Thu Sep 1 08:07:06 UTC 2016 ################################################################################ # END OF LIFE ("EOL") FOR SLACKWARE ARM v14.1 # # # # Security patches and fixes are no longer provided for Slackware ARM v14.1 # # # # If you are still running this version, you should upgrade to the latest # # stable release (Slackware 14.2). # # Alternately, you may make arrangements to handle your own security patches. # ################################################################################ patches/packages/linux-3.10.103/*: Upgraded. A flaw was found in the implementation of the Linux kernels handling of networking challenge ack where an attacker is able to determine the shared counter. This may allow an attacker located on different subnet to inject or take over a TCP connection between a server and client without having to be a traditional Man In the Middle (MITM) style attack. +--------------------------+ Wed Aug 24 02:03:04 UTC 2016 patches/packages/gnupg-1.4.21-arm-1_slack14.1.txz: Upgraded. Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who obtains 580 bytes from the standard RNG can trivially predict the next 20 bytes of output. (This is according to the NEWS file included in the source. According to the annoucement linked below, an attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output.) Problem detected by Felix Doerre and Vladimir Klebanov, KIT. For more information, see: https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 (* Security fix *) patches/packages/libgcrypt-1.5.6-arm-1_slack14.1.txz: Upgraded. Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who obtains 580 bytes from the standard RNG can trivially predict the next 20 bytes of output. (This is according to the NEWS file included in the source. According to the annoucement linked below, an attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output.) Problem detected by Felix Doerre and Vladimir Klebanov, KIT. For more information, see: https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 (* Security fix *) patches/packages/stunnel-5.35-arm-2_slack14.1.txz: Rebuilt. Fixed incorrect config file name in generate-stunnel-key.sh. Thanks to Ebben Aries. +--------------------------+ Tue Aug 16 19:05:54 UTC 2016 patches/packages/glibc-zoneinfo-2016f-arm-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. +--------------------------+ Mon Aug 8 19:20:21 UTC 2016 patches/packages/curl-7.50.1-arm-1_slack14.1.txz: Upgraded. This release fixes security issues: TLS: switch off SSL session id when client cert is used TLS: only reuse connections with the same client cert curl_multi_cleanup: clear connection pointer for easy handles For more information, see: https://curl.haxx.se/docs/adv_20160803A.html https://curl.haxx.se/docs/adv_20160803B.html https://curl.haxx.se/docs/adv_20160803C.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421 (* Security fix *) patches/packages/openssh-7.3p1-arm-1_slack14.1.txz: Upgraded. This is primarily a bugfix release, and also addresses security issues. sshd(8): Mitigate a potential denial-of-service attack against the system's crypt(3) function via sshd(8). sshd(8): Mitigate timing differences in password authentication that could be used to discern valid from invalid account names when long passwords were sent and particular password hashing algorithms are in use on the server. ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle countermeasures. ssh(1), sshd(8): Improve operation ordering of MAC verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC before decrypting any ciphertext. sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes. For more information, see: http://www.openssh.com/txt/release-7.3 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325 (* Security fix *) patches/packages/stunnel-5.35-arm-1_slack14.1.txz: Upgraded. Fixes security issues: Fixed malfunctioning "verify = 4". Fixed incorrectly enforced client certificate requests. (* Security fix *) +--------------------------+ Fri Jul 29 07:08:09 UTC 2016 patches/packages/libidn-1.33-arm-1_slack14.1.txz: Upgraded. Fixed out-of-bounds read bugs. Fixed crashes on invalid UTF-8. Thanks to Hanno Böck. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263 (* Security fix *) +--------------------------+ Sun Jul 24 16:17:18 UTC 2016 patches/packages/device-tree-compiler-1.4.1-arm-1_slack14.1.txz: Upgraded. u-boot v2016 requires this version of dtc. +--------------------------+ Sat Jul 23 21:21:21 UTC 2016 patches/packages/bind-9.9.9_P2-arm-1_slack14.1.txz: Upgraded. Fixed a security issue: getrrsetbyname with a non absolute name could trigger an infinite recursion bug in lwresd and named with lwres configured if when combined with a search list entry the resulting name is too long. (CVE-2016-2775) [RT #42694] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775 (* Security fix *) patches/packages/gimp-2.8.18-arm-1_slack14.1.txz: Upgraded. This release fixes a security issue: Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994 (* Security fix *) patches/packages/php-5.6.24-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.24 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207 (* Security fix *) +--------------------------+ Sat Jul 9 07:37:07 UTC 2016 patches/packages/samba-4.2.14-arm-1_slack14.1.txz: Upgraded. This release fixes a security issue: Client side SMB2/3 required signing can be downgraded. It's possible for an attacker to downgrade the required signing for an SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can impersonate a server being connected to by Samba, and return malicious results. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119 (* Security fix *) +--------------------------+ Sat Jun 25 16:19:55 UTC 2016 patches/packages/php-5.6.23-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.23 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 (* Security fix *) +--------------------------+ Tue Jun 21 18:49:14 UTC 2016 patches/packages/libarchive-3.2.1-arm-1_slack14.1.txz: Upgraded. This release fixes several critical bugs, including some with security implications. (* Security fix *) patches/packages/pcre-8.39-arm-1_slack14.1.txz: Upgraded. This release fixes bugs (including a couple of DoS security issues), and retrofits to PCRE1 some appropriate JIT improvements from PCRE2. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283 (* Security fix *) +--------------------------+ Wed Jun 15 16:17:18 UTC 2016 patches/packages/glibc-zoneinfo-2016e-arm-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. patches/packages/pidgin-2.10.12-arm-1_slack14.1.txz: Upgraded. Use the much larger collection of SSL certs in /etc/ssl/certs rather than the ones that ship with Pidgin, otherwise certificates issued by Let's Encrypt (and others) cannot be verified. Thanks to Cesare. patches/packages/wget-1.18-arm-1_slack14.1.txz: Upgraded. This version fixes a security vulnerability present in all old versions of wget. On a server redirect from HTTP to a FTP resource, wget would trust the HTTP server and use the name in the redirected URL as the destination filename. This behaviour was changed and now it works similarly as a redirect from HTTP to another HTTP resource so the original name is used as the destination file. To keep the previous behaviour the user must provide --trust-server-names. The vulnerability was discovered by Dawid Golunski and was reported by Beyond Security's SecuriTeam. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971 (* Security fix *) +--------------------------+ Sat Jun 4 14:15:16 UTC 2016 patches/packages/libxml2-2.9.4-arm-2_slack14.1.txz: Rebuilt. Fix attribute decoding during XML schema validation. Thanks to Andreas Vögele. patches/packages/ntp-4.2.8p8-arm-1_slack14.1.txz: Upgraded. This release patches one high and four low severity security issues: CVE-2016-4957: Crypto-NAK crash CVE-2016-4953: Bad authentication demobilizes ephemeral associations CVE-2016-4954: Processing spoofed server packets CVE-2016-4955: Autokey association reset CVE-2016-4956: Broadcast interleave For more information, see: http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956 (* Security fix *) +--------------------------+ Thu Jun 2 07:07:07 UTC 2016 patches/packages/imagemagick-6.8.6_10-arm-3_slack14.1.txz: Rebuilt. Removed popen() support to prevent another shell vulnerability. This issue was discovered by Bob Friesenhahn, of the GraphicsMagick project. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118 (* Security fix *) patches/packages/xscreensaver-5.35-arm-1_slack14.1.txz: Upgraded. Here's an upgrade to the latest xscreensaver. +--------------------------+ Sat May 28 19:20:21 UTC 2016 patches/packages/libxml2-2.9.4-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues: Heap-based buffer underreads due to xmlParseName (CVE-2016-4447). Format string vulnerability (CVE-2016-4448). Inappropriate fetch of entities content (CVE-2016-4449). For more information, see: http://xmlsoft.org/news.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449 (* Security fix *) patches/packages/libxslt-1.1.29-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and a security issue: Fix for type confusion in preprocessing attributes (Daniel Veillard). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995 (* Security fix *) patches/packages/php-5.6.22-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.22 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096 (* Security fix *) +--------------------------+ Wed May 25 06:06:03 UTC 2016 patches/packages/libarchive-3.1.2-arm-2_slack14.1.txz: Rebuilt. Patched an issue with Zip archive handling that could allow an attacker to overwrite parts of the heap in a controlled fashion and execute arbitrary code. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541 (* Security fix *) +--------------------------+ Sat May 21 13:13:13 UTC 2016 patches/packages/curl-7.49.0-arm-1_slack14.1.txz: Upgraded. Fixed a TLS certificate check bypass with mbedTLS/PolarSSL. For more information, see: https://curl.haxx.se/docs/adv_20160518.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739 (* Security fix *) +--------------------------+ Wed May 11 00:01:02 UTC 2016 patches/packages/git-2.8.2-arm-1_slack14.1.txz: Upgraded. This is a bugfix package update to change color "lime" to "00FF00" in gitk. Otherwise it might not start if "lime" is not defined. Thanks to AlvaroG. patches/packages/imagemagick-6.8.6_10-arm-2_slack14.1.txz: Rebuilt. This update addresses several security issues in ImageMagick, including: Insufficient shell characters filtering allows code execution (CVE-2016-3714) Server Side Request Forgery (CVE-2016-3718) File deletion (CVE-2016-3715) File moving (CVE-2016-3716) Local file read (CVE-2016-3717) To mitigate these issues, the default policy.xml config file has been modified to disable all of the vulnerable coders. For more information, see: https://imagetragick.com http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717 (* Security fix *) +--------------------------+ Wed May 4 07:07:70 UTC 2016 patches/packages/openssl-1.0.1t-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: Memory corruption in the ASN.1 encoder (CVE-2016-2108) Padding oracle in AES-NI CBC MAC check (CVE-2016-2107) EVP_EncodeUpdate overflow (CVE-2016-2105) EVP_EncryptUpdate overflow (CVE-2016-2106) ASN.1 BIO excessive memory allocation (CVE-2016-2109) EBCDIC overread (CVE-2016-2176) For more information, see: https://www.openssl.org/news/secadv/20160503.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176 (* Security fix *) patches/packages/openssl-solibs-1.0.1t-arm-1_slack14.1.txz: Upgraded. +--------------------------+ Tue May 3 01:01:01 UTC 2016 patches/packages/mercurial-3.8.1-arm-1_slack14.1.txz: Upgraded. This update fixes possible arbitrary code execution when converting Git repos. Mercurial prior to 3.8 allowed arbitrary code execution when using the convert extension on Git repos with hostile names. This could affect automated code conversion services that allow arbitrary repository names. This is a further side-effect of Git CVE-2015-7545. Reported and fixed by Blake Burkhart. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105 (* Security fix *) patches/packages/samba-4.2.12-arm-1_slack14.1.txz: Upgraded. This is a bugfix release. +--------------------------+ Mon May 2 02:03:02 UTC 2016 patches/packages/ntp-4.2.8p7-arm-1_slack14.1.txz: Upgraded. This release patches several low and medium severity security issues: CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC CVE-2016-2519: ctl_getitem() return value not always checked CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos CVE-2016-1548: Interleave-pivot - MITIGATION ONLY CVE-2015-7704: KoD fix: peer associations were broken by the fix for NtpBug2901, AKA: Symmetric active/passive mode is broken CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing For more information, see: http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519 (* Security fix *) patches/packages/php-5.6.21-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.21 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074 (* Security fix *) patches/packages/subversion-1.7.22-arm-2_slack14.1.txz: Rebuilt. This update patches two security issues: CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm. CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn during COPY/MOVE authorization check. For more information, see: http://subversion.apache.org/security/CVE-2016-2167-advisory.txt http://subversion.apache.org/security/CVE-2016-2168-advisory.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168 (* Security fix *) +--------------------------+ Tue Apr 26 08:08:08 UTC 2016 patches/packages/ca-certificates-20160104-arm-1_slack14.1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. +--------------------------+ Wed Apr 20 07:08:07 UTC 2016 patches/packages/glibc-zoneinfo-2016d-arm-1.txz: Upgraded. This package provides the latest timezone updates. patches/packages/samba-4.2.11-arm-1_slack14.1.txz: Upgraded. This update fixes the security issues known as "badlock" (or "sadlock"), which may allow man-in-the-middle or denial-of-service attacks: CVE-2015-5370 (Multiple errors in DCE-RPC code) CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP) CVE-2016-2111 (NETLOGON Spoofing Vulnerability) CVE-2016-2112 (LDAP client and server don't enforce integrity) CVE-2016-2113 (Missing TLS certificate validation) CVE-2016-2114 ("server signing = mandatory" not enforced) CVE-2016-2115 (SMB IPC traffic is not integrity protected) CVE-2016-2118 (SAMR and LSA man in the middle attacks possible) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118 (* Security fix *) +--------------------------+ Thu Apr 7 07:07:07 UTC 2016 patches/packages/subversion-1.7.22-arm-1_slack14.1.txz: Upgraded. Subversion servers and clients are vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read that may allow remote attackers to cause a denial of service or possibly execute arbitrary code under the context of the targeted process. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343 (* Security fix *) +--------------------------+ Sat Apr 2 16:17:18 UTC 2016 patches/packages/dhcp-4.3.4-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and (previously patched) security issues. patches/packages/mercurial-3.7.3-arm-1_slack14.1.txz: Upgraded. This update fixes security issues and bugs, including remote code execution in binary delta decoding, arbitrary code execution with Git subrepos, and arbitrary code execution when converting Git repos. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069 (* Security fix *) patches/packages/php-5.6.20-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.20 (* Security fix *) +--------------------------+ Sat Mar 26 12:13:14 UTC 2016 patches/packages/glibc-zoneinfo-2016c-arm-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. patches/packages/libevent-2.0.22-arm-1_slack14.1.txz: Upgraded. Multiple integer overflows in the evbuffer API allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272 (* Security fix *) +--------------------------+ Sun Mar 20 23:22:23 UTC 2016 patches/packages/git-2.7.4-arm-1_slack14.1.txz: Upgraded. NOTE: Issuing this patch again since the bug reporter listed the wrong git version (2.7.1) as fixed. The vulnerability was actually patched in git-2.7.4. Fixed buffer overflows allowing server and client side remote code execution in all git versions before 2.7.4. For more information, see: http://seclists.org/oss-sec/2016/q1/645 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324 (* Security fix *) +--------------------------+ Thu Mar 17 00:00:00 UTC 2016 patches/packages/git-2.7.3-arm-1_slack14.1.txz: Upgraded. Fixed buffer overflows allowing server and client side remote code execution in all git versions before 2.7.1. For more information, see: http://seclists.org/oss-sec/2016/q1/645 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324 (* Security fix *) patches/packages/glibc-zoneinfo-2016b-arm-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. +--------------------------+ Fri Mar 11 03:04:05 UTC 2016 patches/packages/bind-9.9.8_P4-arm-1_slack14.1.txz: Upgraded. Fixed security issues: Fix resolver assertion failure due to improper DNAME handling when parsing fetch reply messages. (CVE-2016-1286) [RT #41753] Malformed control messages can trigger assertions in named and rndc. (CVE-2016-1285) [RT #41666] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285 (* Security fix *) patches/packages/mozilla-nss-3.23-arm-1_slack14.1.txz: Upgraded. Upgraded to nss-3.23 and nspr-4.12. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/nss.html (* Security fix *) patches/packages/openssh-7.2p2-arm-1_slack14.1.txz: Upgraded. This release fixes a security bug: sshd(8): sanitise X11 authentication credentials to avoid xauth command injection when X11Forwarding is enabled. For more information, see: http://www.openssh.com/txt/x11fwd.adv http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115 (* Security fix *) +--------------------------+ Wed Mar 9 19:20:21 UTC 2016 patches/packages/php-5.6.19-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.19 (* Security fix *) patches/packages/samba-4.1.23-arm-1_slack14.1.txz: Upgraded. This update fixes bugs, and two security issues: Incorrect ACL get/set allowed on symlink path (CVE-2015-7560). Out-of-bounds read in internal DNS server (CVE-2016-0771). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771 (* Security fix *) +--------------------------+ Sat Mar 5 03:30:03 UTC 2016 patches/packages/mailx-12.5-arm-4_slack14.1.txz: Rebuilt. Drop SSLv2 support (no longer supported by OpenSSL), and fix security issues that could allow a local attacker to cause mailx to execute arbitrary shell commands through the use of a specially-crafted email address. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844 (* Security fix *) patches/packages/openssl-1.0.1s-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800) Double-free in DSA code (CVE-2016-0705) Memory leak in SRP database lookups (CVE-2016-0798) BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797) Fix memory issues in BIO_*printf functions (CVE-2016-0799) Side channel attack on modular exponentiation (CVE-2016-0702) To avoid breaking the ABI, "enable-ssl2" is used, but all the vulnerable or weak ciphers have been removed. For more information, see: https://www.openssl.org/news/secadv/20160301.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702 (* Security fix *) patches/packages/openssl-solibs-1.0.1s-arm-1_slack14.1.txz: Upgraded. patches/packages/php-5.6.18-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.18 (* Security fix *) +--------------------------+ Sun Feb 28 19:20:21 UTC 2016 patches/packages/libssh-0.7.3-arm-1_slack14.1.txz: Upgraded. Fixed weak key generation. Due to a bug in the ephemeral secret key generation for the diffie-hellman-group1 and diffie-hellman-group14 methods, ephemeral secret keys of size 128 bits are generated, instead of the recommended sizes of 1024 and 2048 bits, giving a practical security of 63 bits. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739 (* Security fix *) +--------------------------+ Wed Feb 24 19:20:21 UTC 2016 patches/packages/bind-9.9.8_P3-arm-1_slack14.1.txz: Upgraded. This release fixes two possible denial-of-service issues: render_ecs errors were mishandled when printing out a OPT record resulting in a assertion failure. (CVE-2015-8705) [RT #41397] Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705 (* Security fix *) patches/packages/glibc-2.17-arm-17_slack14.1.txz: Rebuilt. This update provides a patch to fix the stack-based buffer overflow in libresolv that could allow specially crafted DNS responses to seize control of execution flow in the DNS client (CVE-2015-7547). However, due to a patch applied to Slackware's glibc back in 2009 (don't use the gethostbyname4() lookup method as it was causing some cheap routers to misbehave), we were not vulnerable to that issue. Nevertheless it seems prudent to patch the overflows anyway even if we're not currently using the code in question. Thanks to mancha for the backported patch. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547 (* Security fix *) patches/packages/glibc-i18n-2.17-arm-17_slack14.1.txz: Rebuilt. patches/packages/glibc-profile-2.17-arm-17_slack14.1.txz: Rebuilt. patches/packages/glibc-solibs-2.17-arm-17_slack14.1.txz: Rebuilt. patches/packages/libgcrypt-1.5.5-arm-1_slack14.1.txz: Upgraded. Mitigate chosen cipher text attacks on ECDH with Weierstrass curves. Use ciphertext blinding for Elgamal decryption. For more information, see: http://www.cs.tau.ac.IL/~tromer/ecdh/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591 (* Security fix *) patches/packages/ntp-4.2.8p6-arm-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several low and medium severity vulnerabilities. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158 (* Security fix *) +--------------------------+ Tue Feb 9 05:04:03 UTC 2016 patches/packages/curl-7.47.1-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue where NTLM credentials are not checked for proxy connection reuse. The effects of this flaw is that the application could be reusing a proxy connection using the previously used credentials and thus it could be given to or prevented access from resources that it wasn't intended to. Thanks to Isaac Boukris. For more information, see: https://curl.haxx.se/docs/adv_20160127A.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755 (* Security fix *) patches/packages/flac-1.3.1-arm-1_slack14.1.txz: Upgraded. This update is needed by the latest version of libsndfile. patches/packages/libsndfile-1.0.26-arm-1_slack14.1.txz: Upgraded. This release fixes security issues which may allow attackers to cause a denial of service, or possibly execute arbitrary code. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805 (* Security fix *) +--------------------------+ Sun Feb 7 23:23:32 UTC 2016 patches/packages/MPlayer-20160125-arm-1_slack14.1.txz: Upgraded. This is the latest MPlayer-1.2 branch, identical to the 1.2.1 stable release. The bundled ffmpeg has been upgraded to 2.8.5, which fixes two security issues by which a remote attacker may conduct a cross-origin attack and read arbitrary files on the system. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898 (* Security fix *) patches/packages/glibc-zoneinfo-2016a-arm-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. patches/packages/openssl-1.0.1r-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issue: SSLv2 doesn't block disabled ciphers (CVE-2015-3197). For more information, see: https://openssl.org/news/secadv/20160128.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197 (* Security fix *) patches/packages/openssl-solibs-1.0.1r-arm-1_slack14.1.txz: Upgraded. patches/packages/php-5.6.17-arm-1_slack14.1.txz: Upgraded. This release fixes bugs and security issues. ***************************************************************** * IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES * ***************************************************************** PHP 5.4.x has been declared EOL (end of life) and is no longer receiving upstream support. PHP 5.5.x is also no longer on active support status and security fixes will continue only until 5 months from now. For this reason we have provided PHP 5.6 packages as security updates. Be aware that PHP 5.6 is not 100% compatible with PHP 5.4, and some changes may be required to existing web pages written for PHP 5.4. For information on how to migrate from PHP 5.4, please see: http://php.net/manual/en/migration55.php http://php.net/manual/en/migration56.php The final PHP 5.4 packages may be found in /pasture in case there is a need to revert this update. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903 (* Security fix *) pasture/php-5.4.45-arm-1_slack14.1.txz: Added. Moved from /patches/packages/ This is here only if you cannot migrate your PHP applications to PHP-5.6: this version is insecure. +--------------------------+ Fri Jan 15 10:10:10 UTC 2016 patches/packages/dhcp-4.3.3-arm-1_slack14.1.txz: Upgraded. This update fixes a denial-of-service vulnerability. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605 (* Security fix *) patches/packages/openssh-7.1p2-arm-1_slack14.1.txz: Upgraded. This update fixes an information leak and a buffer overflow. In particular, the information leak allows a malicious SSH server to steal the client's private keys. Thanks to Qualys for reporting this issue. For more information, see: https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778 ***************************************************************** * IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES * ***************************************************************** Rather than backport the fix for the information leak (which is the only hazardous flaw), we have upgraded to the latest OpenSSH. As of version 7.0, OpenSSH has deprecated some older (and presumably less secure) algorithms, and also (by default) only allows root login by public-key, hostbased and GSSAPI authentication. Make sure that your keys and authentication method will allow you to continue accessing your system after the upgrade. The release notes for OpenSSH 7.0 list the following incompatible changes to be aware of: * Support for the legacy SSH version 1 protocol is disabled by default at compile time. * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is disabled by default at run-time. It may be re-enabled using the instructions at http://www.openssh.com/legacy.html * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by default at run-time. These may be re-enabled using the instructions at http://www.openssh.com/legacy.html * Support for the legacy v00 cert format has been removed. * The default for the sshd_config(5) PermitRootLogin option has changed from "yes" to "prohibit-password". * PermitRootLogin=without-password/prohibit-password now bans all interactive authentication methods, allowing only public-key, hostbased and GSSAPI authentication (previously it permitted keyboard-interactive and password-less authentication if those were enabled). (* Security fix *) patches/packages/xscreensaver-5.34-arm-1_slack14.1.txz: Upgraded. Patrick promised jwz that he'd keep this updated in -stable when he removed (against his wishes) the nag screen that complains if a year has passed since that version was released. So, here's the latest one. +--------------------------+ Thu Dec 24 01:02:03 UTC 2015 patches/packages/blueman-r708-arm-4_slack14.1.txz: Rebuilt. This update fixes a local privilege escalation vulnerability. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612 (* Security fix *) +--------------------------+ Sat Dec 19 08:04:02 UTC 2015 patches/packages/libpng-1.4.19-arm-1_slack14.1.txz: Upgraded. Fixed an out-of-range read in png_check_keyword(). Thanks to Qixue Xiao. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540 (* Security fix *) +--------------------------+ Wed Dec 16 01:03:01 UTC 2015 patches/packages/bind-9.9.8_P2-arm-1_slack14.1.txz: Upgraded. This update fixes three security issues: Update allowed OpenSSL versions as named is potentially vulnerable to CVE-2015-3193. Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted, triggering a REQUIRE failure when those records were subsequently cached. (CVE-2015-8000) Address fetch context reference count handling error on socket error. (CVE-2015-8461) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8461 (* Security fix *) patches/packages/libpng-1.4.18-arm-1_slack14.1.txz: Upgraded. Fixed incorrect implementation of png_set_PLTE() that uses png_ptr not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126 vulnerability. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472 (* Security fix *) patches/packages/openssl-1.0.1q-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193). Certificate verify crash with missing PSS parameter (CVE-2015-3194). X509_ATTRIBUTE memory leak (CVE-2015-3195). Race condition handling PSK identify hint (CVE-2015-3196). Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794). For more information, see: https://openssl.org/news/secadv_20151203.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196 (* Security fix *) patches/packages/openssl-solibs-1.0.1q-arm-1_slack14.1.txz: Upgraded. +--------------------------+ Fri Dec 4 14:14:14 UTC 2015 patches/packages/libpng-1.4.17-arm-1_slack14.1.txz: Upgraded. Fixed buffer overflows in the png_set_PLTE(), png_get_PLTE(), png_set_tIME(), and png_convert_to_rfc1123() functions that allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126. (* Security fix *) +--------------------------+ Thu Nov 26 01:01:01 UTC 2015 patches/packages/pcre-8.38-arm-1_slack14.1.txz: Upgraded. Fixed overflows that could lead to a denial of service or the execution of arbitrary code. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210 (* Security fix *) +--------------------------+ Fri Nov 6 22:33:44 UTC 2015 patches/packages/kernel-modules-armv7-3.10.92_armv7-arm-1_slack14.1.txz: Upgraded. patches/packages/kernel-modules-kirkwood-3.10.92_kirkwood-arm-1_slack14.1.txz: Upgraded. patches/packages/kernel-modules-versatile-3.10.92_versatile-arm-1_slack14.1.txz: Upgraded. patches/packages/kernel_armv7-3.10.92-arm-1_slack14.1.txz: Upgraded. patches/packages/kernel_kirkwood-3.10.92-arm-1_slack14.1.txz: Upgraded. patches/packages/kernel_versatile-3.10.92-arm-1_slack14.1.txz: Upgraded. patches/packages/mozilla-nss-3.20.1-arm-1_slack14.1.txz: Upgraded. Upgraded to nss-3.20.1 and nspr-4.10.10. This release contains security fixes and improvements. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183 (* Security fix *) +--------------------------+ Fri Oct 30 01:01:01 UTC 2015 patches/packages/curl-7.45.0-arm-1_slack14.1.txz: Upgraded. Fixes some security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237 (* Security fix *) patches/packages/jasper-1.900.1-arm-5_slack14.1.txz: Rebuilt. Applied many security and bug fixes. Thanks to Heinz Wiesinger. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029 (* Security fix *) patches/packages/ntp-4.2.8p4-arm-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several low and medium severity vulnerabilities. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871 (* Security fix *) +--------------------------+ Tue Oct 6 17:18:19 UTC 2015 patches/packages/glibc-zoneinfo-2015g-noarch-1_slack14.1.txz: Upgraded. This package provides the latest timezone updates. +--------------------------+ Sat Oct 3 23:24:25 UTC 2015 patches/packages/php-5.4.45-arm-1_slack14.1.txz: Upgraded. This update fixes some bugs and security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838 (* Security fix *) +--------------------------+ Mon Sep 21 03:02:01 UTC 2015 patches/packages/rp-pppoe-3.11-arm-2_slack14.1.txz: Rebuilt. Rebuilt to add the missing /etc/ppp/plugins/rp-pppoe.so plugin library. Thanks to halinux on LQ for the bug report. +--------------------------+ Tue Sep 15 11:11:11 UTC 2015 patches/packages/ca-certificates-20150426-noarch-2_slack14.1.txz: Rebuilt. Patched update-ca-certificates to remove incompatible command operators used to call 'run-parts'. Thanks to Stuart Winter. +--------------------------+ Thu Sep 3 08:06:04 UTC 2015 patches/packages/bind-9.9.7_P3-arm-1_slack14.1.txz: Upgraded. This update fixes two denial-of-service vulnerabilities: + CVE-2015-5722 is a denial-of-service vector which can be exploited remotely against a BIND server that is performing validation on DNSSEC-signed records. Validating recursive resolvers are at the greatest risk from this defect, but it has not been ruled out that it could be exploited against an authoritative-only nameserver under limited conditions. Servers that are not performing validation are not vulnerable. However, ISC does not recommend disabling validation as a workaround to this issue as it exposes the server to other types of attacks. Upgrading to the patched versions is the recommended solution. All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722. + CVE-2015-5986 is a denial-of-service vector which can be used against a BIND server that is performing recursion. Validation is not required. Recursive resolvers are at the greatest risk from this defect, but it has not been ruled out that it could be exploited against an authoritative-only nameserver under limited conditions. Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to CVE-2015-5986. For more information, see: https://kb.isc.org/article/AA-01287/0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722 https://kb.isc.org/article/AA-01291/0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986 (* Security fix *) patches/packages/gdk-pixbuf2-2.28.2-arm-2_slack14.1.txz: Rebuilt. Gustavo Grieco discovered a heap overflow in the processing of BMP images which may result in the execution of arbitrary code if a malformed image is opened. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491 (* Security fix *) +--------------------------+ Tue Sep 1 17:18:19 UTC 2015 patches/packages/slackpkg-2.82.0-noarch-16_slack14.1.txz: Rebuilt. Removed superflous file left over from the build process. +--------------------------+ Sat Aug 22 08:07:06 UTC 2015 patches/packages/gnutls-3.3.17.1-arm-1_slack14.1.txz: Upgraded. This update fixes some bugs and security issues. For more information, see: http://www.gnutls.org/security.html#GNUTLS-SA-2015-2 http://www.gnutls.org/security.html#GNUTLS-SA-2015-3 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251 (* Security fix *) +--------------------------+ Mon Aug 10 12:23:34 UTC 2015 patches/packages/slackpkg-2.82.0-noarch-15_slack14.1.txz: Rebuilt. Patched to avoid false package name matches when the full name of a package is a substring of another package's name, as happened recently with atk-2.16.0 and at-spi2-atk-2.16.0. Thanks to Eric Hameleers. +--------------------------+ Sat Aug 8 11:22:33 UTC 2015 patches/packages/ca-certificates-20150426-noarch-1_slack14.1.txz: Upgraded. This package updates to the latest CA certificates. patches/packages/mozilla-nss-3.19.2-arm-1_slack14.1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/nss.html (* Security fix *) +--------------------------+ Fri Jul 31 22:39:46 UTC 2015 patches/packages/bind-9.9.7_P2-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue where an error in the handling of TKEY queries can be exploited by an attacker for use as a denial-of-service vector, as a constructed packet can use the defect to trigger a REQUIRE assertion failure, causing BIND to exit. Impact: Both recursive and authoritative servers are vulnerable to this defect. Additionally, exposure is not prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling, before checks enforcing those boundaries. Operators should take steps to upgrade to a patched version as soon as possible. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477 https://kb.isc.org/article/AA-01272 (* Security fix *) patches/packages/slackpkg-2.82.0-noarch-14_slack14.1.txz: Rebuilt. Patched to abort immediately if the date is not recent (at least July 2015). This is usually a problem with Raspberry Pi systems that do not have an RTC, and where no NTP client has been configured: resulting in the system's date being at UNIX Epoch time (1970). With the date so far in the past, GPG fails with a generic verification failure message, resulting in confusion as to whether the packages or keys have been tampered with. ap/slackpkg-2.82.0-noarch-14_slack14.1.txz: Rebuilt. Patched to abort immediately if the date is not recent (at least July 2015). This is usually a problem with Raspberry Pi systems that do not have an RTC, and where no NTP client has been configured: resulting in the system's date being at UNIX Epoch time (1970). With the date so far in the past, GPG fails with a generic verification failure message, resulting in confusion as to whether the packages or keys have been tampered with. This build also expects the updated Slackware ARM GPG key rather than the old ARMedslack key. Ordinarily after a Slackware release, the original 'slackware' tree would never be modified; but users are installing Slackware ARM 14.1 and attempting to update using slackpkg, but are finding that it fails either due to the GPG key mismatch or due to the date being wrong, or both! It's worth reiterating that on ARM, you _must_ read the Change log and not blindly update packages: failure to do so could render your machine unbootable, particularly for the Kernel packages! +--------------------------+ Sat Jul 18 21:09:05 UTC 2015 patches/packages/httpd-2.4.16-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: * CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local URL-path with the INCLUDES filter active, introduced in 2.4.11. * CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a script calls r:wsupgrade() can cause a child process crash. * CVE-2015-3183: core: Fix chunk header parsing defect. Remove apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN filter, parse chunks in a single pass with zero copy. Limit accepted chunk-size to 2^63-1 and be strict about chunk-ext authorized characters. * CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache httpd 2.4) with new ap_some_authn_required and ap_force_authn hook. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185 (* Security fix *) patches/packages/php-5.4.43-arm-1_slack14.1.txz: Upgraded. This update fixes some bugs and security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644 (* Security fix *) +--------------------------+ Fri Jul 10 06:25:04 UTC 2015 patches/packages/bind-9.9.7_P1-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue where an attacker who can cause a validating resolver to query a zone containing specifically constructed contents can cause that resolver to fail an assertion and terminate due to a defect in validation code. This means that a recursive resolver that is performing DNSSEC validation can be deliberately stopped by an attacker who can cause the resolver to perform a query against a maliciously-constructed zone. This will result in a denial of service to clients who rely on that resolver. For more information, see: https://kb.isc.org/article/AA-01267/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620 (* Security fix *) patches/packages/cups-1.5.4-arm-3_slack14.1.txz: Rebuilt. This release fixes a security issue: CWE-911: Improper Update of Reference Count - CVE-2015-1158 This bug could allow an attacker to upload a replacement CUPS configuration file and mount further attacks. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158 (* Security fix *) patches/packages/ntp-4.2.8p3-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue where under specific circumstances an attacker can send a crafted packet to cause a vulnerable ntpd instance to crash. Since this requires 1) ntpd set up to allow remote configuration (not allowed by default), and 2) knowledge of the configuration password, and 3) access to a computer entrusted to perform remote configuration, the vulnerability is considered low-risk. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146 (* Security fix *) patches/packages/openssl-1.0.1p-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issue: Alternative chains certificate forgery (CVE-2015-1793). During certificate verification, OpenSSL (starting from version 1.0.1n and 1.0.2b) will attempt to find an alternative certificate chain if the first attempt to build such a chain fails. An error in the implementation of this logic can mean that an attacker could cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate. This issue will impact any application that verifies certificates including SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication. This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o. This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project. For more information, see: https://openssl.org/news/secadv_20150709.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793 (* Security fix *) patches/packages/openssl-solibs-1.0.1p-arm-1_slack14.1.txz: Upgraded. +--------------------------+ Sat Jun 13 21:00:00 UTC 2015 patches/packages/openssl-1.0.1o-arm-1_slack14.1.txz: Upgraded. Fixes several bugs and security issues: o Malformed ECParameters causes infinite loop (CVE-2015-1788) o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789) o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790) o CMS verify infinite loop with unknown hash function (CVE-2015-1792) o Race condition handling NewSessionTicket (CVE-2015-1791) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791 (* Security fix *) patches/packages/openssl-solibs-1.0.1o-arm-1_slack14.1.txz: Upgraded. patches/packages/php-5.4.41-arm-1_slack14.1.txz: Upgraded. This update fixes some bugs and security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026 (* Security fix *) patches/packages/qt-4.8.7-arm-1_slack14.1.txz: Upgraded. This is a bugfix release. +--------------------------+ Thu May 14 06:05:11 UTC 2015 patches/packages/mariadb-5.5.43-arm-1_slack14.1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499 (* Security fix *) patches/packages/qt-4.8.6-arm-2_slack14.1.txz: Rebuilt. QNAM: Fix upload corruptions when server closes connection This patch fixes several upload corruptions if the server closes the connection while/before we send data into it. cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb patches/packages/wpa_supplicant-2.4-arm-1_slack14.1.txz: Upgraded. This update fixes potential denial of service issues. For more information, see: http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863 (* Security fix *) +--------------------------+ Wed Apr 29 21:18:18 UTC 2015 patches/packages/gnupg-1.4.19-arm-2_slack14.1.txz: Rebuilt. Patched to fix spurious debug messages that may break sbopkg and slackpkg. Thanks to Willy Sudiarto Raharjo. +--------------------------+ Sat Apr 25 07:48:14 UTC 2015 patches/packages/bind-9.9.6_P2-arm-1_slack14.1.txz: Upgraded. Fix some denial-of-service and other security issues. For more information, see: https://kb.isc.org/article/AA-01166/ https://kb.isc.org/article/AA-01161/ https://kb.isc.org/article/AA-01167/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214 (* Security fix *) patches/packages/gnupg-1.4.19-arm-1_slack14.1.txz: Upgraded. * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837 (* Security fix *) patches/packages/httpd-2.4.12-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: * CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer over-read, with response headers' size above 8K. * CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an empty value. PR 56924. * CVE-2014-8109 mod_lua: Fix handling of the Require line when a LuaAuthzProvider is used in multiple Require directives with different arguments. PR57204. * CVE-2013-5704 core: HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. Adds "MergeTrailers" directive to restore legacy behavior. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704 (* Security fix *) patches/packages/libssh-0.6.4-arm-1_slack14.1.txz: Upgraded. This update fixes some security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132 (* Security fix *) patches/packages/mutt-1.5.23-arm-2_slack14.1.txz: Rebuilt. Patched a vulnerability where malformed headers can cause mutt to crash. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116 (* Security fix *) patches/packages/ntp-4.2.8p2-arm-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes the following medium-severity vulnerabilities involving private key authentication: * ntpd accepts unauthenticated packets with symmetric key crypto. * Authentication doesn't protect symmetric associations against DoS attacks. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799 (* Security fix *) patches/packages/openssl-1.0.1m-arm-1_slack14.1.txz: Upgraded. Fixes several bugs and security issues: o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286) o ASN.1 structure reuse memory corruption fix (CVE-2015-0287) o PKCS7 NULL pointer dereferences fix (CVE-2015-0289) o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293) o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209) o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288) o Removed the export ciphers from the DEFAULT ciphers For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288 (* Security fix *) patches/packages/openssl-solibs-1.0.1m-arm-1_slack14.1.txz: Upgraded. patches/packages/php-5.4.40-arm-1_slack14.1.txz: Upgraded. This update fixes some security issues. Please note that this package build also moves the configuration files from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330 (* Security fix *) patches/packages/ppp-2.4.5-arm-4_slack14.1.txz: Rebuilt. Fixed a potential security issue in parsing option files. Fixed remotely triggerable PID overflow that causes pppd to crash. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310 (* Security fix *) patches/packages/proftpd-1.3.4e-arm-1_slack14.1.txz: Upgraded. Patched an issue where mod_copy allowed unauthenticated copying of files via SITE CPFR/CPTO. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306 (* Security fix *) patches/packages/qt-4.8.6-arm-1_slack14.1.txz: Upgraded. Fixed issues with BMP, ICO, and GIF handling that could lead to a denial of service or the execution of arbitrary code when processing malformed images. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860 (* Security fix *) +--------------------------+ Sat Apr 4 11:18:55 UTC 2015 patches/packages/glibc-solibs-2.17-arm-16_slack14.1.txz: Rebuilt. This package had been missed from the previous set of glibc updates. Thanks to the3dfxdude on LQ for making me aware of this:- This update patches a security issue __nss_hostname_digits_dots() function of glibc which may be triggered through the gethostbyname*() set of functions. This flaw could allow local or remote attackers to take control of a machine running a vulnerable version of glibc. Thanks to Qualys for discovering this issue (also known as the GHOST vulnerability.) For more information, see: https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235 (* Security fix *) +--------------------------+ Fri Mar 6 19:57:14 UTC 2015 patches/packages/samba-4.1.17-arm-1_slack14.1.txz: Upgraded. This package fixes security issues since the last update: BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer in netlogon server could lead to security vulnerability. BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference a NULL pointer. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240 (* Security fix *) +--------------------------+ Wed Feb 18 21:20:11 UTC 2015 patches/packages/btrfs-progs-20150213-arm-1_slack14.1.txz: Upgraded. Added the header files to the package. Thanks to Vincent Batts. patches/packages/patch-2.7.4-arm-1_slack14.1.txz: Upgraded. Patch no longer follows symbolic links to input and output files. This ensures that symbolic links created by git-style patches cannot cause patch to write outside the working directory. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196 (* Security fix *) patches/packages/sudo-1.8.12-arm-1_slack14.1.txz: Upgraded. This update fixes a potential security issue by only passing the TZ environment variable it is considered safe. This prevents exploiting bugs in glibc's TZ parser that could be used to read files that the user does not have access to, or to cause a denial of service. For more information, see: http://www.sudo.ws/sudo/alerts/tz.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680 (* Security fix *) +--------------------------+ Thu Feb 12 08:18:35 UTC 2015 patches/packages/gcc-4.8.4-arm-1_slack14.1.txz: Upgraded. In October 2014, the ARM Kernel developers blacklisted GCC versions 4.8.0 up to GCC 4.8.2 (inclusive) because those versions were building kernels that were corrupting file systems. See this post for more details: http://article.gmane.org/gmane.linux.ports.arm.omap/119412 You'll need to upgrade to these GCC packages if you want to build Linux version 3.18 or higher. Thanks to dowelld for the report. patches/packages/gcc-g++-4.8.4-arm-1_slack14.1.txz: Upgraded. patches/packages/gcc-gfortran-4.8.4-arm-1_slack14.1.txz: Upgraded. patches/packages/gcc-gnat-4.8.4-arm-1_slack14.1.txz: Upgraded. patches/packages/gcc-go-4.8.4-arm-1_slack14.1.txz: Upgraded. patches/packages/gcc-java-4.8.4-arm-1_slack14.1.txz: Upgraded. patches/packages/gcc-objc-4.8.4-arm-1_slack14.1.txz: Upgraded. +--------------------------+ Thu Jan 29 20:32:42 UTC 2015 patches/packages/glibc-2.17-arm-16_slack14.1.txz: Rebuilt. This update patches a security issue __nss_hostname_digits_dots() function of glibc which may be triggered through the gethostbyname*() set of functions. This flaw could allow local or remote attackers to take control of a machine running a vulnerable version of glibc. Thanks to Qualys for discovering this issue (also known as the GHOST vulnerability.) For more information, see: https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235 (* Security fix *) patches/packages/glibc-i18n-2.17-arm-16_slack14.1.txz: Rebuilt. patches/packages/glibc-profile-2.17-arm-16_slack14.1.txz: Rebuilt. patches/packages/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded. Upgraded to tzcode2014j and tzdata2014j. +--------------------------+ Mon Jan 26 19:51:04 UTC 2015 patches/packages/samba-4.1.16-arm-1_slack14.1.txz: Upgraded. This update is a security release in order to address CVE-2014-8143 (Elevation of privilege to Active Directory Domain Controller). Samba's AD DC allows the administrator to delegate creation of user or computer accounts to specific users or groups. However, all released versions of Samba's AD DC did not implement the additional required check on the UF_SERVER_TRUST_ACCOUNT bit in the userAccountControl attributes. Most Samba deployments are not of the AD Domain Controller, but are of the classic domain controller, the file server or print server. Only the Active Directory Domain Controller is affected by this issue. Additionally, most sites running the AD Domain Controller do not configure delegation for the creation of user or computer accounts, and so are not vulnerable to this issue, as no writes are permitted to the userAccountControl attribute, no matter what the value. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143 (* Security fix *) patches/packages/freetype-2.5.5-arm-1_slack14.1.txz: Upgraded. This release fixes a security bug that could cause freetype to crash or run programs upon opening a specially crafted file. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240 (* Security fix *) +--------------------------+ Mon Jan 12 21:53:16 UTC 2015 patches/packages/openssl-solibs-1.0.1k-arm-1_slack14.1.txz: Upgraded. (* Security fix *) patches/packages/openssl-1.0.1k-arm-1_slack14.1.txz: Upgraded. This update fixes several security issues: DTLS segmentation fault in dtls1_get_record (CVE-2014-3571) DTLS memory leak in dtls1_buffer_record (CVE-2015-0206) no-ssl3 configuration sets method to NULL (CVE-2014-3569) ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572) RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204) DH client certificates accepted without verification [Server] (CVE-2015-0205) Certificate fingerprints can be modified (CVE-2014-8275) Bignum squaring may produce incorrect results (CVE-2014-3570) For more information, see: https://www.openssl.org/news/secadv_20150108.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 (* Security fix *) +--------------------------+ Sat Dec 27 09:31:39 UTC 2014 patches/packages/ntp-4.2.8-arm-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several high-severity vulnerabilities discovered by Neel Mehta and Stephen Roettger of the Google Security Team. For more information, see: https://www.kb.cert.org/vuls/id/852879 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296 (* Security fix *) patches/packages/php-5.4.36-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues. #68545 (NULL pointer dereference in unserialize.c). #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142) #68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142 (* Security fix *) patches/packages/xorg-server-1.14.3-arm-3.txz: Rebuilt. This update fixes many security issues discovered by Ilja van Sprundel, a security researcher with IOActive. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103 (* Security fix *) patches/packages/xorg-server-xephyr-1.14.3-arm-3.txz: Rebuilt. patches/packages/xorg-server-xnest-1.14.3-arm-3.txz: Rebuilt. patches/packages/xorg-server-xvfb-1.14.3-arm-3.txz: Rebuilt. +--------------------------+ Tue Dec 16 19:08:50 UTC 2014 patches/packages/bind-9.9.6_P1-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue where a failure to place limits on delegation chaining can allow an attacker to crash BIND or cause memory exhaustion. For more information, see: https://kb.isc.org/article/AA-01216 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500 (* Security fix *) patches/packages/openssh-6.7p1-arm-2_slack14.1.txz: Rebuilt. Restored support for tcpwrappers that was dropped by upstream. Thanks to mancha. patches/packages/openvpn-2.3.6-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue that allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet. For more information, see: https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104 (* Security fix *) patches/packages/pidgin-2.10.11-arm-1_slack14.1.txz: Upgraded. This update contains login fixes for MSN and some XMPP servers. patches/packages/wpa_supplicant-2.3-arm-1_slack14.1.txz: Upgraded. This update fixes a remote command-execution vulnerability caused by a failure to adequately sanitize user-supplied input. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686 (* Security fix *) +--------------------------+ Fri Nov 14 19:59:14 UTC 2014 patches/packages/mariadb-5.5.40-arm-2_slack14.1.txz: Rebuilt. Reverted change to my_config.h that breaks compiling many applications that link against the MariaDB libraries. Thanks to Willy Sudiarto Raharjo. patches/packages/pidgin-2.10.10-arm-2_slack14.1.txz: Rebuilt. Fix Gadu-Gadu protocol when GnuTLS is not used. Thanks to mancha. +--------------------------+ Sat Nov 8 16:33:43 UTC 2014 patches/packages/bash-4.2.053-arm-1_slack14.1.txz: Upgraded. Applied all upstream patches. The previously applied patch requiring a specific prefix/suffix in order to parse variables for functions closed all of the known vulnerabilities anyway, but it's clear that until all the patches were applied that the "is this still vulnerable" questions were not going to end... patches/packages/xfce4-weather-plugin-0.8.4-arm-1_slack14.1.txz: Upgraded. Package upgraded to fix the API used to fetch weather data. +--------------------------+ Fri Nov 7 21:32:19 UTC 2014 patches/packages/mariadb-5.5.40-arm-1_slack14.1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464 (* Security fix *) patches/packages/php-5.4.34-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues. #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669) #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670) #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668 (* Security fix *) patches/packages/wget-1.14-arm-3_slack14.1.txz: Rebuilt. This update fixes a symlink vulnerability that could allow an attacker to write outside of the expected directory. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877 (* Security fix *) +--------------------------+ Fri Oct 24 21:43:53 UTC 2014 patches/packages/glibc-2.17-arm-15_slack14.1.txz: Rebuilt. This update fixes several security issues, and adds an extra security hardening patch from Florian Weimer. Thanks to mancha for help with tracking and backporting patches. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040 (* Security fix *) patches/packages/glibc-i18n-2.17-arm-15_slack14.1.txz: Rebuilt. patches/packages/glibc-profile-2.17-arm-15_slack14.1.txz: Rebuilt. patches/packages/glibc-solibs-2.17-arm-15_slack14.1.txz: Rebuilt. patches/packages/glibc-zoneinfo-2014i-noarch-15_slack14.1.txz: Rebuilt. Upgraded to tzcode2014i and tzdata2014i. patches/packages/pidgin-2.10.10-arm-1_slack14.1.txz: Upgraded. This update fixes several security issues: Insufficient SSL certificate validation (CVE-2014-3694) Remote crash parsing malformed MXit emoticon (CVE-2014-3695) Remote crash parsing malformed Groupwise message (CVE-2014-3696) Malicious smiley themes could alter arbitrary files (CVE-2014-3697) Potential information leak from XMPP (CVE-2014-3698) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698 (* Security fix *) +--------------------------+ Wed Oct 22 08:00:52 UTC 2014 patches/packages/openssh-6.7p1-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue that allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653 (* Security fix *) +--------------------------+ Fri Oct 17 11:22:15 UTC 2014 patches/packages/openssl-solibs-1.0.1j-arm-1_slack14.1.txz: Upgraded. (* Security fix *) patches/packages/openssl-1.0.1j-arm-1_slack14.1.txz: Upgraded. This update fixes several security issues: SRTP Memory Leak (CVE-2014-3513): A flaw in the DTLS SRTP extension parsing code allows an attacker, who sends a carefully crafted handshake message, to cause OpenSSL to fail to free up to 64k of memory causing a memory leak. This could be exploited in a Denial Of Service attack. Session Ticket Memory Leak (CVE-2014-3567): When an OpenSSL SSL/TLS/DTLS server receives a session ticket the integrity of that ticket is first verified. In the event of a session ticket integrity check failing, OpenSSL will fail to free memory causing a memory leak. By sending a large number of invalid session tickets an attacker could exploit this issue in a Denial Of Service attack. SSL 3.0 Fallback protection: OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade. Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE (CVE-2014-3566). Build option no-ssl3 is incomplete (CVE-2014-3568): When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them. For more information, see: https://www.openssl.org/news/secadv_20141015.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568 (* Security fix *) +--------------------------+ Tue Sep 30 17:13:28 UTC 2014 patches/packages/bash-4.2.050-arm-1_slack14.1.txz: Upgraded. Another bash update. Here's some information included with the patch: "This patch changes the encoding bash uses for exported functions to avoid clashes with shell variables and to avoid depending only on an environment variable's contents to determine whether or not to interpret it as a shell function." After this update, an environment variable will not go through the parser unless it follows this naming structure: BASH_FUNC_*%% Most scripts never expected to import functions from environment variables, so this change (although not backwards compatible) is not likely to break many existing scripts. It will, however, close off access to the parser as an attack surface in the vast majority of cases. There's already another vulnerability similar to CVE-2014-6271 for which there is not yet a fix, but this hardening patch prevents it (and likely many more similar ones). Thanks to Florian Weimer and Chet Ramey. (* Security fix *) +--------------------------+ Sat Sep 27 14:08:36 UTC 2014 patches/packages/bash-4.2.049-arm-1_slack14.1.txz: Upgraded. This is essentially a rebuild as the preliminary patch for CVE-2014-7169 has been accepted by upstream and is now signed. This also bumps the patchlevel, making it easy to tell this is the fixed version. Possibly more changes to come, given the ongoing discussions on oss-sec. +--------------------------+ Thu Sep 25 21:50:49 UTC 2014 patches/packages/bash-4.2.048-arm-2_slack14.1.txz: Rebuilt. Patched an additional trailing string processing vulnerability discovered by Tavis Ormandy. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 (* Security fix *) +--------------------------+ Thu Sep 25 17:26:04 UTC 2014 patches/packages/bash-4.2.048-arm-1_slack14.1.txz: Upgraded. This update fixes a vulnerability in bash related to how environment variables are processed: trailing code in function definitions was executed, independent of the variable name. In many common configurations (such as the use of CGI scripts), this vulnerability is exploitable over the network. Thanks to Stephane Chazelas for discovering this issue. For more information, see: http://seclists.org/oss-sec/2014/q3/650 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 (* Security fix *) patches/packages/mozilla-nss-3.16.5-arm-1_slack14.1.txz: Upgraded. Fixed an RSA Signature Forgery vulnerability. For more information, see: https://www.mozilla.org/security/announce/2014/mfsa2014-73.html (* Security fix *) +--------------------------+ Mon Sep 8 10:27:42 UTC 2014 patches/packages/mozilla-nss-3.16.4-arm-1_slack14.1.txz: Upgraded. Upgraded to nss-3.16.4 and nspr-4.10.7. patches/packages/php-5.4.32-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120 (* Security fix *) +--------------------------+ Sun Aug 10 08:20:55 UTC 2014 patches/packages/dhcpcd-6.0.5-arm-3_slack14.1.txz: Rebuilt. This update fixes a security issue where a specially crafted packet received from a malicious DHCP server causes dhcpcd to enter an infinite loop causing a denial of service. Thanks to Tobias Stoeckmann for the bug report. (* Security fix *) patches/packages/openssl-1.0.1i-arm-1_slack14.1.txz: Upgraded. This update fixes several security issues: Double Free when processing DTLS packets (CVE-2014-3505) DTLS memory exhaustion (CVE-2014-3506) DTLS memory leak from zero-length fragments (CVE-2014-3507) Information leak in pretty printing functions (CVE-2014-3508) Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509) OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510) OpenSSL TLS protocol downgrade attack (CVE-2014-3511) SRP buffer overrun (CVE-2014-3512) Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139) For more information, see: https://www.openssl.org/news/secadv_20140806.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139 (* Security fix *) patches/packages/openssl-solibs-1.0.1i-arm-1_slack14.1.txz: Upgraded. (* Security fix *) patches/packages/samba-4.1.11-arm-1_slack14.1.txz: Upgraded. This update fixes a remote code execution attack on unauthenticated nmbd NetBIOS name services. A malicious browser can send packets that may overwrite the heap of the target nmbd NetBIOS name services daemon. It may be possible to use this to generate a remote code execution vulnerability as the superuser (root). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560 (* Security fix *) patches/packages/xscreensaver-5.29-arm-1_slack14.1.txz: Upgraded. Disabled nag screen that says "This version of XScreenSaver is very old! Please upgrade!" when the age of the software exceeds 12 months. +--------------------------+ Sun Jul 27 17:48:06 UTC 2014 patches/packages/httpd-2.4.10-arm-1_slack14.1.txz: Upgraded. This update fixes the following security issues: *) SECURITY: CVE-2014-0117 (cve.mitre.org) mod_proxy: Fix crash in Connection header handling which allowed a denial of service attack against a reverse proxy with a threaded MPM. [Ben Reser] *) SECURITY: CVE-2014-0118 (cve.mitre.org) mod_deflate: The DEFLATE input filter (inflates request bodies) now limits the length and compression ratio of inflated request bodies to avoid denial of sevice via highly compressed bodies. See directives DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener] *) SECURITY: CVE-2014-0226 (cve.mitre.org) Fix a race condition in scoreboard handling, which could lead to a heap buffer overflow. [Joe Orton, Eric Covener] *) SECURITY: CVE-2014-0231 (cve.mitre.org) mod_cgid: Fix a denial of service against CGI scripts that do not consume stdin that could lead to lingering HTTPD child processes filling up the scoreboard and eventually hanging the server. By default, the client I/O timeout (Timeout directive) now applies to communication with scripts. The CGIDScriptTimeout directive can be used to set a different timeout for communication with scripts. [Rainer Jung, Eric Covener, Yann Ylavic] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231 (* Security fix *) +--------------------------+ Tue Jul 15 06:48:11 UTC 2014 patches/packages/php-5.4.30-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049 (* Security fix *) +--------------------------+ Sat Jun 28 10:26:22 UTC 2014 patches/packages/bind-9.9.5_P1-arm-1_slack14.1.txz: Upgraded. This fixes security issues and other bugs. Please note that the first CVE only affects Windows, and the second one was claimed to be fixed by an earlier version of BIND. But we'll update anyway just in case. :-) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591 (* Security fix *) patches/packages/gnupg-1.4.17-arm-1_slack14.1.txz: Upgraded. This release includes a security fix to stop a denial of service using garbled compressed data packets which can be used to put gpg into an infinite loop. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617 (* Security fix *) patches/packages/gnupg2-2.0.24-arm-1_slack14.1.txz: Upgraded. This release includes a security fix to stop a denial of service using garbled compressed data packets which can be used to put gpg into an infinite loop. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617 (* Security fix *) patches/packages/samba-4.1.9-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues, including a flaw in Samba's internal DNS server which can be exploited to cause a denial of service, a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage configurations that use shadow_copy* for vfs objects to reveal potentially private server information, a denial of service on the nmbd NetBIOS name services daemon, and a denial of service crash involving overwriting memory on an authenticated connection to the smbd file server. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493 (* Security fix *) patches/packages/yptools-2.14-arm-3_slack14.1.txz: Rebuilt. Corrected yppasswd patch that was causing password changes to fail. Thanks to Henrik Carlqvist. +--------------------------+ Mon Jun 16 17:08:03 UTC 2014 /GPG-KEY: Replaced. The previous PGP key used an @armedslack.org email address, which is set to be retired. All packages for supported versions of Slackware ARM have now been re-signed with the new PGP key. For reference, the old ARMedslack PGP key used to sign the packages can be found here: http://arm.slackware.com/pgp-keys/GPG-KEY-armedslack patches/packages/slackpkg-2.82.0-noarch-12_slack14.1.txz: Rebuilt. Changed the default config to recognise the new Slackware ARM GPG key. +--------------------------+ Thu Jun 12 05:12:03 UTC 2014 patches/packages/php-5.4.29-arm-1_slack14.1.txz: Upgraded. This update fixes bugs and security issues, including a possible denial of service, and an issue where insecure default permissions on the FPM socket may allow local users to run arbitrary code as the apache user. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238 (* Security fix *) +--------------------------+ Sat Jun 7 17:01:19 UTC 2014 patches/packages/gnutls-3.1.25-arm-1_slack14.1.txz: Upgraded. A security issue has been corrected in gnutls. This vulnerability affects the client side of the gnutls library. A server that sends a specially crafted ServerHello could corrupt the memory of a requesting client. This may allow a remote attacker to execute arbitrary code. Additional vulnerabilities in the embedded libtasn1 library have also been patched. Thanks to mancha for the backported patches. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469 (* Security fix *) patches/packages/libtasn1-3.6-arm-1_slack14.1.txz: Upgraded. Multiple security issues have been corrected in the libtasn1 library. These errors allow a remote attacker to cause a denial of service, or possibly to execute arbitrary code. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469 (* Security fix *) patches/packages/mariadb-5.5.37-arm-1_slack14.1.txz: Upgraded. This update contains security fixes and improvements. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440 (* Security fix *) patches/packages/openssl-1.0.1h-arm-1_slack14.1.txz: Upgraded. Multiple security issues have been corrected, including a possible man-in-the-middle attack where weak keying material is forced, denial of service, and the execution of arbitrary code. For more information, see: http://www.openssl.org/news/secadv_20140605.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470 (* Security fix *) patches/packages/openssl-solibs-1.0.1h-arm-1_slack14.1.txz: Upgraded. patches/packages/sendmail-8.14.9-arm-1_slack14.1.txz: Upgraded. This release fixes one security related bug by properly closing file descriptors (except stdin, stdout, and stderr) before executing programs. This bug could enable local users to interfere with an open SMTP connection if they can execute their own program for mail delivery (e.g., via procmail or the prog mailer). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956 (* Security fix *) patches/packages/sendmail-cf-8.14.9-noarch-1_slack14.1.txz: Upgraded. +--------------------------+ Fri Apr 25 18:37:07 UTC 2014 patches/packages/libyaml-0.1.6-arm-1_slack14.1.txz: Upgraded. This update fixes a heap overflow in URI escape parsing of YAML in Ruby, where a specially crafted string could cause a heap overflow leading to arbitrary code execution. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525 https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/ (* Security fix *) patches/packages/openssh-6.6p1-arm-2_slack14.1.txz: Rebuilt. Fixed a bug with curve25519-sha256 that caused a key exchange failure in about 1 in 512 connection attempts. patches/packages/php-5.4.27-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue in the in the awk script detector which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345 (* Security fix *) +--------------------------+ Tue Apr 8 19:00:11 UTC 2014 patches/packages/openssl-1.0.1g-arm-1_slack14.1.txz: Upgraded. This update fixes two security issues: A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server. Thanks for Neel Mehta of Google Security for discovering this bug and to Adam Langley and Bodo Moeller for preparing the fix. Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076 (* Security fix *) patches/packages/openssl-solibs-1.0.1g-arm-1_slack14.1.txz: Upgraded. +--------------------------+ Wed Apr 2 19:27:55 UTC 2014 patches/packages/apr-1.5.0-arm-1_slack14.1.txz: Upgraded. patches/packages/apr-util-1.5.3-arm-1_slack14.1.txz: Upgraded. patches/packages/curl-7.36.0-arm-1_slack14.1.txz: Upgraded. This update fixes four security issues. For more information, see: http://curl.haxx.se/docs/adv_20140326A.html http://curl.haxx.se/docs/adv_20140326B.html http://curl.haxx.se/docs/adv_20140326C.html http://curl.haxx.se/docs/adv_20140326D.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522 (* Security fix *) patches/packages/httpd-2.4.9-arm-1_slack14.1.txz: Upgraded. This update addresses two security issues. Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults when logging truncated cookies. Clean up the cookie logging parser to recognize only the cookie=value pairs, not valueless cookies. mod_dav: Keep track of length of cdata properly when removing leading spaces. Eliminates a potential denial of service from specifically crafted DAV WRITE requests. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438 (* Security fix *) patches/packages/mozilla-nss-3.16-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue: The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492 (* Security fix *) patches/packages/openssh-6.6p1-arm-1_slack14.1.txz: Upgraded. This update fixes a security issue when using environment passing with a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be tricked into accepting any environment variable that contains the characters before the wildcard character. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532 (* Security fix *) +--------------------------+ Tue Mar 18 08:15:07 UTC 2014 patches/packages/gnutls-3.1.22-arm-1_slack14.1.tgz: Upgraded. Fixed a security issue where a specially crafted certificate could bypass certificate validation checks. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092 (* Security fix *) patches/packages/mutt-1.5.23-arm-1_slack14.1.tgz: Upgraded. This update fixes a buffer overflow where malformed RFC2047 header lines could result in denial of service or potentially the execution of arbitrary code as the user running mutt. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467 (* Security fix *) patches/packages/php-5.4.26-arm-1_slack14.1.tgz: Upgraded. This update fixes a flaw where a specially crafted data file may cause a segfault or 100% CPU consumption when a web page uses fileinfo() on it. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943 (* Security fix *) patches/packages/samba-4.1.6-arm-1_slack14.1.tgz: Upgraded. This update fixes two security issues: CVE-2013-4496: Samba versions 3.4.0 and above allow the administrator to implement locking out Samba accounts after a number of bad password attempts. However, all released versions of Samba did not implement this check for password changes, such as are available over multiple SAMR and RAP interfaces, allowing password guessing attacks. CVE-2013-6442: Samba versions 4.0.0 and above have a flaw in the smbcacls command. If smbcacls is used with the "-C|--chown name" or "-G|--chgrp name" command options it will remove the existing ACL on the object being modified, leaving the file or directory unprotected. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442 (* Security fix *) patches/packages/udisks-1.0.5-arm-1_slack14.1.tgz: Upgraded. This update fixes a stack-based buffer overflow when handling long path names. A malicious, local user could use this flaw to create a specially-crafted directory structure that could lead to arbitrary code execution with the privileges of the udisks daemon (root). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004 (* Security fix *) patches/packages/udisks2-2.1.3-arm-1_slack14.1.tgz: Upgraded. This update fixes a stack-based buffer overflow when handling long path names. A malicious, local user could use this flaw to create a specially-crafted directory structure that could lead to arbitrary code execution with the privileges of the udisks daemon (root). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004 (* Security fix *) +--------------------------+ Fri Feb 28 21:51:45 UTC 2014 patches/packages/subversion-1.7.16-arm-1_slack14.1.tgz: Upgraded. Fix denial of service bugs. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032 (* Security fix *) +--------------------------+ Tue Feb 25 20:33:42 UTC 2014 patches/packages/gnutls-3.1.21-arm-1_slack14.1.tgz: Upgraded. This update fixes a flaw where a version 1 intermediate certificate would be considered as a CA certificate by GnuTLS by default. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959 (* Security fix *) patches/packages/mariadb-5.5.35-arm-1_slack14.1.tgz: Upgraded. This update fixes a buffer overflow in the mysql command line client which may allow malicious or compromised database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001 (* Security fix *) patches/packages/shadow-4.1.5.1-arm-3_slack14.1.tgz: Rebuilt. Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c" (CVE-2005-4890) by detaching the controlling terminal in the non-PAM case via a TIOCNOTTY request. Bi-directional protection is excessive and breaks a commonly-used methods for privilege escalation on non-PAM systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript). This update relaxes the restriction and only detaches the controlling tty when the callee is not root (which is, after all, the threat vector). Thanks to mancha for the patch (and the above information). +--------------------------+ Fri Feb 14 19:31:41 UTC 2014 patches/packages/cairo-1.12.16-arm-1_slack14.1.tgz: Upgraded. This is a bugfix update that was tested in -current and found to resolve some outstanding issues with the package that shipped in Slackware 14.1. Removed --enable-xcb-shm (may cause instability with GTK+3). Removed --enable-xlib-xcb (causes GIMP slowdown). Added --enable-ft and --enable-gl. patches/packages/curl-7.35.0-arm-1_slack14.1.tgz: Upgraded. This update fixes a flaw where libcurl could, in some circumstances, reuse the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS request. For more information, see: http://curl.haxx.se/docs/adv_20140129.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015 (* Security fix *) patches/packages/ntp-4.2.6p5-arm-5_slack14.1.tgz: Rebuilt. All stable versions of NTP remain vulnerable to a remote attack where the "ntpdc -c monlist" command can be used to amplify network traffic as part of a denial of service attack. By default, Slackware is not vulnerable since it includes "noquery" as a default restriction. However, it is vulnerable if this restriction is removed. To help mitigate this flaw, "disable monitor" has been added to the default ntp.conf (which will disable the monlist command even if other queries are allowed), and the default restrictions have been extended to IPv6 as well. All users of the NTP daemon should make sure that their ntp.conf contains "disable monitor" to prevent misuse of the NTP service. The new ntp.conf file will be installed as /etc/ntp.conf.new with a package upgrade, but the changes will need to be merged into any existing ntp.conf file by the admin. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211 http://www.kb.cert.org/vuls/id/348126 (* Security fix *) patches/packages/pidgin-2.10.9-arm-1_slack14.1.tgz: Upgraded. This update fixes various security issues and other bugs. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020 (* Security fix *) +--------------------------+ Wed Jan 29 19:07:47 UTC 2014 patches/packages/bind-9.9.4_P2-arm-1_slack14.1.tgz: Upgraded. This update fixes a defect in the handling of NSEC3-signed zones that can cause BIND to be crashed by a specific set of queries. NOTE: According to the second link below, Slackware is probably not vulnerable since we aren't using glibc-2.18 yet. Might as well fix it anyway, though. For more information, see: https://kb.isc.org/article/AA-01078 https://kb.isc.org/article/AA-01085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591 (* Security fix *) patches/packages/mozilla-nss-3.15.4-arm-1_slack14.1.tgz: Upgraded. Upgraded to nss-3.15.4 and nspr-4.10.3. Fixes a possible man-in-the-middle issue. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740 (* Security fix *) +--------------------------+ Tue Jan 14 23:13:25 UTC 2014 patches/packages/libXfont-1.4.7-arm-1_slack14.1.tgz: Upgraded. This update fixes a stack overflow when reading a BDF font file containing a longer than expected string, which could lead to crashes or privilege escalation. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462 (* Security fix *) patches/packages/openssl-solibs-1.0.1f-arm-1_slack14.1.tgz: Upgraded. patches/packages/openssl-1.0.1f-arm-1_slack14.1.tgz: Upgraded. This update fixes the following security issues: Fix for TLS record tampering bug CVE-2013-4353 Fix for TLS version checking bug CVE-2013-6449 Fix for DTLS retransmission bug CVE-2013-6450 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450 (* Security fix *) patches/packages/php-5.4.24-arm-1_slack14.1.tgz: Upgraded. The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420 (* Security fix *) patches/packages/samba-4.1.4-arm-1_slack14.1.tgz: Upgraded. This update fixes a heap-based buffer overflow that may allow AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408 (* Security fix *) +--------------------------+ Sun Dec 22 19:46:02 UTC 2013 patches/packages/gnupg-1.4.16-arm-1_slack14.1.tgz: Fixed the RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack as described by Genkin, Shamir, and Tromer. For more information, see: http://www.cs.tau.ac.il/~tromer/acoustic/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576 (* Security fix *) +--------------------------+ Wed Dec 18 20:15:44 UTC 2013 patches/packages/libiodbc-3.52.8-arm-1_slack14.1.tgz: Upgraded. This update fixes an rpath pointing to a location in /tmp that was found in two test programs (iodbctest and iodbctestw). This could have allowed a local attacker with write access to /tmp to add modified libraries (and execute arbitrary code) as any user running the test programs. Thanks to Christopher Oliver for the bug report. (* Security fix *) patches/packages/libjpeg-v8a-arm-3_slack14.1.tgz: Rebuilt. Fix use of uninitialized memory when decoding images with missing SOS data for the luminance component (Y) in presence of valid chroma data (Cr, Cb). This could allow remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629 (* Security fix *) patches/packages/llvm-3.3-arm-3_slack14.1.tgz: Rebuilt. The LLVM package included binaries with an rpath pointing to the build location in /tmp. This allows an attacker with write access to /tmp to add modified libraries (and execute arbitrary code) as any user running the LLVM binaries. This updated package rebuilds LLVM to exclude the build directories from the rpath information. Thanks to Christopher Oliver for the bug report. (* Security fix *) patches/packages/ruby-1.9.3_p484-arm-1_slack14.1.tgz: Upgraded. This update fixes a heap overflow in floating point parsing. A specially crafted string could cause a heap overflow leading to a denial of service attack via segmentation faults and possibly arbitrary code execution. For more information, see: https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164 (* Security fix *) +--------------------------+ Fri Dec 6 19:50:28 UTC 2013 patches/packages/mozilla-nss-3.15.3-arm-1_slack14.1.tgz: Upgraded. This update contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/announce/2013/mfsa2013-103.html (* Security fix *) +--------------------------+ Sun Nov 24 09:33:41 UTC 2013 patches/packages/scim-1.4.14-arm-5_slack14.1.tgz: Rebuilt. --prefix=/usr had been omitted from the build-time configuration, resulting in some files being placed into /usr/local. Thanks to Jérôme Pinot +--------------------------+ Wed Nov 20 21:26:49 UTC 2013 patches/packages/openssh-6.4p1-arm-1_slack14.1.tgz: Upgraded. sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected. For more information, see: http://www.openssh.com/txt/gcmrekey.adv http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548 (* Security fix *) patches/packages/php-5.4.22-arm-1_slack14.1.tgz: Upgraded. This is a bugfix release. patches/packages/samba-4.1.1-arm-1_slack14.1.tgz: Upgraded. This update fixes two security issues: * Samba versions 3.2.0 and above do not check the underlying file or directory ACL when opening an alternate data stream. * In setups which provide ldap(s) and/or https services, the private key for SSL/TLS encryption might be world readable. This typically happens in active directory domain controller setups. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476 (* Security fix *) Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini. +--------------------------+ Mon Nov 4 19:50:32 UTC 2013 Slackware 14.1 ARM stable is released! It's been another interesting release cycle here at Slackware bringing updated compilers and development tools, the switch from MySQL to MariaDB, and many more improvements throughout the system. Thanks to the team, the upstream developers, the dedicated Slackware community, and everyone else who pitched in to help make this release a reality. Please consider supporting the Slackware project by purchasing goodies from the Slackware Store - http://store.slackware.com If you're an x86/x86_64 user, you can pick up a DVD copy and a subscription too! For donations to Slackware ARM specifically, a donations function exists via PayPal: http://arm.slackware.com/sponsor/ Enjoy this release! +--------------------------+ Sat Nov 2 08:59:41 UTC 2013 ap/dc3dd-7.1.614-arm-1.tgz: Upgraded. kde/kdevelop-4.5.2-arm-1.tgz: Upgraded. kde/kdevelop-php-1.5.2-arm-1.tgz: Upgraded. kde/kdevelop-php-docs-1.5.2-arm-1.tgz: Upgraded. kde/kdevplatform-1.5.2-arm-1.tgz: Upgraded. kde/lskat-4.10.5-arm-2.tgz: Rebuilt. Fixed a typo in slack-desc. n/gnutls-3.1.16-arm-1.tgz: Upgraded. n/network-scripts-14.1-noarch-2.tgz: Rebuilt. Fixed a typo in netconfig. isolinux/*: Rebuilt. Don't produce a flash of screen output when scanning for LVM volumes after completing the package installation. +--------------------------+ Tue Oct 29 18:05:25 UTC 2013 a/mkinitrd-1.4.8-arm-2.tgz: Rebuilt. In mkinitrd_command_generator.sh, if a USB keyboard is detected add the hid_generic module (in addition to usbhid). Recent kernels need this. Thanks to mario. kde/calligra-2.7.4-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca@valencia-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-cs-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-da-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ia-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-it-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.7.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.7.4-noarch-1.tgz: Upgraded. xap/xscreensaver-5.22-arm-2.tgz: Rebuilt. Recompiled to pick up the GPL text (which is used by several screensavers) from libX11's docs. After the last libX11 upgrade the old location was no longer valid. +--------------------------+ Mon Oct 28 21:04:16 UTC 2013 This is Slackware ARM v14.1 release candidate 3. a/glibc-solibs-2.17-arm-14.tgz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-14.tgz: Rebuilt. a/kernel-modules-armv7-3.10.17_armv7-arm-2.tgz: Rebuilt. a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-2.tgz: Rebuilt. a/kernel-modules-versatile-3.10.17_versatile-arm-2.tgz: Rebuilt. a/kernel_armv7-3.10.17-arm-2.tgz: Rebuilt. a/kernel_kirkwood-3.10.17-arm-2.tgz: Rebuilt. a/kernel_versatile-3.10.17-arm-2.tgz: Rebuilt. a/sysvinit-scripts-2.0-noarch-16.tgz: Rebuilt. Check for devtmpfs (not tmpfs) before starting udev. Remove obsolete reference to rc.optical-symlinks in rc.M. Thanks to GazL. ap/pm-utils-1.4.1-arm-5.tgz: Rebuilt. Set all the hooks in the power.d directory to non-executable. This package shouldn't be playing games with the user's settings. Thanks to jtsn. d/kernel-headers-3.10.17-arm-2.tgz: Rebuilt. k/kernel-source-3.10.17-arm-2.tgz: Rebuilt. l/glibc-2.17-arm-14.tgz: Rebuilt. Built against Linux 3.10.17 kernel headers. l/glibc-i18n-2.17-arm-14.tgz: Rebuilt. l/glibc-profile-2.17-arm-14.tgz: Rebuilt. l/poppler-0.24.3-arm-1.tgz: Upgraded. n/gnutls-3.1.15-arm-1.tgz: Upgraded. Fixed an issue where a server that returns more 4 DANE entries could corrupt the memory of a requesting client. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4466 (* Security fix *) xap/xine-ui-0.99.7-arm-1.tgz: Upgraded. Fixed file open dialog with a patch from BLFS. Thanks to mats_b_tegner. isolinux/: Rebuilt. kernels/: Rebuilt. +--------------------------+ Sat Oct 26 12:46:44 UTC 2013 a/pciutils-3.2.0-arm-1.tgz: Upgraded. Thanks to Jérôme Pinot. a/usbutils-007-arm-1.tgz: Upgraded. Thanks to Jérôme Pinot. ap/acct-6.5.4-arm-3.tgz: Rebuilt. Patched to fix broken sa output. Thanks to ktreadway. n/lftp-4.4.9-arm-1.tgz: Upgraded. Reverted to lftp-4.4.9 due to a regression in the mirror function. x/scim-1.4.14-arm-4.tgz: Rebuilt. Put the Qt module in the proper inputmethods directory, and enable the plugin in /etc/profile.d/scim.{csh,sh}. Thanks to guanx. x/xterm-297-arm-1.tgz: Upgraded. +--------------------------+ Tue Oct 22 21:00:56 UTC 2013 This is Slackware ARM v14.1 release candidate 2. glibc and the Linux kernel need rebuilding with the new gcc version, but this will wait until a new kernel version is released at kernel.org (the release schedule is frequent so I don't expect to have to wait for too long). The mini root filesystem for -current has been updated. ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/ a/sharutils-4.14-arm-1.tgz: Upgraded. a/usb_modeswitch-2.0.1-arm-1.tgz: Upgraded. ap/slackpkg-2.82.0-noarch-11.tgz: Rebuilt. Corrected typos in the slackpkg man page. Thanks to sycamorex. d/gcc-4.8.2-arm-1.tgz: Upgraded. d/gcc-g++-4.8.2-arm-1.tgz: Upgraded. d/gcc-gfortran-4.8.2-arm-1.tgz: Upgraded. d/gcc-gnat-4.8.2-arm-1.tgz: Upgraded. d/gcc-go-4.8.2-arm-1.tgz: Upgraded. d/gcc-java-4.8.2-arm-1.tgz: Upgraded. d/gcc-objc-4.8.2-arm-1.tgz: Upgraded. d/libtool-2.4.2-arm-2.tgz: Rebuilt. Rebuilt to update GCC version, which is detected at compile time. Thanks to Larry Hajali. kde/kdelibs-4.10.5-arm-3.tgz: Rebuilt. Reverted three upstream commits which (although technically correct) have the effect of causing KDE to display the wrong icons in some cases. Thanks to alienBOB. l/qt-4.8.5-arm-2.tgz: Rebuilt. Adjusted the SlackBuild to make sure that libwebcore (which is used internally for the Qt build) doesn't end up in QtWebKit.pc. Thanks to Larry Hajali. n/mutt-1.5.22-arm-1.tgz: Upgraded. Thanks to Markus Reichelt for the updates to the ./configure options. n/samba-4.1.0-arm-2.tgz: Rebuilt. Added symlinks for libtalloc.so and libpytalloc-util.so. Thanks to Adis Nezirovic. x/mesa-9.1.7-arm-1.tgz: Upgraded. xap/MPlayer-1.1_20130819-arm-2.tgz: Rebuilt. Added a patch to fix subtitles in the case where MPlayer is recompiled on a system that has libass. Thanks to Marin Glibic. xap/rdesktop-1.8.0-arm-2.tgz: Rebuilt. Patched to fix crash with -P and/or -N. Thanks to mancha. +--------------------------+ Sun Oct 20 07:18:53 UTC 2013 a/glibc-solibs-2.17-arm-13.tgz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-13.tgz: Rebuilt. a/kernel-firmware-20131019git-noarch-1.tgz: Upgraded. a/kernel-modules-armv7-3.10.17_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.17_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.17_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.17-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.17-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.17-arm-1.tgz: Upgraded. ap/hplip-3.13.10-arm-1.tgz: Upgraded. This fixes a polkit race condition that could allow local users to bypass intended access restrictions. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325 (* Security fix *) d/kernel-headers-3.10.17-arm-1.tgz: Upgraded. k/kernel-source-3.10.17-arm-1.tgz: Upgraded. l/glibc-2.17-arm-13.tgz: Rebuilt. Rebuilt against Linux 3.10.17 kernel headers. l/glibc-i18n-2.17-arm-13.tgz: Rebuilt. l/glibc-profile-2.17-arm-13.tgz: Rebuilt. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Fri Oct 18 21:17:38 UTC 2013 This is Slackware ARM 14.1 release candidate 1. a/aaa_base-14.1-arm-1.tgz: Upgraded. a/aaa_elflibs-14.1-arm-3.tgz: Rebuilt. a/cups-1.5.4-arm-2.tgz: Rebuilt. Use a newer backport of the USB quirks patch. Thanks to mancha. Blacklist the usblp module just in case. a/gettext-0.18.2.1-arm-3.tgz: Rebuilt. a/gptfdisk-0.8.7-arm-1.tgz: Upgraded. a/kernel-firmware-20131015git-noarch-1.tgz: Upgraded. a/kernel-modules-armv7-3.10.16_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.16_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.16_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.16-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.16-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.16-arm-1.tgz: Upgraded. a/logrotate-3.8.6-arm-1.tgz: Upgraded. a/minicom-2.6.2-arm-1.tgz: Upgraded. a/pkgtools-14.1-noarch-2.tgz: Rebuilt. Removed obsolete makebootdisk script. Added an /sbin/makebootstick symlink for making a USB boot stick. a/shadow-4.1.5.1-arm-2.tgz: Rebuilt. Updated crypt() patch. Thanks to mancha. a/sysvinit-scripts-2.0-noarch-15.tgz: Rebuilt. Clean up stale cron directories in /var/spool/cron. Create lock/run directories for LVM. Thanks to GazL. Mount cgroup controllers in subfolders. Thanks to Matteo Bernardini. ap/diffutils-3.3-arm-1.tgz: Upgraded. ap/mc-4.8.10-arm-2.tgz: Rebuilt. Upstream fix for crash when moving directories. Upstream fix for command line directory handling. ap/powertop-2.4-arm-1.tgz: Upgraded. ap/slackpkg-2.82.0-noarch-10.tgz: Rebuilt. Verified and corrected the mirrors lists for x86 and x86_64. Changed version numbers from 14.0 to 14.1 in preparation for the upcoming Slackware 14.1 release. Corrected a manpage bug in the file-search section. ap/tmux-1.8-arm-1.tgz: Upgraded. d/cmake-2.8.12-arm-1.tgz: Upgraded. d/gettext-tools-0.18.2.1-arm-3.tgz: Rebuilt. d/guile-2.0.9-arm-1.tgz: Upgraded. d/kernel-headers-3.10.16-arm-1.tgz: Upgraded. d/mercurial-2.7.2-arm-1.tgz: Upgraded. k/kernel-source-3.10.16-arm-1.tgz: Upgraded. kde/ark-4.10.5-arm-2.tgz: Rebuilt. kde/calligra-2.7.3-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0.9-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-cs-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-da-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ia-2.7.3-noarch-1.tgz: Added. kdei/calligra-l10n-it-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.7.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.7.3-noarch-1.tgz: Upgraded. l/dconf-0.18.0-arm-1.tgz: Upgraded. l/gc-7.2d-arm-1.tgz: Added. New dependency for guile. l/gvfs-1.16.3-arm-2.tgz: Rebuilt. l/libarchive-3.1.2-arm-1.tgz: Upgraded. l/libevent-2.0.21-arm-1.tgz: Added. l/libproxy-0.4.11-arm-3.tgz: Rebuilt. l/libtiff-3.9.7-arm-1.tgz: Upgraded. Patched overflows, crashes, and out of bounds writes. Thanks to mancha for the backported patches. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244 (* Security fix *) l/libunistring-0.9.3-arm-1.tgz: Added. New dependency for guile. l/mozilla-nss-3.15.2-arm-2.tgz: Rebuilt. Recompiled with NSS_ENABLE_ECC=1. Thanks to Janusz Dziemidowicz. n/ModemManager-1.0.0-arm-1.tgz: Upgraded. n/NetworkManager-0.9.8.8-arm-1.tgz: Upgraded. n/alpine-2.11-arm-1.tgz: Upgraded. n/conntrack-tools-1.4.2-arm-1.tgz: Added. n/ebtables-2.0.10-arm-1.tgz: Added. n/epic5-1.1.6-arm-1.tgz: Upgraded. n/gnupg-1.4.15-arm-1.tgz: Upgraded. Fixed possible infinite recursion in the compressed packet parser. [CVE-2013-4402] Protect against rogue keyservers sending secret keys. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402 (* Security fix *) n/gnupg2-2.0.22-arm-1.tgz: Upgraded. Fixed possible infinite recursion in the compressed packet parser. [CVE-2013-4402] Protect against rogue keyservers sending secret keys. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402 (* Security fix *) n/gnutls-3.1.14-arm-1.tgz: Upgraded. n/imapd-2.11-arm-1.tgz: Upgraded. n/iproute2-3.10.0-arm-2.tgz: Rebuilt. n/ipset-6.20-arm-1.tgz: Added. n/iptables-1.4.20-arm-1.tgz: Upgraded. n/iptraf-ng-1.1.4-arm-1.tgz: Upgraded. n/iputils-s20121221-arm-1.tgz: Upgraded. n/lftp-4.4.10-arm-1.tgz: Upgraded. n/libmbim-1.4.0-arm-1.tgz: Added. n/libmnl-1.0.3-arm-1.tgz: Added. n/libnetfilter_acct-1.0.2-arm-1.tgz: Added. n/libnetfilter_conntrack-1.0.4-arm-1.tgz: Added. n/libnetfilter_cthelper-1.0.0-arm-1.tgz: Added. n/libnetfilter_cttimeout-1.0.0-arm-1.tgz: Added. n/libnetfilter_log-1.0.1-arm-1.tgz: Added. n/libnetfilter_queue-1.0.2-arm-1.tgz: Added. n/libnfnetlink-1.0.1-arm-1.tgz: Added. n/libqmi-1.4.0-arm-1.tgz: Added. n/mtr-0.85-arm-1.tgz: Upgraded. n/nfacct-1.0.1-arm-1.tgz: Added. n/ntp-4.2.6p5-arm-4.tgz: Rebuilt. If the hardware clock is kept in localtime, save the time to the hardware clock after starting ntpd. This prevents the kernel from saving the system time to the hardware clock every 11 minutes, which would cause the hardware clock to be off by the difference between localtime and UTC. Thanks to tux_dude. n/openssh-6.3p1-arm-1.tgz: Upgraded. n/openvpn-2.3.2-arm-1.tgz: Upgraded. Added configure option --enable-password-save. Thanks to Mario. n/php-5.4.20-arm-1.tgz: Upgraded. n/rfkill-0.5-arm-1.tgz: Upgraded. n/samba-4.1.0-arm-1.tgz: Upgraded. n/tftp-hpa-5.2-arm-1.tgz: Upgraded. n/ulogd-2.0.2-arm-1.tgz: Added. n/yptools-2.14-arm-2.tgz: Rebuilt. Updated yp-tools crypt() patch. Thanks to mancha. tcl/tcl-8.6.1-arm-1.tgz: Upgraded. tcl/tk-8.6.1-arm-1.tgz: Upgraded. x/xauth-1.0.8-arm-1.tgz: Upgraded. x/xbacklight-1.2.1-arm-1.tgz: Upgraded. x/xcompmgr-1.1.6-arm-1.tgz: Upgraded. x/xf86-input-evdev-2.8.2-arm-1.tgz: Upgraded. x/xf86-video-armsoc-dcf32bd-arm-1.tgz: Upgraded. x/xf86-video-fbdev-0.4.4-arm-1.tgz: Upgraded. x/xf86-video-r128-6.9.2-arm-1.tgz: Upgraded. x/xf86-video-savage-2.3.7-arm-1.tgz: Upgraded. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-7.tgz: Rebuilt. x/xorg-server-1.14.3-arm-2.tgz: Rebuilt. Patched a use-after-free bug that can cause an X server crash or memory corruption. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396 (* Security fix *) x/xorg-server-xephyr-1.14.3-arm-2.tgz: Rebuilt. x/xorg-server-xnest-1.14.3-arm-2.tgz: Rebuilt. x/xorg-server-xvfb-1.14.3-arm-2.tgz: Rebuilt. xap/network-manager-applet-0.9.8.4-arm-1.tgz: Upgraded. xap/rdesktop-1.8.0-arm-1.tgz: Upgraded. xap/sane-1.0.24-arm-1.tgz: Upgraded. Upgraded to sane-backends-1.0.24. xfce/exo-0.10.2-arm-2.tgz: Rebuilt. Fix URL handling to not reject magnet links. Thanks to Larry Hajali. extra/tightvnc/tightvnc-1.3.10-arm-6.tgz: Removed. extra/tigervnc/tigervnc-1.1.0-arm-1.tgz: Added. Thanks to alienBOB. extra/x11vnc/x11vnc-0.9.13-arm-2.tgz: Rebuilt. extra/openjdk/*: Removed. This package cannot be maintained on ARMv5 hardware (I don't know why this is, but I always get a segfault building on ARMv5) and therefore it has to go. I've moved the previous packages to the 'unsupported' directory. They're currently out of date and contain many known security vulnerabilities. I may update these in the future if there's demand. ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/openjdk isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sun Oct 13 16:39:51 UTC 2013 a/kernel-modules-armv7-3.10.15_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.15_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.15_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.15-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.15-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.15-arm-1.tgz: Upgraded. d/kernel-headers-3.10.15-arm-1.tgz: Upgraded. k/kernel-source-3.10.15-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Thu Oct 3 19:22:44 UTC 2013 a/etc-14.1-arm-2.tgz: Rebuilt. Added /lib{,64} and /usr/lib{,64} paths to the top of ld.so.conf. a/getty-ps-2.1.0b-arm-3.tgz: Rebuilt. Patched crash bug. Thanks to mancha. a/kernel-modules-armv7-3.10.14_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.14_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.14_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.14-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.14-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.14-arm-1.tgz: Upgraded. a/pkgtools-14.1-noarch-1.tgz: Upgraded. a/sed-4.2.2-arm-1.tgz: Upgraded. ap/mc-4.8.10-arm-1.tgz: Upgraded. ap/vim-7.4.050-arm-1.tgz: Upgraded. d/kernel-headers-3.10.14-arm-1.tgz: Upgraded. d/rcs-5.9.0-arm-1.tgz: Upgraded. k/kernel-source-3.10.14-arm-1.tgz: Upgraded. l/gmp-5.1.3-arm-1.tgz: Upgraded. l/mozilla-nss-3.15.2-arm-1.tgz: Upgraded. Upgraded to nss-3.15.2 and nspr-4.10.1. n/ca-certificates-20130906-noarch-1.tgz: Upgraded. n/rsync-3.1.0-arm-1.tgz: Upgraded. xap/vim-gvim-7.4.050-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sun Sep 29 08:45:08 UTC 2013 a/udev-182-arm-5.tgz: Rebuilt. Fix compilation. Thanks to alienBOB. ap/lm_sensors-3.3.4-arm-1.tgz: Upgraded. d/m4-1.4.17-arm-1.tgz: Upgraded. n/sendmail-8.14.7-arm-1.tgz: Upgraded. n/sendmail-cf-8.14.7-noarch-1.tgz: Upgraded. n/traceroute-2.0.19-arm-1.tgz: Upgraded. x/mesa-9.1.6-arm-2.tgz: Rebuilt. Recompiled with --enable-osmesa. +--------------------------+ Mon Sep 23 19:34:29 UTC 2013 a/sysvinit-scripts-2.0-noarch-14.tgz: Rebuilt. Fix entropy carry in rc.S and rc.6, since /proc/sys/kernel/random/poolsize now gives the pool size in bits rather than bytes. Thanks to Frank Molzahn. a/u-boot-tools-2013.04-arm-2.tgz: Rebuilt. Added offets for Pogoplug and Dockstar systems to /etc/fw_env.config Thanks to Rich Lapointe. n/links-2.8-arm-1.tgz: Upgraded. n/samba-4.0.9-arm-2.tgz: Rebuilt. Added talloc.h, pytalloc-util.pc, and talloc.pc. x/dejavu-fonts-ttf-2.34-noarch-1.tgz: Upgraded. x/xf86-video-armsoc-a7e316f-arm-1.tgz: Upgraded. +--------------------------+ Fri Sep 20 18:28:30 UTC 2013 a/lrzip-0.616-arm-1.tgz: Upgraded. ap/cdrtools-3.01a17-arm-1.tgz: Upgraded. t/transfig-3.2.5e-arm-1.tgz: Upgraded. t/xfig-3.2.5c-arm-1.tgz: Upgraded. x/libX11-1.6.2-arm-1.tgz: Upgraded. x/libXaw-1.0.12-arm-1.tgz: Upgraded. x/libXmu-1.1.2-arm-1.tgz: Upgraded. x/libXpm-3.5.11-arm-1.tgz: Upgraded. x/libXrandr-1.4.2-arm-1.tgz: Upgraded. x/libXv-1.0.10-arm-1.tgz: Upgraded. x/twm-1.0.8-arm-1.tgz: Upgraded. x/util-macros-1.17.1-arm-1.tgz: Upgraded. x/xclipboard-1.1.3-arm-1.tgz: Upgraded. x/xclock-1.0.7-arm-1.tgz: Upgraded. x/xf86-video-armsoc-4c57279-arm-2.tgz: Rebuilt. x/xf86-video-dummy-0.3.7-arm-1.tgz: Upgraded. x/xf86-video-fbdev-0.4.3-arm-7.tgz: Rebuilt. x/xf86-video-vesa-2.3.3-arm-1.tgz: Upgraded. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-6.tgz: Rebuilt. x/xinit-1.3.3-arm-1.tgz: Upgraded. x/xinput-1.6.1-arm-1.tgz: Upgraded. x/xkill-1.0.4-arm-1.tgz: Upgraded. x/xlsclients-1.1.3-arm-1.tgz: Upgraded. x/xman-1.1.3-arm-1.tgz: Upgraded. x/xmodmap-1.0.8-arm-1.tgz: Upgraded. x/xorg-server-1.14.3-arm-1.tgz: Upgraded. x/xorg-server-xephyr-1.14.3-arm-1.tgz: Upgraded. x/xorg-server-xnest-1.14.3-arm-1.tgz: Upgraded. x/xorg-server-xvfb-1.14.3-arm-1.tgz: Upgraded. x/xrdb-1.1.0-arm-1.tgz: Upgraded. xap/imagemagick-6.8.6_10-arm-1.tgz: Upgraded. xap/windowmaker-0.95.5-arm-1.tgz: Upgraded. extra/tightvnc/tightvnc-1.3.10-arm-6.tgz: Rebuilt. +--------------------------+ Wed Sep 18 19:29:08 UTC 2013 This is beta 1 of Slackware ARM v14.1. a/glibc-solibs-2.17-arm-12.tgz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-12.tgz: Rebuilt. ap/slackpkg-2.82.0-noarch-9.tgz: Rebuilt. Patched core-functions.sh to fix searching for qt, phonon, and other packages in cases where package names overlap. Thanks to S�bastien Ballet. d/kernel-headers-3.10.12-arm-1.tgz: Upgraded. l/dconf-0.16.1-arm-2.tgz: Rebuilt. Don't try to restart D-Bus from the installer. All it does is create noise on the console. l/glibc-2.17-arm-12.tgz: Rebuilt. Built against Linux 3.10.12 kernel headers. Patched to fix integer overflows in pvalloc, valloc, and posix_memalign/memalign/aligned_alloc. Thanks to mancha for the backported patch. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332 (* Security fix *) l/glibc-i18n-2.17-arm-12.tgz: Rebuilt. l/glibc-profile-2.17-arm-12.tgz: Rebuilt. l/gnome-themes-standard-3.8.4-arm-1.tgz: Upgraded. l/system-config-printer-1.3.13-arm-1.tgz: Upgraded. +--------------------------+ Tue Sep 17 20:39:11 UTC 2013 x/libXxf86dga-1.1.4-arm-2.tgz: Rebuilt. x/libXxf86misc-1.0.3-arm-2.tgz: Rebuilt. x/libXxf86vm-1.1.3-arm-2.tgz: Rebuilt. x/xf86-video-armsoc-4c57279-arm-1.tgz: Upgraded. Built with './configure --with-drmmode=exynos' since I'd intended this driver to be used for the Samsung Chromebook. x/xf86-video-fbdev-0.4.3-arm-6.tgz: Rebuilt. This was missed in the last round of rebuilds. Thanks to openpandora. x/xf86-video-nouveau-1.0.9-arm-1.tgz: Upgraded. x/xf86bigfontproto-1.2.0-arm-2.tgz: Rebuilt. x/xf86dga-1.0.3-arm-2.tgz: Rebuilt. x/xf86dgaproto-2.1-arm-2.tgz: Rebuilt. x/xf86driproto-2.1.1-arm-2.tgz: Rebuilt. x/xf86miscproto-0.9.3-arm-2.tgz: Rebuilt. x/xf86vidmodeproto-2.3.1-arm-2.tgz: Rebuilt. +--------------------------+ Sun Sep 15 15:11:07 UTC 2013 a/infozip-6.0-arm-3.tgz: Rebuilt. Fixed bzip2 and UID/GID support in unzip. Thanks to Ruarí Ødegaard. a/kernel-firmware-20130914git-noarch-1.tgz: Upgraded. a/kernel-modules-armv7-3.10.12_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.12_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.12_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.12-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.12-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.12-arm-1.tgz: Upgraded. d/help2man-1.43.3-arm-1.tgz: Added. k/kernel-source-3.10.12-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Wed Sep 11 19:15:19 UTC 2013 a/dosfstools-3.0.22-arm-1.tgz: Upgraded. a/glibc-solibs-2.17-arm-11.tgz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-11.tgz: Rebuilt. a/hdparm-9.43-arm-1.tgz: Upgraded. a/kernel-modules-armv7-3.10.11_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.11_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.11_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.11-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.11-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.11-arm-1.tgz: Upgraded. Patched to work with QEMU-1.6.0. This kernel has _only_ been tested with QEMU-1.6.0, so please upgrade your QEMU installation if you'd like to use this kernel. Thanks to Keith C. Perry for the report. a/os-prober-1.63-arm-1.tgz: Added. This is a simple tool that searches partitions for bootable operating systems. d/device-tree-compiler-1.4.0-arm-1.tgz: Upgraded. d/gcc-4.8.1-arm-2.tgz: Rebuilt. d/gcc-g++-4.8.1-arm-2.tgz: Rebuilt. d/gcc-gfortran-4.8.1-arm-2.tgz: Rebuilt. d/gcc-gnat-4.8.1-arm-2.tgz: Rebuilt. d/gcc-go-4.8.1-arm-2.tgz: Rebuilt. d/gcc-java-4.8.1-arm-2.tgz: Rebuilt. d/gcc-objc-4.8.1-arm-2.tgz: Rebuilt. d/git-1.8.4-arm-1.tgz: Upgraded. d/kernel-headers-3.10.11-arm-1.tgz: Upgraded. d/perl-5.18.1-arm-1.tgz: Upgraded. Upgraded to DBI-1.628. Added gettext-1.05. d/subversion-1.7.13-arm-1.tgz: Upgraded. This update fixes a local privilege escalation vulnerability via symlink attack. For more information, see: http://subversion.apache.org/security/CVE-2013-4277-advisory.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277 (* Security fix *) k/kernel-source-3.10.11-arm-1.tgz: Upgraded. l/glibc-2.17-arm-11.tgz: Rebuilt. Compiled against Linux-3.10.11 headers. Patched to remove pt_chown. Thanks to mancha. Note that while this patches CVE-2013-2207 (a local privilege escalation vulnerability), the vulnerability depends upon insecure and non-default settings ("user_allow_other" in /etc/fuse.conf) and the patch is not trivial to port to older versions of glibc. For older versions, the best approach is to not set that option in fuse.conf, as it likely opens up other holes as well. Another approach to mitigate this is to make pt_chown a symlink to /bin/true, as the kernel has handled chowning pseudo terminals for a long time and pt_chown isn't needed at all. l/glibc-i18n-2.17-arm-11.tgz: Rebuilt. l/glibc-profile-2.17-arm-11.tgz: Rebuilt. l/gnome-icon-theme-3.8.3-arm-1.tgz: Upgraded. l/libwnck-2.30.7-arm-4.tgz: Rebuilt. l/startup-notification-0.12-arm-3.tgz: Rebuilt. l/taglib-1.8-arm-2.tgz: Rebuilt. Compile with -DCMAKE_BUILD_TYPE=Release to silence debug messages meant for developers. Thanks to Seb. x/libxcb-1.9.1-arm-1.tgz: Upgraded. x/xbacklight-1.2.0-arm-2.tgz: Rebuilt. x/xcb-util-0.3.9-arm-1.tgz: Upgraded. This update bumps the shared library version, requiring some rebuilds. x/xcb-util-cursor-0.1.0-arm-1.tgz: Upgraded. x/xcb-util-image-0.3.9-arm-2.tgz: Rebuilt. x/xf86-input-acecad-1.5.0-arm-5.tgz: Rebuilt. x/xf86-input-aiptek-1.4.1-arm-5.tgz: Rebuilt. x/xf86-input-evdev-2.8.1-arm-2.tgz: Rebuilt. x/xf86-input-joystick-1.6.1-arm-5.tgz: Rebuilt. x/xf86-input-keyboard-1.7.0-arm-3.tgz: Rebuilt. x/xf86-input-mouse-1.9.0-arm-3.tgz: Rebuilt. x/xf86-input-penmount-1.5.0-arm-5.tgz: Rebuilt. x/xf86-input-synaptics-1.7.1-arm-2.tgz: Rebuilt. x/xf86-input-void-1.4.0-arm-5.tgz: Rebuilt. x/xf86-input-wacom-0.19.0-arm-4.tgz: Rebuilt. x/xf86-video-apm-1.2.5-arm-4.tgz: Rebuilt. x/xf86-video-ark-0.7.5-arm-4.tgz: Rebuilt. x/xf86-video-ast-0.98.0-arm-2.tgz: Rebuilt. x/xf86-video-ati-7.2.0-arm-2.tgz: Rebuilt. x/xf86-video-chips-1.2.5-arm-4.tgz: Rebuilt. x/xf86-video-cirrus-1.5.2-arm-4.tgz: Rebuilt. x/xf86-video-dummy-0.3.6-arm-4.tgz: Rebuilt. x/xf86-video-glint-1.2.8-arm-4.tgz: Rebuilt. x/xf86-video-i128-1.3.6-arm-4.tgz: Rebuilt. x/xf86-video-i740-1.3.4-arm-4.tgz: Rebuilt. x/xf86-video-mach64-6.9.4-arm-4.tgz: Rebuilt. x/xf86-video-mga-1.6.2-arm-4.tgz: Rebuilt. x/xf86-video-modesetting-0.8.0-arm-2.tgz: Rebuilt. x/xf86-video-neomagic-1.2.8-arm-2.tgz: Rebuilt. x/xf86-video-nv-2.1.20-arm-5.tgz: Rebuilt. x/xf86-video-openchrome-0.3.3-arm-2.tgz: Rebuilt. x/xf86-video-r128-6.9.1-arm-5.tgz: Rebuilt. x/xf86-video-rendition-4.2.5-arm-4.tgz: Rebuilt. x/xf86-video-s3-0.6.5-arm-4.tgz: Rebuilt. x/xf86-video-s3virge-1.10.6-arm-5.tgz: Rebuilt. x/xf86-video-savage-2.3.6-arm-5.tgz: Rebuilt. x/xf86-video-siliconmotion-1.7.7-arm-5.tgz: Rebuilt. x/xf86-video-sis-0.10.7-arm-4.tgz: Rebuilt. x/xf86-video-sisusb-0.9.6-arm-4.tgz: Rebuilt. x/xf86-video-tdfx-1.4.5-arm-4.tgz: Rebuilt. x/xf86-video-tga-1.2.2-arm-4.tgz: Rebuilt. x/xf86-video-trident-1.3.6-arm-4.tgz: Rebuilt. x/xf86-video-tseng-1.2.5-arm-4.tgz: Rebuilt. x/xf86-video-v4l-0.2.0-arm-5.tgz: Rebuilt. x/xf86-video-vesa-2.3.2-arm-4.tgz: Rebuilt. x/xf86-video-vmware-13.0.1-arm-3.tgz: Rebuilt. x/xf86-video-voodoo-1.2.5-arm-5.tgz: Rebuilt. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-5.tgz: Rebuilt. x/xf86-video-xgixp-1.8.1-arm-4.tgz: Rebuilt. x/xorg-server-1.14.2-arm-1.tgz: Upgraded. x/xorg-server-xephyr-1.14.2-arm-1.tgz: Upgraded. x/xorg-server-xnest-1.14.2-arm-1.tgz: Upgraded. x/xorg-server-xvfb-1.14.2-arm-1.tgz: Upgraded. xap/blueman-r708-arm-3.tgz: Rebuilt. xfce/Thunar-1.6.3-arm-2.tgz: Rebuilt. xfce/libxfce4ui-4.10.0-arm-2.tgz: Rebuilt. xfce/libxfcegui4-4.10.0-arm-2.tgz: Rebuilt. xfce/xfce4-clipman-plugin-1.2.3-arm-2.tgz: Rebuilt. xfce/xfce4-panel-4.10.1-arm-2.tgz: Rebuilt. xfce/xfce4-power-manager-1.2.0-arm-2.tgz: Rebuilt. xfce/xfce4-screenshooter-1.8.1-arm-2.tgz: Rebuilt. xfce/xfce4-session-4.10.1-arm-2.tgz: Rebuilt. xfce/xfce4-systemload-plugin-1.1.1-arm-2.tgz: Rebuilt. xfce/xfce4-taskmanager-1.0.0-arm-2.tgz: Rebuilt. xfce/xfce4-weather-plugin-0.8.3-arm-2.tgz: Rebuilt. xfce/xfwm4-4.10.1-arm-2.tgz: Rebuilt. extra/brltty/brltty-4.5-arm-1.tgz: Upgraded. extra/emacspeak/emacspeak-38.0-arm-1.tgz: Upgraded. extra/tightvnc/tightvnc-1.3.10-arm-5.tgz: Rebuilt. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sat Aug 31 15:31:16 UTC 2013 a/kernel-modules-armv7-3.10.10_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.10_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.10_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.10-arm-1.tgz: Upgraded. Added kernel debugger support: CONFIG_KGDB=y CONFIG_KGDB_SERIAL_CONSOLE=y a/kernel_kirkwood-3.10.10-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.10-arm-1.tgz: Upgraded. a/kmod-15-arm-1.tgz: Upgraded. a/lvm2-2.02.100-arm-1.tgz: Upgraded. a/mtd-utils-260813-arm-1.tgz: Upgraded. ap/hplip-3.13.8-arm-2.tgz: Rebuilt. Upstream added nohup to 56-hpmud.rules but didn't background the command, which caused the startup delay to return. Adding '&' to fix this. Thanks to burdi01. ap/man-pages-3.53-noarch-1.tgz: Upgraded. d/doxygen-1.8.5-arm-1.tgz: Upgraded. d/gdb-7.6.1-arm-1.tgz: Upgraded. k/kernel-source-3.10.10-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.4.0-arm-1.tgz: Upgraded. kde/oxygen-gtk3-1.2.0-arm-1.tgz: Upgraded. l/boost-1.54.0-arm-3.tgz: Rebuilt. Applied upstream patch to fix "long long" detection with glibc-2.17 or newer. n/bluez-4.99-arm-4.tgz: Rebuilt. Check executable status of rc.bluetooth before allowing a hotplugged device to load modules and start bluetoothd. Thanks to Robby Workman. n/gnupg2-2.0.21-arm-1.tgz: Upgraded. n/gnutls-3.0.31-arm-1.tgz: Upgraded. This update prevents a side-channel attack which may allow remote attackers to conduct distinguishing attacks and plaintext recovery attacks using statistical analysis of timing data for crafted packets. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619 (* Security fix *) n/lftp-4.4.9-arm-1.tgz: Upgraded. n/nettle-2.7.1-arm-1.tgz: Upgraded. n/php-5.4.19-arm-1.tgz: Upgraded. Fixed handling null bytes in subjectAltName (CVE-2013-4248). For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248 (* Security fix *) n/samba-4.0.9-arm-1.tgz: Upgraded. x/xfs-1.1.3-arm-1.tgz: Upgraded. xap/xlockmore-5.43-arm-1.tgz: Upgraded. xap/xscreensaver-5.22-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sun Aug 25 15:58:25 UTC 2013 a/kernel-modules-armv7-3.10.9_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.9_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.9_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.9-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.9-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.9-arm-1.tgz: Upgraded. k/kernel-source-3.10.9-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Fri Aug 23 07:41:27 UTC 2013 ap/hplip-3.13.8-arm-1.tgz: Upgraded. This update fixes a stack-based buffer overflow in the hpmud_get_pml function that can allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267 (* Security fix *) kde/calligra-2.7.2-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-cs-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-da-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-it-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.7.2-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.7.2-noarch-1.tgz: Upgraded. l/poppler-0.24.0-arm-1.tgz: Upgraded. Sanitize error messages to remove escape sequences that could be used to exploit vulnerable terminal emulators. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142 (* Security fix *) l/poppler-data-0.4.6-noarch-1.tgz: Upgraded. l/zlib-1.2.8-arm-1.tgz: Upgraded. x/xf86-video-ast-0.98.0-arm-1.tgz: Upgraded. x/xf86-video-ati-7.2.0-arm-1.tgz: Upgraded. x/xf86-video-neomagic-1.2.8-arm-1.tgz: Upgraded. x/xload-1.1.2-arm-1.tgz: Upgraded. x/xprop-1.2.2-arm-1.tgz: Upgraded. x/xset-1.2.3-arm-1.tgz: Upgraded. x/xwd-1.0.6-arm-1.tgz: Upgraded. xap/xpdf-3.03-arm-2.tgz: Rebuilt. Sanitize error messages to remove escape sequences that could be used to exploit vulnerable terminal emulators. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142 Thanks to mancha. (* Security fix *) xfce/tumbler-0.1.25-arm-3.tgz: Rebuilt. +--------------------------+ Tue Aug 20 19:55:46 UTC 2013 d/strace-4.8-arm-1.tgz: Upgraded. l/qt-4.8.5-arm-1.tgz: Upgraded. xap/MPlayer-1.1_20130819-arm-1.tgz: Upgraded. +--------------------------+ Sat Aug 17 22:54:12 UTC 2013 a/bash-4.2.045-arm-1.tgz: Upgraded. a/dialog-1.2_20130523-arm-1.tgz: Upgraded. a/e2fsprogs-1.42.8-arm-2.tgz: Rebuilt. Moved /sbin/fsck to /sbin/fsck-e2fsprogs to eliminate package overlap with util-linux. Thanks to Sl4ck3ver. a/kernel-modules-armv7-3.10.7_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.7_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.7_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.7-arm-1.tgz: Upgraded. Added support for: * OMAP2/3/4/5 * ARM Versatile Express a/kernel_kirkwood-3.10.7-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.7-arm-1.tgz: Upgraded. a/sysvinit-2.88dsf-arm-4.tgz: Rebuilt. Removed /usr/bin/mountpoint, since this utility is part of util-linux. Thanks to Sl4ck3ver. ap/mariadb-5.5.32-arm-1.tgz: Upgraded. k/kernel-source-3.10.7-arm-1.tgz: Upgraded. kde/amarok-2.8.0-arm-1.tgz: Upgraded. l/boost-1.54.0-arm-2.tgz: Rebuilt. Reverted changeset 82498 to fix building the OQGRAPH Engine for MariaDB. n/dhcpcd-6.0.5-arm-2.tgz: Rebuilt. Don't run the wpa_supplicant hook, since rc.inet1, NetworkManager, and wicd will all do that already, and running it with WEP breaks the network. Properly consider the search list (upstream patch). Thanks to Robby Workman. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Tue Aug 13 08:04:24 UTC 2013 a/kernel-modules-armv7-3.10.6_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.6_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.6_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.6-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.6-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.6-arm-1.tgz: Upgraded. k/kernel-source-3.10.6-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Fri Aug 9 19:36:43 UTC 2013 ap/slackpkg-2.82.0-noarch-8.tgz: Rebuilt. Added USA, Australia, Brazil and Russia mirrors to the default mirrors list. Thanks to Timo Jacob for providing the new mirror servers. +--------------------------+ Fri Aug 9 06:27:42 UTC 2013 a/util-linux-2.21.2-arm-4.txz: Rebuilt. Fixed data type in partx.h to prevent partx from silently truncating kernel table partition sizes/offsets to 4GB on 32-bit platforms. Thanks to Sl4ck3ver. l/glib2-2.36.4-arm-1.txz: Upgraded. +--------------------------+ Tue Aug 6 21:39:12 UTC 2013 n/bind-9.9.3_P2-arm-1.tgz: Upgraded. This update fixes a security issue where a specially crafted query can cause BIND to terminate abnormally, resulting in a denial of service. For more information, see: https://kb.isc.org/article/AA-01015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854 (* Security fix *) n/httpd-2.4.6-arm-1.tgz: Upgraded. This update addresses two security issues: * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249 (* Security fix *) n/samba-4.0.8-arm-1.tgz: Upgraded. This update fixes missing integer wrap protection in an EA list reading that can allow authenticated or guest connections to cause the server to loop, resulting in a denial of service. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124 (* Security fix *) +--------------------------+ Mon Aug 5 21:35:13 UTC 2013 a/aaa_base-14.0-arm-5.tgz: Rebuilt. Updated /etc/os-release to include the new URL for the Slackware ARM web site. a/etc-14.1-arm-1.tgz: Upgraded. Disabled '.' at the end of non-root path, but added new scripts in /etc/profile.d/ to allow enabling it systemwide if desired. a/floppy-5.5-arm-3.tgz: Rebuilt. Upgraded to mtools-4.0.18. a/glibc-solibs-2.17-arm-10.tgz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-10.tgz: Rebuilt. Upgraded to tzcode2013d and tzdata2013d. a/kernel-modules-armv7-3.10.5_armv7-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.10.5_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.10.5_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.5-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.10.5-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.5-arm-1.tgz: Upgraded. d/kernel-headers-3.10.5-arm-1.tgz: Upgraded. k/kernel-source-3.10.5-arm-1.tgz: Upgraded. kde/calligra-2.7.1-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca@valencia-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-cs-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-da-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-it-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.7.1-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.7.1-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-10.tgz: Rebuilt. Built against Linux 3.10.5 Kernel headers. l/glibc-i18n-2.17-arm-10.tgz: Rebuilt. l/glibc-profile-2.17-arm-10.tgz: Rebuilt. n/dhcpcd-6.0.5-arm-1.tgz: Upgraded. Thanks to Roy Marples and Robby Workman for the fixes in this new upstream release. n/ethtool-3.10-arm-1.tgz: Upgraded. n/gnupg-1.4.14-arm-1.tgz: Upgraded. Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. For more information, see: http://eprint.iacr.org/2013/448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242 (* Security fix *) n/iproute2-3.10.0-arm-1.tgz: Upgraded. n/libgcrypt-1.5.3-arm-1.tgz: Upgraded. Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. For more information, see: http://eprint.iacr.org/2013/448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242 (* Security fix *) x/iceauth-1.0.6-arm-1.tgz: Upgraded. x/libX11-1.6.1-arm-1.tgz: Upgraded. x/libXfont-1.4.6-arm-1.tgz: Upgraded. x/libdrm-2.4.46-arm-1.tgz: Upgraded. x/libpciaccess-0.13.2-arm-1.tgz: Upgraded. x/mesa-9.1.6-arm-1.tgz: Upgraded. x/mkfontscale-1.1.1-arm-1.tgz: Upgraded. x/videoproto-2.3.2-arm-1.tgz: Upgraded. x/xconsole-1.0.6-arm-1.tgz: Upgraded. x/xcursor-themes-1.0.4-arm-1.tgz: Upgraded. x/xf86-input-evdev-2.8.1-arm-1.tgz: Upgraded. x/xfd-1.1.2-arm-1.tgz: Upgraded. x/xhost-1.0.6-arm-1.tgz: Upgraded. x/xrandr-1.4.1-arm-1.tgz: Upgraded. x/xterm-296-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Wed Jul 31 19:56:31 UTC 2013 Thanks to Robby Workman for updates on libnl*, dhcpcd, and wpa_supplicant. /INSTALL_TEGRA.TXT: Updated. In the Kernel and initial RAM disk file names, switch '-tegra' with '-armv7' to support the new generic ARMv7 kernel. a/gawk-4.1.0-arm-2.tgz: Rebuilt. Fixed --libdir. Thanks to Speek. a/kernel_tegra-3.9.10-arm-1.tgz: Removed. These packages have been replaced by a generic Kernel that supports a range of systems that have an ARMv7 or greater CPU. If you're a Tegra20 (principally a Compulab TrimSlice) user, you'll need to upgrade the packages like this: # upgradepkg kernel_tegra%kernel_armv7-3.10.4-arm-1.tgz # upgradepkg kernel-modules_tegra%kernel-modules-armv7-3.10.4_armv7-arm-1.tgz Also see section 5.0 ('Booting the Slackware ARM OS') of /INSTALL_TEGRA.TXT to adjust your U-Boot parameters to support the new 'armv7' name. Look for the U-Boot configuration line below the text: 'Configure the U-Boot loader to load the Kernel and Initial RAM disk:' Essentially we've just switched the Kernel and initial RAM disk files from '-tegra' to '-armv7'. You will need to reboot your device into the U-Boot prompt in order to change the U-Boot configuration. a/kernel-modules-armv7-3.10.4_armv7-arm-1.tgz: Added. a/kernel-modules-kirkwood-3.10.4_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz: Removed. a/kernel-modules-versatile-3.10.4_versatile-arm-1.tgz: Upgraded. a/kernel_armv7-3.10.4-arm-1.tgz: Added. This is a generic ARMv7 kernel to support the multitude of devices out there which have an ARMv7 or higher CPU. This is the first version of this generic kernel, so I expect to add new device support over time. a/kernel_kirkwood-3.10.4-arm-1.tgz: Upgraded. a/kernel_versatile-3.10.4-arm-1.tgz: Upgraded. ap/sqlite-3071700-arm-1.tgz: Upgraded. k/kernel-source-3.10.4-arm-1.tgz: Upgraded. l/libnl-1.1.4-arm-1.tgz: Upgraded. l/libnl3-3.2.21-arm-1.tgz: Upgraded. n/NetworkManager-0.9.8.2-arm-2.tgz: Rebuilt. Switched back to dhcpcd instead of dhclient as the default DHCP client in the NetworkManager.conf file. Either one will work, but it's probably better to use dhcpcd by default to avoid a nasty surprise for people who didn't install the dhcp package since they aren't running a DHCP server. n/dhcpcd-6.0.4-arm-1.tgz: Upgraded. n/nmap-6.40-arm-1.tgz: Upgraded. Thanks to ponce for the SlackBuild patch. n/wpa_supplicant-2.0-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. isolinux/uinitrd-tegra.img: Removed. Replaced with uinitrd-armv7.img. kernels/tegra: Removed. Replaced with armv7. kernels/*: Upgraded. +--------------------------+ Sat Jul 27 07:50:05 UTC 2013 d/llvm-3.3-arm-2.tgz: Rebuilt. Recompiled with --enable-experimental-targets=R600. Thanks to Nick Blizzard. l/dconf-0.16.1-arm-1.tgz: Upgraded. l/gnome-themes-standard-3.8.2-arm-1.tgz: Upgraded. l/gstreamer-0.10.36-arm-3.tgz: Rebuilt. Recompiled with --enable-glib-asserts=no to reduce debugging output. Thanks to Willy Sudiarto Raharjo. l/gtk+2-2.24.20-arm-1.tgz: Upgraded. This moves immodules.cache (formerly gtk.immodules) under libdir, allowing us to drop the hostname triplet patch that was needed for multilib. Thanks to Robby Workman. l/gtk+3-3.8.2-arm-2.tgz: Rebuilt. Dropped the host triplet patch since GTK+3 will use a reasonable directory for immodules.cache by default. Fixed the update script to work properly. Thanks to Robby Workman. l/media-player-info-18-arm-1.tgz: Upgraded. n/ca-certificates-20130610-noarch-2.tgz: Rebuilt. Fixed packaging bug that resulted in missing cacert.org certs. Thanks to mancha. x/mesa-9.1.5-arm-1.tgz: Upgraded. +--------------------------+ Thu Jul 18 06:40:02 UTC 2013 a/kernel-modules-kirkwood-3.9.10_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.10_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.10_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.10-arm-1.tgz: Upgraded. a/kernel_tegra-3.9.10-arm-1.tgz: Upgraded. a/kernel_versatile-3.9.10-arm-1.tgz: Upgraded. a/mtd-utils-170713-arm-1.tgz: Upgraded. a/u-boot-tools-2013.04-arm-1.tgz: Upgraded. ap/ddrescue-1.17-arm-1.tgz: Upgraded. ap/mc-4.8.9-arm-1.tgz: Upgraded. k/kernel-source-3.9.10-arm-1.tgz: Upgraded. n/cyrus-sasl-2.1.23-arm-4.tgz: Rebuilt. Patched for new glibc crypt(). Thanks to mancha. n/php-5.4.17-arm-1.tgz: Upgraded. This update fixes an issue where XML in PHP does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113 (* Security fix *) isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Thu Jul 11 18:18:30 UTC 2013 a/acpid-2.0.19-arm-1.tgz: Upgraded. a/dbus-1.6.12-arm-1.tgz: Upgraded. This update fixes a security issue where misuse of va_list could be used to cause a denial of service for system services. Vulnerability reported by Alexandru Cornea. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168 (* Security fix *) a/kernel-firmware-20130708git-noarch-1.tgz: Upgraded. a/lvm2-2.02.98-arm-1.tgz: Upgraded. a/reiserfsprogs-3.6.23-arm-1.tgz: Upgraded. a/sdparm-1.08-arm-1.tgz: Upgraded. a/xz-5.0.5-arm-1.tgz: Upgraded. ap/lsscsi-0.27-arm-1.tgz: Upgraded. d/cvs-1.11.23-arm-2.tgz: Rebuilt. Patched for new glibc crypt(). Thanks to mancha. d/doxygen-1.8.4-arm-1.tgz: Upgraded. d/git-1.8.3.2-arm-1.tgz: Upgraded. d/llvm-3.3-arm-1.tgz: Upgraded. kde/amarok-2.7.1-arm-4.tgz: Rebuilt. kde/ark-4.10.5-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.5-arm-1.tgz: Upgraded. kde/bluedevil-1.3.1-arm-5.tgz: Rebuilt. kde/bomber-4.10.5-arm-1.tgz: Upgraded. kde/bovo-4.10.5-arm-1.tgz: Upgraded. kde/calligra-2.6.4-arm-3.tgz: Rebuilt. kde/dragon-4.10.5-arm-1.tgz: Upgraded. kde/filelight-4.10.5-arm-1.tgz: Upgraded. kde/granatier-4.10.5-arm-1.tgz: Upgraded. kde/gwenview-4.10.5-arm-1.tgz: Upgraded. kde/juk-4.10.5-arm-1.tgz: Upgraded. kde/k3b-2.0.2_20120226.git-arm-5.tgz: Rebuilt. kde/kaccessible-4.10.5-arm-1.tgz: Upgraded. kde/kactivities-4.10.5-arm-1.tgz: Upgraded. kde/kamera-4.10.5-arm-1.tgz: Upgraded. kde/kapman-4.10.5-arm-1.tgz: Upgraded. kde/kate-4.10.5-arm-1.tgz: Upgraded. kde/katomic-4.10.5-arm-1.tgz: Upgraded. kde/kaudiocreator-1.3-arm-5.tgz: Rebuilt. kde/kblackbox-4.10.5-arm-1.tgz: Upgraded. kde/kblocks-4.10.5-arm-1.tgz: Upgraded. kde/kbounce-4.10.5-arm-1.tgz: Upgraded. kde/kbreakout-4.10.5-arm-1.tgz: Upgraded. kde/kcalc-4.10.5-arm-1.tgz: Upgraded. kde/kcharselect-4.10.5-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.5-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.5-arm-1.tgz: Upgraded. kde/kde-baseapps-4.10.5-arm-1.tgz: Upgraded. kde/kde-runtime-4.10.5-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.5-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.5-arm-1.tgz: Upgraded. kde/kdeadmin-4.10.5-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.5-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.5-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.5-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.5-arm-1.tgz: Upgraded. kde/kdelibs-4.10.5-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.5-arm-1.tgz: Upgraded. kde/kdepim-4.10.5-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.5-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.5-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.5-arm-1.tgz: Upgraded. kde/kdesdk-4.10.5-arm-1.tgz: Upgraded. kde/kdetoys-4.10.5-arm-1.tgz: Upgraded. kde/kdevelop-4.5.1-arm-3.tgz: Rebuilt. kde/kdevelop-pg-qt-1.0.0-arm-5.tgz: Rebuilt. kde/kdevelop-php-1.5.1-arm-3.tgz: Rebuilt. kde/kdevelop-php-docs-1.5.1-arm-3.tgz: Rebuilt. kde/kdevplatform-1.5.1-arm-3.tgz: Rebuilt. kde/kdewebdev-4.10.5-arm-1.tgz: Upgraded. kde/kdf-4.10.5-arm-1.tgz: Upgraded. kde/kdiamond-4.10.5-arm-1.tgz: Upgraded. kde/kfloppy-4.10.5-arm-1.tgz: Upgraded. kde/kfourinline-4.10.5-arm-1.tgz: Upgraded. kde/kgamma-4.10.5-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.5-arm-1.tgz: Upgraded. kde/kgpg-4.10.5-arm-1.tgz: Upgraded. kde/kigo-4.10.5-arm-1.tgz: Upgraded. kde/killbots-4.10.5-arm-1.tgz: Upgraded. kde/kio-mtp-fae62fc_20121225git-arm-5.tgz: Rebuilt. kde/kiriki-4.10.5-arm-1.tgz: Upgraded. kde/kjumpingcube-4.10.5-arm-1.tgz: Upgraded. kde/klickety-4.10.5-arm-1.tgz: Upgraded. kde/klines-4.10.5-arm-1.tgz: Upgraded. kde/kmag-4.10.5-arm-1.tgz: Upgraded. kde/kmahjongg-4.10.5-arm-1.tgz: Upgraded. kde/kmines-4.10.5-arm-1.tgz: Upgraded. kde/kmix-4.10.5-arm-1.tgz: Upgraded. kde/kmousetool-4.10.5-arm-1.tgz: Upgraded. kde/kmouth-4.10.5-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.5-arm-1.tgz: Upgraded. kde/knetwalk-4.10.5-arm-1.tgz: Upgraded. kde/kolf-4.10.5-arm-1.tgz: Upgraded. kde/kollision-4.10.5-arm-1.tgz: Upgraded. kde/kolourpaint-4.10.5-arm-1.tgz: Upgraded. kde/konquest-4.10.5-arm-1.tgz: Upgraded. kde/konsole-4.10.5-arm-1.tgz: Upgraded. kde/korundum-4.10.5-arm-1.tgz: Upgraded. kde/kpat-4.10.5-arm-1.tgz: Upgraded. kde/kplayer-0.7.2-arm-5.tgz: Rebuilt. kde/kremotecontrol-4.10.5-arm-1.tgz: Upgraded. kde/kreversi-4.10.5-arm-1.tgz: Upgraded. kde/kross-interpreters-4.10.5-arm-1.tgz: Upgraded. kde/kruler-4.10.5-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.5-arm-1.tgz: Upgraded. kde/kscreen-1.0-arm-2.tgz: Rebuilt. kde/kshisen-4.10.5-arm-1.tgz: Upgraded. kde/ksirk-4.10.5-arm-1.tgz: Upgraded. kde/ksnakeduel-4.10.5-arm-1.tgz: Upgraded. kde/ksnapshot-4.10.5-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.5-arm-1.tgz: Upgraded. kde/ksquares-4.10.5-arm-1.tgz: Upgraded. kde/ksudoku-4.10.5-arm-1.tgz: Upgraded. kde/ktimer-4.10.5-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-5.tgz: Rebuilt. kde/ktuberling-4.10.5-arm-1.tgz: Upgraded. kde/kubrick-4.10.5-arm-1.tgz: Upgraded. kde/kwallet-4.10.5-arm-1.tgz: Upgraded. kde/kwebkitpart-1.3.2-arm-5.tgz: Rebuilt. kde/libkcddb-4.10.5-arm-1.tgz: Upgraded. kde/libkcompactdisc-4.10.5-arm-1.tgz: Upgraded. kde/libkdcraw-4.10.5-arm-1.tgz: Upgraded. kde/libkdegames-4.10.5-arm-1.tgz: Upgraded. kde/libkexiv2-4.10.5-arm-1.tgz: Upgraded. kde/libkipi-4.10.5-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.5-arm-1.tgz: Upgraded. kde/libksane-4.10.5-arm-1.tgz: Upgraded. kde/libkscreen-1.0-arm-2.tgz: Rebuilt. kde/libktorrent-1.3.1-arm-10.tgz: Rebuilt. kde/lskat-4.10.5-arm-1.tgz: Upgraded. kde/mplayerthumbs-4.10.5-arm-1.tgz: Upgraded. kde/nepomuk-core-4.10.5-arm-1.tgz: Upgraded. kde/nepomuk-widgets-4.10.5-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0.8-arm-5.tgz: Rebuilt. kde/okular-4.10.5-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.4-arm-3.tgz: Rebuilt. kde/oxygen-gtk3-1.1.4-arm-3.tgz: Rebuilt. kde/oxygen-icons-4.10.5-arm-1.tgz: Upgraded. kde/palapeli-4.10.5-arm-1.tgz: Upgraded. kde/perlkde-4.10.5-arm-1.tgz: Upgraded. kde/perlqt-4.10.5-arm-1.tgz: Upgraded. kde/picmi-4.10.5-arm-1.tgz: Upgraded. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-5.tgz: Rebuilt. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-5.tgz: Rebuilt. kde/print-manager-4.10.5-arm-1.tgz: Upgraded. kde/qtruby-4.10.5-arm-1.tgz: Upgraded. kde/skanlite-1.0-arm-5.tgz: Rebuilt. kde/smokegen-4.10.5-arm-1.tgz: Upgraded. kde/smokekde-4.10.5-arm-1.tgz: Upgraded. kde/smokeqt-4.10.5-arm-1.tgz: Upgraded. kde/superkaramba-4.10.5-arm-1.tgz: Upgraded. kde/svgpart-4.10.5-arm-1.tgz: Upgraded. kde/sweeper-4.10.5-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-5.tgz: Rebuilt. kdei/kde-l10n-ar-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-bg-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-bs-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca@valencia-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-cs-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-da-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-de-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-el-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-en_GB-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-es-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-et-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-eu-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-fa-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-fi-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-fr-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ga-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-gl-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-he-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-hi-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-hr-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-hu-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ia-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-is-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-it-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ja-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-kk-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-km-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ko-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-lt-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-lv-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-mr-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-nb-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-nds-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-nl-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-nn-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-pa-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-pl-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt_BR-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ro-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ru-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-si-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-sk-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-sl-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-sr-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-sv-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-tg-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-th-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-tr-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-ug-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-uk-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-vi-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-wa-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_CN-4.10.5-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_TW-4.10.5-noarch-1.tgz: Upgraded. l/akonadi-1.9.2-arm-1.tgz: Upgraded. l/alsa-lib-1.0.27.2-arm-1.tgz: Upgraded. l/boost-1.54.0-arm-1.tgz: Upgraded. l/dbus-python-1.2.0-arm-1.tgz: Upgraded. l/freetype-2.5.0.1-arm-1.tgz: Upgraded. l/libpcap-1.4.0-arm-1.tgz: Upgraded. l/sg3_utils-1.36-arm-1.tgz: Upgraded. n/ModemManager-0.6.2.0-arm-1.tgz: Upgraded. n/NetworkManager-0.9.8.2-arm-1.tgz: Upgraded. n/ca-certificates-20130610-noarch-1.tgz: Upgraded. n/dirmngr-1.1.1-arm-1.tgz: Upgraded. n/epic5-1.1.3-arm-3.tgz: Rebuilt. Configured using --with-tcl=/usr/lib${LIBDIRSUFFIX}/tclConfig.sh. n/gnupg-1.4.13-arm-1.tgz: Upgraded. n/gnupg2-2.0.20-arm-1.tgz: Upgraded. n/gpa-0.9.4-arm-1.tgz: Upgraded. n/gpgme-1.4.1-arm-1.tgz: Upgraded. n/libassuan-2.1.0-arm-1.tgz: Upgraded. n/libgcrypt-1.5.2-arm-1.tgz: Upgraded. n/libgpg-error-1.11-arm-1.tgz: Upgraded. n/libksba-1.3.0-arm-1.tgz: Upgraded. n/pinentry-0.8.3-arm-1.tgz: Upgraded. n/samba-4.0.7-arm-1.tgz: Upgraded. n/tcpdump-4.4.0-arm-1.tgz: Upgraded. n/whois-5.0.25-arm-1.tgz: Upgraded. x/libXi-1.7.2-arm-1.tgz: Upgraded. x/mesa-9.1.4-arm-1.tgz: Upgraded. x/xdm-1.1.11-arm-3.tgz: Rebuilt. Patched for new glibc crypt(). Thanks to mancha. x/xterm-295-arm-1.tgz: Upgraded. xap/network-manager-applet-0.9.8.2-arm-1.tgz: Upgraded. xap/xscreensaver-5.21-arm-2.tgz: Rebuilt. Recompiled to fix the path to the GPL for various screensavers that use it as a source of text. +--------------------------+ Fri Jul 5 07:34:33 UTC 2013 a/kernel-modules-kirkwood-3.9.9_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.9_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.9_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.9-arm-1.tgz: Upgraded. a/kernel_tegra-3.9.9-arm-1.tgz: Upgraded. a/kernel_versatile-3.9.9-arm-1.tgz: Upgraded. k/kernel-source-3.9.9-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Fri Jun 28 06:50:35 UTC 2013 a/aaa_elflibs-14.1-arm-2.tgz: Rebuilt. a/bash-4.2.037-arm-2.tgz: Rebuilt. a/cxxlibs-6.0.18-arm-1.tgz: Upgraded. a/dosfstools-3.0.20-arm-1.tgz: Upgraded. a/e2fsprogs-1.42.8-arm-1.tgz: Upgraded. a/ed-1.9-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.9.8_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.8_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.8_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.8-arm-1.tgz: Upgraded. a/kernel_tegra-3.9.8-arm-1.tgz: Upgraded. a/kernel_versatile-3.9.8-arm-1.tgz: Upgraded. a/mdadm-3.2.6-arm-1.tgz: Upgraded. a/mkinitrd-1.4.8-arm-1.tgz: Upgraded. New busybox, changes to mdadm handling. Thanks to Robby Workman. Bugfix for new file command in mkinitrd_command_generator.sh. Thanks to Eric Hameleers. a/procps-3.2.8-arm-4.tgz: Rebuilt. Include header files. Thanks to mancha. a/sysklogd-1.5-arm-5.tgz: Rebuilt. On new installations, restrict the ability to read logs to members of the root group. Thanks to Kees Theunissen. ap/alsa-utils-1.0.27.1-arm-1.tgz: Upgraded. ap/cdrtools-3.01a15-arm-1.tgz: Upgraded. ap/jed-0.99_19-arm-3.tgz: Rebuilt. ap/linuxdoc-tools-0.9.68-arm-4.tgz: Rebuilt. ap/lxc-0.9.0-arm-1.tgz: Upgraded. ap/mpg123-1.15.4-arm-1.tgz: Upgraded. ap/pm-utils-1.4.1-arm-4.tgz: Rebuilt. Merged various patches. Thanks to Robby Workman. Documentation fixes. Thanks to Fabio Sangiovanni. Removed hooks that cause repeated commit=0 mount options with ext filesystems after suspend/resume. Thanks to Marin Glibic. In the 49bluetooth-generic hook, don't take action unless the kernel supports rfkill, the rfkill binary is present, and rc.bluetooth is executable. Thanks to Grifulkin and Darth Vader for the bug report. d/ruby-1.9.3_p448-arm-1.tgz: Upgraded. This update patches a vulnerability in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via a valid certificate issued by a trusted certification authority. For more information, see: http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 (* Security fix *) k/kernel-source-3.9.8-arm-1.tgz: Upgraded. kde/amarok-2.7.1-arm-3.tgz: Rebuilt. kde/ark-4.10.4-arm-2.tgz: Rebuilt. kde/audiocd-kio-4.10.4-arm-2.tgz: Rebuilt. kde/bluedevil-1.3.1-arm-4.tgz: Rebuilt. kde/bomber-4.10.4-arm-2.tgz: Rebuilt. kde/bovo-4.10.4-arm-2.tgz: Rebuilt. kde/calligra-2.6.4-arm-2.tgz: Rebuilt. kde/dragon-4.10.4-arm-2.tgz: Rebuilt. kde/filelight-4.10.4-arm-2.tgz: Rebuilt. kde/granatier-4.10.4-arm-2.tgz: Rebuilt. kde/gwenview-4.10.4-arm-2.tgz: Rebuilt. kde/juk-4.10.4-arm-2.tgz: Rebuilt. kde/k3b-2.0.2_20120226.git-arm-4.tgz: Rebuilt. kde/kaccessible-4.10.4-arm-2.tgz: Rebuilt. kde/kactivities-4.10.4-arm-2.tgz: Rebuilt. kde/kamera-4.10.4-arm-3.tgz: Rebuilt. kde/kapman-4.10.4-arm-2.tgz: Rebuilt. kde/kate-4.10.4-arm-2.tgz: Rebuilt. kde/katomic-4.10.4-arm-2.tgz: Rebuilt. kde/kaudiocreator-1.3-arm-4.tgz: Rebuilt. kde/kblackbox-4.10.4-arm-2.tgz: Rebuilt. kde/kblocks-4.10.4-arm-2.tgz: Rebuilt. kde/kbounce-4.10.4-arm-2.tgz: Rebuilt. kde/kbreakout-4.10.4-arm-2.tgz: Rebuilt. kde/kcalc-4.10.4-arm-2.tgz: Rebuilt. kde/kcharselect-4.10.4-arm-2.tgz: Rebuilt. kde/kcolorchooser-4.10.4-arm-2.tgz: Rebuilt. kde/kde-base-artwork-4.10.4-arm-2.tgz: Rebuilt. kde/kde-baseapps-4.10.4-arm-4.tgz: Rebuilt. kde/kde-runtime-4.10.4-arm-3.tgz: Rebuilt. kde/kde-wallpapers-4.10.4-noarch-2.tgz: Rebuilt. kde/kde-workspace-4.10.4-arm-4.tgz: Rebuilt. kde/kdeadmin-4.10.4-arm-2.tgz: Rebuilt. kde/kdeartwork-4.10.4-arm-2.tgz: Rebuilt. kde/kdegraphics-mobipocket-4.10.4-arm-2.tgz: Rebuilt. kde/kdegraphics-strigi-analyzer-4.10.4-arm-2.tgz: Rebuilt. kde/kdegraphics-thumbnailers-4.10.4-arm-2.tgz: Rebuilt. kde/kdelibs-4.10.4-arm-4.tgz: Rebuilt. kde/kdenetwork-4.10.4-arm-2.tgz: Rebuilt. kde/kdepim-4.10.4-arm-2.tgz: Rebuilt. kde/kdepim-runtime-4.10.4-arm-2.tgz: Rebuilt. kde/kdepimlibs-4.10.4-arm-2.tgz: Rebuilt. kde/kdeplasma-addons-4.10.4-arm-2.tgz: Rebuilt. kde/kdesdk-4.10.4-arm-2.tgz: Rebuilt. kde/kdetoys-4.10.4-arm-2.tgz: Rebuilt. kde/kdevelop-4.5.1-arm-2.tgz: Rebuilt. kde/kdevelop-pg-qt-1.0.0-arm-4.tgz: Rebuilt. kde/kdevelop-php-1.5.1-arm-2.tgz: Rebuilt. kde/kdevelop-php-docs-1.5.1-arm-2.tgz: Rebuilt. kde/kdevplatform-1.5.1-arm-2.tgz: Rebuilt. kde/kdewebdev-4.10.4-arm-2.tgz: Rebuilt. kde/kdf-4.10.4-arm-2.tgz: Rebuilt. kde/kdiamond-4.10.4-arm-2.tgz: Rebuilt. kde/kfloppy-4.10.4-arm-2.tgz: Rebuilt. kde/kfourinline-4.10.4-arm-2.tgz: Rebuilt. kde/kgamma-4.10.4-arm-2.tgz: Rebuilt. kde/kgoldrunner-4.10.4-arm-2.tgz: Rebuilt. kde/kgpg-4.10.4-arm-2.tgz: Rebuilt. kde/kigo-4.10.4-arm-2.tgz: Rebuilt. kde/killbots-4.10.4-arm-2.tgz: Rebuilt. kde/kio-mtp-fae62fc_20121225git-arm-4.tgz: Rebuilt. kde/kiriki-4.10.4-arm-2.tgz: Rebuilt. kde/kjumpingcube-4.10.4-arm-2.tgz: Rebuilt. kde/klickety-4.10.4-arm-2.tgz: Rebuilt. kde/klines-4.10.4-arm-2.tgz: Rebuilt. kde/kmag-4.10.4-arm-2.tgz: Rebuilt. kde/kmahjongg-4.10.4-arm-2.tgz: Rebuilt. kde/kmines-4.10.4-arm-2.tgz: Rebuilt. kde/kmix-4.10.4-arm-2.tgz: Rebuilt. kde/kmousetool-4.10.4-arm-2.tgz: Rebuilt. kde/kmouth-4.10.4-arm-2.tgz: Rebuilt. kde/knavalbattle-4.10.4-arm-2.tgz: Rebuilt. kde/knetwalk-4.10.4-arm-2.tgz: Rebuilt. kde/kolf-4.10.4-arm-2.tgz: Rebuilt. kde/kollision-4.10.4-arm-2.tgz: Rebuilt. kde/kolourpaint-4.10.4-arm-2.tgz: Rebuilt. kde/konquest-4.10.4-arm-2.tgz: Rebuilt. kde/konsole-4.10.4-arm-2.tgz: Rebuilt. kde/korundum-4.10.4-arm-2.tgz: Rebuilt. kde/kpat-4.10.4-arm-2.tgz: Rebuilt. kde/kplayer-0.7.2-arm-4.tgz: Rebuilt. kde/kremotecontrol-4.10.4-arm-2.tgz: Rebuilt. kde/kreversi-4.10.4-arm-2.tgz: Rebuilt. kde/kross-interpreters-4.10.4-arm-2.tgz: Rebuilt. kde/kruler-4.10.4-arm-2.tgz: Rebuilt. kde/ksaneplugin-4.10.4-arm-2.tgz: Rebuilt. kde/kscreen-1.0-arm-1.tgz: Upgraded. kde/kshisen-4.10.4-arm-2.tgz: Rebuilt. kde/ksirk-4.10.4-arm-2.tgz: Rebuilt. kde/ksnakeduel-4.10.4-arm-2.tgz: Rebuilt. kde/ksnapshot-4.10.4-arm-2.tgz: Rebuilt. kde/kspaceduel-4.10.4-arm-2.tgz: Rebuilt. kde/ksquares-4.10.4-arm-2.tgz: Rebuilt. kde/ksudoku-4.10.4-arm-2.tgz: Rebuilt. kde/ktimer-4.10.4-arm-2.tgz: Rebuilt. kde/ktorrent-4.3.1-arm-4.tgz: Rebuilt. kde/ktuberling-4.10.4-arm-2.tgz: Rebuilt. kde/kubrick-4.10.4-arm-2.tgz: Rebuilt. kde/kwallet-4.10.4-arm-2.tgz: Rebuilt. kde/kwebkitpart-1.3.2-arm-4.tgz: Rebuilt. kde/libkcddb-4.10.4-arm-2.tgz: Rebuilt. kde/libkcompactdisc-4.10.4-arm-2.tgz: Rebuilt. kde/libkdcraw-4.10.4-arm-2.tgz: Rebuilt. kde/libkdegames-4.10.4-arm-2.tgz: Rebuilt. kde/libkexiv2-4.10.4-arm-2.tgz: Rebuilt. kde/libkipi-4.10.4-arm-2.tgz: Rebuilt. kde/libkmahjongg-4.10.4-arm-2.tgz: Rebuilt. kde/libksane-4.10.4-arm-2.tgz: Rebuilt. kde/libkscreen-1.0-arm-1.tgz: Upgraded. kde/libktorrent-1.3.1-arm-8.tgz: Rebuilt. kde/lskat-4.10.4-arm-2.tgz: Rebuilt. kde/mplayerthumbs-4.10.4-arm-2.tgz: Rebuilt. kde/nepomuk-core-4.10.4-arm-4.tgz: Rebuilt. kde/nepomuk-widgets-4.10.4-arm-2.tgz: Rebuilt. kde/networkmanagement-0.9.0.8-arm-4.tgz: Rebuilt. kde/okular-4.10.4-arm-2.tgz: Rebuilt. kde/oxygen-gtk2-1.3.4-arm-2.tgz: Rebuilt. kde/oxygen-gtk3-1.1.4-arm-2.tgz: Rebuilt. kde/oxygen-icons-4.10.4-arm-2.tgz: Rebuilt. kde/palapeli-4.10.4-arm-2.tgz: Rebuilt. kde/perlkde-4.10.4-arm-2.tgz: Rebuilt. kde/perlqt-4.10.4-arm-2.tgz: Rebuilt. kde/picmi-4.10.4-arm-2.tgz: Rebuilt. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-4.tgz: Rebuilt. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-4.tgz: Rebuilt. kde/print-manager-4.10.4-arm-2.tgz: Rebuilt. kde/qtruby-4.10.4-arm-2.tgz: Rebuilt. kde/skanlite-1.0-arm-4.tgz: Rebuilt. kde/smokegen-4.10.4-arm-2.tgz: Rebuilt. kde/smokekde-4.10.4-arm-2.tgz: Rebuilt. kde/smokeqt-4.10.4-arm-2.tgz: Rebuilt. kde/superkaramba-4.10.4-arm-2.tgz: Rebuilt. kde/svgpart-4.10.4-arm-2.tgz: Rebuilt. kde/sweeper-4.10.4-arm-2.tgz: Rebuilt. kde/wicd-kde-0.3.0_bcf27d8-arm-4.tgz: Rebuilt. l/aalib-1.4rc5-arm-4.tgz: Rebuilt. Patched aalib.m4 to fix linking problems. Thanks to gmgf. l/alsa-lib-1.0.27.1-arm-1.tgz: Upgraded. l/gdk-pixbuf2-2.28.2-arm-1.tgz: Upgraded. l/glib2-2.36.3-arm-1.tgz: Upgraded. l/gnome-icon-theme-3.8.2-arm-2.tgz: Rebuilt. Upgraded to gnome-icon-theme-symbolic-3.8.3. l/gst-plugins-good-0.10.31-arm-3.tgz: Rebuilt. l/gtk+2-2.24.19-arm-1.tgz: Upgraded. l/gvfs-1.16.3-arm-1.tgz: Upgraded. l/pcre-8.33-arm-1.tgz: Upgraded. Add --enable-pcre16 and --enable-pcre32 options, needed to build Qt5 with the system PCRE library. Thanks to Larry Hajali. l/qtscriptgenerator-0.2.0-arm-2.tgz: Rebuilt. Packaged libqtscript_uitools. Thanks to Luigi Trovato. l/v4l-utils-0.9.5-arm-1.tgz: Upgraded. n/curl-7.31.0-arm-1.tgz: Upgraded. This fixes a minor security issue where a decode buffer boundary flaw in libcurl could lead to heap corruption. For more information, see: http://curl.haxx.se/docs/adv_20130622.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174 (* Security fix *) n/links-2.7-arm-2.tgz: Rebuilt. n/openssh-6.2p2-arm-1.tgz: Upgraded. x/libFS-1.0.5-arm-1.tgz: Upgraded. x/libX11-1.6.0-arm-1.tgz: Upgraded. x/libXau-1.0.8-arm-1.tgz: Upgraded. x/libXcursor-1.1.14-arm-1.tgz: Upgraded. x/libXext-1.3.2-arm-1.tgz: Upgraded. x/libXfixes-5.0.1-arm-1.tgz: Upgraded. x/libXinerama-1.1.3-arm-1.tgz: Upgraded. x/libXp-1.0.2-arm-1.tgz: Upgraded. x/libXrandr-1.4.1-arm-1.tgz: Upgraded. x/libXrender-0.9.8-arm-1.tgz: Upgraded. x/libXres-1.0.7-arm-1.tgz: Upgraded. x/libXt-1.1.4-arm-1.tgz: Upgraded. x/libXtst-1.2.2-arm-1.tgz: Upgraded. x/libXv-1.0.8-arm-1.tgz: Upgraded. x/libXvMC-1.0.8-arm-1.tgz: Upgraded. x/libXxf86dga-1.1.4-arm-1.tgz: Upgraded. x/libXxf86vm-1.1.3-arm-1.tgz: Upgraded. x/libdmx-1.1.3-arm-1.tgz: Upgraded. x/mesa-9.1.3-arm-1.tgz: Upgraded. x/xdpyinfo-1.3.1-arm-1.tgz: Upgraded. x/xf86-video-modesetting-0.8.0-arm-1.tgz: Upgraded. x/xf86-video-nouveau-1.0.8-arm-1.tgz: Upgraded. x/xf86-video-openchrome-0.3.3-arm-1.tgz: Upgraded. x/xterm-293-arm-1.tgz: Upgraded. xap/gimp-2.8.6-arm-1.tgz: Upgraded. xap/xine-ui-0.99.6-arm-2.tgz: Rebuilt. isolinux/*: Rebuilt kernels/*: Upgraded. +--------------------------+ Sun Jun 16 10:06:50 UTC 2013 Finally I've been able to get gcc-4.8.1 to compile a _bootable_ and stable Linux Kernel version 3.9.6, so we now have gcc-4.8.1 in the D series! (I've stowed gcc-4.7.2 away in '/pasture' just incase!) In the kernel packages I have added module "crc32c" into the initrd to support the "xfs" file system driver. This should have automatically been added to the initrd but due to a lack of an implicitly stated dependency, it is not. For more details, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608538 If anybody sees any other modules failing to load due to missing symbols (everything looks fine in this Kernel version, but some may slip through in future versions), please let me know. The mini root filesystem for -current has also been updated: ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/ - Stuart. /INSTALL_RASPBERRYPI.TXT: Updated. The Raspberry Pi support information has been moved to the ARM section of the Slackware Documentation Project, so that it can be maintained by the community: http://docs.slackware.com/howtos:hardware:arm:raspberrypi a/glibc-solibs-2.17-arm-9.tgz: Rebuilt. a/glibc-zoneinfo-2013c-noarch-9.tgz: Rebuilt. a/kernel-modules-kirkwood-3.9.6_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.6_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.6_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.6-arm-1.tgz: Upgraded. a/kernel_tegra-3.9.6-arm-1.tgz: Upgraded. a/kernel_versatile-3.9.6-arm-1.tgz: Upgraded. a/sysvinit-scripts-2.0-noarch-13.tgz: Rebuilt. Fixed detection of the ARM Versatile and Raspberry Pi devices when being installed from the Slackware Installer. d/gcc-4.8.1-arm-1.tgz: Upgraded. d/gcc-g++-4.8.1-arm-1.tgz: Upgraded. d/gcc-gfortran-4.8.1-arm-1.tgz: Upgraded. d/gcc-gnat-4.8.1-arm-1.tgz: Upgraded. d/gcc-go-4.8.1-arm-1.tgz: Upgraded. d/gcc-java-4.8.1-arm-1.tgz: Upgraded. d/gcc-objc-4.8.1-arm-1.tgz: Upgraded. d/kernel-headers-3.9.6-arm-1.tgz: Upgraded. k/kernel-source-3.9.6-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-cs-2.6.4-noarch-1.tgz: Added. kdei/calligra-l10n-da-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-en_GB-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-it-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.6.4-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.6.4-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-9.tgz: Rebuilt. Built against Linux 3.9.6 Kernel headers and compiled with gcc-4.8.1. l/glibc-i18n-2.17-arm-9.tgz: Rebuilt. l/glibc-profile-2.17-arm-9.tgz: Rebuilt. isolinux/*: Rebuilt. When installing on a Raspberry Pi, suggest to the user that they disable fsck checks; since without an RTC, a time-based fsck will run whenever the OS is booted. This is the same check you may have seen when installing on the QEMU/ARM Versatile platform. Thanks to stanley garvey for the suggestion. kernels/*: Upgraded. pasture/gcc-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-g++-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-gfortran-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-gnat-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-go-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-java-4.7.2-arm-4.tgz: Moved here from the D series. pasture/gcc-objc-4.7.2-arm-4.tgz: Moved here from the D series. +--------------------------+ Wed Jun 12 18:34:41 UTC 2013 a/gzip-1.6-arm-1.tgz: Upgraded. a/kernel-firmware-20130610git-noarch-1.tgz: Upgraded. a/ntfs-3g-2013.1.13-arm-1.tgz: Upgraded. Removed the HAL 10-ntfs-3g-policy.fdi file. a/sysvinit-scripts-2.0-noarch-12.tgz: Rebuilt. Open a login process on /dev/ttyAMA0 when this package is installed upon the Raspberry Pi. Thanks to stanley garvey. ap/gphoto2-2.5.2-arm-1.tgz: Upgraded. ap/hplip-3.13.5-arm-3.tgz: Rebuilt. Recompiled against libgphoto2-2.5.2. ap/ksh93-2012_08_01-arm-1.tgz: Upgraded. kde/kamera-4.10.4-arm-2.tgz: Rebuilt. Recompiled against libgphoto2-2.5.2. kde/kde-runtime-4.10.4-arm-2.tgz: Rebuilt. Use -DSAMBA_INCLUDE_DIR=/usr/include/samba-4.0 with cmake to fix building kio_smb.so. Thanks to alienBOB. l/gvfs-1.16.2-arm-2.tgz: Rebuilt. Recompiled against libgphoto2-2.5.2. l/libgphoto2-2.5.2-arm-1.tgz: Upgraded. l/libxml2-2.9.1-arm-1.tgz: Upgraded. l/libxslt-1.1.28-arm-1.tgz: Upgraded. l/pil-1.1.7-arm-4.tgz: Rebuilt. Recompiled against libgphoto2-2.5.2. n/php-5.4.16-arm-1.tgz: Upgraded. This is a bugfix release. It also fixes a security issue -- a heap-based overflow in the quoted_printable_encode() function, which could be used by a remote attacker to crash PHP or execute code as the 'apache' user. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110 (* Security fix *) x/mesa-9.1.2-arm-2.tgz: Rebuilt. Recompiled adding the configuration option '--enable-xa'. x/xdg-utils-1.1.0_rc1-arm-3.tgz: Rebuilt. Support the MATE DE. Thanks to T3slider. xap/sane-1.0.23-arm-2.tgz: Rebuilt. Recompiled against libgphoto2-2.5.2. Removed the HAL 10-libsane.fdi file. Modified the udev rules so they'll be processed on change actions as well as add actions, which might fix the device permissions errors some people have reported. Thanks to Phil Bevan. +--------------------------+ Sun Jun 9 07:18:28 UTC 2013 a/kernel-modules-kirkwood-3.9.5_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.5_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.5_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.5-arm-1.tgz: Upgraded. Compiled I2C into the kernel to keep aligned with the Tegra kernel. a/kernel_tegra-3.9.5-arm-1.tgz: Upgraded. Compiled 'rtc-em3027' into the kernel to support the RTC on the Trimslice. We previously had this loaded as a module from the installer and the initrd but it seemed to have trouble reading and setting the clock, so I've compiled it in to see if it helps (I'm not sure why it should help, but back in 1996 this sort of approach was the cure ;-) ) Compiled I2C into the kernel (rather than as a module) to satisfy dependencies. a/kernel_versatile-3.9.5-arm-1.tgz: Upgraded. ap/hplip-3.13.5-arm-2.tgz: Rebuilt. Background the udev hp-config_usb_printer process to avoid long delays. Thanks to timkb4cq. ap/linuxdoc-tools-0.9.68-arm-3.tgz: Rebuilt. Recompiled against perl-5.18.0. ap/vim-7.3.1087-arm-1.tgz: Upgraded. Vim patch 7.0.88 rewrote the regexp engine. Unfortunately the new implementation was causing long delays of 10 seconds or more when opening or scrolling any file of a type for which vim does color syntax highlighting. Patch 7.3.1110 attempted to fix this, and more patches released today correct other bugs in this new regexp engine (including patch 7.3.1111 which doesn't even fully apply correctly). Even with all the fixes applied, the new engine is grossly inefficient when compared with the old one, and it is obvious that vim is running much more slowly even on my fastest machine. It seems like the best course of action is to take all the patches before the one that changed the regexp engine and then give upstream some time to figure this all out. Thanks to Benjamin Trigona-Harany for the bug report. d/git-1.8.3-arm-1.tgz: Upgraded. d/perl-5.18.0-arm-1.tgz: Upgraded. d/subversion-1.7.10-arm-1.tgz: Upgraded. d/swig-2.0.10-arm-1.tgz: Upgraded. k/kernel-source-3.9.5-arm-1.tgz: Upgraded. kde/amarok-2.7.1-arm-2.tgz: Rebuilt. kde/ark-4.10.4-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.4-arm-1.tgz: Upgraded. kde/bluedevil-1.3.1-arm-3.tgz: Rebuilt. kde/bomber-4.10.4-arm-1.tgz: Upgraded. kde/bovo-4.10.4-arm-1.tgz: Upgraded. kde/calligra-2.6.4-arm-1.tgz: Upgraded. kde/dragon-4.10.4-arm-1.tgz: Upgraded. kde/filelight-4.10.4-arm-1.tgz: Upgraded. kde/granatier-4.10.4-arm-1.tgz: Upgraded. kde/gwenview-4.10.4-arm-1.tgz: Upgraded. kde/juk-4.10.4-arm-1.tgz: Upgraded. kde/k3b-2.0.2_20120226.git-arm-3.tgz: Rebuilt. kde/kaccessible-4.10.4-arm-1.tgz: Upgraded. kde/kactivities-4.10.4-arm-1.tgz: Upgraded. kde/kamera-4.10.4-arm-1.tgz: Upgraded. kde/kapman-4.10.4-arm-1.tgz: Upgraded. kde/kate-4.10.4-arm-1.tgz: Upgraded. kde/katomic-4.10.4-arm-1.tgz: Upgraded. kde/kaudiocreator-1.3-arm-3.tgz: Rebuilt. kde/kblackbox-4.10.4-arm-1.tgz: Upgraded. kde/kblocks-4.10.4-arm-1.tgz: Upgraded. kde/kbounce-4.10.4-arm-1.tgz: Upgraded. kde/kbreakout-4.10.4-arm-1.tgz: Upgraded. kde/kcalc-4.10.4-arm-1.tgz: Upgraded. kde/kcharselect-4.10.4-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.4-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.4-arm-1.tgz: Upgraded. kde/kde-baseapps-4.10.4-arm-1.tgz: Upgraded. kde/kde-runtime-4.10.4-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.4-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.4-arm-1.tgz: Upgraded. kde/kdeadmin-4.10.4-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.4-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.4-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.4-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.4-arm-1.tgz: Upgraded. kde/kdelibs-4.10.4-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.4-arm-1.tgz: Upgraded. kde/kdepim-4.10.4-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.4-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.4-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.4-arm-1.tgz: Upgraded. kde/kdesdk-4.10.4-arm-1.tgz: Upgraded. kde/kdetoys-4.10.4-arm-1.tgz: Upgraded. kde/kdevelop-4.5.1-arm-1.tgz: Upgraded. kde/kdevelop-pg-qt-1.0.0-arm-3.tgz: Rebuilt. kde/kdevelop-php-1.5.1-arm-1.tgz: Upgraded. kde/kdevelop-php-docs-1.5.1-arm-1.tgz: Upgraded. kde/kdevplatform-1.5.1-arm-1.tgz: Upgraded. kde/kdewebdev-4.10.4-arm-1.tgz: Upgraded. kde/kdf-4.10.4-arm-1.tgz: Upgraded. kde/kdiamond-4.10.4-arm-1.tgz: Upgraded. kde/kfloppy-4.10.4-arm-1.tgz: Upgraded. kde/kfourinline-4.10.4-arm-1.tgz: Upgraded. kde/kgamma-4.10.4-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.4-arm-1.tgz: Upgraded. kde/kgpg-4.10.4-arm-1.tgz: Upgraded. kde/kigo-4.10.4-arm-1.tgz: Upgraded. kde/killbots-4.10.4-arm-1.tgz: Upgraded. kde/kio-mtp-fae62fc_20121225git-arm-3.tgz: Rebuilt. kde/kiriki-4.10.4-arm-1.tgz: Upgraded. kde/kjumpingcube-4.10.4-arm-1.tgz: Upgraded. kde/klickety-4.10.4-arm-1.tgz: Upgraded. kde/klines-4.10.4-arm-1.tgz: Upgraded. kde/kmag-4.10.4-arm-1.tgz: Upgraded. kde/kmahjongg-4.10.4-arm-1.tgz: Upgraded. kde/kmines-4.10.4-arm-1.tgz: Upgraded. kde/kmix-4.10.4-arm-1.tgz: Upgraded. kde/kmousetool-4.10.4-arm-1.tgz: Upgraded. kde/kmouth-4.10.4-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.4-arm-1.tgz: Upgraded. kde/knetwalk-4.10.4-arm-1.tgz: Upgraded. kde/kolf-4.10.4-arm-1.tgz: Upgraded. kde/kollision-4.10.4-arm-1.tgz: Upgraded. kde/kolourpaint-4.10.4-arm-1.tgz: Upgraded. kde/konquest-4.10.4-arm-1.tgz: Upgraded. kde/konsole-4.10.4-arm-1.tgz: Upgraded. kde/korundum-4.10.4-arm-1.tgz: Upgraded. kde/kpat-4.10.4-arm-1.tgz: Upgraded. kde/kplayer-0.7.2-arm-3.tgz: Rebuilt. kde/kremotecontrol-4.10.4-arm-1.tgz: Upgraded. kde/kreversi-4.10.4-arm-1.tgz: Upgraded. kde/kross-interpreters-4.10.4-arm-1.tgz: Upgraded. kde/kruler-4.10.4-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.4-arm-1.tgz: Upgraded. kde/kscreen-0.0.71-arm-3.tgz: Rebuilt. kde/kshisen-4.10.4-arm-1.tgz: Upgraded. kde/ksirk-4.10.4-arm-1.tgz: Upgraded. kde/ksnakeduel-4.10.4-arm-1.tgz: Upgraded. kde/ksnapshot-4.10.4-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.4-arm-1.tgz: Upgraded. kde/ksquares-4.10.4-arm-1.tgz: Upgraded. kde/ksudoku-4.10.4-arm-1.tgz: Upgraded. kde/ktimer-4.10.4-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-3.tgz: Rebuilt. kde/ktuberling-4.10.4-arm-1.tgz: Upgraded. kde/kubrick-4.10.4-arm-1.tgz: Upgraded. kde/kwallet-4.10.4-arm-1.tgz: Upgraded. kde/kwebkitpart-1.3.2-arm-3.tgz: Rebuilt. kde/libkcddb-4.10.4-arm-1.tgz: Upgraded. kde/libkcompactdisc-4.10.4-arm-1.tgz: Upgraded. kde/libkdcraw-4.10.4-arm-1.tgz: Upgraded. kde/libkdegames-4.10.4-arm-1.tgz: Upgraded. kde/libkexiv2-4.10.4-arm-1.tgz: Upgraded. kde/libkipi-4.10.4-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.4-arm-1.tgz: Upgraded. kde/libksane-4.10.4-arm-1.tgz: Upgraded. kde/libkscreen-0.0.71-arm-3.tgz: Rebuilt. kde/libktorrent-1.3.1-arm-6.tgz: Rebuilt. kde/lskat-4.10.4-arm-1.tgz: Upgraded. kde/mplayerthumbs-4.10.4-arm-1.tgz: Upgraded. kde/nepomuk-core-4.10.4-arm-1.tgz: Upgraded. kde/nepomuk-widgets-4.10.4-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0.8-arm-3.tgz: Rebuilt. kde/okular-4.10.4-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.4-arm-1.tgz: Upgraded. kde/oxygen-gtk3-1.1.4-arm-1.tgz: Upgraded. kde/oxygen-icons-4.10.4-arm-1.tgz: Upgraded. kde/palapeli-4.10.4-arm-1.tgz: Upgraded. kde/perlkde-4.10.4-arm-1.tgz: Upgraded. kde/perlqt-4.10.4-arm-1.tgz: Upgraded. kde/picmi-4.10.4-arm-1.tgz: Upgraded. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-3.tgz: Rebuilt. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-3.tgz: Rebuilt. kde/print-manager-4.10.4-arm-1.tgz: Upgraded. kde/qtruby-4.10.4-arm-1.tgz: Upgraded. kde/skanlite-1.0-arm-3.tgz: Rebuilt. kde/smokegen-4.10.4-arm-1.tgz: Upgraded. kde/smokekde-4.10.4-arm-1.tgz: Upgraded. kde/smokeqt-4.10.4-arm-1.tgz: Upgraded. kde/superkaramba-4.10.4-arm-1.tgz: Upgraded. kde/svgpart-4.10.4-arm-1.tgz: Upgraded. kde/sweeper-4.10.4-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-3.tgz: Rebuilt. kdei/kde-l10n-ar-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-bg-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-bs-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca@valencia-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-cs-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-da-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-de-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-el-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-en_GB-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-es-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-et-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-eu-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-fa-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-fi-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-fr-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ga-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-gl-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-he-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-hi-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-hr-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-hu-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ia-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-is-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-it-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ja-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-kk-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-km-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ko-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-lt-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-lv-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-mr-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-nb-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-nds-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-nl-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-nn-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-pa-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-pl-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt_BR-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ro-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ru-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-si-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-sk-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-sl-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-sr-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-sv-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-tg-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-th-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-tr-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-ug-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-uk-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-vi-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-wa-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_CN-4.10.4-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_TW-4.10.4-noarch-1.tgz: Upgraded. l/icu4c-51.2-arm-1.tgz: Upgraded. l/libffi-3.0.13-arm-2.tgz: Rebuilt. Patched to move the ffi include files back to /usr/include, and patched the pkgconfig file to point there as well. The relocation of the include files to be outside of /usr/include worked for programs that used pkgconfig, but there are many programs that do not and this change broke compiling them. Thanks to gmgf. l/libical-1.0-arm-1.tgz: Upgraded. l/libproxy-0.4.11-arm-2.tgz: Rebuilt. l/pilot-link-0.12.5-arm-8.tgz: Rebuilt. Recompiled against perl-5.18.0. n/irssi-0.8.15-arm-7.tgz: Rebuilt. Recompiled against perl-5.18.0. n/net-snmp-5.7.2-arm-2.tgz: Rebuilt. Recompiled against perl-5.18.0. n/obexftp-0.23-arm-9.tgz: Rebuilt. Recompiled against perl-5.18.0. n/samba-4.0.6-arm-2.tgz: Rebuilt. Recompiled against perl-5.18.0. xap/imagemagick-6.8.5_9-arm-1.tgz: Upgraded. xap/pidgin-2.10.7-arm-3.tgz: Rebuilt. Recompiled against perl-5.18.0. xap/vim-gvim-7.3.1087-arm-1.tgz: Upgraded. xap/xchat-2.8.8-arm-8.tgz: Rebuilt. Recompiled against perl-5.18.0. xfce/orage-4.8.4-arm-2.tgz: Rebuilt. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Tue Jun 4 19:40:11 UTC 2013 ap/vim-7.3.1109-arm-1.tgz: Upgraded. d/open-cobol-1.1-arm-2.tgz: Rebuilt. Fixed slack-desc typo. xap/vim-gvim-7.3.1109-arm-1.tgz: Upgraded. +--------------------------+ Sun Jun 2 08:34:06 UTC 2013 a/glibc-solibs-2.17-arm-8.tgz: Rebuilt. Build against Linux 3.9.4 kernel headers. a/glibc-zoneinfo-2013c-noarch-8.tgz: Rebuilt. a/kernel-modules-kirkwood-3.9.4_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.9.4_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.9.4_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.9.4-arm-1.tgz: Upgraded. a/kernel_tegra-3.9.4-arm-1.tgz: Upgraded. For some reason, upon reboot, this kernel will not cause the system to actually reboot the device. You'll need to manually hold down the power button for a few seconds and cold start it. I've checked the kernel options and cannot see anything odd. I suspect it's a kernel bug. a/kernel_versatile-3.9.4-arm-1.tgz: Upgraded. ap/mariadb-5.5.31-arm-1.tgz: Upgraded. ap/mc-4.8.8-arm-1.tgz: Upgraded. ap/vim-7.3.645-arm-1.tgz: Upgraded. d/kernel-headers-3.9.4-arm-1.tgz: Upgraded. d/python-2.7.5-arm-1.tgz: Upgraded. k/kernel-source-3.9.4-arm-1.tgz: Upgraded. l/glibc-2.17-arm-8.tgz: Rebuilt. Build against Linux 3.9.4 kernel headers. l/glibc-i18n-2.17-arm-8.tgz: Rebuilt. l/glibc-profile-2.17-arm-8.tgz: Rebuilt. n/samba-4.0.6-arm-1.tgz: Upgraded. xap/vim-gvim-7.3.645-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Tue May 28 19:24:39 UTC 2013 a/aaa_elflibs-14.1-arm-1.tgz: Upgraded. a/file-5.14-arm-1.tgz: Upgraded. Use magic.mgc instead of the flat magic files. a/gawk-4.1.0-arm-1.tgz: Upgraded. a/sysvinit-scripts-2.0-noarch-11.tgz: Rebuilt. Update glib schemas in rc.M. a/tcsh-6.18.01-arm-2.tgz: Rebuilt. Patched for new glibc crypt(). Thanks to mancha. ap/ghostscript-9.07-arm-2.tgz: Rebuilt. Applied upstream patch to add Trio library and use the included sprintf() function. This fixes a rendering failure with locales that use commas for decimal. Thanks to Heinz Wiesinger for the heads-up on this. ap/hplip-3.13.5-arm-1.tgz: Upgraded. ap/itstool-1.2.0-arm-1.tgz: Added. New dependency for gucharmap. ap/slackpkg-2.82.0-noarch-7.tgz: Rebuilt. Set DOWNLOAD_ALL=on in slackpkg.conf by default to avoid script failures caused by programs (wget is an example) that may require library updates. Without this option, a program might be needed again before the supporting libraries have been upgraded. d/gdb-7.6-arm-1.tgz: Upgraded. d/open-cobol-1.1-arm-1.tgz: Added. We're finally a mature operating system. Enjoy. :) d/slacktrack-2.15-arm-1.tgz: Upgraded. d/swig-2.0.9-arm-1.tgz: Upgraded. kde/kdelibs-4.10.3-arm-2.tgz: Rebuilt. Recompiled against pcre-8.32. kde/kajongg-4.10.3-arm-1.tgz: Removed. This requires some libraries that we don't ship, and that aren't worth adding just for a single game. l/at-spi2-atk-2.8.1-arm-1.tgz: Upgraded. l/at-spi2-core-2.8.0-arm-1.tgz: Upgraded. l/atk-2.8.0-arm-1.tgz: Upgraded. l/dconf-0.16.0-arm-1.tgz: Upgraded. l/gcr-3.8.2-arm-1.tgz: Upgraded. l/gdk-pixbuf2-2.28.1-arm-1.tgz: Upgraded. l/glib-networking-2.36.2-arm-1.tgz: Upgraded. l/glib2-2.36.2-arm-1.tgz: Upgraded. l/gmp-5.1.2-arm-1.tgz: Upgraded. l/gnome-icon-theme-3.8.2-noarch-1.tgz: Upgraded. l/gnome-keyring-3.8.2-arm-1.tgz: Upgraded. l/gnome-themes-standard-3.8.1-arm-1.tgz: Added. New dependency for gtk+3. l/gobject-introspection-1.36.0-arm-1.tgz: Upgraded. l/gsettings-desktop-schemas-3.8.2-arm-1.tgz: Upgraded. l/gtk+2-2.24.18-arm-1.tgz: Upgraded. l/gtk+3-3.8.2-arm-1.tgz: Upgraded. l/gvfs-1.16.2-arm-1.tgz: Upgraded. l/harfbuzz-0.9.16-arm-1.tgz: Added. New dependency for pango. l/libcroco-0.6.8-arm-1.tgz: Upgraded. l/libgnome-keyring-3.8.0-arm-1.tgz: Upgraded. l/libsecret-0.15-arm-1.tgz: Upgraded. l/libsoup-2.42.2-arm-1.tgz: Upgraded. l/libtasn1-3.3-arm-1.tgz: Upgraded. l/pango-1.34.1-arm-1.tgz: Upgraded. l/pcre-8.32-arm-1.tgz: Upgraded. l/popt-1.16-arm-2.tgz: Rebuilt. Make sure pkgconfig directory is in the right location. l/slang-2.2.4-arm-3.tgz: Rebuilt. Recompiled against pcre-8.32. n/epic5-1.1.3-arm-2.tgz: Rebuilt. n/httpd-2.4.4-arm-2.tgz: Rebuilt. Patched htpasswd hash generation bug. Thanks to MadMaverick9. n/nettle-2.7-arm-1.tgz: Upgraded. n/network-scripts-14.1-noarch-1.tgz: Upgraded. Handle ipv6 forwarding in rc.ip_forward. Thanks to ricky_cardo. n/nfs-utils-1.2.8-arm-1.tgz: Upgraded. n/nmap-6.25-arm-2.tgz: Rebuilt. Recompiled against pcre-8.32. n/p11-kit-0.16.4-arm-1.tgz: Upgraded. n/php-5.4.15-arm-1.tgz: Upgraded. Moved php-fpm.conf.default to /etc/php-fpm/. Thanks to Hristo Simeonov. n/popa3d-1.0.2-arm-3.tgz: Rebuilt. Patched for new glibc crypt(). Thanks to mancha. n/wget-1.14-arm-2.tgz: Rebuilt. Recompiled against pcre-8.32. n/yptools-2.14-arm-1.tgz: Upgraded. Upgraded to yp-tools-2.14, ypbind-mt-1.37.1, and ypserv-2.31. Patched for new glibc crypt(). Thanks to mancha. tcl/tclx-8.4.1-arm-3.tgz: Rebuilt. x/appres-1.0.4-arm-1.tgz: Upgraded. x/bitmap-1.0.7-arm-1.tgz: Upgraded. x/fontconfig-2.10.93-arm-1.tgz: Upgraded. x/libfontenc-1.1.2-arm-1.tgz: Upgraded. x/pixman-0.30.0-arm-1.tgz: Upgraded. x/transset-1.0.1-arm-1.tgz: Upgraded. x/wqy-zenhei-font-ttf-0.8.38_1-noarch-2.tgz: Upgraded. The package reverts to the 0.8.38 version due to reports that the newer version causes rendering issues with Japanese and Korean fonts. I've found many references to this issue online, and have yet to see any solution for it besides reverting or removing the wqy-zenhei-font-ttf package altogether. Some people have suggested dropping wqy-zenhei in favor of Droid Sans Fallback, but the glyph coverage is not as good with that font. Probably the best solution for now is to go back to the version that seems to work (with a patch to the .conf file for compatibility with recent versions of fontconfig). x/xf86-input-synaptics-1.7.1-arm-1.tgz: Upgraded. x/xfontsel-1.0.5-arm-1.tgz: Upgraded. x/xrefresh-1.0.5-arm-1.tgz: Upgraded. x/xterm-292-arm-1.tgz: Upgraded. x/xwininfo-1.1.3-arm-1.tgz: Upgraded. xap/gucharmap-3.8.2-arm-1.tgz: Upgraded. xfce/Thunar-1.6.3-arm-1.tgz: Upgraded. xfce/garcon-0.2.1-arm-1.tgz: Upgraded. xfce/libxfce4util-4.10.1-arm-1.tgz: Upgraded. xfce/xfce4-appfinder-4.10.1-arm-1.tgz: Upgraded. xfce/xfce4-notifyd-0.2.4-arm-1.tgz: Upgraded. xfce/xfce4-panel-4.10.1-arm-1.tgz: Upgraded. xfce/xfce4-session-4.10.1-arm-1.tgz: Upgraded. xfce/xfce4-settings-4.10.1-arm-1.tgz: Upgraded. xfce/xfce4-terminal-0.6.2-arm-1.tgz: Upgraded. xfce/xfwm4-4.10.1-arm-1.tgz: Upgraded. +--------------------------+ Sun May 19 20:49:51 UTC 2013 Hola! I've played around with Linux 3.9.x and had success with the kirkwood platform, but on the Tegra20 (Trimslice) the NIC stops working after a couple of seconds of network traffic; so for the time being we're sticking with the 3.8 series. I will continue to look in to this. a/glibc-solibs-2.17-arm-7.tgz: Rebuilt. a/glibc-zoneinfo-2013c-noarch-7.tgz: Rebuilt. a/kernel-firmware-20130505git-noarch-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.8.13_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.13_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.13_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.8.13-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.13-arm-1.tgz: Upgraded. a/kernel_versatile-3.8.13-arm-1.tgz: Upgraded. a/shadow-4.1.5.1-arm-1.tgz: Upgraded. Thanks to mancha for the improved crypt() NULL handling patch. a/xfsprogs-3.1.11-arm-1.tgz: Upgraded. ap/aumix-2.9.1-arm-2.tgz: Removed. This only works with OSS (or the ALSA OSS compatibility modules, which are now disabled by default). Moving to /pasture. ap/dmapi-2.2.12-arm-1.tgz: Upgraded. ap/rexima-1.4-arm-2.tgz: Removed. This only works with OSS (or the ALSA OSS compatibility modules, which are now disabled by default). Moving to /pasture. ap/screen-4.0.3-arm-4.tgz: Rebuilt. Patched for newer glibc crypt(). ap/sudo-1.8.6p8-arm-1.tgz: Upgraded. ap/xfsdump-3.1.3-arm-1.tgz: Upgraded. d/ccache-3.1.9-arm-1.tgz: Upgraded. d/kernel-headers-3.8.13-arm-1.tgz: Upgraded. d/python-2.7.4-arm-2.tgz: Rebuilt. d/ruby-1.9.3_p429-arm-1.tgz: Upgraded. This update fixes a security issue in DL and Fiddle included in Ruby where tainted strings can be used by system calls regardless of the $SAFE level setting. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065 http://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/ (* Security fix *) d/slacktrack-2.14-arm-1.tgz: Upgraded. k/kernel-source-3.8.13-arm-1.tgz: Upgraded. kde/amarok-2.7.1-arm-1.tgz: Upgraded. kde/ark-4.10.3-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.3-arm-1.tgz: Upgraded. kde/bluedevil-1.3.1-arm-2.tgz: Rebuilt. kde/bomber-4.10.3-arm-1.tgz: Upgraded. kde/bovo-4.10.3-arm-1.tgz: Upgraded. kde/calligra-2.6.3-arm-2.tgz: Rebuilt. kde/dragon-4.10.3-arm-1.tgz: Upgraded. kde/filelight-4.10.3-arm-1.tgz: Upgraded. kde/granatier-4.10.3-arm-1.tgz: Upgraded. kde/gwenview-4.10.3-arm-1.tgz: Upgraded. kde/juk-4.10.3-arm-1.tgz: Upgraded. kde/k3b-2.0.2_20120226.git-arm-2.tgz: Rebuilt. kde/kaccessible-4.10.3-arm-1.tgz: Upgraded. kde/kactivities-4.10.3-arm-1.tgz: Upgraded. kde/kajongg-4.10.3-arm-1.tgz: Upgraded. kde/kamera-4.10.3-arm-1.tgz: Upgraded. kde/kapman-4.10.3-arm-1.tgz: Upgraded. kde/kate-4.10.3-arm-1.tgz: Upgraded. kde/katomic-4.10.3-arm-1.tgz: Upgraded. kde/kaudiocreator-1.3-arm-2.tgz: Rebuilt. kde/kblackbox-4.10.3-arm-1.tgz: Upgraded. kde/kblocks-4.10.3-arm-1.tgz: Upgraded. kde/kbounce-4.10.3-arm-1.tgz: Upgraded. kde/kbreakout-4.10.3-arm-1.tgz: Upgraded. kde/kcalc-4.10.3-arm-1.tgz: Upgraded. kde/kcharselect-4.10.3-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.3-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.3-arm-1.tgz: Upgraded. kde/kde-baseapps-4.10.3-arm-2.tgz: Rebuilt. kde/kde-runtime-4.10.3-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.3-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.3-arm-2.tgz: Rebuilt. kde/kdeadmin-4.10.3-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.3-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.3-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.3-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.3-arm-1.tgz: Upgraded. kde/kdelibs-4.10.3-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.3-arm-1.tgz: Upgraded. kde/kdepim-4.10.3-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.3-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.3-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.3-arm-1.tgz: Upgraded. kde/kdesdk-4.10.3-arm-1.tgz: Upgraded. kde/kdetoys-4.10.3-arm-1.tgz: Upgraded. kde/kdevelop-4.5.0-arm-2.tgz: Rebuilt. kde/kdevelop-pg-qt-1.0.0-arm-2.tgz: Rebuilt. kde/kdevplatform-1.5.0-arm-2.tgz: Rebuilt. kde/kdewebdev-4.10.3-arm-1.tgz: Upgraded. kde/kdf-4.10.3-arm-1.tgz: Upgraded. kde/kdiamond-4.10.3-arm-1.tgz: Upgraded. kde/kfloppy-4.10.3-arm-1.tgz: Upgraded. kde/kfourinline-4.10.3-arm-1.tgz: Upgraded. kde/kgamma-4.10.3-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.3-arm-1.tgz: Upgraded. kde/kgpg-4.10.3-arm-1.tgz: Upgraded. kde/kigo-4.10.3-arm-1.tgz: Upgraded. kde/killbots-4.10.3-arm-1.tgz: Upgraded. kde/kio-mtp-fae62fc_20121225git-arm-2.tgz: Rebuilt. kde/kiriki-4.10.3-arm-1.tgz: Upgraded. kde/kjumpingcube-4.10.3-arm-1.tgz: Upgraded. kde/klickety-4.10.3-arm-1.tgz: Upgraded. kde/klines-4.10.3-arm-1.tgz: Upgraded. kde/kmag-4.10.3-arm-1.tgz: Upgraded. kde/kmahjongg-4.10.3-arm-1.tgz: Upgraded. kde/kmines-4.10.3-arm-1.tgz: Upgraded. kde/kmix-4.10.3-arm-1.tgz: Upgraded. kde/kmousetool-4.10.3-arm-1.tgz: Upgraded. kde/kmouth-4.10.3-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.3-arm-1.tgz: Upgraded. kde/knetwalk-4.10.3-arm-1.tgz: Upgraded. kde/kolf-4.10.3-arm-1.tgz: Upgraded. kde/kollision-4.10.3-arm-1.tgz: Upgraded. kde/kolourpaint-4.10.3-arm-1.tgz: Upgraded. kde/konquest-4.10.3-arm-1.tgz: Upgraded. kde/konsole-4.10.3-arm-1.tgz: Upgraded. kde/korundum-4.10.3-arm-1.tgz: Upgraded. kde/kpat-4.10.3-arm-1.tgz: Upgraded. kde/kplayer-0.7.2-arm-2.tgz: Rebuilt. kde/kremotecontrol-4.10.3-arm-1.tgz: Upgraded. kde/kreversi-4.10.3-arm-1.tgz: Upgraded. kde/kross-interpreters-4.10.3-arm-1.tgz: Upgraded. kde/kruler-4.10.3-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.3-arm-1.tgz: Upgraded. kde/kscreen-0.0.71-arm-2.tgz: Rebuilt. kde/kshisen-4.10.3-arm-1.tgz: Upgraded. kde/ksirk-4.10.3-arm-1.tgz: Upgraded. kde/ksnakeduel-4.10.3-arm-1.tgz: Upgraded. kde/ksnapshot-4.10.3-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.3-arm-1.tgz: Upgraded. kde/ksquares-4.10.3-arm-1.tgz: Upgraded. kde/ksudoku-4.10.3-arm-1.tgz: Upgraded. kde/ktimer-4.10.3-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-2.tgz: Rebuilt. kde/ktuberling-4.10.3-arm-1.tgz: Upgraded. kde/kubrick-4.10.3-arm-1.tgz: Upgraded. kde/kwallet-4.10.3-arm-1.tgz: Upgraded. kde/kwebkitpart-1.3.2-arm-2.tgz: Rebuilt. kde/libkcddb-4.10.3-arm-1.tgz: Upgraded. kde/libkcompactdisc-4.10.3-arm-1.tgz: Upgraded. kde/libkdcraw-4.10.3-arm-1.tgz: Upgraded. kde/libkdegames-4.10.3-arm-1.tgz: Upgraded. kde/libkexiv2-4.10.3-arm-1.tgz: Upgraded. kde/libkipi-4.10.3-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.3-arm-1.tgz: Upgraded. kde/libksane-4.10.3-arm-1.tgz: Upgraded. kde/libkscreen-0.0.71-arm-2.tgz: Rebuilt. kde/libktorrent-1.3.1-arm-4.tgz: Rebuilt. kde/lskat-4.10.3-arm-1.tgz: Upgraded. kde/mplayerthumbs-4.10.3-arm-1.tgz: Upgraded. kde/nepomuk-core-4.10.3-arm-2.tgz: Rebuilt. kde/nepomuk-widgets-4.10.3-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0.8-arm-2.tgz: Rebuilt. kde/okular-4.10.3-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.3-arm-1.tgz: Upgraded. kde/oxygen-gtk3-1.1.3-arm-1.tgz: Upgraded. kde/oxygen-icons-4.10.3-arm-1.tgz: Upgraded. kde/palapeli-4.10.3-arm-1.tgz: Upgraded. kde/perlkde-4.10.3-arm-1.tgz: Upgraded. kde/perlqt-4.10.3-arm-1.tgz: Upgraded. kde/picmi-4.10.3-arm-1.tgz: Upgraded. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz: Rebuilt. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz: Rebuilt. kde/print-manager-4.10.3-arm-1.tgz: Upgraded. kde/qtruby-4.10.3-arm-1.tgz: Upgraded. kde/quanta-29a3f8e_20111223git-arm-1.tgz: Removed. I think this is finally dead since it no longer compiles against the new version of kdevplatform. kde/skanlite-1.0-arm-2.tgz: Rebuilt. kde/smokegen-4.10.3-arm-1.tgz: Upgraded. kde/smokekde-4.10.3-arm-1.tgz: Upgraded. kde/smokeqt-4.10.3-arm-1.tgz: Upgraded. kde/superkaramba-4.10.3-arm-1.tgz: Upgraded. kde/svgpart-4.10.3-arm-1.tgz: Upgraded. kde/sweeper-4.10.3-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz: Rebuilt. kdei/kde-l10n-ar-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-bg-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-bs-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca@valencia-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-cs-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-da-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-de-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-el-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-en_GB-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-es-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-et-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-eu-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-fa-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-fi-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-fr-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ga-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-gl-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-he-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-hi-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-hr-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-hu-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ia-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-is-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-it-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ja-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-kk-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-km-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ko-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-lt-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-lv-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-mr-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-nb-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-nds-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-nl-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-nn-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-pa-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-pl-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt_BR-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ro-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ru-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-si-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-sk-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-sl-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-sr-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-sv-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-tg-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-th-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-tr-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-ug-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-uk-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-vi-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-wa-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_CN-4.10.3-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_TW-4.10.3-noarch-1.tgz: Upgraded. l/alsa-lib-1.0.27-arm-2.tgz: Rebuilt. Use __inline__ in the include files, not inline. Otherwise programs that use c90 won't compile (noticed with libkcompactdisc). l/clucene-2.3.3.4-arm-2.tgz: Rebuilt. Include contrib-libs. Thanks to Thomas Choi. l/glibc-2.17-arm-7.tgz: Rebuilt. Built against Linux 3.8.13 kernel headers. l/glibc-i18n-2.17-arm-7.tgz: Rebuilt. l/glibc-profile-2.17-arm-7.tgz: Rebuilt. l/mozilla-nss-3.14.3-arm-1.tgz: Upgraded. Upgraded to nss-3.14.3 with nspr-4.9.6. l/ncurses-5.9-arm-4.tgz: Rebuilt. Applied all upstream patches for ncurses-5.9 and installed pkgconfig files. Thanks to Marin Glibic. l/pil-1.1.7-arm-3.tgz: Rebuilt. n/ppp-2.4.5-arm-3.tgz: Rebuilt. Patched for newer glibc crypt(). Removed internal header file that conflicts with recent kernels. n/samba-4.0.5-arm-1.tgz: Upgraded. n/tin-2.0.1-arm-1.tgz: Upgraded. tcl/expect-5.44.1.15-arm-2.tgz: Rebuilt. tcl/hfsutils-3.2.6-arm-3.tgz: Rebuilt. tcl/tcl-8.6.0-arm-1.tgz: Upgraded. tcl/tclx-8.4.1-arm-1.tgz: Upgraded. tcl/tix-8.4.3-arm-3.tgz: Rebuilt. tcl/tk-8.6.0-arm-1.tgz: Upgraded. xap/gnuchess-6.0.3-arm-2.tgz: Rebuilt. Upgraded xboard to version 4.7.1. xap/pidgin-2.10.7-arm-2.tgz: Rebuilt. xap/xchat-2.8.8-arm-7.tgz: Rebuilt. isolinux/*: Rebuilt. kernels/*: Upgraded. pasture/aumix-2.9.1-arm-2.tgz: Moved here from the AP series. pasture/rexima-1.4-arm-2.tgz: Moved here from the AP series. +--------------------------+ Fri May 3 19:21:39 UTC 2013 ap/alsa-utils-1.0.27-arm-1.tgz: Upgraded. Added rc.alsa-oss script, disabled by default so that applications that try to use OSS compatibility when they could be using ALSA won't steal exclusive access to the audio device. Thanks to B. Watson. l/alsa-lib-1.0.27-arm-1.tgz: Upgraded. x/mesa-9.1.2-arm-1.tgz: Upgraded. xap/imagemagick-6.8.5_4-arm-1.tgz: Upgraded. Patched to fix an issue detecting the glib2 version at compile time. This should get SVG support working again. Thanks to GazL. xap/xmms-1.2.11-arm-4.tgz: Rebuilt. Patched to use ALSA by default. Thanks to B. Watson. +--------------------------+ Wed May 1 19:03:27 UTC 2013 a/kernel-firmware-20130430git-noarch-1.tgz: Upgraded. kde/kdevelop-4.5.0-arm-1.tgz: Upgraded. kde/kdevplatform-1.5.0-arm-1.tgz: Upgraded. kde/kwebkitpart-1.3.2-arm-1.tgz: Upgraded. l/expat-2.1.0-arm-1.tgz: Upgraded. n/curl-7.30.0-arm-1.tgz: Upgraded. xap/gnuplot-4.6.3-arm-1.tgz: Upgraded. xap/imagemagick-6.8.5_3-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-4.8.0-arm-3.tgz: Rebuilt. Patched to fix a bug that was breaking WINE with -O2 on x86_64, and probably affected other programs as well. Thanks to Kirill Smirnov. extra/gcc-4.8.0/gcc-g++-4.8.0-arm-3.tgz: Rebuilt. extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-3.tgz: Rebuilt. extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-3.tgz: Rebuilt. extra/gcc-4.8.0/gcc-go-4.8.0-arm-3.tgz: Rebuilt. extra/gcc-4.8.0/gcc-java-4.8.0-arm-3.tgz: Rebuilt. extra/gcc-4.8.0/gcc-objc-4.8.0-arm-3.tgz: Rebuilt. +--------------------------+ Mon Apr 29 19:17:41 UTC 2013 a/btrfs-progs-20130418-arm-1.tgz: Upgraded. Make fsck.btrfs a link to /bin/true as recommended on the btrfs wiki. a/glibc-solibs-2.17-arm-6.tgz: Rebuilt. a/glibc-zoneinfo-2013b-noarch-6.tgz: Rebuilt. a/kernel-firmware-20130426git-noarch-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.8.10_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.10_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.10_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.8.10-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.10-arm-1.tgz: Upgraded. a/kernel_versatile-3.8.10-arm-1.tgz: Upgraded. d/kernel-headers-3.8.10-arm-1.tgz: Upgraded. e/emacs-24.3-arm-3.tgz: Rebuilt. Recompiled using --with-x-toolkit=gtk2. k/kernel-source-3.8.10-arm-1.tgz: Upgraded. l/glibc-2.17-arm-6.tgz: Rebuilt. Built against Linux 3.8.10 kernel headers. Patched two crash bugs (CVE-2013-0242, CVE-2013-1914). These do not allow code execution, and upstream agrees that they are low priority/severity. They are patched here since glibc was due for a kernel related rebuild anyway, but given the low priority/severity and possibility of introducing problems in production versions of glibc, they will backported only if further review indicates a necessity. l/glibc-i18n-2.17-arm-6.tgz: Rebuilt. l/glibc-profile-2.17-arm-6.tgz: Rebuilt. l/qt-4.8.4-arm-4.tgz: Rebuilt. Patched to fix a plasma crash in KDE. n/autofs-5.0.7-arm-2.tgz: Rebuilt. Added /etc/auto.master.d directory. Thanks to GazL. n/proftpd-1.3.4c-arm-1.tgz: Upgraded. Added mod_radius to the build as requested by chemfire. I wasn't sure about this at first since it's a non-default and seldom used module, but since it doesn't do anything unless it has been configured it should be safe to include. x/xf86-input-acecad-1.5.0-arm-4.tgz: Rebuilt. x/xf86-input-aiptek-1.4.1-arm-4.tgz: Rebuilt. x/xf86-input-evdev-2.8.0-arm-2.tgz: Rebuilt. x/xf86-input-joystick-1.6.1-arm-4.tgz: Rebuilt. x/xf86-input-keyboard-1.7.0-arm-2.tgz: Rebuilt. x/xf86-input-mouse-1.9.0-arm-2.tgz: Rebuilt. x/xf86-input-penmount-1.5.0-arm-4.tgz: Rebuilt. x/xf86-input-synaptics-1.7.0-arm-2.tgz: Rebuilt. x/xf86-input-void-1.4.0-arm-4.tgz: Rebuilt. x/xf86-input-wacom-0.19.0-arm-3.tgz: Rebuilt. x/xf86-video-apm-1.2.5-arm-3.tgz: Rebuilt. x/xf86-video-ark-0.7.5-arm-3.tgz: Rebuilt. x/xf86-video-ast-0.97.0-arm-3.tgz: Rebuilt. x/xf86-video-ati-7.1.0-arm-3.tgz: Rebuilt. x/xf86-video-chips-1.2.5-arm-3.tgz: Rebuilt. x/xf86-video-cirrus-1.5.2-arm-3.tgz: Rebuilt. x/xf86-video-dummy-0.3.6-arm-3.tgz: Rebuilt. x/xf86-video-fbdev-0.4.3-arm-5.tgz: Rebuilt. x/xf86-video-glint-1.2.8-arm-3.tgz: Rebuilt. x/xf86-video-i128-1.3.6-arm-3.tgz: Rebuilt. x/xf86-video-i740-1.3.4-arm-3.tgz: Rebuilt. x/xf86-video-mach64-6.9.4-arm-3.tgz: Rebuilt. x/xf86-video-mga-1.6.2-arm-3.tgz: Rebuilt. x/xf86-video-modesetting-0.7.0-arm-2.tgz: Rebuilt. x/xf86-video-neomagic-1.2.7-arm-3.tgz: Rebuilt. x/xf86-video-nouveau-1.0.7-arm-2.tgz: Rebuilt. x/xf86-video-nv-2.1.20-arm-4.tgz: Rebuilt. x/xf86-video-openchrome-0.3.2-arm-2.tgz: Rebuilt. x/xf86-video-r128-6.9.1-arm-4.tgz: Rebuilt. x/xf86-video-rendition-4.2.5-arm-3.tgz: Rebuilt. x/xf86-video-s3-0.6.5-arm-3.tgz: Rebuilt. x/xf86-video-s3virge-1.10.6-arm-4.tgz: Rebuilt. x/xf86-video-savage-2.3.6-arm-4.tgz: Rebuilt. x/xf86-video-siliconmotion-1.7.7-arm-4.tgz: Rebuilt. x/xf86-video-sis-0.10.7-arm-3.tgz: Rebuilt. x/xf86-video-sisusb-0.9.6-arm-3.tgz: Rebuilt. x/xf86-video-tdfx-1.4.5-arm-3.tgz: Rebuilt. x/xf86-video-tga-1.2.2-arm-3.tgz: Rebuilt. x/xf86-video-trident-1.3.6-arm-3.tgz: Rebuilt. x/xf86-video-tseng-1.2.5-arm-3.tgz: Rebuilt. x/xf86-video-v4l-0.2.0-arm-4.tgz: Rebuilt. x/xf86-video-vesa-2.3.2-arm-3.tgz: Rebuilt. x/xf86-video-vmware-13.0.1-arm-2.tgz: Rebuilt. x/xf86-video-voodoo-1.2.5-arm-4.tgz: Rebuilt. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-4.tgz: Rebuilt. x/xf86-video-xgixp-1.8.1-arm-3.tgz: Rebuilt. x/xorg-server-1.13.4-arm-1.tgz: Upgraded. This update fixes an input flush bug with evdev. Under exceptional conditions (keyboard input during device hotplugging), this could leak a small amount of information intended for the X server. This issue was evaluated to be of low impact. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940 http://lists.x.org/archives/xorg-devel/2013-April/036014.html (* Security fix *) x/xorg-server-xephyr-1.13.4-arm-1.tgz: Upgraded. x/xorg-server-xnest-1.13.4-arm-1.tgz: Upgraded. x/xorg-server-xvfb-1.13.4-arm-1.tgz: Upgraded. xap/imagemagick-6.8.4_10-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sat Apr 13 11:27:53 UTC 2013 a/kernel-modules-kirkwood-3.8.7_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.7_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.7_versatile-arm-1.tgz: Upgraded. Patched for re-implement the legacy behaviour, allowing Linux to work with QEMU's emulation of the 'ARM Versatile' platform. I've performed a successful installation using QEMU-1.4.0 and this kernel and set of installer images. Thanks to Rob Landley for the patch and the explanation. a/kernel_kirkwood-3.8.7-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.7-arm-1.tgz: Upgraded. a/kernel_versatile-3.8.7-arm-1.tgz: Upgraded. k/kernel-source-3.8.7-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Thu Apr 11 19:44:16 UTC 2013 A note about the Kernel updates: The '/boot/dtb' (Device Tree Blob) directory is now a symlink to /boot/dtb- This is the approach Fedora have taken and it also makes sense in Slackware ARM since everything else in /boot is versioned. This way you can easily retain a previous complete versioned set of initrd, {z,u}Image and dtb files when you upgrade to a newer kernel release package. If your /boot directory is on a file system that supports symlinks, you can upgradepkg to these kernels without having to make any amendments to your device's U-Boot configuration. /INSTALL_TEGRA.TXT: Updated. Updated section 0.0 ('U-Boot Firmware Upgrade') to explain how to upgrade to the latest available U-Boot release for the 'TrimSlice' device. If you're running the previous U-Boot release that only presents 512MB RAM to your OS, you may now upgrade to the latest available U-Boot release and use the full 1GB RAM. Follow section 0.0, then section 5.0 ('Booting the Slackware ARM OS'). a/glibc-solibs-2.17-arm-5.tgz: Rebuilt. Built against Linux 3.8.6 kernel headers. Minimum kernel is now Linux 3.1.0 as this is the common base Kernel version in use on the Raspberry Pi when running Slackware ARM 14.0. This will permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware release. a/glibc-zoneinfo-2013b-noarch-5.tgz: Rebuilt. a/kernel-modules-kirkwood-3.8.6_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.6_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.6_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.8.6-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.6-arm-1.tgz: Upgraded. Added the kernel configuration options below: CONFIG_EARLY_PRINTK=y CONFIG_TEGRA_DEBUG_UARTA=y Adding 'earlyprintk' to the kernel command line will allow boot messages to be displayed to the serial port of the Trimslice before the regular serial console is activated. This is necessary for debugging an unbootable kernel without additional hardware. a/kernel_versatile-3.8.6-arm-1.tgz: Upgraded. ap/sox-14.4.1-arm-1.tgz: Upgraded. d/kernel-headers-3.8.6-arm-1.tgz: Upgraded. k/kernel-source-3.8.6-arm-1.tgz: Upgraded. kde/calligra-2.6.3-arm-1.tgz: Upgraded. kdei/calligra-l10n-bs-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ca@valencia-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-da-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-de-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-el-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-en_GB-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-es-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-et-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fi-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-fr-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-gl-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-hu-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-it-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-kk-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nb-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nds-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-nl-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pl-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-pt_BR-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-ru-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sk-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sl-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-sv-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-uk-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_CN-2.6.3-noarch-1.tgz: Upgraded. kdei/calligra-l10n-zh_TW-2.6.3-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-5.tgz: Rebuilt. Built against Linux 3.8.6 kernel headers. Minimum kernel is now Linux 3.1.0 as this is the common base Kernel version in use on the Raspberry Pi when running Slackware ARM 14.0. This will permit a live upgrade on a Rpi from Slackware ARM 14.0 to the next Slackware release. l/glibc-i18n-2.17-arm-5.tgz: Rebuilt. l/glibc-profile-2.17-arm-5.tgz: Rebuilt. x/libXi-1.7.1-arm-1.tgz: Upgraded. x/xf86-input-evdev-2.8.0-arm-1.tgz: Upgraded. x/xf86-input-keyboard-1.7.0-arm-1.tgz: Upgraded. x/xf86-input-mouse-1.9.0-arm-1.tgz: Upgraded. x/xf86-input-synaptics-1.7.0-arm-1.tgz: Upgraded. x/xf86-video-modesetting-0.7.0-arm-1.tgz: Upgraded. x/xf86-video-nouveau-1.0.7-arm-1.tgz: Upgraded. x/xf86-video-openchrome-0.3.2-arm-1.tgz: Upgraded. x/xf86-video-r128-6.9.1-arm-3.tgz: Rebuilt. x/xf86-video-s3virge-1.10.6-arm-3.tgz: Rebuilt. x/xf86-video-savage-2.3.6-arm-3.tgz: Rebuilt. x/xf86-video-siliconmotion-1.7.7-arm-3.tgz: Rebuilt. x/xf86-video-voodoo-1.2.5-arm-3.tgz: Rebuilt. x/xproto-7.0.24-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Tue Apr 9 19:43:57 UTC 2013 ap/linuxdoc-tools-0.9.68-arm-2.tgz: Rebuilt. Added VERSION.xsl -> VERSION symlink. d/python-2.7.4-arm-1.tgz: Upgraded. d/slacktrack-2.13-arm-1.tgz: Upgraded. d/subversion-1.7.9-arm-1.tgz: Upgraded. This update fixes some denial of service bugs: mod_dav_svn excessive memory usage from property changes mod_dav_svn crashes on LOCK requests against activity URLs mod_dav_svn crashes on LOCK requests against non-existant URLs mod_dav_svn crashes on PROPFIND requests against activity URLs mod_dav_svn crashes on out of range limit in log REPORT request For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884 (* Security fix *) kde/amarok-2.7.0-arm-4.tgz: Rebuilt. kde/ark-4.10.2-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.2-arm-1.tgz: Upgraded. kde/bluedevil-1.3.1-arm-1.tgz: Upgraded. kde/bomber-4.10.2-arm-1.tgz: Upgraded. kde/bovo-4.10.2-arm-1.tgz: Upgraded. kde/calligra-2.6.2-arm-1.tgz: Upgraded. kde/dragon-4.10.2-arm-1.tgz: Upgraded. kde/filelight-4.10.2-arm-1.tgz: Upgraded. kde/granatier-4.10.2-arm-1.tgz: Upgraded. kde/gwenview-4.10.2-arm-1.tgz: Upgraded. kde/juk-4.10.2-arm-1.tgz: Upgraded. kde/k3b-2.0.2_20120226.git-arm-1.tgz: Upgraded. kde/kaccessible-4.10.2-arm-1.tgz: Upgraded. kde/kactivities-4.10.2-arm-1.tgz: Upgraded. kde/kajongg-4.10.2-arm-1.tgz: Upgraded. kde/kamera-4.10.2-arm-1.tgz: Upgraded. kde/kapman-4.10.2-arm-1.tgz: Upgraded. kde/kate-4.10.2-arm-1.tgz: Upgraded. kde/katomic-4.10.2-arm-1.tgz: Upgraded. kde/kaudiocreator-1.3-arm-1.tgz: Upgraded. kde/kblackbox-4.10.2-arm-1.tgz: Upgraded. kde/kblocks-4.10.2-arm-1.tgz: Upgraded. kde/kbounce-4.10.2-arm-1.tgz: Upgraded. kde/kbreakout-4.10.2-arm-1.tgz: Upgraded. kde/kcalc-4.10.2-arm-1.tgz: Upgraded. kde/kcharselect-4.10.2-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.2-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.2-arm-1.tgz: Upgraded. kde/kde-baseapps-4.10.2-arm-1.tgz: Upgraded. kde/kde-runtime-4.10.2-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.2-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.2-arm-1.tgz: Upgraded. kde/kdeadmin-4.10.2-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.2-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.2-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.2-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.2-arm-1.tgz: Upgraded. kde/kdelibs-4.10.2-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.2-arm-1.tgz: Upgraded. kde/kdepim-4.10.2-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.2-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.2-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.2-arm-1.tgz: Upgraded. kde/kdesdk-4.10.2-arm-1.tgz: Upgraded. kde/kdetoys-4.10.2-arm-1.tgz: Upgraded. kde/kdevelop-4.4.1-arm-1.tgz: Upgraded. kde/kdevelop-pg-qt-1.0.0-arm-1.tgz: Upgraded. kde/kdevplatform-1.4.1-arm-1.tgz: Upgraded. kde/kdewebdev-4.10.2-arm-1.tgz: Upgraded. kde/kdf-4.10.2-arm-1.tgz: Upgraded. kde/kdiamond-4.10.2-arm-1.tgz: Upgraded. kde/kfloppy-4.10.2-arm-1.tgz: Upgraded. kde/kfourinline-4.10.2-arm-1.tgz: Upgraded. kde/kgamma-4.10.2-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.2-arm-1.tgz: Upgraded. kde/kgpg-4.10.2-arm-1.tgz: Upgraded. kde/kigo-4.10.2-arm-1.tgz: Upgraded. kde/killbots-4.10.2-arm-1.tgz: Upgraded. kde/kio-mtp-fae62fc_20121225git-arm-1.tgz: Upgraded. kde/kiriki-4.10.2-arm-1.tgz: Upgraded. kde/kjumpingcube-4.10.2-arm-1.tgz: Upgraded. kde/klickety-4.10.2-arm-1.tgz: Upgraded. kde/klines-4.10.2-arm-1.tgz: Upgraded. kde/kmag-4.10.2-arm-1.tgz: Upgraded. kde/kmahjongg-4.10.2-arm-1.tgz: Upgraded. kde/kmines-4.10.2-arm-1.tgz: Upgraded. kde/kmix-4.10.2-arm-1.tgz: Upgraded. kde/kmousetool-4.10.2-arm-1.tgz: Upgraded. kde/kmouth-4.10.2-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.2-arm-1.tgz: Upgraded. kde/knetwalk-4.10.2-arm-1.tgz: Upgraded. kde/kolf-4.10.2-arm-1.tgz: Upgraded. kde/kollision-4.10.2-arm-1.tgz: Upgraded. kde/kolourpaint-4.10.2-arm-1.tgz: Upgraded. kde/konquest-4.10.2-arm-1.tgz: Upgraded. kde/konsole-4.10.2-arm-1.tgz: Upgraded. kde/korundum-4.10.2-arm-1.tgz: Upgraded. kde/kpat-4.10.2-arm-1.tgz: Upgraded. kde/kplayer-0.7.2-arm-1.tgz: Upgraded. kde/kremotecontrol-4.10.2-arm-1.tgz: Upgraded. kde/kreversi-4.10.2-arm-1.tgz: Upgraded. kde/kross-interpreters-4.10.2-arm-1.tgz: Upgraded. kde/kruler-4.10.2-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.2-arm-1.tgz: Upgraded. kde/kscreen-0.0.71-arm-1.tgz: Upgraded. kde/kshisen-4.10.2-arm-1.tgz: Upgraded. kde/ksirk-4.10.2-arm-1.tgz: Upgraded. kde/ksnakeduel-4.10.2-arm-1.tgz: Upgraded. kde/ksnapshot-4.10.2-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.2-arm-1.tgz: Upgraded. kde/ksquares-4.10.2-arm-1.tgz: Upgraded. kde/ksudoku-4.10.2-arm-1.tgz: Upgraded. kde/ktimer-4.10.2-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-1.tgz: Upgraded. kde/ktuberling-4.10.2-arm-1.tgz: Upgraded. kde/kubrick-4.10.2-arm-1.tgz: Upgraded. kde/kwallet-4.10.2-arm-1.tgz: Upgraded. kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz: Upgraded. kde/libkcddb-4.10.2-arm-1.tgz: Upgraded. kde/libkcompactdisc-4.10.2-arm-1.tgz: Upgraded. kde/libkdcraw-4.10.2-arm-1.tgz: Upgraded. kde/libkdegames-4.10.2-arm-1.tgz: Upgraded. kde/libkexiv2-4.10.2-arm-1.tgz: Upgraded. kde/libkipi-4.10.2-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.2-arm-1.tgz: Upgraded. kde/libksane-4.10.2-arm-1.tgz: Upgraded. kde/libkscreen-0.0.71-arm-1.tgz: Upgraded. kde/libktorrent-1.3.1-arm-2.tgz: Rebuilt. kde/lskat-4.10.2-arm-1.tgz: Upgraded. kde/mplayerthumbs-4.10.2-arm-1.tgz: Upgraded. kde/nepomuk-core-4.10.2-arm-1.tgz: Upgraded. kde/nepomuk-widgets-4.10.2-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0.8-arm-1.tgz: Upgraded. kde/okular-4.10.2-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.1-arm-1.tgz: Upgraded. kde/oxygen-gtk3-1.1.1-arm-1.tgz: Upgraded. kde/oxygen-icons-4.10.2-arm-1.tgz: Upgraded. kde/palapeli-4.10.2-arm-1.tgz: Upgraded. kde/perlkde-4.10.2-arm-1.tgz: Upgraded. kde/perlqt-4.10.2-arm-1.tgz: Upgraded. kde/picmi-4.10.2-arm-1.tgz: Upgraded. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz: Upgraded. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz: Upgraded. kde/print-manager-4.10.2-arm-1.tgz: Upgraded. kde/qtruby-4.10.2-arm-1.tgz: Upgraded. kde/quanta-29a3f8e_20111223git-arm-1.tgz: Upgraded. kde/skanlite-1.0-arm-1.tgz: Upgraded. kde/smokegen-4.10.2-arm-1.tgz: Upgraded. kde/smokekde-4.10.2-arm-1.tgz: Upgraded. kde/smokeqt-4.10.2-arm-1.tgz: Upgraded. kde/superkaramba-4.10.2-arm-1.tgz: Upgraded. kde/svgpart-4.10.2-arm-1.tgz: Upgraded. kde/sweeper-4.10.2-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz: Upgraded. kdei/kde-l10n-ar-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-bg-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-bs-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ca@valencia-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-cs-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-da-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-de-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-el-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-en_GB-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-es-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-et-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-eu-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-fa-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-fi-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-fr-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ga-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-gl-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-he-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-hi-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-hr-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-hu-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ia-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-is-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-it-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ja-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-kk-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-km-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ko-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-lt-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-lv-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-mr-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-nb-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-nds-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-nl-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-nn-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-pa-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-pl-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-pt_BR-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ro-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ru-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-si-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-sk-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-sl-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-sr-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-sv-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-tg-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-th-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-tr-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-ug-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-uk-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-vi-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-wa-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_CN-4.10.2-noarch-1.tgz: Upgraded. kdei/kde-l10n-zh_TW-4.10.2-noarch-1.tgz: Upgraded. l/libbluedevil-1.9.3-arm-1.tgz: Upgraded. l/liblastfm-1.0.7-arm-1.tgz: Upgraded. l/libmtp-1.1.6-arm-1.tgz: Upgraded. l/qt-4.8.4-arm-3.tgz: Rebuilt. Removed dangling symlink in the docs directory. n/autofs-5.0.7-arm-1.tgz: Upgraded. n/openssh-6.2p1-arm-2.tgz: Rebuilt. Patched to remove warnings about missing identity files unless they were specified on the command line or in the config file. n/openvpn-2.3.1-arm-1.tgz: Upgraded. xap/network-manager-applet-0.9.8.0-arm-2.tgz: Rebuilt. Fixed sed on ce-page-general.ui to use GtkHBox, not GtkVBox. extra/gcc-4.8.0/gcc-4.8.0-arm-2.tgz: Rebuilt. Restored missing target.h, target.def, and target-hooks-macros.h headers. extra/gcc-4.8.0/gcc-g++-4.8.0-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-go-4.8.0-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-java-4.8.0-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-objc-4.8.0-arm-2.tgz: Rebuilt. +--------------------------+ Wed Apr 3 18:12:07 UTC 2013 ap/linuxdoc-tools-0.9.68-arm-1.tgz: Upgraded. Upgraded to AsciiDoc-8.6.8 Upgraded to DocBook XSL Stylesheets 1.78.1 Removed dangling symlinks from /usr/doc. d/binutils-2.23.52.0.1-arm-2.tgz: Rebuilt. Export/install demangle.h. Thanks to Jim Diamond. Patched addr2line to use dynamic symbol table if needed. Reverted an upstream change that broke linking dynamic libraries through weak symbols, requiring additions like -lpthread to the link line. Fixed texinfo files to be compatible with newer texinfo versions. Patched system headers to not complain about missing "config.h". l/gtk+2-2.24.17-arm-2.tgz: Rebuilt. Restored the missing /etc/gtk-2.0/$ARCH-slackware-linux/ directory. Thanks to Tim Thomas. +--------------------------+ Tue Apr 2 19:44:54 UTC 2013 The mini root filesystem for -current has been updated. ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/ The Mozilla suite of applications have been updated in the 'unsupported' tree: ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages/ a/mtd-utils-020413-arm-1.tgz: Upgraded. a/u-boot-tools-2013.01.01-arm-1.tgz: Upgraded. +--------------------------+ Mon Apr 1 18:13:44 UTC 2013 More updates, and several rebuilds due to bumped library versions in the boost, icu4c, ilmbase, imagemagick, libzip, and net-snmp packages. Thanks to Heinz Wiesinger for several of these library bumps, and to Robby Workman for the initial work on lots of the updates in this batch. The big news here is the removal of MySQL in favor of MariaDB. This shouldn't really be a surprise on any level. Thanks are due to Heinz Wiesinger for his work on transitioning the build script, testing, and getting us all behind this move. In the vast majority of situations, MariaDB is entirely compatible with existing MySQL databases and will drop right in with no changes required. There's an article available outlining the areas in which MariaDB differs from MySQL that I'd recommend reading: https://kb.askmonty.org/v/mariadb-versus-mysql-compatibility/ Thanks to the MariaDB Foundation! We look forward to working with you. GCC 4.8.0 has been added to /extra rather than the main tree. This is because GCC 4.8.0 has not been able to produce a bootable Kernel here. I tried reverting to the previous version of binutils and applying the latest SVN branch update, but to no avail -- so for now we're sticking with GCC 4.7.2. a/acpid-2.0.18-arm-1.tgz: Upgraded. a/dbus-1.6.8-arm-1.tgz: Upgraded. a/e2fsprogs-1.42.7-arm-1.tgz: Upgraded. a/gettext-0.18.2.1-arm-2.tgz: Rebuilt. a/glibc-solibs-2.17-arm-4.tgz: Rebuilt. a/glibc-zoneinfo-2013b-noarch-4.tgz: Rebuilt. a/kernel-modules-kirkwood-3.8.5_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.5_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.5_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.8.5-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.5-arm-1.tgz: Upgraded. a/kernel_versatile-3.8.5-arm-1.tgz: Upgraded. a/kmod-12-arm-1.tgz: Upgraded. a/reiserfsprogs-3.6.22-arm-1.tgz: Upgraded. a/shadow-4.1.4.3-arm-7.tgz: Rebuilt. Patched pw_encrypt() to fix "crypt: Invalid argument" and immediate login failure when a non-existent user tries to log in. This was caused by a change in the behavior of glibc's crypt() function. When a user that does not exist tries to log in, the code in shadow calls crypt() with an invalid salt. The old version of crypt() used the provided bad salt (always "!") to produce a DES hash with "!!" at the beginning, while the new one just returns NULL which isn't well-handled by the shadow code. To fix this shadow bug, if the salt is invalid, we'll call crypt() using a good SHA512 salt, prepend "!!" to the hash that we get back, and have pw_encrypt() return this as the result. The effect is identical to the previous behavior -- unless the exact same malformed hash happens to be the hash in /etc/shadow (it won't be), the login will fail. While I see no way that these 6 lines of code could be less secure than the original code, I welcome additional review. Also, if anyone spots anything else that was adversely affected by the change to crypt()'s behavior, please let me know. Thanks to Michael L. Semon for information about the /bin/login problem. Patched to handle more than 16 supplemental groups. Thanks to Cal Peake. a/sharutils-4.13.3-arm-2.tgz: Rebuilt. a/udisks-1.0.4-arm-2.tgz: Rebuilt. a/udisks2-2.1.0-arm-1.tgz: Upgraded. ap/ghostscript-9.07-arm-1.tgz: Upgraded. ap/hplip-3.13.3-arm-2.tgz: Rebuilt. ap/madplay-0.15.2b-arm-4.tgz: Rebuilt. ap/man-pages-3.50-noarch-1.tgz: Upgraded. ap/mysql-5.5.29-arm-1.tgz: Removed. ap/mariadb-5.5.30-arm-1.tgz: Added. ap/nano-2.3.2-arm-1.tgz: Upgraded. ap/normalize-0.7.7-arm-3.tgz: Rebuilt. d/binutils-2.23.52.0.1-arm-1.tgz: Upgraded. d/bison-2.7-arm-1.tgz: Upgraded. d/distcc-3.1-arm-4.tgz: Rebuilt. d/gcc-4.7.2-arm-4.tgz: Rebuilt. d/gcc-g++-4.7.2-arm-4.tgz: Rebuilt. d/gcc-gfortran-4.7.2-arm-4.tgz: Rebuilt. d/gcc-gnat-4.7.2-arm-4.tgz: Rebuilt. d/gcc-go-4.7.2-arm-4.tgz: Rebuilt. d/gcc-java-4.7.2-arm-4.tgz: Rebuilt. d/gcc-objc-4.7.2-arm-4.tgz: Rebuilt. d/gettext-tools-0.18.2.1-arm-2.tgz: Rebuilt. d/kernel-headers-3.8.5-arm-1.tgz: Upgraded. d/llvm-3.2-arm-3.tgz: Rebuilt. Added /usr/bin/$ARCH-slackware-linux-{clang,clang++} symlinks. If these are present, LLVM/clang will be used to compile itself. Other programs might need them as well. d/oprofile-0.9.7-arm-4.tgz: Rebuilt. e/emacs-24.3-arm-2.tgz: Rebuilt. k/kernel-source-3.8.5-arm-1.tgz: Upgraded. kde/amarok-2.7.0-arm-3.tgz: Rebuilt. Rebuilt to use the dynamic embedded library in MariaDB. kde/calligra-2.6.2-arm-3.tgz: Rebuilt. kde/kde-runtime-4.10.1-arm-2.tgz: Rebuilt. kde/kdelibs-4.10.1-arm-3.tgz: Rebuilt. kde/kig-4.10.1-arm-1.tgz: Added. kde/networkmanagement-0.9.0.8-arm-1.tgz: Upgraded. kde/quanta-29a3f8e_20111223git-arm-3.tgz: Rebuilt. kde/skanlite-1.0-arm-1.tgz: Upgraded. l/GConf-3.2.6-arm-1.tgz: Upgraded. l/akonadi-1.9.1-arm-1.tgz: Upgraded. l/at-spi2-atk-2.6.2-arm-1.tgz: Added. l/at-spi2-core-2.6.3-arm-1.tgz: Added. l/atk-2.6.0-arm-1.tgz: Upgraded. l/audiofile-0.3.6-arm-1.tgz: Upgraded. l/boost-1.53.0-arm-1.tgz: Upgraded. l/dbus-glib-0.100.2-arm-1.tgz: Upgraded. l/dbus-python-1.1.1-arm-1.tgz: Upgraded. l/dconf-0.14.1-arm-1.tgz: Added. l/desktop-file-utils-0.21-arm-1.tgz: Upgraded. l/ebook-tools-0.2.2-arm-2.tgz: Rebuilt. l/esound-0.2.41-arm-4.tgz: Rebuilt. l/fftw-3.3.3-arm-1.tgz: Upgraded. l/gcr-3.6.2-arm-1.tgz: Upgraded. l/gdk-pixbuf2-2.26.5-arm-1.tgz: Upgraded. l/gegl-0.2.0-arm-2.tgz: Rebuilt. l/glade3-3.8.3-arm-1.tgz: Upgraded. l/glib-networking-2.34.2-arm-1.tgz: Upgraded. l/glib2-2.34.3-arm-1.tgz: Upgraded. l/glibc-2.17-arm-4.tgz: Rebuilt. Built against Linux 3.8.5 kernel headers. l/glibc-i18n-2.17-arm-4.tgz: Rebuilt. l/glibc-profile-2.17-arm-4.tgz: Rebuilt. l/gmime-2.6.15-arm-1.tgz: Upgraded. l/gmm-4.2-noarch-1.tgz: Upgraded. l/gnome-icon-theme-3.6.2-noarch-1.tgz: Upgraded. l/gnome-keyring-3.6.3-arm-1.tgz: Upgraded. l/gobject-introspection-1.34.2-arm-1.tgz: Upgraded. l/gsettings-desktop-schemas-3.6.1-arm-1.tgz: Upgraded. l/gtk+2-2.24.17-arm-1.tgz: Upgraded. l/gtk+3-3.6.4-arm-1.tgz: Upgraded. l/gvfs-1.14.2-arm-1.tgz: Upgraded. l/icu4c-51.1-arm-1.tgz: Upgraded. l/ilmbase-1.0.3-arm-1.tgz: Upgraded. l/iso-codes-3.41-arm-1.tgz: Upgraded. l/libffi-3.0.13-arm-1.tgz: Upgraded. l/libgnome-keyring-3.6.0-arm-1.tgz: Upgraded. l/libgsf-1.14.26-arm-1.tgz: Upgraded. l/libproxy-0.4.11-arm-1.tgz: Upgraded. l/librsvg-2.36.4-arm-1.tgz: Upgraded. l/libsecret-0.12-arm-1.tgz: Added. l/libsoup-2.40.3-arm-1.tgz: Upgraded. l/libspectre-0.2.7-arm-1.tgz: Upgraded. l/libssh-0.5.4-arm-1.tgz: Upgraded. This update fixes a possible denial of service issue. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176 (* Security fix *) l/libxklavier-5.3-arm-1.tgz: Upgraded. l/libzip-0.10.1-arm-1.tgz: Upgraded. l/openexr-1.7.1-arm-1.tgz: Upgraded. l/parted-3.1-arm-1.tgz: Upgraded. l/popt-1.16-arm-1.tgz: Upgraded. l/qt-4.8.4-arm-2.tgz: Rebuilt. Patched moc to fix issues with the latest boost library. Thanks to Corrado Franco. l/raptor2-2.0.9-arm-1.tgz: Upgraded. l/rasqal-0.9.30-arm-1.tgz: Upgraded. l/redland-1.0.16-arm-1.tgz: Upgraded. l/sg3_utils-1.35-arm-1.tgz: Upgraded. l/virtuoso-ose-6.1.6-arm-2.tgz: Rebuilt. n/ModemManager-0.6.0.0-arm-1.tgz: Upgraded. n/NetworkManager-0.9.8.0-arm-1.tgz: Upgraded. n/bind-9.9.2_P2-arm-1.tgz: Upgraded. This update fixes a critical defect in BIND 9 that allows an attacker to cause excessive memory consumption in named or other programs linked to libdns. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 https://kb.isc.org/article/AA-00871 (* Security fix *) n/dhcp-4.2.5_P1-arm-1.tgz: Upgraded. This update replaces the included BIND 9 code that the DHCP programs link against. Those contained a defect that could possibly lead to excessive memory consumption and a denial of service. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266 (* Security fix *) n/mcabber-0.10.2-arm-2.tgz: Rebuilt. n/net-snmp-5.7.2-arm-1.tgz: Upgraded. n/ntp-4.2.6p5-arm-3.tgz: Rebuilt. n/obex-data-server-0.4.6-arm-3.tgz: Rebuilt. n/openssh-6.2p1-arm-1.tgz: Upgraded. n/php-5.4.13-arm-1.tgz: Upgraded. This release fixes two security issues in SOAP: Added check that soap.wsdl_cache_dir conforms to open_basedir. Disabled external entities loading. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643 (* Security fix *) n/tin-1.8.3-arm-4.tgz: Rebuilt. x/xf86-video-nouveau-1.0.4-arm-1.tgz: Upgraded. xap/audacious-3.3.4-arm-1.tgz: Upgraded. xap/audacious-plugins-3.3.4-arm-1.tgz: Upgraded. xap/imagemagick-6.8.4_1-arm-1.tgz: Upgraded. xap/network-manager-applet-0.9.8.0-arm-1.tgz: Upgraded. Patched for new version of GTK+. Thanks to yenn. xap/pan-0.139-arm-2.tgz: Rebuilt. xap/sane-1.0.23-arm-1.tgz: Upgraded. xap/windowmaker-0.95.4-arm-1.tgz: Upgraded. xap/xine-lib-1.1.21-arm-2.tgz: Rebuilt. xap/xlockmore-5.42-arm-1.tgz: Upgraded. xap/xpdf-3.03-arm-1.tgz: Upgraded. Fixed patch to xpdfrc for Japanese language support. Thanks to ABE Shin-ichi. xap/xsane-0.998-arm-4.tgz: Rebuilt. xap/xscreensaver-5.21-arm-1.tgz: Upgraded. xfce/Thunar-1.6.2-arm-1.tgz: Upgraded. xfce/exo-0.10.2-arm-1.tgz: Upgraded. xfce/gtk-xfce-engine-3.0.1-arm-1.tgz: Upgraded. xfce/orage-4.8.4-arm-1.tgz: Upgraded. xfce/tumbler-0.1.25-arm-2.tgz: Rebuilt. Reverted to tumbler-0.1.25, since later versions require gstreamer-1.0, and patched a bug that caused tumbler to hold files open preventing volumes from being ejected. xfe/Terminal-0.4.8-arm-1.tgz: Removed. xfce/xfce4-terminal-0.6.1-arm-1.tgz: Added. xfce/xfce4-weather-plugin-0.8.3-arm-1.tgz: Upgraded. xfce/xfdesktop-4.10.2-arm-1.tgz: Upgraded. xfce/xfwm4-4.10.0-arm-2.tgz: Rebuilt. Patched mouse bug with GTK+3 apps. Thanks to Per-Arne Hognert. extra/brltty/brltty-4.4-arm-2.tgz: Rebuilt. extra/gcc-4.8.0/gcc-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-g++-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-gfortran-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-gnat-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-go-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-java-4.8.0-arm-1.tgz: Upgraded. extra/gcc-4.8.0/gcc-objc-4.8.0-arm-1.tgz: Upgraded. extra/partitionmanager/partitionmanager-1.0.3_20130328svn-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Thu Mar 21 18:09:45 UTC 2013 a/ed-1.7-arm-1.tgz: Upgraded. a/gettext-0.18.2.1-arm-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.8.4_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.8.4_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.8.4_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.8.4-arm-1.tgz: Upgraded. a/kernel_tegra-3.8.4-arm-1.tgz: Upgraded. a/kernel_versatile-3.8.4-arm-1.tgz: Upgraded. ap/hplip-3.13.3-arm-1.tgz: Upgraded. ap/htop-1.0.2-arm-1.tgz: Upgraded. ap/sqlite-3071600-arm-1.tgz: Upgraded. ap/zsh-5.0.2-arm-1.tgz: Upgraded. d/doxygen-1.8.3.1-arm-1.tgz: Upgraded. d/flex-2.5.37-arm-1.tgz: Upgraded. d/gettext-tools-0.18.2.1-arm-1.tgz: Upgraded. k/kernel-source-3.8.4-arm-1.tgz: Upgraded. kde/calligra-2.6.2-arm-2.tgz: Rebuilt. l/loudmouth-1.5.0_20121201-arm-1.tgz: Upgraded. l/mpfr-3.1.2-arm-1.tgz: Upgraded. n/alpine-2.03-arm-1.tgz: Upgraded. n/bluez-4.99-arm-3.tgz: Rebuilt. Install etc/bluetooth/rfcomm.conf as a '.new' file as it is on x86. n/imapd-2.03-arm-1.tgz: Upgraded. n/iproute2-3.8.0-arm-1.tgz: Upgraded. n/lftp-4.4.5-arm-1.tgz: Upgraded. n/mcabber-0.10.2-arm-1.tgz: Upgraded. x/glew-1.9.0-arm-1.tgz: Upgraded. x/mesa-9.1.1-arm-1.tgz: Upgraded. xap/ddd-3.3.12-arm-1.tgz: Added. xap/xxgdb-1.12-arm-3.tgz: Removed. This is old and unmaintained. We've replaced it with ddd, a much better frontend for the gdb debugger. xap/gnuchess-6.0.3-arm-1.tgz: Upgraded. Upgraded to gnuchess-6.0.3 and xboard-4.7.0. xap/gv-3.7.4-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Sun Mar 17 14:19:11 UTC 2013 a/dosfstools-3.0.16-arm-1.tgz: Upgraded. a/glibc-solibs-2.17-arm-3.tgz: Rebuilt. Minimum kernel is now Linux 3.4.0. a/sysvinit-scripts-2.0-noarch-10.tgz: Rebuilt. Removed a crufty '.orig' file. ap/slackpkg-2.82.0-arm-6.tgz: Rebuilt. Added a new Slackware ARM mirror to the sample configuration. d/git-1.8.2-arm-1.tgz: Upgraded. d/perl-5.16.3-arm-1.tgz: Upgraded. This update fixes a flaw in the rehashing code that can be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667 (* Security fix *) d/ruby-1.9.3_p392-arm-1.tgz: Upgraded. This release includes security fixes about bundled JSON and REXML. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821 (* Security fix *) kde/calligra-2.6.2-arm-1.tgz: Upgraded. kdei/calligra-l10n-tr-2.6.2-noarch-1.tgz: Added. kdei/calligra-*-2.6.2-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-3.tgz: Rebuilt. Minimum kernel is now Linux 3.4.0. l/glibc-i18n-2.17-arm-3.tgz: Rebuilt. l/glibc-profile-2.17-arm-3.tgz: Rebuilt. x/inputproto-2.3-arm-1.tgz: Upgraded. x/libXi-1.7-arm-1.tgz: Upgraded. x/scim-bridge-0.4.16-arm-4.tgz: Removed. This functionality was included in scim-1.4.14. x/scim-1.4.14-arm-3.tgz: Rebuilt. Updated scim profile scripts to use scim as the GTK_IM_MODULE rather than scim-bridge (which was removed). Thanks to Thomas Choi. x/xf86-input-acecad-1.5.0-arm-3.tgz: Rebuilt. x/xf86-input-aiptek-1.4.1-arm-3.tgz: Rebuilt. x/xf86-input-evdev-2.7.3-arm-2.tgz: Rebuilt. x/xf86-input-joystick-1.6.1-arm-3.tgz: Rebuilt. x/xf86-input-keyboard-1.6.2-arm-2.tgz: Rebuilt. x/xf86-input-mouse-1.8.1-arm-2.tgz: Rebuilt. x/xf86-input-penmount-1.5.0-arm-3.tgz: Rebuilt. x/xf86-input-synaptics-1.6.3-arm-2.tgz: Rebuilt. x/xf86-input-void-1.4.0-arm-3.tgz: Rebuilt. x/xf86-input-wacom-0.19.0-arm-2.tgz: Rebuilt. x/xf86-video-apm-1.2.5-arm-2.tgz: Rebuilt. x/xf86-video-ark-0.7.5-arm-2.tgz: Rebuilt. x/xf86-video-ast-0.97.0-arm-2.tgz: Rebuilt. x/xf86-video-ati-7.1.0-arm-2.tgz: Rebuilt. x/xf86-video-chips-1.2.5-arm-2.tgz: Rebuilt. x/xf86-video-cirrus-1.5.2-arm-2.tgz: Rebuilt. x/xf86-video-dummy-0.3.6-arm-2.tgz: Rebuilt. x/xf86-video-fbdev-0.4.3-arm-4.tgz: Rebuilt. x/xf86-video-glint-1.2.8-arm-2.tgz: Rebuilt. x/xf86-video-i128-1.3.6-arm-2.tgz: Rebuilt. x/xf86-video-i740-1.3.4-arm-2.tgz: Rebuilt. x/xf86-video-mach64-6.9.4-arm-2.tgz: Rebuilt. x/xf86-video-mga-1.6.2-arm-2.tgz: Rebuilt. x/xf86-video-modesetting-0.6.0-arm-2.tgz: Rebuilt. x/xf86-video-neomagic-1.2.7-arm-2.tgz: Rebuilt. x/xf86-video-nv-2.1.20-arm-3.tgz: Rebuilt. x/xf86-video-openchrome-0.3.1-arm-2.tgz: Rebuilt. x/xf86-video-r128-6.9.1-arm-2.tgz: Rebuilt. x/xf86-video-rendition-4.2.5-arm-2.tgz: Rebuilt. x/xf86-video-s3-0.6.5-arm-2.tgz: Rebuilt. x/xf86-video-s3virge-1.10.6-arm-2.tgz: Rebuilt. x/xf86-video-savage-2.3.6-arm-2.tgz: Rebuilt. x/xf86-video-siliconmotion-1.7.7-arm-2.tgz: Rebuilt. x/xf86-video-sis-0.10.7-arm-2.tgz: Rebuilt. x/xf86-video-sisusb-0.9.6-arm-2.tgz: Rebuilt. x/xf86-video-tdfx-1.4.5-arm-2.tgz: Rebuilt. x/xf86-video-tga-1.2.2-arm-2.tgz: Rebuilt. x/xf86-video-trident-1.3.6-arm-2.tgz: Rebuilt. x/xf86-video-tseng-1.2.5-arm-2.tgz: Rebuilt. x/xf86-video-v4l-0.2.0-arm-3.tgz: Rebuilt. x/xf86-video-vesa-2.3.2-arm-2.tgz: Rebuilt. x/xf86-video-vmware-13.0.0-arm-2.tgz: Rebuilt. x/xf86-video-voodoo-1.2.5-arm-2.tgz: Rebuilt. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-3.tgz: Rebuilt. x/xf86-video-xgixp-1.8.1-arm-2.tgz: Rebuilt. x/xorg-server-1.14.0-arm-1.tgz: Upgraded. Dropped the broken randr patch for panning/scaling. According to the release notes, a different fix was merged upstream. Dropped randr cleanup patch that was merged upstream. x/xorg-server-xephyr-1.14.0-arm-1.tgz: Upgraded. x/xorg-server-xnest-1.14.0-arm-1.tgz: Upgraded. x/xorg-server-xvfb-1.14.0-arm-1.tgz: Upgraded. x/xterm-291-arm-1.tgz: Upgraded. +--------------------------+ Wed Mar 13 19:43:40 UTC 2013 The mini root filesystem for -current has also been updated. ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/ a/glibc-solibs-2.17-arm-2.tgz: Rebuilt. a/glibc-zoneinfo-2013b-noarch-1.tgz: Rebuilt. a/vboot-utils-20130222gite6cf2c2-arm-1.tgz: Added. These are tools to help install another Linux distribution (in our case, Slackware!) on to the Google/Samsung Chromebook 2012 ARM version. I have one of these arriving tomorrow so plan on working on this immediately! e/emacs-24.3-arm-1.tgz: Upgraded. kde/amarok-2.7.0-arm-2.tgz: Rebuilt. kde/ark-4.10.1-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.1-arm-1.tgz: Upgraded. kde/blinken-4.10.1-arm-2.tgz: Rebuilt. kde/bluedevil-1.3-arm-2.tgz: Rebuilt. kde/bomber-4.10.1-arm-1.tgz: Upgraded. kde/bovo-4.10.1-arm-1.tgz: Upgraded. kde/calligra-2.6.1-arm-1.tgz: Upgraded. kde/cantor-4.10.1-arm-2.tgz: Rebuilt. kde/dragon-4.10.1-arm-1.tgz: Upgraded. kde/filelight-4.10.1-arm-1.tgz: Upgraded. kde/granatier-4.10.1-arm-1.tgz: Upgraded. kde/gwenview-4.10.1-arm-1.tgz: Upgraded. kde/juk-4.10.1-arm-1.tgz: Upgraded. kde/k3b-2.0.2_20120226.git-arm-2.tgz: Rebuilt. kde/kaccessible-4.10.1-arm-1.tgz: Upgraded. kde/kactivities-4.10.1-arm-1.tgz: Upgraded. kde/kajongg-4.10.1-arm-1.tgz: Upgraded. kde/kamera-4.10.1-arm-1.tgz: Upgraded. kde/kapman-4.10.1-arm-1.tgz: Upgraded. kde/kate-4.10.1-arm-1.tgz: Upgraded. kde/katomic-4.10.1-arm-1.tgz: Upgraded. kde/kaudiocreator-1.3-arm-2.tgz: Rebuilt. kde/kblackbox-4.10.1-arm-1.tgz: Upgraded. kde/kblocks-4.10.1-arm-1.tgz: Upgraded. kde/kbounce-4.10.1-arm-1.tgz: Upgraded. kde/kbreakout-4.10.1-arm-1.tgz: Upgraded. kde/kcalc-4.10.1-arm-1.tgz: Upgraded. kde/kcharselect-4.10.1-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.1-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.1-arm-1.tgz: Upgraded. kde/kde-baseapps-4.10.1-arm-1.tgz: Upgraded. kde/kde-runtime-4.10.1-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.1-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.1-arm-1.tgz: Upgraded. kde/kdeadmin-4.10.1-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.1-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.1-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.1-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.1-arm-1.tgz: Upgraded. kde/kdelibs-4.10.1-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.1-arm-1.tgz: Upgraded. kde/kdepim-4.10.1-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.1-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.1-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.1-arm-1.tgz: Upgraded. kde/kdesdk-4.10.1-arm-1.tgz: Upgraded. kde/kdetoys-4.10.1-arm-1.tgz: Upgraded. kde/kdevelop-4.4.1-arm-2.tgz: Rebuilt. kde/kdevelop-pg-qt-1.0.0-arm-2.tgz: Rebuilt. kde/kdevplatform-1.4.1-arm-2.tgz: Rebuilt. kde/kdewebdev-4.10.1-arm-1.tgz: Upgraded. kde/kdf-4.10.1-arm-1.tgz: Upgraded. kde/kdiamond-4.10.1-arm-1.tgz: Upgraded. kde/kfloppy-4.10.1-arm-1.tgz: Upgraded. kde/kfourinline-4.10.1-arm-1.tgz: Upgraded. kde/kgamma-4.10.1-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.1-arm-1.tgz: Upgraded. kde/kgpg-4.10.1-arm-1.tgz: Upgraded. kde/kigo-4.10.1-arm-1.tgz: Upgraded. kde/killbots-4.10.1-arm-1.tgz: Upgraded. kde/kio-mtp-fae62fc_20121225git-arm-2.tgz: Rebuilt. kde/kiriki-4.10.1-arm-1.tgz: Upgraded. kde/kjumpingcube-4.10.1-arm-1.tgz: Upgraded. kde/klickety-4.10.1-arm-1.tgz: Upgraded. kde/klines-4.10.1-arm-1.tgz: Upgraded. kde/kmag-4.10.1-arm-1.tgz: Upgraded. kde/kmahjongg-4.10.1-arm-1.tgz: Upgraded. kde/kmines-4.10.1-arm-1.tgz: Upgraded. kde/kmix-4.10.1-arm-1.tgz: Upgraded. kde/kmousetool-4.10.1-arm-1.tgz: Upgraded. kde/kmouth-4.10.1-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.1-arm-1.tgz: Upgraded. kde/knetwalk-4.10.1-arm-1.tgz: Upgraded. kde/kolf-4.10.1-arm-1.tgz: Upgraded. kde/kollision-4.10.1-arm-1.tgz: Upgraded. kde/kolourpaint-4.10.1-arm-1.tgz: Upgraded. kde/konquest-4.10.1-arm-1.tgz: Upgraded. kde/konsole-4.10.1-arm-1.tgz: Upgraded. kde/korundum-4.10.1-arm-1.tgz: Upgraded. kde/kpat-4.10.1-arm-1.tgz: Upgraded. kde/kplayer-0.7.2-arm-2.tgz: Rebuilt. kde/kremotecontrol-4.10.1-arm-1.tgz: Upgraded. kde/kreversi-4.10.1-arm-1.tgz: Upgraded. kde/kross-interpreters-4.10.1-arm-1.tgz: Upgraded. kde/kruler-4.10.1-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.1-arm-1.tgz: Upgraded. kde/kscreen-0.0.71-arm-2.tgz: Rebuilt. kde/kshisen-4.10.1-arm-1.tgz: Upgraded. kde/ksirk-4.10.1-arm-1.tgz: Upgraded. kde/ksnakeduel-4.10.1-arm-1.tgz: Upgraded. kde/ksnapshot-4.10.1-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.1-arm-1.tgz: Upgraded. kde/ksquares-4.10.1-arm-1.tgz: Upgraded. kde/ksudoku-4.10.1-arm-1.tgz: Upgraded. kde/ktimer-4.10.1-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-2.tgz: Rebuilt. kde/ktuberling-4.10.1-arm-1.tgz: Upgraded. kde/kubrick-4.10.1-arm-1.tgz: Upgraded. kde/kwallet-4.10.1-arm-1.tgz: Upgraded. kde/kwebkitpart-1.2.0_20111116git-arm-2.tgz: Rebuilt. kde/libkcddb-4.10.1-arm-1.tgz: Upgraded. kde/libkcompactdisc-4.10.1-arm-1.tgz: Upgraded. kde/libkdcraw-4.10.1-arm-1.tgz: Upgraded. kde/libkdeedu-4.10.1-arm-2.tgz: Rebuilt. kde/libkdegames-4.10.1-arm-1.tgz: Upgraded. kde/libkexiv2-4.10.1-arm-1.tgz: Upgraded. kde/libkipi-4.10.1-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.1-arm-1.tgz: Upgraded. kde/libksane-4.10.1-arm-1.tgz: Upgraded. kde/libkscreen-0.0.71-arm-2.tgz: Rebuilt. kde/libktorrent-1.3.1-arm-3.tgz: Rebuilt. kde/lskat-4.10.1-arm-1.tgz: Upgraded. kde/mplayerthumbs-4.10.1-arm-1.tgz: Upgraded. kde/nepomuk-core-4.10.1-arm-1.tgz: Upgraded. kde/nepomuk-widgets-4.10.1-arm-1.tgz: Upgraded. kde/networkmanagement-0.9.0-arm-2.tgz: Rebuilt. kde/okular-4.10.1-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.1-arm-2.tgz: Rebuilt. kde/oxygen-gtk3-1.1.1-arm-2.tgz: Rebuilt. kde/oxygen-icons-4.10.1-arm-1.tgz: Upgraded. kde/palapeli-4.10.1-arm-1.tgz: Upgraded. kde/perlkde-4.10.1-arm-1.tgz: Upgraded. kde/perlqt-4.10.1-arm-1.tgz: Upgraded. kde/picmi-4.10.1-arm-1.tgz: Upgraded. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-2.tgz: Rebuilt. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-2.tgz: Rebuilt. kde/print-manager-4.10.1-arm-1.tgz: Upgraded. kde/qtruby-4.10.1-arm-1.tgz: Upgraded. kde/quanta-29a3f8e_20111223git-arm-2.tgz: Rebuilt. kde/rocs-4.10.1-arm-1.tgz: Upgraded. kde/skanlite-0.9-arm-2.tgz: Rebuilt. kde/smokegen-4.10.1-arm-1.tgz: Upgraded. kde/smokekde-4.10.1-arm-1.tgz: Upgraded. kde/smokeqt-4.10.1-arm-1.tgz: Upgraded. kde/superkaramba-4.10.1-arm-1.tgz: Upgraded. kde/svgpart-4.10.1-arm-1.tgz: Upgraded. kde/sweeper-4.10.1-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-2.tgz: Rebuilt. kdei/calligra-l10n-*-2.6.1-noarch-1.tgz: Upgraded. kdei/kde-*-4.10.1-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-2.tgz: Rebuilt. l/glibc-i18n-2.17-arm-2.tgz: Rebuilt. l/glibc-profile-2.17-arm-2.tgz: Rebuilt. +--------------------------+ Thu Mar 7 19:10:43 UTC 2013 ap/sudo-1.8.6p7-arm-1.tgz: Upgraded. This update fixes security issues that could allow a user to run commands without authenticating after the password timeout has already expired. Note that the vulnerability did not permit a user to run commands other than those allowed by the sudoers policy. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776 (* Security fix *) +--------------------------+ Mon Mar 4 19:34:16 UTC 2013 ap/cdrtools-3.01a13-arm-1.tgz: Upgraded. l/apr-util-1.5.1-arm-1.tgz: Upgraded. n/httpd-2.4.4-arm-1.tgz: Upgraded. This update provides bugfixes and enhancements. Two security issues are fixed: * Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp. [Jim Jagielski, Stefan Fritsch, Niels Heinen ] * XSS in mod_proxy_balancer manager interface. [Jim Jagielski, Niels Heinen ] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558 (* Security fix *) n/php-5.4.12-arm-1.tgz: Upgraded. x/fontconfig-2.10.2-arm-2.tgz: Rebuilt. Applied patch from upstream git to fix 10-autohint.conf. +--------------------------+ Fri Mar 1 19:01:23 UTC 2013 Lots of X updates in this batch! We were finally able to upgrade to the latest cairo (including the long-requested XCB backend), as the text corruption bug that was preventing that was fixed in the upstream X server. We've also upgraded to the latest libdrm and Mesa. Don't miss the new glu package -- that was previously part of Mesa, and there are a lot of things that link to it. Thanks to Robby Workman for all the help with this. a/coreutils-8.21-arm-1.tgz: Upgraded. a/dosfstools-3.0.15-arm-1.tgz: Upgraded. a/eject-2.1.5-arm-5.tgz: Rebuilt. Patched to fix -T. Thanks to GazL. a/libcgroup-0.38-arm-2.tgz: Rebuilt. Use full path to /usr/sbin/cgclear, since /usr/sbin isn't in the $PATH when the script is called at shutdown/reboot. Thanks to LukenShiro. ap/groff-1.22.2-arm-1.tgz: Upgraded. d/git-1.8.1.4-arm-1.tgz: Upgraded. l/cairo-1.12.14-arm-1.tgz: Upgraded. l/slang-2.2.4-arm-2.tgz: Rebuilt. Recompiled with -fno-tree-dse to avoid optimization bugs. Thanks to Petri Kaukasoina. x/bdftopcf-1.0.4-arm-1.tgz: Upgraded. x/beforelight-1.0.5-arm-1.tgz: Upgraded. x/dri2proto-2.8-arm-1.tgz: Upgraded. x/editres-1.0.6-arm-1.tgz: Upgraded. x/fontconfig-2.10.2-arm-1.tgz: Upgraded. Create the symlinks in doinst.sh before running fc-cache. Don't include /usr/share/fonts in the fonts.conf font directory list as that causes bitmapped fonts to be used. Thanks to Iouri Kharon. x/glproto-1.4.16-arm-1.tgz: Upgraded. x/glu-9.0.0-arm-1.tgz: Added. This used to be part of Mesa, but was split out. x/ico-1.0.4-arm-1.tgz: Upgraded. x/libXcm-0.5.2-arm-1.tgz: Upgraded. x/libXcomposite-0.4.4-arm-1.tgz: Upgraded. x/libXdamage-1.1.4-arm-1.tgz: Upgraded. x/libXi-1.6.2-arm-1.tgz: Upgraded. x/libXrandr-1.4.0-arm-1.tgz: Upgraded. x/libdrm-2.4.42-arm-1.tgz: Upgraded. x/libxcb-1.9-arm-1.tgz: Upgraded. x/mesa-9.1-arm-1.tgz: Upgraded. x/mtdev-1.1.3-arm-1.tgz: Upgraded. x/pixman-0.28.2-arm-1.tgz: Upgraded. x/randrproto-1.4.0-arm-1.tgz: Upgraded. x/rgb-1.0.5-arm-1.tgz: Upgraded. x/sessreg-1.0.8-arm-1.tgz: Upgraded. x/showfont-1.0.4-arm-1.tgz: Upgraded. x/ttf-indic-fonts-0.5.14-arm-1.tgz: Upgraded. x/viewres-1.0.4-arm-1.tgz: Upgraded. x/wqy-zenhei-font-ttf-0.9.45-noarch-1.tgz: Upgraded. x/xbacklight-1.2.0-arm-1.tgz: Upgraded. x/xcalc-1.0.5-arm-1.tgz: Upgraded. x/xcb-proto-1.8-arm-1.tgz: Upgraded. x/xcm-0.5.2-arm-1.tgz: Added. x/xconsole-1.0.5-arm-1.tgz: Upgraded. x/xditview-1.0.3-arm-1.tgz: Upgraded. x/xedit-1.2.1-arm-1.tgz: Upgraded. x/xf86-input-acecad-1.5.0-arm-2.tgz: Rebuilt. x/xf86-input-aiptek-1.4.1-arm-2.tgz: Rebuilt. x/xf86-input-evdev-2.7.3-arm-1.tgz: Upgraded. x/xf86-input-joystick-1.6.1-arm-2.tgz: Rebuilt. x/xf86-input-keyboard-1.6.2-arm-1.tgz: Upgraded. x/xf86-input-mouse-1.8.1-arm-1.tgz: Upgraded. x/xf86-input-penmount-1.5.0-arm-2.tgz: Rebuilt. x/xf86-input-synaptics-1.6.3-arm-1.tgz: Upgraded. x/xf86-input-void-1.4.0-arm-2.tgz: Rebuilt. x/xf86-input-wacom-0.19.0-arm-1.tgz: Upgraded. x/xf86-video-apm-1.2.5-arm-1.tgz: Upgraded. x/xf86-video-ark-0.7.5-arm-1.tgz: Upgraded. x/xf86-video-ast-0.97.0-arm-1.tgz: Upgraded. x/xf86-video-ati-7.1.0-arm-1.tgz: Upgraded. x/xf86-video-chips-1.2.5-arm-1.tgz: Upgraded. x/xf86-video-cirrus-1.5.2-arm-1.tgz: Upgraded. x/xf86-video-dummy-0.3.6-arm-1.tgz: Upgraded. x/xf86-video-fbdev-0.4.3-arm-2.tgz: Rebuilt. x/xf86-video-glint-1.2.8-arm-1.tgz: Upgraded. x/xf86-video-i128-1.3.6-arm-1.tgz: Upgraded. x/xf86-video-i740-1.3.4-arm-1.tgz: Upgraded. x/xf86-video-mach64-6.9.4-arm-1.tgz: Upgraded. x/xf86-video-mga-1.6.2-arm-1.tgz: Upgraded. x/xf86-video-modesetting-0.6.0-arm-1.tgz: Upgraded. x/xf86-video-neomagic-1.2.7-arm-1.tgz: Upgraded. x/xf86-video-nv-2.1.20-arm-2.tgz: Rebuilt. x/xf86-video-openchrome-0.3.1-arm-1.tgz: Upgraded. Merged upstream patch to fix lockups with some chipsets. Thanks to J. Scott Heppler. x/xf86-video-r128-6.9.1-arm-1.tgz: Upgraded. x/xf86-video-rendition-4.2.5-arm-1.tgz: Upgraded. x/xf86-video-s3-0.6.5-arm-1.tgz: Upgraded. x/xf86-video-s3virge-1.10.6-arm-1.tgz: Upgraded. x/xf86-video-savage-2.3.6-arm-1.tgz: Upgraded. x/xf86-video-siliconmotion-1.7.7-arm-1.tgz: Upgraded. x/xf86-video-sis-0.10.7-arm-1.tgz: Upgraded. x/xf86-video-sisusb-0.9.6-arm-1.tgz: Added. x/xf86-video-tdfx-1.4.5-arm-1.tgz: Upgraded. x/xf86-video-tga-1.2.2-arm-1.tgz: Upgraded. x/xf86-video-trident-1.3.6-arm-1.tgz: Upgraded. x/xf86-video-tseng-1.2.5-arm-1.tgz: Added. x/xf86-video-v4l-0.2.0-arm-2.tgz: Rebuilt. x/xf86-video-vesa-2.3.2-arm-1.tgz: Upgraded. x/xf86-video-vmware-13.0.0-arm-1.tgz: Upgraded. x/xf86-video-voodoo-1.2.5-arm-1.tgz: Upgraded. x/xf86-video-xgi-1.6.0git_2012_08_06-arm-2.tgz: Rebuilt. x/xf86-video-xgixp-1.8.1-arm-1.tgz: Added. x/xfsinfo-1.0.4-arm-1.tgz: Upgraded. x/xkbutils-1.0.4-arm-1.tgz: Upgraded. x/xmag-1.0.5-arm-1.tgz: Upgraded. x/xmessage-1.0.4-arm-1.tgz: Upgraded. x/xorg-server-1.13.2-arm-2.tgz: Rebuilt. Clean up randr provider removal, fixing a number of random server crashes on shutdown. Thanks to Richard David Sherman and Robby Workman. Applied a patch to fix panning and scaling. Thanks to David Allen and Luigi Genoni. x/xorg-server-xephyr-1.13.2-arm-2.tgz: Rebuilt. x/xorg-server-xnest-1.13.2-arm-2.tgz: Rebuilt. x/xorg-server-xvfb-1.13.2-arm-2.tgz: Rebuilt. x/xrandr-1.4.0-arm-1.tgz: Upgraded. x/xscope-1.4-arm-1.tgz: Upgraded. x/xsetroot-1.1.1-arm-1.tgz: Upgraded. x/xsm-1.0.3-arm-1.tgz: Upgraded. x/xstdcmap-1.0.3-arm-1.tgz: Upgraded. x/xterm-290-arm-1.tgz: Upgraded. x/xvidtune-1.0.3-arm-1.tgz: Upgraded. x/xvinfo-1.1.2-arm-1.tgz: Upgraded. +--------------------------+ Wed Feb 20 08:14:16 UTC 2013 a/gpm-1.20.7-arm-2.tgz: Rebuilt. Fixed libgpm.so symlink. ap/terminus-font-4.38-noarch-1.tgz: Added. extra/openjdk/openjdk-7u13_b20-armhfp-1.txz: Upgraded. Please note that these packages are named "hfp" because I believe that, from testing, they only run on machines with a hardware floating point unit. We've been unable to help determine why these packages do not work nor build on armv5 machines. These OpenJDK/JRE packages fix many security issues: S6563318, CVE-2013-0424: RMI data sanitization. S6664509, CVE-2013-0425: Add logging context. S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time. S6776941, CVE-2013-0427: Improve thread pool shutdown. S7141694, CVE-2013-0429: Improving CORBA internals. S7173145: Improve in-memory representation of splashscreens. S7186945: Unpack200 improvement. S7186946: Refine unpacker resource usage. S7186948: Improve Swing data validation. S7186952, CVE-2013-0432: Improve clipboard access. S7186954: Improve connection performance. S7186957: Improve Pack200 data validation. S7192392, CVE-2013-0443: Better validation of client keys. S7192393, CVE-2013-0440: Better Checking of order of TLS Messages. S7192977, CVE-2013-0442: Issue in toolkit thread. S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies. S7200491: Tighten up JTable layout code. S7200500: Launcher better input validation. S7201064: Better dialogue checking. S7201066, CVE-2013-0441: Change modifiers on unused fields. S7201068, CVE-2013-0435: Better handling of UI elements. S7201070: Serialization to conform to protocol. S7201071, CVE-2013-0433: InetSocketAddress serialization issue. S8000210: Improve JarFile code quality. S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class. S8000540, CVE-2013-1475: Improve IIOP type reuse management. S8000631, CVE-2013-1476: Restrict access to class constructor. S8001235, CVE-2013-0434: Improve JAXP HTTP handling. S8001242: Improve RMI HTTP conformance. S8001307: Modify ACC_SUPER behavior. S8001972, CVE-2013-1478: Improve image processing. S8002325, CVE-2013-1480: Improve management of images. (* Security fix *) extra/openjdk/openjre-7u13_b20-armhfp-1.txz: Upgraded. (* Security fix *) +--------------------------+ Mon Feb 18 20:38:09 UTC 2013 KDE has been upgraded to version 4.10.0. The 'kdeedu' packages are missing because 'analitza' would not build on ARM. I will revisit this later. 'KWin' also segfaults upon launching KDE as with the previous KDE versions, but seems to cause no ill effects after closing the dialog box! I've been keen to get the 'gcc-go' package built (it had been absent because it required a minimum of glibc-2.16 on ARM), so glibc has been upgraded to version 2.17. We've jumped the gun a little here since Slackware x86 hasn't yet made this jump. However, the 2.17 components should more or less the same sources that make it into the x86 tree in the near future. The mini root filesystem for -current has also been updated. ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/ a/glibc-solibs-2.17-arm-1.tgz: Upgraded. You must be running at least Linux 3.4.11 before applying this update. a/glibc-zoneinfo-2012j-noarch-1.tgz: Upgraded. a/gpm-1.20.7-arm-1.tgz: Upgraded. This bumps the shared library version number, and will require several other packages to be recompiled. This will be done after there's been some time to test this in -current. Meanwhile, things should continue to work normally with the old shared library in the aaa_elflibs package. a/kernel-modules-kirkwood-3.7.9_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.7.9_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.7.9_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.7.9-arm-1.tgz: Upgraded. a/kernel_tegra-3.7.9-arm-1.tgz: Upgraded. a/kernel_versatile-3.7.9-arm-1.tgz: Upgraded. ap/hplip-3.13.2-arm-1.tgz: Upgraded. d/gcc-4.7.2-arm-3.tgz: Rebuilt. d/gcc-g++-4.7.2-arm-3.tgz: Rebuilt. d/gcc-gfortran-4.7.2-arm-3.tgz: Rebuilt. d/gcc-gnat-4.7.2-arm-3.tgz: Rebuilt. d/gcc-go-4.7.2-arm-3.tgz: Added. d/gcc-java-4.7.2-arm-3.tgz: Rebuilt. d/gcc-objc-4.7.2-arm-3.tgz: Rebuilt. d/git-1.8.1.3-arm-1.tgz: Upgraded. d/kernel-headers-3.7.9-arm-1.tgz: Upgraded. k/kernel-source-3.7.9-arm-1.tgz: Upgraded. kde/amarok-2.7.0-arm-1.tgz: Upgraded. kde/ark-4.10.0-arm-1.tgz: Upgraded. kde/audiocd-kio-4.10.0-arm-1.tgz: Added. kde/bluedevil-1.3-arm-1.tgz: Upgraded. kde/bomber-4.10.0-arm-1.tgz: Added. kde/bovo-4.10.0-arm-1.tgz: Added. kde/calligra-2.6.0-arm-1.tgz: Upgraded. kde/dragon-4.10.0-arm-1.tgz: Added. kde/filelight-4.10.0-arm-1.tgz: Upgraded. kde/granatier-4.10.0-arm-1.tgz: Added. kde/gwenview-4.10.0-arm-1.tgz: Upgraded. kde/juk-4.10.0-arm-1.tgz: Added. kde/k3b-2.0.2_20120226.git-arm-1.tgz: Upgraded. kde/kaccessible-4.10.0-arm-1.tgz: Upgraded. kde/kactivities-4.10.0-arm-1.tgz: Upgraded. kde/kajongg-4.10.0-arm-1.tgz: Added. kde/kamera-4.10.0-arm-1.tgz: Upgraded. kde/kapman-4.10.0-arm-1.tgz: Added. kde/kate-4.10.0-arm-1.tgz: Upgraded. kde/katomic-4.10.0-arm-1.tgz: Added. kde/kaudiocreator-1.3-arm-1.tgz: Upgraded. kde/kblackbox-4.10.0-arm-1.tgz: Added. kde/kblocks-4.10.0-arm-1.tgz: Added. kde/kbounce-4.10.0-arm-1.tgz: Added. kde/kbreakout-4.10.0-arm-1.tgz: Added. kde/kcalc-4.10.0-arm-1.tgz: Upgraded. kde/kcharselect-4.10.0-arm-1.tgz: Upgraded. kde/kcolorchooser-4.10.0-arm-1.tgz: Upgraded. kde/kde-base-artwork-4.10.0-arm-1.tgz: Added. kde/kde-baseapps-4.10.0-arm-1.tgz: Upgraded. kde/kde-runtime-4.10.0-arm-1.tgz: Upgraded. kde/kde-wallpapers-4.10.0-noarch-1.tgz: Upgraded. kde/kde-workspace-4.10.0-arm-1.tgz: Upgraded. kde/kdeadmin-4.10.0-arm-1.tgz: Upgraded. kde/kdeartwork-4.10.0-arm-1.tgz: Upgraded. kde/kdegraphics-mobipocket-4.10.0-arm-1.tgz: Upgraded. kde/kdegraphics-strigi-analyzer-4.10.0-arm-1.tgz: Upgraded. kde/kdegraphics-thumbnailers-4.10.0-arm-1.tgz: Upgraded. kde/kdelibs-4.10.0-arm-1.tgz: Upgraded. kde/kdenetwork-4.10.0-arm-1.tgz: Upgraded. kde/kdepim-4.10.0-arm-1.tgz: Upgraded. kde/kdepim-runtime-4.10.0-arm-1.tgz: Upgraded. kde/kdepimlibs-4.10.0-arm-1.tgz: Upgraded. kde/kdeplasma-addons-4.10.0-arm-1.tgz: Upgraded. kde/kdesdk-4.10.0-arm-1.tgz: Upgraded. kde/kdetoys-4.10.0-arm-1.tgz: Upgraded. kde/kdevelop-4.4.1-arm-1.tgz: Upgraded. kde/kdevelop-pg-qt-1.0.0-arm-1.tgz: Upgraded. kde/kdevplatform-1.4.1-arm-1.tgz: Upgraded. kde/kdewebdev-4.10.0-arm-1.tgz: Upgraded. kde/kdf-4.10.0-arm-1.tgz: Upgraded. kde/kdiamond-4.10.0-arm-1.tgz: Added. kde/kfloppy-4.10.0-arm-1.tgz: Upgraded. kde/kfourinline-4.10.0-arm-1.tgz: Added. kde/kgamma-4.10.0-arm-1.tgz: Upgraded. kde/kgoldrunner-4.10.0-arm-1.tgz: Added. kde/kgpg-4.10.0-arm-1.tgz: Upgraded. kde/kigo-4.10.0-arm-1.tgz: Added. kde/killbots-4.10.0-arm-1.tgz: Added. kde/kio-mtp-fae62fc_20121225git-arm-1.tgz: Added. kde/kiriki-4.10.0-arm-1.tgz: Added. kde/kjumpingcube-4.10.0-arm-1.tgz: Added. kde/klickety-4.10.0-arm-1.tgz: Added. kde/klines-4.10.0-arm-1.tgz: Added. kde/kmag-4.10.0-arm-1.tgz: Added. kde/kmahjongg-4.10.0-arm-1.tgz: Added. kde/kmines-4.10.0-arm-1.tgz: Added. kde/kmix-4.10.0-arm-1.tgz: Added. kde/kmousetool-4.10.0-arm-1.tgz: Upgraded. kde/kmouth-4.10.0-arm-1.tgz: Upgraded. kde/knavalbattle-4.10.0-arm-1.tgz: Added. kde/knetwalk-4.10.0-arm-1.tgz: Added. kde/kolf-4.10.0-arm-1.tgz: Added. kde/kollision-4.10.0-arm-1.tgz: Added. kde/kolourpaint-4.10.0-arm-1.tgz: Upgraded. kde/konquest-4.10.0-arm-1.tgz: Added. kde/konsole-4.10.0-arm-1.tgz: Upgraded. kde/korundum-4.10.0-arm-1.tgz: Upgraded. kde/kpat-4.10.0-arm-1.tgz: Added. kde/kplayer-0.7.2-arm-1.tgz: Upgraded. kde/kremotecontrol-4.10.0-arm-1.tgz: Upgraded. kde/kreversi-4.10.0-arm-1.tgz: Added. kde/kross-interpreters-4.10.0-arm-1.tgz: Added. kde/kruler-4.10.0-arm-1.tgz: Upgraded. kde/ksaneplugin-4.10.0-arm-1.tgz: Upgraded. kde/kscreen-0.0.71-arm-1.tgz: Added. kde/kshisen-4.10.0-arm-1.tgz: Added. kde/ksirk-4.10.0-arm-1.tgz: Added. kde/ksnakeduel-4.10.0-arm-1.tgz: Added. kde/ksnapshot-4.10.0-arm-1.tgz: Upgraded. kde/kspaceduel-4.10.0-arm-1.tgz: Added. kde/ksquares-4.10.0-arm-1.tgz: Added. kde/ksudoku-4.10.0-arm-1.tgz: Added. kde/ktimer-4.10.0-arm-1.tgz: Upgraded. kde/ktorrent-4.3.1-arm-1.tgz: Upgraded. kde/ktuberling-4.10.0-arm-1.tgz: Added. kde/kubrick-4.10.0-arm-1.tgz: Added. kde/kwallet-4.10.0-arm-1.tgz: Upgraded. kde/kwebkitpart-1.2.0_20111116git-arm-1.tgz: Upgraded. kde/libkcddb-4.10.0-arm-1.tgz: Added. kde/libkcompactdisc-4.10.0-arm-1.tgz: Added. kde/libkdcraw-4.10.0-arm-1.tgz: Added. kde/libkdegames-4.10.0-arm-1.tgz: Added. kde/libkexiv2-4.10.0-arm-1.tgz: Upgraded. kde/libkipi-4.10.0-arm-1.tgz: Upgraded. kde/libkmahjongg-4.10.0-arm-1.tgz: Added. kde/libksane-4.10.0-arm-1.tgz: Upgraded. kde/libkscreen-0.0.71-arm-1.tgz: Added. kde/libktorrent-1.3.1-arm-1.tgz: Upgraded. kde/lskat-4.10.0-arm-1.tgz: Added. kde/mplayerthumbs-4.10.0-arm-1.tgz: Added. kde/nepomuk-core-4.10.0-arm-1.tgz: Added. kde/nepomuk-widgets-4.10.0-arm-1.tgz: Added. kde/networkmanagement-0.9.0-arm-1.tgz: Upgraded. kde/okular-4.10.0-arm-1.tgz: Upgraded. kde/oxygen-gtk2-1.3.1-arm-1.tgz: Upgraded. kde/oxygen-gtk3-1.1.1-arm-1.tgz: Added. kde/oxygen-icons-4.10.0-arm-1.tgz: Upgraded. kde/palapeli-4.10.0-arm-1.tgz: Added. kde/perlkde-4.10.0-arm-1.tgz: Upgraded. kde/perlqt-4.10.0-arm-1.tgz: Upgraded. kde/picmi-4.10.0-arm-1.tgz: Added. kde/polkit-kde-agent-1-9d74ae3_20120104git-arm-1.tgz: Upgraded. kde/polkit-kde-kcmodules-1-001bdf7_20120111git-arm-1.tgz: Upgraded. kde/print-manager-4.10.0-arm-1.tgz: Added. kde/qtruby-4.10.0-arm-1.tgz: Upgraded. kde/quanta-29a3f8e_20111223git-arm-1.tgz: Upgraded. kde/skanlite-0.9-arm-1.tgz: Upgraded. kde/smokegen-4.10.0-arm-1.tgz: Upgraded. kde/smokekde-4.10.0-arm-1.tgz: Upgraded. kde/smokeqt-4.10.0-arm-1.tgz: Upgraded. kde/superkaramba-4.10.0-arm-1.tgz: Upgraded. kde/svgpart-4.10.0-arm-1.tgz: Upgraded. kde/sweeper-4.10.0-arm-1.tgz: Upgraded. kde/wicd-kde-0.3.0_bcf27d8-arm-1.tgz: Upgraded. kdei/kde-l10n-*-4.10.0-noarch-1.tgz: Upgraded. kdei/calligra-l10n-*-2.6.0-noarch-1.tgz: Upgraded. l/glibc-2.17-arm-1.tgz: Upgraded. glibc now requires a *minimum* running version of Linux kernel 3.4.11. This enables an upgrade from Slackware ARM 14.0. If you do not have at least Linux 3.4.11 running on your system, you should not apply this batch or any further updates from slackwarearm-current until you have upgraded the kernel on your system. l/glibc-i18n-2.17-arm-1.tgz: Upgraded. l/glibc-profile-2.17-arm-1.tgz: Upgraded. l/polkit-0.105-arm-4.tgz: Rebuilt. Reverted a patch that set the members of the wheel group as the authorized administrators. On Slackware, root is the administrator and the wheel group is mostly unused. Thanks to Gérard Monpontet. l/QScintilla-2.6.1-arm-4.tgz: Rebuilt. Recompiled against the new sip to fix API incompatibilities. Thanks to ecoslacker and alienBOB. l/slang-2.2.4-arm-1.tgz: Upgraded. n/slrn-1.0.1-arm-1.tgz: Upgraded. xap/fluxbox-1.3.5-arm-1.tgz: Upgraded. xap/pidgin-2.10.7-arm-1.tgz: Upgraded. This update fixes several security issues: Remote MXit user could specify local file path. MXit buffer overflow reading data from network. Sametime crash with long user IDs. Crash when receiving a UPnP response with abnormally long values. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274 (* Security fix *) isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Wed Feb 13 21:19:08 UTC 2013 a/openssl-solibs-1.0.1e-arm-1.tgz: Upgraded. ap/lm_sensors-3.3.3-arm-1.tgz: Upgraded. l/PyQt-4.9.6-arm-1.tgz: Upgraded. l/akonadi-1.9.0-arm-1.tgz: Upgraded. l/attica-0.4.1-arm-1.tgz: Upgraded. l/boost-1.52.0-arm-1.tgz: Upgraded. l/ebook-tools-0.2.2-arm-1.tgz: Upgraded. l/enchant-1.6.0-arm-1.tgz: Upgraded. l/grantlee-0.3.0-arm-1.tgz: Upgraded. l/liblastfm-1.0.3-arm-1.tgz: Upgraded. l/libmtp-1.1.5-arm-1.tgz: Upgraded. l/libplist-1.8-arm-1.tgz: Upgraded. l/libsamplerate-0.1.8-arm-1.tgz: Upgraded. l/libsndfile-1.0.25-arm-1.tgz: Upgraded. l/libwpd-0.9.6-arm-1.tgz: Upgraded. l/qjson-0.8.1-arm-1.tgz: Added. l/qt-4.8.4-arm-1.tgz: Upgraded. l/shared-desktop-ontologies-0.10.0-arm-1.tgz: Upgraded. l/sip-4.14.2-arm-1.tgz: Upgraded. l/soprano-2.9.0-arm-1.tgz: Upgraded. l/virtuoso-ose-6.1.6-arm-1.tgz: Upgraded. n/curl-7.29.0-arm-2.tgz: Rebuilt. Patched to fix a segfault when closing an unused multi. Thanks to Willy Sudiarto Raharjo. n/openssl-1.0.1e-arm-1.tgz: Upgraded. This release fixes a regression in openssl-1.0.1d, where the fix for CVE-2013-0169 caused data corruption on CPUs with AES-NI support. n/sendmail-8.14.6-arm-1.tgz: Upgraded. n/sendmail-cf-8.14.6-noarch-1.tgz: Upgraded. xap/fluxbox-1.3.4-arm-1.tgz: Upgraded. xap/gimp-2.8.4-arm-1.tgz: Upgraded. +--------------------------+ Sun Feb 10 10:11:49 UTC 2013 a/openssl-solibs-1.0.1d-arm-1.tgz: Upgraded. (* Security fix *) a/slocate-3.1-arm-4.tgz: Rebuilt. Fixed incorrect ownerships and permissions. Thanks to Guan Xin. ap/slackpkg-2.82.0-arm-5.tgz: Rebuilt. Updated the FTP site addresses for Slackware ARM. l/phonon-gstreamer-4.6.3-arm-1.tgz: Upgraded. n/openssl-1.0.1d-arm-1.tgz: Upgraded. Make the decoding of SSLv3, TLS and DTLS CBC records constant time. This addresses the flaw in CBC record processing discovered by Nadhem Alfardan and Kenny Paterson. Details of this attack can be found at: http://www.isg.rhul.ac.uk/tls/ Thanks go to Nadhem Alfardan and Kenny Paterson of the Information Security Group at Royal Holloway, University of London (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and Emilia Käsper for the initial patch. (CVE-2013-0169) [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson] Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode ciphersuites which can be exploited in a denial of service attack. Thanks go to and to Adam Langley for discovering and detecting this bug and to Wolfgang Ettlinger for independently discovering this issue. (CVE-2012-2686) [Adam Langley] Return an error when checking OCSP signatures when key is NULL. This fixes a DoS attack. (CVE-2013-0166) [Steve Henson] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169 (* Security fix *) +--------------------------+ Fri Feb 8 21:36:28 UTC 2013 l/sdl-1.2.15-arm-1.tgz: Upgraded. Upgraded to SDL-1.2.15, SDL_image-1.2.12, SDL_mixer-1.2.12, SDL_net-1.2.8, and SDL_ttf-2.0.11. Patched resizing and mouse clicking bugs. n/curl-7.29.0-arm-1.tgz: Upgraded. When negotiating SASL DIGEST-MD5 authentication, the function Curl_sasl_create_digest_md5_message() uses the data provided from the server without doing the proper length checks and that data is then appended to a local fixed-size buffer on the stack. This vulnerability can be exploited by someone who is in control of a server that a libcurl based program is accessing with POP3, SMTP or IMAP. For applications that accept user provided URLs, it is also thinkable that a malicious user would feed an application with a URL to a server hosting code targeting this flaw. Affected versions: curl 7.26.0 to and including 7.28.1 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249 (* Security fix *) +--------------------------+ Wed Feb 6 20:36:35 UTC 2013 a/kernel-modules-kirkwood-3.7.5_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.7.5_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.7.5_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.7.5-arm-1.tgz: Upgraded. a/kernel_tegra-3.7.5-arm-1.tgz: Upgraded. a/kernel_versatile-3.7.5-arm-1.tgz: Upgraded. a/sharutils-4.13.3-arm-1.tgz: Upgraded. ap/hplip-3.12.11-arm-2.tgz: Rebuilt. Recompiled with --enable-cups-ppd-install. Thanks to guanx. ap/moc-2.5.0_beta1-arm-1.tgz: Upgraded. d/gcc-4.7.2-arm-2.tgz: Rebuilt. d/gcc-g++-4.7.2-arm-2.tgz: Rebuilt. d/gcc-gfortran-4.7.2-arm-2.tgz: Rebuilt. d/gcc-gnat-4.7.2-arm-2.tgz: Rebuilt. d/gcc-java-4.7.2-arm-2.tgz: Rebuilt. d/gcc-objc-4.7.2-arm-2.tgz: Rebuilt. d/llvm-3.2-arm-2.tgz: Rebuilt. Removed dependency on GCC include files, and cleaned up some other paths. Thanks to Heinz Wiesinger. d/make-3.82-arm-4.tgz: Rebuilt. Applied patch containing upstream bugfixes. k/kernel-source-3.7.5-arm-1.tgz: Upgraded. l/taglib-1.8-arm-1.tgz: Upgraded. n/dhcp-4.2.5-arm-1.tgz: Upgraded. n/dhcpcd-5.6.6-arm-1.tgz: Upgraded. n/iproute2-3.6.0-arm-1.tgz: Upgraded. n/iptables-1.4.17-arm-1.tgz: Upgraded. n/nmap-6.25-arm-1.tgz: Upgraded. extra/brandy/brandy-1.20pre5-arm-1.tgz: Added. This is a BBC BASIC interpreter. isolinux/*: Upgraded. kernels/*: Upgraded. +--------------------------+ Fri Jan 25 19:25:38 UTC 2013 a/sysvinit-2.88dsf-arm-3.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. a/udev-182-arm-4.tgz: Rebuilt. The upgrade to the 3.7.1 kernel broke the generation of persistent optical device rules, and existing rules in 70-persistent-cd.rules no longer worked. This update fixes the issue by basing the rules on ID_SERIAL rather than ID_PATH (which is not supported by the new kernel's libata transport class). After upgrading the package, remove /etc/udev/rules.d/70-persistent-cd.rules and reboot the machine. This will create a working rules file and restore the expected symbolic links to optical devices in /dev. a/xfsprogs-3.1.8-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. ap/hplip-3.12.11-arm-1.tgz: Upgraded. ap/ksh93-2012_07_27-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. ap/mysql-5.5.29-arm-1.tgz: Upgraded. Upgraded to the latest upstream version to fix security issues and provide other bug fixes and improvements. Note that some of the changes may possibly introduce incompatibilities with the previous package. (* Security fix *) ap/vim-7.3.645-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. d/perl-5.16.1-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. l/gtk+2-2.24.10-arm-3.tgz: Rebuilt. Added missing /etc/profile.d shell profile scripts. l/librsvg-2.36.1-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. l/ncurses-5.9-arm-3.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. n/bootp-2.4.3-arm-3.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. n/mailx-12.5-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. n/php-5.4.11-arm-1.tgz: Upgraded. tcl/tk-8.5.11-arm-2.tgz: Rebuilt. Fixed broken symlinks. Thanks to Andrew Kroll. xap/gucharmap-3.4.1-arm-2.tgz: Rebuilt. Install the doinst.sh header properly, and use chroot to run update-desktop-database and glib-compile-schemas to insure the package is installed correctly during an initial installation. Thanks to David Gabriel Rodriguez Castillo and Matteo Bernardini. +--------------------------+ Fri Jan 18 19:48:50 UTC 2013 The previous builds were marked as 'arm', but it has surfaced that these and the previous packages only work on machines with a hardware floating point, so the packages have been re-classifed as such. I haven't been able to determine how or what to change in order to get them building for machines without an FPU; may be when time permits I'll look further into it. extra/openjdk/openjdk-7u9_b30-armhfp-2.txz: Rebuilt. This release fixes issues with an improper permission check in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174 (* Security fix *) extra/openjdk/openjre-7u9_b30-armhfp-2.txz: Rebuilt. This release fixes issues with an improper permission check in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174 (* Security fix *) +--------------------------+ Wed Jan 16 19:16:02 UTC 2013 l/freetype-2.4.11-arm-1.tgz: Upgraded. This release fixes several security bugs that could cause freetype to crash or run programs upon opening a specially crafted file. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670 (* Security fix *) +--------------------------+ Sun Jan 13 16:06:46 UTC 2013 I have built the latest Mozilla packages for -current only, and placed them out of the main tree here: ftp://ftp.arm.slackware.com/slackwarearm/unsupported/slackwarearm-current/packages These are built for minimum target of 'armv6j'. I can only build these because my '-current' build host is an ARMv7 machine with a hardware FPU. The build hosts for the stable releases of Slackware ARM are ARMv5 machines, upon which these packages cannot be built, thus cannot be maintained. Therefore, I will maintain the Mozilla packages *only* for users who follow -current closely, but will no longer provide any new Mozilla packages for any stable releases (apart from 13.37 which uses Firefox v3). The reason for moving the new versions of the packages out of the main tree is because anything in -current ordinarily implies that it will be present in the next stable release, which of course cannot happen if they can't be built on the hardware used to maintain stable releases. +--------------------------+ Sat Jan 12 18:06:46 UTC 2013 Please note that the Mozilla suite of packages ('FireFox', 'Thunderbird' and 'Seamonkey') have been removed from Slackware ARM in this batch of updates. This is due to these applications not supporting the ARMv5 platform. I cannot build versions greater than 17.x, so I have removed them. I've considered the ESR versions of Firefox but these just postpone the inevitable removal, since at a later point in time, we'd still be trying to build a newer release of an app that does not compile. The previous packages will remain in 'pasture', but be aware that they are now not considered 'secure'. d/binutils-2.23.51.0.6-arm-2.tgz: Rebuilt. Removed "/usr/bin/windres". This was causing some builds to fail, as on ARM it fails with "cannot detect architecture". Thanks to Richard Lapointe. d/cmake-2.8.10.2-arm-1.tgz: Upgraded. d/llvm-3.2-arm-1.tgz: Upgraded. l/seamonkey-solibs-2.14.1-armhfp-2.tgz: Removed. Moved to /pasture. Nothing in Slackware ARM relies upon this library ('mozilla-nss' is used), so this is a safe removal. If you had a 3rd party/your own packages linking against the libraries in this package, you could rebuild it against 'l/mozilla-nss'. n/php-5.4.7-arm-2.tgz: Rebuilt. Corrected the permissions on /var/lib/php (chmod 770). Thanks to Hans de Bruin. xap/mozilla-firefox-17.0.1-armhfp-2.tgz: Removed. Moved to /pasture. xap/mozilla-thunderbird-17.0-armhfp-3.tgz: Removed. Moved to /pasture. xap/seamonkey-2.14.1-armhfp-2.tgz: Removed. Moved to /pasture. extra/autoconf213/autoconf-2.13-noarch-2.tgz: Rebuilt. Added versioned symlinks as some apps search for them explicitly. pasture/mozilla-firefox-17.0.1-armhfp-2.tgz: Moved to /pasture. pasture/mozilla-thunderbird-17.0-armhfp-3.tgz: Moved to /pasture. pasture/seamonkey-2.14.1-armhfp-2.tgz: Moved to /pasture. pasture/seamonkey-solibs-2.14.1-armhfp-2.tgz: Moved to /pasture. +--------------------------+ Tue Jan 1 01:20:13 UTC 2013 Toolchain and Kernel updates! This is the first time I've provided Kernels with support for the Flattened Device Tree ('FTD'). I've shipped each Kernel package with all of the '.dtb' files for the corresponding architecture - you'll find them in '/boot/dtb'. The Kernels also _support_ having a DTB appended to the Kernel zImage in case your version of U-Boot does not support FDT. If this is the case, please read '/kernels/README.TXT' -- but note that none of the Kernels actually have any DTB appended. I've been running the 3.7.1 Kernels for just over two weeks here on the Tegra20 and Kirkwood platforms, and they've proven to be stable. Unfortunately I've not been able to get the 'versatile' Kernel in a good state due to a problem with the 'SYM53C8XX' SCSI driver (see below). If anyone can help fix that, please let me know and send the fix upstream too. Make sure you read and fully understand the notes for the 'Tegra/Trimslice' kernels, otherwise you might get grumpy! ;-) Happy new year! Stuart. /INSTALL_TEGRA.TXT: Updated. Updated boot configuration settings to use DTB (Device Tree Blob) files. You will need to upgrade the version of 'U-Boot' on your Trimslice in order to boot the latest kernel provided in this batch. I suggest first upgrading the kernel, then rebooting into the U-Boot command prompt; upgrading the U-Boot firmware, reconfiguring then rebooting into the new kernel. See the first section of this document for more details. a/kernel-firmware-20121228git-noarch-1.tgz: Upgraded. a/kernel-modules-kirkwood-3.7.1_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.7.1_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.7.1_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.7.1-arm-1.tgz: Upgraded. Tested on booting on: OpenRD Client "U-Boot 1.1.4 (Oct 27 2009 - 21:57:24) Marvell version: 3.4.19" SheevaPlug Development Kit: "U-Boot 1.1.4 (Dec 27 2009 - 22:03:21) Marvell version: 3.4.27" I would assume that since these old versions of U-Boot support booting this new kernel, any newer versions of U-Boot will also work correctly. For this Kirkwood kernel upgrade, you should be safe to just upgrade the kernel and reboot. a/kernel_tegra-3.7.1-arm-1.tgz: Upgraded. Once you have updated your U-Boot configuration (see above) you need to update U-Boot config - refer to section 5.0 ("Booting the Slackware ARM OS") in the '/INSTALL_TEGRA.TXT' document. You will need to ensure you're familiar with your existing partitioning scheme and adjust the settings accordingly, as you would have originally when you installed Slackware on to your TrimSlice. If you followed the partitioning scheme as described in the documents, you can safely paste in the lines exactly as in the revised version of the same document, save, and reboot. Important note: You MUST remove all instances of memory configuration values from your U-Boot settings. The Tegra install document (above) contains values such as: mem=384M@0M mem=512M@512M nvmem=128M@384M vmalloc=248M video=tegrafb If you have any of those settings in your U-Boot configuration, they will prevent the kernel from booting. Use the U-Boot 'printenv' command to view your current settings, and 'setenv' to adjust the variables to remove any instances of the above, then 'save;reset' to conclude the changes. Whilst it's certainly not ideal to lose half of your useable RAM, it is currently the only option until the Trimslice developers provide a new U-Boot. a/kernel_versatile-3.7.1-arm-1.tgz: Upgraded. Tested with QEMU-1.3.0. The SCSI driver ('SYM53C8XX') is broken in this release, so this kernel is of limited value. I tried compiling it as a module and into the kernel, but it fails: [ 127.124417] sym0: SCSI BUS has been reset. [ 132.117466] scsi 0:0:2:0: HOST RESET operation timed-out. [ 132.117640] scsi 0:0:2:0: Device offlined - not ready after error recovery [ 153.157485] scsi 0:0:3:0: ABORT operation started Please do let me know if you know how to fix it! Other than this particular issue with this driver, the kernel seems reliable. ap/slackpkg-2.82.0-arm-4.tgz: Rebuilt. Added the up to date mirror list from http://www.armedslack.org/getslack/ d/binutils-2.23.51.0.6-arm-1.tgz: Upgraded. d/device-tree-compiler-1.3.0-arm-1.tgz: Added. This tool is for working with Flattened Device Tree (FTD) and Device Tree Source (DTS). For more information on Device Trees, see: http://elinux.org/Device_Trees http://www.devicetree.org http://www.informit.com/articles/article.aspx?p=1647051&seqNum=5 http://elinux.org/images/4/48//Experiences_With_Device_Tree_Support_Development_For_ARM-Based_SOC's.pdf You need this to be installed in order to build the 'DTB' files that are now shipped with the Slackware ARM kernels. d/gcc-4.7.2-arm-1.tgz: Upgraded. d/gcc-g++-4.7.2-arm-1.tgz: Upgraded. d/gcc-gfortran-4.7.2-arm-1.tgz: Upgraded. d/gcc-gnat-4.7.2-arm-1.tgz: Upgraded. d/gcc-java-4.7.2-arm-1.tgz: Upgraded. d/gcc-objc-4.7.2-arm-1.tgz: Upgraded. d/kernel-headers-3.7.1-arm-1.tgz: Upgraded. d/oprofile-0.9.7-arm-3.tgz: Rebuilt. k/kernel-source-3.7.1-arm-1.tgz: Upgraded. l/seamonkey-solibs-2.14.1-armhfp-2.tgz: Rebuilt. xap/mozilla-firefox-17.0.1-armhfp-2.tgz: Rebuilt. xap/mozilla-thunderbird-17.0-armhfp-3.tgz: Rebuilt. xap/seamonkey-2.14.1-armhfp-2.tgz: Rebuilt. I had previously built these packages with optimisations for the ARMv6 CPU. However, I have now reverted the optimisations to 'armv5t'. This is due to Slackware ARM stable releases being maintained on ARMv5 hardware. The packages are still named 'hfp' since in order to run the packages, you still need a hardware floating point unit (although they can still be _compiled_ on systems without an FPU). extra/kpartx/kpartx-0.4.9+git0.4dfdaf2b.6-arm-1.tgz: Added. kpartx is part of the Linux 'multipath-tools' package. It's particularly useful for creating device mappings to the partitions within disk 'image' files. You can then loopback mount the newly created device mappings to access the contents. isolinux/*: Rebuilt. You may notice that the size of the installer images has decreased. This is because I have removed the unnecessary firmware from /lib/firmware. All of it was for network interface cards that do not exist on the supported platforms, and just wastes RAM when the installer is running. kernels/README.TXT: Updated. Added a section describing how to extract the 'zImage' from the U-Boot 'uImage' files, and how to append a DTB (Device Tree Blob) to the zImage. You may need to do this if your U-Boot does not support loading DTBs directly and cannot be upgraded. kernels/*/dtb/*: Added. Added the 'DTB' files for each supported architecture. The DTB files are generated from the 'linux-x.x/arch/arm/boot/dts' directory within the Linux kernel source, and are refreshed every time a kernel package is built. +--------------------------+ Tue Dec 11 18:34:24 UTC 2012 /INSTALL_KIRKWOOD.TXT: Amended. /INSTALL_QEMU.TXT: Amended. /INSTALL_TEGRA.TXT: Amended. Added instructions for a local HTTP installation option. Thanks to dlachausse on linuxquestions.org. Adjusted the parameter names used to control the delay before attempting to mount the root file system, and the root file system type. You do not need to adjust your u-boot settings, as the original parameters continue to be supported by the initrd. Thanks to Thorsten Mühlfelder and Richard Lapointe for the suggestion. a/kernel-modules-kirkwood-3.4.23_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.4.23_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.4.23_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.4.23-arm-1.tgz: Upgraded. a/kernel_tegra-3.4.23-arm-1.tgz: Upgraded. a/kernel_versatile-3.4.23-arm-1.tgz: Upgraded. a/mkinitrd-1.4.7-arm-3.tgz: Rebuilt. Added support for the parameter names that control the delay before attempting to mount the root filesystem, and the root file system type: 'rootdelay' and 'rootfstype' respectively. These are the official/documented parameters in the Kernel documentation. The original parameters ('rootfs' and 'waitforroot') may still be used. Thanks to Thorsten Mühlfelder and Richard Lapointe for the suggestion. Unless specified when the initrd is built, or at boot time as a kernel parameter, wait a minimum of four seconds for the root device to become ready. Thanks to Jirtme Pinot for the suggestion and the patch. k/kernel-source-3.4.23-arm-1.tgz: Upgraded. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Fri Dec 7 19:56:05 UTC 2012 ap/sqlite-3.7.14.1-arm-1.tgz: Upgraded. This is a bugfix release. d/ruby-1.9.3_p327-arm-1.tgz: Upgraded. This release fixes a hash-flooding DoS vulnerability and many other bugs. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371 (* Security fix *) l/libssh-0.5.3-arm-1.tgz: Upgraded. This release fixes several security bugs. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562 (* Security fix *) l/libxml2-2.8.0-arm-2.tgz: Rebuilt. Patched a heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier that could allow a remote attacker to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134 (* Security fix *) n/bind-9.9.2_P1-arm-1.tgz: Upgraded. This release addresses some denial-of-service and other bugs. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868 https://kb.isc.org/article/AA-00829 (* Security fix *) +--------------------------+ Wed Dec 5 19:54:22 UTC 2012 a/kernel-modules-kirkwood-3.4.21_kirkwood-arm-1.tgz: Upgraded. a/kernel-modules-tegra-3.4.21_tegra-arm-1.tgz: Upgraded. a/kernel-modules-versatile-3.4.21_versatile-arm-1.tgz: Upgraded. a/kernel_kirkwood-3.4.21-arm-1.tgz: Upgraded. a/kernel_tegra-3.4.21-arm-1.tgz: Upgraded. a/kernel_versatile-3.4.21-arm-1.tgz: Upgraded. k/kernel-source-3.4.21-arm-1.tgz: Upgraded. l/seamonkey-solibs-2.14.1-armhfp-1.tgz: Upgraded. a/mtd-utils-051212-arm-1.tgz: Upgraded. xap/mozilla-firefox-17.0.1-armv6j-1.tgz: Upgraded. This is a bugfix release. xap/seamonkey-2.14.1-armhfp-1.tgz: Upgraded. This is a bugfix release. isolinux/*: Rebuilt. kernels/*: Upgraded. +--------------------------+ Wed Nov 28 20:07:10 UTC 2012 a/glibc-solibs-2.15-arm-9.tgz: Rebuilt. a/glibc-zoneinfo-2012f_2012f-noarch-9.tgz: Rebuilt. l/glibc-2.15-arm-9.tgz: Rebuilt. l/glibc-i18n-2.15-arm-9.tgz: Rebuilt. l/glibc-profile-2.15-arm-9.tgz: Rebuilt. xap/mozilla-firefox-17.0-armv6j-2.tgz: Rebuilt. Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and gain any speed optimisations. Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built with these optimisations. xap/mozilla-thunderbird-17.0-armv6j-2.tgz: Rebuilt. Since the Mozilla suite no longer supports ARMv5, I've rebuilt the packages with optimisations for armv6j (the CPU that the Raspberry Pi uses) to try and gain any speed optimisations. Slackware ARM 14.0 will have the next set of Mozilla 'patch' packages built with these optimisations. +--------------------------+ Fri Nov 23 18:03:14 UTC 2012 l/seamonkey-solibs-2.14-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html (* Security fix *) xap/mozilla-firefox-17.0-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/firefox.html (* Security fix *) xap/mozilla-thunderbird-17.0-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html (* Security fix *) xap/seamonkey-2.14-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html (* Security fix *) +--------------------------+ Fri Nov 9 18:13:47 UTC 2012 I've added OpenJDK (Java Development Kit) and OpenJRE (Java Runtime Environment) packages. Thanks to Eric Hameleers. a/kernel-firmware-20121030git-noarch-1.tgz: Upgraded. Rather than take the firmware blobs from the kernel source tree, we now re-package the firmware package from Slackware x86, which takes its firmware from a different repository that includes additional firmware blobs. Thanks to Frank Donkers. l/lcms2-2.4-arm-1.tgz: Upgraded. l/seamonkey-solibs-2.13.2-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html (* Security fix *) n/bind-9.9.2-arm-1.tgz: Upgraded. Fixes these security issues: A certain combination of records in the RBT could cause named to hang while populating the additional section of a response. [RT #31090] Named could die on specially crafted record. [RT #30416] (* Security fix *) n/iptables-1.4.14-arm-2.tgz: Rebuilt. Patched to fix a compiler related bug in iptables-restore. Thanks to linuxxer for the report and David Somero for a link to the patch. n/pssh-2.3.1-arm-2.tgz: Rebuilt. Correctly place docs into /usr/doc rather than /doc Thanks to Jirtme Pinot. n/rp-pppoe-3.11-arm-1.tgz: Upgraded. xap/mozilla-firefox-16.0.2-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/firefox.html (* Security fix *) xap/mozilla-thunderbird-16.0.2-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html (* Security fix *) xap/seamonkey-2.13.2-armhfp-1.tgz: Upgraded. This release contains security fixes and improvements. For more information, see: http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html (* Security fix *) extra/openjdk/openjdk-7u9_b30-arm-1.txz: Added. The Java Development Kit. If you want to develop in Java, this package plus 'rhino' (below) will suit your needs. extra/openjdk/openjre-7u9_b30-arm-1.txz: Added. The Java Runtime Environment. Unless you're developing Java code, this package will plus 'rhino' (below) suffice to run Java binaries. extra/openjdk/icedtea-web-20120225-arm-1.txz: Added. This is a web browser plugin to enable the execution of Java Applets. extra/openjdk/rhino-1_7R3-noarch-1.txz: Added. This is a run-time dependency for OpenJDK/OpenJRE. extra/tightvnc/tightvnc-1.3.10-arm-4.tgz: Rebuilt. Added missing 'Xvnc'. Thanks to Frank Boehm for the report and bug fix. +--------------------------+ Thu Oct 4 19:43:34 UTC 2012 /INSTALL_KIRKWOOD.TXT: Amended. Minor adjustments in the U-Boot configuration parameters to assume that the 'Plug' devices are running the upstream 'DENX' U-Boot rather than the older releases from 'Marvell'. The Marvell versions of U-Boot (and even some older versions of the upstream releases) are not so robust in some situations, so it makes sense (particularly for new Slackware ARM users) to upgrade their U-Boot to a known-good release. If you are using a GuruPlug, or SheevaPlug eSATA you are recommended to upgrade U-Boot if it's older than the recommended version. This is due to a bug in older U-Boot releases that may cause trouble booting newer Linux kernels such as the version in Slackware ARM 14.0. However, if you are happy with the version of U-Boot on your plugs, there's no need to upgrade U-Boot: if you're going to reformat and reinstall with the same disk partitioning scheme, you can boot the Slackware installer and reinstall without changing any U-Boot configuration. If you've already installed Slackware 14.0 on your system and it's working, you won't need to upgrade U-Boot unless you are having some intermittent problems and would like to see whether these are fixed by the new version. Martin Michlmayr from Debian has always maintained a page with the stable release of U-Boot for the Plugs, so it makes sense to me be refer to his work in this area. For details about upgrading U-Boot on your Plug, see http://www.armedslack.org/maint_kirkwooduboot/ Thanks to Michael Langfinger for the suggestion. a/openssl-solibs-1.0.1c-arm-3.tgz: Rebuilt. n/openssl-1.0.1c-arm-3.tgz: Rebuilt. Rebuilt to use ARM assembler optimisations which provides impressive performance increases. For more details see http://www.raspberrypi.org/phpBB3/viewtopic.php?f=66&t=8433 Thanks to Michael Langfinger for the suggestion. pasture/*: Removed. If you want anything that was in here, it can be found in the 14.0 release. +--------------------------+ Wed Sep 26 07:50:13 UTC 2012 Slackware 14.0 ARM stable is released! We're perfectionists here at Slackware, so this release has been a long time a-brewing. But we think you'll agree that it was worth the wait. Slackware 14.0 combines modern components, ease of use, and flexible configuration... our "KISS" philosophy demands it. Once you find yourself enjoying using the ARM port of Slackware, please take a few moments to show your appreciation by sponsoring through Paypal. Please visit the URL below to learn more: http://www.armedslack.org/sponsor/ Thanks to those who have already made donations! Thanks to everyone who helped make this happen. The Slackware team, the upstream developers, and (of course) the awesome Slackware user community. Have fun! :-) +--------------------------+ [..]