Slackwarearm-14.2 ChangeLog (2014-07-15)
Tue Jul 15 19:22:14 UTC 2014
/INSTALL_KIRKWOOD.TXT: Updated.
Updated to include new settings and instructions for using Flattened Device Tree
with the Kirkwood devices.
Packages
Rebuilt
- a/aaa_base-14.1-arm-2.txz
Added a README to explain what the Kernel image files are for. - ap/linuxdoc-tools-0.9.69-arm-2.txz
Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl - ap/man-1.6g-arm-3.txz
Moved config file to /etc. - ap/slackpkg-2.82.0-noarch-13.txz
Patched to support $ROOT and $CONF environment variables.
Thanks to Matteo Bernardini. - l/ncurses-5.9-arm-5.txz
Applied upstream patch ncurses-5.9-20140308-patch.sh.
Thanks to comet.berkeley. - n/yptools-2.14-arm-3.txz
Corrected yppasswd patch that was causing password changes to fail.
Thanks to Henrik Carlqvist. - isolinux/*
Upgraded
- a/bash-4.3.018-arm-1.txz
- a/kernel-firmware-20140712git-noarch-1.txz
- a/kernel-modules-armv7-3.15.5_armv7-arm-1.txz
- a/kernel-modules-kirkwood-3.15.5_kirkwood-arm-1.txz
- a/kernel_armv7-3.15.5-arm-1.txz
- a/kernel_kirkwood-3.15.5-arm-1.txz
For all Kirkwood-based systems *not* on the list below ('Systems that do not
require Flattened Device Tree'), prior to upgrading to this Kernel package,
you must update your U-Boot settings to supply the Kernel post installation
script with the Kernel package your system is using, and the DTB (Device Tree
Blob) file required to supply the system layout information.
Reboot into the U-Boot console and paste the following into the U-Boot prompt:
If you have customised your U-Boot settings from the suggested settings in
'INSTALL_KIRKWOOD.TXT', you'll need to take care and update those settings
manually.
Marvell» setenv machid ffffffff
Marvell» setenv SLKKERNEL slkkernel=kirkwood
Marvell» setenv bootcmd 'setenv bootargs $(SLKKERNEL) $(DTB) $(bootargs_console) $(bootargs_root) ; run bootcmd_slk ; reset'
For each device, you need to set the appropriate DTB file configuration:
For the original SheevaPlug:
Marvell» setenv DTB dtb=kirkwood-sheevaplug.dtb
For the eSATA SheevaPlug:
Marvell» setenv DTB dtb=kirkwood-sheevaplug-esata.dtb
For the GuruPlug:
Marvell» setenv DTB dtb=kirkwood-guruplug-server-plus.dtb
For _other_ Kirkwood-based systems not listed above, _and_ not in the list
below:
Find the appropriate DTB from the directory list here and configure U-Boot
using the 'setenv DTB dtb=<dtb file name>' as detailed above.
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-current/kernels/kirkwood/dtb/
Systems that do not require Flattened Device Tree with Linux 3.15.
`````````````````````````````````````````````````````````````````
The following list of systems do not require FDT, and as such no changes to
U-Boot need to be made. If you have any of the machines listed below, you can
safely upgradepkg to this Kernel package immediately.
LaCie d2 Network v2 NAS Board
LaCie 2Big Network v2 NAS Board
LaCie 5Big Network v2 NAS Board
Marvell OpenRD Base Board
Marvell OpenRD Client Board
Marvell OpenRD Ultimate Board
Marvell RD-88F6192-NAS Reference Board
Marvell RD-88F6281 Reference Board
HP t5325 Thin Client
QNAP TS-110, TS-119, TS-119P+, TS-210, TS-219, TS-219P and TS-219P+ Turbo NAS
QNAP TS-410, TS-410U, TS-419P, TS-419P+ and TS-419U Turbo NAS - a/shadow-4.2.1-arm-1.txz
This adds support for subuid and subgid needed for unprivileged containers.
Thanks to Christoph Willing. - a/u-boot-tools-2014.07_rc4-arm-1.txz
- ap/lxc-1.0.3-arm-1.txz
This adds a template for for lxc-create to create a minimal Slackware
container using slackpkg. For example, this will create a container
named “current”:
lxc-create -n current -t slackware
There's an rc.lxc init script added to autorun/autostop containers, but it's
not currently hooked in to the main init scripts, so if you want to use it
you'll need to add it to your rc.local and rc.local_shutdown (and make it
executable). The script will look for “lxc.start.auto = 1” in the container
config file to determine if a container should be autostarted (1) or not (0).
Thanks to Matteo Bernardini. - ap/lzip-1.15-arm-1.txz
- ap/man-pages-3.69-noarch-1.txz
- ap/nano-2.3.5-arm-1.txz
- d/gnu-cobol-1.1-arm-1.txz
- d/kernel-headers-3.15.5-arm-1.txz
- k/kernel-source-3.15.5-arm-1.txz
- l/taglib-1.9.1-arm-1.txz
Linked with -lstdc++. Thanks to comet.berkeley. - n/bind-9.9.5_P1-arm-1.txz
This fixes security issues and other bugs. Please note that the first
CVE only affects Windows, and the second one was claimed to be fixed by
an earlier version of BIND. But we'll update anyway just in case.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
(* Security fix *) - n/gnupg-1.4.17-arm-1.txz
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *) - n/gnupg2-2.0.24-arm-1.txz
This release includes a security fix to stop a denial of service using
garbled compressed data packets which can be used to put gpg into an
infinite loop.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
(* Security fix *) - n/php-5.4.30-arm-1.txz
This update fixes bugs and security issues.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
(* Security fix *) - n/samba-4.1.9-arm-1.txz
This update fixes bugs and security issues, including a flaw in Samba's
internal DNS server which can be exploited to cause a denial of service,
a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
configurations that use shadow_copy* for vfs objects to reveal potentially
private server information, a denial of service on the nmbd NetBIOS name
services daemon, and a denial of service crash involving overwriting
memory on an authenticated connection to the smbd file server.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
(* Security fix *) - xap/xscreensaver-5.29-arm-1.txz
- kernels/*
Added
- ap/cgmanager-20140710_986cd44-arm-1.txz
Thanks to Matteo Bernardini. - l/libnih-1.0.3-arm-1.txz
Thanks to Matteo Bernardini.
Removed
d/open-cobol-1.1-arm-2.tgz
This project has been renamed GNU Cobol.