Slackware ChangeLogs
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
Current (pre-release) ChangeLog for ARM
Mon Sep 8 10:28:16 UTC 2014
n/php-5.4.32-arm-1.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
       (* Security fix *)
+--------------------------+
Fri Sep 5 19:36:13 UTC 2014
a/kernel-modules-armv7-3.16.1_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.16.1_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.16.1-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.16.1-arm-1.txz: Upgraded.
a/libcgroup-0.41-arm-1.txz: Upgraded.
k/kernel-source-3.16.1-arm-1.txz: Upgraded.
       Changed these kernel options:
       CONNECTOR m -> y
       Thanks to linuxxer.
l/freetype-2.5.3-arm-1.txz: Upgraded.
l/mozilla-nss-3.16.4-arm-1.txz: Upgraded.
       Upgraded to nss-3.16.4 and nspr-4.10.7.
n/tin-2.2.1-arm-1.txz: Upgraded.
x/libxcb-1.11-arm-1.txz: Upgraded.
x/mesa-10.2.6-arm-1.txz: Upgraded.
       Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
x/xcb-proto-1.11-arm-1.txz: Upgraded.
x/xf86-input-mouse-1.9.1-arm-1.txz: Upgraded.
x/xf86-video-ast-1.0.1-arm-1.txz: Upgraded.
x/xfs-1.1.4-arm-1.txz: Upgraded.
x/xorg-server-1.15.2-arm-3.txz: Rebuilt.
       Added these explicit options for all X servers:
       --enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
       Thanks to Dinithion.
x/xorg-server-xephyr-1.15.2-arm-3.txz: Rebuilt.
x/xorg-server-xnest-1.15.2-arm-3.txz: Rebuilt.
x/xorg-server-xvfb-1.15.2-arm-3.txz: Rebuilt.
x/xrandr-1.4.3-arm-1.txz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Aug 10 12:30:19 UTC 2014
a/gpm-1.20.7-arm-3.txz: Rebuilt.
       Removed the mouse-t.el file, which is older than the version in Emacs.
       Thanks to Richard Cranium.
a/kernel-firmware-20140809git-noarch-1.txz: Upgraded.
a/kernel-modules-armv7-3.15.9_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.15.9_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.15.9-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.15.9-arm-1.txz: Upgraded.
a/openssl-solibs-1.0.1i-arm-1.txz: Upgraded.
       (* Security fix *)
k/kernel-source-3.15.9-arm-1.txz: Upgraded.
n/dhcpcd-6.0.5-arm-3.txz: Rebuilt.
       This update fixes a security issue where a specially crafted packet
       received from a malicious DHCP server causes dhcpcd to enter an infinite
       loop causing a denial of service.
       Thanks to Tobias Stoeckmann for the bug report.
       (* Security fix *)
n/openssl-1.0.1i-arm-1.txz: Upgraded.
       This update fixes several security issues:
       Double Free when processing DTLS packets (CVE-2014-3505)
       DTLS memory exhaustion (CVE-2014-3506)
       DTLS memory leak from zero-length fragments (CVE-2014-3507)
       Information leak in pretty printing functions (CVE-2014-3508)
       Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
       OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
       OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
       SRP buffer overrun (CVE-2014-3512)
       Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
       For more information, see:
       https://www.openssl.org/news/secadv_20140806.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
       (* Security fix *)
n/samba-4.1.11-arm-1.txz: Upgraded.
       This update fixes a remote code execution attack on unauthenticated nmbd
       NetBIOS name services. A malicious browser can send packets that may
       overwrite the heap of the target nmbd NetBIOS name services daemon.
       It may be possible to use this to generate a remote code execution
       vulnerability as the superuser (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
       (* Security fix *)
xap/xscreensaver-5.29-arm-2.txz: Rebuilt.
       Disabled nag screen that says "This version of XScreenSaver is very old!
       Please upgrade!" when the age of the software exceeds 12 months.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Jul 30 18:27:08 UTC 2014
d/gdb-7.8-arm-1.txz: Upgraded.
d/guile-2.0.11-arm-1.txz: Upgraded.
x/libXext-1.3.3-arm-1.txz: Upgraded.
x/libXi-1.7.4-arm-1.txz: Upgraded.
x/xterm-310-arm-1.txz: Upgraded.
+--------------------------+
Sun Jul 27 17:46:55 UTC 2014
e/emacs-24.3-arm-4.txz: Rebuilt.
       Renamed ctags manpage that conflicts with Exuberant Ctags. Thanks to Jim.
n/httpd-2.4.10-arm-1.txz: Upgraded.
       This update fixes the following security issues:
       *) SECURITY: CVE-2014-0117 (cve.mitre.org)
       mod_proxy: Fix crash in Connection header handling which
       allowed a denial of service attack against a reverse proxy
       with a threaded MPM. [Ben Reser]
       *) SECURITY: CVE-2014-0118 (cve.mitre.org)
       mod_deflate: The DEFLATE input filter (inflates request bodies) now
       limits the length and compression ratio of inflated request bodies to
       avoid denial of sevice via highly compressed bodies. See directives
       DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
       and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
       *) SECURITY: CVE-2014-0226 (cve.mitre.org)
       Fix a race condition in scoreboard handling, which could lead to
       a heap buffer overflow. [Joe Orton, Eric Covener]
       *) SECURITY: CVE-2014-0231 (cve.mitre.org)
       mod_cgid: Fix a denial of service against CGI scripts that do
       not consume stdin that could lead to lingering HTTPD child processes
       filling up the scoreboard and eventually hanging the server. By
       default, the client I/O timeout (Timeout directive) now applies to
       communication with scripts. The CGIDScriptTimeout directive can be
       used to set a different timeout for communication with scripts.
       [Rainer Jung, Eric Covener, Yann Ylavic]
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
       (* Security fix *)
+--------------------------+
Mon Jul 21 17:27:16 UTC 2014

Enjoy some new X related updates! Thanks to Robby Workman for lots of help
on the X.Org upgrades, and to alienBOB for an earlier SlackBuild for Motif
that was used as a reference for configure options and other fixes.
If you're using a proprietary video driver you'll probably need to recompile it
for the new X server.

a/glibc-solibs-2.19-arm-2.txz: Rebuilt.
a/glibc-zoneinfo-2014b-noarch-2.txz: Rebuilt.
a/kernel-modules-armv7-3.15.6_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.15.6_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.15.6-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.15.6-arm-1.txz: Upgraded.
ap/lxc-1.0.5-arm-1.txz: Upgraded.
d/automake-1.14.1-noarch-1.txz: Upgraded.
d/kernel-headers-3.15.6-arm-1.txz: Upgraded.
d/llvm-3.4.2-arm-1.txz: Upgraded.
k/kernel-source-3.15.6-arm-1.txz: Upgraded.
kde/calligra-2.8.5-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-es-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-fi-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-kk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-uk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.8.5-noarch-1.txz: Upgraded.
l/glibc-2.19-arm-2.txz: Rebuilt.
       Built against Linux 3.15.6 Kernel headers.
l/glibc-i18n-2.19-arm-2.txz: Rebuilt.
l/glibc-profile-2.19-arm-2.txz: Rebuilt.
l/lesstif-0.95.2-arm-2.tgz: Removed.
       LessTif is making way for real Motif.
       Thanks to the Hungry Programmers for a great run. :-)
t/tetex-3.0-arm-4.txz: Rebuilt.
       Recompiled /usr/bin/xdvi-motif.bin against Motif.
t/tetex-doc-3.0-arm-4.txz: Rebuilt.
x/dri3proto-1.0-arm-1.txz: Added.
x/fontconfig-2.11.1-arm-1.txz: Upgraded.
x/freeglut-2.8.1-arm-1.txz: Upgraded.
x/gccmakedep-1.0.3-arm-1.txz: Upgraded.
x/glamor-egl-0.6.0-arm-1.txz: Added.
x/glew-1.10.0-arm-1.txz: Upgraded.
x/glproto-1.4.17-arm-1.txz: Upgraded.
x/imake-1.0.7-arm-1.txz: Upgraded.
x/inputproto-2.3.1-arm-1.txz: Upgraded.
x/libFS-1.0.6-arm-1.txz: Upgraded.
x/libICE-1.0.9-arm-1.txz: Upgraded.
x/libXfont-1.4.8-arm-1.txz: Upgraded.
x/libXft-2.3.2-arm-1.txz: Upgraded.
x/libXi-1.7.3-arm-1.txz: Upgraded.
x/libdrm-2.4.54-arm-1.txz: Upgraded.
x/libevdev-1.2-arm-1.txz: Added.
x/libxcb-1.10-arm-1.txz: Upgraded.
x/libxshmfence-1.1-arm-1.txz: Added.
x/makedepend-1.0.5-arm-1.txz: Upgraded.
x/mesa-10.2.4-arm-1.txz: Upgraded.
x/motif-2.3.4-arm-1.txz: Added.
x/mtdev-1.1.5-arm-1.txz: Upgraded.
x/presentproto-1.0-arm-1.txz: Added.
x/util-macros-1.19.0-arm-1.txz: Upgraded.
x/xauth-1.0.9-arm-1.txz: Upgraded.
x/xcb-proto-1.10-arm-1.txz: Upgraded.
x/xcb-util-cursor-0.1.1-arm-1.txz: Upgraded.
x/xcb-util-renderutil-0.3.9-arm-1.txz: Upgraded.
x/xcb-util-wm-0.4.1-arm-1.txz: Upgraded.
x/xcursorgen-1.0.6-arm-1.txz: Upgraded.
x/xdg-user-dirs-0.15-arm-1.txz: Upgraded.
x/xextproto-7.3.0-arm-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-arm-6.txz: Rebuilt.
x/xf86-input-aiptek-1.4.1-arm-6.txz: Rebuilt.
x/xf86-input-evdev-2.9.0-arm-1.txz: Upgraded.
x/xf86-input-joystick-1.6.1-arm-6.txz: Rebuilt.
x/xf86-input-keyboard-1.8.0-arm-1.txz: Upgraded.
x/xf86-input-mouse-1.9.0-arm-4.txz: Rebuilt.
x/xf86-input-penmount-1.5.0-arm-6.txz: Rebuilt.
x/xf86-input-synaptics-1.8.0-arm-1.txz: Upgraded.
x/xf86-input-void-1.4.0-arm-6.txz: Rebuilt.
x/xf86-input-wacom-0.19.0-arm-5.txz: Rebuilt.
x/xf86-video-apm-1.2.5-arm-5.txz: Rebuilt.
x/xf86-video-ark-0.7.5-arm-5.txz: Rebuilt.
x/xf86-video-armsoc-1.0.0-arm-1.txz: Upgraded.
x/xf86-video-ast-0.99.9-arm-1.txz: Upgraded.
x/xf86-video-ati-7.4.0-arm-1.txz: Upgraded.
x/xf86-video-chips-1.2.5-arm-5.txz: Rebuilt.
x/xf86-video-cirrus-1.5.2-arm-5.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-arm-2.txz: Rebuilt.
x/xf86-video-fbdev-0.4.4-arm-2.txz: Rebuilt.
x/xf86-video-glint-1.2.8-arm-5.txz: Rebuilt.
x/xf86-video-i128-1.3.6-arm-5.txz: Rebuilt.
x/xf86-video-i740-1.3.4-arm-5.txz: Rebuilt.
x/xf86-video-mach64-6.9.4-arm-5.txz: Rebuilt.
x/xf86-video-mga-1.6.3-arm-1.txz: Upgraded.
x/xf86-video-modesetting-0.9.0-arm-1.txz: Upgraded.
x/xf86-video-neomagic-1.2.8-arm-3.txz: Rebuilt.
x/xf86-video-nv-2.1.20-arm-6.txz: Rebuilt.
x/xf86-video-openchrome-0.3.3-arm-3.txz: Rebuilt.
x/xf86-video-r128-6.9.2-arm-2.txz: Rebuilt.
x/xf86-video-rendition-4.2.5-arm-5.txz: Rebuilt.
x/xf86-video-s3-0.6.5-arm-5.txz: Rebuilt.
x/xf86-video-s3virge-1.10.6-arm-6.txz: Rebuilt.
x/xf86-video-savage-2.3.7-arm-2.txz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-arm-6.txz: Rebuilt.
x/xf86-video-sis-0.10.7-arm-5.txz: Rebuilt.
x/xf86-video-sisusb-0.9.6-arm-5.txz: Rebuilt.
x/xf86-video-tdfx-1.4.5-arm-5.txz: Rebuilt.
x/xf86-video-tga-1.2.2-arm-5.txz: Rebuilt.
x/xf86-video-trident-1.3.6-arm-5.txz: Rebuilt.
x/xf86-video-tseng-1.2.5-arm-5.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-arm-6.txz: Rebuilt.
x/xf86-video-vesa-2.3.3-arm-2.txz: Rebuilt.
x/xf86-video-vmware-13.0.2-arm-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-arm-6.txz: Rebuilt.
x/xf86-video-xgi-1.6.0git_2012_08_06-arm-9.txz: Rebuilt.
x/xf86-video-xgixp-1.8.1-arm-5.txz: Rebuilt.
x/xkeyboard-config-2.11-arm-1.txz: Upgraded.
x/xorg-cf-files-1.0.5-arm-1.txz: Upgraded.
x/xproto-7.0.26-arm-1.txz: Upgraded.
x/xrandr-1.4.2-arm-1.txz: Upgraded.
x/xscope-1.4.1-arm-1.txz: Upgraded.
x/xterm-309-arm-1.txz: Upgraded.
x/xtrans-1.3.4-arm-1.txz: Upgraded.
xap/ddd-3.3.12-arm-3.txz: Rebuilt.
       Recompiled against Motif.
xap/xpdf-3.04-arm-2.txz: Rebuilt.
isolinux/*: Rebuilt.
kernels/*: Upgraded
+--------------------------+
Tue Jul 15 19:22:14 UTC 2014
/INSTALL_KIRKWOOD.TXT: Updated.
       Updated to include new settings and instructions for using Flattened Device Tree
       with the Kirkwood devices.
a/aaa_base-14.1-arm-2.txz: Rebuilt.
       Added a README to explain what the Kernel image files are for.
a/bash-4.3.018-arm-1.txz: Upgraded.
a/kernel-firmware-20140712git-noarch-1.txz: Upgraded.
a/kernel-modules-armv7-3.15.5_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.15.5_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.15.5-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.15.5-arm-1.txz: Upgraded.
       For all Kirkwood-based systems *not* on the list below ('Systems that do not
       require Flattened Device Tree'), prior to upgrading to this Kernel package,
       you must update your U-Boot settings to supply the Kernel post installation
       script with the Kernel package your system is using, and the DTB (Device Tree
       Blob) file required to supply the system layout information.

       Reboot into the U-Boot console and paste the following into the U-Boot prompt:
       If you have customised your U-Boot settings from the suggested settings in
       'INSTALL_KIRKWOOD.TXT', you'll need to take care and update those settings
       manually.

       Marvell>> setenv machid ffffffff
       Marvell>> setenv SLKKERNEL slkkernel=kirkwood
       Marvell>> setenv bootcmd 'setenv bootargs $(SLKKERNEL) $(DTB) $(bootargs_console) $(bootargs_root) ; run bootcmd_slk ; reset'

       For each device, you need to set the appropriate DTB file configuration:

       For the original SheevaPlug:

       Marvell>> setenv DTB dtb=kirkwood-sheevaplug.dtb

       For the eSATA SheevaPlug:

       Marvell>> setenv DTB dtb=kirkwood-sheevaplug-esata.dtb

       For the GuruPlug:

       Marvell>> setenv DTB dtb=kirkwood-guruplug-server-plus.dtb

       For _other_ Kirkwood-based systems not listed above, _and_ not in the list
       below:

       Find the appropriate DTB from the directory list here and configure U-Boot
       using the 'setenv DTB dtb=<dtb file name>' as detailed above.

       ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-current/kernels/kirkwood/dtb/

       Systems that do not require Flattened Device Tree with Linux 3.15.
       `````````````````````````````````````````````````````````````````
       The following list of systems do not require FDT, and as such no changes to
       U-Boot need to be made. If you have any of the machines listed below, you can
       safely upgradepkg to this Kernel package immediately.
       LaCie d2 Network v2 NAS Board
       LaCie 2Big Network v2 NAS Board
       LaCie 5Big Network v2 NAS Board
       Marvell OpenRD Base Board
       Marvell OpenRD Client Board
       Marvell OpenRD Ultimate Board
       Marvell RD-88F6192-NAS Reference Board
       Marvell RD-88F6281 Reference Board
       HP t5325 Thin Client
       QNAP TS-110, TS-119, TS-119P+, TS-210, TS-219, TS-219P and TS-219P+ Turbo NAS
       QNAP TS-410, TS-410U, TS-419P, TS-419P+ and TS-419U Turbo NAS
a/shadow-4.2.1-arm-1.txz: Upgraded.
       This adds support for subuid and subgid needed for unprivileged containers.
       Thanks to Christoph Willing.
a/u-boot-tools-2014.07_rc4-arm-1.txz: Upgraded.
ap/cgmanager-20140710_986cd44-arm-1.txz: Added.
       Thanks to Matteo Bernardini.
ap/linuxdoc-tools-0.9.69-arm-2.txz: Rebuilt.
       Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl
ap/lxc-1.0.3-arm-1.txz: Upgraded.
       This adds a template for for lxc-create to create a minimal Slackware
       container using slackpkg. For example, this will create a container
       named "current":
       lxc-create -n current -t slackware
       There's an rc.lxc init script added to autorun/autostop containers, but it's
       not currently hooked in to the main init scripts, so if you want to use it
       you'll need to add it to your rc.local and rc.local_shutdown (and make it
       executable). The script will look for "lxc.start.auto = 1" in the container
       config file to determine if a container should be autostarted (1) or not (0).
       Thanks to Matteo Bernardini.
ap/lzip-1.15-arm-1.txz: Upgraded.
ap/man-1.6g-arm-3.txz: Rebuilt.
       Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
ap/nano-2.3.5-arm-1.txz: Upgraded.
ap/slackpkg-2.82.0-noarch-13.txz: Rebuilt.
       Patched to support $ROOT and $CONF environment variables.
       Thanks to Matteo Bernardini.
d/open-cobol-1.1-arm-2.tgz: Removed.
       This project has been renamed GNU Cobol.
d/gnu-cobol-1.1-arm-1.txz: Upgraded.
d/kernel-headers-3.15.5-arm-1.txz: Upgraded.
k/kernel-source-3.15.5-arm-1.txz: Upgraded.
l/libnih-1.0.3-arm-1.txz: Added.
       Thanks to Matteo Bernardini.
l/ncurses-5.9-arm-5.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20140308-patch.sh.
       Thanks to comet.berkeley.
l/taglib-1.9.1-arm-1.txz: Upgraded.
       Linked with -lstdc++. Thanks to comet.berkeley.
n/bind-9.9.5_P1-arm-1.txz: Upgraded.
       This fixes security issues and other bugs. Please note that the first
       CVE only affects Windows, and the second one was claimed to be fixed by
       an earlier version of BIND. But we'll update anyway just in case. :-)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
n/gnupg-1.4.17-arm-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/gnupg2-2.0.24-arm-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/php-5.4.30-arm-1.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
       (* Security fix *)
n/samba-4.1.9-arm-1.txz: Upgraded.
       This update fixes bugs and security issues, including a flaw in Samba's
       internal DNS server which can be exploited to cause a denial of service,
       a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
       configurations that use shadow_copy* for vfs objects to reveal potentially
       private server information, a denial of service on the nmbd NetBIOS name
       services daemon, and a denial of service crash involving overwriting
       memory on an authenticated connection to the smbd file server.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
       (* Security fix *)
n/yptools-2.14-arm-3.txz: Rebuilt.
       Corrected yppasswd patch that was causing password changes to fail.
       Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-arm-1.txz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Wed Jun 18 06:06:49 UTC 2014
a/kernel-modules-armv7-3.15.1_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.15.1_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.15.1-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.15.1-arm-1.txz: Upgraded.
k/kernel-source-3.15.1-arm-1.txz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Mon Jun 16 17:16:24 UTC 2014
/GPG-KEY: Replaced.
       The previous PGP key used an @armedslack.org email address, which is set to
       be retired.

       All packages for supported versions of Slackware ARM have now been re-signed
       with the new PGP key.

       For reference, the old ARMedslack PGP key used to sign the packages can be
       found here:
       http://arm.slackware.com/pgp-keys/GPG-KEY-armedslack

ap/ddrescue-1.18.1-arm-1.txz: Upgraded.
ap/slackpkg-2.82.0-noarch-12.txz: Rebuilt.
       Changed the default config to recognise the new Slackware ARM GPG key.
+--------------------------+
Wed Jun 11 06:32:59 UTC 2014
a/bash-4.3.011-arm-2.txz: Rebuilt.
n/php-5.4.29-arm-1.txz: Upgraded.
       This update fixes bugs and security issues, including a possible denial
       of service, and an issue where insecure default permissions on the FPM
       socket may allow local users to run arbitrary code as the apache user.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
       (* Security fix *)
+--------------------------+
Fri Jun 6 17:46:30 UTC 2014
a/openssl-solibs-1.0.1h-arm-1.txz: Upgraded.
       (* Security fix *)
ap/mariadb-5.5.37-arm-1.txz: Upgraded.
       This update contains security fixes and improvements.
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
       (* Security fix *)
ap/nano-2.3.4-arm-1.txz: Upgraded.
d/gcc-4.8.3-arm-1.txz: Upgraded.
d/gcc-g++-4.8.3-arm-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-arm-1.txz: Upgraded.
d/gcc-gnat-4.8.3-arm-1.txz: Upgraded.
d/gcc-go-4.8.3-arm-1.txz: Upgraded.
d/gcc-java-4.8.3-arm-1.txz: Upgraded.
d/gcc-objc-4.8.3-arm-1.txz: Upgraded.
d/make-3.82-arm-5.txz: Rebuilt.
       Patched to fix a bug with parallel builds.
       Thanks to Danny Schmarsel.
l/libtasn1-3.6-arm-1.txz: Upgraded.
       Multiple security issues have been corrected in the libtasn1 library.
       These errors allow a remote attacker to cause a denial of service, or
       possibly to execute arbitrary code.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/gnutls-3.2.15-arm-1.txz: Upgraded.
       A security issue has been corrected in gnutls. This vulnerability
       affects the client side of the gnutls library. A server that sends
       a specially crafted ServerHello could corrupt the memory of a requesting
       client. This may allow a remote attacker to execute arbitrary code.
       Additional vulnerabilities in the embedded libtasn1 library have also
       been patched.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/irssi-0.8.16-arm-7.txz: Rebuilt.
n/openssl-1.0.1h-arm-1.txz: Upgraded.
       Multiple security issues have been corrected, including a possible
       man-in-the-middle attack where weak keying material is forced, denial
       of service, and the execution of arbitrary code.
       For more information, see:
       http://www.openssl.org/news/secadv_20140605.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
       (* Security fix *)
n/sendmail-8.14.9-arm-1.txz: Upgraded.
       This release fixes one security related bug by properly closing file
       descriptors (except stdin, stdout, and stderr) before executing programs.
       This bug could enable local users to interfere with an open SMTP
       connection if they can execute their own program for mail delivery
       (e.g., via procmail or the prog mailer).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
       (* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
+--------------------------+
Sat May 24 09:55:12 UTC 2014
ap/linuxdoc-tools-0.9.69-arm-1.txz: Upgraded.
       Upgraded to gtk-doc-1.20
       Upgraded to xmlto-0.0.26
d/slacktrack-2.16-arm-1.txz: Upgraded.
+--------------------------+
Wed May 21 21:48:25 UTC 2014
a/glibc-solibs-2.19-arm-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140516git-noarch-1.txz: Upgraded.
a/kernel-modules-armv7-3.14.4_armv7-arm-1.txz: Upgraded.
a/kernel-modules-kirkwood-3.14.4_kirkwood-arm-1.txz: Upgraded.
a/kernel_armv7-3.14.4-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.14.4-arm-1.txz: Upgraded.
d/binutils-2.24.51.0.3-arm-1.tgz: Upgraded.
d/gcc-4.8.2-arm-3.txz: Rebuilt.
       Include libiberty.a since that's no longer in the binutils package.
       Updated to latest patch set.
d/gcc-g++-4.8.2-arm-3.txz: Rebuilt.
d/gcc-gfortran-4.8.2-arm-3.txz: Rebuilt.
d/gcc-gnat-4.8.2-arm-3.txz: Rebuilt.
d/gcc-go-4.8.2-arm-3.txz: Rebuilt.
d/gcc-java-4.8.2-arm-3.txz: Rebuilt.
d/gcc-objc-4.8.2-arm-3.txz: Rebuilt.
d/gdb-7.7.1-arm-1.txz: Upgraded.
d/kernel-headers-3.14.4-arm-1.tgz: Upgraded.
d/oprofile-0.9.7-arm-5.txz: Rebuilt.
k/kernel-source-3.14.4-arm-1.txz: Upgraded.
l/glibc-2.19-arm-1.txz: Upgraded.
l/glibc-i18n-2.19-arm-1.txz: Upgraded.
l/glibc-profile-2.19-arm-1.txz: Upgraded.
l/libelf-0.8.13-arm-4.txz: Rebuilt.
       Symlink headers to /usr/include, since Mesa wants them there.
       Thanks to Robby Workman.
n/libnftnl-1.0.1-arm-1.txz: Added.
n/nftables-0.2-arm-1.txz: Added.
xap/ddd-3.3.12-arm-2.tgz: Rebuilt.
       Patched to fix the machine code view. Thanks to Christopher Oliver.
extra/bash-completion/bash-completion-2.1-noarch-1.tgz: Upgraded.
       Patched to fix an issue with bash-4.3. Thanks to ponce.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Thu May 1 21:12:01 UTC 2014
ap/screen-4.2.1-arm-1.tgz: Upgraded.
l/qt-4.8.6-arm-1.txz: Upgraded.
+--------------------------+
Fri Apr 25 18:37:44 UTC 2014
a/bash-4.3.011-arm-1.tgz: Upgraded.
a/gawk-4.1.1-arm-1.txz: Upgraded.
a/grep-2.18-arm-1.txz: Upgraded.
ap/vim-7.4.258-arm-1.txz: Upgraded.
l/libyaml-0.1.6-arm-1.txz: Upgraded.
       This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
       where a specially crafted string could cause a heap overflow leading to
       arbitrary code execution.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
       https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
       (* Security fix *)
n/openssh-6.6p1-arm-2.txz: Rebuilt.
       Fixed a bug with curve25519-sha256 that caused a key exchange failure in
       about 1 in 512 connection attempts.
n/php-5.4.27-arm-1.txz: Upgraded.
       This update fixes a security issue in the in the awk script detector
       which allows context-dependent attackers to cause a denial of service
       (CPU consumption) via a crafted ASCII file that triggers a large amount
       of backtracking.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
       (* Security fix *)
xap/vim-gvim-7.4.258-arm-1.txz: Upgraded.
+--------------------------+
Tue Apr 8 19:58:55 UTC 2014
a/openssl-solibs-1.0.1g-arm-1.txz: Upgraded.
n/openssl-1.0.1g-arm-1.txz: Upgraded.
       This update fixes two security issues:
       A missing bounds check in the handling of the TLS heartbeat extension
       can be used to reveal up to 64k of memory to a connected client or server.
       Thanks for Neel Mehta of Google Security for discovering this bug and to
       Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
       preparing the fix.
       Fix for the attack described in the paper "Recovering OpenSSL
       ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
       by Yuval Yarom and Naomi Benger. Details can be obtained from:
       http://eprint.iacr.org/2014/140
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
       (* Security fix *)
+--------------------------+
Wed Apr 2 19:31:23 UTC 2014
a/kernel-modules-armv7-3.13.7_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.13.7_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.13.7-arm-1.txz: Upgraded.
a/kernel_kirkwood-3.13.7-arm-1.txz: Upgraded.
ap/mpg123-1.18.0-arm-1.tgz: Upgraded.
k/kernel-source-3.13.7-arm-1.txz: Upgraded.
l/apr-1.5.0-arm-1.txz: Upgraded.
l/apr-util-1.5.3-arm-1.txz: Upgraded.
l/mozilla-nss-3.16-arm-1.txz: Upgraded.
       This update fixes a security issue:
       The cert_TestHostName function in lib/certdb/certdb.c in the
       certificate-checking implementation in Mozilla Network Security Services
       (NSS) before 3.16 accepts a wildcard character that is embedded in an
       internationalized domain name's U-label, which might allow man-in-the-middle
       attackers to spoof SSL servers via a crafted certificate.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
       (* Security fix *)
n/curl-7.36.0-arm-1.txz: Upgraded.
       This update fixes four security issues.
       For more information, see:
       http://curl.haxx.se/docs/adv_20140326A.html
       http://curl.haxx.se/docs/adv_20140326B.html
       http://curl.haxx.se/docs/adv_20140326C.html
       http://curl.haxx.se/docs/adv_20140326D.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
       (* Security fix *)
n/httpd-2.4.9-arm-1.txz: Upgraded.
       This update addresses two security issues.
       Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults
       when logging truncated cookies. Clean up the cookie logging parser to
       recognize only the cookie=value pairs, not valueless cookies.
       mod_dav: Keep track of length of cdata properly when removing leading
       spaces. Eliminates a potential denial of service from specifically crafted
       DAV WRITE requests.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
       (* Security fix *)
n/openssh-6.6p1-arm-1.txz: Upgraded.
       This update fixes a security issue when using environment passing with
       a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be
       tricked into accepting any environment variable that contains the
       characters before the wildcard character.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
       (* Security fix *)
n/tin-2.2.0-arm-1.txz: Upgraded.
isolinux/*: Rebuilt.
       tar is now version 1.26.
kernels/*: Upgraded.
+--------------------------+
Tue Mar 18 08:13:31 UTC 2014
a/udisks-1.0.5-arm-1.tgz: Upgraded.
       This update fixes a stack-based buffer overflow when handling long path
       names. A malicious, local user could use this flaw to create a
       specially-crafted directory structure that could lead to arbitrary code
       execution with the privileges of the udisks daemon (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
       (* Security fix *)
a/udisks2-2.1.3-arm-1.tgz: Upgraded.
       This update fixes a stack-based buffer overflow when handling long path
       names. A malicious, local user could use this flaw to create a
       specially-crafted directory structure that could lead to arbitrary code
       execution with the privileges of the udisks daemon (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
       (* Security fix *)
n/gnutls-3.1.22-arm-1.tgz: Upgraded.
       Fixed a security issue where a specially crafted certificate could
       bypass certificate validation checks.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
       (* Security fix *)
n/mutt-1.5.23-arm-1.tgz: Upgraded.
       This update fixes a buffer overflow where malformed RFC2047 header
       lines could result in denial of service or potentially the execution
       of arbitrary code as the user running mutt.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
       (* Security fix *)
n/php-5.4.26-arm-1.tgz: Upgraded.
       This update fixes a flaw where a specially crafted data file may cause a
       segfault or 100% CPU consumption when a web page uses fileinfo() on it.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
       (* Security fix *)
n/samba-4.1.6-arm-1.tgz: Upgraded.
       This update fixes two security issues:
       CVE-2013-4496:
       Samba versions 3.4.0 and above allow the administrator to implement
       locking out Samba accounts after a number of bad password attempts.
       However, all released versions of Samba did not implement this check for
       password changes, such as are available over multiple SAMR and RAP
       interfaces, allowing password guessing attacks.
       CVE-2013-6442:
       Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
       smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
       command options it will remove the existing ACL on the object being
       modified, leaving the file or directory unprotected.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
       (* Security fix *)
+--------------------------+
Fri Feb 28 21:51:20 UTC 2014
d/subversion-1.7.16-arm-1.tgz: Upgraded.
       Fix denial of service bugs.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
       (* Security fix *)
+--------------------------+
Tue Feb 25 20:34:37 UTC 2014
a/kernel-firmware-20140224git-noarch-1.tgz: Upgraded.
a/kernel-modules-armv7-3.13.5_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.13.5_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.13.5-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.13.5-arm-1.tgz: Upgraded.
a/shadow-4.1.5.1-arm-3.tgz: Rebuilt.
       Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c"
       (CVE-2005-4890) by detaching the controlling terminal in the non-PAM
       case via a TIOCNOTTY request. Bi-directional protection is excessive
       and breaks a commonly-used methods for privilege escalation on non-PAM
       systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript).
       This update relaxes the restriction and only detaches the controlling
       tty when the callee is not root (which is, after all, the threat vector).
       Thanks to mancha for the patch (and the above information).
ap/mariadb-5.5.35-arm-1.tgz: Upgraded.
       This update fixes a buffer overflow in the mysql command line client which
       may allow malicious or compromised database servers to cause a denial of
       service (crash) and possibly execute arbitrary code via a long server
       version string.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
       (* Security fix *)
k/kernel-source-3.13.5-arm-1.tgz: Upgraded.
n/gnutls-3.1.21-arm-1.tgz: Upgraded.
       This update fixes a flaw where a version 1 intermediate certificate would be
       considered as a CA certificate by GnuTLS by default.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
       (* Security fix *)
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sat Feb 15 22:57:55 UTC 2014
a/kernel-modules-armv7-3.13.3_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.13.3_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.13.3-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.13.3-arm-1.tgz: Upgraded.
k/kernel-source-3.13.3-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Fri Feb 14 19:30:33 UTC 2014
n/curl-7.35.0-arm-1.tgz: Upgraded.
       This update fixes a flaw where libcurl could, in some circumstances, reuse
       the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
       request.
       For more information, see:
       http://curl.haxx.se/docs/adv_20140129.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
       (* Security fix *)
n/ntp-4.2.6p5-arm-5.tgz: Rebuilt.
       All stable versions of NTP remain vulnerable to a remote attack where the
       "ntpdc -c monlist" command can be used to amplify network traffic as part
       of a denial of service attack. By default, Slackware is not vulnerable
       since it includes "noquery" as a default restriction. However, it is
       vulnerable if this restriction is removed. To help mitigate this flaw,
       "disable monitor" has been added to the default ntp.conf (which will disable
       the monlist command even if other queries are allowed), and the default
       restrictions have been extended to IPv6 as well.
       All users of the NTP daemon should make sure that their ntp.conf contains
       "disable monitor" to prevent misuse of the NTP service. The new ntp.conf
       file will be installed as /etc/ntp.conf.new with a package upgrade, but the
       changes will need to be merged into any existing ntp.conf file by the admin.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
       http://www.kb.cert.org/vuls/id/348126
       (* Security fix *)
n/openssh-6.5p1-arm-1.tgz: Upgraded.
xap/pidgin-2.10.9-arm-1.tgz: Upgraded.
       This update fixes various security issues and other bugs.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
       (* Security fix *)
+--------------------------+
Wed Jan 29 19:03:38 UTC 2014
a/pkgtools-14.1-noarch-3.tgz: Rebuilt.
       Removed broken symlink sbin/makebootdisk. This tool is not shipped with ARM
       since it is not relevant.
l/mozilla-nss-3.15.4-arm-1.tgz: Upgraded.
       Upgraded to nss-3.15.4 and nspr-4.10.3.
       Fixes a possible man-in-the-middle issue.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
       (* Security fix *)
n/bind-9.9.4_P2-arm-1.tgz: Upgraded.
       This update fixes a defect in the handling of NSEC3-signed zones that can
       cause BIND to be crashed by a specific set of queries.
       NOTE: According to the second link below, Slackware is probably not
       vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
       anyway, though.
       For more information, see:
       https://kb.isc.org/article/AA-01078
       https://kb.isc.org/article/AA-01085
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
+--------------------------+
Sun Jan 26 19:29:30 UTC 2014
a/kernel-modules-armv7-3.12.9_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.12.9_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.12.9-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.12.9-arm-1.tgz: Upgraded.
k/kernel-source-3.12.9-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Tue Jan 14 23:12:29 UTC 2014
a/openssl-solibs-1.0.1f-arm-1.tgz: Upgraded.
d/llvm-3.4-arm-1.tgz: Upgraded.
n/openssl-1.0.1f-arm-1.tgz: Upgraded.
       This update fixes the following security issues:
       Fix for TLS record tampering bug CVE-2013-4353
       Fix for TLS version checking bug CVE-2013-6449
       Fix for DTLS retransmission bug CVE-2013-6450
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
       (* Security fix *)
n/php-5.4.24-arm-1.tgz: Upgraded.
       The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
       5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
       parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
       which allows remote attackers to execute arbitrary code or cause a denial
       of service (memory corruption) via a crafted certificate that is not
       properly handled by the openssl_x509_parse function.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
       (* Security fix *)
n/samba-4.1.4-arm-1.tgz: Upgraded.
       This update fixes a heap-based buffer overflow that may allow AD domain
       controllers to execute arbitrary code via an invalid fragment length in
       a DCE-RPC packet.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
       (* Security fix *)
x/libXfont-1.4.7-arm-1.tgz: Upgraded.
       This update fixes a stack overflow when reading a BDF font file containing
       a longer than expected string, which could lead to crashes or privilege
       escalation.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
       (* Security fix *)
+--------------------------+
Sat Jan 11 18:01:07 UTC 2014
a/kernel-modules-armv7-3.12.7_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.12.7_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.12.7-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.12.7-arm-1.tgz: Upgraded.
k/kernel-source-3.12.7-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sat Jan 4 09:23:44 UTC 2014
d/gcc-4.8.2-arm-2.tgz: Rebuilt.
       Include latest patch set.
d/gcc-g++-4.8.2-arm-2.tgz: Rebuilt.
d/gcc-gfortran-4.8.2-arm-2.tgz: Rebuilt.
d/gcc-gnat-4.8.2-arm-2.tgz: Rebuilt.
d/gcc-go-4.8.2-arm-2.tgz: Rebuilt.
d/gcc-java-4.8.2-arm-2.tgz: Rebuilt.
d/gcc-objc-4.8.2-arm-2.tgz: Rebuilt.
+--------------------------+
Fri Jan 3 09:52:06 UTC 2014
a/kernel-modules-armv7-3.12.6_armv7-arm-1.tgz: Upgraded.
a/kernel-modules-kirkwood-3.12.6_kirkwood-arm-1.tgz: Upgraded.
a/kernel_armv7-3.12.6-arm-1.tgz: Upgraded.
a/kernel_kirkwood-3.12.6-arm-1.tgz: Upgraded.
k/kernel-source-3.12.6-arm-1.tgz: Upgraded.
isolinux/*: Rebuilt.
kernels/*: Upgraded.
+--------------------------+
Sun Dec 22 19:46:32 UTC 2013
n/gnupg-1.4.16-arm-1.tgz: Upgraded.
       Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
       Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
       For more information, see:
       http://www.cs.tau.ac.il/~tromer/acoustic/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
       (* Security fix *)
+--------------------------+
Thu Dec 19 19:12:23 UTC 2013
d/llvm-3.3-arm-3.tgz: Rebuilt.
       The LLVM package included binaries with an rpath pointing to the build
       location. This allows an attacker with write access to that location to add
       modified libraries (and execute arbitrary code) as any user running the LLVM
       binaries. This updated package rebuilds LLVM to exclude the build directories
       from the rpath information.
       Thanks to Christopher Oliver for the bug report.
       (* Security fix *)
d/ruby-1.9.3_p484-arm-1.tgz: Upgraded.
       This update fixes a heap overflow in floating point parsing. A specially
       crafted string could cause a heap overflow leading to a denial of service
       attack via segmentation faults and possibly arbitrary code execution.
       For more information, see:
       https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
       (* Security fix *)
kde/calligra-2.7.5-arm-1.tgz: Upgraded.
kdei/calligra-l10n-bs-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-cs-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-da-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-de-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-el-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-es-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-et-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fi-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-fr-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-gl-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-hu-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ia-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-it-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-kk-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nb-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nds-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-nl-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pl-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-ru-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sk-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sl-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-sv-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-tr-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-uk-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.5-noarch-1.tgz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.5-noarch-1.tgz: Upgraded.
l/cairo-1.12.16-arm-1.tgz: Upgraded.
       Removed --enable-xcb-shm (may cause instability with GTK+3).
       Removed --enable-xlib-xcb (causes GIMP slowdown).
       Added --enable-ft and --enable-gl.
l/libiodbc-3.52.8-arm-1.tgz: Upgraded.
       This update fixes an rpath pointing to a location in /tmp that was found in
       two test programs (iodbctest and iodbctestw). This could have allowed a
       local attacker with write access to /tmp to add modified libraries (and
       execute arbitrary code) as any user running the test programs.
       Thanks to Christopher Oliver for the bug report.
       (* Security fix *)
l/libjpeg-v8a-arm-3.tgz: Rebuilt.
       Fix use of uninitialized memory when decoding images with missing SOS data
       for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
       This could allow remote attackers to obtain sensitive information from
       uninitialized memory locations via a crafted JPEG image.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
       (* Security fix *)
l/mozilla-nss-3.15.3-arm-1.tgz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
       (* Security fix *)
xap/gimp-2.8.10-arm-1.tgz: Upgraded.
+--------------------------+
Wed Dec 4 19:09:31 UTC 2013

With this release, I've been making preparations for supporting multiple devices
with the ARMv7 kernel and upgrading to Linux 3.12. Whilst I was at it, I
discovered that once again, the Versatile kernel no longer worked with QEMU.
However, this turned out to be a good thing: the Versatile platform is an
emulation of a very old device which only supported 256MB RAM, so was of little
use anyway, IMO. QEMU can now be used to emulate the 'ARM Versatile Express'
board, using the ARMv7 generic kernel.
For some information about QEMU and Liux, see
       https://wiki.linaro.org/PeterMaydell/QemuVersatileExpress
There are limitations with it - particularly that there is currently no graphics
support in Linux for it, but this may come in the future. For now, the Slackware
installer can be installed using the serial console and subsequently logged into
remotely.

/INSTALL_TEGRA.TXT: Removed.
/INSTALL_TRIMSLICE.TXT: Added.
       This is the 'INSTALL_TEGRA.TXT' document, renamed. Since the installation
       instructions are most likely specific to the Trimslice rather than any
       particular Tegra device, it makes sense to name it specifically.
       Installation is now performed entirely from the serial console - SSH is not
       needed. This is because I've fixed up the installer to work properly with
       the serial console.
/INSTALL_KIRKWOOD.TXT: Updated.
       Installation is now performed entirely from the serial console - SSH is not
       needed. This is because I've fixed up the installer to work properly with
       the serial console.
/INSTALL_QEMU.TXT: Updated.
       QEMU and its supporting package 'device-tree-compiler' are now to be fetched
       from slackbuilds.org - thanks to Robby Workman.
       Updated from the ARM VersatilePB platform to ARM Versatile Express.
a/etc-14.1-arm-3.tgz: Rebuilt.
       Added ttyAMA0 and ttyAMA1 to /etc/securetty so that you can login as root
       from the serial console on the ARM Versatile Express and Raspberry Pi.
a/kernel_versatile-3.10.17-arm-2.tgz: Removed.
a/kernel-modules-versatile-3.10.17_versatile-arm-2.tgz: Removed.
a/kernel_armv7-3.12.2-arm-1.tgz: Upgraded.
       Added /boot/zImage-armv7 for devices that do not use U-Boot, and to enable
       users to create a uImage with a load address different from 0x00008000
       (required by the 'Trimslice' computer).
       Added many more modules for a whole range of hardware so it's going to be easier
       to support various ARMv7 machines in the future.
a/kernel_kirkwood-3.12.2-arm-1.tgz: Upgraded.
       Most of the Kirkwood support had been moved into Flattened Device Tree,
       however it seems not to be fully baked: the kernel would not boot
       on the SheevaPlug with FTD enabled, as the kernel would not recognise the
       hardware. The kernel paniced on the OpenRD client (not currently supported
       by FDT) with FDT enabled, but worked without it. Therefore, the Kirkwood
       device support has been restored directly using a patch from doozan.com:
       http://forum.doozan.com/read.php?2,12096
       I'll keep an eye on this as I'd like to use FTD for the SheevaPlugs,
       although I don't think there will ever be a version of U-Boot that supports
       FDT for the OpenRD devices.
k/kernel-source-3.12.2-arm-1.tgz: Upgraded.
n/openssh-6.4p1-arm-1.tgz: Upgraded.
       sshd(8): fix a memory corruption problem triggered during rekeying
       when an AES-GCM cipher is selected.
       For more information, see:
       http://www.openssh.com/txt/gcmrekey.adv
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
       (* Security fix *)
n/php-5.4.22-arm-1.tgz: Upgraded.
       This is a bugfix release.
n/samba-4.1.1-arm-1.tgz: Upgraded.
       This update fixes two security issues:
       * Samba versions 3.2.0 and above do not check the underlying file or
       directory ACL when opening an alternate data stream.
       * In setups which provide ldap(s) and/or https services, the private key
       for SSL/TLS encryption might be world readable. This typically happens
       in active directory domain controller setups.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
       (* Security fix *)
       Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini.
x/scim-1.4.14-arm-5.tgz: Rebuilt.
       --prefix=/usr had been omitted from the build-time configuration, resulting in
       some files being placed into /usr/local.
       Thanks to Jérôme Pinot
isolinux/initrd-versatile.img: Removed.
isolinux/uinitrd-armv7.img: Rebuilt.
       Added a lot of hardware support (kernel modules) to help with making it easier
       to support new ARMv7 machines in the future.
isolinux/*: Rebuilt.
kernels/versatile: Removed.
kernels/*: Upgraded.
pasture/*: Removed.
       The old content can be found in slackwarearm-14.1/pasture/
+--------------------------+
Mon Nov 4 19:50:32 UTC 2013

Slackware 14.1 ARM stable is released!

It's been another interesting release cycle here at Slackware bringing
updated compilers and development tools, the switch from MySQL to MariaDB,
and many more improvements throughout the system. Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.

Please consider supporting the Slackware project by purchasing goodies
from the Slackware Store - http://store.slackware.com
If you're an x86/x86_64 user, you can pick up a DVD copy and a subscription
too!

For donations to Slackware ARM specifically, a donations function exists
via PayPal:
       http://arm.slackware.com/sponsor/

Enjoy this release!
Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.