Slackwarearm-current ChangeLog (2016-04-21)
Thu Apr 21 03:04:05 UTC 2016
This is Slackware ARM v14.2, release candidate #2.
Packages
Rebuilt
- a/aaa_elflibs-14.2-arm-9.txz
Added libtdb.so.1.3.8. - a/coreutils-8.25-arm-2.txz
Reverted new default ls quoting. - a/glibc-solibs-2.23-arm-3.txz
- d/perl-5.22.1-arm-2.txz
Patched security issue “loss of taint in canonpath()”. Thanks to ttk.
Patched to recognize gcc 5.x to allow using -D_FORTIFY_SOURCE=2.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607
(* Security fix *) - l/alsa-lib-1.1.1-arm-2.txz
Applied upstream patch to fix error EBADFD. Thanks to e5150. - l/glibc-2.23-arm-3.txz
Built against Linux 4.4.8 Kernel headers. - l/glibc-i18n-2.23-arm-3.txz
- l/glibc-profile-2.23-arm-3.txz
- l/qca-2.1.1-arm-2.txz
Install crypto.prf in the correct directory. Thanks to David Spencer. - n/bluez-5.39-arm-2.txz
In rc.bluetooth, don't attempt to start/stop rfcomm. Thanks to e5150. - n/nfs-utils-1.3.3-arm-3.txz
Fix nfsd startup on kernels without IPv6 support. Thanks to Mario Preksavec. - n/vsftpd-3.0.3-arm-2.txz
In /etc/vsftpd.conf.new, set seccomp_sandbox=NO to work around bugs. - x/xorg-server-1.18.3-arm-2.txz
Applied a patch from https://bugs.freedesktop.org/show_bug.cgi?id=49950
to fix applying keyboard layout settings when using a keyboard/mouse combo
device such as a Logitech wireless keyboard with the unifying receiver.
Thanks to Jean-Philippe Guillemin. - x/xorg-server-xephyr-1.18.3-arm-2.txz
- x/xorg-server-xnest-1.18.3-arm-2.txz
- x/xorg-server-xvfb-1.18.3-arm-2.txz
- isolinux/*
Upgraded
- a/glibc-zoneinfo-2016d-arm-1.txz
- a/kernel-modules-armv5-4.4.8_armv5-arm-1.txz
- a/kernel-modules-armv7-4.4.8_armv7-arm-1.txz
- a/kernel_armv5-4.4.8-arm-1.txz
- a/kernel_armv7-4.4.8-arm-1.txz
- a/lvm2-2.02.150-arm-1.txz
- ap/sqlite-3120100-arm-1.txz
- ap/tmux-2.2-arm-1.txz
- ap/vim-7.4.1752-arm-1.txz
- d/cmake-3.5.2-arm-1.txz
- d/kernel-headers-4.4.8-arm-1.txz
- k/kernel-source-4.4.8-arm-1.txz
- l/QScintilla-2.9.1-arm-1.txz
- l/glibmm-2.46.4-arm-1.txz
- l/gst-plugins-base-1.6.4-arm-1.txz
- l/gst-plugins-good-1.6.4-arm-1.txz
- l/gstreamer-1.6.4-arm-1.txz
- l/gtkmm3-3.18.1-arm-1.txz
- l/harfbuzz-1.2.6-arm-1.txz
- l/libpng-1.6.21-arm-1.txz
- l/libtasn1-4.8-arm-1.txz
- l/sip-4.17-arm-1.txz
- n/ca-certificates-20160104-arm-1.txz
Thanks to Cal Peake for fixing a build script typo that created duplicate
certificates with each successive build. - n/epic5-2.0-arm-1.txz
- n/gnutls-3.4.11-arm-1.txz
- n/httpd-2.4.20-arm-1.txz
- n/libgcrypt-1.7.0-arm-1.txz
- n/nmap-7.12-arm-1.txz
- n/proftpd-1.3.5b-arm-1.txz
Compiled with –enable-dso. Thanks to David M. Syzdek.
Compiled with –enable-nls. Thanks to Olek. - n/samba-4.4.2-arm-1.txz
This update fixes the security issues known as “badlock” (or “sadlock”),
which may allow man-in-the-middle or denial-of-service attacks:
CVE-2015-5370 (Multiple errors in DCE-RPC code)
CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)
CVE-2016-2111 (NETLOGON Spoofing Vulnerability)
CVE-2016-2112 (LDAP client and server don't enforce integrity)
CVE-2016-2113 (Missing TLS certificate validation)
CVE-2016-2114 (“server signing = mandatory” not enforced)
CVE-2016-2115 (SMB IPC traffic is not integrity protected)
CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
(* Security fix *) - x/mesa-11.2.1-arm-1.txz
- x/xf86-video-amdgpu-1.1.0-arm-1.txz
- x/xf86-video-ati-7.7.0-arm-1.txz
- x/xf86-video-openchrome-0.4.0-arm-1.txz
- xap/geeqie-1.2.3-arm-1.txz
- xap/imagemagick-6.9.3_8-arm-1.txz
- xap/vim-gvim-7.4.1752-arm-1.txz
- kernels/*