephemeral secret keys of size 128 bits are generated, instead
of the recommended sizes of 1024 and 2048 bits, giving a practical
security of 63 bits.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
(* Security fix *)
+--------------------------+
Wed Feb 24 19:20:21 UTC 2016
patches/packages/bind-9.9.8_P3-arm-1_slack14.1.txz: Upgraded.
This release fixes two possible denial-of-service issues:
render_ecs errors were mishandled when printing out a OPT record resulting
in a assertion failure. (CVE-2015-8705) [RT #41397]
Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705
(* Security fix *)
patches/packages/glibc-2.17-arm-17_slack14.1.txz: Rebuilt.
This update provides a patch to fix the stack-based buffer overflow in
libresolv that could allow specially crafted DNS responses to seize
control of execution flow in the DNS client (CVE-2015-7547). However,
due to a patch applied to Slackware's glibc back in 2009 (don't use the
gethostbyname4() lookup method as it was causing some cheap routers to
misbehave), we were not vulnerable to that issue. Nevertheless it seems
prudent to patch the overflows anyway even if we're not currently using
the code in question. Thanks to mancha for the backported patch.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
(* Security fix *)
patches/packages/glibc-i18n-2.17-arm-17_slack14.1.txz: Rebuilt.
patches/packages/glibc-profile-2.17-arm-17_slack14.1.txz: Rebuilt.
patches/packages/glibc-solibs-2.17-arm-17_slack14.1.txz: Rebuilt.
patches/packages/libgcrypt-1.5.5-arm-1_slack14.1.txz: Upgraded.
Mitigate chosen cipher text attacks on ECDH with Weierstrass curves.
Use ciphertext blinding for Elgamal decryption.
For more information, see:
http://www.cs.tau.ac.IL/~tromer/ecdh/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
(* Security fix *)
patches/packages/ntp-4.2.8p6-arm-1_slack14.1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes
several low and medium severity vulnerabilities.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
(* Security fix *)
+--------------------------+
Tue Feb 9 05:04:03 UTC 2016
patches/packages/curl-7.47.1-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue where NTLM credentials are not checked
for proxy connection reuse. The effects of this flaw is that the application
could be reusing a proxy connection using the previously used credentials
and thus it could be given to or prevented access from resources that it
wasn't intended to. Thanks to Isaac Boukris.
For more information, see:
https://curl.haxx.se/docs/adv_20160127A.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
(* Security fix *)
patches/packages/flac-1.3.1-arm-1_slack14.1.txz: Upgraded.
This update is needed by the latest version of libsndfile.
patches/packages/libsndfile-1.0.26-arm-1_slack14.1.txz: Upgraded.
This release fixes security issues which may allow attackers to cause
a denial of service, or possibly execute arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805
(* Security fix *)
+--------------------------+
Sun Feb 7 23:23:32 UTC 2016
patches/packages/MPlayer-20160125-arm-1_slack14.1.txz: Upgraded.
This is the latest MPlayer-1.2 branch, identical to the 1.2.1 stable release.
The bundled ffmpeg has been upgraded to 2.8.5, which fixes two security
issues by which a remote attacker may conduct a cross-origin attack and read
arbitrary files on the system.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898
(* Security fix *)
patches/packages/glibc-zoneinfo-2016a-arm-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/openssl-1.0.1r-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issue:
SSLv2 doesn't block disabled ciphers (CVE-2015-3197).
For more information, see:
https://openssl.org/news/secadv/20160128.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
(* Security fix *)
patches/packages/openssl-solibs-1.0.1r-arm-1_slack14.1.txz: Upgraded.
patches/packages/php-5.6.17-arm-1_slack14.1.txz: Upgraded.
This release fixes bugs and security issues.
*****************************************************************
* IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
*****************************************************************
PHP 5.4.x has been declared EOL (end of life) and is no longer receiving
upstream support. PHP 5.5.x is also no longer on active support status and
security fixes will continue only until 5 months from now. For this reason
we have provided PHP 5.6 packages as security updates. Be aware that PHP
5.6 is not 100% compatible with PHP 5.4, and some changes may be required
to existing web pages written for PHP 5.4.
For information on how to migrate from PHP 5.4, please see:
http://php.net/manual/en/migration55.php
http://php.net/manual/en/migration56.php
The final PHP 5.4 packages may be found in /pasture in case there is a need
to revert this update.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
(* Security fix *)
pasture/php-5.4.45-arm-1_slack14.1.txz: Added.
Moved from /patches/packages/
This is here only if you cannot migrate your PHP applications to PHP-5.6:
this version is insecure.
+--------------------------+
Fri Jan 15 10:10:10 UTC 2016
patches/packages/dhcp-4.3.3-arm-1_slack14.1.txz: Upgraded.
This update fixes a denial-of-service vulnerability.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605
(* Security fix *)
patches/packages/openssh-7.1p2-arm-1_slack14.1.txz: Upgraded.
This update fixes an information leak and a buffer overflow. In particular,
the information leak allows a malicious SSH server to steal the client's
private keys. Thanks to Qualys for reporting this issue.
For more information, see:
https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778
*****************************************************************
* IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
*****************************************************************
Rather than backport the fix for the information leak (which is the only
hazardous flaw), we have upgraded to the latest OpenSSH. As of version
7.0, OpenSSH has deprecated some older (and presumably less secure)
algorithms, and also (by default) only allows root login by public-key,
hostbased and GSSAPI authentication. Make sure that your keys and
authentication method will allow you to continue accessing your system
after the upgrade.
The release notes for OpenSSH 7.0 list the following incompatible changes
to be aware of:
* Support for the legacy SSH version 1 protocol is disabled by
default at compile time.
* Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
is disabled by default at run-time. It may be re-enabled using
the instructions at http://www.openssh.com/legacy.html
* Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
by default at run-time. These may be re-enabled using the
instructions at http://www.openssh.com/legacy.html
* Support for the legacy v00 cert format has been removed.
* The default for the sshd_config(5) PermitRootLogin option has
changed from "yes" to "prohibit-password".
* PermitRootLogin=without-password/prohibit-password now bans all
interactive authentication methods, allowing only public-key,
hostbased and GSSAPI authentication (previously it permitted
keyboard-interactive and password-less authentication if those
were enabled).
(* Security fix *)
patches/packages/xscreensaver-5.34-arm-1_slack14.1.txz: Upgraded.
Patrick promised jwz that he'd keep this updated in -stable when he removed
(against his wishes) the nag screen that complains if a year has passed since
that version was released. So, here's the latest one.
+--------------------------+
Thu Dec 24 01:02:03 UTC 2015
patches/packages/blueman-r708-arm-4_slack14.1.txz: Rebuilt.
This update fixes a local privilege escalation vulnerability.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612
(* Security fix *)
+--------------------------+
Sat Dec 19 08:04:02 UTC 2015
patches/packages/libpng-1.4.19-arm-1_slack14.1.txz: Upgraded.
Fixed an out-of-range read in png_check_keyword(). Thanks to Qixue Xiao.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
(* Security fix *)
+--------------------------+
Wed Dec 16 01:03:01 UTC 2015
patches/packages/bind-9.9.8_P2-arm-1_slack14.1.txz: Upgraded.
This update fixes three security issues:
Update allowed OpenSSL versions as named is potentially vulnerable
to CVE-2015-3193.
Insufficient testing when parsing a message allowed records with an
incorrect class to be be accepted, triggering a REQUIRE failure when
those records were subsequently cached. (CVE-2015-8000)
Address fetch context reference count handling error on socket error.
(CVE-2015-8461)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8461
(* Security fix *)
patches/packages/libpng-1.4.18-arm-1_slack14.1.txz: Upgraded.
Fixed incorrect implementation of png_set_PLTE() that uses png_ptr
not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126
vulnerability.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472
(* Security fix *)
patches/packages/openssl-1.0.1q-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193).
Certificate verify crash with missing PSS parameter (CVE-2015-3194).
X509_ATTRIBUTE memory leak (CVE-2015-3195).
Race condition handling PSK identify hint (CVE-2015-3196).
Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794).
For more information, see:
https://openssl.org/news/secadv_20151203.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196
(* Security fix *)
patches/packages/openssl-solibs-1.0.1q-arm-1_slack14.1.txz: Upgraded.
+--------------------------+
Fri Dec 4 14:14:14 UTC 2015
patches/packages/libpng-1.4.17-arm-1_slack14.1.txz: Upgraded.
Fixed buffer overflows in the png_set_PLTE(), png_get_PLTE(),
png_set_tIME(), and png_convert_to_rfc1123() functions that allow
attackers to cause a denial of service (application crash) or
possibly have unspecified other impact via a small bit-depth value
in an IHDR (aka image header) chunk in a PNG image.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126.
(* Security fix *)
+--------------------------+
Thu Nov 26 01:01:01 UTC 2015
patches/packages/pcre-8.38-arm-1_slack14.1.txz: Upgraded.
Fixed overflows that could lead to a denial of service or the execution
of arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210
(* Security fix *)
+--------------------------+
Fri Nov 6 22:33:44 UTC 2015
patches/packages/kernel-modules-armv7-3.10.92_armv7-arm-1_slack14.1.txz: Upgraded.
patches/packages/kernel-modules-kirkwood-3.10.92_kirkwood-arm-1_slack14.1.txz: Upgraded.
patches/packages/kernel-modules-versatile-3.10.92_versatile-arm-1_slack14.1.txz: Upgraded.
patches/packages/kernel_armv7-3.10.92-arm-1_slack14.1.txz: Upgraded.
patches/packages/kernel_kirkwood-3.10.92-arm-1_slack14.1.txz: Upgraded.
patches/packages/kernel_versatile-3.10.92-arm-1_slack14.1.txz: Upgraded.
patches/packages/mozilla-nss-3.20.1-arm-1_slack14.1.txz: Upgraded.
Upgraded to nss-3.20.1 and nspr-4.10.10.
This release contains security fixes and improvements.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
(* Security fix *)
+--------------------------+
Fri Oct 30 01:01:01 UTC 2015
patches/packages/curl-7.45.0-arm-1_slack14.1.txz: Upgraded.
Fixes some security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
(* Security fix *)
patches/packages/jasper-1.900.1-arm-5_slack14.1.txz: Rebuilt.
Applied many security and bug fixes.
Thanks to Heinz Wiesinger.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029
(* Security fix *)
patches/packages/ntp-4.2.8p4-arm-1_slack14.1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes
several low and medium severity vulnerabilities.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
(* Security fix *)
+--------------------------+
Tue Oct 6 17:18:19 UTC 2015
patches/packages/glibc-zoneinfo-2015g-noarch-1_slack14.1.txz: Upgraded.
This package provides the latest timezone updates.
+--------------------------+
Sat Oct 3 23:24:25 UTC 2015
patches/packages/php-5.4.45-arm-1_slack14.1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838
(* Security fix *)
+--------------------------+
Mon Sep 21 03:02:01 UTC 2015
patches/packages/rp-pppoe-3.11-arm-2_slack14.1.txz: Rebuilt.
Rebuilt to add the missing /etc/ppp/plugins/rp-pppoe.so plugin library.
Thanks to halinux on LQ for the bug report.
+--------------------------+
Tue Sep 15 11:11:11 UTC 2015
patches/packages/ca-certificates-20150426-noarch-2_slack14.1.txz: Rebuilt.
Patched update-ca-certificates to remove incompatible command operators
used to call 'run-parts'. Thanks to Stuart Winter.
+--------------------------+
Thu Sep 3 08:06:04 UTC 2015
patches/packages/bind-9.9.7_P3-arm-1_slack14.1.txz: Upgraded.
This update fixes two denial-of-service vulnerabilities:
+ CVE-2015-5722 is a denial-of-service vector which can be
exploited remotely against a BIND server that is performing
validation on DNSSEC-signed records. Validating recursive
resolvers are at the greatest risk from this defect, but it has not
been ruled out that it could be exploited against an
authoritative-only nameserver under limited conditions. Servers
that are not performing validation are not vulnerable. However,
ISC does not recommend disabling validation as a workaround to
this issue as it exposes the server to other types of attacks.
Upgrading to the patched versions is the recommended solution.
All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722.
+ CVE-2015-5986 is a denial-of-service vector which can be used
against a BIND server that is performing recursion. Validation
is not required. Recursive resolvers are at the greatest risk
from this defect, but it has not been ruled out that it could
be exploited against an authoritative-only nameserver under
limited conditions.
Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to
CVE-2015-5986.
For more information, see:
https://kb.isc.org/article/AA-01287/0
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
https://kb.isc.org/article/AA-01291/0
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
(* Security fix *)
patches/packages/gdk-pixbuf2-2.28.2-arm-2_slack14.1.txz: Rebuilt.
Gustavo Grieco discovered a heap overflow in the processing of BMP images
which may result in the execution of arbitrary code if a malformed image
is opened.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
(* Security fix *)
+--------------------------+
Tue Sep 1 17:18:19 UTC 2015
patches/packages/slackpkg-2.82.0-noarch-16_slack14.1.txz: Rebuilt.
Removed superflous file left over from the build process.
+--------------------------+
Sat Aug 22 08:07:06 UTC 2015
patches/packages/gnutls-3.3.17.1-arm-1_slack14.1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
(* Security fix *)
+--------------------------+
Mon Aug 10 12:23:34 UTC 2015
patches/packages/slackpkg-2.82.0-noarch-15_slack14.1.txz: Rebuilt.
Patched to avoid false package name matches when the full name of a
package is a substring of another package's name, as happened recently
with atk-2.16.0 and at-spi2-atk-2.16.0. Thanks to Eric Hameleers.
+--------------------------+
Sat Aug 8 11:22:33 UTC 2015
patches/packages/ca-certificates-20150426-noarch-1_slack14.1.txz: Upgraded.
This package updates to the latest CA certificates.
patches/packages/mozilla-nss-3.19.2-arm-1_slack14.1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/nss.html
(* Security fix *)
+--------------------------+
Fri Jul 31 22:39:46 UTC 2015
patches/packages/bind-9.9.7_P2-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue where an error in the handling of TKEY
queries can be exploited by an attacker for use as a denial-of-service
vector, as a constructed packet can use the defect to trigger a REQUIRE
assertion failure, causing BIND to exit.
Impact:
Both recursive and authoritative servers are vulnerable to this defect.
Additionally, exposure is not prevented by either ACLs or configuration
options limiting or denying service because the exploitable code occurs
early in the packet handling, before checks enforcing those boundaries.
Operators should take steps to upgrade to a patched version as soon as
possible.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
https://kb.isc.org/article/AA-01272
(* Security fix *)
patches/packages/slackpkg-2.82.0-noarch-14_slack14.1.txz: Rebuilt.
Patched to abort immediately if the date is not recent (at least July 2015).
This is usually a problem with Raspberry Pi systems that do not have an RTC,
and where no NTP client has been configured: resulting in the system's date
being at UNIX Epoch time (1970).
With the date so far in the past, GPG fails with a generic verification
failure message, resulting in confusion as to whether the packages or keys
have been tampered with.
ap/slackpkg-2.82.0-noarch-14_slack14.1.txz: Rebuilt.
Patched to abort immediately if the date is not recent (at least July 2015).
This is usually a problem with Raspberry Pi systems that do not have an RTC,
and where no NTP client has been configured: resulting in the system's date
being at UNIX Epoch time (1970).
With the date so far in the past, GPG fails with a generic verification
failure message, resulting in confusion as to whether the packages or keys
have been tampered with.
This build also expects the updated Slackware ARM GPG key rather than the old
ARMedslack key. Ordinarily after a Slackware release, the original
'slackware' tree would never be modified; but users are installing Slackware
ARM 14.1 and attempting to update using slackpkg, but are finding that it fails
either due to the GPG key mismatch or due to the date being wrong, or both!
It's worth reiterating that on ARM, you _must_ read the Change log and not
blindly update packages: failure to do so could render your machine unbootable,
particularly for the Kernel packages!
+--------------------------+
Sat Jul 18 21:09:05 UTC 2015
patches/packages/httpd-2.4.16-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
* CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local
URL-path with the INCLUDES filter active, introduced in 2.4.11.
* CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a
script calls r:wsupgrade() can cause a child process crash.
* CVE-2015-3183: core: Fix chunk header parsing defect. Remove
apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
filter, parse chunks in a single pass with zero copy. Limit accepted
chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
* CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
(* Security fix *)
patches/packages/php-5.4.43-arm-1_slack14.1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
(* Security fix *)
+--------------------------+
Fri Jul 10 06:25:04 UTC 2015
patches/packages/bind-9.9.7_P1-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue where an attacker who can cause
a validating resolver to query a zone containing specifically constructed
contents can cause that resolver to fail an assertion and terminate due
to a defect in validation code. This means that a recursive resolver that
is performing DNSSEC validation can be deliberately stopped by an attacker
who can cause the resolver to perform a query against a
maliciously-constructed zone. This will result in a denial of service to
clients who rely on that resolver.
For more information, see:
https://kb.isc.org/article/AA-01267/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
(* Security fix *)
patches/packages/cups-1.5.4-arm-3_slack14.1.txz: Rebuilt.
This release fixes a security issue:
CWE-911: Improper Update of Reference Count - CVE-2015-1158
This bug could allow an attacker to upload a replacement CUPS
configuration file and mount further attacks.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
(* Security fix *)
patches/packages/ntp-4.2.8p3-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue where under specific circumstances an
attacker can send a crafted packet to cause a vulnerable ntpd instance to
crash. Since this requires 1) ntpd set up to allow remote configuration
(not allowed by default), and 2) knowledge of the configuration password,
and 3) access to a computer entrusted to perform remote configuration,
the vulnerability is considered low-risk.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
(* Security fix *)
patches/packages/openssl-1.0.1p-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issue:
Alternative chains certificate forgery (CVE-2015-1793).
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a
valid leaf certificate to act as a CA and "issue" an invalid certificate.
This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
For more information, see:
https://openssl.org/news/secadv_20150709.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
(* Security fix *)
patches/packages/openssl-solibs-1.0.1p-arm-1_slack14.1.txz: Upgraded.
+--------------------------+
Sat Jun 13 21:00:00 UTC 2015
patches/packages/openssl-1.0.1o-arm-1_slack14.1.txz: Upgraded.
Fixes several bugs and security issues:
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
o Race condition handling NewSessionTicket (CVE-2015-1791)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
(* Security fix *)
patches/packages/openssl-solibs-1.0.1o-arm-1_slack14.1.txz: Upgraded.
patches/packages/php-5.4.41-arm-1_slack14.1.txz: Upgraded.
This update fixes some bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
(* Security fix *)
patches/packages/qt-4.8.7-arm-1_slack14.1.txz: Upgraded.
This is a bugfix release.
+--------------------------+
Thu May 14 06:05:11 UTC 2015
patches/packages/mariadb-5.5.43-arm-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
(* Security fix *)
patches/packages/qt-4.8.6-arm-2_slack14.1.txz: Rebuilt.
QNAM: Fix upload corruptions when server closes connection
This patch fixes several upload corruptions if the server closes the
connection while/before we send data into it.
cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
patches/packages/wpa_supplicant-2.4-arm-1_slack14.1.txz: Upgraded.
This update fixes potential denial of service issues.
For more information, see:
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
(* Security fix *)
+--------------------------+
Wed Apr 29 21:18:18 UTC 2015
patches/packages/gnupg-1.4.19-arm-2_slack14.1.txz: Rebuilt.
Patched to fix spurious debug messages that may break sbopkg and slackpkg.
Thanks to Willy Sudiarto Raharjo.
+--------------------------+
Sat Apr 25 07:48:14 UTC 2015
patches/packages/bind-9.9.6_P2-arm-1_slack14.1.txz: Upgraded.
Fix some denial-of-service and other security issues.
For more information, see:
https://kb.isc.org/article/AA-01166/
https://kb.isc.org/article/AA-01161/
https://kb.isc.org/article/AA-01167/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214
(* Security fix *)
patches/packages/gnupg-1.4.19-arm-1_slack14.1.txz: Upgraded.
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
* Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical].
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
(* Security fix *)
patches/packages/httpd-2.4.12-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
* CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer
over-read, with response headers' size above 8K.
* CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an
empty value. PR 56924.
* CVE-2014-8109 mod_lua: Fix handling of the Require line when a
LuaAuthzProvider is used in multiple Require directives with
different arguments. PR57204.
* CVE-2013-5704 core: HTTP trailers could be used to replace HTTP
headers late during request processing, potentially undoing or
otherwise confusing modules that examined or modified request
headers earlier. Adds "MergeTrailers" directive to restore legacy
behavior.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
(* Security fix *)
patches/packages/libssh-0.6.4-arm-1_slack14.1.txz: Upgraded.
This update fixes some security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
(* Security fix *)
patches/packages/mutt-1.5.23-arm-2_slack14.1.txz: Rebuilt.
Patched a vulnerability where malformed headers can cause mutt to crash.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
(* Security fix *)
patches/packages/ntp-4.2.8p2-arm-1_slack14.1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes the
following medium-severity vulnerabilities involving private key
authentication:
* ntpd accepts unauthenticated packets with symmetric key crypto.
* Authentication doesn't protect symmetric associations against DoS attacks.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
(* Security fix *)
patches/packages/openssl-1.0.1m-arm-1_slack14.1.txz: Upgraded.
Fixes several bugs and security issues:
o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
o Removed the export ciphers from the DEFAULT ciphers
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
(* Security fix *)
patches/packages/openssl-solibs-1.0.1m-arm-1_slack14.1.txz: Upgraded.
patches/packages/php-5.4.40-arm-1_slack14.1.txz: Upgraded.
This update fixes some security issues.
Please note that this package build also moves the configuration files
from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
(* Security fix *)
patches/packages/ppp-2.4.5-arm-4_slack14.1.txz: Rebuilt.
Fixed a potential security issue in parsing option files.
Fixed remotely triggerable PID overflow that causes pppd to crash.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310
(* Security fix *)
patches/packages/proftpd-1.3.4e-arm-1_slack14.1.txz: Upgraded.
Patched an issue where mod_copy allowed unauthenticated copying
of files via SITE CPFR/CPTO.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
(* Security fix *)
patches/packages/qt-4.8.6-arm-1_slack14.1.txz: Upgraded.
Fixed issues with BMP, ICO, and GIF handling that could lead to a denial
of service or the execution of arbitrary code when processing malformed
images.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860
(* Security fix *)
+--------------------------+
Sat Apr 4 11:18:55 UTC 2015
patches/packages/glibc-solibs-2.17-arm-16_slack14.1.txz: Rebuilt.
This package had been missed from the previous set of glibc updates. Thanks
to the3dfxdude on LQ for making me aware of this:-
This update patches a security issue __nss_hostname_digits_dots() function
of glibc which may be triggered through the gethostbyname*() set of
functions. This flaw could allow local or remote attackers to take control
of a machine running a vulnerable version of glibc. Thanks to Qualys for
discovering this issue (also known as the GHOST vulnerability.)
For more information, see:
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
(* Security fix *)
+--------------------------+
Fri Mar 6 19:57:14 UTC 2015
patches/packages/samba-4.1.17-arm-1_slack14.1.txz: Upgraded.
This package fixes security issues since the last update:
BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer
in netlogon server could lead to security vulnerability.
BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference
a NULL pointer.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
(* Security fix *)
+--------------------------+
Wed Feb 18 21:20:11 UTC 2015
patches/packages/btrfs-progs-20150213-arm-1_slack14.1.txz: Upgraded.
Added the header files to the package. Thanks to Vincent Batts.
patches/packages/patch-2.7.4-arm-1_slack14.1.txz: Upgraded.
Patch no longer follows symbolic links to input and output files. This
ensures that symbolic links created by git-style patches cannot cause
patch to write outside the working directory.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
(* Security fix *)
patches/packages/sudo-1.8.12-arm-1_slack14.1.txz: Upgraded.
This update fixes a potential security issue by only passing the TZ
environment variable it is considered safe. This prevents exploiting bugs
in glibc's TZ parser that could be used to read files that the user does
not have access to, or to cause a denial of service.
For more information, see:
http://www.sudo.ws/sudo/alerts/tz.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
(* Security fix *)
+--------------------------+
Thu Feb 12 08:18:35 UTC 2015
patches/packages/gcc-4.8.4-arm-1_slack14.1.txz: Upgraded.
In October 2014, the ARM Kernel developers blacklisted GCC versions 4.8.0
up to GCC 4.8.2 (inclusive) because those versions were building kernels that
were corrupting file systems. See this post for more details:
http://article.gmane.org/gmane.linux.ports.arm.omap/119412
You'll need to upgrade to these GCC packages if you want to build
Linux version 3.18 or higher.
Thanks to dowelld for the report.
patches/packages/gcc-g++-4.8.4-arm-1_slack14.1.txz: Upgraded.
patches/packages/gcc-gfortran-4.8.4-arm-1_slack14.1.txz: Upgraded.
patches/packages/gcc-gnat-4.8.4-arm-1_slack14.1.txz: Upgraded.
patches/packages/gcc-go-4.8.4-arm-1_slack14.1.txz: Upgraded.
patches/packages/gcc-java-4.8.4-arm-1_slack14.1.txz: Upgraded.
patches/packages/gcc-objc-4.8.4-arm-1_slack14.1.txz: Upgraded.
+--------------------------+
Thu Jan 29 20:32:42 UTC 2015
patches/packages/glibc-2.17-arm-16_slack14.1.txz: Rebuilt.
This update patches a security issue __nss_hostname_digits_dots() function
of glibc which may be triggered through the gethostbyname*() set of
functions. This flaw could allow local or remote attackers to take control
of a machine running a vulnerable version of glibc. Thanks to Qualys for
discovering this issue (also known as the GHOST vulnerability.)
For more information, see:
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
(* Security fix *)
patches/packages/glibc-i18n-2.17-arm-16_slack14.1.txz: Rebuilt.
patches/packages/glibc-profile-2.17-arm-16_slack14.1.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded.
Upgraded to tzcode2014j and tzdata2014j.
+--------------------------+
Mon Jan 26 19:51:04 UTC 2015
patches/packages/samba-4.1.16-arm-1_slack14.1.txz: Upgraded.
This update is a security release in order to address CVE-2014-8143
(Elevation of privilege to Active Directory Domain Controller).
Samba's AD DC allows the administrator to delegate creation of user or
computer accounts to specific users or groups. However, all released
versions of Samba's AD DC did not implement the additional required
check on the UF_SERVER_TRUST_ACCOUNT bit in the userAccountControl
attributes. Most Samba deployments are not of the AD Domain Controller,
but are of the classic domain controller, the file server or print server.
Only the Active Directory Domain Controller is affected by this issue.
Additionally, most sites running the AD Domain Controller do not configure
delegation for the creation of user or computer accounts, and so are not
vulnerable to this issue, as no writes are permitted to the
userAccountControl attribute, no matter what the value.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
(* Security fix *)
patches/packages/freetype-2.5.5-arm-1_slack14.1.txz: Upgraded.
This release fixes a security bug that could cause freetype to crash
or run programs upon opening a specially crafted file.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
(* Security fix *)
+--------------------------+
Mon Jan 12 21:53:16 UTC 2015
patches/packages/openssl-solibs-1.0.1k-arm-1_slack14.1.txz: Upgraded.
(* Security fix *)
patches/packages/openssl-1.0.1k-arm-1_slack14.1.txz: Upgraded.
This update fixes several security issues:
DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
no-ssl3 configuration sets method to NULL (CVE-2014-3569)
ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
DH client certificates accepted without verification [Server] (CVE-2015-0205)
Certificate fingerprints can be modified (CVE-2014-8275)
Bignum squaring may produce incorrect results (CVE-2014-3570)
For more information, see:
https://www.openssl.org/news/secadv_20150108.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
(* Security fix *)
+--------------------------+
Sat Dec 27 09:31:39 UTC 2014
patches/packages/ntp-4.2.8-arm-1_slack14.1.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes
several high-severity vulnerabilities discovered by Neel Mehta
and Stephen Roettger of the Google Security Team.
For more information, see:
https://www.kb.cert.org/vuls/id/852879
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
(* Security fix *)
patches/packages/php-5.4.36-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues.
#68545 (NULL pointer dereference in unserialize.c).
#68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142)
#68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
(* Security fix *)
patches/packages/xorg-server-1.14.3-arm-3.txz: Rebuilt.
This update fixes many security issues discovered by Ilja van Sprundel,
a security researcher with IOActive.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
(* Security fix *)
patches/packages/xorg-server-xephyr-1.14.3-arm-3.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.14.3-arm-3.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.14.3-arm-3.txz: Rebuilt.
+--------------------------+
Tue Dec 16 19:08:50 UTC 2014
patches/packages/bind-9.9.6_P1-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue where a failure to place limits on
delegation chaining can allow an attacker to crash BIND or cause memory
exhaustion.
For more information, see:
https://kb.isc.org/article/AA-01216
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
(* Security fix *)
patches/packages/openssh-6.7p1-arm-2_slack14.1.txz: Rebuilt.
Restored support for tcpwrappers that was dropped by upstream.
Thanks to mancha.
patches/packages/openvpn-2.3.6-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue that allows remote authenticated
users to cause a denial of service (server crash) via a small control
channel packet.
For more information, see:
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104
(* Security fix *)
patches/packages/pidgin-2.10.11-arm-1_slack14.1.txz: Upgraded.
This update contains login fixes for MSN and some XMPP servers.
patches/packages/wpa_supplicant-2.3-arm-1_slack14.1.txz: Upgraded.
This update fixes a remote command-execution vulnerability caused by a
failure to adequately sanitize user-supplied input.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686
(* Security fix *)
+--------------------------+
Fri Nov 14 19:59:14 UTC 2014
patches/packages/mariadb-5.5.40-arm-2_slack14.1.txz: Rebuilt.
Reverted change to my_config.h that breaks compiling many applications
that link against the MariaDB libraries.
Thanks to Willy Sudiarto Raharjo.
patches/packages/pidgin-2.10.10-arm-2_slack14.1.txz: Rebuilt.
Fix Gadu-Gadu protocol when GnuTLS is not used. Thanks to mancha.
+--------------------------+
Sat Nov 8 16:33:43 UTC 2014
patches/packages/bash-4.2.053-arm-1_slack14.1.txz: Upgraded.
Applied all upstream patches. The previously applied patch requiring
a specific prefix/suffix in order to parse variables for functions
closed all of the known vulnerabilities anyway, but it's clear that
until all the patches were applied that the "is this still vulnerable"
questions were not going to end...
patches/packages/xfce4-weather-plugin-0.8.4-arm-1_slack14.1.txz: Upgraded.
Package upgraded to fix the API used to fetch weather data.
+--------------------------+
Fri Nov 7 21:32:19 UTC 2014
patches/packages/mariadb-5.5.40-arm-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
(* Security fix *)
patches/packages/php-5.4.34-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues.
#68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
#68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
#68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
(* Security fix *)
patches/packages/wget-1.14-arm-3_slack14.1.txz: Rebuilt.
This update fixes a symlink vulnerability that could allow an attacker
to write outside of the expected directory.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
(* Security fix *)
+--------------------------+
Fri Oct 24 21:43:53 UTC 2014
patches/packages/glibc-2.17-arm-15_slack14.1.txz: Rebuilt.
This update fixes several security issues, and adds an extra security
hardening patch from Florian Weimer. Thanks to mancha for help with
tracking and backporting patches.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
(* Security fix *)
patches/packages/glibc-i18n-2.17-arm-15_slack14.1.txz: Rebuilt.
patches/packages/glibc-profile-2.17-arm-15_slack14.1.txz: Rebuilt.
patches/packages/glibc-solibs-2.17-arm-15_slack14.1.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2014i-noarch-15_slack14.1.txz: Rebuilt.
Upgraded to tzcode2014i and tzdata2014i.
patches/packages/pidgin-2.10.10-arm-1_slack14.1.txz: Upgraded.
This update fixes several security issues:
Insufficient SSL certificate validation (CVE-2014-3694)
Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
Remote crash parsing malformed Groupwise message (CVE-2014-3696)
Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
Potential information leak from XMPP (CVE-2014-3698)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
(* Security fix *)
+--------------------------+
Wed Oct 22 08:00:52 UTC 2014
patches/packages/openssh-6.7p1-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue that allows remote servers to trigger
the skipping of SSHFP DNS RR checking by presenting an unacceptable
HostCertificate.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
(* Security fix *)
+--------------------------+
Fri Oct 17 11:22:15 UTC 2014
patches/packages/openssl-solibs-1.0.1j-arm-1_slack14.1.txz: Upgraded.
(* Security fix *)
patches/packages/openssl-1.0.1j-arm-1_slack14.1.txz: Upgraded.
This update fixes several security issues:
SRTP Memory Leak (CVE-2014-3513):
A flaw in the DTLS SRTP extension parsing code allows an attacker, who
sends a carefully crafted handshake message, to cause OpenSSL to fail
to free up to 64k of memory causing a memory leak. This could be
exploited in a Denial Of Service attack.
Session Ticket Memory Leak (CVE-2014-3567):
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack.
SSL 3.0 Fallback protection:
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade.
Some client applications (such as browsers) will reconnect using a
downgraded protocol to work around interoperability bugs in older
servers. This could be exploited by an active man-in-the-middle to
downgrade connections to SSL 3.0 even if both sides of the connection
support higher protocols. SSL 3.0 contains a number of weaknesses
including POODLE (CVE-2014-3566).
Build option no-ssl3 is incomplete (CVE-2014-3568):
When OpenSSL is configured with "no-ssl3" as a build option, servers
could accept and complete a SSL 3.0 handshake, and clients could be
configured to send them.
For more information, see:
https://www.openssl.org/news/secadv_20141015.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
(* Security fix *)
+--------------------------+
Tue Sep 30 17:13:28 UTC 2014
patches/packages/bash-4.2.050-arm-1_slack14.1.txz: Upgraded.
Another bash update. Here's some information included with the patch:
"This patch changes the encoding bash uses for exported functions to avoid
clashes with shell variables and to avoid depending only on an environment
variable's contents to determine whether or not to interpret it as a shell
function."
After this update, an environment variable will not go through the parser
unless it follows this naming structure: BASH_FUNC_*%%
Most scripts never expected to import functions from environment variables,
so this change (although not backwards compatible) is not likely to break
many existing scripts. It will, however, close off access to the parser as
an attack surface in the vast majority of cases. There's already another
vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
but this hardening patch prevents it (and likely many more similar ones).
Thanks to Florian Weimer and Chet Ramey.
(* Security fix *)
+--------------------------+
Sat Sep 27 14:08:36 UTC 2014
patches/packages/bash-4.2.049-arm-1_slack14.1.txz: Upgraded.
This is essentially a rebuild as the preliminary patch for CVE-2014-7169
has been accepted by upstream and is now signed. This also bumps the
patchlevel, making it easy to tell this is the fixed version.
Possibly more changes to come, given the ongoing discussions on oss-sec.
+--------------------------+
Thu Sep 25 21:50:49 UTC 2014
patches/packages/bash-4.2.048-arm-2_slack14.1.txz: Rebuilt.
Patched an additional trailing string processing vulnerability discovered
by Tavis Ormandy.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
(* Security fix *)
+--------------------------+
Thu Sep 25 17:26:04 UTC 2014
patches/packages/bash-4.2.048-arm-1_slack14.1.txz: Upgraded.
This update fixes a vulnerability in bash related to how environment
variables are processed: trailing code in function definitions was
executed, independent of the variable name. In many common configurations
(such as the use of CGI scripts), this vulnerability is exploitable over
the network. Thanks to Stephane Chazelas for discovering this issue.
For more information, see:
http://seclists.org/oss-sec/2014/q3/650
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
(* Security fix *)
patches/packages/mozilla-nss-3.16.5-arm-1_slack14.1.txz: Upgraded.
Fixed an RSA Signature Forgery vulnerability.
For more information, see:
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
(* Security fix *)
+--------------------------+
Mon Sep 8 10:27:42 UTC 2014
patches/packages/mozilla-nss-3.16.4-arm-1_slack14.1.txz: Upgraded.
Upgraded to nss-3.16.4 and nspr-4.10.7.
patches/packages/php-5.4.32-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
(* Security fix *)
+--------------------------+
Sun Aug 10 08:20:55 UTC 2014
patches/packages/dhcpcd-6.0.5-arm-3_slack14.1.txz: Rebuilt.
This update fixes a security issue where a specially crafted packet
received from a malicious DHCP server causes dhcpcd to enter an infinite
loop causing a denial of service.
Thanks to Tobias Stoeckmann for the bug report.
(* Security fix *)
patches/packages/openssl-1.0.1i-arm-1_slack14.1.txz: Upgraded.
This update fixes several security issues:
Double Free when processing DTLS packets (CVE-2014-3505)
DTLS memory exhaustion (CVE-2014-3506)
DTLS memory leak from zero-length fragments (CVE-2014-3507)
Information leak in pretty printing functions (CVE-2014-3508)
Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
SRP buffer overrun (CVE-2014-3512)
Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
For more information, see:
https://www.openssl.org/news/secadv_20140806.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
(* Security fix *)
patches/packages/openssl-solibs-1.0.1i-arm-1_slack14.1.txz: Upgraded.
(* Security fix *)
patches/packages/samba-4.1.11-arm-1_slack14.1.txz: Upgraded.
This update fixes a remote code execution attack on unauthenticated nmbd
NetBIOS name services. A malicious browser can send packets that may
overwrite the heap of the target nmbd NetBIOS name services daemon.
It may be possible to use this to generate a remote code execution
vulnerability as the superuser (root).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
(* Security fix *)
patches/packages/xscreensaver-5.29-arm-1_slack14.1.txz: Upgraded.
Disabled nag screen that says "This version of XScreenSaver is very old!
Please upgrade!" when the age of the software exceeds 12 months.
+--------------------------+
Sun Jul 27 17:48:06 UTC 2014
patches/packages/httpd-2.4.10-arm-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
*) SECURITY: CVE-2014-0117 (cve.mitre.org)
mod_proxy: Fix crash in Connection header handling which
allowed a denial of service attack against a reverse proxy
with a threaded MPM. [Ben Reser]
*) SECURITY: CVE-2014-0118 (cve.mitre.org)
mod_deflate: The DEFLATE input filter (inflates request bodies) now
limits the length and compression ratio of inflated request bodies to
avoid denial of sevice via highly compressed bodies. See directives
DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
*) SECURITY: CVE-2014-0226 (cve.mitre.org)
Fix a race condition in scoreboard handling, which could lead to
a heap buffer overflow. [Joe Orton, Eric Covener]
*) SECURITY: CVE-2014-0231 (cve.mitre.org)
mod_cgid: Fix a denial of service against CGI scripts that do
not consume stdin that could lead to lingering HTTPD child processes
filling up the scoreboard and eventually hanging the server. By
default, the client I/O timeout (Timeout directive) now applies to
communication with scripts. The CGIDScriptTimeout directive can be
used to set a different timeout for communication with scripts.
[Rainer Jung, Eric Covener, Yann Ylavic]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
(* Security fix *)
+--------------------------+
Tue Jul 15 06:48:11 UTC 2014
patches/packages/php-5.4.30-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
(* Security fix *)
+--------------------------+
Sat Jun 28 10:26:22 UTC 2014
patches/packages/bind-9.9.5_P1-arm-1_slack14.1.txz: Upgraded.
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case. :-)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
patches/packages/gnupg-1.4.17-arm-1_slack14.1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
patches/packages/gnupg2-2.0.24-arm-1_slack14.1.txz: Upgraded.
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *)
patches/packages/samba-4.1.9-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *)
patches/packages/yptools-2.14-arm-3_slack14.1.txz: Rebuilt.
Corrected yppasswd patch that was causing password changes to fail.
Thanks to Henrik Carlqvist.
+--------------------------+
Mon Jun 16 17:08:03 UTC 2014
/GPG-KEY: Replaced.
The previous PGP key used an @armedslack.org email address, which is set to
be retired.
All packages for supported versions of Slackware ARM have now been re-signed
with the new PGP key.
For reference, the old ARMedslack PGP key used to sign the packages can be
found here:
http://arm.slackware.com/pgp-keys/GPG-KEY-armedslack
patches/packages/slackpkg-2.82.0-noarch-12_slack14.1.txz: Rebuilt.
Changed the default config to recognise the new Slackware ARM GPG key.
+--------------------------+
Thu Jun 12 05:12:03 UTC 2014
patches/packages/php-5.4.29-arm-1_slack14.1.txz: Upgraded.
This update fixes bugs and security issues, including a possible denial
of service, and an issue where insecure default permissions on the FPM
socket may allow local users to run arbitrary code as the apache user.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
(* Security fix *)
+--------------------------+
Sat Jun 7 17:01:19 UTC 2014
patches/packages/gnutls-3.1.25-arm-1_slack14.1.txz: Upgraded.
A security issue has been corrected in gnutls. This vulnerability
affects the client side of the gnutls library. A server that sends
a specially crafted ServerHello could corrupt the memory of a requesting
client. This may allow a remote attacker to execute arbitrary code.
Additional vulnerabilities in the embedded libtasn1 library have also
been patched.
Thanks to mancha for the backported patches.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
patches/packages/libtasn1-3.6-arm-1_slack14.1.txz: Upgraded.
Multiple security issues have been corrected in the libtasn1 library.
These errors allow a remote attacker to cause a denial of service, or
possibly to execute arbitrary code.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
(* Security fix *)
patches/packages/mariadb-5.5.37-arm-1_slack14.1.txz: Upgraded.
This update contains security fixes and improvements.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
(* Security fix *)
patches/packages/openssl-1.0.1h-arm-1_slack14.1.txz: Upgraded.
Multiple security issues have been corrected, including a possible
man-in-the-middle attack where weak keying material is forced, denial
of service, and the execution of arbitrary code.
For more information, see:
http://www.openssl.org/news/secadv_20140605.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
(* Security fix *)
patches/packages/openssl-solibs-1.0.1h-arm-1_slack14.1.txz: Upgraded.
patches/packages/sendmail-8.14.9-arm-1_slack14.1.txz: Upgraded.
This release fixes one security related bug by properly closing file
descriptors (except stdin, stdout, and stderr) before executing programs.
This bug could enable local users to interfere with an open SMTP
connection if they can execute their own program for mail delivery
(e.g., via procmail or the prog mailer).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
(* Security fix *)
patches/packages/sendmail-cf-8.14.9-noarch-1_slack14.1.txz: Upgraded.
+--------------------------+
Fri Apr 25 18:37:07 UTC 2014
patches/packages/libyaml-0.1.6-arm-1_slack14.1.txz: Upgraded.
This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
where a specially crafted string could cause a heap overflow leading to
arbitrary code execution.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
(* Security fix *)
patches/packages/openssh-6.6p1-arm-2_slack14.1.txz: Rebuilt.
Fixed a bug with curve25519-sha256 that caused a key exchange failure in
about 1 in 512 connection attempts.
patches/packages/php-5.4.27-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue in the in the awk script detector
which allows context-dependent attackers to cause a denial of service
(CPU consumption) via a crafted ASCII file that triggers a large amount
of backtracking.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
(* Security fix *)
+--------------------------+
Tue Apr 8 19:00:11 UTC 2014
patches/packages/openssl-1.0.1g-arm-1_slack14.1.txz: Upgraded.
This update fixes two security issues:
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or server.
Thanks for Neel Mehta of Google Security for discovering this bug and to
Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
preparing the fix.
Fix for the attack described in the paper "Recovering OpenSSL
ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
by Yuval Yarom and Naomi Benger. Details can be obtained from:
http://eprint.iacr.org/2014/140
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
(* Security fix *)
patches/packages/openssl-solibs-1.0.1g-arm-1_slack14.1.txz: Upgraded.
+--------------------------+
Wed Apr 2 19:27:55 UTC 2014
patches/packages/apr-1.5.0-arm-1_slack14.1.txz: Upgraded.
patches/packages/apr-util-1.5.3-arm-1_slack14.1.txz: Upgraded.
patches/packages/curl-7.36.0-arm-1_slack14.1.txz: Upgraded.
This update fixes four security issues.
For more information, see:
http://curl.haxx.se/docs/adv_20140326A.html
http://curl.haxx.se/docs/adv_20140326B.html
http://curl.haxx.se/docs/adv_20140326C.html
http://curl.haxx.se/docs/adv_20140326D.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
(* Security fix *)
patches/packages/httpd-2.4.9-arm-1_slack14.1.txz: Upgraded.
This update addresses two security issues.
Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults
when logging truncated cookies. Clean up the cookie logging parser to
recognize only the cookie=value pairs, not valueless cookies.
mod_dav: Keep track of length of cdata properly when removing leading
spaces. Eliminates a potential denial of service from specifically crafted
DAV WRITE requests.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
(* Security fix *)
patches/packages/mozilla-nss-3.16-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue:
The cert_TestHostName function in lib/certdb/certdb.c in the
certificate-checking implementation in Mozilla Network Security Services
(NSS) before 3.16 accepts a wildcard character that is embedded in an
internationalized domain name's U-label, which might allow man-in-the-middle
attackers to spoof SSL servers via a crafted certificate.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
(* Security fix *)
patches/packages/openssh-6.6p1-arm-1_slack14.1.txz: Upgraded.
This update fixes a security issue when using environment passing with
a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be
tricked into accepting any environment variable that contains the
characters before the wildcard character.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
(* Security fix *)
+--------------------------+
Tue Mar 18 08:15:07 UTC 2014
patches/packages/gnutls-3.1.22-arm-1_slack14.1.tgz: Upgraded.
Fixed a security issue where a specially crafted certificate could
bypass certificate validation checks.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
(* Security fix *)
patches/packages/mutt-1.5.23-arm-1_slack14.1.tgz: Upgraded.
This update fixes a buffer overflow where malformed RFC2047 header
lines could result in denial of service or potentially the execution
of arbitrary code as the user running mutt.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
(* Security fix *)
patches/packages/php-5.4.26-arm-1_slack14.1.tgz: Upgraded.
This update fixes a flaw where a specially crafted data file may cause a
segfault or 100% CPU consumption when a web page uses fileinfo() on it.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
(* Security fix *)
patches/packages/samba-4.1.6-arm-1_slack14.1.tgz: Upgraded.
This update fixes two security issues:
CVE-2013-4496:
Samba versions 3.4.0 and above allow the administrator to implement
locking out Samba accounts after a number of bad password attempts.
However, all released versions of Samba did not implement this check for
password changes, such as are available over multiple SAMR and RAP
interfaces, allowing password guessing attacks.
CVE-2013-6442:
Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
command options it will remove the existing ACL on the object being
modified, leaving the file or directory unprotected.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
(* Security fix *)
patches/packages/udisks-1.0.5-arm-1_slack14.1.tgz: Upgraded.
This update fixes a stack-based buffer overflow when handling long path
names. A malicious, local user could use this flaw to create a
specially-crafted directory structure that could lead to arbitrary code
execution with the privileges of the udisks daemon (root).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
(* Security fix *)
patches/packages/udisks2-2.1.3-arm-1_slack14.1.tgz: Upgraded.
This update fixes a stack-based buffer overflow when handling long path
names. A malicious, local user could use this flaw to create a
specially-crafted directory structure that could lead to arbitrary code
execution with the privileges of the udisks daemon (root).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
(* Security fix *)
+--------------------------+
Fri Feb 28 21:51:45 UTC 2014
patches/packages/subversion-1.7.16-arm-1_slack14.1.tgz: Upgraded.
Fix denial of service bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
(* Security fix *)
+--------------------------+
Tue Feb 25 20:33:42 UTC 2014
patches/packages/gnutls-3.1.21-arm-1_slack14.1.tgz: Upgraded.
This update fixes a flaw where a version 1 intermediate certificate would be
considered as a CA certificate by GnuTLS by default.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
(* Security fix *)
patches/packages/mariadb-5.5.35-arm-1_slack14.1.tgz: Upgraded.
This update fixes a buffer overflow in the mysql command line client which
may allow malicious or compromised database servers to cause a denial of
service (crash) and possibly execute arbitrary code via a long server
version string.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
(* Security fix *)
patches/packages/shadow-4.1.5.1-arm-3_slack14.1.tgz: Rebuilt.
Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c"
(CVE-2005-4890) by detaching the controlling terminal in the non-PAM
case via a TIOCNOTTY request. Bi-directional protection is excessive
and breaks a commonly-used methods for privilege escalation on non-PAM
systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript).
This update relaxes the restriction and only detaches the controlling
tty when the callee is not root (which is, after all, the threat vector).
Thanks to mancha for the patch (and the above information).
+--------------------------+
Fri Feb 14 19:31:41 UTC 2014
patches/packages/cairo-1.12.16-arm-1_slack14.1.tgz: Upgraded.
This is a bugfix update that was tested in -current and found to resolve
some outstanding issues with the package that shipped in Slackware 14.1.
Removed --enable-xcb-shm (may cause instability with GTK+3).
Removed --enable-xlib-xcb (causes GIMP slowdown).
Added --enable-ft and --enable-gl.
patches/packages/curl-7.35.0-arm-1_slack14.1.tgz: Upgraded.
This update fixes a flaw where libcurl could, in some circumstances, reuse
the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
request.
For more information, see:
http://curl.haxx.se/docs/adv_20140129.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
(* Security fix *)
patches/packages/ntp-4.2.6p5-arm-5_slack14.1.tgz: Rebuilt.
All stable versions of NTP remain vulnerable to a remote attack where the
"ntpdc -c monlist" command can be used to amplify network traffic as part
of a denial of service attack. By default, Slackware is not vulnerable
since it includes "noquery" as a default restriction. However, it is
vulnerable if this restriction is removed. To help mitigate this flaw,
"disable monitor" has been added to the default ntp.conf (which will disable
the monlist command even if other queries are allowed), and the default
restrictions have been extended to IPv6 as well.
All users of the NTP daemon should make sure that their ntp.conf contains
"disable monitor" to prevent misuse of the NTP service. The new ntp.conf
file will be installed as /etc/ntp.conf.new with a package upgrade, but the
changes will need to be merged into any existing ntp.conf file by the admin.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
http://www.kb.cert.org/vuls/id/348126
(* Security fix *)
patches/packages/pidgin-2.10.9-arm-1_slack14.1.tgz: Upgraded.
This update fixes various security issues and other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
(* Security fix *)
+--------------------------+
Wed Jan 29 19:07:47 UTC 2014
patches/packages/bind-9.9.4_P2-arm-1_slack14.1.tgz: Upgraded.
This update fixes a defect in the handling of NSEC3-signed zones that can
cause BIND to be crashed by a specific set of queries.
NOTE: According to the second link below, Slackware is probably not
vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
anyway, though.
For more information, see:
https://kb.isc.org/article/AA-01078
https://kb.isc.org/article/AA-01085
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *)
patches/packages/mozilla-nss-3.15.4-arm-1_slack14.1.tgz: Upgraded.
Upgraded to nss-3.15.4 and nspr-4.10.3.
Fixes a possible man-in-the-middle issue.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
(* Security fix *)
+--------------------------+
Tue Jan 14 23:13:25 UTC 2014
patches/packages/libXfont-1.4.7-arm-1_slack14.1.tgz: Upgraded.
This update fixes a stack overflow when reading a BDF font file containing
a longer than expected string, which could lead to crashes or privilege
escalation.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
(* Security fix *)
patches/packages/openssl-solibs-1.0.1f-arm-1_slack14.1.tgz: Upgraded.
patches/packages/openssl-1.0.1f-arm-1_slack14.1.tgz: Upgraded.
This update fixes the following security issues:
Fix for TLS record tampering bug CVE-2013-4353
Fix for TLS version checking bug CVE-2013-6449
Fix for DTLS retransmission bug CVE-2013-6450
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
(* Security fix *)
patches/packages/php-5.4.24-arm-1_slack14.1.tgz: Upgraded.
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
which allows remote attackers to execute arbitrary code or cause a denial
of service (memory corruption) via a crafted certificate that is not
properly handled by the openssl_x509_parse function.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
(* Security fix *)
patches/packages/samba-4.1.4-arm-1_slack14.1.tgz: Upgraded.
This update fixes a heap-based buffer overflow that may allow AD domain
controllers to execute arbitrary code via an invalid fragment length in
a DCE-RPC packet.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
(* Security fix *)
+--------------------------+
Sun Dec 22 19:46:02 UTC 2013
patches/packages/gnupg-1.4.16-arm-1_slack14.1.tgz:
Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
For more information, see:
http://www.cs.tau.ac.il/~tromer/acoustic/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
(* Security fix *)
+--------------------------+
Wed Dec 18 20:15:44 UTC 2013
patches/packages/libiodbc-3.52.8-arm-1_slack14.1.tgz: Upgraded.
This update fixes an rpath pointing to a location in /tmp that was found in
two test programs (iodbctest and iodbctestw). This could have allowed a
local attacker with write access to /tmp to add modified libraries (and
execute arbitrary code) as any user running the test programs.
Thanks to Christopher Oliver for the bug report.
(* Security fix *)
patches/packages/libjpeg-v8a-arm-3_slack14.1.tgz: Rebuilt.
Fix use of uninitialized memory when decoding images with missing SOS data
for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
This could allow remote attackers to obtain sensitive information from
uninitialized memory locations via a crafted JPEG image.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
(* Security fix *)
patches/packages/llvm-3.3-arm-3_slack14.1.tgz: Rebuilt.
The LLVM package included binaries with an rpath pointing to the build
location in /tmp. This allows an attacker with write access to /tmp to
add modified libraries (and execute arbitrary code) as any user running
the LLVM binaries. This updated package rebuilds LLVM to exclude the
build directories from the rpath information.
Thanks to Christopher Oliver for the bug report.
(* Security fix *)
patches/packages/ruby-1.9.3_p484-arm-1_slack14.1.tgz: Upgraded.
This update fixes a heap overflow in floating point parsing. A specially
crafted string could cause a heap overflow leading to a denial of service
attack via segmentation faults and possibly arbitrary code execution.
For more information, see:
https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
(* Security fix *)
+--------------------------+
Fri Dec 6 19:50:28 UTC 2013
patches/packages/mozilla-nss-3.15.3-arm-1_slack14.1.tgz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
(* Security fix *)
+--------------------------+
Sun Nov 24 09:33:41 UTC 2013
patches/packages/scim-1.4.14-arm-5_slack14.1.tgz: Rebuilt.
--prefix=/usr had been omitted from the build-time configuration, resulting in
some files being placed into /usr/local.
Thanks to J?r?me Pinot
+--------------------------+
Wed Nov 20 21:26:49 UTC 2013
patches/packages/openssh-6.4p1-arm-1_slack14.1.tgz: Upgraded.
sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected.
For more information, see:
http://www.openssh.com/txt/gcmrekey.adv
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
(* Security fix *)
patches/packages/php-5.4.22-arm-1_slack14.1.tgz: Upgraded.
This is a bugfix release.
patches/packages/samba-4.1.1-arm-1_slack14.1.tgz: Upgraded.
This update fixes two security issues:
* Samba versions 3.2.0 and above do not check the underlying file or
directory ACL when opening an alternate data stream.
* In setups which provide ldap(s) and/or https services, the private key
for SSL/TLS encryption might be world readable. This typically happens
in active directory domain controller setups.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
(* Security fix *)
Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini.
+--------------------------+
Mon Nov 4 19:50:32 UTC 2013
Slackware 14.1 ARM stable is released!
It's been another interesting release cycle here at Slackware bringing
updated compilers and development tools, the switch from MySQL to MariaDB,
and many more improvements throughout the system. Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.
Please consider supporting the Slackware project by purchasing goodies
from the Slackware Store - http://store.slackware.com
If you're an x86/x86_64 user, you can pick up a DVD copy and a subscription
too!
For donations to Slackware ARM specifically, a donations function exists
via PayPal:
http://arm.slackware.com/sponsor/
Enjoy this release!
+--------------------------+
Sat Nov 2 08:59:41 UTC 2013
ap/dc3dd-7.1.614-arm-1.tgz: Upgraded.
kde/kdevelop-4.5.2-arm-1.tgz: Upgraded.
kde/kdevelop-php-1.5.2-arm-1.tgz: Upgraded.
kde/kdevelop-php-docs-1.5.2-arm-1.tgz: Upgraded.
kde/kdevplatform-1.5.2-arm-1.tgz: Upgraded.
kde/lskat-4.10.5-arm-2.tgz: Rebuilt.
Fixed a typo in slack-desc.
n/gnutls-3.1.16-arm-1.tgz: Upgraded.
n/network-scripts-14.1-noarch-2.tgz: Rebuilt.
Fixed a typo in netconfig.
isolinux/*: Rebuilt.
Don't produce a flash of screen output when scanning for LVM volumes
after completing the package installation.
+--------------------------+
Tue Oct 29 18:05:25 UTC 2013
a/mkinitrd-1.4.8-arm-2.tgz: Rebuilt.
In mkinitrd_command_generator.sh, if a USB keyboard is detected add the
hid_generic module (in addition to usbhid). Recent kernels need this.
Thanks to mario.
kde/calligra-2.7.4-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ia-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.4-noarch-1.tgz: Upgraded.
xap/xscreensaver-5.22-arm-2.tgz: Rebuilt.
Recompiled to pick up the GPL text (which is used by several screensavers)
from libX11's docs. After the last libX11 upgrade the old location was no
longer valid.
+--------------------------+
Mon Oct 28 21:04:16 UTC 2013
This is Slackware ARM v14.1 release candidate 3.
a/glibc-solibs-2.17-arm-14.tgz: Rebuilt.
a/glibc-zoneinfo-2013d-noarch-14.tgz: Rebuilt.
a/kernel-modules-armv7-3.10.17_armv7-arm-2.tgz: Rebuilt.
a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-2.tgz: Rebuilt.
a/kernel-modules-versatile-3.10.17_versatile-arm-2.tgz: Rebuilt.
a/kernel_armv7-3.10.17-arm-2.tgz: Rebuilt.
a/kernel_kirkwood-3.10.17-arm-2.tgz: Rebuilt.
a/kernel_versatile-3.10.17-arm-2.tgz: Rebuilt.
a/sysvinit-scripts-2.0-noarch-16.tgz: Rebuilt.
Check for devtmpfs (not tmpfs) before starting udev.
Remove obsolete reference to rc.optical-symlinks in rc.M.
Thanks to GazL.
ap/pm-utils-1.4.1-arm-5.tgz: Rebuilt.
Set all the hooks in the power.d directory to non-executable. This package
shouldn't be playing games with the user's settings. Thanks to jtsn.
d/kernel-headers-3.10.17-arm-2.tgz: Rebuilt.
k/kernel-source-3.10.17-arm-2.tgz: Rebuilt.
l/glibc-2.17-arm-14.tgz: Rebuilt.
Built against Linux 3.10.17 kernel headers.
l/glibc-i18n-2.17-arm-14.tgz: Rebuilt.
l/glibc-profile-2.17-arm-14.tgz: Rebuilt.
l/poppler-0.24.3-arm-1.tgz: Upgraded.
n/gnutls-3.1.15-arm-1.tgz: Upgraded.
Fixed an issue where a server that returns more 4 DANE entries could corrupt
the memory of a requesting client.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4466
(* Security fix *)
xap/xine-ui-0.99.7-arm-1.tgz: Upgraded.
Fixed file open dialog with a patch from BLFS.
Thanks to mats_b_tegner.
isolinux/: Rebuilt.
kernels/: Rebuilt.
+--------------------------+
Sat Oct 26 12:46:44 UTC 2013
a/pciutils-3.2.0-arm-1.tgz: Upgraded.
Thanks to J?r?me Pinot.
a/usbutils-007-arm-1.tgz: Upgraded.
Thanks to J?r?me Pinot.
ap/acct-6.5.4-arm-3.tgz: Rebuilt.
Patched to fix broken sa output. Thanks to ktreadway.
n/lftp-4.4.9-arm-1.tgz: Upgraded.
Reverted to lftp-4.4.9 due to a regression in the mirror function.
x/scim-1.4.14-arm-4.tgz: Rebuilt.
Put the Qt module in the proper inputmethods directory, and enable the
plugin in /etc/profile.d/scim.{csh,sh}. Thanks to guanx.
x/xterm-297-arm-1.tgz: Upgraded.
+--------------------------+
Tue Oct 22 21:00:56 UTC 2013
This is Slackware ARM v14.1 release candidate 2.
glibc and the Linux kernel need rebuilding with the new gcc version, but
this will wait until a new kernel version is released at kernel.org
(the release schedule is frequent so I don't expect to have to wait
for too long).
The mini root filesystem for -current has been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
a/sharutils-4.14-arm-1.tgz: Upgraded.
a/usb_modeswitch-2.0.1-arm-1.tgz: Upgraded.
ap/slackpkg-2.82.0-noarch-11.tgz: Rebuilt.
Corrected typos in the slackpkg man page.
Thanks to sycamorex.
d/gcc-4.8.2-arm-1.tgz: Upgraded.
d/gcc-g++-4.8.2-arm-1.tgz: Upgraded.
d/gcc-gfortran-4.8.2-arm-1.tgz: Upgraded.
d/gcc-gnat-4.8.2-arm-1.tgz: Upgraded.
d/gcc-go-4.8.2-arm-1.tgz: Upgraded.
d/gcc-java-4.8.2-arm-1.tgz: Upgraded.
d/gcc-objc-4.8.2-arm-1.tgz: Upgraded.
d/libtool-2.4.2-arm-2.tgz: Rebuilt.
Rebuilt to update GCC version, which is detected at compile time.
Thanks to Larry Hajali.
kde/kdelibs-4.10.5-arm-3.tgz: Rebuilt.
Reverted three upstream commits which (although technically correct) have
the effect of causing KDE to display the wrong icons in some cases.
Thanks to alienBOB.
l/qt-4.8.5-arm-2.tgz: Rebuilt.
Adjusted the SlackBuild to make sure that libwebcore (which is used
internally for the Qt build) doesn't end up in QtWebKit.pc.
Thanks to Larry Hajali.
n/mutt-1.5.22-arm-1.tgz: Upgraded.
Thanks to Markus Reichelt for the updates to the ./configure options.
n/samba-4.1.0-arm-2.tgz: Rebuilt.
Added symlinks for libtalloc.so and libpytalloc-util.so.
Thanks to Adis Nezirovic.
x/mesa-9.1.7-arm-1.tgz: Upgraded.
xap/MPlayer-1.1_20130819-arm-2.tgz: Rebuilt.
Added a patch to fix subtitles in the case where MPlayer is recompiled
on a system that has libass. Thanks to Marin Glibic.
xap/rdesktop-1.8.0-arm-2.tgz: Rebuilt.
Patched to fix crash with -P and/or -N.
Thanks to mancha.
+--------------------------+
Sun Oct 20 07:18:53 UTC 2013
a/glibc-solibs-2.17-arm-13.tgz: Rebuilt.
a/glibc-zoneinfo-2013d-noarch-13.tgz: Rebuilt.
a/kernel-firmware-20131019git-noarch-1.tgz: Upgraded.
a/kernel-modules-armv7-3.10.17_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.17_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.17-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.17-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.17-arm-1.tgz: Upgraded.
ap/hplip-3.13.10-arm-1.tgz: Upgraded.
This fixes a polkit race condition that could allow local users to bypass
intended access restrictions.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
(* Security fix *)
d/kernel-headers-3.10.17-arm-1.tgz: Upgraded.
k/kernel-source-3.10.17-arm-1.tgz: Upgraded.
l/glibc-2.17-arm-13.tgz: Rebuilt.
Rebuilt against Linux 3.10.17 kernel headers.
l/glibc-i18n-2.17-arm-13.tgz: Rebuilt.
l/glibc-profile-2.17-arm-13.tgz: Rebuilt.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Oct 18 21:17:38 UTC 2013
This is Slackware ARM 14.1 release candidate 1.
a/aaa_base-14.1-arm-1.tgz: Upgraded.
a/aaa_elflibs-14.1-arm-3.tgz: Rebuilt.
a/cups-1.5.4-arm-2.tgz: Rebuilt.
Use a newer backport of the USB quirks patch. Thanks to mancha.
Blacklist the usblp module just in case.
a/gettext-0.18.2.1-arm-3.tgz: Rebuilt.
a/gptfdisk-0.8.7-arm-1.tgz: Upgraded.
a/kernel-firmware-20131015git-noarch-1.tgz: Upgraded.
a/kernel-modules-armv7-3.10.16_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.16_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.16_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.16-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.16-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.16-arm-1.tgz: Upgraded.
a/logrotate-3.8.6-arm-1.tgz: Upgraded.
a/minicom-2.6.2-arm-1.tgz: Upgraded.
a/pkgtools-14.1-noarch-2.tgz: Rebuilt.
Removed obsolete makebootdisk script.
Added an /sbin/makebootstick symlink for making a USB boot stick.
a/shadow-4.1.5.1-arm-2.tgz: Rebuilt.
Updated crypt() patch. Thanks to mancha.
a/sysvinit-scripts-2.0-noarch-15.tgz: Rebuilt.
Clean up stale cron directories in /var/spool/cron.
Create lock/run directories for LVM.
Thanks to GazL.
Mount cgroup controllers in subfolders.
Thanks to Matteo Bernardini.
ap/diffutils-3.3-arm-1.tgz: Upgraded.
ap/mc-4.8.10-arm-2.tgz: Rebuilt.
Upstream fix for crash when moving directories.
Upstream fix for command line directory handling.
ap/powertop-2.4-arm-1.tgz: Upgraded.
ap/slackpkg-2.82.0-noarch-10.tgz: Rebuilt.
Verified and corrected the mirrors lists for x86 and x86_64.
Changed version numbers from 14.0 to 14.1 in preparation for the upcoming
Slackware 14.1 release.
Corrected a manpage bug in the file-search section.
ap/tmux-1.8-arm-1.tgz: Upgraded.
d/cmake-2.8.12-arm-1.tgz: Upgraded.
d/gettext-tools-0.18.2.1-arm-3.tgz: Rebuilt.
d/guile-2.0.9-arm-1.tgz: Upgraded.
d/kernel-headers-3.10.16-arm-1.tgz: Upgraded.
d/mercurial-2.7.2-arm-1.tgz: Upgraded.
k/kernel-source-3.10.16-arm-1.tgz: Upgraded.
kde/ark-4.10.5-arm-2.tgz: Rebuilt.
kde/calligra-2.7.3-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0.9-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ia-2.7.3-noarch-1.tgz: Added.
kdei/calligra-l10n-it-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.3-noarch-1.tgz: Upgraded.
l/dconf-0.18.0-arm-1.tgz: Upgraded.
l/gc-7.2d-arm-1.tgz: Added.
New dependency for guile.
l/gvfs-1.16.3-arm-2.tgz: Rebuilt.
l/libarchive-3.1.2-arm-1.tgz: Upgraded.
l/libevent-2.0.21-arm-1.tgz: Added.
l/libproxy-0.4.11-arm-3.tgz: Rebuilt.
l/libtiff-3.9.7-arm-1.tgz: Upgraded.
Patched overflows, crashes, and out of bounds writes.
Thanks to mancha for the backported patches.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244
(* Security fix *)
l/libunistring-0.9.3-arm-1.tgz: Added.
New dependency for guile.
l/mozilla-nss-3.15.2-arm-2.tgz: Rebuilt.
Recompiled with NSS_ENABLE_ECC=1.
Thanks to Janusz Dziemidowicz.
n/ModemManager-1.0.0-arm-1.tgz: Upgraded.
n/NetworkManager-0.9.8.8-arm-1.tgz: Upgraded.
n/alpine-2.11-arm-1.tgz: Upgraded.
n/conntrack-tools-1.4.2-arm-1.tgz: Added.
n/ebtables-2.0.10-arm-1.tgz: Added.
n/epic5-1.1.6-arm-1.tgz: Upgraded.
n/gnupg-1.4.15-arm-1.tgz: Upgraded.
Fixed possible infinite recursion in the compressed packet
parser. [CVE-2013-4402]
Protect against rogue keyservers sending secret keys.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
(* Security fix *)
n/gnupg2-2.0.22-arm-1.tgz: Upgraded.
Fixed possible infinite recursion in the compressed packet
parser. [CVE-2013-4402]
Protect against rogue keyservers sending secret keys.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
(* Security fix *)
n/gnutls-3.1.14-arm-1.tgz: Upgraded.
n/imapd-2.11-arm-1.tgz: Upgraded.
n/iproute2-3.10.0-arm-2.tgz: Rebuilt.
n/ipset-6.20-arm-1.tgz: Added.
n/iptables-1.4.20-arm-1.tgz: Upgraded.
n/iptraf-ng-1.1.4-arm-1.tgz: Upgraded.
n/iputils-s20121221-arm-1.tgz: Upgraded.
n/lftp-4.4.10-arm-1.tgz: Upgraded.
n/libmbim-1.4.0-arm-1.tgz: Added.
n/libmnl-1.0.3-arm-1.tgz: Added.
n/libnetfilter_acct-1.0.2-arm-1.tgz: Added.
n/libnetfilter_conntrack-1.0.4-arm-1.tgz: Added.
n/libnetfilter_cthelper-1.0.0-arm-1.tgz: Added.
n/libnetfilter_cttimeout-1.0.0-arm-1.tgz: Added.
n/libnetfilter_log-1.0.1-arm-1.tgz: Added.
n/libnetfilter_queue-1.0.2-arm-1.tgz: Added.
n/libnfnetlink-1.0.1-arm-1.tgz: Added.
n/libqmi-1.4.0-arm-1.tgz: Added.
n/mtr-0.85-arm-1.tgz: Upgraded.
n/nfacct-1.0.1-arm-1.tgz: Added.
n/ntp-4.2.6p5-arm-4.tgz: Rebuilt.
If the hardware clock is kept in localtime, save the time to the hardware
clock after starting ntpd. This prevents the kernel from saving the system
time to the hardware clock every 11 minutes, which would cause the hardware
clock to be off by the difference between localtime and UTC.
Thanks to tux_dude.
n/openssh-6.3p1-arm-1.tgz: Upgraded.
n/openvpn-2.3.2-arm-1.tgz: Upgraded.
Added configure option --enable-password-save. Thanks to Mario.
n/php-5.4.20-arm-1.tgz: Upgraded.
n/rfkill-0.5-arm-1.tgz: Upgraded.
n/samba-4.1.0-arm-1.tgz: Upgraded.
n/tftp-hpa-5.2-arm-1.tgz: Upgraded.
n/ulogd-2.0.2-arm-1.tgz: Added.
n/yptools-2.14-arm-2.tgz: Rebuilt.
Updated yp-tools crypt() patch. Thanks to mancha.
tcl/tcl-8.6.1-arm-1.tgz: Upgraded.
tcl/tk-8.6.1-arm-1.tgz: Upgraded.
x/xauth-1.0.8-arm-1.tgz: Upgraded.
x/xbacklight-1.2.1-arm-1.tgz: Upgraded.
x/xcompmgr-1.1.6-arm-1.tgz: Upgraded.
x/xf86-input-evdev-2.8.2-arm-1.tgz: Upgraded.
x/xf86-video-armsoc-dcf32bd-arm-1.tgz: Upgraded.
x/xf86-video-fbdev-0.4.4-arm-1.tgz: Upgraded.
x/xf86-video-r128-6.9.2-arm-1.tgz: Upgraded.
x/xf86-video-savage-2.3.7-arm-1.tgz: Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-7.tgz: Rebuilt.
x/xorg-server-1.14.3-arm-2.tgz: Rebuilt.
Patched a use-after-free bug that can cause an X server crash or
memory corruption.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
(* Security fix *)
x/xorg-server-xephyr-1.14.3-arm-2.tgz: Rebuilt.
x/xorg-server-xnest-1.14.3-arm-2.tgz: Rebuilt.
x/xorg-server-xvfb-1.14.3-arm-2.tgz: Rebuilt.
xap/network-manager-applet-0.9.8.4-arm-1.tgz: Upgraded.
xap/rdesktop-1.8.0-arm-1.tgz: Upgraded.
xap/sane-1.0.24-arm-1.tgz: Upgraded.
Upgraded to sane-backends-1.0.24.
xfce/exo-0.10.2-arm-2.tgz: Rebuilt.
Fix URL handling to not reject magnet links.
Thanks to Larry Hajali.
extra/tightvnc/tightvnc-1.3.10-arm-6.tgz: Removed.
extra/tigervnc/tigervnc-1.1.0-arm-1.tgz: Added.
Thanks to alienBOB.
extra/x11vnc/x11vnc-0.9.13-arm-2.tgz: Rebuilt.
extra/openjdk/*: Removed.
This package cannot be maintained on ARMv5 hardware (I don't know why this is,
but I always get a segfault building on ARMv5) and therefore it has to go.
I've moved the previous packages to the 'unsupported' directory. They're
currently out of date and contain many known security vulnerabilities. I may
update these in the future if there's demand.
ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/openjdk
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Oct 13 16:39:51 UTC 2013
a/kernel-modules-armv7-3.10.15_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.15_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.15_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.15-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.15-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.15-arm-1.tgz: Upgraded.
d/kernel-headers-3.10.15-arm-1.tgz: Upgraded.
k/kernel-source-3.10.15-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Thu Oct 3 19:22:44 UTC 2013
a/etc-14.1-arm-2.tgz: Rebuilt.
Added /lib{,64} and /usr/lib{,64} paths to the top of ld.so.conf.
a/getty-ps-2.1.0b-arm-3.tgz: Rebuilt.
Patched crash bug. Thanks to mancha.
a/kernel-modules-armv7-3.10.14_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.14_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.14_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.14-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.14-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.14-arm-1.tgz: Upgraded.
a/pkgtools-14.1-noarch-1.tgz: Upgraded.
a/sed-4.2.2-arm-1.tgz: Upgraded.
ap/mc-4.8.10-arm-1.tgz: Upgraded.
ap/vim-7.4.050-arm-1.tgz: Upgraded.
d/kernel-headers-3.10.14-arm-1.tgz: Upgraded.
d/rcs-5.9.0-arm-1.tgz: Upgraded.
k/kernel-source-3.10.14-arm-1.tgz: Upgraded.
l/gmp-5.1.3-arm-1.tgz: Upgraded.
l/mozilla-nss-3.15.2-arm-1.tgz: Upgraded.
Upgraded to nss-3.15.2 and nspr-4.10.1.
n/ca-certificates-20130906-noarch-1.tgz: Upgraded.
n/rsync-3.1.0-arm-1.tgz: Upgraded.
xap/vim-gvim-7.4.050-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Sep 29 08:45:08 UTC 2013
a/udev-182-arm-5.tgz: Rebuilt.
Fix compilation. Thanks to alienBOB.
ap/lm_sensors-3.3.4-arm-1.tgz: Upgraded.
d/m4-1.4.17-arm-1.tgz: Upgraded.
n/sendmail-8.14.7-arm-1.tgz: Upgraded.
n/sendmail-cf-8.14.7-noarch-1.tgz: Upgraded.
n/traceroute-2.0.19-arm-1.tgz: Upgraded.
x/mesa-9.1.6-arm-2.tgz: Rebuilt.
Recompiled with --enable-osmesa.
+--------------------------+
Mon Sep 23 19:34:29 UTC 2013
a/sysvinit-scripts-2.0-noarch-14.tgz: Rebuilt.
Fix entropy carry in rc.S and rc.6, since /proc/sys/kernel/random/poolsize
now gives the pool size in bits rather than bytes.
Thanks to Frank Molzahn.
a/u-boot-tools-2013.04-arm-2.tgz: Rebuilt.
Added offets for Pogoplug and Dockstar systems to /etc/fw_env.config
Thanks to Rich Lapointe.
n/links-2.8-arm-1.tgz: Upgraded.
n/samba-4.0.9-arm-2.tgz: Rebuilt.
Added talloc.h, pytalloc-util.pc, and talloc.pc.
x/dejavu-fonts-ttf-2.34-noarch-1.tgz: Upgraded.
x/xf86-video-armsoc-a7e316f-arm-1.tgz: Upgraded.
+--------------------------+
Fri Sep 20 18:28:30 UTC 2013
a/lrzip-0.616-arm-1.tgz: Upgraded.
ap/cdrtools-3.01a17-arm-1.tgz: Upgraded.
t/transfig-3.2.5e-arm-1.tgz: Upgraded.
t/xfig-3.2.5c-arm-1.tgz: Upgraded.
x/libX11-1.6.2-arm-1.tgz: Upgraded.
x/libXaw-1.0.12-arm-1.tgz: Upgraded.
x/libXmu-1.1.2-arm-1.tgz: Upgraded.
x/libXpm-3.5.11-arm-1.tgz: Upgraded.
x/libXrandr-1.4.2-arm-1.tgz: Upgraded.
x/libXv-1.0.10-arm-1.tgz: Upgraded.
x/twm-1.0.8-arm-1.tgz: Upgraded.
x/util-macros-1.17.1-arm-1.tgz: Upgraded.
x/xclipboard-1.1.3-arm-1.tgz: Upgraded.
x/xclock-1.0.7-arm-1.tgz: Upgraded.
x/xf86-video-armsoc-4c57279-arm-2.tgz: Rebuilt.
x/xf86-video-dummy-0.3.7-arm-1.tgz: Upgraded.
x/xf86-video-fbdev-0.4.3-arm-7.tgz: Rebuilt.
x/xf86-video-vesa-2.3.3-arm-1.tgz: Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-6.tgz: Rebuilt.
x/xinit-1.3.3-arm-1.tgz: Upgraded.
x/xinput-1.6.1-arm-1.tgz: Upgraded.
x/xkill-1.0.4-arm-1.tgz: Upgraded.
x/xlsclients-1.1.3-arm-1.tgz: Upgraded.
x/xman-1.1.3-arm-1.tgz: Upgraded.
x/xmodmap-1.0.8-arm-1.tgz: Upgraded.
x/xorg-server-1.14.3-arm-1.tgz: Upgraded.
x/xorg-server-xephyr-1.14.3-arm-1.tgz: Upgraded.
x/xorg-server-xnest-1.14.3-arm-1.tgz: Upgraded.
x/xorg-server-xvfb-1.14.3-arm-1.tgz: Upgraded.
x/xrdb-1.1.0-arm-1.tgz: Upgraded.
xap/imagemagick-6.8.6_10-arm-1.tgz: Upgraded.
xap/windowmaker-0.95.5-arm-1.tgz: Upgraded.
extra/tightvnc/tightvnc-1.3.10-arm-6.tgz: Rebuilt.
+--------------------------+
Wed Sep 18 19:29:08 UTC 2013
This is beta 1 of Slackware ARM v14.1.
a/glibc-solibs-2.17-arm-12.tgz: Rebuilt.
a/glibc-zoneinfo-2013d-noarch-12.tgz: Rebuilt.
ap/slackpkg-2.82.0-noarch-9.tgz: Rebuilt.
Patched core-functions.sh to fix searching for qt, phonon, and other
packages in cases where package names overlap.
Thanks to S�bastien Ballet.
d/kernel-headers-3.10.12-arm-1.tgz: Upgraded.
l/dconf-0.16.1-arm-2.tgz: Rebuilt.
Don't try to restart D-Bus from the installer. All it does is create
noise on the console.
l/glibc-2.17-arm-12.tgz: Rebuilt.
Built against Linux 3.10.12 kernel headers.
Patched to fix integer overflows in pvalloc, valloc, and
posix_memalign/memalign/aligned_alloc.
Thanks to mancha for the backported patch.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
(* Security fix *)
l/glibc-i18n-2.17-arm-12.tgz: Rebuilt.
l/glibc-profile-2.17-arm-12.tgz: Rebuilt.
l/gnome-themes-standard-3.8.4-arm-1.tgz: Upgraded.
l/system-config-printer-1.3.13-arm-1.tgz: Upgraded.
+--------------------------+
Tue Sep 17 20:39:11 UTC 2013
x/libXxf86dga-1.1.4-arm-2.tgz: Rebuilt.
x/libXxf86misc-1.0.3-arm-2.tgz: Rebuilt.
x/libXxf86vm-1.1.3-arm-2.tgz: Rebuilt.
x/xf86-video-armsoc-4c57279-arm-1.tgz: Upgraded.
Built with './configure --with-drmmode=exynos' since I'd intended this driver
to be used for the Samsung Chromebook.
x/xf86-video-fbdev-0.4.3-arm-6.tgz: Rebuilt.
This was missed in the last round of rebuilds. Thanks to openpandora.
x/xf86-video-nouveau-1.0.9-arm-1.tgz: Upgraded.
x/xf86bigfontproto-1.2.0-arm-2.tgz: Rebuilt.
x/xf86dga-1.0.3-arm-2.tgz: Rebuilt.
x/xf86dgaproto-2.1-arm-2.tgz: Rebuilt.
x/xf86driproto-2.1.1-arm-2.tgz: Rebuilt.
x/xf86miscproto-0.9.3-arm-2.tgz: Rebuilt.
x/xf86vidmodeproto-2.3.1-arm-2.tgz: Rebuilt.
+--------------------------+
Sun Sep 15 15:11:07 UTC 2013
a/infozip-6.0-arm-3.tgz: Rebuilt.
Fixed bzip2 and UID/GID support in unzip.
Thanks to Ruar? ?degaard.
a/kernel-firmware-20130914git-noarch-1.tgz: Upgraded.
a/kernel-modules-armv7-3.10.12_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.12_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.12_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.12-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.12-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.12-arm-1.tgz: Upgraded.
d/help2man-1.43.3-arm-1.tgz: Added.
k/kernel-source-3.10.12-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Sep 11 19:15:19 UTC 2013
a/dosfstools-3.0.22-arm-1.tgz: Upgraded.
a/glibc-solibs-2.17-arm-11.tgz: Rebuilt.
a/glibc-zoneinfo-2013d-noarch-11.tgz: Rebuilt.
a/hdparm-9.43-arm-1.tgz: Upgraded.
a/kernel-modules-armv7-3.10.11_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.11_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.11_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.11-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.11-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.11-arm-1.tgz: Upgraded.
Patched to work with QEMU-1.6.0. This kernel has _only_ been
tested with QEMU-1.6.0, so please upgrade your QEMU installation
if you'd like to use this kernel.
Thanks to Keith C. Perry for the report.
a/os-prober-1.63-arm-1.tgz: Added.
This is a simple tool that searches partitions for bootable operating
systems.
d/device-tree-compiler-1.4.0-arm-1.tgz: Upgraded.
d/gcc-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-g++-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-gfortran-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-gnat-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-go-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-java-4.8.1-arm-2.tgz: Rebuilt.
d/gcc-objc-4.8.1-arm-2.tgz: Rebuilt.
d/git-1.8.4-arm-1.tgz: Upgraded.
d/kernel-headers-3.10.11-arm-1.tgz: Upgraded.
d/perl-5.18.1-arm-1.tgz: Upgraded.
Upgraded to DBI-1.628. Added gettext-1.05.
d/subversion-1.7.13-arm-1.tgz: Upgraded.
This update fixes a local privilege escalation vulnerability via
symlink attack.
For more information, see:
http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277
(* Security fix *)
k/kernel-source-3.10.11-arm-1.tgz: Upgraded.
l/glibc-2.17-arm-11.tgz: Rebuilt.
Compiled against Linux-3.10.11 headers.
Patched to remove pt_chown. Thanks to mancha.
Note that while this patches CVE-2013-2207 (a local privilege escalation
vulnerability), the vulnerability depends upon insecure and non-default
settings ("user_allow_other" in /etc/fuse.conf) and the patch is not
trivial to port to older versions of glibc. For older versions, the
best approach is to not set that option in fuse.conf, as it likely opens
up other holes as well. Another approach to mitigate this is to make
pt_chown a symlink to /bin/true, as the kernel has handled chowning
pseudo terminals for a long time and pt_chown isn't needed at all.
l/glibc-i18n-2.17-arm-11.tgz: Rebuilt.
l/glibc-profile-2.17-arm-11.tgz: Rebuilt.
l/gnome-icon-theme-3.8.3-arm-1.tgz: Upgraded.
l/libwnck-2.30.7-arm-4.tgz: Rebuilt.
l/startup-notification-0.12-arm-3.tgz: Rebuilt.
l/taglib-1.8-arm-2.tgz: Rebuilt.
Compile with -DCMAKE_BUILD_TYPE=Release to silence debug messages meant for
developers. Thanks to Seb.
x/libxcb-1.9.1-arm-1.tgz: Upgraded.
x/xbacklight-1.2.0-arm-2.tgz: Rebuilt.
x/xcb-util-0.3.9-arm-1.tgz: Upgraded.
This update bumps the shared library version, requiring some rebuilds.
x/xcb-util-cursor-0.1.0-arm-1.tgz: Upgraded.
x/xcb-util-image-0.3.9-arm-2.tgz: Rebuilt.
x/xf86-input-acecad-1.5.0-arm-5.tgz: Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-5.tgz: Rebuilt.
x/xf86-input-evdev-2.8.1-arm-2.tgz: Rebuilt.
x/xf86-input-joystick-1.6.1-arm-5.tgz: Rebuilt.
x/xf86-input-keyboard-1.7.0-arm-3.tgz: Rebuilt.
x/xf86-input-mouse-1.9.0-arm-3.tgz: Rebuilt.
x/xf86-input-penmount-1.5.0-arm-5.tgz: Rebuilt.
x/xf86-input-synaptics-1.7.1-arm-2.tgz: Rebuilt.
x/xf86-input-void-1.4.0-arm-5.tgz: Rebuilt.
x/xf86-input-wacom-0.19.0-arm-4.tgz: Rebuilt.
x/xf86-video-apm-1.2.5-arm-4.tgz: Rebuilt.
x/xf86-video-ark-0.7.5-arm-4.tgz: Rebuilt.
x/xf86-video-ast-0.98.0-arm-2.tgz: Rebuilt.
x/xf86-video-ati-7.2.0-arm-2.tgz: Rebuilt.
x/xf86-video-chips-1.2.5-arm-4.tgz: Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-4.tgz: Rebuilt.
x/xf86-video-dummy-0.3.6-arm-4.tgz: Rebuilt.
x/xf86-video-glint-1.2.8-arm-4.tgz: Rebuilt.
x/xf86-video-i128-1.3.6-arm-4.tgz: Rebuilt.
x/xf86-video-i740-1.3.4-arm-4.tgz: Rebuilt.
x/xf86-video-mach64-6.9.4-arm-4.tgz: Rebuilt.
x/xf86-video-mga-1.6.2-arm-4.tgz: Rebuilt.
x/xf86-video-modesetting-0.8.0-arm-2.tgz: Rebuilt.
x/xf86-video-neomagic-1.2.8-arm-2.tgz: Rebuilt.
x/xf86-video-nv-2.1.20-arm-5.tgz: Rebuilt.
x/xf86-video-openchrome-0.3.3-arm-2.tgz: Rebuilt.
x/xf86-video-r128-6.9.1-arm-5.tgz: Rebuilt.
x/xf86-video-rendition-4.2.5-arm-4.tgz: Rebuilt.
x/xf86-video-s3-0.6.5-arm-4.tgz: Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-5.tgz: Rebuilt.
x/xf86-video-savage-2.3.6-arm-5.tgz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-5.tgz: Rebuilt.
x/xf86-video-sis-0.10.7-arm-4.tgz: Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-4.tgz: Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-4.tgz: Rebuilt.
x/xf86-video-tga-1.2.2-arm-4.tgz: Rebuilt.
x/xf86-video-trident-1.3.6-arm-4.tgz: Rebuilt.
x/xf86-video-tseng-1.2.5-arm-4.tgz: Rebuilt.
x/xf86-video-v4l-0.2.0-arm-5.tgz: Rebuilt.
x/xf86-video-vesa-2.3.2-arm-4.tgz: Rebuilt.
x/xf86-video-vmware-13.0.1-arm-3.tgz: Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-5.tgz: Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-5.tgz: Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-4.tgz: Rebuilt.
x/xorg-server-1.14.2-arm-1.tgz: Upgraded.
x/xorg-server-xephyr-1.14.2-arm-1.tgz: Upgraded.
x/xorg-server-xnest-1.14.2-arm-1.tgz: Upgraded.
x/xorg-server-xvfb-1.14.2-arm-1.tgz: Upgraded.
xap/blueman-r708-arm-3.tgz: Rebuilt.
xfce/Thunar-1.6.3-arm-2.tgz: Rebuilt.
xfce/libxfce4ui-4.10.0-arm-2.tgz: Rebuilt.
xfce/libxfcegui4-4.10.0-arm-2.tgz: Rebuilt.
xfce/xfce4-clipman-plugin-1.2.3-arm-2.tgz: Rebuilt.
xfce/xfce4-panel-4.10.1-arm-2.tgz: Rebuilt.
xfce/xfce4-power-manager-1.2.0-arm-2.tgz: Rebuilt.
xfce/xfce4-screenshooter-1.8.1-arm-2.tgz: Rebuilt.
xfce/xfce4-session-4.10.1-arm-2.tgz: Rebuilt.
xfce/xfce4-systemload-plugin-1.1.1-arm-2.tgz: Rebuilt.
xfce/xfce4-taskmanager-1.0.0-arm-2.tgz: Rebuilt.
xfce/xfce4-weather-plugin-0.8.3-arm-2.tgz: Rebuilt.
xfce/xfwm4-4.10.1-arm-2.tgz: Rebuilt.
extra/brltty/brltty-4.5-arm-1.tgz: Upgraded.
extra/emacspeak/emacspeak-38.0-arm-1.tgz: Upgraded.
extra/tightvnc/tightvnc-1.3.10-arm-5.tgz: Rebuilt.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sat Aug 31 15:31:16 UTC 2013
a/kernel-modules-armv7-3.10.10_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.10_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.10_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.10-arm-1.tgz: Upgraded.
Added kernel debugger support:
CONFIG_KGDB=y
CONFIG_KGDB_SERIAL_CONSOLE=y
a/kernel_kirkwood-3.10.10-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.10-arm-1.tgz: Upgraded.
a/kmod-15-arm-1.tgz: Upgraded.
a/lvm2-2.02.100-arm-1.tgz: Upgraded.
a/mtd-utils-260813-arm-1.tgz: Upgraded.
ap/hplip-3.13.8-arm-2.tgz: Rebuilt.
Upstream added nohup to 56-hpmud.rules but didn't background the command,
which caused the startup delay to return. Adding '&' to fix this.
Thanks to burdi01.
ap/man-pages-3.53-noarch-1.tgz: Upgraded.
d/doxygen-1.8.5-arm-1.tgz: Upgraded.
d/gdb-7.6.1-arm-1.tgz: Upgraded.
k/kernel-source-3.10.10-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.4.0-arm-1.tgz: Upgraded.
kde/oxygen-gtk3-1.2.0-arm-1.tgz: Upgraded.
l/boost-1.54.0-arm-3.tgz: Rebuilt.
Applied upstream patch to fix "long long" detection with glibc-2.17
or newer.
n/bluez-4.99-arm-4.tgz: Rebuilt.
Check executable status of rc.bluetooth before allowing a hotplugged
device to load modules and start bluetoothd.
Thanks to Robby Workman.
n/gnupg2-2.0.21-arm-1.tgz: Upgraded.
n/gnutls-3.0.31-arm-1.tgz: Upgraded.
This update prevents a side-channel attack which may allow remote attackers
to conduct distinguishing attacks and plaintext recovery attacks using
statistical analysis of timing data for crafted packets.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
(* Security fix *)
n/lftp-4.4.9-arm-1.tgz: Upgraded.
n/nettle-2.7.1-arm-1.tgz: Upgraded.
n/php-5.4.19-arm-1.tgz: Upgraded.
Fixed handling null bytes in subjectAltName (CVE-2013-4248).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
(* Security fix *)
n/samba-4.0.9-arm-1.tgz: Upgraded.
x/xfs-1.1.3-arm-1.tgz: Upgraded.
xap/xlockmore-5.43-arm-1.tgz: Upgraded.
xap/xscreensaver-5.22-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Aug 25 15:58:25 UTC 2013
a/kernel-modules-armv7-3.10.9_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.9_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.9_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.9-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.9-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.9-arm-1.tgz: Upgraded.
k/kernel-source-3.10.9-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Aug 23 07:41:27 UTC 2013
ap/hplip-3.13.8-arm-1.tgz: Upgraded.
This update fixes a stack-based buffer overflow in the hpmud_get_pml
function that can allow remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted SNMP response
with a large length value.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
(* Security fix *)
kde/calligra-2.7.2-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.2-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.2-noarch-1.tgz: Upgraded.
l/poppler-0.24.0-arm-1.tgz: Upgraded.
Sanitize error messages to remove escape sequences that could be used to
exploit vulnerable terminal emulators.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
(* Security fix *)
l/poppler-data-0.4.6-noarch-1.tgz: Upgraded.
l/zlib-1.2.8-arm-1.tgz: Upgraded.
x/xf86-video-ast-0.98.0-arm-1.tgz: Upgraded.
x/xf86-video-ati-7.2.0-arm-1.tgz: Upgraded.
x/xf86-video-neomagic-1.2.8-arm-1.tgz: Upgraded.
x/xload-1.1.2-arm-1.tgz: Upgraded.
x/xprop-1.2.2-arm-1.tgz: Upgraded.
x/xset-1.2.3-arm-1.tgz: Upgraded.
x/xwd-1.0.6-arm-1.tgz: Upgraded.
xap/xpdf-3.03-arm-2.tgz: Rebuilt.
Sanitize error messages to remove escape sequences that could be used to
exploit vulnerable terminal emulators.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
Thanks to mancha.
(* Security fix *)
xfce/tumbler-0.1.25-arm-3.tgz: Rebuilt.
+--------------------------+
Tue Aug 20 19:55:46 UTC 2013
d/strace-4.8-arm-1.tgz: Upgraded.
l/qt-4.8.5-arm-1.tgz: Upgraded.
xap/MPlayer-1.1_20130819-arm-1.tgz: Upgraded.
+--------------------------+
Sat Aug 17 22:54:12 UTC 2013
a/bash-4.2.045-arm-1.tgz: Upgraded.
a/dialog-1.2_20130523-arm-1.tgz: Upgraded.
a/e2fsprogs-1.42.8-arm-2.tgz: Rebuilt.
Moved /sbin/fsck to /sbin/fsck-e2fsprogs to eliminate package overlap
with util-linux. Thanks to Sl4ck3ver.
a/kernel-modules-armv7-3.10.7_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.7_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.7_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.7-arm-1.tgz: Upgraded.
Added support for:
* OMAP2/3/4/5
* ARM Versatile Express
a/kernel_kirkwood-3.10.7-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.7-arm-1.tgz: Upgraded.
a/sysvinit-2.88dsf-arm-4.tgz: Rebuilt.
Removed /usr/bin/mountpoint, since this utility is part of util-linux.
Thanks to Sl4ck3ver.
ap/mariadb-5.5.32-arm-1.tgz: Upgraded.
k/kernel-source-3.10.7-arm-1.tgz: Upgraded.
kde/amarok-2.8.0-arm-1.tgz: Upgraded.
l/boost-1.54.0-arm-2.tgz: Rebuilt.
Reverted changeset 82498 to fix building the OQGRAPH Engine for MariaDB.
n/dhcpcd-6.0.5-arm-2.tgz: Rebuilt.
Don't run the wpa_supplicant hook, since rc.inet1, NetworkManager, and wicd
will all do that already, and running it with WEP breaks the network.
Properly consider the search list (upstream patch).
Thanks to Robby Workman.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Tue Aug 13 08:04:24 UTC 2013
a/kernel-modules-armv7-3.10.6_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.6_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.6_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.6-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.6-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.6-arm-1.tgz: Upgraded.
k/kernel-source-3.10.6-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Aug 9 19:36:43 UTC 2013
ap/slackpkg-2.82.0-noarch-8.tgz: Rebuilt.
Added USA, Australia, Brazil and Russia mirrors to the default mirrors list.
Thanks to Timo Jacob for providing the new mirror servers.
+--------------------------+
Fri Aug 9 06:27:42 UTC 2013
a/util-linux-2.21.2-arm-4.txz: Rebuilt.
Fixed data type in partx.h to prevent partx from silently truncating
kernel table partition sizes/offsets to 4GB on 32-bit platforms.
Thanks to Sl4ck3ver.
l/glib2-2.36.4-arm-1.txz: Upgraded.
+--------------------------+
Tue Aug 6 21:39:12 UTC 2013
n/bind-9.9.3_P2-arm-1.tgz: Upgraded.
This update fixes a security issue where a specially crafted query can cause
BIND to terminate abnormally, resulting in a denial of service.
For more information, see:
https://kb.isc.org/article/AA-01015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
(* Security fix *)
n/httpd-2.4.6-arm-1.tgz: Upgraded.
This update addresses two security issues:
* SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against
a URI handled by mod_dav_svn with the source href (sent as part of the
request body as XML) pointing to a URI that is not configured for DAV
will trigger a segfault.
* SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that
dirty flag is respected when saving sessions, and ensure the session ID
is changed each time the session changes. This changes the format of the
updatesession SQL statement. Existing configurations must be changed.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
(* Security fix *)
n/samba-4.0.8-arm-1.tgz: Upgraded.
This update fixes missing integer wrap protection in an EA list reading
that can allow authenticated or guest connections to cause the server to
loop, resulting in a denial of service.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
(* Security fix *)
+--------------------------+
Mon Aug 5 21:35:13 UTC 2013
a/aaa_base-14.0-arm-5.tgz: Rebuilt.
Updated /etc/os-release to include the new URL for the Slackware ARM web site.
a/etc-14.1-arm-1.tgz: Upgraded.
Disabled '.' at the end of non-root path, but added new scripts
in /etc/profile.d/ to allow enabling it systemwide if desired.
a/floppy-5.5-arm-3.tgz: Rebuilt.
Upgraded to mtools-4.0.18.
a/glibc-solibs-2.17-arm-10.tgz: Rebuilt.
a/glibc-zoneinfo-2013d-noarch-10.tgz: Rebuilt.
Upgraded to tzcode2013d and tzdata2013d.
a/kernel-modules-armv7-3.10.5_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.10.5_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.10.5_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.5-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.10.5-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.5-arm-1.tgz: Upgraded.
d/kernel-headers-3.10.5-arm-1.tgz: Upgraded.
k/kernel-source-3.10.5-arm-1.tgz: Upgraded.
kde/calligra-2.7.1-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.1-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.1-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-10.tgz: Rebuilt.
Built against Linux 3.10.5 Kernel headers.
l/glibc-i18n-2.17-arm-10.tgz: Rebuilt.
l/glibc-profile-2.17-arm-10.tgz: Rebuilt.
n/dhcpcd-6.0.5-arm-1.tgz: Upgraded.
Thanks to Roy Marples and Robby Workman for the fixes in this new
upstream release.
n/ethtool-3.10-arm-1.tgz: Upgraded.
n/gnupg-1.4.14-arm-1.tgz: Upgraded.
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
secret keys.
For more information, see:
http://eprint.iacr.org/2013/448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
(* Security fix *)
n/iproute2-3.10.0-arm-1.tgz: Upgraded.
n/libgcrypt-1.5.3-arm-1.tgz: Upgraded.
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
secret keys.
For more information, see:
http://eprint.iacr.org/2013/448
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
(* Security fix *)
x/iceauth-1.0.6-arm-1.tgz: Upgraded.
x/libX11-1.6.1-arm-1.tgz: Upgraded.
x/libXfont-1.4.6-arm-1.tgz: Upgraded.
x/libdrm-2.4.46-arm-1.tgz: Upgraded.
x/libpciaccess-0.13.2-arm-1.tgz: Upgraded.
x/mesa-9.1.6-arm-1.tgz: Upgraded.
x/mkfontscale-1.1.1-arm-1.tgz: Upgraded.
x/videoproto-2.3.2-arm-1.tgz: Upgraded.
x/xconsole-1.0.6-arm-1.tgz: Upgraded.
x/xcursor-themes-1.0.4-arm-1.tgz: Upgraded.
x/xf86-input-evdev-2.8.1-arm-1.tgz: Upgraded.
x/xfd-1.1.2-arm-1.tgz: Upgraded.
x/xhost-1.0.6-arm-1.tgz: Upgraded.
x/xrandr-1.4.1-arm-1.tgz: Upgraded.
x/xterm-296-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Jul 31 19:56:31 UTC 2013
Thanks to Robby Workman for updates on libnl*, dhcpcd, and wpa_supplicant.
/INSTALL_TEGRA.TXT: Updated.
In the Kernel and initial RAM disk file names, switch '-tegra' with '-armv7'
to support the new generic ARMv7 kernel.
a/gawk-4.1.0-arm-2.tgz: Rebuilt.
Fixed --libdir. Thanks to Speek.
a/kernel_tegra-3.9.10-arm-1.tgz: Removed.
These packages have been replaced by a generic Kernel that supports a range of
systems that have an ARMv7 or greater CPU. If you're a Tegra20 (principally a
Compulab TrimSlice) user, you'll need to upgrade the packages like this:
# upgradepkg kernel_tegra%kernel_armv7-3.10.4-arm-1.tgz
# upgradepkg kernel-modules_tegra%kernel-modules-armv7-3.10.4_armv7-arm-1.tgz
Also see section 5.0 ('Booting the Slackware ARM OS') of /INSTALL_TEGRA.TXT to
adjust your U-Boot parameters to support the new 'armv7' name.
Look for the U-Boot configuration line below the text:
'Configure the U-Boot loader to load the Kernel and Initial RAM disk:'
Essentially we've just switched the Kernel and initial RAM disk files from
'-tegra' to '-armv7'.
You will need to reboot your device into the U-Boot prompt in order to change
the U-Boot configuration.
a/kernel-modules-armv7-3.10.4_armv7-arm-1.tgz: Added.
a/kernel-modules-kirkwood-3.10.4_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz: Removed.
a/kernel-modules-versatile-3.10.4_versatile-arm-1.tgz: Upgraded.
a/kernel_armv7-3.10.4-arm-1.tgz: Added.
This is a generic ARMv7 kernel to support the multitude of devices out there
which have an ARMv7 or higher CPU. This is the first version of this generic
kernel, so I expect to add new device support over time.
a/kernel_kirkwood-3.10.4-arm-1.tgz: Upgraded.
a/kernel_versatile-3.10.4-arm-1.tgz: Upgraded.
ap/sqlite-3071700-arm-1.tgz: Upgraded.
k/kernel-source-3.10.4-arm-1.tgz: Upgraded.
l/libnl-1.1.4-arm-1.tgz: Upgraded.
l/libnl3-3.2.21-arm-1.tgz: Upgraded.
n/NetworkManager-0.9.8.2-arm-2.tgz: Rebuilt.
Switched back to dhcpcd instead of dhclient as the default DHCP client in
the NetworkManager.conf file. Either one will work, but it's probably
better to use dhcpcd by default to avoid a nasty surprise for people who
didn't install the dhcp package since they aren't running a DHCP server.
n/dhcpcd-6.0.4-arm-1.tgz: Upgraded.
n/nmap-6.40-arm-1.tgz: Upgraded.
Thanks to ponce for the SlackBuild patch.
n/wpa_supplicant-2.0-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
isolinux/uinitrd-tegra.img: Removed.
Replaced with uinitrd-armv7.img.
kernels/tegra: Removed.
Replaced with armv7.
kernels/*: Upgraded.
+--------------------------+
Sat Jul 27 07:50:05 UTC 2013
d/llvm-3.3-arm-2.tgz: Rebuilt.
Recompiled with --enable-experimental-targets=R600.
Thanks to Nick Blizzard.
l/dconf-0.16.1-arm-1.tgz: Upgraded.
l/gnome-themes-standard-3.8.2-arm-1.tgz: Upgraded.
l/gstreamer-0.10.36-arm-3.tgz: Rebuilt.
Recompiled with --enable-glib-asserts=no to reduce debugging output.
Thanks to Willy Sudiarto Raharjo.
l/gtk+2-2.24.20-arm-1.tgz: Upgraded.
This moves immodules.cache (formerly gtk.immodules) under libdir, allowing
us to drop the hostname triplet patch that was needed for multilib.
Thanks to Robby Workman.
l/gtk+3-3.8.2-arm-2.tgz: Rebuilt.
Dropped the host triplet patch since GTK+3 will use a reasonable directory
for immodules.cache by default. Fixed the update script to work properly.
Thanks to Robby Workman.
l/media-player-info-18-arm-1.tgz: Upgraded.
n/ca-certificates-20130610-noarch-2.tgz: Rebuilt.
Fixed packaging bug that resulted in missing cacert.org certs.
Thanks to mancha.
x/mesa-9.1.5-arm-1.tgz: Upgraded.
+--------------------------+
Thu Jul 18 06:40:02 UTC 2013
a/kernel-modules-kirkwood-3.9.10_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.10_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.10-arm-1.tgz: Upgraded.
a/kernel_tegra-3.9.10-arm-1.tgz: Upgraded.
a/kernel_versatile-3.9.10-arm-1.tgz: Upgraded.
a/mtd-utils-170713-arm-1.tgz: Upgraded.
a/u-boot-tools-2013.04-arm-1.tgz: Upgraded.
ap/ddrescue-1.17-arm-1.tgz: Upgraded.
ap/mc-4.8.9-arm-1.tgz: Upgraded.
k/kernel-source-3.9.10-arm-1.tgz: Upgraded.
n/cyrus-sasl-2.1.23-arm-4.tgz: Rebuilt.
Patched for new glibc crypt(). Thanks to mancha.
n/php-5.4.17-arm-1.tgz: Upgraded.
This update fixes an issue where XML in PHP does not properly consider
parsing depth, which allows remote attackers to cause a denial of service
(heap memory corruption) or possibly have unspecified other impact via a
crafted document that is processed by the xml_parse_into_struct function.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113
(* Security fix *)
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Thu Jul 11 18:18:30 UTC 2013
a/acpid-2.0.19-arm-1.tgz: Upgraded.
a/dbus-1.6.12-arm-1.tgz: Upgraded.
This update fixes a security issue where misuse of va_list could be used to
cause a denial of service for system services.
Vulnerability reported by Alexandru Cornea.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
(* Security fix *)
a/kernel-firmware-20130708git-noarch-1.tgz: Upgraded.
a/lvm2-2.02.98-arm-1.tgz: Upgraded.
a/reiserfsprogs-3.6.23-arm-1.tgz: Upgraded.
a/sdparm-1.08-arm-1.tgz: Upgraded.
a/xz-5.0.5-arm-1.tgz: Upgraded.
ap/lsscsi-0.27-arm-1.tgz: Upgraded.
d/cvs-1.11.23-arm-2.tgz: Rebuilt.
Patched for new glibc crypt(). Thanks to mancha.
d/doxygen-1.8.4-arm-1.tgz: Upgraded.
d/git-1.8.3.2-arm-1.tgz: Upgraded.
d/llvm-3.3-arm-1.tgz: Upgraded.
kde/amarok-2.7.1-arm-4.tgz: Rebuilt.
kde/ark-4.10.5-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.5-arm-1.tgz: Upgraded.
kde/bluedevil-1.3.1-arm-5.tgz: Rebuilt.
kde/bomber-4.10.5-arm-1.tgz: Upgraded.
kde/bovo-4.10.5-arm-1.tgz: Upgraded.
kde/calligra-2.6.4-arm-3.tgz: Rebuilt.
kde/dragon-4.10.5-arm-1.tgz: Upgraded.
kde/filelight-4.10.5-arm-1.tgz: Upgraded.
kde/granatier-4.10.5-arm-1.tgz: Upgraded.
kde/gwenview-4.10.5-arm-1.tgz: Upgraded.
kde/juk-4.10.5-arm-1.tgz: Upgraded.
kde/k3b-2.0.2_20120226.git-arm-5.tgz: Rebuilt.
kde/kaccessible-4.10.5-arm-1.tgz: Upgraded.
kde/kactivities-4.10.5-arm-1.tgz: Upgraded.
kde/kamera-4.10.5-arm-1.tgz: Upgraded.
kde/kapman-4.10.5-arm-1.tgz: Upgraded.
kde/kate-4.10.5-arm-1.tgz: Upgraded.
kde/katomic-4.10.5-arm-1.tgz: Upgraded.
kde/kaudiocreator-1.3-arm-5.tgz: Rebuilt.
kde/kblackbox-4.10.5-arm-1.tgz: Upgraded.
kde/kblocks-4.10.5-arm-1.tgz: Upgraded.
kde/kbounce-4.10.5-arm-1.tgz: Upgraded.
kde/kbreakout-4.10.5-arm-1.tgz: Upgraded.
kde/kcalc-4.10.5-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.5-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.5-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.5-arm-1.tgz: Upgraded.
kde/kde-baseapps-4.10.5-arm-1.tgz: Upgraded.
kde/kde-runtime-4.10.5-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.5-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.5-arm-1.tgz: Upgraded.
kde/kdeadmin-4.10.5-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.5-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.5-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.5-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.5-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.5-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.5-arm-1.tgz: Upgraded.
kde/kdepim-4.10.5-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.5-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.5-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.5-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.5-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.5-arm-1.tgz: Upgraded.
kde/kdevelop-4.5.1-arm-3.tgz: Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-5.tgz: Rebuilt.
kde/kdevelop-php-1.5.1-arm-3.tgz: Rebuilt.
kde/kdevelop-php-docs-1.5.1-arm-3.tgz: Rebuilt.
kde/kdevplatform-1.5.1-arm-3.tgz: Rebuilt.
kde/kdewebdev-4.10.5-arm-1.tgz: Upgraded.
kde/kdf-4.10.5-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.5-arm-1.tgz: Upgraded.
kde/kfloppy-4.10.5-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.5-arm-1.tgz: Upgraded.
kde/kgamma-4.10.5-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.5-arm-1.tgz: Upgraded.
kde/kgpg-4.10.5-arm-1.tgz: Upgraded.
kde/kigo-4.10.5-arm-1.tgz: Upgraded.
kde/killbots-4.10.5-arm-1.tgz: Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-5.tgz: Rebuilt.
kde/kiriki-4.10.5-arm-1.tgz: Upgraded.
kde/kjumpingcube-4.10.5-arm-1.tgz: Upgraded.
kde/klickety-4.10.5-arm-1.tgz: Upgraded.
kde/klines-4.10.5-arm-1.tgz: Upgraded.
kde/kmag-4.10.5-arm-1.tgz: Upgraded.
kde/kmahjongg-4.10.5-arm-1.tgz: Upgraded.
kde/kmines-4.10.5-arm-1.tgz: Upgraded.
kde/kmix-4.10.5-arm-1.tgz: Upgraded.
kde/kmousetool-4.10.5-arm-1.tgz: Upgraded.
kde/kmouth-4.10.5-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.5-arm-1.tgz: Upgraded.
kde/knetwalk-4.10.5-arm-1.tgz: Upgraded.
kde/kolf-4.10.5-arm-1.tgz: Upgraded.
kde/kollision-4.10.5-arm-1.tgz: Upgraded.
kde/kolourpaint-4.10.5-arm-1.tgz: Upgraded.
kde/konquest-4.10.5-arm-1.tgz: Upgraded.
kde/konsole-4.10.5-arm-1.tgz: Upgraded.
kde/korundum-4.10.5-arm-1.tgz: Upgraded.
kde/kpat-4.10.5-arm-1.tgz: Upgraded.
kde/kplayer-0.7.2-arm-5.tgz: Rebuilt.
kde/kremotecontrol-4.10.5-arm-1.tgz: Upgraded.
kde/kreversi-4.10.5-arm-1.tgz: Upgraded.
kde/kross-interpreters-4.10.5-arm-1.tgz: Upgraded.
kde/kruler-4.10.5-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.5-arm-1.tgz: Upgraded.
kde/kscreen-1.0-arm-2.tgz: Rebuilt.
kde/kshisen-4.10.5-arm-1.tgz: Upgraded.
kde/ksirk-4.10.5-arm-1.tgz: Upgraded.
kde/ksnakeduel-4.10.5-arm-1.tgz: Upgraded.
kde/ksnapshot-4.10.5-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.5-arm-1.tgz: Upgraded.
kde/ksquares-4.10.5-arm-1.tgz: Upgraded.
kde/ksudoku-4.10.5-arm-1.tgz: Upgraded.
kde/ktimer-4.10.5-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-5.tgz: Rebuilt.
kde/ktuberling-4.10.5-arm-1.tgz: Upgraded.
kde/kubrick-4.10.5-arm-1.tgz: Upgraded.
kde/kwallet-4.10.5-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.3.2-arm-5.tgz: Rebuilt.
kde/libkcddb-4.10.5-arm-1.tgz: Upgraded.
kde/libkcompactdisc-4.10.5-arm-1.tgz: Upgraded.
kde/libkdcraw-4.10.5-arm-1.tgz: Upgraded.
kde/libkdegames-4.10.5-arm-1.tgz: Upgraded.
kde/libkexiv2-4.10.5-arm-1.tgz: Upgraded.
kde/libkipi-4.10.5-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.5-arm-1.tgz: Upgraded.
kde/libksane-4.10.5-arm-1.tgz: Upgraded.
kde/libkscreen-1.0-arm-2.tgz: Rebuilt.
kde/libktorrent-1.3.1-arm-10.tgz: Rebuilt.
kde/lskat-4.10.5-arm-1.tgz: Upgraded.
kde/mplayerthumbs-4.10.5-arm-1.tgz: Upgraded.
kde/nepomuk-core-4.10.5-arm-1.tgz: Upgraded.
kde/nepomuk-widgets-4.10.5-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0.8-arm-5.tgz: Rebuilt.
kde/okular-4.10.5-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.4-arm-3.tgz: Rebuilt.
kde/oxygen-gtk3-1.1.4-arm-3.tgz: Rebuilt.
kde/oxygen-icons-4.10.5-arm-1.tgz: Upgraded.
kde/palapeli-4.10.5-arm-1.tgz: Upgraded.
kde/perlkde-4.10.5-arm-1.tgz: Upgraded.
kde/perlqt-4.10.5-arm-1.tgz: Upgraded.
kde/picmi-4.10.5-arm-1.tgz: Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-5.tgz: Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-5.tgz: Rebuilt.
kde/print-manager-4.10.5-arm-1.tgz: Upgraded.
kde/qtruby-4.10.5-arm-1.tgz: Upgraded.
kde/skanlite-1.0-arm-5.tgz: Rebuilt.
kde/smokegen-4.10.5-arm-1.tgz: Upgraded.
kde/smokekde-4.10.5-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.5-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.5-arm-1.tgz: Upgraded.
kde/svgpart-4.10.5-arm-1.tgz: Upgraded.
kde/sweeper-4.10.5-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-5.tgz: Rebuilt.
kdei/kde-l10n-ar-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bg-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bs-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca@valencia-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-cs-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-da-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-de-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-el-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-en_GB-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-es-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-et-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-eu-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fa-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fi-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fr-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ga-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-gl-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-he-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hi-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hr-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hu-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ia-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-is-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-it-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ja-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-kk-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-km-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ko-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lt-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lv-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-mr-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nb-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nds-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nl-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nn-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pa-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pl-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt_BR-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ro-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ru-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-si-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sk-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sl-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sr-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sv-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tg-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-th-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tr-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ug-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-uk-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-vi-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-wa-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_CN-4.10.5-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_TW-4.10.5-noarch-1.tgz: Upgraded.
l/akonadi-1.9.2-arm-1.tgz: Upgraded.
l/alsa-lib-1.0.27.2-arm-1.tgz: Upgraded.
l/boost-1.54.0-arm-1.tgz: Upgraded.
l/dbus-python-1.2.0-arm-1.tgz: Upgraded.
l/freetype-2.5.0.1-arm-1.tgz: Upgraded.
l/libpcap-1.4.0-arm-1.tgz: Upgraded.
l/sg3_utils-1.36-arm-1.tgz: Upgraded.
n/ModemManager-0.6.2.0-arm-1.tgz: Upgraded.
n/NetworkManager-0.9.8.2-arm-1.tgz: Upgraded.
n/ca-certificates-20130610-noarch-1.tgz: Upgraded.
n/dirmngr-1.1.1-arm-1.tgz: Upgraded.
n/epic5-1.1.3-arm-3.tgz: Rebuilt.
Configured using --with-tcl=/usr/lib${LIBDIRSUFFIX}/tclConfig.sh.
n/gnupg-1.4.13-arm-1.tgz: Upgraded.
n/gnupg2-2.0.20-arm-1.tgz: Upgraded.
n/gpa-0.9.4-arm-1.tgz: Upgraded.
n/gpgme-1.4.1-arm-1.tgz: Upgraded.
n/libassuan-2.1.0-arm-1.tgz: Upgraded.
n/libgcrypt-1.5.2-arm-1.tgz: Upgraded.
n/libgpg-error-1.11-arm-1.tgz: Upgraded.
n/libksba-1.3.0-arm-1.tgz: Upgraded.
n/pinentry-0.8.3-arm-1.tgz: Upgraded.
n/samba-4.0.7-arm-1.tgz: Upgraded.
n/tcpdump-4.4.0-arm-1.tgz: Upgraded.
n/whois-5.0.25-arm-1.tgz: Upgraded.
x/libXi-1.7.2-arm-1.tgz: Upgraded.
x/mesa-9.1.4-arm-1.tgz: Upgraded.
x/xdm-1.1.11-arm-3.tgz: Rebuilt.
Patched for new glibc crypt(). Thanks to mancha.
x/xterm-295-arm-1.tgz: Upgraded.
xap/network-manager-applet-0.9.8.2-arm-1.tgz: Upgraded.
xap/xscreensaver-5.21-arm-2.tgz: Rebuilt.
Recompiled to fix the path to the GPL for various screensavers that use it
as a source of text.
+--------------------------+
Fri Jul 5 07:34:33 UTC 2013
a/kernel-modules-kirkwood-3.9.9_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.9_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.9_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.9-arm-1.tgz: Upgraded.
a/kernel_tegra-3.9.9-arm-1.tgz: Upgraded.
a/kernel_versatile-3.9.9-arm-1.tgz: Upgraded.
k/kernel-source-3.9.9-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Jun 28 06:50:35 UTC 2013
a/aaa_elflibs-14.1-arm-2.tgz: Rebuilt.
a/bash-4.2.037-arm-2.tgz: Rebuilt.
a/cxxlibs-6.0.18-arm-1.tgz: Upgraded.
a/dosfstools-3.0.20-arm-1.tgz: Upgraded.
a/e2fsprogs-1.42.8-arm-1.tgz: Upgraded.
a/ed-1.9-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.9.8_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.8_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.8_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.8-arm-1.tgz: Upgraded.
a/kernel_tegra-3.9.8-arm-1.tgz: Upgraded.
a/kernel_versatile-3.9.8-arm-1.tgz: Upgraded.
a/mdadm-3.2.6-arm-1.tgz: Upgraded.
a/mkinitrd-1.4.8-arm-1.tgz: Upgraded.
New busybox, changes to mdadm handling.
Thanks to Robby Workman.
Bugfix for new file command in mkinitrd_command_generator.sh.
Thanks to Eric Hameleers.
a/procps-3.2.8-arm-4.tgz: Rebuilt.
Include header files. Thanks to mancha.
a/sysklogd-1.5-arm-5.tgz: Rebuilt.
On new installations, restrict the ability to read logs to members of the
root group. Thanks to Kees Theunissen.
ap/alsa-utils-1.0.27.1-arm-1.tgz: Upgraded.
ap/cdrtools-3.01a15-arm-1.tgz: Upgraded.
ap/jed-0.99_19-arm-3.tgz: Rebuilt.
ap/linuxdoc-tools-0.9.68-arm-4.tgz: Rebuilt.
ap/lxc-0.9.0-arm-1.tgz: Upgraded.
ap/mpg123-1.15.4-arm-1.tgz: Upgraded.
ap/pm-utils-1.4.1-arm-4.tgz: Rebuilt.
Merged various patches. Thanks to Robby Workman.
Documentation fixes. Thanks to Fabio Sangiovanni.
Removed hooks that cause repeated commit=0 mount options with ext
filesystems after suspend/resume. Thanks to Marin Glibic.
In the 49bluetooth-generic hook, don't take action unless the kernel supports
rfkill, the rfkill binary is present, and rc.bluetooth is executable.
Thanks to Grifulkin and Darth Vader for the bug report.
d/ruby-1.9.3_p448-arm-1.tgz: Upgraded.
This update patches a vulnerability in Ruby's SSL client that could allow
man-in-the-middle attackers to spoof SSL servers via a valid certificate
issued by a trusted certification authority.
For more information, see:
http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
(* Security fix *)
k/kernel-source-3.9.8-arm-1.tgz: Upgraded.
kde/amarok-2.7.1-arm-3.tgz: Rebuilt.
kde/ark-4.10.4-arm-2.tgz: Rebuilt.
kde/audiocd-kio-4.10.4-arm-2.tgz: Rebuilt.
kde/bluedevil-1.3.1-arm-4.tgz: Rebuilt.
kde/bomber-4.10.4-arm-2.tgz: Rebuilt.
kde/bovo-4.10.4-arm-2.tgz: Rebuilt.
kde/calligra-2.6.4-arm-2.tgz: Rebuilt.
kde/dragon-4.10.4-arm-2.tgz: Rebuilt.
kde/filelight-4.10.4-arm-2.tgz: Rebuilt.
kde/granatier-4.10.4-arm-2.tgz: Rebuilt.
kde/gwenview-4.10.4-arm-2.tgz: Rebuilt.
kde/juk-4.10.4-arm-2.tgz: Rebuilt.
kde/k3b-2.0.2_20120226.git-arm-4.tgz: Rebuilt.
kde/kaccessible-4.10.4-arm-2.tgz: Rebuilt.
kde/kactivities-4.10.4-arm-2.tgz: Rebuilt.
kde/kamera-4.10.4-arm-3.tgz: Rebuilt.
kde/kapman-4.10.4-arm-2.tgz: Rebuilt.
kde/kate-4.10.4-arm-2.tgz: Rebuilt.
kde/katomic-4.10.4-arm-2.tgz: Rebuilt.
kde/kaudiocreator-1.3-arm-4.tgz: Rebuilt.
kde/kblackbox-4.10.4-arm-2.tgz: Rebuilt.
kde/kblocks-4.10.4-arm-2.tgz: Rebuilt.
kde/kbounce-4.10.4-arm-2.tgz: Rebuilt.
kde/kbreakout-4.10.4-arm-2.tgz: Rebuilt.
kde/kcalc-4.10.4-arm-2.tgz: Rebuilt.
kde/kcharselect-4.10.4-arm-2.tgz: Rebuilt.
kde/kcolorchooser-4.10.4-arm-2.tgz: Rebuilt.
kde/kde-base-artwork-4.10.4-arm-2.tgz: Rebuilt.
kde/kde-baseapps-4.10.4-arm-4.tgz: Rebuilt.
kde/kde-runtime-4.10.4-arm-3.tgz: Rebuilt.
kde/kde-wallpapers-4.10.4-noarch-2.tgz: Rebuilt.
kde/kde-workspace-4.10.4-arm-4.tgz: Rebuilt.
kde/kdeadmin-4.10.4-arm-2.tgz: Rebuilt.
kde/kdeartwork-4.10.4-arm-2.tgz: Rebuilt.
kde/kdegraphics-mobipocket-4.10.4-arm-2.tgz: Rebuilt.
kde/kdegraphics-strigi-analyzer-4.10.4-arm-2.tgz: Rebuilt.
kde/kdegraphics-thumbnailers-4.10.4-arm-2.tgz: Rebuilt.
kde/kdelibs-4.10.4-arm-4.tgz: Rebuilt.
kde/kdenetwork-4.10.4-arm-2.tgz: Rebuilt.
kde/kdepim-4.10.4-arm-2.tgz: Rebuilt.
kde/kdepim-runtime-4.10.4-arm-2.tgz: Rebuilt.
kde/kdepimlibs-4.10.4-arm-2.tgz: Rebuilt.
kde/kdeplasma-addons-4.10.4-arm-2.tgz: Rebuilt.
kde/kdesdk-4.10.4-arm-2.tgz: Rebuilt.
kde/kdetoys-4.10.4-arm-2.tgz: Rebuilt.
kde/kdevelop-4.5.1-arm-2.tgz: Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-4.tgz: Rebuilt.
kde/kdevelop-php-1.5.1-arm-2.tgz: Rebuilt.
kde/kdevelop-php-docs-1.5.1-arm-2.tgz: Rebuilt.
kde/kdevplatform-1.5.1-arm-2.tgz: Rebuilt.
kde/kdewebdev-4.10.4-arm-2.tgz: Rebuilt.
kde/kdf-4.10.4-arm-2.tgz: Rebuilt.
kde/kdiamond-4.10.4-arm-2.tgz: Rebuilt.
kde/kfloppy-4.10.4-arm-2.tgz: Rebuilt.
kde/kfourinline-4.10.4-arm-2.tgz: Rebuilt.
kde/kgamma-4.10.4-arm-2.tgz: Rebuilt.
kde/kgoldrunner-4.10.4-arm-2.tgz: Rebuilt.
kde/kgpg-4.10.4-arm-2.tgz: Rebuilt.
kde/kigo-4.10.4-arm-2.tgz: Rebuilt.
kde/killbots-4.10.4-arm-2.tgz: Rebuilt.
kde/kio-mtp-fae62fc_20121225git-arm-4.tgz: Rebuilt.
kde/kiriki-4.10.4-arm-2.tgz: Rebuilt.
kde/kjumpingcube-4.10.4-arm-2.tgz: Rebuilt.
kde/klickety-4.10.4-arm-2.tgz: Rebuilt.
kde/klines-4.10.4-arm-2.tgz: Rebuilt.
kde/kmag-4.10.4-arm-2.tgz: Rebuilt.
kde/kmahjongg-4.10.4-arm-2.tgz: Rebuilt.
kde/kmines-4.10.4-arm-2.tgz: Rebuilt.
kde/kmix-4.10.4-arm-2.tgz: Rebuilt.
kde/kmousetool-4.10.4-arm-2.tgz: Rebuilt.
kde/kmouth-4.10.4-arm-2.tgz: Rebuilt.
kde/knavalbattle-4.10.4-arm-2.tgz: Rebuilt.
kde/knetwalk-4.10.4-arm-2.tgz: Rebuilt.
kde/kolf-4.10.4-arm-2.tgz: Rebuilt.
kde/kollision-4.10.4-arm-2.tgz: Rebuilt.
kde/kolourpaint-4.10.4-arm-2.tgz: Rebuilt.
kde/konquest-4.10.4-arm-2.tgz: Rebuilt.
kde/konsole-4.10.4-arm-2.tgz: Rebuilt.
kde/korundum-4.10.4-arm-2.tgz: Rebuilt.
kde/kpat-4.10.4-arm-2.tgz: Rebuilt.
kde/kplayer-0.7.2-arm-4.tgz: Rebuilt.
kde/kremotecontrol-4.10.4-arm-2.tgz: Rebuilt.
kde/kreversi-4.10.4-arm-2.tgz: Rebuilt.
kde/kross-interpreters-4.10.4-arm-2.tgz: Rebuilt.
kde/kruler-4.10.4-arm-2.tgz: Rebuilt.
kde/ksaneplugin-4.10.4-arm-2.tgz: Rebuilt.
kde/kscreen-1.0-arm-1.tgz: Upgraded.
kde/kshisen-4.10.4-arm-2.tgz: Rebuilt.
kde/ksirk-4.10.4-arm-2.tgz: Rebuilt.
kde/ksnakeduel-4.10.4-arm-2.tgz: Rebuilt.
kde/ksnapshot-4.10.4-arm-2.tgz: Rebuilt.
kde/kspaceduel-4.10.4-arm-2.tgz: Rebuilt.
kde/ksquares-4.10.4-arm-2.tgz: Rebuilt.
kde/ksudoku-4.10.4-arm-2.tgz: Rebuilt.
kde/ktimer-4.10.4-arm-2.tgz: Rebuilt.
kde/ktorrent-4.3.1-arm-4.tgz: Rebuilt.
kde/ktuberling-4.10.4-arm-2.tgz: Rebuilt.
kde/kubrick-4.10.4-arm-2.tgz: Rebuilt.
kde/kwallet-4.10.4-arm-2.tgz: Rebuilt.
kde/kwebkitpart-1.3.2-arm-4.tgz: Rebuilt.
kde/libkcddb-4.10.4-arm-2.tgz: Rebuilt.
kde/libkcompactdisc-4.10.4-arm-2.tgz: Rebuilt.
kde/libkdcraw-4.10.4-arm-2.tgz: Rebuilt.
kde/libkdegames-4.10.4-arm-2.tgz: Rebuilt.
kde/libkexiv2-4.10.4-arm-2.tgz: Rebuilt.
kde/libkipi-4.10.4-arm-2.tgz: Rebuilt.
kde/libkmahjongg-4.10.4-arm-2.tgz: Rebuilt.
kde/libksane-4.10.4-arm-2.tgz: Rebuilt.
kde/libkscreen-1.0-arm-1.tgz: Upgraded.
kde/libktorrent-1.3.1-arm-8.tgz: Rebuilt.
kde/lskat-4.10.4-arm-2.tgz: Rebuilt.
kde/mplayerthumbs-4.10.4-arm-2.tgz: Rebuilt.
kde/nepomuk-core-4.10.4-arm-4.tgz: Rebuilt.
kde/nepomuk-widgets-4.10.4-arm-2.tgz: Rebuilt.
kde/networkmanagement-0.9.0.8-arm-4.tgz: Rebuilt.
kde/okular-4.10.4-arm-2.tgz: Rebuilt.
kde/oxygen-gtk2-1.3.4-arm-2.tgz: Rebuilt.
kde/oxygen-gtk3-1.1.4-arm-2.tgz: Rebuilt.
kde/oxygen-icons-4.10.4-arm-2.tgz: Rebuilt.
kde/palapeli-4.10.4-arm-2.tgz: Rebuilt.
kde/perlkde-4.10.4-arm-2.tgz: Rebuilt.
kde/perlqt-4.10.4-arm-2.tgz: Rebuilt.
kde/picmi-4.10.4-arm-2.tgz: Rebuilt.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-4.tgz: Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-4.tgz: Rebuilt.
kde/print-manager-4.10.4-arm-2.tgz: Rebuilt.
kde/qtruby-4.10.4-arm-2.tgz: Rebuilt.
kde/skanlite-1.0-arm-4.tgz: Rebuilt.
kde/smokegen-4.10.4-arm-2.tgz: Rebuilt.
kde/smokekde-4.10.4-arm-2.tgz: Rebuilt.
kde/smokeqt-4.10.4-arm-2.tgz: Rebuilt.
kde/superkaramba-4.10.4-arm-2.tgz: Rebuilt.
kde/svgpart-4.10.4-arm-2.tgz: Rebuilt.
kde/sweeper-4.10.4-arm-2.tgz: Rebuilt.
kde/wicd-kde-0.3.0_bcf27d8-arm-4.tgz: Rebuilt.
l/aalib-1.4rc5-arm-4.tgz: Rebuilt.
Patched aalib.m4 to fix linking problems. Thanks to gmgf.
l/alsa-lib-1.0.27.1-arm-1.tgz: Upgraded.
l/gdk-pixbuf2-2.28.2-arm-1.tgz: Upgraded.
l/glib2-2.36.3-arm-1.tgz: Upgraded.
l/gnome-icon-theme-3.8.2-arm-2.tgz: Rebuilt.
Upgraded to gnome-icon-theme-symbolic-3.8.3.
l/gst-plugins-good-0.10.31-arm-3.tgz: Rebuilt.
l/gtk+2-2.24.19-arm-1.tgz: Upgraded.
l/gvfs-1.16.3-arm-1.tgz: Upgraded.
l/pcre-8.33-arm-1.tgz: Upgraded.
Add --enable-pcre16 and --enable-pcre32 options, needed to build Qt5 with
the system PCRE library. Thanks to Larry Hajali.
l/qtscriptgenerator-0.2.0-arm-2.tgz: Rebuilt.
Packaged libqtscript_uitools. Thanks to Luigi Trovato.
l/v4l-utils-0.9.5-arm-1.tgz: Upgraded.
n/curl-7.31.0-arm-1.tgz: Upgraded.
This fixes a minor security issue where a decode buffer boundary flaw in
libcurl could lead to heap corruption.
For more information, see:
http://curl.haxx.se/docs/adv_20130622.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
(* Security fix *)
n/links-2.7-arm-2.tgz: Rebuilt.
n/openssh-6.2p2-arm-1.tgz: Upgraded.
x/libFS-1.0.5-arm-1.tgz: Upgraded.
x/libX11-1.6.0-arm-1.tgz: Upgraded.
x/libXau-1.0.8-arm-1.tgz: Upgraded.
x/libXcursor-1.1.14-arm-1.tgz: Upgraded.
x/libXext-1.3.2-arm-1.tgz: Upgraded.
x/libXfixes-5.0.1-arm-1.tgz: Upgraded.
x/libXinerama-1.1.3-arm-1.tgz: Upgraded.
x/libXp-1.0.2-arm-1.tgz: Upgraded.
x/libXrandr-1.4.1-arm-1.tgz: Upgraded.
x/libXrender-0.9.8-arm-1.tgz: Upgraded.
x/libXres-1.0.7-arm-1.tgz: Upgraded.
x/libXt-1.1.4-arm-1.tgz: Upgraded.
x/libXtst-1.2.2-arm-1.tgz: Upgraded.
x/libXv-1.0.8-arm-1.tgz: Upgraded.
x/libXvMC-1.0.8-arm-1.tgz: Upgraded.
x/libXxf86dga-1.1.4-arm-1.tgz: Upgraded.
x/libXxf86vm-1.1.3-arm-1.tgz: Upgraded.
x/libdmx-1.1.3-arm-1.tgz: Upgraded.
x/mesa-9.1.3-arm-1.tgz: Upgraded.
x/xdpyinfo-1.3.1-arm-1.tgz: Upgraded.
x/xf86-video-modesetting-0.8.0-arm-1.tgz: Upgraded.
x/xf86-video-nouveau-1.0.8-arm-1.tgz: Upgraded.
x/xf86-video-openchrome-0.3.3-arm-1.tgz: Upgraded.
x/xterm-293-arm-1.tgz: Upgraded.
xap/gimp-2.8.6-arm-1.tgz: Upgraded.
xap/xine-ui-0.99.6-arm-2.tgz: Rebuilt.
isolinux/*: Rebuilt
kernels/*: Upgraded.
+--------------------------+
Sun Jun 16 10:06:50 UTC 2013
Finally I've been able to get gcc-4.8.1 to compile a _bootable_ and stable Linux
Kernel version 3.9.6, so we now have gcc-4.8.1 in the D series!
(I've stowed gcc-4.7.2 away in '/pasture' just incase!)
In the kernel packages I have added module "crc32c" into the initrd to support
the "xfs" file system driver. This should have automatically been added to the
initrd but due to a lack of an implicitly stated dependency, it is not. For
more details, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608538
If anybody sees any other modules failing to load due to missing symbols
(everything looks fine in this Kernel version, but some may slip through in
future versions), please let me know.
The mini root filesystem for -current has also been updated:
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
- Stuart.
/INSTALL_RASPBERRYPI.TXT: Updated.
The Raspberry Pi support information has been moved to the ARM section of
the Slackware Documentation Project, so that it can be maintained by the
community:
http://docs.slackware.com/howtos:hardware:arm:raspberrypi
a/glibc-solibs-2.17-arm-9.tgz: Rebuilt.
a/glibc-zoneinfo-2013c-noarch-9.tgz: Rebuilt.
a/kernel-modules-kirkwood-3.9.6_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.6_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.6_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.6-arm-1.tgz: Upgraded.
a/kernel_tegra-3.9.6-arm-1.tgz: Upgraded.
a/kernel_versatile-3.9.6-arm-1.tgz: Upgraded.
a/sysvinit-scripts-2.0-noarch-13.tgz: Rebuilt.
Fixed detection of the ARM Versatile and Raspberry Pi devices when being
installed from the Slackware Installer.
d/gcc-4.8.1-arm-1.tgz: Upgraded.
d/gcc-g++-4.8.1-arm-1.tgz: Upgraded.
d/gcc-gfortran-4.8.1-arm-1.tgz: Upgraded.
d/gcc-gnat-4.8.1-arm-1.tgz: Upgraded.
d/gcc-go-4.8.1-arm-1.tgz: Upgraded.
d/gcc-java-4.8.1-arm-1.tgz: Upgraded.
d/gcc-objc-4.8.1-arm-1.tgz: Upgraded.
d/kernel-headers-3.9.6-arm-1.tgz: Upgraded.
k/kernel-source-3.9.6-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.6.4-noarch-1.tgz: Added.
kdei/calligra-l10n-da-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-en_GB-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.6.4-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.6.4-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-9.tgz: Rebuilt.
Built against Linux 3.9.6 Kernel headers and compiled with gcc-4.8.1.
l/glibc-i18n-2.17-arm-9.tgz: Rebuilt.
l/glibc-profile-2.17-arm-9.tgz: Rebuilt.
isolinux/*: Rebuilt.
When installing on a Raspberry Pi, suggest to the user that they disable fsck
checks; since without an RTC, a time-based fsck will run whenever the OS is
booted. This is the same check you may have seen when installing on the
QEMU/ARM Versatile platform.
Thanks to stanley garvey for the suggestion.
kernels/*: Upgraded.
pasture/gcc-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-g++-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-gfortran-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-gnat-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-go-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-java-4.7.2-arm-4.tgz: Moved here from the D series.
pasture/gcc-objc-4.7.2-arm-4.tgz: Moved here from the D series.
+--------------------------+
Wed Jun 12 18:34:41 UTC 2013
a/gzip-1.6-arm-1.tgz: Upgraded.
a/kernel-firmware-20130610git-noarch-1.tgz: Upgraded.
a/ntfs-3g-2013.1.13-arm-1.tgz: Upgraded.
Removed the HAL 10-ntfs-3g-policy.fdi file.
a/sysvinit-scripts-2.0-noarch-12.tgz: Rebuilt.
Open a login process on /dev/ttyAMA0 when this package is installed upon
the Raspberry Pi.
Thanks to stanley garvey.
ap/gphoto2-2.5.2-arm-1.tgz: Upgraded.
ap/hplip-3.13.5-arm-3.tgz: Rebuilt.
Recompiled against libgphoto2-2.5.2.
ap/ksh93-2012_08_01-arm-1.tgz: Upgraded.
kde/kamera-4.10.4-arm-2.tgz: Rebuilt.
Recompiled against libgphoto2-2.5.2.
kde/kde-runtime-4.10.4-arm-2.tgz: Rebuilt.
Use -DSAMBA_INCLUDE_DIR=/usr/include/samba-4.0 with cmake to fix
building kio_smb.so. Thanks to alienBOB.
l/gvfs-1.16.2-arm-2.tgz: Rebuilt.
Recompiled against libgphoto2-2.5.2.
l/libgphoto2-2.5.2-arm-1.tgz: Upgraded.
l/libxml2-2.9.1-arm-1.tgz: Upgraded.
l/libxslt-1.1.28-arm-1.tgz: Upgraded.
l/pil-1.1.7-arm-4.tgz: Rebuilt.
Recompiled against libgphoto2-2.5.2.
n/php-5.4.16-arm-1.tgz: Upgraded.
This is a bugfix release. It also fixes a security issue -- a heap-based
overflow in the quoted_printable_encode() function, which could be used by
a remote attacker to crash PHP or execute code as the 'apache' user.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
(* Security fix *)
x/mesa-9.1.2-arm-2.tgz: Rebuilt.
Recompiled adding the configuration option '--enable-xa'.
x/xdg-utils-1.1.0_rc1-arm-3.tgz: Rebuilt.
Support the MATE DE. Thanks to T3slider.
xap/sane-1.0.23-arm-2.tgz: Rebuilt.
Recompiled against libgphoto2-2.5.2.
Removed the HAL 10-libsane.fdi file.
Modified the udev rules so they'll be processed on change actions as well
as add actions, which might fix the device permissions errors some people
have reported. Thanks to Phil Bevan.
+--------------------------+
Sun Jun 9 07:18:28 UTC 2013
a/kernel-modules-kirkwood-3.9.5_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.5_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.5_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.5-arm-1.tgz: Upgraded.
Compiled I2C into the kernel to keep aligned with the Tegra kernel.
a/kernel_tegra-3.9.5-arm-1.tgz: Upgraded.
Compiled 'rtc-em3027' into the kernel to support the RTC on the Trimslice.
We previously had this loaded as a module from the installer and the initrd
but it seemed to have trouble reading and setting the clock, so I've compiled
it in to see if it helps (I'm not sure why it should help, but back in
1996 this sort of approach was the cure ;-) )
Compiled I2C into the kernel (rather than as a module) to satisfy dependencies.
a/kernel_versatile-3.9.5-arm-1.tgz: Upgraded.
ap/hplip-3.13.5-arm-2.tgz: Rebuilt.
Background the udev hp-config_usb_printer process to avoid long delays.
Thanks to timkb4cq.
ap/linuxdoc-tools-0.9.68-arm-3.tgz: Rebuilt.
Recompiled against perl-5.18.0.
ap/vim-7.3.1087-arm-1.tgz: Upgraded.
Vim patch 7.0.88 rewrote the regexp engine. Unfortunately the new
implementation was causing long delays of 10 seconds or more when opening or
scrolling any file of a type for which vim does color syntax highlighting.
Patch 7.3.1110 attempted to fix this, and more patches released today
correct other bugs in this new regexp engine (including patch 7.3.1111 which
doesn't even fully apply correctly). Even with all the fixes applied, the
new engine is grossly inefficient when compared with the old one, and it is
obvious that vim is running much more slowly even on my fastest machine.
It seems like the best course of action is to take all the patches before
the one that changed the regexp engine and then give upstream some time to
figure this all out. Thanks to Benjamin Trigona-Harany for the bug report.
d/git-1.8.3-arm-1.tgz: Upgraded.
d/perl-5.18.0-arm-1.tgz: Upgraded.
d/subversion-1.7.10-arm-1.tgz: Upgraded.
d/swig-2.0.10-arm-1.tgz: Upgraded.
k/kernel-source-3.9.5-arm-1.tgz: Upgraded.
kde/amarok-2.7.1-arm-2.tgz: Rebuilt.
kde/ark-4.10.4-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.4-arm-1.tgz: Upgraded.
kde/bluedevil-1.3.1-arm-3.tgz: Rebuilt.
kde/bomber-4.10.4-arm-1.tgz: Upgraded.
kde/bovo-4.10.4-arm-1.tgz: Upgraded.
kde/calligra-2.6.4-arm-1.tgz: Upgraded.
kde/dragon-4.10.4-arm-1.tgz: Upgraded.
kde/filelight-4.10.4-arm-1.tgz: Upgraded.
kde/granatier-4.10.4-arm-1.tgz: Upgraded.
kde/gwenview-4.10.4-arm-1.tgz: Upgraded.
kde/juk-4.10.4-arm-1.tgz: Upgraded.
kde/k3b-2.0.2_20120226.git-arm-3.tgz: Rebuilt.
kde/kaccessible-4.10.4-arm-1.tgz: Upgraded.
kde/kactivities-4.10.4-arm-1.tgz: Upgraded.
kde/kamera-4.10.4-arm-1.tgz: Upgraded.
kde/kapman-4.10.4-arm-1.tgz: Upgraded.
kde/kate-4.10.4-arm-1.tgz: Upgraded.
kde/katomic-4.10.4-arm-1.tgz: Upgraded.
kde/kaudiocreator-1.3-arm-3.tgz: Rebuilt.
kde/kblackbox-4.10.4-arm-1.tgz: Upgraded.
kde/kblocks-4.10.4-arm-1.tgz: Upgraded.
kde/kbounce-4.10.4-arm-1.tgz: Upgraded.
kde/kbreakout-4.10.4-arm-1.tgz: Upgraded.
kde/kcalc-4.10.4-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.4-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.4-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.4-arm-1.tgz: Upgraded.
kde/kde-baseapps-4.10.4-arm-1.tgz: Upgraded.
kde/kde-runtime-4.10.4-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.4-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.4-arm-1.tgz: Upgraded.
kde/kdeadmin-4.10.4-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.4-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.4-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.4-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.4-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.4-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.4-arm-1.tgz: Upgraded.
kde/kdepim-4.10.4-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.4-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.4-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.4-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.4-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.4-arm-1.tgz: Upgraded.
kde/kdevelop-4.5.1-arm-1.tgz: Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-3.tgz: Rebuilt.
kde/kdevelop-php-1.5.1-arm-1.tgz: Upgraded.
kde/kdevelop-php-docs-1.5.1-arm-1.tgz: Upgraded.
kde/kdevplatform-1.5.1-arm-1.tgz: Upgraded.
kde/kdewebdev-4.10.4-arm-1.tgz: Upgraded.
kde/kdf-4.10.4-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.4-arm-1.tgz: Upgraded.
kde/kfloppy-4.10.4-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.4-arm-1.tgz: Upgraded.
kde/kgamma-4.10.4-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.4-arm-1.tgz: Upgraded.
kde/kgpg-4.10.4-arm-1.tgz: Upgraded.
kde/kigo-4.10.4-arm-1.tgz: Upgraded.
kde/killbots-4.10.4-arm-1.tgz: Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-3.tgz: Rebuilt.
kde/kiriki-4.10.4-arm-1.tgz: Upgraded.
kde/kjumpingcube-4.10.4-arm-1.tgz: Upgraded.
kde/klickety-4.10.4-arm-1.tgz: Upgraded.
kde/klines-4.10.4-arm-1.tgz: Upgraded.
kde/kmag-4.10.4-arm-1.tgz: Upgraded.
kde/kmahjongg-4.10.4-arm-1.tgz: Upgraded.
kde/kmines-4.10.4-arm-1.tgz: Upgraded.
kde/kmix-4.10.4-arm-1.tgz: Upgraded.
kde/kmousetool-4.10.4-arm-1.tgz: Upgraded.
kde/kmouth-4.10.4-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.4-arm-1.tgz: Upgraded.
kde/knetwalk-4.10.4-arm-1.tgz: Upgraded.
kde/kolf-4.10.4-arm-1.tgz: Upgraded.
kde/kollision-4.10.4-arm-1.tgz: Upgraded.
kde/kolourpaint-4.10.4-arm-1.tgz: Upgraded.
kde/konquest-4.10.4-arm-1.tgz: Upgraded.
kde/konsole-4.10.4-arm-1.tgz: Upgraded.
kde/korundum-4.10.4-arm-1.tgz: Upgraded.
kde/kpat-4.10.4-arm-1.tgz: Upgraded.
kde/kplayer-0.7.2-arm-3.tgz: Rebuilt.
kde/kremotecontrol-4.10.4-arm-1.tgz: Upgraded.
kde/kreversi-4.10.4-arm-1.tgz: Upgraded.
kde/kross-interpreters-4.10.4-arm-1.tgz: Upgraded.
kde/kruler-4.10.4-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.4-arm-1.tgz: Upgraded.
kde/kscreen-0.0.71-arm-3.tgz: Rebuilt.
kde/kshisen-4.10.4-arm-1.tgz: Upgraded.
kde/ksirk-4.10.4-arm-1.tgz: Upgraded.
kde/ksnakeduel-4.10.4-arm-1.tgz: Upgraded.
kde/ksnapshot-4.10.4-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.4-arm-1.tgz: Upgraded.
kde/ksquares-4.10.4-arm-1.tgz: Upgraded.
kde/ksudoku-4.10.4-arm-1.tgz: Upgraded.
kde/ktimer-4.10.4-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-3.tgz: Rebuilt.
kde/ktuberling-4.10.4-arm-1.tgz: Upgraded.
kde/kubrick-4.10.4-arm-1.tgz: Upgraded.
kde/kwallet-4.10.4-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.3.2-arm-3.tgz: Rebuilt.
kde/libkcddb-4.10.4-arm-1.tgz: Upgraded.
kde/libkcompactdisc-4.10.4-arm-1.tgz: Upgraded.
kde/libkdcraw-4.10.4-arm-1.tgz: Upgraded.
kde/libkdegames-4.10.4-arm-1.tgz: Upgraded.
kde/libkexiv2-4.10.4-arm-1.tgz: Upgraded.
kde/libkipi-4.10.4-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.4-arm-1.tgz: Upgraded.
kde/libksane-4.10.4-arm-1.tgz: Upgraded.
kde/libkscreen-0.0.71-arm-3.tgz: Rebuilt.
kde/libktorrent-1.3.1-arm-6.tgz: Rebuilt.
kde/lskat-4.10.4-arm-1.tgz: Upgraded.
kde/mplayerthumbs-4.10.4-arm-1.tgz: Upgraded.
kde/nepomuk-core-4.10.4-arm-1.tgz: Upgraded.
kde/nepomuk-widgets-4.10.4-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0.8-arm-3.tgz: Rebuilt.
kde/okular-4.10.4-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.4-arm-1.tgz: Upgraded.
kde/oxygen-gtk3-1.1.4-arm-1.tgz: Upgraded.
kde/oxygen-icons-4.10.4-arm-1.tgz: Upgraded.
kde/palapeli-4.10.4-arm-1.tgz: Upgraded.
kde/perlkde-4.10.4-arm-1.tgz: Upgraded.
kde/perlqt-4.10.4-arm-1.tgz: Upgraded.
kde/picmi-4.10.4-arm-1.tgz: Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-3.tgz: Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-3.tgz: Rebuilt.
kde/print-manager-4.10.4-arm-1.tgz: Upgraded.
kde/qtruby-4.10.4-arm-1.tgz: Upgraded.
kde/skanlite-1.0-arm-3.tgz: Rebuilt.
kde/smokegen-4.10.4-arm-1.tgz: Upgraded.
kde/smokekde-4.10.4-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.4-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.4-arm-1.tgz: Upgraded.
kde/svgpart-4.10.4-arm-1.tgz: Upgraded.
kde/sweeper-4.10.4-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-3.tgz: Rebuilt.
kdei/kde-l10n-ar-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bg-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bs-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca@valencia-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-cs-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-da-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-de-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-el-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-en_GB-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-es-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-et-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-eu-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fa-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fi-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fr-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ga-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-gl-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-he-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hi-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hr-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hu-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ia-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-is-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-it-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ja-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-kk-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-km-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ko-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lt-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lv-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-mr-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nb-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nds-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nl-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nn-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pa-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pl-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt_BR-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ro-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ru-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-si-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sk-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sl-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sr-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sv-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tg-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-th-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tr-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ug-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-uk-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-vi-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-wa-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_CN-4.10.4-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_TW-4.10.4-noarch-1.tgz: Upgraded.
l/icu4c-51.2-arm-1.tgz: Upgraded.
l/libffi-3.0.13-arm-2.tgz: Rebuilt.
Patched to move the ffi include files back to /usr/include, and patched
the pkgconfig file to point there as well. The relocation of the include
files to be outside of /usr/include worked for programs that used
pkgconfig, but there are many programs that do not and this change broke
compiling them. Thanks to gmgf.
l/libical-1.0-arm-1.tgz: Upgraded.
l/libproxy-0.4.11-arm-2.tgz: Rebuilt.
l/pilot-link-0.12.5-arm-8.tgz: Rebuilt.
Recompiled against perl-5.18.0.
n/irssi-0.8.15-arm-7.tgz: Rebuilt.
Recompiled against perl-5.18.0.
n/net-snmp-5.7.2-arm-2.tgz: Rebuilt.
Recompiled against perl-5.18.0.
n/obexftp-0.23-arm-9.tgz: Rebuilt.
Recompiled against perl-5.18.0.
n/samba-4.0.6-arm-2.tgz: Rebuilt.
Recompiled against perl-5.18.0.
xap/imagemagick-6.8.5_9-arm-1.tgz: Upgraded.
xap/pidgin-2.10.7-arm-3.tgz: Rebuilt.
Recompiled against perl-5.18.0.
xap/vim-gvim-7.3.1087-arm-1.tgz: Upgraded.
xap/xchat-2.8.8-arm-8.tgz: Rebuilt.
Recompiled against perl-5.18.0.
xfce/orage-4.8.4-arm-2.tgz: Rebuilt.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Tue Jun 4 19:40:11 UTC 2013
ap/vim-7.3.1109-arm-1.tgz: Upgraded.
d/open-cobol-1.1-arm-2.tgz: Rebuilt.
Fixed slack-desc typo.
xap/vim-gvim-7.3.1109-arm-1.tgz: Upgraded.
+--------------------------+
Sun Jun 2 08:34:06 UTC 2013
a/glibc-solibs-2.17-arm-8.tgz: Rebuilt.
Build against Linux 3.9.4 kernel headers.
a/glibc-zoneinfo-2013c-noarch-8.tgz: Rebuilt.
a/kernel-modules-kirkwood-3.9.4_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.9.4_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.9.4_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.9.4-arm-1.tgz: Upgraded.
a/kernel_tegra-3.9.4-arm-1.tgz: Upgraded.
For some reason, upon reboot, this kernel will not cause the system to
actually reboot the device. You'll need to manually hold down the power
button for a few seconds and cold start it. I've checked the kernel options
and cannot see anything odd. I suspect it's a kernel bug.
a/kernel_versatile-3.9.4-arm-1.tgz: Upgraded.
ap/mariadb-5.5.31-arm-1.tgz: Upgraded.
ap/mc-4.8.8-arm-1.tgz: Upgraded.
ap/vim-7.3.645-arm-1.tgz: Upgraded.
d/kernel-headers-3.9.4-arm-1.tgz: Upgraded.
d/python-2.7.5-arm-1.tgz: Upgraded.
k/kernel-source-3.9.4-arm-1.tgz: Upgraded.
l/glibc-2.17-arm-8.tgz: Rebuilt.
Build against Linux 3.9.4 kernel headers.
l/glibc-i18n-2.17-arm-8.tgz: Rebuilt.
l/glibc-profile-2.17-arm-8.tgz: Rebuilt.
n/samba-4.0.6-arm-1.tgz: Upgraded.
xap/vim-gvim-7.3.645-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Tue May 28 19:24:39 UTC 2013
a/aaa_elflibs-14.1-arm-1.tgz: Upgraded.
a/file-5.14-arm-1.tgz: Upgraded.
Use magic.mgc instead of the flat magic files.
a/gawk-4.1.0-arm-1.tgz: Upgraded.
a/sysvinit-scripts-2.0-noarch-11.tgz: Rebuilt.
Update glib schemas in rc.M.
a/tcsh-6.18.01-arm-2.tgz: Rebuilt.
Patched for new glibc crypt(). Thanks to mancha.
ap/ghostscript-9.07-arm-2.tgz: Rebuilt.
Applied upstream patch to add Trio library and use the included sprintf()
function. This fixes a rendering failure with locales that use commas
for decimal. Thanks to Heinz Wiesinger for the heads-up on this.
ap/hplip-3.13.5-arm-1.tgz: Upgraded.
ap/itstool-1.2.0-arm-1.tgz: Added.
New dependency for gucharmap.
ap/slackpkg-2.82.0-noarch-7.tgz: Rebuilt.
Set DOWNLOAD_ALL=on in slackpkg.conf by default to avoid script failures
caused by programs (wget is an example) that may require library updates.
Without this option, a program might be needed again before the supporting
libraries have been upgraded.
d/gdb-7.6-arm-1.tgz: Upgraded.
d/open-cobol-1.1-arm-1.tgz: Added.
We're finally a mature operating system. Enjoy. :)
d/slacktrack-2.15-arm-1.tgz: Upgraded.
d/swig-2.0.9-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.3-arm-2.tgz: Rebuilt.
Recompiled against pcre-8.32.
kde/kajongg-4.10.3-arm-1.tgz: Removed.
This requires some libraries that we don't ship, and that aren't worth
adding just for a single game.
l/at-spi2-atk-2.8.1-arm-1.tgz: Upgraded.
l/at-spi2-core-2.8.0-arm-1.tgz: Upgraded.
l/atk-2.8.0-arm-1.tgz: Upgraded.
l/dconf-0.16.0-arm-1.tgz: Upgraded.
l/gcr-3.8.2-arm-1.tgz: Upgraded.
l/gdk-pixbuf2-2.28.1-arm-1.tgz: Upgraded.
l/glib-networking-2.36.2-arm-1.tgz: Upgraded.
l/glib2-2.36.2-arm-1.tgz: Upgraded.
l/gmp-5.1.2-arm-1.tgz: Upgraded.
l/gnome-icon-theme-3.8.2-noarch-1.tgz: Upgraded.
l/gnome-keyring-3.8.2-arm-1.tgz: Upgraded.
l/gnome-themes-standard-3.8.1-arm-1.tgz: Added.
New dependency for gtk+3.
l/gobject-introspection-1.36.0-arm-1.tgz: Upgraded.
l/gsettings-desktop-schemas-3.8.2-arm-1.tgz: Upgraded.
l/gtk+2-2.24.18-arm-1.tgz: Upgraded.
l/gtk+3-3.8.2-arm-1.tgz: Upgraded.
l/gvfs-1.16.2-arm-1.tgz: Upgraded.
l/harfbuzz-0.9.16-arm-1.tgz: Added.
New dependency for pango.
l/libcroco-0.6.8-arm-1.tgz: Upgraded.
l/libgnome-keyring-3.8.0-arm-1.tgz: Upgraded.
l/libsecret-0.15-arm-1.tgz: Upgraded.
l/libsoup-2.42.2-arm-1.tgz: Upgraded.
l/libtasn1-3.3-arm-1.tgz: Upgraded.
l/pango-1.34.1-arm-1.tgz: Upgraded.
l/pcre-8.32-arm-1.tgz: Upgraded.
l/popt-1.16-arm-2.tgz: Rebuilt.
Make sure pkgconfig directory is in the right location.
l/slang-2.2.4-arm-3.tgz: Rebuilt.
Recompiled against pcre-8.32.
n/epic5-1.1.3-arm-2.tgz: Rebuilt.
n/httpd-2.4.4-arm-2.tgz: Rebuilt.
Patched htpasswd hash generation bug.
Thanks to MadMaverick9.
n/nettle-2.7-arm-1.tgz: Upgraded.
n/network-scripts-14.1-noarch-1.tgz: Upgraded.
Handle ipv6 forwarding in rc.ip_forward.
Thanks to ricky_cardo.
n/nfs-utils-1.2.8-arm-1.tgz: Upgraded.
n/nmap-6.25-arm-2.tgz: Rebuilt.
Recompiled against pcre-8.32.
n/p11-kit-0.16.4-arm-1.tgz: Upgraded.
n/php-5.4.15-arm-1.tgz: Upgraded.
Moved php-fpm.conf.default to /etc/php-fpm/.
Thanks to Hristo Simeonov.
n/popa3d-1.0.2-arm-3.tgz: Rebuilt.
Patched for new glibc crypt(). Thanks to mancha.
n/wget-1.14-arm-2.tgz: Rebuilt.
Recompiled against pcre-8.32.
n/yptools-2.14-arm-1.tgz: Upgraded.
Upgraded to yp-tools-2.14, ypbind-mt-1.37.1, and ypserv-2.31.
Patched for new glibc crypt(). Thanks to mancha.
tcl/tclx-8.4.1-arm-3.tgz: Rebuilt.
x/appres-1.0.4-arm-1.tgz: Upgraded.
x/bitmap-1.0.7-arm-1.tgz: Upgraded.
x/fontconfig-2.10.93-arm-1.tgz: Upgraded.
x/libfontenc-1.1.2-arm-1.tgz: Upgraded.
x/pixman-0.30.0-arm-1.tgz: Upgraded.
x/transset-1.0.1-arm-1.tgz: Upgraded.
x/wqy-zenhei-font-ttf-0.8.38_1-noarch-2.tgz: Upgraded.
The package reverts to the 0.8.38 version due to reports that the newer
version causes rendering issues with Japanese and Korean fonts. I've
found many references to this issue online, and have yet to see any
solution for it besides reverting or removing the wqy-zenhei-font-ttf
package altogether. Some people have suggested dropping wqy-zenhei in
favor of Droid Sans Fallback, but the glyph coverage is not as good with
that font. Probably the best solution for now is to go back to the
version that seems to work (with a patch to the .conf file for
compatibility with recent versions of fontconfig).
x/xf86-input-synaptics-1.7.1-arm-1.tgz: Upgraded.
x/xfontsel-1.0.5-arm-1.tgz: Upgraded.
x/xrefresh-1.0.5-arm-1.tgz: Upgraded.
x/xterm-292-arm-1.tgz: Upgraded.
x/xwininfo-1.1.3-arm-1.tgz: Upgraded.
xap/gucharmap-3.8.2-arm-1.tgz: Upgraded.
xfce/Thunar-1.6.3-arm-1.tgz: Upgraded.
xfce/garcon-0.2.1-arm-1.tgz: Upgraded.
xfce/libxfce4util-4.10.1-arm-1.tgz: Upgraded.
xfce/xfce4-appfinder-4.10.1-arm-1.tgz: Upgraded.
xfce/xfce4-notifyd-0.2.4-arm-1.tgz: Upgraded.
xfce/xfce4-panel-4.10.1-arm-1.tgz: Upgraded.
xfce/xfce4-session-4.10.1-arm-1.tgz: Upgraded.
xfce/xfce4-settings-4.10.1-arm-1.tgz: Upgraded.
xfce/xfce4-terminal-0.6.2-arm-1.tgz: Upgraded.
xfce/xfwm4-4.10.1-arm-1.tgz: Upgraded.
+--------------------------+
Sun May 19 20:49:51 UTC 2013
Hola! I've played around with Linux 3.9.x and had success with the kirkwood
platform, but on the Tegra20 (Trimslice) the NIC stops working after a couple
of seconds of network traffic; so for the time being we're sticking with the
3.8 series. I will continue to look in to this.
a/glibc-solibs-2.17-arm-7.tgz: Rebuilt.
a/glibc-zoneinfo-2013c-noarch-7.tgz: Rebuilt.
a/kernel-firmware-20130505git-noarch-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.8.13_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.13_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.13_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.8.13-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.13-arm-1.tgz: Upgraded.
a/kernel_versatile-3.8.13-arm-1.tgz: Upgraded.
a/shadow-4.1.5.1-arm-1.tgz: Upgraded.
Thanks to mancha for the improved crypt() NULL handling patch.
a/xfsprogs-3.1.11-arm-1.tgz: Upgraded.
ap/aumix-2.9.1-arm-2.tgz: Removed.
This only works with OSS (or the ALSA OSS compatibility modules, which are
now disabled by default). Moving to /pasture.
ap/dmapi-2.2.12-arm-1.tgz: Upgraded.
ap/rexima-1.4-arm-2.tgz: Removed.
This only works with OSS (or the ALSA OSS compatibility modules, which are
now disabled by default). Moving to /pasture.
ap/screen-4.0.3-arm-4.tgz: Rebuilt.
Patched for newer glibc crypt().
ap/sudo-1.8.6p8-arm-1.tgz: Upgraded.
ap/xfsdump-3.1.3-arm-1.tgz: Upgraded.
d/ccache-3.1.9-arm-1.tgz: Upgraded.
d/kernel-headers-3.8.13-arm-1.tgz: Upgraded.
d/python-2.7.4-arm-2.tgz: Rebuilt.
d/ruby-1.9.3_p429-arm-1.tgz: Upgraded.
This update fixes a security issue in DL and Fiddle included in Ruby where
tainted strings can be used by system calls regardless of the $SAFE level
setting.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065
http://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
(* Security fix *)
d/slacktrack-2.14-arm-1.tgz: Upgraded.
k/kernel-source-3.8.13-arm-1.tgz: Upgraded.
kde/amarok-2.7.1-arm-1.tgz: Upgraded.
kde/ark-4.10.3-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.3-arm-1.tgz: Upgraded.
kde/bluedevil-1.3.1-arm-2.tgz: Rebuilt.
kde/bomber-4.10.3-arm-1.tgz: Upgraded.
kde/bovo-4.10.3-arm-1.tgz: Upgraded.
kde/calligra-2.6.3-arm-2.tgz: Rebuilt.
kde/dragon-4.10.3-arm-1.tgz: Upgraded.
kde/filelight-4.10.3-arm-1.tgz: Upgraded.
kde/granatier-4.10.3-arm-1.tgz: Upgraded.
kde/gwenview-4.10.3-arm-1.tgz: Upgraded.
kde/juk-4.10.3-arm-1.tgz: Upgraded.
kde/k3b-2.0.2_20120226.git-arm-2.tgz: Rebuilt.
kde/kaccessible-4.10.3-arm-1.tgz: Upgraded.
kde/kactivities-4.10.3-arm-1.tgz: Upgraded.
kde/kajongg-4.10.3-arm-1.tgz: Upgraded.
kde/kamera-4.10.3-arm-1.tgz: Upgraded.
kde/kapman-4.10.3-arm-1.tgz: Upgraded.
kde/kate-4.10.3-arm-1.tgz: Upgraded.
kde/katomic-4.10.3-arm-1.tgz: Upgraded.
kde/kaudiocreator-1.3-arm-2.tgz: Rebuilt.
kde/kblackbox-4.10.3-arm-1.tgz: Upgraded.
kde/kblocks-4.10.3-arm-1.tgz: Upgraded.
kde/kbounce-4.10.3-arm-1.tgz: Upgraded.
kde/kbreakout-4.10.3-arm-1.tgz: Upgraded.
kde/kcalc-4.10.3-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.3-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.3-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.3-arm-1.tgz: Upgraded.
kde/kde-baseapps-4.10.3-arm-2.tgz: Rebuilt.
kde/kde-runtime-4.10.3-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.3-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.3-arm-2.tgz: Rebuilt.
kde/kdeadmin-4.10.3-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.3-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.3-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.3-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.3-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.3-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.3-arm-1.tgz: Upgraded.
kde/kdepim-4.10.3-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.3-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.3-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.3-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.3-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.3-arm-1.tgz: Upgraded.
kde/kdevelop-4.5.0-arm-2.tgz: Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-2.tgz: Rebuilt.
kde/kdevplatform-1.5.0-arm-2.tgz: Rebuilt.
kde/kdewebdev-4.10.3-arm-1.tgz: Upgraded.
kde/kdf-4.10.3-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.3-arm-1.tgz: Upgraded.
kde/kfloppy-4.10.3-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.3-arm-1.tgz: Upgraded.
kde/kgamma-4.10.3-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.3-arm-1.tgz: Upgraded.
kde/kgpg-4.10.3-arm-1.tgz: Upgraded.
kde/kigo-4.10.3-arm-1.tgz: Upgraded.
kde/killbots-4.10.3-arm-1.tgz: Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-2.tgz: Rebuilt.
kde/kiriki-4.10.3-arm-1.tgz: Upgraded.
kde/kjumpingcube-4.10.3-arm-1.tgz: Upgraded.
kde/klickety-4.10.3-arm-1.tgz: Upgraded.
kde/klines-4.10.3-arm-1.tgz: Upgraded.
kde/kmag-4.10.3-arm-1.tgz: Upgraded.
kde/kmahjongg-4.10.3-arm-1.tgz: Upgraded.
kde/kmines-4.10.3-arm-1.tgz: Upgraded.
kde/kmix-4.10.3-arm-1.tgz: Upgraded.
kde/kmousetool-4.10.3-arm-1.tgz: Upgraded.
kde/kmouth-4.10.3-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.3-arm-1.tgz: Upgraded.
kde/knetwalk-4.10.3-arm-1.tgz: Upgraded.
kde/kolf-4.10.3-arm-1.tgz: Upgraded.
kde/kollision-4.10.3-arm-1.tgz: Upgraded.
kde/kolourpaint-4.10.3-arm-1.tgz: Upgraded.
kde/konquest-4.10.3-arm-1.tgz: Upgraded.
kde/konsole-4.10.3-arm-1.tgz: Upgraded.
kde/korundum-4.10.3-arm-1.tgz: Upgraded.
kde/kpat-4.10.3-arm-1.tgz: Upgraded.
kde/kplayer-0.7.2-arm-2.tgz: Rebuilt.
kde/kremotecontrol-4.10.3-arm-1.tgz: Upgraded.
kde/kreversi-4.10.3-arm-1.tgz: Upgraded.
kde/kross-interpreters-4.10.3-arm-1.tgz: Upgraded.
kde/kruler-4.10.3-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.3-arm-1.tgz: Upgraded.
kde/kscreen-0.0.71-arm-2.tgz: Rebuilt.
kde/kshisen-4.10.3-arm-1.tgz: Upgraded.
kde/ksirk-4.10.3-arm-1.tgz: Upgraded.
kde/ksnakeduel-4.10.3-arm-1.tgz: Upgraded.
kde/ksnapshot-4.10.3-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.3-arm-1.tgz: Upgraded.
kde/ksquares-4.10.3-arm-1.tgz: Upgraded.
kde/ksudoku-4.10.3-arm-1.tgz: Upgraded.
kde/ktimer-4.10.3-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-2.tgz: Rebuilt.
kde/ktuberling-4.10.3-arm-1.tgz: Upgraded.
kde/kubrick-4.10.3-arm-1.tgz: Upgraded.
kde/kwallet-4.10.3-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.3.2-arm-2.tgz: Rebuilt.
kde/libkcddb-4.10.3-arm-1.tgz: Upgraded.
kde/libkcompactdisc-4.10.3-arm-1.tgz: Upgraded.
kde/libkdcraw-4.10.3-arm-1.tgz: Upgraded.
kde/libkdegames-4.10.3-arm-1.tgz: Upgraded.
kde/libkexiv2-4.10.3-arm-1.tgz: Upgraded.
kde/libkipi-4.10.3-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.3-arm-1.tgz: Upgraded.
kde/libksane-4.10.3-arm-1.tgz: Upgraded.
kde/libkscreen-0.0.71-arm-2.tgz: Rebuilt.
kde/libktorrent-1.3.1-arm-4.tgz: Rebuilt.
kde/lskat-4.10.3-arm-1.tgz: Upgraded.
kde/mplayerthumbs-4.10.3-arm-1.tgz: Upgraded.
kde/nepomuk-core-4.10.3-arm-2.tgz: Rebuilt.
kde/nepomuk-widgets-4.10.3-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0.8-arm-2.tgz: Rebuilt.
kde/okular-4.10.3-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.3-arm-1.tgz: Upgraded.
kde/oxygen-gtk3-1.1.3-arm-1.tgz: Upgraded.
kde/oxygen-icons-4.10.3-arm-1.tgz: Upgraded.
kde/palapeli-4.10.3-arm-1.tgz: Upgraded.
kde/perlkde-4.10.3-arm-1.tgz: Upgraded.
kde/perlqt-4.10.3-arm-1.tgz: Upgraded.
kde/picmi-4.10.3-arm-1.tgz: Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz: Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz: Rebuilt.
kde/print-manager-4.10.3-arm-1.tgz: Upgraded.
kde/qtruby-4.10.3-arm-1.tgz: Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz: Removed.
I think this is finally dead since it no longer compiles against the new
version of kdevplatform.
kde/skanlite-1.0-arm-2.tgz: Rebuilt.
kde/smokegen-4.10.3-arm-1.tgz: Upgraded.
kde/smokekde-4.10.3-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.3-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.3-arm-1.tgz: Upgraded.
kde/svgpart-4.10.3-arm-1.tgz: Upgraded.
kde/sweeper-4.10.3-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz: Rebuilt.
kdei/kde-l10n-ar-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bg-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bs-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca@valencia-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-cs-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-da-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-de-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-el-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-en_GB-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-es-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-et-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-eu-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fa-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fi-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fr-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ga-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-gl-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-he-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hi-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hr-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hu-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ia-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-is-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-it-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ja-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-kk-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-km-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ko-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lt-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lv-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-mr-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nb-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nds-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nl-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nn-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pa-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pl-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt_BR-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ro-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ru-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-si-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sk-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sl-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sr-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sv-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tg-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-th-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tr-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ug-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-uk-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-vi-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-wa-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_CN-4.10.3-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_TW-4.10.3-noarch-1.tgz: Upgraded.
l/alsa-lib-1.0.27-arm-2.tgz: Rebuilt.
Use __inline__ in the include files, not inline. Otherwise programs that use
c90 won't compile (noticed with libkcompactdisc).
l/clucene-2.3.3.4-arm-2.tgz: Rebuilt.
Include contrib-libs. Thanks to Thomas Choi.
l/glibc-2.17-arm-7.tgz: Rebuilt.
Built against Linux 3.8.13 kernel headers.
l/glibc-i18n-2.17-arm-7.tgz: Rebuilt.
l/glibc-profile-2.17-arm-7.tgz: Rebuilt.
l/mozilla-nss-3.14.3-arm-1.tgz: Upgraded.
Upgraded to nss-3.14.3 with nspr-4.9.6.
l/ncurses-5.9-arm-4.tgz: Rebuilt.
Applied all upstream patches for ncurses-5.9 and installed pkgconfig files.
Thanks to Marin Glibic.
l/pil-1.1.7-arm-3.tgz: Rebuilt.
n/ppp-2.4.5-arm-3.tgz: Rebuilt.
Patched for newer glibc crypt().
Removed internal header file that conflicts with recent kernels.
n/samba-4.0.5-arm-1.tgz: Upgraded.
n/tin-2.0.1-arm-1.tgz: Upgraded.
tcl/expect-5.44.1.15-arm-2.tgz: Rebuilt.
tcl/hfsutils-3.2.6-arm-3.tgz: Rebuilt.
tcl/tcl-8.6.0-arm-1.tgz: Upgraded.
tcl/tclx-8.4.1-arm-1.tgz: Upgraded.
tcl/tix-8.4.3-arm-3.tgz: Rebuilt.
tcl/tk-8.6.0-arm-1.tgz: Upgraded.
xap/gnuchess-6.0.3-arm-2.tgz: Rebuilt.
Upgraded xboard to version 4.7.1.
xap/pidgin-2.10.7-arm-2.tgz: Rebuilt.
xap/xchat-2.8.8-arm-7.tgz: Rebuilt.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
pasture/aumix-2.9.1-arm-2.tgz: Moved here from the AP series.
pasture/rexima-1.4-arm-2.tgz: Moved here from the AP series.
+--------------------------+
Fri May 3 19:21:39 UTC 2013
ap/alsa-utils-1.0.27-arm-1.tgz: Upgraded.
Added rc.alsa-oss script, disabled by default so that applications that try
to use OSS compatibility when they could be using ALSA won't steal exclusive
access to the audio device. Thanks to B. Watson.
l/alsa-lib-1.0.27-arm-1.tgz: Upgraded.
x/mesa-9.1.2-arm-1.tgz: Upgraded.
xap/imagemagick-6.8.5_4-arm-1.tgz: Upgraded.
Patched to fix an issue detecting the glib2 version at compile time.
This should get SVG support working again. Thanks to GazL.
xap/xmms-1.2.11-arm-4.tgz: Rebuilt.
Patched to use ALSA by default. Thanks to B. Watson.
+--------------------------+
Wed May 1 19:03:27 UTC 2013
a/kernel-firmware-20130430git-noarch-1.tgz: Upgraded.
kde/kdevelop-4.5.0-arm-1.tgz: Upgraded.
kde/kdevplatform-1.5.0-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.3.2-arm-1.tgz: Upgraded.
l/expat-2.1.0-arm-1.tgz: Upgraded.
n/curl-7.30.0-arm-1.tgz: Upgraded.
xap/gnuplot-4.6.3-arm-1.tgz: Upgraded.
xap/imagemagick-6.8.5_3-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-4.8.0-arm-3.tgz: Rebuilt.
Patched to fix a bug that was breaking WINE with -O2 on x86_64, and probably
affected other programs as well. Thanks to Kirill Smirnov.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-3.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-3.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-3.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-3.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-3.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-3.tgz: Rebuilt.
+--------------------------+
Mon Apr 29 19:17:41 UTC 2013
a/btrfs-progs-20130418-arm-1.tgz: Upgraded.
Make fsck.btrfs a link to /bin/true as recommended on the btrfs wiki.
a/glibc-solibs-2.17-arm-6.tgz: Rebuilt.
a/glibc-zoneinfo-2013b-noarch-6.tgz: Rebuilt.
a/kernel-firmware-20130426git-noarch-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.8.10_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.10_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.10_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.8.10-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.10-arm-1.tgz: Upgraded.
a/kernel_versatile-3.8.10-arm-1.tgz: Upgraded.
d/kernel-headers-3.8.10-arm-1.tgz: Upgraded.
e/emacs-24.3-arm-3.tgz: Rebuilt.
Recompiled using --with-x-toolkit=gtk2.
k/kernel-source-3.8.10-arm-1.tgz: Upgraded.
l/glibc-2.17-arm-6.tgz: Rebuilt.
Built against Linux 3.8.10 kernel headers.
Patched two crash bugs (CVE-2013-0242, CVE-2013-1914). These do not allow
code execution, and upstream agrees that they are low priority/severity.
They are patched here since glibc was due for a kernel related rebuild
anyway, but given the low priority/severity and possibility of introducing
problems in production versions of glibc, they will backported only if
further review indicates a necessity.
l/glibc-i18n-2.17-arm-6.tgz: Rebuilt.
l/glibc-profile-2.17-arm-6.tgz: Rebuilt.
l/qt-4.8.4-arm-4.tgz: Rebuilt.
Patched to fix a plasma crash in KDE.
n/autofs-5.0.7-arm-2.tgz: Rebuilt.
Added /etc/auto.master.d directory. Thanks to GazL.
n/proftpd-1.3.4c-arm-1.tgz: Upgraded.
Added mod_radius to the build as requested by chemfire. I wasn't sure about
this at first since it's a non-default and seldom used module, but since it
doesn't do anything unless it has been configured it should be safe to
include.
x/xf86-input-acecad-1.5.0-arm-4.tgz: Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-4.tgz: Rebuilt.
x/xf86-input-evdev-2.8.0-arm-2.tgz: Rebuilt.
x/xf86-input-joystick-1.6.1-arm-4.tgz: Rebuilt.
x/xf86-input-keyboard-1.7.0-arm-2.tgz: Rebuilt.
x/xf86-input-mouse-1.9.0-arm-2.tgz: Rebuilt.
x/xf86-input-penmount-1.5.0-arm-4.tgz: Rebuilt.
x/xf86-input-synaptics-1.7.0-arm-2.tgz: Rebuilt.
x/xf86-input-void-1.4.0-arm-4.tgz: Rebuilt.
x/xf86-input-wacom-0.19.0-arm-3.tgz: Rebuilt.
x/xf86-video-apm-1.2.5-arm-3.tgz: Rebuilt.
x/xf86-video-ark-0.7.5-arm-3.tgz: Rebuilt.
x/xf86-video-ast-0.97.0-arm-3.tgz: Rebuilt.
x/xf86-video-ati-7.1.0-arm-3.tgz: Rebuilt.
x/xf86-video-chips-1.2.5-arm-3.tgz: Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-3.tgz: Rebuilt.
x/xf86-video-dummy-0.3.6-arm-3.tgz: Rebuilt.
x/xf86-video-fbdev-0.4.3-arm-5.tgz: Rebuilt.
x/xf86-video-glint-1.2.8-arm-3.tgz: Rebuilt.
x/xf86-video-i128-1.3.6-arm-3.tgz: Rebuilt.
x/xf86-video-i740-1.3.4-arm-3.tgz: Rebuilt.
x/xf86-video-mach64-6.9.4-arm-3.tgz: Rebuilt.
x/xf86-video-mga-1.6.2-arm-3.tgz: Rebuilt.
x/xf86-video-modesetting-0.7.0-arm-2.tgz: Rebuilt.
x/xf86-video-neomagic-1.2.7-arm-3.tgz: Rebuilt.
x/xf86-video-nouveau-1.0.7-arm-2.tgz: Rebuilt.
x/xf86-video-nv-2.1.20-arm-4.tgz: Rebuilt.
x/xf86-video-openchrome-0.3.2-arm-2.tgz: Rebuilt.
x/xf86-video-r128-6.9.1-arm-4.tgz: Rebuilt.
x/xf86-video-rendition-4.2.5-arm-3.tgz: Rebuilt.
x/xf86-video-s3-0.6.5-arm-3.tgz: Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-4.tgz: Rebuilt.
x/xf86-video-savage-2.3.6-arm-4.tgz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-4.tgz: Rebuilt.
x/xf86-video-sis-0.10.7-arm-3.tgz: Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-3.tgz: Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-3.tgz: Rebuilt.
x/xf86-video-tga-1.2.2-arm-3.tgz: Rebuilt.
x/xf86-video-trident-1.3.6-arm-3.tgz: Rebuilt.
x/xf86-video-tseng-1.2.5-arm-3.tgz: Rebuilt.
x/xf86-video-v4l-0.2.0-arm-4.tgz: Rebuilt.
x/xf86-video-vesa-2.3.2-arm-3.tgz: Rebuilt.
x/xf86-video-vmware-13.0.1-arm-2.tgz: Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-4.tgz: Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-4.tgz: Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-3.tgz: Rebuilt.
x/xorg-server-1.13.4-arm-1.tgz: Upgraded.
This update fixes an input flush bug with evdev. Under exceptional
conditions (keyboard input during device hotplugging), this could leak
a small amount of information intended for the X server.
This issue was evaluated to be of low impact.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
http://lists.x.org/archives/xorg-devel/2013-April/036014.html
(* Security fix *)
x/xorg-server-xephyr-1.13.4-arm-1.tgz: Upgraded.
x/xorg-server-xnest-1.13.4-arm-1.tgz: Upgraded.
x/xorg-server-xvfb-1.13.4-arm-1.tgz: Upgraded.
xap/imagemagick-6.8.4_10-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sat Apr 13 11:27:53 UTC 2013
a/kernel-modules-kirkwood-3.8.7_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.7_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.7_versatile-arm-1.tgz: Upgraded.
Patched for re-implement the legacy behaviour, allowing Linux to work with
QEMU's emulation of the 'ARM Versatile' platform.
I've performed a successful installation using QEMU-1.4.0 and this kernel
and set of installer images.
Thanks to Rob Landley for the patch and the explanation.
a/kernel_kirkwood-3.8.7-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.7-arm-1.tgz: Upgraded.
a/kernel_versatile-3.8.7-arm-1.tgz: Upgraded.
k/kernel-source-3.8.7-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Thu Apr 11 19:44:16 UTC 2013
A note about the Kernel updates:
The '/boot/dtb' (Device Tree Blob) directory is now a symlink to
/boot/dtb-<kernel version>
This is the approach Fedora have taken and it also makes sense in Slackware ARM
since everything else in /boot is versioned. This way you can easily retain a
previous complete versioned set of initrd, {z,u}Image and dtb files when you
upgrade to a newer kernel release package. If your /boot directory is on a file
system that supports symlinks, you can upgradepkg to these kernels without having
to make any amendments to your device's U-Boot configuration.
/INSTALL_TEGRA.TXT: Updated.
Updated section 0.0 ('U-Boot Firmware Upgrade') to explain how to upgrade
to the latest available U-Boot release for the 'TrimSlice' device.
If you're running the previous U-Boot release that only presents 512MB RAM to
your OS, you may now upgrade to the latest available U-Boot release and use
the full 1GB RAM.
Follow section 0.0, then section 5.0 ('Booting the Slackware ARM OS').
a/glibc-solibs-2.17-arm-5.tgz: Rebuilt.
Built against Linux 3.8.6 kernel headers.
Minimum kernel is now Linux 3.1.0 as this is the common base Kernel
version in use on the Raspberry Pi when running Slackware ARM 14.0. This will
permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware
release.
a/glibc-zoneinfo-2013b-noarch-5.tgz: Rebuilt.
a/kernel-modules-kirkwood-3.8.6_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.6_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.6_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.8.6-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.6-arm-1.tgz: Upgraded.
Added the kernel configuration options below:
CONFIG_EARLY_PRINTK=y
CONFIG_TEGRA_DEBUG_UARTA=y
Adding 'earlyprintk' to the kernel command line will allow boot messages to be
displayed to the serial port of the Trimslice before the regular serial console
is activated. This is necessary for debugging an unbootable kernel without
additional hardware.
a/kernel_versatile-3.8.6-arm-1.tgz: Upgraded.
ap/sox-14.4.1-arm-1.tgz: Upgraded.
d/kernel-headers-3.8.6-arm-1.tgz: Upgraded.
k/kernel-source-3.8.6-arm-1.tgz: Upgraded.
kde/calligra-2.6.3-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-en_GB-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.6.3-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.6.3-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-5.tgz: Rebuilt.
Built against Linux 3.8.6 kernel headers.
Minimum kernel is now Linux 3.1.0 as this is the common base Kernel
version in use on the Raspberry Pi when running Slackware ARM 14.0. This will
permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware
release.
l/glibc-i18n-2.17-arm-5.tgz: Rebuilt.
l/glibc-profile-2.17-arm-5.tgz: Rebuilt.
x/libXi-1.7.1-arm-1.tgz: Upgraded.
x/xf86-input-evdev-2.8.0-arm-1.tgz: Upgraded.
x/xf86-input-keyboard-1.7.0-arm-1.tgz: Upgraded.
x/xf86-input-mouse-1.9.0-arm-1.tgz: Upgraded.
x/xf86-input-synaptics-1.7.0-arm-1.tgz: Upgraded.
x/xf86-video-modesetting-0.7.0-arm-1.tgz: Upgraded.
x/xf86-video-nouveau-1.0.7-arm-1.tgz: Upgraded.
x/xf86-video-openchrome-0.3.2-arm-1.tgz: Upgraded.
x/xf86-video-r128-6.9.1-arm-3.tgz: Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-3.tgz: Rebuilt.
x/xf86-video-savage-2.3.6-arm-3.tgz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-3.tgz: Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-3.tgz: Rebuilt.
x/xproto-7.0.24-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Tue Apr 9 19:43:57 UTC 2013
ap/linuxdoc-tools-0.9.68-arm-2.tgz: Rebuilt.
Added VERSION.xsl -> VERSION symlink.
d/python-2.7.4-arm-1.tgz: Upgraded.
d/slacktrack-2.13-arm-1.tgz: Upgraded.
d/subversion-1.7.9-arm-1.tgz: Upgraded.
This update fixes some denial of service bugs:
mod_dav_svn excessive memory usage from property changes
mod_dav_svn crashes on LOCK requests against activity URLs
mod_dav_svn crashes on LOCK requests against non-existant URLs
mod_dav_svn crashes on PROPFIND requests against activity URLs
mod_dav_svn crashes on out of range limit in log REPORT request
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884
(* Security fix *)
kde/amarok-2.7.0-arm-4.tgz: Rebuilt.
kde/ark-4.10.2-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.2-arm-1.tgz: Upgraded.
kde/bluedevil-1.3.1-arm-1.tgz: Upgraded.
kde/bomber-4.10.2-arm-1.tgz: Upgraded.
kde/bovo-4.10.2-arm-1.tgz: Upgraded.
kde/calligra-2.6.2-arm-1.tgz: Upgraded.
kde/dragon-4.10.2-arm-1.tgz: Upgraded.
kde/filelight-4.10.2-arm-1.tgz: Upgraded.
kde/granatier-4.10.2-arm-1.tgz: Upgraded.
kde/gwenview-4.10.2-arm-1.tgz: Upgraded.
kde/juk-4.10.2-arm-1.tgz: Upgraded.
kde/k3b-2.0.2_20120226.git-arm-1.tgz: Upgraded.
kde/kaccessible-4.10.2-arm-1.tgz: Upgraded.
kde/kactivities-4.10.2-arm-1.tgz: Upgraded.
kde/kajongg-4.10.2-arm-1.tgz: Upgraded.
kde/kamera-4.10.2-arm-1.tgz: Upgraded.
kde/kapman-4.10.2-arm-1.tgz: Upgraded.
kde/kate-4.10.2-arm-1.tgz: Upgraded.
kde/katomic-4.10.2-arm-1.tgz: Upgraded.
kde/kaudiocreator-1.3-arm-1.tgz: Upgraded.
kde/kblackbox-4.10.2-arm-1.tgz: Upgraded.
kde/kblocks-4.10.2-arm-1.tgz: Upgraded.
kde/kbounce-4.10.2-arm-1.tgz: Upgraded.
kde/kbreakout-4.10.2-arm-1.tgz: Upgraded.
kde/kcalc-4.10.2-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.2-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.2-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.2-arm-1.tgz: Upgraded.
kde/kde-baseapps-4.10.2-arm-1.tgz: Upgraded.
kde/kde-runtime-4.10.2-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.2-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.2-arm-1.tgz: Upgraded.
kde/kdeadmin-4.10.2-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.2-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.2-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.2-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.2-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.2-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.2-arm-1.tgz: Upgraded.
kde/kdepim-4.10.2-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.2-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.2-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.2-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.2-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.2-arm-1.tgz: Upgraded.
kde/kdevelop-4.4.1-arm-1.tgz: Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-1.tgz: Upgraded.
kde/kdevplatform-1.4.1-arm-1.tgz: Upgraded.
kde/kdewebdev-4.10.2-arm-1.tgz: Upgraded.
kde/kdf-4.10.2-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.2-arm-1.tgz: Upgraded.
kde/kfloppy-4.10.2-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.2-arm-1.tgz: Upgraded.
kde/kgamma-4.10.2-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.2-arm-1.tgz: Upgraded.
kde/kgpg-4.10.2-arm-1.tgz: Upgraded.
kde/kigo-4.10.2-arm-1.tgz: Upgraded.
kde/killbots-4.10.2-arm-1.tgz: Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-1.tgz: Upgraded.
kde/kiriki-4.10.2-arm-1.tgz: Upgraded.
kde/kjumpingcube-4.10.2-arm-1.tgz: Upgraded.
kde/klickety-4.10.2-arm-1.tgz: Upgraded.
kde/klines-4.10.2-arm-1.tgz: Upgraded.
kde/kmag-4.10.2-arm-1.tgz: Upgraded.
kde/kmahjongg-4.10.2-arm-1.tgz: Upgraded.
kde/kmines-4.10.2-arm-1.tgz: Upgraded.
kde/kmix-4.10.2-arm-1.tgz: Upgraded.
kde/kmousetool-4.10.2-arm-1.tgz: Upgraded.
kde/kmouth-4.10.2-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.2-arm-1.tgz: Upgraded.
kde/knetwalk-4.10.2-arm-1.tgz: Upgraded.
kde/kolf-4.10.2-arm-1.tgz: Upgraded.
kde/kollision-4.10.2-arm-1.tgz: Upgraded.
kde/kolourpaint-4.10.2-arm-1.tgz: Upgraded.
kde/konquest-4.10.2-arm-1.tgz: Upgraded.
kde/konsole-4.10.2-arm-1.tgz: Upgraded.
kde/korundum-4.10.2-arm-1.tgz: Upgraded.
kde/kpat-4.10.2-arm-1.tgz: Upgraded.
kde/kplayer-0.7.2-arm-1.tgz: Upgraded.
kde/kremotecontrol-4.10.2-arm-1.tgz: Upgraded.
kde/kreversi-4.10.2-arm-1.tgz: Upgraded.
kde/kross-interpreters-4.10.2-arm-1.tgz: Upgraded.
kde/kruler-4.10.2-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.2-arm-1.tgz: Upgraded.
kde/kscreen-0.0.71-arm-1.tgz: Upgraded.
kde/kshisen-4.10.2-arm-1.tgz: Upgraded.
kde/ksirk-4.10.2-arm-1.tgz: Upgraded.
kde/ksnakeduel-4.10.2-arm-1.tgz: Upgraded.
kde/ksnapshot-4.10.2-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.2-arm-1.tgz: Upgraded.
kde/ksquares-4.10.2-arm-1.tgz: Upgraded.
kde/ksudoku-4.10.2-arm-1.tgz: Upgraded.
kde/ktimer-4.10.2-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-1.tgz: Upgraded.
kde/ktuberling-4.10.2-arm-1.tgz: Upgraded.
kde/kubrick-4.10.2-arm-1.tgz: Upgraded.
kde/kwallet-4.10.2-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz: Upgraded.
kde/libkcddb-4.10.2-arm-1.tgz: Upgraded.
kde/libkcompactdisc-4.10.2-arm-1.tgz: Upgraded.
kde/libkdcraw-4.10.2-arm-1.tgz: Upgraded.
kde/libkdegames-4.10.2-arm-1.tgz: Upgraded.
kde/libkexiv2-4.10.2-arm-1.tgz: Upgraded.
kde/libkipi-4.10.2-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.2-arm-1.tgz: Upgraded.
kde/libksane-4.10.2-arm-1.tgz: Upgraded.
kde/libkscreen-0.0.71-arm-1.tgz: Upgraded.
kde/libktorrent-1.3.1-arm-2.tgz: Rebuilt.
kde/lskat-4.10.2-arm-1.tgz: Upgraded.
kde/mplayerthumbs-4.10.2-arm-1.tgz: Upgraded.
kde/nepomuk-core-4.10.2-arm-1.tgz: Upgraded.
kde/nepomuk-widgets-4.10.2-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0.8-arm-1.tgz: Upgraded.
kde/okular-4.10.2-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.1-arm-1.tgz: Upgraded.
kde/oxygen-gtk3-1.1.1-arm-1.tgz: Upgraded.
kde/oxygen-icons-4.10.2-arm-1.tgz: Upgraded.
kde/palapeli-4.10.2-arm-1.tgz: Upgraded.
kde/perlkde-4.10.2-arm-1.tgz: Upgraded.
kde/perlqt-4.10.2-arm-1.tgz: Upgraded.
kde/picmi-4.10.2-arm-1.tgz: Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz: Upgraded.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz: Upgraded.
kde/print-manager-4.10.2-arm-1.tgz: Upgraded.
kde/qtruby-4.10.2-arm-1.tgz: Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz: Upgraded.
kde/skanlite-1.0-arm-1.tgz: Upgraded.
kde/smokegen-4.10.2-arm-1.tgz: Upgraded.
kde/smokekde-4.10.2-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.2-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.2-arm-1.tgz: Upgraded.
kde/svgpart-4.10.2-arm-1.tgz: Upgraded.
kde/sweeper-4.10.2-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz: Upgraded.
kdei/kde-l10n-ar-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bg-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-bs-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ca@valencia-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-cs-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-da-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-de-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-el-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-en_GB-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-es-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-et-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-eu-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fa-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fi-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-fr-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ga-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-gl-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-he-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hi-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hr-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-hu-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ia-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-is-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-it-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ja-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-kk-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-km-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ko-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lt-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-lv-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-mr-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nb-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nds-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nl-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-nn-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pa-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pl-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-pt_BR-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ro-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ru-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-si-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sk-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sl-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sr-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-sv-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tg-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-th-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-tr-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-ug-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-uk-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-vi-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-wa-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_CN-4.10.2-noarch-1.tgz: Upgraded.
kdei/kde-l10n-zh_TW-4.10.2-noarch-1.tgz: Upgraded.
l/libbluedevil-1.9.3-arm-1.tgz: Upgraded.
l/liblastfm-1.0.7-arm-1.tgz: Upgraded.
l/libmtp-1.1.6-arm-1.tgz: Upgraded.
l/qt-4.8.4-arm-3.tgz: Rebuilt.
Removed dangling symlink in the docs directory.
n/autofs-5.0.7-arm-1.tgz: Upgraded.
n/openssh-6.2p1-arm-2.tgz: Rebuilt.
Patched to remove warnings about missing identity files unless they were
specified on the command line or in the config file.
n/openvpn-2.3.1-arm-1.tgz: Upgraded.
xap/network-manager-applet-0.9.8.0-arm-2.tgz: Rebuilt.
Fixed sed on ce-page-general.ui to use GtkHBox, not GtkVBox.
extra/gcc-4.8.0/gcc-4.8.0-arm-2.tgz: Rebuilt.
Restored missing target.h, target.def, and target-hooks-macros.h headers.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-2.tgz: Rebuilt.
+--------------------------+
Wed Apr 3 18:12:07 UTC 2013
ap/linuxdoc-tools-0.9.68-arm-1.tgz: Upgraded.
Upgraded to AsciiDoc-8.6.8
Upgraded to DocBook XSL Stylesheets 1.78.1
Removed dangling symlinks from /usr/doc.
d/binutils-2.23.52.0.1-arm-2.tgz: Rebuilt.
Export/install demangle.h. Thanks to Jim Diamond.
Patched addr2line to use dynamic symbol table if needed.
Reverted an upstream change that broke linking dynamic libraries through
weak symbols, requiring additions like -lpthread to the link line.
Fixed texinfo files to be compatible with newer texinfo versions.
Patched system headers to not complain about missing "config.h".
l/gtk+2-2.24.17-arm-2.tgz: Rebuilt.
Restored the missing /etc/gtk-2.0/$ARCH-slackware-linux/ directory.
Thanks to Tim Thomas.
+--------------------------+
Tue Apr 2 19:44:54 UTC 2013
The mini root filesystem for -current has been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
The Mozilla suite of applications have been updated in the 'unsupported' tree:
ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/
a/mtd-utils-020413-arm-1.tgz: Upgraded.
a/u-boot-tools-2013.01.01-arm-1.tgz: Upgraded.
+--------------------------+
Mon Apr 1 18:13:44 UTC 2013
More updates, and several rebuilds due to bumped library versions in
the boost, icu4c, ilmbase, imagemagick, libzip, and net-snmp packages.
Thanks to Heinz Wiesinger for several of these library bumps, and to
Robby Workman for the initial work on lots of the updates in this batch.
The big news here is the removal of MySQL in favor of MariaDB. This
shouldn't really be a surprise on any level. Thanks are due to Heinz
Wiesinger for his work on transitioning the build script, testing, and
getting us all behind this move.
In the vast majority of situations, MariaDB is entirely compatible with
existing MySQL databases and will drop right in with no changes required.
There's an article available outlining the areas in which MariaDB differs
from MySQL that I'd recommend reading:
https://kb.askmonty.org/v/mariadb-versus-mysql-compatibility/
Thanks to the MariaDB Foundation! We look forward to working with you.
GCC 4.8.0 has been added to /extra rather than the main tree. This is
because GCC 4.8.0 has not been able to produce a bootable Kernel here.
I tried reverting to the previous version of binutils and applying the
latest SVN branch update, but to no avail -- so for now we're sticking
with GCC 4.7.2.
a/acpid-2.0.18-arm-1.tgz: Upgraded.
a/dbus-1.6.8-arm-1.tgz: Upgraded.
a/e2fsprogs-1.42.7-arm-1.tgz: Upgraded.
a/gettext-0.18.2.1-arm-2.tgz: Rebuilt.
a/glibc-solibs-2.17-arm-4.tgz: Rebuilt.
a/glibc-zoneinfo-2013b-noarch-4.tgz: Rebuilt.
a/kernel-modules-kirkwood-3.8.5_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.5_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.5_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.8.5-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.5-arm-1.tgz: Upgraded.
a/kernel_versatile-3.8.5-arm-1.tgz: Upgraded.
a/kmod-12-arm-1.tgz: Upgraded.
a/reiserfsprogs-3.6.22-arm-1.tgz: Upgraded.
a/shadow-4.1.4.3-arm-7.tgz: Rebuilt.
Patched pw_encrypt() to fix "crypt: Invalid argument" and immediate login
failure when a non-existent user tries to log in. This was caused by a
change in the behavior of glibc's crypt() function. When a user that does
not exist tries to log in, the code in shadow calls crypt() with an invalid
salt. The old version of crypt() used the provided bad salt (always "!")
to produce a DES hash with "!!" at the beginning, while the new one just
returns NULL which isn't well-handled by the shadow code. To fix this
shadow bug, if the salt is invalid, we'll call crypt() using a good SHA512
salt, prepend "!!" to the hash that we get back, and have pw_encrypt()
return this as the result. The effect is identical to the previous
behavior -- unless the exact same malformed hash happens to be the hash in
/etc/shadow (it won't be), the login will fail. While I see no way that
these 6 lines of code could be less secure than the original code, I
welcome additional review. Also, if anyone spots anything else that was
adversely affected by the change to crypt()'s behavior, please let me know.
Thanks to Michael L. Semon for information about the /bin/login problem.
Patched to handle more than 16 supplemental groups.
Thanks to Cal Peake.
a/sharutils-4.13.3-arm-2.tgz: Rebuilt.
a/udisks-1.0.4-arm-2.tgz: Rebuilt.
a/udisks2-2.1.0-arm-1.tgz: Upgraded.
ap/ghostscript-9.07-arm-1.tgz: Upgraded.
ap/hplip-3.13.3-arm-2.tgz: Rebuilt.
ap/madplay-0.15.2b-arm-4.tgz: Rebuilt.
ap/man-pages-3.50-noarch-1.tgz: Upgraded.
ap/mysql-5.5.29-arm-1.tgz: Removed.
ap/mariadb-5.5.30-arm-1.tgz: Added.
ap/nano-2.3.2-arm-1.tgz: Upgraded.
ap/normalize-0.7.7-arm-3.tgz: Rebuilt.
d/binutils-2.23.52.0.1-arm-1.tgz: Upgraded.
d/bison-2.7-arm-1.tgz: Upgraded.
d/distcc-3.1-arm-4.tgz: Rebuilt.
d/gcc-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-g++-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-gfortran-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-gnat-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-go-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-java-4.7.2-arm-4.tgz: Rebuilt.
d/gcc-objc-4.7.2-arm-4.tgz: Rebuilt.
d/gettext-tools-0.18.2.1-arm-2.tgz: Rebuilt.
d/kernel-headers-3.8.5-arm-1.tgz: Upgraded.
d/llvm-3.2-arm-3.tgz: Rebuilt.
Added /usr/bin/$ARCH-slackware-linux-{clang,clang++} symlinks. If these
are present, LLVM/clang will be used to compile itself. Other programs
might need them as well.
d/oprofile-0.9.7-arm-4.tgz: Rebuilt.
e/emacs-24.3-arm-2.tgz: Rebuilt.
k/kernel-source-3.8.5-arm-1.tgz: Upgraded.
kde/amarok-2.7.0-arm-3.tgz: Rebuilt.
Rebuilt to use the dynamic embedded library in MariaDB.
kde/calligra-2.6.2-arm-3.tgz: Rebuilt.
kde/kde-runtime-4.10.1-arm-2.tgz: Rebuilt.
kde/kdelibs-4.10.1-arm-3.tgz: Rebuilt.
kde/kig-4.10.1-arm-1.tgz: Added.
kde/networkmanagement-0.9.0.8-arm-1.tgz: Upgraded.
kde/quanta-29a3f8e_20111223git-arm-3.tgz: Rebuilt.
kde/skanlite-1.0-arm-1.tgz: Upgraded.
l/GConf-3.2.6-arm-1.tgz: Upgraded.
l/akonadi-1.9.1-arm-1.tgz: Upgraded.
l/at-spi2-atk-2.6.2-arm-1.tgz: Added.
l/at-spi2-core-2.6.3-arm-1.tgz: Added.
l/atk-2.6.0-arm-1.tgz: Upgraded.
l/audiofile-0.3.6-arm-1.tgz: Upgraded.
l/boost-1.53.0-arm-1.tgz: Upgraded.
l/dbus-glib-0.100.2-arm-1.tgz: Upgraded.
l/dbus-python-1.1.1-arm-1.tgz: Upgraded.
l/dconf-0.14.1-arm-1.tgz: Added.
l/desktop-file-utils-0.21-arm-1.tgz: Upgraded.
l/ebook-tools-0.2.2-arm-2.tgz: Rebuilt.
l/esound-0.2.41-arm-4.tgz: Rebuilt.
l/fftw-3.3.3-arm-1.tgz: Upgraded.
l/gcr-3.6.2-arm-1.tgz: Upgraded.
l/gdk-pixbuf2-2.26.5-arm-1.tgz: Upgraded.
l/gegl-0.2.0-arm-2.tgz: Rebuilt.
l/glade3-3.8.3-arm-1.tgz: Upgraded.
l/glib-networking-2.34.2-arm-1.tgz: Upgraded.
l/glib2-2.34.3-arm-1.tgz: Upgraded.
l/glibc-2.17-arm-4.tgz: Rebuilt.
Built against Linux 3.8.5 kernel headers.
l/glibc-i18n-2.17-arm-4.tgz: Rebuilt.
l/glibc-profile-2.17-arm-4.tgz: Rebuilt.
l/gmime-2.6.15-arm-1.tgz: Upgraded.
l/gmm-4.2-noarch-1.tgz: Upgraded.
l/gnome-icon-theme-3.6.2-noarch-1.tgz: Upgraded.
l/gnome-keyring-3.6.3-arm-1.tgz: Upgraded.
l/gobject-introspection-1.34.2-arm-1.tgz: Upgraded.
l/gsettings-desktop-schemas-3.6.1-arm-1.tgz: Upgraded.
l/gtk+2-2.24.17-arm-1.tgz: Upgraded.
l/gtk+3-3.6.4-arm-1.tgz: Upgraded.
l/gvfs-1.14.2-arm-1.tgz: Upgraded.
l/icu4c-51.1-arm-1.tgz: Upgraded.
l/ilmbase-1.0.3-arm-1.tgz: Upgraded.
l/iso-codes-3.41-arm-1.tgz: Upgraded.
l/libffi-3.0.13-arm-1.tgz: Upgraded.
l/libgnome-keyring-3.6.0-arm-1.tgz: Upgraded.
l/libgsf-1.14.26-arm-1.tgz: Upgraded.
l/libproxy-0.4.11-arm-1.tgz: Upgraded.
l/librsvg-2.36.4-arm-1.tgz: Upgraded.
l/libsecret-0.12-arm-1.tgz: Added.
l/libsoup-2.40.3-arm-1.tgz: Upgraded.
l/libspectre-0.2.7-arm-1.tgz: Upgraded.
l/libssh-0.5.4-arm-1.tgz: Upgraded.
This update fixes a possible denial of service issue.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176
(* Security fix *)
l/libxklavier-5.3-arm-1.tgz: Upgraded.
l/libzip-0.10.1-arm-1.tgz: Upgraded.
l/openexr-1.7.1-arm-1.tgz: Upgraded.
l/parted-3.1-arm-1.tgz: Upgraded.
l/popt-1.16-arm-1.tgz: Upgraded.
l/qt-4.8.4-arm-2.tgz: Rebuilt.
Patched moc to fix issues with the latest boost library.
Thanks to Corrado Franco.
l/raptor2-2.0.9-arm-1.tgz: Upgraded.
l/rasqal-0.9.30-arm-1.tgz: Upgraded.
l/redland-1.0.16-arm-1.tgz: Upgraded.
l/sg3_utils-1.35-arm-1.tgz: Upgraded.
l/virtuoso-ose-6.1.6-arm-2.tgz: Rebuilt.
n/ModemManager-0.6.0.0-arm-1.tgz: Upgraded.
n/NetworkManager-0.9.8.0-arm-1.tgz: Upgraded.
n/bind-9.9.2_P2-arm-1.tgz: Upgraded.
This update fixes a critical defect in BIND 9 that allows an attacker
to cause excessive memory consumption in named or other programs linked
to libdns.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
https://kb.isc.org/article/AA-00871
(* Security fix *)
n/dhcp-4.2.5_P1-arm-1.tgz: Upgraded.
This update replaces the included BIND 9 code that the DHCP programs
link against. Those contained a defect that could possibly lead to
excessive memory consumption and a denial of service.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
(* Security fix *)
n/mcabber-0.10.2-arm-2.tgz: Rebuilt.
n/net-snmp-5.7.2-arm-1.tgz: Upgraded.
n/ntp-4.2.6p5-arm-3.tgz: Rebuilt.
n/obex-data-server-0.4.6-arm-3.tgz: Rebuilt.
n/openssh-6.2p1-arm-1.tgz: Upgraded.
n/php-5.4.13-arm-1.tgz: Upgraded.
This release fixes two security issues in SOAP:
Added check that soap.wsdl_cache_dir conforms to open_basedir.
Disabled external entities loading.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
(* Security fix *)
n/tin-1.8.3-arm-4.tgz: Rebuilt.
x/xf86-video-nouveau-1.0.4-arm-1.tgz: Upgraded.
xap/audacious-3.3.4-arm-1.tgz: Upgraded.
xap/audacious-plugins-3.3.4-arm-1.tgz: Upgraded.
xap/imagemagick-6.8.4_1-arm-1.tgz: Upgraded.
xap/network-manager-applet-0.9.8.0-arm-1.tgz: Upgraded.
Patched for new version of GTK+. Thanks to yenn.
xap/pan-0.139-arm-2.tgz: Rebuilt.
xap/sane-1.0.23-arm-1.tgz: Upgraded.
xap/windowmaker-0.95.4-arm-1.tgz: Upgraded.
xap/xine-lib-1.1.21-arm-2.tgz: Rebuilt.
xap/xlockmore-5.42-arm-1.tgz: Upgraded.
xap/xpdf-3.03-arm-1.tgz: Upgraded.
Fixed patch to xpdfrc for Japanese language support.
Thanks to ABE Shin-ichi.
xap/xsane-0.998-arm-4.tgz: Rebuilt.
xap/xscreensaver-5.21-arm-1.tgz: Upgraded.
xfce/Thunar-1.6.2-arm-1.tgz: Upgraded.
xfce/exo-0.10.2-arm-1.tgz: Upgraded.
xfce/gtk-xfce-engine-3.0.1-arm-1.tgz: Upgraded.
xfce/orage-4.8.4-arm-1.tgz: Upgraded.
xfce/tumbler-0.1.25-arm-2.tgz: Rebuilt.
Reverted to tumbler-0.1.25, since later versions require gstreamer-1.0, and
patched a bug that caused tumbler to hold files open preventing volumes from
being ejected.
xfe/Terminal-0.4.8-arm-1.tgz: Removed.
xfce/xfce4-terminal-0.6.1-arm-1.tgz: Added.
xfce/xfce4-weather-plugin-0.8.3-arm-1.tgz: Upgraded.
xfce/xfdesktop-4.10.2-arm-1.tgz: Upgraded.
xfce/xfwm4-4.10.0-arm-2.tgz: Rebuilt.
Patched mouse bug with GTK+3 apps. Thanks to Per-Arne Hognert.
extra/brltty/brltty-4.4-arm-2.tgz: Rebuilt.
extra/gcc-4.8.0/gcc-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-g++-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-go-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-java-4.8.0-arm-1.tgz: Upgraded.
extra/gcc-4.8.0/gcc-objc-4.8.0-arm-1.tgz: Upgraded.
extra/partitionmanager/partitionmanager-1.0.3_20130328svn-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Thu Mar 21 18:09:45 UTC 2013
a/ed-1.7-arm-1.tgz: Upgraded.
a/gettext-0.18.2.1-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.8.4_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.8.4_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.8.4_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.8.4-arm-1.tgz: Upgraded.
a/kernel_tegra-3.8.4-arm-1.tgz: Upgraded.
a/kernel_versatile-3.8.4-arm-1.tgz: Upgraded.
ap/hplip-3.13.3-arm-1.tgz: Upgraded.
ap/htop-1.0.2-arm-1.tgz: Upgraded.
ap/sqlite-3071600-arm-1.tgz: Upgraded.
ap/zsh-5.0.2-arm-1.tgz: Upgraded.
d/doxygen-1.8.3.1-arm-1.tgz: Upgraded.
d/flex-2.5.37-arm-1.tgz: Upgraded.
d/gettext-tools-0.18.2.1-arm-1.tgz: Upgraded.
k/kernel-source-3.8.4-arm-1.tgz: Upgraded.
kde/calligra-2.6.2-arm-2.tgz: Rebuilt.
l/loudmouth-1.5.0_20121201-arm-1.tgz: Upgraded.
l/mpfr-3.1.2-arm-1.tgz: Upgraded.
n/alpine-2.03-arm-1.tgz: Upgraded.
n/bluez-4.99-arm-3.tgz: Rebuilt.
Install etc/bluetooth/rfcomm.conf as a '.new' file as it is on x86.
n/imapd-2.03-arm-1.tgz: Upgraded.
n/iproute2-3.8.0-arm-1.tgz: Upgraded.
n/lftp-4.4.5-arm-1.tgz: Upgraded.
n/mcabber-0.10.2-arm-1.tgz: Upgraded.
x/glew-1.9.0-arm-1.tgz: Upgraded.
x/mesa-9.1.1-arm-1.tgz: Upgraded.
xap/ddd-3.3.12-arm-1.tgz: Added.
xap/xxgdb-1.12-arm-3.tgz: Removed.
This is old and unmaintained. We've replaced it with ddd, a much better
frontend for the gdb debugger.
xap/gnuchess-6.0.3-arm-1.tgz: Upgraded.
Upgraded to gnuchess-6.0.3 and xboard-4.7.0.
xap/gv-3.7.4-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Mar 17 14:19:11 UTC 2013
a/dosfstools-3.0.16-arm-1.tgz: Upgraded.
a/glibc-solibs-2.17-arm-3.tgz: Rebuilt.
Minimum kernel is now Linux 3.4.0.
a/sysvinit-scripts-2.0-noarch-10.tgz: Rebuilt.
Removed a crufty '.orig' file.
ap/slackpkg-2.82.0-arm-6.tgz: Rebuilt.
Added a new Slackware ARM mirror to the sample configuration.
d/git-1.8.2-arm-1.tgz: Upgraded.
d/perl-5.16.3-arm-1.tgz: Upgraded.
This update fixes a flaw in the rehashing code that can be exploited
to carry out a denial of service attack against code that uses arbitrary
user input as hash keys.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
(* Security fix *)
d/ruby-1.9.3_p392-arm-1.tgz: Upgraded.
This release includes security fixes about bundled JSON and REXML.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821
(* Security fix *)
kde/calligra-2.6.2-arm-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.6.2-noarch-1.tgz: Added.
kdei/calligra-*-2.6.2-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-3.tgz: Rebuilt.
Minimum kernel is now Linux 3.4.0.
l/glibc-i18n-2.17-arm-3.tgz: Rebuilt.
l/glibc-profile-2.17-arm-3.tgz: Rebuilt.
x/inputproto-2.3-arm-1.tgz: Upgraded.
x/libXi-1.7-arm-1.tgz: Upgraded.
x/scim-bridge-0.4.16-arm-4.tgz: Removed.
This functionality was included in scim-1.4.14.
x/scim-1.4.14-arm-3.tgz: Rebuilt.
Updated scim profile scripts to use scim as the GTK_IM_MODULE rather than
scim-bridge (which was removed). Thanks to Thomas Choi.
x/xf86-input-acecad-1.5.0-arm-3.tgz: Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-3.tgz: Rebuilt.
x/xf86-input-evdev-2.7.3-arm-2.tgz: Rebuilt.
x/xf86-input-joystick-1.6.1-arm-3.tgz: Rebuilt.
x/xf86-input-keyboard-1.6.2-arm-2.tgz: Rebuilt.
x/xf86-input-mouse-1.8.1-arm-2.tgz: Rebuilt.
x/xf86-input-penmount-1.5.0-arm-3.tgz: Rebuilt.
x/xf86-input-synaptics-1.6.3-arm-2.tgz: Rebuilt.
x/xf86-input-void-1.4.0-arm-3.tgz: Rebuilt.
x/xf86-input-wacom-0.19.0-arm-2.tgz: Rebuilt.
x/xf86-video-apm-1.2.5-arm-2.tgz: Rebuilt.
x/xf86-video-ark-0.7.5-arm-2.tgz: Rebuilt.
x/xf86-video-ast-0.97.0-arm-2.tgz: Rebuilt.
x/xf86-video-ati-7.1.0-arm-2.tgz: Rebuilt.
x/xf86-video-chips-1.2.5-arm-2.tgz: Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-2.tgz: Rebuilt.
x/xf86-video-dummy-0.3.6-arm-2.tgz: Rebuilt.
x/xf86-video-fbdev-0.4.3-arm-4.tgz: Rebuilt.
x/xf86-video-glint-1.2.8-arm-2.tgz: Rebuilt.
x/xf86-video-i128-1.3.6-arm-2.tgz: Rebuilt.
x/xf86-video-i740-1.3.4-arm-2.tgz: Rebuilt.
x/xf86-video-mach64-6.9.4-arm-2.tgz: Rebuilt.
x/xf86-video-mga-1.6.2-arm-2.tgz: Rebuilt.
x/xf86-video-modesetting-0.6.0-arm-2.tgz: Rebuilt.
x/xf86-video-neomagic-1.2.7-arm-2.tgz: Rebuilt.
x/xf86-video-nv-2.1.20-arm-3.tgz: Rebuilt.
x/xf86-video-openchrome-0.3.1-arm-2.tgz: Rebuilt.
x/xf86-video-r128-6.9.1-arm-2.tgz: Rebuilt.
x/xf86-video-rendition-4.2.5-arm-2.tgz: Rebuilt.
x/xf86-video-s3-0.6.5-arm-2.tgz: Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-2.tgz: Rebuilt.
x/xf86-video-savage-2.3.6-arm-2.tgz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-2.tgz: Rebuilt.
x/xf86-video-sis-0.10.7-arm-2.tgz: Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-2.tgz: Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-2.tgz: Rebuilt.
x/xf86-video-tga-1.2.2-arm-2.tgz: Rebuilt.
x/xf86-video-trident-1.3.6-arm-2.tgz: Rebuilt.
x/xf86-video-tseng-1.2.5-arm-2.tgz: Rebuilt.
x/xf86-video-v4l-0.2.0-arm-3.tgz: Rebuilt.
x/xf86-video-vesa-2.3.2-arm-2.tgz: Rebuilt.
x/xf86-video-vmware-13.0.0-arm-2.tgz: Rebuilt.
x/xf86-video-voodoo-1.2.5-arm-2.tgz: Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-3.tgz: Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-2.tgz: Rebuilt.
x/xorg-server-1.14.0-arm-1.tgz: Upgraded.
Dropped the broken randr patch for panning/scaling. According to the
release notes, a different fix was merged upstream.
Dropped randr cleanup patch that was merged upstream.
x/xorg-server-xephyr-1.14.0-arm-1.tgz: Upgraded.
x/xorg-server-xnest-1.14.0-arm-1.tgz: Upgraded.
x/xorg-server-xvfb-1.14.0-arm-1.tgz: Upgraded.
x/xterm-291-arm-1.tgz: Upgraded.
+--------------------------+
Wed Mar 13 19:43:40 UTC 2013
The mini root filesystem for -current has also been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
a/glibc-solibs-2.17-arm-2.tgz: Rebuilt.
a/glibc-zoneinfo-2013b-noarch-1.tgz: Rebuilt.
a/vboot-utils-20130222gite6cf2c2-arm-1.tgz: Added.
These are tools to help install another Linux distribution (in our case,
Slackware!) on to the Google/Samsung Chromebook 2012 ARM version. I have
one of these arriving tomorrow so plan on working on this immediately!
e/emacs-24.3-arm-1.tgz: Upgraded.
kde/amarok-2.7.0-arm-2.tgz: Rebuilt.
kde/ark-4.10.1-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.1-arm-1.tgz: Upgraded.
kde/blinken-4.10.1-arm-2.tgz: Rebuilt.
kde/bluedevil-1.3-arm-2.tgz: Rebuilt.
kde/bomber-4.10.1-arm-1.tgz: Upgraded.
kde/bovo-4.10.1-arm-1.tgz: Upgraded.
kde/calligra-2.6.1-arm-1.tgz: Upgraded.
kde/cantor-4.10.1-arm-2.tgz: Rebuilt.
kde/dragon-4.10.1-arm-1.tgz: Upgraded.
kde/filelight-4.10.1-arm-1.tgz: Upgraded.
kde/granatier-4.10.1-arm-1.tgz: Upgraded.
kde/gwenview-4.10.1-arm-1.tgz: Upgraded.
kde/juk-4.10.1-arm-1.tgz: Upgraded.
kde/k3b-2.0.2_20120226.git-arm-2.tgz: Rebuilt.
kde/kaccessible-4.10.1-arm-1.tgz: Upgraded.
kde/kactivities-4.10.1-arm-1.tgz: Upgraded.
kde/kajongg-4.10.1-arm-1.tgz: Upgraded.
kde/kamera-4.10.1-arm-1.tgz: Upgraded.
kde/kapman-4.10.1-arm-1.tgz: Upgraded.
kde/kate-4.10.1-arm-1.tgz: Upgraded.
kde/katomic-4.10.1-arm-1.tgz: Upgraded.
kde/kaudiocreator-1.3-arm-2.tgz: Rebuilt.
kde/kblackbox-4.10.1-arm-1.tgz: Upgraded.
kde/kblocks-4.10.1-arm-1.tgz: Upgraded.
kde/kbounce-4.10.1-arm-1.tgz: Upgraded.
kde/kbreakout-4.10.1-arm-1.tgz: Upgraded.
kde/kcalc-4.10.1-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.1-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.1-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.1-arm-1.tgz: Upgraded.
kde/kde-baseapps-4.10.1-arm-1.tgz: Upgraded.
kde/kde-runtime-4.10.1-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.1-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.1-arm-1.tgz: Upgraded.
kde/kdeadmin-4.10.1-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.1-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.1-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.1-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.1-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.1-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.1-arm-1.tgz: Upgraded.
kde/kdepim-4.10.1-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.1-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.1-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.1-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.1-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.1-arm-1.tgz: Upgraded.
kde/kdevelop-4.4.1-arm-2.tgz: Rebuilt.
kde/kdevelop-pg-qt-1.0.0-arm-2.tgz: Rebuilt.
kde/kdevplatform-1.4.1-arm-2.tgz: Rebuilt.
kde/kdewebdev-4.10.1-arm-1.tgz: Upgraded.
kde/kdf-4.10.1-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.1-arm-1.tgz: Upgraded.
kde/kfloppy-4.10.1-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.1-arm-1.tgz: Upgraded.
kde/kgamma-4.10.1-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.1-arm-1.tgz: Upgraded.
kde/kgpg-4.10.1-arm-1.tgz: Upgraded.
kde/kigo-4.10.1-arm-1.tgz: Upgraded.
kde/killbots-4.10.1-arm-1.tgz: Upgraded.
kde/kio-mtp-fae62fc_20121225git-arm-2.tgz: Rebuilt.
kde/kiriki-4.10.1-arm-1.tgz: Upgraded.
kde/kjumpingcube-4.10.1-arm-1.tgz: Upgraded.
kde/klickety-4.10.1-arm-1.tgz: Upgraded.
kde/klines-4.10.1-arm-1.tgz: Upgraded.
kde/kmag-4.10.1-arm-1.tgz: Upgraded.
kde/kmahjongg-4.10.1-arm-1.tgz: Upgraded.
kde/kmines-4.10.1-arm-1.tgz: Upgraded.
kde/kmix-4.10.1-arm-1.tgz: Upgraded.
kde/kmousetool-4.10.1-arm-1.tgz: Upgraded.
kde/kmouth-4.10.1-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.1-arm-1.tgz: Upgraded.
kde/knetwalk-4.10.1-arm-1.tgz: Upgraded.
kde/kolf-4.10.1-arm-1.tgz: Upgraded.
kde/kollision-4.10.1-arm-1.tgz: Upgraded.
kde/kolourpaint-4.10.1-arm-1.tgz: Upgraded.
kde/konquest-4.10.1-arm-1.tgz: Upgraded.
kde/konsole-4.10.1-arm-1.tgz: Upgraded.
kde/korundum-4.10.1-arm-1.tgz: Upgraded.
kde/kpat-4.10.1-arm-1.tgz: Upgraded.
kde/kplayer-0.7.2-arm-2.tgz: Rebuilt.
kde/kremotecontrol-4.10.1-arm-1.tgz: Upgraded.
kde/kreversi-4.10.1-arm-1.tgz: Upgraded.
kde/kross-interpreters-4.10.1-arm-1.tgz: Upgraded.
kde/kruler-4.10.1-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.1-arm-1.tgz: Upgraded.
kde/kscreen-0.0.71-arm-2.tgz: Rebuilt.
kde/kshisen-4.10.1-arm-1.tgz: Upgraded.
kde/ksirk-4.10.1-arm-1.tgz: Upgraded.
kde/ksnakeduel-4.10.1-arm-1.tgz: Upgraded.
kde/ksnapshot-4.10.1-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.1-arm-1.tgz: Upgraded.
kde/ksquares-4.10.1-arm-1.tgz: Upgraded.
kde/ksudoku-4.10.1-arm-1.tgz: Upgraded.
kde/ktimer-4.10.1-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-2.tgz: Rebuilt.
kde/ktuberling-4.10.1-arm-1.tgz: Upgraded.
kde/kubrick-4.10.1-arm-1.tgz: Upgraded.
kde/kwallet-4.10.1-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-2.tgz: Rebuilt.
kde/libkcddb-4.10.1-arm-1.tgz: Upgraded.
kde/libkcompactdisc-4.10.1-arm-1.tgz: Upgraded.
kde/libkdcraw-4.10.1-arm-1.tgz: Upgraded.
kde/libkdeedu-4.10.1-arm-2.tgz: Rebuilt.
kde/libkdegames-4.10.1-arm-1.tgz: Upgraded.
kde/libkexiv2-4.10.1-arm-1.tgz: Upgraded.
kde/libkipi-4.10.1-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.1-arm-1.tgz: Upgraded.
kde/libksane-4.10.1-arm-1.tgz: Upgraded.
kde/libkscreen-0.0.71-arm-2.tgz: Rebuilt.
kde/libktorrent-1.3.1-arm-3.tgz: Rebuilt.
kde/lskat-4.10.1-arm-1.tgz: Upgraded.
kde/mplayerthumbs-4.10.1-arm-1.tgz: Upgraded.
kde/nepomuk-core-4.10.1-arm-1.tgz: Upgraded.
kde/nepomuk-widgets-4.10.1-arm-1.tgz: Upgraded.
kde/networkmanagement-0.9.0-arm-2.tgz: Rebuilt.
kde/okular-4.10.1-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.1-arm-2.tgz: Rebuilt.
kde/oxygen-gtk3-1.1.1-arm-2.tgz: Rebuilt.
kde/oxygen-icons-4.10.1-arm-1.tgz: Upgraded.
kde/palapeli-4.10.1-arm-1.tgz: Upgraded.
kde/perlkde-4.10.1-arm-1.tgz: Upgraded.
kde/perlqt-4.10.1-arm-1.tgz: Upgraded.
kde/picmi-4.10.1-arm-1.tgz: Upgraded.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz: Rebuilt.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz: Rebuilt.
kde/print-manager-4.10.1-arm-1.tgz: Upgraded.
kde/qtruby-4.10.1-arm-1.tgz: Upgraded.
kde/quanta-29a3f8e_20111223git-arm-2.tgz: Rebuilt.
kde/rocs-4.10.1-arm-1.tgz: Upgraded.
kde/skanlite-0.9-arm-2.tgz: Rebuilt.
kde/smokegen-4.10.1-arm-1.tgz: Upgraded.
kde/smokekde-4.10.1-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.1-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.1-arm-1.tgz: Upgraded.
kde/svgpart-4.10.1-arm-1.tgz: Upgraded.
kde/sweeper-4.10.1-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz: Rebuilt.
kdei/calligra-l10n-*-2.6.1-noarch-1.tgz: Upgraded.
kdei/kde-*-4.10.1-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-2.tgz: Rebuilt.
l/glibc-i18n-2.17-arm-2.tgz: Rebuilt.
l/glibc-profile-2.17-arm-2.tgz: Rebuilt.
+--------------------------+
Thu Mar 7 19:10:43 UTC 2013
ap/sudo-1.8.6p7-arm-1.tgz: Upgraded.
This update fixes security issues that could allow a user to run commands
without authenticating after the password timeout has already expired.
Note that the vulnerability did not permit a user to run commands other
than those allowed by the sudoers policy.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776
(* Security fix *)
+--------------------------+
Mon Mar 4 19:34:16 UTC 2013
ap/cdrtools-3.01a13-arm-1.tgz: Upgraded.
l/apr-util-1.5.1-arm-1.tgz: Upgraded.
n/httpd-2.4.4-arm-1.tgz: Upgraded.
This update provides bugfixes and enhancements.
Two security issues are fixed:
* Various XSS flaws due to unescaped hostnames and URIs HTML output in
mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
[Jim Jagielski, Stefan Fritsch, Niels Heinen <heinenn google com>]
* XSS in mod_proxy_balancer manager interface. [Jim Jagielski,
Niels Heinen <heinenn google com>]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
(* Security fix *)
n/php-5.4.12-arm-1.tgz: Upgraded.
x/fontconfig-2.10.2-arm-2.tgz: Rebuilt.
Applied patch from upstream git to fix 10-autohint.conf.
+--------------------------+
Fri Mar 1 19:01:23 UTC 2013
Lots of X updates in this batch! We were finally able to upgrade to the
latest cairo (including the long-requested XCB backend), as the text
corruption bug that was preventing that was fixed in the upstream X server.
We've also upgraded to the latest libdrm and Mesa. Don't miss the new glu
package -- that was previously part of Mesa, and there are a lot of things
that link to it. Thanks to Robby Workman for all the help with this.
a/coreutils-8.21-arm-1.tgz: Upgraded.
a/dosfstools-3.0.15-arm-1.tgz: Upgraded.
a/eject-2.1.5-arm-5.tgz: Rebuilt.
Patched to fix -T. Thanks to GazL.
a/libcgroup-0.38-arm-2.tgz: Rebuilt.
Use full path to /usr/sbin/cgclear, since /usr/sbin isn't in the $PATH
when the script is called at shutdown/reboot. Thanks to LukenShiro.
ap/groff-1.22.2-arm-1.tgz: Upgraded.
d/git-1.8.1.4-arm-1.tgz: Upgraded.
l/cairo-1.12.14-arm-1.tgz: Upgraded.
l/slang-2.2.4-arm-2.tgz: Rebuilt.
Recompiled with -fno-tree-dse to avoid optimization bugs.
Thanks to Petri Kaukasoina.
x/bdftopcf-1.0.4-arm-1.tgz: Upgraded.
x/beforelight-1.0.5-arm-1.tgz: Upgraded.
x/dri2proto-2.8-arm-1.tgz: Upgraded.
x/editres-1.0.6-arm-1.tgz: Upgraded.
x/fontconfig-2.10.2-arm-1.tgz: Upgraded.
Create the symlinks in doinst.sh before running fc-cache.
Don't include /usr/share/fonts in the fonts.conf font directory list as that
causes bitmapped fonts to be used. Thanks to Iouri Kharon.
x/glproto-1.4.16-arm-1.tgz: Upgraded.
x/glu-9.0.0-arm-1.tgz: Added.
This used to be part of Mesa, but was split out.
x/ico-1.0.4-arm-1.tgz: Upgraded.
x/libXcm-0.5.2-arm-1.tgz: Upgraded.
x/libXcomposite-0.4.4-arm-1.tgz: Upgraded.
x/libXdamage-1.1.4-arm-1.tgz: Upgraded.
x/libXi-1.6.2-arm-1.tgz: Upgraded.
x/libXrandr-1.4.0-arm-1.tgz: Upgraded.
x/libdrm-2.4.42-arm-1.tgz: Upgraded.
x/libxcb-1.9-arm-1.tgz: Upgraded.
x/mesa-9.1-arm-1.tgz: Upgraded.
x/mtdev-1.1.3-arm-1.tgz: Upgraded.
x/pixman-0.28.2-arm-1.tgz: Upgraded.
x/randrproto-1.4.0-arm-1.tgz: Upgraded.
x/rgb-1.0.5-arm-1.tgz: Upgraded.
x/sessreg-1.0.8-arm-1.tgz: Upgraded.
x/showfont-1.0.4-arm-1.tgz: Upgraded.
x/ttf-indic-fonts-0.5.14-arm-1.tgz: Upgraded.
x/viewres-1.0.4-arm-1.tgz: Upgraded.
x/wqy-zenhei-font-ttf-0.9.45-noarch-1.tgz: Upgraded.
x/xbacklight-1.2.0-arm-1.tgz: Upgraded.
x/xcalc-1.0.5-arm-1.tgz: Upgraded.
x/xcb-proto-1.8-arm-1.tgz: Upgraded.
x/xcm-0.5.2-arm-1.tgz: Added.
x/xconsole-1.0.5-arm-1.tgz: Upgraded.
x/xditview-1.0.3-arm-1.tgz: Upgraded.
x/xedit-1.2.1-arm-1.tgz: Upgraded.
x/xf86-input-acecad-1.5.0-arm-2.tgz: Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-2.tgz: Rebuilt.
x/xf86-input-evdev-2.7.3-arm-1.tgz: Upgraded.
x/xf86-input-joystick-1.6.1-arm-2.tgz: Rebuilt.
x/xf86-input-keyboard-1.6.2-arm-1.tgz: Upgraded.
x/xf86-input-mouse-1.8.1-arm-1.tgz: Upgraded.
x/xf86-input-penmount-1.5.0-arm-2.tgz: Rebuilt.
x/xf86-input-synaptics-1.6.3-arm-1.tgz: Upgraded.
x/xf86-input-void-1.4.0-arm-2.tgz: Rebuilt.
x/xf86-input-wacom-0.19.0-arm-1.tgz: Upgraded.
x/xf86-video-apm-1.2.5-arm-1.tgz: Upgraded.
x/xf86-video-ark-0.7.5-arm-1.tgz: Upgraded.
x/xf86-video-ast-0.97.0-arm-1.tgz: Upgraded.
x/xf86-video-ati-7.1.0-arm-1.tgz: Upgraded.
x/xf86-video-chips-1.2.5-arm-1.tgz: Upgraded.
x/xf86-video-cirrus-1.5.2-arm-1.tgz: Upgraded.
x/xf86-video-dummy-0.3.6-arm-1.tgz: Upgraded.
x/xf86-video-fbdev-0.4.3-arm-2.tgz: Rebuilt.
x/xf86-video-glint-1.2.8-arm-1.tgz: Upgraded.
x/xf86-video-i128-1.3.6-arm-1.tgz: Upgraded.
x/xf86-video-i740-1.3.4-arm-1.tgz: Upgraded.
x/xf86-video-mach64-6.9.4-arm-1.tgz: Upgraded.
x/xf86-video-mga-1.6.2-arm-1.tgz: Upgraded.
x/xf86-video-modesetting-0.6.0-arm-1.tgz: Upgraded.
x/xf86-video-neomagic-1.2.7-arm-1.tgz: Upgraded.
x/xf86-video-nv-2.1.20-arm-2.tgz: Rebuilt.
x/xf86-video-openchrome-0.3.1-arm-1.tgz: Upgraded.
Merged upstream patch to fix lockups with some chipsets.
Thanks to J. Scott Heppler.
x/xf86-video-r128-6.9.1-arm-1.tgz: Upgraded.
x/xf86-video-rendition-4.2.5-arm-1.tgz: Upgraded.
x/xf86-video-s3-0.6.5-arm-1.tgz: Upgraded.
x/xf86-video-s3virge-1.10.6-arm-1.tgz: Upgraded.
x/xf86-video-savage-2.3.6-arm-1.tgz: Upgraded.
x/xf86-video-siliconmotion-1.7.7-arm-1.tgz: Upgraded.
x/xf86-video-sis-0.10.7-arm-1.tgz: Upgraded.
x/xf86-video-sisusb-0.9.6-arm-1.tgz: Added.
x/xf86-video-tdfx-1.4.5-arm-1.tgz: Upgraded.
x/xf86-video-tga-1.2.2-arm-1.tgz: Upgraded.
x/xf86-video-trident-1.3.6-arm-1.tgz: Upgraded.
x/xf86-video-tseng-1.2.5-arm-1.tgz: Added.
x/xf86-video-v4l-0.2.0-arm-2.tgz: Rebuilt.
x/xf86-video-vesa-2.3.2-arm-1.tgz: Upgraded.
x/xf86-video-vmware-13.0.0-arm-1.tgz: Upgraded.
x/xf86-video-voodoo-1.2.5-arm-1.tgz: Upgraded.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-2.tgz: Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-1.tgz: Added.
x/xfsinfo-1.0.4-arm-1.tgz: Upgraded.
x/xkbutils-1.0.4-arm-1.tgz: Upgraded.
x/xmag-1.0.5-arm-1.tgz: Upgraded.
x/xmessage-1.0.4-arm-1.tgz: Upgraded.
x/xorg-server-1.13.2-arm-2.tgz: Rebuilt.
Clean up randr provider removal, fixing a number of random server crashes
on shutdown. Thanks to Richard David Sherman and Robby Workman.
Applied a patch to fix panning and scaling.
Thanks to David Allen and Luigi Genoni.
x/xorg-server-xephyr-1.13.2-arm-2.tgz: Rebuilt.
x/xorg-server-xnest-1.13.2-arm-2.tgz: Rebuilt.
x/xorg-server-xvfb-1.13.2-arm-2.tgz: Rebuilt.
x/xrandr-1.4.0-arm-1.tgz: Upgraded.
x/xscope-1.4-arm-1.tgz: Upgraded.
x/xsetroot-1.1.1-arm-1.tgz: Upgraded.
x/xsm-1.0.3-arm-1.tgz: Upgraded.
x/xstdcmap-1.0.3-arm-1.tgz: Upgraded.
x/xterm-290-arm-1.tgz: Upgraded.
x/xvidtune-1.0.3-arm-1.tgz: Upgraded.
x/xvinfo-1.1.2-arm-1.tgz: Upgraded.
+--------------------------+
Wed Feb 20 08:14:16 UTC 2013
a/gpm-1.20.7-arm-2.tgz: Rebuilt.
Fixed libgpm.so symlink.
ap/terminus-font-4.38-noarch-1.tgz: Added.
extra/openjdk/openjdk-7u13_b20-armhfp-1.txz: Upgraded.
Please note that these packages are named "hfp" because I believe that, from
testing, they only run on machines with a hardware floating point unit.
We've been unable to help determine why these packages do not work nor build
on armv5 machines.
These OpenJDK/JRE packages fix many security issues:
S6563318, CVE-2013-0424: RMI data sanitization.
S6664509, CVE-2013-0425: Add logging context.
S6664528, CVE-2013-0426: Find log level matching its name or value given
at construction time.
S6776941, CVE-2013-0427: Improve thread pool shutdown.
S7141694, CVE-2013-0429: Improving CORBA internals.
S7173145: Improve in-memory representation of splashscreens.
S7186945: Unpack200 improvement.
S7186946: Refine unpacker resource usage.
S7186948: Improve Swing data validation.
S7186952, CVE-2013-0432: Improve clipboard access.
S7186954: Improve connection performance.
S7186957: Improve Pack200 data validation.
S7192392, CVE-2013-0443: Better validation of client keys.
S7192393, CVE-2013-0440: Better Checking of order of TLS Messages.
S7192977, CVE-2013-0442: Issue in toolkit thread.
S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies.
S7200491: Tighten up JTable layout code.
S7200500: Launcher better input validation.
S7201064: Better dialogue checking.
S7201066, CVE-2013-0441: Change modifiers on unused fields.
S7201068, CVE-2013-0435: Better handling of UI elements.
S7201070: Serialization to conform to protocol.
S7201071, CVE-2013-0433: InetSocketAddress serialization issue.
S8000210: Improve JarFile code quality.
S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class.
S8000540, CVE-2013-1475: Improve IIOP type reuse management.
S8000631, CVE-2013-1476: Restrict access to class constructor.
S8001235, CVE-2013-0434: Improve JAXP HTTP handling.
S8001242: Improve RMI HTTP conformance.
S8001307: Modify ACC_SUPER behavior.
S8001972, CVE-2013-1478: Improve image processing.
S8002325, CVE-2013-1480: Improve management of images.
(* Security fix *)
extra/openjdk/openjre-7u13_b20-armhfp-1.txz: Upgraded.
(* Security fix *)
+--------------------------+
Mon Feb 18 20:38:09 UTC 2013
KDE has been upgraded to version 4.10.0. The 'kdeedu' packages are missing
because 'analitza' would not build on ARM. I will revisit this later. 'KWin'
also segfaults upon launching KDE as with the previous KDE versions, but seems to
cause no ill effects after closing the dialog box!
I've been keen to get the 'gcc-go' package built (it had been absent because it
required a minimum of glibc-2.16 on ARM), so glibc has been upgraded to
version 2.17. We've jumped the gun a little here since Slackware x86 hasn't yet
made this jump. However, the 2.17 components should more or less the same sources
that make it into the x86 tree in the near future.
The mini root filesystem for -current has also been updated.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
a/glibc-solibs-2.17-arm-1.tgz: Upgraded.
You must be running at least Linux 3.4.11 before applying this update.
a/glibc-zoneinfo-2012j-noarch-1.tgz: Upgraded.
a/gpm-1.20.7-arm-1.tgz: Upgraded.
This bumps the shared library version number, and will require
several other packages to be recompiled. This will be done after
there's been some time to test this in -current. Meanwhile, things
should continue to work normally with the old shared library in
the aaa_elflibs package.
a/kernel-modules-kirkwood-3.7.9_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.7.9_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.7.9_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.7.9-arm-1.tgz: Upgraded.
a/kernel_tegra-3.7.9-arm-1.tgz: Upgraded.
a/kernel_versatile-3.7.9-arm-1.tgz: Upgraded.
ap/hplip-3.13.2-arm-1.tgz: Upgraded.
d/gcc-4.7.2-arm-3.tgz: Rebuilt.
d/gcc-g++-4.7.2-arm-3.tgz: Rebuilt.
d/gcc-gfortran-4.7.2-arm-3.tgz: Rebuilt.
d/gcc-gnat-4.7.2-arm-3.tgz: Rebuilt.
d/gcc-go-4.7.2-arm-3.tgz: Added.
d/gcc-java-4.7.2-arm-3.tgz: Rebuilt.
d/gcc-objc-4.7.2-arm-3.tgz: Rebuilt.
d/git-1.8.1.3-arm-1.tgz: Upgraded.
d/kernel-headers-3.7.9-arm-1.tgz: Upgraded.
k/kernel-source-3.7.9-arm-1.tgz: Upgraded.
kde/amarok-2.7.0-arm-1.tgz: Upgraded.
kde/ark-4.10.0-arm-1.tgz: Upgraded.
kde/audiocd-kio-4.10.0-arm-1.tgz: Added.
kde/bluedevil-1.3-arm-1.tgz: Upgraded.
kde/bomber-4.10.0-arm-1.tgz: Added.
kde/bovo-4.10.0-arm-1.tgz: Added.
kde/calligra-2.6.0-arm-1.tgz: Upgraded.
kde/dragon-4.10.0-arm-1.tgz: Added.
kde/filelight-4.10.0-arm-1.tgz: Upgraded.
kde/granatier-4.10.0-arm-1.tgz: Added.
kde/gwenview-4.10.0-arm-1.tgz: Upgraded.
kde/juk-4.10.0-arm-1.tgz: Added.
kde/k3b-2.0.2_20120226.git-arm-1.tgz: Upgraded.
kde/kaccessible-4.10.0-arm-1.tgz: Upgraded.
kde/kactivities-4.10.0-arm-1.tgz: Upgraded.
kde/kajongg-4.10.0-arm-1.tgz: Added.
kde/kamera-4.10.0-arm-1.tgz: Upgraded.
kde/kapman-4.10.0-arm-1.tgz: Added.
kde/kate-4.10.0-arm-1.tgz: Upgraded.
kde/katomic-4.10.0-arm-1.tgz: Added.
kde/kaudiocreator-1.3-arm-1.tgz: Upgraded.
kde/kblackbox-4.10.0-arm-1.tgz: Added.
kde/kblocks-4.10.0-arm-1.tgz: Added.
kde/kbounce-4.10.0-arm-1.tgz: Added.
kde/kbreakout-4.10.0-arm-1.tgz: Added.
kde/kcalc-4.10.0-arm-1.tgz: Upgraded.
kde/kcharselect-4.10.0-arm-1.tgz: Upgraded.
kde/kcolorchooser-4.10.0-arm-1.tgz: Upgraded.
kde/kde-base-artwork-4.10.0-arm-1.tgz: Added.
kde/kde-baseapps-4.10.0-arm-1.tgz: Upgraded.
kde/kde-runtime-4.10.0-arm-1.tgz: Upgraded.
kde/kde-wallpapers-4.10.0-noarch-1.tgz: Upgraded.
kde/kde-workspace-4.10.0-arm-1.tgz: Upgraded.
kde/kdeadmin-4.10.0-arm-1.tgz: Upgraded.
kde/kdeartwork-4.10.0-arm-1.tgz: Upgraded.
kde/kdegraphics-mobipocket-4.10.0-arm-1.tgz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.10.0-arm-1.tgz: Upgraded.
kde/kdegraphics-thumbnailers-4.10.0-arm-1.tgz: Upgraded.
kde/kdelibs-4.10.0-arm-1.tgz: Upgraded.
kde/kdenetwork-4.10.0-arm-1.tgz: Upgraded.
kde/kdepim-4.10.0-arm-1.tgz: Upgraded.
kde/kdepim-runtime-4.10.0-arm-1.tgz: Upgraded.
kde/kdepimlibs-4.10.0-arm-1.tgz: Upgraded.
kde/kdeplasma-addons-4.10.0-arm-1.tgz: Upgraded.
kde/kdesdk-4.10.0-arm-1.tgz: Upgraded.
kde/kdetoys-4.10.0-arm-1.tgz: Upgraded.
kde/kdevelop-4.4.1-arm-1.tgz: Upgraded.
kde/kdevelop-pg-qt-1.0.0-arm-1.tgz: Upgraded.
kde/kdevplatform-1.4.1-arm-1.tgz: Upgraded.
kde/kdewebdev-4.10.0-arm-1.tgz: Upgraded.
kde/kdf-4.10.0-arm-1.tgz: Upgraded.
kde/kdiamond-4.10.0-arm-1.tgz: Added.
kde/kfloppy-4.10.0-arm-1.tgz: Upgraded.
kde/kfourinline-4.10.0-arm-1.tgz: Added.
kde/kgamma-4.10.0-arm-1.tgz: Upgraded.
kde/kgoldrunner-4.10.0-arm-1.tgz: Added.
kde/kgpg-4.10.0-arm-1.tgz: Upgraded.
kde/kigo-4.10.0-arm-1.tgz: Added.
kde/killbots-4.10.0-arm-1.tgz: Added.
kde/kio-mtp-fae62fc_20121225git-arm-1.tgz: Added.
kde/kiriki-4.10.0-arm-1.tgz: Added.
kde/kjumpingcube-4.10.0-arm-1.tgz: Added.
kde/klickety-4.10.0-arm-1.tgz: Added.
kde/klines-4.10.0-arm-1.tgz: Added.
kde/kmag-4.10.0-arm-1.tgz: Added.
kde/kmahjongg-4.10.0-arm-1.tgz: Added.
kde/kmines-4.10.0-arm-1.tgz: Added.
kde/kmix-4.10.0-arm-1.tgz: Added.
kde/kmousetool-4.10.0-arm-1.tgz: Upgraded.
kde/kmouth-4.10.0-arm-1.tgz: Upgraded.
kde/knavalbattle-4.10.0-arm-1.tgz: Added.
kde/knetwalk-4.10.0-arm-1.tgz: Added.
kde/kolf-4.10.0-arm-1.tgz: Added.
kde/kollision-4.10.0-arm-1.tgz: Added.
kde/kolourpaint-4.10.0-arm-1.tgz: Upgraded.
kde/konquest-4.10.0-arm-1.tgz: Added.
kde/konsole-4.10.0-arm-1.tgz: Upgraded.
kde/korundum-4.10.0-arm-1.tgz: Upgraded.
kde/kpat-4.10.0-arm-1.tgz: Added.
kde/kplayer-0.7.2-arm-1.tgz: Upgraded.
kde/kremotecontrol-4.10.0-arm-1.tgz: Upgraded.
kde/kreversi-4.10.0-arm-1.tgz: Added.
kde/kross-interpreters-4.10.0-arm-1.tgz: Added.
kde/kruler-4.10.0-arm-1.tgz: Upgraded.
kde/ksaneplugin-4.10.0-arm-1.tgz: Upgraded.
kde/kscreen-0.0.71-arm-1.tgz: Added.
kde/kshisen-4.10.0-arm-1.tgz: Added.
kde/ksirk-4.10.0-arm-1.tgz: Added.
kde/ksnakeduel-4.10.0-arm-1.tgz: Added.
kde/ksnapshot-4.10.0-arm-1.tgz: Upgraded.
kde/kspaceduel-4.10.0-arm-1.tgz: Added.
kde/ksquares-4.10.0-arm-1.tgz: Added.
kde/ksudoku-4.10.0-arm-1.tgz: Added.
kde/ktimer-4.10.0-arm-1.tgz: Upgraded.
kde/ktorrent-4.3.1-arm-1.tgz: Upgraded.
kde/ktuberling-4.10.0-arm-1.tgz: Added.
kde/kubrick-4.10.0-arm-1.tgz: Added.
kde/kwallet-4.10.0-arm-1.tgz: Upgraded.
kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz: Upgraded.
kde/libkcddb-4.10.0-arm-1.tgz: Added.
kde/libkcompactdisc-4.10.0-arm-1.tgz: Added.
kde/libkdcraw-4.10.0-arm-1.tgz: Added.
kde/libkdegames-4.10.0-arm-1.tgz: Added.
kde/libkexiv2-4.10.0-arm-1.tgz: Upgraded.
kde/libkipi-4.10.0-arm-1.tgz: Upgraded.
kde/libkmahjongg-4.10.0-arm-1.tgz: Added.
kde/libksane-4.10.0-arm-1.tgz: Upgraded.
kde/libkscreen-0.0.71-arm-1.tgz: Added.
kde/libktorrent-1.3.1-arm-1.tgz: Upgraded.
kde/lskat-4.10.0-arm-1.tgz: Added.
kde/mplayerthumbs-4.10.0-arm-1.tgz: Added.
kde/nepomuk-core-4.10.0-arm-1.tgz: Added.
kde/nepomuk-widgets-4.10.0-arm-1.tgz: Added.
kde/networkmanagement-0.9.0-arm-1.tgz: Upgraded.
kde/okular-4.10.0-arm-1.tgz: Upgraded.
kde/oxygen-gtk2-1.3.1-arm-1.tgz: Upgraded.
kde/oxygen-gtk3-1.1.1-arm-1.tgz: Added.
kde/oxygen-icons-4.10.0-arm-1.tgz: Upgraded.
kde/palapeli-4.10.0-arm-1.tgz: Added.
kde/perlkde-4.10.0-arm-1.tgz: Upgraded.
kde/perlqt-4.10.0-arm-1.tgz: Upgraded.
kde/picmi-4.10.0-arm-1.tgz: Added.
kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz: Upgraded.
kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz: Upgraded.
kde/print-manager-4.10.0-arm-1.tgz: Added.
kde/qtruby-4.10.0-arm-1.tgz: Upgraded.
kde/quanta-29a3f8e_20111223git-arm-1.tgz: Upgraded.
kde/skanlite-0.9-arm-1.tgz: Upgraded.
kde/smokegen-4.10.0-arm-1.tgz: Upgraded.
kde/smokekde-4.10.0-arm-1.tgz: Upgraded.
kde/smokeqt-4.10.0-arm-1.tgz: Upgraded.
kde/superkaramba-4.10.0-arm-1.tgz: Upgraded.
kde/svgpart-4.10.0-arm-1.tgz: Upgraded.
kde/sweeper-4.10.0-arm-1.tgz: Upgraded.
kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz: Upgraded.
kdei/kde-l10n-*-4.10.0-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-*-2.6.0-noarch-1.tgz: Upgraded.
l/glibc-2.17-arm-1.tgz: Upgraded.
glibc now requires a *minimum* running version of Linux kernel 3.4.11. This
enables an upgrade from Slackware ARM 14.0. If you do not have at least Linux
3.4.11 running on your system, you should not apply this batch or any further
updates from slackwarearm-current until you have upgraded the kernel on your
system.
l/glibc-i18n-2.17-arm-1.tgz: Upgraded.
l/glibc-profile-2.17-arm-1.tgz: Upgraded.
l/polkit-0.105-arm-4.tgz: Rebuilt.
Reverted a patch that set the members of the wheel group as the
authorized administrators. On Slackware, root is the administrator
and the wheel group is mostly unused. Thanks to G?rard Monpontet.
l/QScintilla-2.6.1-arm-4.tgz: Rebuilt.
Recompiled against the new sip to fix API incompatibilities.
Thanks to ecoslacker and alienBOB.
l/slang-2.2.4-arm-1.tgz: Upgraded.
n/slrn-1.0.1-arm-1.tgz: Upgraded.
xap/fluxbox-1.3.5-arm-1.tgz: Upgraded.
xap/pidgin-2.10.7-arm-1.tgz: Upgraded.
This update fixes several security issues:
Remote MXit user could specify local file path.
MXit buffer overflow reading data from network.
Sametime crash with long user IDs.
Crash when receiving a UPnP response with abnormally long values.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
(* Security fix *)
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Feb 13 21:19:08 UTC 2013
a/openssl-solibs-1.0.1e-arm-1.tgz: Upgraded.
ap/lm_sensors-3.3.3-arm-1.tgz: Upgraded.
l/PyQt-4.9.6-arm-1.tgz: Upgraded.
l/akonadi-1.9.0-arm-1.tgz: Upgraded.
l/attica-0.4.1-arm-1.tgz: Upgraded.
l/boost-1.52.0-arm-1.tgz: Upgraded.
l/ebook-tools-0.2.2-arm-1.tgz: Upgraded.
l/enchant-1.6.0-arm-1.tgz: Upgraded.
l/grantlee-0.3.0-arm-1.tgz: Upgraded.
l/liblastfm-1.0.3-arm-1.tgz: Upgraded.
l/libmtp-1.1.5-arm-1.tgz: Upgraded.
l/libplist-1.8-arm-1.tgz: Upgraded.
l/libsamplerate-0.1.8-arm-1.tgz: Upgraded.
l/libsndfile-1.0.25-arm-1.tgz: Upgraded.
l/libwpd-0.9.6-arm-1.tgz: Upgraded.
l/qjson-0.8.1-arm-1.tgz: Added.
l/qt-4.8.4-arm-1.tgz: Upgraded.
l/shared-desktop-ontologies-0.10.0-arm-1.tgz: Upgraded.
l/sip-4.14.2-arm-1.tgz: Upgraded.
l/soprano-2.9.0-arm-1.tgz: Upgraded.
l/virtuoso-ose-6.1.6-arm-1.tgz: Upgraded.
n/curl-7.29.0-arm-2.tgz: Rebuilt.
Patched to fix a segfault when closing an unused multi.
Thanks to Willy Sudiarto Raharjo.
n/openssl-1.0.1e-arm-1.tgz: Upgraded.
This release fixes a regression in openssl-1.0.1d, where the fix for
CVE-2013-0169 caused data corruption on CPUs with AES-NI support.
n/sendmail-8.14.6-arm-1.tgz: Upgraded.
n/sendmail-cf-8.14.6-noarch-1.tgz: Upgraded.
xap/fluxbox-1.3.4-arm-1.tgz: Upgraded.
xap/gimp-2.8.4-arm-1.tgz: Upgraded.
+--------------------------+
Sun Feb 10 10:11:49 UTC 2013
a/openssl-solibs-1.0.1d-arm-1.tgz: Upgraded.
(* Security fix *)
a/slocate-3.1-arm-4.tgz: Rebuilt.
Fixed incorrect ownerships and permissions.
Thanks to Guan Xin.
ap/slackpkg-2.82.0-arm-5.tgz: Rebuilt.
Updated the FTP site addresses for Slackware ARM.
l/phonon-gstreamer-4.6.3-arm-1.tgz: Upgraded.
n/openssl-1.0.1d-arm-1.tgz: Upgraded.
Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
This addresses the flaw in CBC record processing discovered by
Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
at: http://www.isg.rhul.ac.uk/tls/
Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
Security Group at Royal Holloway, University of London
(www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
Emilia K?sper for the initial patch.
(CVE-2013-0169)
[Emilia K?sper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode
ciphersuites which can be exploited in a denial of service attack.
Thanks go to and to Adam Langley <agl@chromium.org> for discovering
and detecting this bug and to Wolfgang Ettlinger
<wolfgang.ettlinger@gmail.com> for independently discovering this issue.
(CVE-2012-2686)
[Adam Langley]
Return an error when checking OCSP signatures when key is NULL.
This fixes a DoS attack. (CVE-2013-0166)
[Steve Henson]
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
(* Security fix *)
+--------------------------+
Fri Feb 8 21:36:28 UTC 2013
l/sdl-1.2.15-arm-1.tgz: Upgraded.
Upgraded to SDL-1.2.15, SDL_image-1.2.12, SDL_mixer-1.2.12,
SDL_net-1.2.8, and SDL_ttf-2.0.11.
Patched resizing and mouse clicking bugs.
n/curl-7.29.0-arm-1.tgz: Upgraded.
When negotiating SASL DIGEST-MD5 authentication, the function
Curl_sasl_create_digest_md5_message() uses the data provided from the
server without doing the proper length checks and that data is then
appended to a local fixed-size buffer on the stack. This vulnerability
can be exploited by someone who is in control of a server that a libcurl
based program is accessing with POP3, SMTP or IMAP. For applications
that accept user provided URLs, it is also thinkable that a malicious
user would feed an application with a URL to a server hosting code
targeting this flaw.
Affected versions: curl 7.26.0 to and including 7.28.1
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
(* Security fix *)
+--------------------------+
Wed Feb 6 20:36:35 UTC 2013
a/kernel-modules-kirkwood-3.7.5_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.7.5_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.7.5_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.7.5-arm-1.tgz: Upgraded.
a/kernel_tegra-3.7.5-arm-1.tgz: Upgraded.
a/kernel_versatile-3.7.5-arm-1.tgz: Upgraded.
a/sharutils-4.13.3-arm-1.tgz: Upgraded.
ap/hplip-3.12.11-arm-2.tgz: Rebuilt.
Recompiled with --enable-cups-ppd-install. Thanks to guanx.
ap/moc-2.5.0_beta1-arm-1.tgz: Upgraded.
d/gcc-4.7.2-arm-2.tgz: Rebuilt.
d/gcc-g++-4.7.2-arm-2.tgz: Rebuilt.
d/gcc-gfortran-4.7.2-arm-2.tgz: Rebuilt.
d/gcc-gnat-4.7.2-arm-2.tgz: Rebuilt.
d/gcc-java-4.7.2-arm-2.tgz: Rebuilt.
d/gcc-objc-4.7.2-arm-2.tgz: Rebuilt.
d/llvm-3.2-arm-2.tgz: Rebuilt.
Removed dependency on GCC include files, and cleaned up some other paths.
Thanks to Heinz Wiesinger.
d/make-3.82-arm-4.tgz: Rebuilt.
Applied patch containing upstream bugfixes.
k/kernel-source-3.7.5-arm-1.tgz: Upgraded.
l/taglib-1.8-arm-1.tgz: Upgraded.
n/dhcp-4.2.5-arm-1.tgz: Upgraded.
n/dhcpcd-5.6.6-arm-1.tgz: Upgraded.
n/iproute2-3.6.0-arm-1.tgz: Upgraded.
n/iptables-1.4.17-arm-1.tgz: Upgraded.
n/nmap-6.25-arm-1.tgz: Upgraded.
extra/brandy/brandy-1.20pre5-arm-1.tgz: Added.
This is a BBC BASIC interpreter.
isolinux/*: Upgraded.
kernels/*: Upgraded.
+--------------------------+
Fri Jan 25 19:25:38 UTC 2013
a/sysvinit-2.88dsf-arm-3.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
a/udev-182-arm-4.tgz: Rebuilt.
The upgrade to the 3.7.1 kernel broke the generation of persistent optical
device rules, and existing rules in 70-persistent-cd.rules no longer worked.
This update fixes the issue by basing the rules on ID_SERIAL rather than
ID_PATH (which is not supported by the new kernel's libata transport class).
After upgrading the package, remove /etc/udev/rules.d/70-persistent-cd.rules
and reboot the machine. This will create a working rules file and restore
the expected symbolic links to optical devices in /dev.
a/xfsprogs-3.1.8-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
ap/hplip-3.12.11-arm-1.tgz: Upgraded.
ap/ksh93-2012_07_27-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
ap/mysql-5.5.29-arm-1.tgz: Upgraded.
Upgraded to the latest upstream version to fix security issues and provide
other bug fixes and improvements. Note that some of the changes may
possibly introduce incompatibilities with the previous package.
(* Security fix *)
ap/vim-7.3.645-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
d/perl-5.16.1-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
l/gtk+2-2.24.10-arm-3.tgz: Rebuilt.
Added missing /etc/profile.d shell profile scripts.
l/librsvg-2.36.1-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
l/ncurses-5.9-arm-3.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
n/bootp-2.4.3-arm-3.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
n/mailx-12.5-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
n/php-5.4.11-arm-1.tgz: Upgraded.
tcl/tk-8.5.11-arm-2.tgz: Rebuilt.
Fixed broken symlinks. Thanks to Andrew Kroll.
xap/gucharmap-3.4.1-arm-2.tgz: Rebuilt.
Install the doinst.sh header properly, and use chroot to run
update-desktop-database and glib-compile-schemas to insure the package is
installed correctly during an initial installation.
Thanks to David Gabriel Rodriguez Castillo and Matteo Bernardini.
+--------------------------+
Fri Jan 18 19:48:50 UTC 2013
The previous builds were marked as 'arm', but it has surfaced that these and the
previous packages only work on machines with a hardware floating point, so the
packages have been re-classifed as such. I haven't been able to determine how
or what to change in order to get them building for machines without an FPU;
may be when time permits I'll look further into it.
extra/openjdk/openjdk-7u9_b30-armhfp-2.txz: Rebuilt.
This release fixes issues with an improper permission check in the
reflection API in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass Java sandbox restrictions.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174
(* Security fix *)
extra/openjdk/openjre-7u9_b30-armhfp-2.txz: Rebuilt.
This release fixes issues with an improper permission check in the
reflection API in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass Java sandbox restrictions.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174
(* Security fix *)
+--------------------------+
Wed Jan 16 19:16:02 UTC 2013
l/freetype-2.4.11-arm-1.tgz: Upgraded.
This release fixes several security bugs that could cause freetype to
crash or run programs upon opening a specially crafted file.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
(* Security fix *)
+--------------------------+
Sun Jan 13 16:06:46 UTC 2013
I have built the latest Mozilla packages for -current only, and placed them out of
the main tree here:
ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages
These are built for minimum target of 'armv6j'. I can only build these because
my '-current' build host is an ARMv7 machine with a hardware FPU. The build hosts
for the stable releases of Slackware ARM are ARMv5 machines, upon which these
packages cannot be built, thus cannot be maintained. Therefore, I will maintain
the Mozilla packages *only* for users who follow -current closely, but will no
longer provide any new Mozilla packages for any stable releases (apart from 13.37
which uses Firefox v3). The reason for moving the new versions of the packages
out of the main tree is because anything in -current ordinarily implies that it
will be present in the next stable release, which of course cannot happen if they
can't be built on the hardware used to maintain stable releases.
+--------------------------+
Sat Jan 12 18:06:46 UTC 2013
Please note that the Mozilla suite of packages ('FireFox', 'Thunderbird' and
'Seamonkey') have been removed from Slackware ARM in this batch of updates.
This is due to these applications not supporting the ARMv5 platform. I cannot
build versions greater than 17.x, so I have removed them. I've considered the
ESR versions of Firefox but these just postpone the inevitable removal, since at
a later point in time, we'd still be trying to build a newer release of an app
that does not compile. The previous packages will remain in 'pasture', but be
aware that they are now not considered 'secure'.
d/binutils-2.23.51.0.6-arm-2.tgz: Rebuilt.
Removed "/usr/bin/windres".
This was causing some builds to fail, as on ARM it fails with
"cannot detect architecture".
Thanks to Richard Lapointe.
d/cmake-2.8.10.2-arm-1.tgz: Upgraded.
d/llvm-3.2-arm-1.tgz: Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-2.tgz: Removed.
Moved to /pasture.
Nothing in Slackware ARM relies upon this library ('mozilla-nss' is used),
so this is a safe removal. If you had a 3rd party/your own packages linking
against the libraries in this package, you could rebuild it against
'l/mozilla-nss'.
n/php-5.4.7-arm-2.tgz: Rebuilt.
Corrected the permissions on /var/lib/php (chmod 770).
Thanks to Hans de Bruin.
xap/mozilla-firefox-17.0.1-armhfp-2.tgz: Removed.
Moved to /pasture.
xap/mozilla-thunderbird-17.0-armhfp-3.tgz: Removed.
Moved to /pasture.
xap/seamonkey-2.14.1-armhfp-2.tgz: Removed.
Moved to /pasture.
extra/autoconf213/autoconf-2.13-noarch-2.tgz: Rebuilt.
Added versioned symlinks as some apps search for them explicitly.
pasture/mozilla-firefox-17.0.1-armhfp-2.tgz: Moved to /pasture.
pasture/mozilla-thunderbird-17.0-armhfp-3.tgz: Moved to /pasture.
pasture/seamonkey-2.14.1-armhfp-2.tgz: Moved to /pasture.
pasture/seamonkey-solibs-2.14.1-armhfp-2.tgz: Moved to /pasture.
+--------------------------+
Tue Jan 1 01:20:13 UTC 2013
Toolchain and Kernel updates! This is the first time I've provided Kernels
with support for the Flattened Device Tree ('FTD'). I've shipped each Kernel
package with all of the '.dtb' files for the corresponding architecture - you'll
find them in '/boot/dtb'. The Kernels also _support_ having a DTB appended to
the Kernel zImage in case your version of U-Boot does not support FDT. If this
is the case, please read '/kernels/README.TXT' -- but note that none of the
Kernels actually have any DTB appended.
I've been running the 3.7.1 Kernels for just over two weeks here on the Tegra20
and Kirkwood platforms, and they've proven to be stable. Unfortunately I've not
been able to get the 'versatile' Kernel in a good state due to a problem with the
'SYM53C8XX' SCSI driver (see below). If anyone can help fix that, please let me
know and send the fix upstream too.
Make sure you read and fully understand the notes for the 'Tegra/Trimslice'
kernels, otherwise you might get grumpy! ;-)
Happy new year!
Stuart.
/INSTALL_TEGRA.TXT: Updated.
Updated boot configuration settings to use DTB (Device Tree Blob) files.
You will need to upgrade the version of 'U-Boot' on your Trimslice in order
to boot the latest kernel provided in this batch.
I suggest first upgrading the kernel, then rebooting into the U-Boot command
prompt; upgrading the U-Boot firmware, reconfiguring then rebooting into the
new kernel.
See the first section of this document for more details.
a/kernel-firmware-20121228git-noarch-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.7.1_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.7.1_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.7.1_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.7.1-arm-1.tgz: Upgraded.
Tested on booting on:
OpenRD Client
"U-Boot 1.1.4 (Oct 27 2009 - 21:57:24) Marvell version: 3.4.19"
SheevaPlug Development Kit:
"U-Boot 1.1.4 (Dec 27 2009 - 22:03:21) Marvell version: 3.4.27"
I would assume that since these old versions of U-Boot support booting this
new kernel, any newer versions of U-Boot will also work correctly.
For this Kirkwood kernel upgrade, you should be safe to just upgrade the
kernel and reboot.
a/kernel_tegra-3.7.1-arm-1.tgz: Upgraded.
Once you have updated your U-Boot configuration (see above)
you need to update U-Boot config - refer to section 5.0 ("Booting the Slackware
ARM OS") in the '/INSTALL_TEGRA.TXT' document. You will need to ensure you're
familiar with your existing partitioning scheme and adjust the settings
accordingly, as you would have originally when you installed Slackware on to
your TrimSlice. If you followed the partitioning scheme as described in the
documents, you can safely paste in the lines exactly as in the revised version
of the same document, save, and reboot.
Important note: You MUST remove all instances of memory configuration
values from your U-Boot settings. The Tegra install document (above)
contains values such as:
mem=384M@0M mem=512M@512M nvmem=128M@384M vmalloc=248M video=tegrafb
If you have any of those settings in your U-Boot configuration, they will
prevent the kernel from booting. Use the U-Boot 'printenv' command to
view your current settings, and 'setenv' to adjust the variables to remove
any instances of the above, then 'save;reset' to conclude the changes.
Whilst it's certainly not ideal to lose half of your useable RAM, it is
currently the only option until the Trimslice developers provide a new
U-Boot.
a/kernel_versatile-3.7.1-arm-1.tgz: Upgraded.
Tested with QEMU-1.3.0.
The SCSI driver ('SYM53C8XX') is broken in this release, so this kernel
is of limited value. I tried compiling it as a module and into the
kernel, but it fails:
[ 127.124417] sym0: SCSI BUS has been reset.
[ 132.117466] scsi 0:0:2:0: HOST RESET operation timed-out.
[ 132.117640] scsi 0:0:2:0: Device offlined - not ready after error recovery
[ 153.157485] scsi 0:0:3:0: ABORT operation started
Please do let me know if you know how to fix it!
Other than this particular issue with this driver, the kernel seems reliable.
ap/slackpkg-2.82.0-arm-4.tgz: Rebuilt.
Added the up to date mirror list from http://www.armedslack.org/getslack/
d/binutils-2.23.51.0.6-arm-1.tgz: Upgraded.
d/device-tree-compiler-1.3.0-arm-1.tgz: Added.
This tool is for working with Flattened Device Tree (FTD) and
Device Tree Source (DTS). For more information on Device Trees, see:
http://elinux.org/Device_Trees
http://www.devicetree.org
http://www.informit.com/articles/article.aspx?p=1647051&seqNum=5
http://elinux.org/images/4/48//Experiences_With_Device_Tree_Support_Development_For_ARM-Based_SOC's.pdf
You need this to be installed in order to build the 'DTB' files that are now
shipped with the Slackware ARM kernels.
d/gcc-4.7.2-arm-1.tgz: Upgraded.
d/gcc-g++-4.7.2-arm-1.tgz: Upgraded.
d/gcc-gfortran-4.7.2-arm-1.tgz: Upgraded.
d/gcc-gnat-4.7.2-arm-1.tgz: Upgraded.
d/gcc-java-4.7.2-arm-1.tgz: Upgraded.
d/gcc-objc-4.7.2-arm-1.tgz: Upgraded.
d/kernel-headers-3.7.1-arm-1.tgz: Upgraded.
d/oprofile-0.9.7-arm-3.tgz: Rebuilt.
k/kernel-source-3.7.1-arm-1.tgz: Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-2.tgz: Rebuilt.
xap/mozilla-firefox-17.0.1-armhfp-2.tgz: Rebuilt.
xap/mozilla-thunderbird-17.0-armhfp-3.tgz: Rebuilt.
xap/seamonkey-2.14.1-armhfp-2.tgz: Rebuilt.
I had previously built these packages with optimisations for the ARMv6 CPU.
However, I have now reverted the optimisations to 'armv5t'. This is due to
Slackware ARM stable releases being maintained on ARMv5 hardware.
The packages are still named 'hfp' since in order to run the packages, you still
need a hardware floating point unit (although they can still be _compiled_ on
systems without an FPU).
extra/kpartx/kpartx-0.4.9+git0.4dfdaf2b.6-arm-1.tgz: Added.
kpartx is part of the Linux 'multipath-tools' package. It's particularly useful
for creating device mappings to the partitions within disk 'image' files. You
can then loopback mount the newly created device mappings to access the contents.
isolinux/*: Rebuilt.
You may notice that the size of the installer images has decreased. This is
because I have removed the unnecessary firmware from /lib/firmware. All of it
was for network interface cards that do not exist on the supported platforms,
and just wastes RAM when the installer is running.
kernels/README.TXT: Updated.
Added a section describing how to extract the 'zImage' from the U-Boot 'uImage'
files, and how to append a DTB (Device Tree Blob) to the zImage. You may need
to do this if your U-Boot does not support loading DTBs directly and cannot be
upgraded.
kernels/*/dtb/*: Added.
Added the 'DTB' files for each supported architecture.
The DTB files are generated from the 'linux-x.x/arch/arm/boot/dts' directory
within the Linux kernel source, and are refreshed every time a kernel package
is built.
+--------------------------+
Tue Dec 11 18:34:24 UTC 2012
/INSTALL_KIRKWOOD.TXT: Amended.
/INSTALL_QEMU.TXT: Amended.
/INSTALL_TEGRA.TXT: Amended.
Added instructions for a local HTTP installation option.
Thanks to dlachausse on linuxquestions.org.
Adjusted the parameter names used to control the delay before attempting to
mount the root file system, and the root file system type.
You do not need to adjust your u-boot settings, as the original parameters
continue to be supported by the initrd.
Thanks to Thorsten M?hlfelder and Richard Lapointe for the suggestion.
a/kernel-modules-kirkwood-3.4.23_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.4.23_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.4.23_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.4.23-arm-1.tgz: Upgraded.
a/kernel_tegra-3.4.23-arm-1.tgz: Upgraded.
a/kernel_versatile-3.4.23-arm-1.tgz: Upgraded.
a/mkinitrd-1.4.7-arm-3.tgz: Rebuilt.
Added support for the parameter names that control the delay before attempting
to mount the root filesystem, and the root file system type: 'rootdelay' and
'rootfstype' respectively. These are the official/documented parameters in
the Kernel documentation. The original parameters ('rootfs' and 'waitforroot')
may still be used.
Thanks to Thorsten M?hlfelder and Richard Lapointe for the suggestion.
Unless specified when the initrd is built, or at boot time as a kernel
parameter, wait a minimum of four seconds for the root device to become ready.
Thanks to Jirtme Pinot for the suggestion and the patch.
k/kernel-source-3.4.23-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Dec 7 19:56:05 UTC 2012
ap/sqlite-3.7.14.1-arm-1.tgz: Upgraded.
This is a bugfix release.
d/ruby-1.9.3_p327-arm-1.tgz: Upgraded.
This release fixes a hash-flooding DoS vulnerability and many other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371
(* Security fix *)
l/libssh-0.5.3-arm-1.tgz: Upgraded.
This release fixes several security bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562
(* Security fix *)
l/libxml2-2.8.0-arm-2.tgz: Rebuilt.
Patched a heap-based buffer underflow in the xmlParseAttValueComplex
function in parser.c in libxml2 2.9.0 and earlier that could allow a
remote attacker to cause a denial of service or possibly execute
arbitrary code via crafted entities in an XML document.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
(* Security fix *)
n/bind-9.9.2_P1-arm-1.tgz: Upgraded.
This release addresses some denial-of-service and other bugs.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868
https://kb.isc.org/article/AA-00829
(* Security fix *)
+--------------------------+
Wed Dec 5 19:54:22 UTC 2012
a/kernel-modules-kirkwood-3.4.21_kirkwood-arm-1.tgz: Upgraded.
a/kernel-modules-tegra-3.4.21_tegra-arm-1.tgz: Upgraded.
a/kernel-modules-versatile-3.4.21_versatile-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.4.21-arm-1.tgz: Upgraded.
a/kernel_tegra-3.4.21-arm-1.tgz: Upgraded.
a/kernel_versatile-3.4.21-arm-1.tgz: Upgraded.
k/kernel-source-3.4.21-arm-1.tgz: Upgraded.
l/seamonkey-solibs-2.14.1-armhfp-1.tgz: Upgraded.
a/mtd-utils-051212-arm-1.tgz: Upgraded.
xap/mozilla-firefox-17.0.1-armv6j-1.tgz: Upgraded.
This is a bugfix release.
xap/seamonkey-2.14.1-armhfp-1.tgz: Upgraded.
This is a bugfix release.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Nov 28 20:07:10 UTC 2012
a/glibc-solibs-2.15-arm-9.tgz: Rebuilt.
a/glibc-zoneinfo-2012f_2012f-noarch-9.tgz: Rebuilt.
l/glibc-2.15-arm-9.tgz: Rebuilt.
l/glibc-i18n-2.15-arm-9.tgz: Rebuilt.
l/glibc-profile-2.15-arm-9.tgz: Rebuilt.
xap/mozilla-firefox-17.0-armv6j-2.tgz: Rebuilt.
Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages
with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and
gain any speed optimisations.
Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built
with these optimisations.
xap/mozilla-thunderbird-17.0-armv6j-2.tgz: Rebuilt.
Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages
with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and
gain any speed optimisations.
Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built
with these optimisations.
+--------------------------+
Fri Nov 23 18:03:14 UTC 2012
l/seamonkey-solibs-2.14-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
xap/mozilla-firefox-17.0-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-17.0-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
xap/seamonkey-2.14-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
+--------------------------+
Fri Nov 9 18:13:47 UTC 2012
I've added OpenJDK (Java Development Kit) and OpenJRE (Java Runtime Environment)
packages. Thanks to Eric Hameleers.
a/kernel-firmware-20121030git-noarch-1.tgz: Upgraded.
Rather than take the firmware blobs from the kernel source tree, we now
re-package the firmware package from Slackware x86, which takes its firmware
from a different repository that includes additional firmware blobs.
Thanks to Frank Donkers.
l/lcms2-2.4-arm-1.tgz: Upgraded.
l/seamonkey-solibs-2.13.2-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
n/bind-9.9.2-arm-1.tgz: Upgraded.
Fixes these security issues:
A certain combination of records in the RBT could cause named to hang
while populating the additional section of a response. [RT #31090]
Named could die on specially crafted record. [RT #30416]
(* Security fix *)
n/iptables-1.4.14-arm-2.tgz: Rebuilt.
Patched to fix a compiler related bug in iptables-restore.
Thanks to linuxxer for the report and David Somero for a link to the patch.
n/pssh-2.3.1-arm-2.tgz: Rebuilt.
Correctly place docs into /usr/doc rather than /doc
Thanks to Jirtme Pinot.
n/rp-pppoe-3.11-arm-1.tgz: Upgraded.
xap/mozilla-firefox-16.0.2-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/firefox.html
(* Security fix *)
xap/mozilla-thunderbird-16.0.2-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
(* Security fix *)
xap/seamonkey-2.13.2-armhfp-1.tgz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
extra/openjdk/openjdk-7u9_b30-arm-1.txz: Added.
The Java Development Kit. If you want to develop in Java, this package plus
'rhino' (below) will suit your needs.
extra/openjdk/openjre-7u9_b30-arm-1.txz: Added.
The Java Runtime Environment. Unless you're developing Java code, this package
will plus 'rhino' (below) suffice to run Java binaries.
extra/openjdk/icedtea-web-20120225-arm-1.txz: Added.
This is a web browser plugin to enable the execution of Java Applets.
extra/openjdk/rhino-1_7R3-noarch-1.txz: Added.
This is a run-time dependency for OpenJDK/OpenJRE.
extra/tightvnc/tightvnc-1.3.10-arm-4.tgz: Rebuilt.
Added missing 'Xvnc'.
Thanks to Frank Boehm for the report and bug fix.
+--------------------------+
Thu Oct 4 19:43:34 UTC 2012
/INSTALL_KIRKWOOD.TXT: Amended.
Minor adjustments in the U-Boot configuration parameters to assume that the
'Plug' devices are running the upstream 'DENX' U-Boot rather than the older
releases from 'Marvell'. The Marvell versions of U-Boot (and even some older
versions of the upstream releases) are not so robust in some situations, so it
makes sense (particularly for new Slackware ARM users) to upgrade their U-Boot
to a known-good release.
If you are using a GuruPlug, or SheevaPlug eSATA you are recommended to upgrade
U-Boot if it's older than the recommended version. This is due to a bug in
older U-Boot releases that may cause trouble booting newer Linux kernels such
as the version in Slackware ARM 14.0.
However, if you are happy with the version of U-Boot on your plugs, there's no
need to upgrade U-Boot: if you're going to reformat and reinstall with the same
disk partitioning scheme, you can boot the Slackware installer and reinstall
without changing any U-Boot configuration. If you've already installed
Slackware 14.0 on your system and it's working, you won't need to upgrade
U-Boot unless you are having some intermittent problems and would like to see
whether these are fixed by the new version.
Martin Michlmayr from Debian has always maintained a page with the stable
release of U-Boot for the Plugs, so it makes sense to me be refer to his
work in this area.
For details about upgrading U-Boot on your Plug, see
http://www.armedslack.org/maint_kirkwooduboot/
Thanks to Michael Langfinger for the suggestion.
a/openssl-solibs-1.0.1c-arm-3.tgz: Rebuilt.
n/openssl-1.0.1c-arm-3.tgz: Rebuilt.
Rebuilt to use ARM assembler optimisations which provides impressive
performance increases.
For more details see http://www.raspberrypi.org/phpBB3/viewtopic.php?f=66&t=8433
Thanks to Michael Langfinger for the suggestion.
pasture/*: Removed.
If you want anything that was in here, it can be found in the 14.0 release.
+--------------------------+
Wed Sep 26 07:50:13 UTC 2012
Slackware 14.0 ARM stable is released!
We're perfectionists here at Slackware, so this release has been a long time
a-brewing. But we think you'll agree that it was worth the wait.
Slackware 14.0 combines modern components, ease of use, and flexible
configuration... our "KISS" philosophy demands it.
Once you find yourself enjoying using the ARM port of Slackware, please take a
few moments to show your appreciation by sponsoring through Paypal.
Please visit the URL below to learn more:
http://www.armedslack.org/sponsor/
Thanks to those who have already made donations!
Thanks to everyone who helped make this happen. The Slackware team, the
upstream developers, and (of course) the awesome Slackware user community.
Have fun! :-)
+--------------------------+
[..]