Slackwarearm-14.2 ChangeLog (2014-07-15)

Tue Jul 15 19:22:14 UTC 2014

/INSTALL_KIRKWOOD.TXT: Updated.
Updated to include new settings and instructions for using Flattened Device Tree
with the Kirkwood devices.
  • a/aaa_base-14.1-arm-2.txz
    Added a README to explain what the Kernel image files are for.
  • ap/linuxdoc-tools-0.9.69-arm-2.txz
    Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl
  • ap/man-1.6g-arm-3.txz
    Moved config file to /etc.
  • ap/slackpkg-2.82.0-noarch-13.txz
    Patched to support $ROOT and $CONF environment variables.
    Thanks to Matteo Bernardini.
  • l/ncurses-5.9-arm-5.txz
    Applied upstream patch ncurses-5.9-20140308-patch.sh.
    Thanks to comet.berkeley.
  • n/yptools-2.14-arm-3.txz
    Corrected yppasswd patch that was causing password changes to fail.
    Thanks to Henrik Carlqvist.
  • isolinux/*
  • a/bash-4.3.018-arm-1.txz
  • a/kernel-firmware-20140712git-noarch-1.txz
  • a/kernel-modules-armv7-3.15.5_armv7-arm-1.txz
  • a/kernel-modules-kirkwood-3.15.5_kirkwood-arm-1.txz
  • a/kernel_armv7-3.15.5-arm-1.txz
  • a/kernel_kirkwood-3.15.5-arm-1.txz
    For all Kirkwood-based systems *not* on the list below ('Systems that do not
    require Flattened Device Tree'), prior to upgrading to this Kernel package,
    you must update your U-Boot settings to supply the Kernel post installation
    script with the Kernel package your system is using, and the DTB (Device Tree
    Blob) file required to supply the system layout information.

    Reboot into the U-Boot console and paste the following into the U-Boot prompt:
    If you have customised your U-Boot settings from the suggested settings in
    'INSTALL_KIRKWOOD.TXT', you'll need to take care and update those settings
    manually.

    Marvell» setenv machid ffffffff
    Marvell» setenv SLKKERNEL slkkernel=kirkwood
    Marvell» setenv bootcmd 'setenv bootargs $(SLKKERNEL) $(DTB) $(bootargs_console) $(bootargs_root) ; run bootcmd_slk ; reset'

    For each device, you need to set the appropriate DTB file configuration:

    For the original SheevaPlug:

    Marvell» setenv DTB dtb=kirkwood-sheevaplug.dtb

    For the eSATA SheevaPlug:

    Marvell» setenv DTB dtb=kirkwood-sheevaplug-esata.dtb

    For the GuruPlug:

    Marvell» setenv DTB dtb=kirkwood-guruplug-server-plus.dtb

    For _other_ Kirkwood-based systems not listed above, _and_ not in the list
    below:

    Find the appropriate DTB from the directory list here and configure U-Boot
    using the 'setenv DTB dtb=<dtb file name>' as detailed above.

    ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-current/kernels/kirkwood/dtb/

    Systems that do not require Flattened Device Tree with Linux 3.15.
    `````````````````````````````````````````````````````````````````
    The following list of systems do not require FDT, and as such no changes to
    U-Boot need to be made. If you have any of the machines listed below, you can
    safely upgradepkg to this Kernel package immediately.
    LaCie d2 Network v2 NAS Board
    LaCie 2Big Network v2 NAS Board
    LaCie 5Big Network v2 NAS Board
    Marvell OpenRD Base Board
    Marvell OpenRD Client Board
    Marvell OpenRD Ultimate Board
    Marvell RD-88F6192-NAS Reference Board
    Marvell RD-88F6281 Reference Board
    HP t5325 Thin Client
    QNAP TS-110, TS-119, TS-119P+, TS-210, TS-219, TS-219P and TS-219P+ Turbo NAS
    QNAP TS-410, TS-410U, TS-419P, TS-419P+ and TS-419U Turbo NAS
  • a/shadow-4.2.1-arm-1.txz
    This adds support for subuid and subgid needed for unprivileged containers.
    Thanks to Christoph Willing.
  • a/u-boot-tools-2014.07_rc4-arm-1.txz
  • ap/lxc-1.0.3-arm-1.txz
    This adds a template for for lxc-create to create a minimal Slackware
    container using slackpkg. For example, this will create a container
    named “current”:
    lxc-create -n current -t slackware
    There's an rc.lxc init script added to autorun/autostop containers, but it's
    not currently hooked in to the main init scripts, so if you want to use it
    you'll need to add it to your rc.local and rc.local_shutdown (and make it
    executable). The script will look for “lxc.start.auto = 1” in the container
    config file to determine if a container should be autostarted (1) or not (0).
    Thanks to Matteo Bernardini.
  • ap/lzip-1.15-arm-1.txz
  • ap/man-pages-3.69-noarch-1.txz
  • ap/nano-2.3.5-arm-1.txz
  • d/gnu-cobol-1.1-arm-1.txz
  • d/kernel-headers-3.15.5-arm-1.txz
  • k/kernel-source-3.15.5-arm-1.txz
  • l/taglib-1.9.1-arm-1.txz
    Linked with -lstdc++. Thanks to comet.berkeley.
  • n/bind-9.9.5_P1-arm-1.txz
    This fixes security issues and other bugs. Please note that the first
    CVE only affects Windows, and the second one was claimed to be fixed by
    an earlier version of BIND. But we'll update anyway just in case. :-)
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
    (* Security fix *)
  • n/gnupg-1.4.17-arm-1.txz
    This release includes a security fix to stop a denial of service using
    garbled compressed data packets which can be used to put gpg into an
    infinite loop.
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
    (* Security fix *)
  • n/gnupg2-2.0.24-arm-1.txz
    This release includes a security fix to stop a denial of service using
    garbled compressed data packets which can be used to put gpg into an
    infinite loop.
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
    (* Security fix *)
  • n/samba-4.1.9-arm-1.txz
    This update fixes bugs and security issues, including a flaw in Samba's
    internal DNS server which can be exploited to cause a denial of service,
    a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
    configurations that use shadow_copy* for vfs objects to reveal potentially
    private server information, a denial of service on the nmbd NetBIOS name
    services daemon, and a denial of service crash involving overwriting
    memory on an authenticated connection to the smbd file server.
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
    (* Security fix *)
  • xap/xscreensaver-5.29-arm-1.txz
  • kernels/*
  • ap/cgmanager-20140710_986cd44-arm-1.txz
    Thanks to Matteo Bernardini.
  • l/libnih-1.0.3-arm-1.txz
    Thanks to Matteo Bernardini.
  • d/open-cobol-1.1-arm-2.tgz
    This project has been renamed GNU Cobol.
  • news/2014/07/15/slackwarearm-14.2-changelog.txt
  • Last modified: 4 years ago
  • by Giuseppe Di Terlizzi