Slackware ChangeLogs
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
Current (pre-release) ChangeLog for x86 (32-bit)
Tue Jul 28 19:36:39 UTC 2015
n/bind-9.10.2_P3-i586-1.txz: Upgraded.
       This update fixes a security issue where an error in the handling of TKEY
       queries can be exploited by an attacker for use as a denial-of-service
       vector, as a constructed packet can use the defect to trigger a REQUIRE
       assertion failure, causing BIND to exit.
       Impact:
       Both recursive and authoritative servers are vulnerable to this defect.
       Additionally, exposure is not prevented by either ACLs or configuration
       options limiting or denying service because the exploitable code occurs
       early in the packet handling, before checks enforcing those boundaries.
       Operators should take steps to upgrade to a patched version as soon as
       possible.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
       https://kb.isc.org/article/AA-01272
       (* Security fix *)
+--------------------------+
Fri Jul 17 19:38:52 UTC 2015
n/httpd-2.4.16-i586-1.txz: Upgraded.
       This update fixes the following security issues:
       * CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local
       URL-path with the INCLUDES filter active, introduced in 2.4.11.
       * CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a
       script calls r:wsupgrade() can cause a child process crash.
       * CVE-2015-3183: core: Fix chunk header parsing defect. Remove
       apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
       filter, parse chunks in a single pass with zero copy. Limit accepted
       chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
       * CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
       httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
       (* Security fix *)
n/php-5.6.11-i586-1.txz: Upgraded.
       This update fixes some bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
       (* Security fix *)
xap/xscreensaver-5.33-i586-1.txz: Upgraded.
+--------------------------+
Sun Jul 12 04:28:10 UTC 2015
xap/mozilla-thunderbird-38.1.0-i586-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
testing/packages/e2fsprogs-1.43_WIP_20150518-i486-1.txz: Added.
+--------------------------+
Thu Jul 9 18:29:23 UTC 2015
a/kernel-firmware-20150709git-noarch-1.txz: Upgraded.
a/openssl-solibs-1.0.1p-i586-1.txz: Upgraded.
n/openssl-1.0.1p-i586-1.txz: Upgraded.
       This update fixes the following security issue:
       Alternative chains certificate forgery (CVE-2015-1793).
       During certificate verification, OpenSSL (starting from version 1.0.1n and
       1.0.2b) will attempt to find an alternative certificate chain if the first
       attempt to build such a chain fails. An error in the implementation of this
       logic can mean that an attacker could cause certain checks on untrusted
       certificates to be bypassed, such as the CA flag, enabling them to use a
       valid leaf certificate to act as a CA and "issue" an invalid certificate.
       This issue will impact any application that verifies certificates including
       SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
       This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
       This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
       Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
       For more information, see:
       https://openssl.org/news/secadv_20150709.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
       (* Security fix *)
+--------------------------+
Tue Jul 7 22:59:17 UTC 2015
ap/cups-2.0.3-i486-1.txz: Upgraded.
       This release fixes bugs and a couple of security issues:
       CWE-911: Improper Update of Reference Count - CVE-2015-1158
       This bug could allow an attacker to upload a replacement CUPS
       configuration file and mount further attacks.
       CWE-79: Improper Neutralization of Input During Web Page Generation
       (Cross-site Scripting) - CVE-2015-1159
       A cross-site scripting bug in the CUPS templating engine allows this
       bug to be exploited when a user browses the web. In certain cases,
       the CGI template can echo user input to file rather than escaping the
       text first. This may be used to set up a reflected XSS attack in
       the QUERY parameter of the web interface help page.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
       (* Security fix *)
ap/cups-filters-1.0.71-i486-1.txz: Upgraded.
       Fixed overflows and lack of bounds checking in texttopdf.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
       (* Security fix *)
ap/lm_sensors-3.3.5-i486-1.txz: Upgraded.
ap/nano-2.4.2-i486-1.txz: Upgraded.
ap/screen-4.3.1-i486-1.txz: Upgraded.
d/make-3.82-i486-6.txz: Rebuilt.
       Added whitespace handling patch from upstream. Thanks to Michele Ballabio.
d/python-2.7.10-i586-1.txz: Upgraded.
l/glade3-3.8.5-i586-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-base-1.4.5-i486-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-i486-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/gst-plugins-good-1.4.5-i486-1.txz: Upgraded.
l/gstreamer-1.4.5-i486-1.txz: Upgraded.
l/notify-python-0.1.1-i486-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
l/pygtk-2.24.0-i586-2.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
n/bind-9.10.2_P2-i486-1.txz: Upgraded.
       This update fixes a security issue where an attacker who can cause
       a validating resolver to query a zone containing specifically constructed
       contents can cause that resolver to fail an assertion and terminate due
       to a defect in validation code. This means that a recursive resolver that
       is performing DNSSEC validation can be deliberately stopped by an attacker
       who can cause the resolver to perform a query against a
       maliciously-constructed zone. This will result in a denial of service to
       clients who rely on that resolver.
       For more information, see:
       https://kb.isc.org/article/AA-01267/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
       (* Security fix *)
n/ntp-4.2.8p3-i486-1.txz: Upgraded.
       This update fixes a security issue where under specific circumstances an
       attacker can send a crafted packet to cause a vulnerable ntpd instance to
       crash. Since this requires 1) ntpd set up to allow remote configuration
       (not allowed by default), and 2) knowledge of the configuration password,
       and 3) access to a computer entrusted to perform remote configuration,
       the vulnerability is considered low-risk.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
       (* Security fix *)
x/scim-hangul-0.3.2-i486-4.txz: Rebuilt.
       Recompiled to eliminate remaining libpng14 references in .la files.
xap/imagemagick-6.9.1_7-i586-1.txz: Upgraded.
       Added --with-gcc-arch=$ARCH to fix illegal instruction errors on 32-bit
       platforms with non-AMD processors. Thanks to Kirils Solovjovs.
xap/mozilla-firefox-39.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/pidgin-2.10.11-i586-2.txz: Rebuilt.
       Patched to use gstreamer-1.x. Thanks to Heinz Wiesinger.
testing/source/config-testing-4.1.1/*: Added.
+--------------------------+
Fri Jun 12 17:58:45 UTC 2015
a/openssl-solibs-1.0.1o-i586-1.txz: Upgraded.
n/openssl-1.0.1o-i586-1.txz: Upgraded.
       New release to resolve 1.0.1n HMAC ABI incompatibility.
+--------------------------+
Thu Jun 11 21:31:47 UTC 2015
a/openssl-solibs-1.0.1n-i586-1.txz: Upgraded.
ap/screen-4.2.1-i486-2.txz: Rebuilt.
       Added some patches to fix corruption when using screen with a serial port.
       Thanks to Stuart Winter.
d/gdb-7.9.1-i486-1.txz: Upgraded.
l/qt-4.8.7-i586-1.txz: Upgraded.
n/openssl-1.0.1n-i586-1.txz: Upgraded.
       Fixes several bugs and security issues:
       o Malformed ECParameters causes infinite loop (CVE-2015-1788)
       o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
       o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
       o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
       o Race condition handling NewSessionTicket (CVE-2015-1791)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
       (* Security fix *)
n/php-5.6.9-i586-1.txz: Upgraded.
       This update fixes some bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
       (* Security fix *)
xap/mozilla-firefox-38.0.6-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-38.0.1-i586-1.txz: Upgraded.
+--------------------------+
Sun May 17 04:35:46 UTC 2015
xap/mozilla-firefox-38.0.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-31.7.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Wed May 13 02:29:39 UTC 2015
xap/mozilla-firefox-38.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
+--------------------------+
Tue May 12 07:17:33 UTC 2015
ap/mariadb-10.0.18-i586-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
       (* Security fix *)
n/wpa_supplicant-2.4-i486-2.txz: Rebuilt.
       This update fixes potential denial of service issues.
       For more information, see:
       http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
       http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
       http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
       http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
       (* Security fix *)
ap/terminus-font-4.39-noarch-1.txz: Upgraded.
l/libcanberra-0.30-i486-1.txz: Upgraded.
l/qt-4.8.6-i586-4.txz: Rebuilt.
       QNAM: Fix upload corruptions when server closes connection
       This patch fixes several upload corruptions if the server closes the
       connection while/before we send data into it.
       cherry picked from commit: qtbase/cff39fba10ffc10ee4dcfdc66ff6528eb
d/slacktrack-2.17-i486-1.txz: Upgraded.
       Thanks to Stuart Winter.
+--------------------------+
Mon May 4 04:15:20 UTC 2015
a/aaa_terminfo-5.9-i486-1.txz: Upgraded.
a/btrfs-progs-v3.18.2-i486-1.txz: Upgraded.
ap/cups-2.0.2-i486-3.txz: Rebuilt.
       Removed files that overlap with the cups-filter package.
ap/cups-filters-1.0.68-i486-2.txz: Rebuilt.
       Removed bundled version of foomatic-rip.
kde/calligra-2.9.4-i486-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.4-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.4-noarch-1.txz: Upgraded.
l/libidn-1.30-i486-1.txz: Upgraded.
       This is reported to fix hangs with Emacs and other programs.
       Thanks to 55020.
l/ncurses-5.9-i486-4.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20141206-patch.sh.
l/qt-4.8.6-i486-3.txz: Rebuilt.
       Upgraded the WebKit components to version 2.3.4, which uses gstreamer-1
       instead of gstreamer-0. This should fix conflicts with programs that
       use both WebKit and phonon. Thanks to Heinz Wiesinger.
x/libdrm-2.4.60-i586-1.txz: Upgraded.
x/mesa-10.5.4-i586-1.txz: Upgraded.
xfce/xfwm4-4.12.2-i486-2.txz: Rebuilt.
       Reverted to older xinitrc.xfce to fix problems starting Xfce from XDM.
       Thanks to comet.berkeley.
+--------------------------+
Wed Apr 29 05:10:52 UTC 2015
l/libxml2-2.9.2-i486-2.txz: Rebuilt.
       Reverted a patch that breaks the catalog. Thanks to Stuart Winter.
n/gnupg-1.4.19-i486-2.txz: Rebuilt.
       Patched to fix spurious debug messages that may break sbopkg and slackpkg.
       Thanks to Willy Sudiarto Raharjo.
+--------------------------+
Sun Apr 26 18:56:37 UTC 2015
l/shared-mime-info-1.3-i486-2.txz: Rebuilt.
       Patched to not hammer the system with fsync.
+--------------------------+
Sun Apr 26 16:50:47 UTC 2015
ap/cups-2.0.2-i486-2.txz: Rebuilt.
       Patched to fix high CPU load on one core when adding or removing printers.
+--------------------------+
Sat Apr 25 23:13:15 UTC 2015
ap/sqlite-3.8.9-i486-1.txz: Upgraded.
l/netpbm-10.66.02-i486-3.txz: Rebuilt.
       Fixed missing pnmtops. Thanks to Richard David Sherman.
n/gnupg2-2.0.27-i486-2.txz: Rebuilt.
       Patched to fix spurious debug messages that may break sbopkg and slackpkg.
       Thanks to Willy Sudiarto Raharjo.
tcl/tcl-8.6.4-i486-1.txz: Upgraded.
tcl/tk-8.6.4-i486-1.txz: Upgraded.
xap/MPlayer-20150425-i486-1.txz: Upgraded.
       Fixed runtime CPU detection. Thanks to Daniil Bratashov.
+--------------------------+
Sat Apr 25 02:37:47 UTC 2015
a/aaa_elflibs-14.1-i486-6.txz: Rebuilt.
       Added libstdc++.so.6.0.20.
a/cxxlibs-6.0.18-i486-1.txz: Removed.
a/mkinitrd-1.4.8-i486-4.txz: Rebuilt.
       In mkinitrd_command_generator.sh: fixed the kernel version detection, and
       muted the error about missing /sys hcd module directories.
       Blacklisted iphone-set-info to prevent the initrd from uselessly bloating.
       Thanks to Ryan P.C. McQuen, Eric Hameleers, and Dan Church.
d/gcc-4.9.2-i486-2.txz: Rebuilt.
       Recompiled with --enable-install-libiberty. Thanks to fskmh.
d/gcc-g++-4.9.2-i486-2.txz: Rebuilt.
d/gcc-gfortran-4.9.2-i486-2.txz: Rebuilt.
d/gcc-gnat-4.9.2-i486-2.txz: Rebuilt.
d/gcc-go-4.9.2-i486-2.txz: Rebuilt.
d/gcc-java-4.9.2-i486-2.txz: Rebuilt.
d/gcc-objc-4.9.2-i486-2.txz: Rebuilt.
d/llvm-3.6.0-i486-2.txz: Rebuilt.
       Fixed overly restrictive permissions on c++-analyzer, ccc-analyzer,
       scan-build, set-xcode-analyzer, and scan-view.
       Thanks to Ricardo Nabinger Sanchez.
l/gc-7.4.2-i486-2.txz: Rebuilt.
       Patched to fix "undefined reference to `GC_setup_mark_lock'", noticed while
       building inkscape. Thanks to Matteo Bernardini.
l/libmpc-1.0.3-i486-1.txz: Upgraded.
       Thanks to fskmh.
l/lzo-2.09-i486-1.txz: Upgraded.
l/netpbm-10.66.02-i486-2.txz: Rebuilt.
       Fixed libnetpbm.so symlink. Thanks to Matteo Bernardini.
n/crda-3.18-i486-2.txz: Rebuilt.
       Ensure libreg.so is installed in the proper lib directory.
       Thanks to Robby Workman.
n/iproute2-3.18.0-i486-2.txz: Rebuilt.
       Properly handle /etc/iproute2/nl_protos.new config file.
       Thanks to Wim Speekenbrink.
n/libgpg-error-1.18-i486-2.txz: Rebuilt.
       Compress info file, and remove /usr/info/dir from package.
       Thanks to Edward Trumbo.
       Don't build static library.
n/php-5.6.8-i486-2.txz: Rebuilt.
       Fixed permissions on /etc/httpd/. Thanks to Francisco Ambrozio.
n/rsync-3.1.1-i486-1.txz: Upgraded.
+--------------------------+
Tue Apr 21 23:44:00 UTC 2015
Greetings! It has indeed been far too long. I apologize for the absence
of updates lately, but we've been using the time to get some good work done.
This is not a beta (probably not even an alpha release yet), but it is also
not a drill. ;-) We've spared you all most of the pain while we
transitioned to a lot of new libraries that got major version number bumps,
and have tested everything to ensure that this will be a smooth upgrade.
Still, I'd be surprised if all this didn't introduce any regressions, so if
you find any problems let us know. Huge thanks are due to Robby Workman,
Heinz Wiesinger, Eric Hameleers, and Stuart Winter for all the help. Have fun!
a/aaa_elflibs-14.1-i486-5.txz: Rebuilt.
a/acl-2.2.52-i486-1.txz: Upgraded.
a/acpid-2.0.23-i486-1.txz: Upgraded.
a/attr-2.4.47-i486-1.txz: Upgraded.
a/cryptsetup-1.6.6-i486-1.txz: Upgraded.
a/dbus-1.8.16-i486-1.txz: Upgraded.
a/dosfstools-3.0.26-i486-1.txz: Upgraded.
a/ed-1.11-i486-1.txz: Upgraded.
a/etc-14.2-i486-1.txz: Upgraded.
       Added usbmux user to /etc/passwd.
a/file-5.22-i486-1.txz: Upgraded.
       Include the flat files in the package again.
       Compile /etc/file/magic.mgc from the flat files upon installation,
       and include a script in /etc/file/ to recompile from the flat files
       to handle any local additions.
       Thanks to Marco Maggi and Kees Theunissen.
a/gawk-4.1.1-i486-3.txz: Rebuilt.
a/gettext-0.19.4-i486-1.txz: Upgraded.
a/glibc-solibs-2.21-i486-2.txz: Rebuilt.
a/glibc-zoneinfo-2015c-noarch-1.txz: Upgraded.
a/gptfdisk-1.0.0-i486-1.txz: Upgraded.
a/hdparm-9.45-i486-1.txz: Upgraded.
a/infozip-6.0-i486-3.txz: Rebuilt.
a/kernel-generic-3.18.11-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.18.11_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.18.11-i486-1.txz: Upgraded.
       Config changes for the huge kernel:
       HW_RANDOM_VIRTIO m -> y
       SCSI_VIRTIO m -> y
       VIRTIO m -> y
       VIRTIO_BALLOON m -> y
       VIRTIO_BLK m -> y
       VIRTIO_CONSOLE m -> y
       VIRTIO_MMIO m -> y
       VIRTIO_NET m -> y
       VIRTIO_PCI m -> y
a/kernel-huge-smp-3.18.11_smp-i686-1.txz: Upgraded.
       Config changes for the huge-smp kernel:
       HW_RANDOM_VIRTIO m -> y
       SCSI_VIRTIO m -> y
       VIRTIO m -> y
       VIRTIO_BALLOON m -> y
       VIRTIO_BLK m -> y
       VIRTIO_CONSOLE m -> y
       VIRTIO_MMIO m -> y
       VIRTIO_NET m -> y
       VIRTIO_PCI m -> y
a/kernel-modules-3.18.11-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.18.11_smp-i686-1.txz: Upgraded.
a/kmod-20-i486-1.txz: Upgraded.
a/less-458-i486-1.txz: Upgraded.
a/logrotate-3.8.9-i486-1.txz: Upgraded.
a/lvm2-2.02.118-i486-1.txz: Upgraded.
a/mdadm-3.3.2-i486-1.txz: Upgraded.
a/mkinitrd-1.4.8-i486-3.txz: Rebuilt.
       Patched to fix a minor bug passing kernel options with -m.
       Thanks to hutyerah.
a/ntfs-3g-2015.3.14-i486-1.txz: Upgraded.
a/openssl-solibs-1.0.1m-i486-1.txz: Upgraded.
       Dropped the old .so.0 libraries.
a/reiserfsprogs-3.6.24-i486-1.txz: Upgraded.
a/smartmontools-6.3-i486-1.txz: Upgraded.
a/sysvinit-scripts-2.0-noarch-20.txz: Rebuilt.
       Initialize the system clock frequency and tick in rc.S, and various other
       clock handling improvements. Thanks to Xsane.
       Filter errors from .gvfs when unmounting local filesystems.
       Look for SDDM in rc.4.
a/udisks2-2.1.5-i486-1.txz: Upgraded.
a/upower-0.9.23-i486-1.txz: Upgraded.
a/usb_modeswitch-2.2.1-i486-1.txz: Upgraded.
a/xfsprogs-3.2.2-i486-1.txz: Upgraded.
a/xz-5.2.1-i486-1.tgz: Upgraded.
ap/alsa-utils-1.0.29-i486-1.txz: Upgraded.
ap/bc-1.06.95-i486-3.txz: Rebuilt.
ap/cdrtools-3.01a24-i486-1.txz: Upgraded.
ap/cups-2.0.2-i486-1.txz: Upgraded.
ap/cups-filters-1.0.68-i486-1.txz: Added.
ap/dmidecode-2.12-i486-1.txz: Upgraded.
ap/flac-1.3.1-i486-1.txz: Upgraded.
ap/foomatic-filters-4.0.17-i486-1.txz: Upgraded.
ap/ghostscript-9.16-i486-1.txz: Upgraded.
ap/gphoto2-2.5.6-i486-1.txz: Upgraded.
ap/gutenprint-5.2.10-i486-1.txz: Upgraded.
ap/hplip-3.15.2-i486-1.txz: Upgraded.
ap/htop-1.0.3-i486-1.txz: Upgraded.
ap/itstool-2.0.2-i486-1.txz: Upgraded.
ap/lsscsi-0.28-i486-1.txz: Upgraded.
ap/lzip-1.16-i486-1.txz: Upgraded.
ap/man-pages-3.82-noarch-1.txz: Upgraded.
ap/mariadb-10.0.17-i486-1.txz: Upgraded.
ap/nano-2.4.1-i486-1.txz: Upgraded.
ap/qpdf-5.1.2-i486-1.txz: Added.
ap/radeontool-1.6.3-i486-1.txz: Upgraded.
ap/sox-14.4.2-i486-1.txz: Upgraded.
ap/sqlite-3.8.8.3-i486-1.txz: Upgraded.
ap/tmux-1.9a-i486-1.txz: Upgraded.
ap/usbmuxd-1.0.9-i486-1.txz: Added.
ap/vim-7.4.692-i486-1.txz: Upgraded.
ap/xfsdump-3.1.4-i486-1.txz: Upgraded.
ap/zsh-5.0.7-i486-1.txz: Upgraded.
d/bison-3.0.4-i486-1.txz: Upgraded.
d/clisp-2.49-i486-3.txz: Rebuilt.
d/cmake-3.1.3-i486-1.txz: Upgraded.
d/doxygen-1.8.9.1-i486-1.txz: Upgraded.
d/flex-2.5.39-i486-1.txz: Upgraded.
d/gcc-4.9.2-i486-1.txz: Upgraded.
d/gcc-g++-4.9.2-i486-1.txz: Upgraded.
d/gcc-gfortran-4.9.2-i486-1.txz: Upgraded.
d/gcc-gnat-4.9.2-i486-1.txz: Upgraded.
d/gcc-go-4.9.2-i486-1.txz: Upgraded.
d/gcc-java-4.9.2-i486-1.txz: Upgraded.
d/gcc-objc-4.9.2-i486-1.txz: Upgraded.
d/gettext-tools-0.19.4-i486-1.txz: Upgraded.
d/git-2.3.5-i486-1.txz: Upgraded.
d/help2man-1.46.5-i486-1.txz: Upgraded.
d/kernel-headers-3.18.11_smp-x86-1.txz: Upgraded.
d/libtool-2.4.6-i486-1.txz: Upgraded.
d/llvm-3.6.0-i486-1.txz: Upgraded.
       Thanks to Heinz Wiesinger.
d/pkg-config-0.28-i486-1.txz: Upgraded.
d/python-2.7.9-i486-1.txz: Upgraded.
d/python-setuptools-14.3-i486-1.txz: Added.
d/rcs-5.9.4-i486-1.txz: Upgraded.
d/ruby-1.9.3_p551-i486-1.txz: Upgraded.
d/strace-4.10-i486-1.txz: Upgraded.
d/swig-2.0.12-i486-1.txz: Upgraded.
d/yasm-1.3.0-i486-1.txz: Upgraded.
e/emacs-24.5-i486-1.txz: Upgraded.
k/kernel-source-3.18.11_smp-noarch-1.txz: Upgraded.
kde/amarok-2.8.0-i486-2.txz: Rebuilt.
kde/amor-4.14.3-i486-1.txz: Added.
kde/analitza-4.14.3-i486-1.txz: Upgraded.
kde/ark-4.14.3-i486-1.txz: Upgraded.
kde/artikulate-4.14.3-i486-1.txz: Added.
kde/audiocd-kio-4.14.3-i486-1.txz: Upgraded.
kde/baloo-4.14.3-i486-1.txz: Added.
kde/baloo-widgets-4.14.3-i486-1.txz: Added.
kde/blinken-4.14.3-i486-1.txz: Upgraded.
kde/bluedevil-2.1.1-i486-1.txz: Upgraded.
kde/bomber-4.14.3-i486-1.txz: Upgraded.
kde/bovo-4.14.3-i486-1.txz: Upgraded.
kde/calligra-2.9.2-i486-1.txz: Upgraded.
kde/cantor-4.14.3-i486-1.txz: Upgraded.
kde/cervisia-4.14.3-i486-1.txz: Added.
kde/dolphin-plugins-4.14.3-i486-1.txz: Added.
kde/dragon-4.14.3-i486-1.txz: Upgraded.
kde/filelight-4.14.3-i486-1.txz: Upgraded.
kde/granatier-4.14.3-i486-1.txz: Upgraded.
kde/gwenview-4.14.3-i486-1.txz: Upgraded.
kde/juk-4.14.3-i486-1.txz: Upgraded.
kde/k3b-2.0.3-i486-1.txz: Upgraded.
kde/kaccessible-4.14.3-i486-1.txz: Upgraded.
kde/kactivities-4.13.3-i486-1.txz: Upgraded.
kde/kajongg-4.14.3-i486-1.txz: Added.
kde/kalgebra-4.14.3-i486-1.txz: Upgraded.
kde/kalzium-4.14.3-i486-1.txz: Upgraded.
kde/kamera-4.14.3-i486-1.txz: Upgraded.
kde/kanagram-4.14.3-i486-1.txz: Upgraded.
kde/kapman-4.14.3-i486-1.txz: Upgraded.
kde/kapptemplate-4.14.3-i486-1.txz: Added.
kde/kate-4.14.3-i486-1.txz: Upgraded.
kde/katomic-4.14.3-i486-1.txz: Upgraded.
kde/kblackbox-4.14.3-i486-1.txz: Upgraded.
kde/kblocks-4.14.3-i486-1.txz: Upgraded.
kde/kbounce-4.14.3-i486-1.txz: Upgraded.
kde/kbreakout-4.14.3-i486-1.txz: Upgraded.
kde/kbruch-4.14.3-i486-1.txz: Upgraded.
kde/kcachegrind-4.14.3-i486-1.txz: Added.
kde/kcalc-4.14.3-i486-1.txz: Upgraded.
kde/kcharselect-4.14.3-i486-1.txz: Upgraded.
kde/kcolorchooser-4.14.3-i486-1.txz: Upgraded.
kde/kcron-4.14.3-i486-1.txz: Added.
kde/kde-base-artwork-4.14.3-i486-1.txz: Upgraded.
kde/kde-baseapps-4.14.3-i486-1.txz: Upgraded.
kde/kde-dev-scripts-4.14.3-i486-1.txz: Added.
kde/kde-dev-utils-4.14.3-i486-1.txz: Added.
kde/kde-runtime-4.14.3-i486-1.txz: Upgraded.
kde/kde-wallpapers-4.14.3-noarch-1.txz: Upgraded.
kde/kde-workspace-4.11.17-i486-1.txz: Upgraded.
kde/kdeadmin-4.10.5-i486-1.txz: Removed.
kde/kdeartwork-4.14.3-i486-1.txz: Upgraded.
kde/kdeconnect-kde-0.8-i486-1.txz: Added.
kde/kdegraphics-mobipocket-4.14.3-i486-1.txz: Upgraded.
kde/kdegraphics-strigi-analyzer-4.14.3-i486-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-4.14.3-i486-1.txz: Upgraded.
kde/kdelibs-4.14.6-i486-1.txz: Upgraded.
kde/kdenetwork-4.10.5-i486-1.txz: Removed.
kde/kdenetwork-filesharing-4.14.3-i486-1.txz: Added.
kde/kdenetwork-strigi-analyzers-4.14.3-i486-1.txz: Added.
kde/kdepim-4.14.6-i486-1.txz: Upgraded.
kde/kdepim-runtime-4.14.6-i486-1.txz: Upgraded.
kde/kdepimlibs-4.14.6-i486-1.txz: Upgraded.
kde/kdeplasma-addons-4.14.3-i486-1.txz: Upgraded.
kde/kdesdk-4.10.5-i486-1.txz: Removed.
kde/kdesdk-kioslaves-4.14.3-i486-1.txz: Added.
kde/kdesdk-strigi-analyzers-4.14.3-i486-1.txz: Added.
kde/kdesdk-thumbnailers-4.14.3-i486-1.txz: Added.
kde/kdetoys-4.10.5-i486-1.txz: Removed.
kde/kdev-python-1.7.1-i486-1.txz: Added.
kde/kdevelop-4.7.1-i486-1.txz: Upgraded.
kde/kdevelop-php-1.7.1-i486-1.txz: Upgraded.
kde/kdevelop-php-docs-1.7.1-i486-1.txz: Upgraded.
kde/kdevplatform-1.7.1-i486-1.txz: Upgraded.
kde/kdewebdev-4.14.3-i486-1.txz: Upgraded.
kde/kdf-4.14.3-i486-1.txz: Upgraded.
kde/kdiamond-4.14.3-i486-1.txz: Upgraded.
kde/kfilemetadata-4.14.3-i486-1.txz: Added.
kde/kfloppy-4.14.3-i486-1.txz: Upgraded.
kde/kfourinline-4.14.3-i486-1.txz: Upgraded.
kde/kgamma-4.14.3-i486-1.txz: Upgraded.
kde/kgeography-4.14.3-i486-1.txz: Upgraded.
kde/kget-4.14.3-i486-1.txz: Added.
kde/kgoldrunner-4.14.3-i486-1.txz: Upgraded.
kde/kgpg-4.14.3-i486-1.txz: Upgraded.
kde/khangman-4.14.3-i486-1.txz: Upgraded.
kde/kig-4.14.3-i486-1.txz: Upgraded.
kde/kigo-4.14.3-i486-1.txz: Upgraded.
kde/killbots-4.14.3-i486-1.txz: Upgraded.
kde/kio-mtp-2063e75_20131020git-i486-1.txz: Upgraded.
kde/kiriki-4.14.3-i486-1.txz: Upgraded.
kde/kiten-4.14.3-i486-1.txz: Upgraded.
kde/kjumpingcube-4.14.3-i486-1.txz: Upgraded.
kde/klettres-4.14.3-i486-1.txz: Upgraded.
kde/klickety-4.14.3-i486-1.txz: Upgraded.
kde/klines-4.14.3-i486-1.txz: Upgraded.
kde/kmag-4.14.3-i486-1.txz: Upgraded.
kde/kmahjongg-4.14.3-i486-1.txz: Upgraded.
kde/kmines-4.14.3-i486-1.txz: Upgraded.
kde/kmix-4.14.3-i486-1.txz: Upgraded.
kde/kmousetool-4.14.3-i486-1.txz: Upgraded.
kde/kmouth-4.14.3-i486-1.txz: Upgraded.
kde/kmplot-4.14.3-i486-1.txz: Upgraded.
kde/knavalbattle-4.14.3-i486-1.txz: Upgraded.
kde/knetwalk-4.14.3-i486-1.txz: Upgraded.
kde/kolf-4.14.3-i486-1.txz: Upgraded.
kde/kollision-4.14.3-i486-1.txz: Upgraded.
kde/kolourpaint-4.14.3-i486-1.txz: Upgraded.
kde/kompare-4.14.3-i486-1.txz: Added.
kde/konquest-4.14.3-i486-1.txz: Upgraded.
kde/konsole-4.14.3-i486-1.txz: Upgraded.
kde/kopete-4.14.3-i486-1.txz: Added.
kde/korundum-4.14.3-i486-1.txz: Upgraded.
kde/kpat-4.14.3-i486-1.txz: Upgraded.
kde/kppp-4.14.3-i486-1.txz: Added.
kde/kqtquickcharts-4.14.3-i486-1.txz: Added.
kde/krdc-4.14.3-i486-1.txz: Added.
kde/kremotecontrol-4.14.3-i486-1.txz: Upgraded.
kde/kreversi-4.14.3-i486-1.txz: Upgraded.
kde/krfb-4.14.3-i486-1.txz: Added.
kde/kross-interpreters-4.14.3-i486-1.txz: Upgraded.
kde/kruler-4.14.3-i486-1.txz: Upgraded.
kde/ksaneplugin-4.14.3-i486-1.txz: Upgraded.
kde/kscreen-1.0.2.1-i486-1.txz: Upgraded.
kde/kshisen-4.14.3-i486-1.txz: Upgraded.
kde/ksirk-4.14.3-i486-1.txz: Upgraded.
kde/ksnakeduel-4.14.3-i486-1.txz: Upgraded.
kde/ksnapshot-4.14.3-i486-1.txz: Upgraded.
kde/kspaceduel-4.14.3-i486-1.txz: Upgraded.
kde/ksquares-4.14.3-i486-1.txz: Upgraded.
kde/kstars-4.14.3-i486-1.txz: Upgraded.
kde/ksudoku-4.14.3-i486-1.txz: Upgraded.
kde/ksystemlog-4.14.3-i486-1.txz: Added.
kde/kteatime-4.14.3-i486-1.txz: Added.
kde/ktimer-4.14.3-i486-1.txz: Upgraded.
kde/ktouch-4.14.3-i486-1.txz: Upgraded.
kde/ktuberling-4.14.3-i486-1.txz: Upgraded.
kde/kturtle-4.14.3-i486-1.txz: Upgraded.
kde/ktux-4.14.3-i486-1.txz: Added.
kde/kubrick-4.14.3-i486-1.txz: Upgraded.
kde/kuser-4.14.3-i486-1.txz: Added.
kde/kwallet-4.10.5-i486-1.txz: Removed.
kde/kwalletmanager-4.14.3-i486-1.txz: Added.
kde/kwebkitpart-1.3.4-i486-1.txz: Upgraded.
kde/kwordquiz-4.14.3-i486-1.txz: Upgraded.
kde/libkcddb-4.14.3-i486-1.txz: Upgraded.
kde/libkcompactdisc-4.14.3-i486-1.txz: Upgraded.
kde/libkdcraw-4.14.3-i486-1.txz: Upgraded.
kde/libkdeedu-4.14.3-i486-1.txz: Upgraded.
kde/libkdegames-4.14.3-i486-1.txz: Upgraded.
kde/libkexiv2-4.14.3-i486-1.txz: Upgraded.
kde/libkipi-4.14.3-i486-1.txz: Upgraded.
kde/libkmahjongg-4.14.3-i486-1.txz: Upgraded.
kde/libkomparediff2-4.14.3-i486-1.txz: Added.
kde/libksane-4.14.3-i486-1.txz: Upgraded.
kde/libkscreen-1.0.5-i486-1.txz: Upgraded.
kde/libktorrent-1.3.1-i486-2.txz: Rebuilt.
kde/libmm-qt-1.0.1-i486-1.txz: Added.
kde/libnm-qt-0.9.8.3-i486-1.txz: Added.
kde/lokalize-4.14.3-i486-1.txz: Added.
kde/lskat-4.14.3-i486-1.txz: Upgraded.
kde/marble-4.14.3-i486-1.txz: Upgraded.
kde/mplayerthumbs-4.14.3-i486-1.txz: Upgraded.
kde/nepomuk-core-4.14.3-i486-1.txz: Upgraded.
kde/nepomuk-widgets-4.14.3-i486-1.txz: Upgraded.
kde/networkmanagement-0.9.0.9-i486-1.txz: Removed.
kde/okteta-4.14.3-i486-1.txz: Added.
kde/okular-4.14.3-i486-1.txz: Upgraded.
kde/oxygen-gtk2-1.4.6-i486-1.txz: Upgraded.
kde/oxygen-gtk3-1.4.1-i486-1.txz: Upgraded.
kde/oxygen-icons-4.14.3-i486-1.txz: Upgraded.
kde/pairs-4.14.3-i486-1.txz: Upgraded.
kde/palapeli-4.14.3-i486-1.txz: Upgraded.
kde/parley-4.14.3-i486-1.txz: Upgraded.
kde/partitionmanager-1.1.1-i486-1.txz: Added.
kde/perlkde-4.14.3-i486-1.txz: Upgraded.
kde/perlqt-4.14.3-i486-1.txz: Upgraded.
kde/picmi-4.14.3-i486-1.txz: Upgraded.
kde/plasma-nm-0.9.3.5-i486-1.txz: Added.
kde/poxml-4.14.3-i486-1.txz: Added.
kde/print-manager-4.14.3-i486-1.txz: Upgraded.
kde/pykde4-4.14.3-i486-1.txz: Upgraded.
kde/qtruby-4.14.3-i486-1.txz: Upgraded.
kde/rocs-4.14.3-i486-1.txz: Upgraded.
kde/skanlite-1.1-i486-1.txz: Upgraded.
kde/smokegen-4.14.3-i486-1.txz: Upgraded.
kde/smokekde-4.14.3-i486-1.txz: Upgraded.
kde/smokeqt-4.14.3-i486-1.txz: Upgraded.
kde/step-4.14.3-i486-1.txz: Upgraded.
kde/superkaramba-4.14.3-i486-1.txz: Upgraded.
kde/svgpart-4.14.3-i486-1.txz: Upgraded.
kde/sweeper-4.14.3-i486-1.txz: Upgraded.
kde/umbrello-4.14.3-i486-1.txz: Added.
kde/zeroconf-ioslave-4.14.3-i486-1.txz: Added.
kdei/calligra-l10n-bs-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca@valencia-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz: Removed.
kdei/calligra-l10n-fi-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz: Removed.
kdei/calligra-l10n-nl-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.9.2-noarch-1.txz: Added.
kdei/calligra-l10n-uk-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.9.2-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.9.2-noarch-1.txz: Upgraded.
kdei/kde-l10n-ar-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-bg-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-bs-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ca-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ca@valencia-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-cs-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-da-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-de-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-el-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-en_GB-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-es-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-et-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-eu-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-fa-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-fi-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-fr-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ga-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-gl-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-he-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-hi-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-hr-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-hu-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ia-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-id-4.14.3-noarch-1.txz: Added.
kdei/kde-l10n-is-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-it-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ja-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-kk-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-km-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ko-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-lt-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-lv-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-mr-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-nb-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-nds-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-nl-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-nn-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-pa-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-pl-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-pt-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-pt_BR-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ro-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ru-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-si-4.10.5-noarch-1.txz: Removed.
kdei/kde-l10n-sk-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-sl-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-sr-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-sv-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-tg-4.10.5-noarch-1.txz: Removed.
kdei/kde-l10n-th-4.10.5-noarch-1.txz: Removed.
kdei/kde-l10n-tr-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-ug-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-uk-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-vi-4.10.5-noarch-1.txz: Removed.
kdei/kde-l10n-wa-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-zh_CN-4.14.3-noarch-1.txz: Upgraded.
kdei/kde-l10n-zh_TW-4.14.3-noarch-1.txz: Upgraded.
l/LibRaw-0.16.0-i486-1.txz: Added.
l/a52dec-0.7.4-i486-1.txz: Added.
l/adwaita-icon-theme-3.14.1-noarch-1.txz: Added.
l/akonadi-1.13.0-i486-1.txz: Upgraded.
l/alsa-lib-1.0.29-i486-1.txz: Upgraded.
l/alsa-oss-1.0.28-i486-1.txz: Upgraded.
l/at-spi2-atk-2.14.1-i486-1.txz: Upgraded.
l/at-spi2-core-2.14.1-i486-1.txz: Upgraded.
l/atk-2.14.0-i486-1.txz: Upgraded.
l/attica-0.4.2-i486-1.txz: Upgraded.
l/boost-1.58.0-i486-1.txz: Upgraded.
l/cairo-1.14.2-i486-1.txz: Upgraded.
l/dbus-glib-0.104-i486-1.txz: Upgraded.
l/dconf-0.22.0-i486-1.txz: Upgraded.
l/desktop-file-utils-0.22-i486-1.txz: Upgraded.
l/djvulibre-3.5.25.3-i486-2.txz: Rebuilt.
l/eigen3-3.2.4-i486-1.txz: Added.
l/exiv2-0.24-i486-1.txz: Upgraded.
l/fftw-3.3.4-i486-1.txz: Upgraded.
l/freetype-2.5.5-i486-2.txz: Rebuilt.
l/fuse-2.9.3-i486-1.txz: Upgraded.
l/gc-7.4.2-i486-1.txz: Upgraded.
l/gcr-3.14.0-i486-1.txz: Upgraded.
l/gd-2.1.1-i486-1.txz: Upgraded.
l/gdk-pixbuf2-2.30.8-i486-1.txz: Upgraded.
l/gegl-0.2.0-i486-3.txz: Rebuilt.
l/giflib-5.1.1-i486-1.txz: Upgraded.
l/glade3-3.8.5-i486-1.txz: Upgraded.
l/glib-networking-2.42.1-i486-1.txz: Upgraded.
l/glib2-2.42.2-i486-1.txz: Upgraded.
l/glibc-2.21-i486-2.txz: Rebuilt.
l/glibc-i18n-2.21-i486-2.txz: Rebuilt.
l/glibc-profile-2.21-i486-2.txz: Rebuilt.
l/gmime-2.6.20-i486-1.txz: Upgraded.
l/gnome-icon-theme-3.8.3-i486-1.txz: Removed.
       This has been replaced by the adwaita-icon-theme package.
l/gnome-keyring-3.14.0-i486-1.txz: Upgraded.
l/gnome-themes-standard-3.14.2.3-i486-1.txz: Upgraded.
l/gobject-introspection-1.42.0-i486-1.txz: Upgraded.
l/grantlee-0.5.1-i486-1.txz: Upgraded.
l/gsettings-desktop-schemas-3.14.1-i486-1.txz: Upgraded.
l/gst-plugins-base-1.4.4-i486-1.txz: Upgraded.
l/gst-plugins-base0-0.10.36-i486-1.txz: Added.
l/gst-plugins-good-1.4.4-i486-1.txz: Upgraded.
l/gst-plugins-good0-0.10.31-i486-1.txz: Added.
l/gstreamer-1.4.4-i486-1.txz: Upgraded.
l/gstreamer0-0.10.36-i486-1.txz: Added.
l/gtk+2-2.24.27-i486-1.txz: Upgraded.
l/gtk+3-3.14.12-i486-1.txz: Upgraded.
l/gtkspell-2.0.16-i486-2.txz: Rebuilt.
l/gvfs-1.22.4-i486-1.txz: Upgraded.
l/harfbuzz-0.9.40-i486-1.txz: Upgraded.
l/hicolor-icon-theme-0.13-noarch-1.txz: Upgraded.
l/hunspell-1.3.3-i486-1.txz: Upgraded.
l/icu4c-54.1-i486-1.txz: Upgraded.
l/ilmbase-2.2.0-i486-1.txz: Upgraded.
l/imlib-1.9.15-i486-7.txz: Removed.
l/iso-codes-3.57-noarch-1.txz: Upgraded.
l/jasper-1.900.1-i486-4.txz: Rebuilt.
l/jemalloc-3.6.0-i486-1.txz: Added.
l/judy-1.0.5-i486-1.txz: Added.
l/lcms-1.19-i486-3.txz: Rebuilt.
l/lcms2-2.7-i486-1.txz: Upgraded.
l/libao-1.2.0-i486-1.txz: Upgraded.
l/libbluedevil-2.1-i486-1.txz: Upgraded.
l/libcanberra-0.29-i486-2.txz: Rebuilt.
l/libcddb-1.3.2-i486-3.txz: Upgraded.
l/libcdio-0.93-i486-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-i486-1.txz: Added.
l/libdiscid-0.6.1-i486-1.txz: Upgraded.
l/libdvdnav-5.0.3-i486-1.txz: Added.
l/libdvdread-5.0.3-i486-1.txz: Upgraded.
l/libelf-0.8.13-i486-5.txz: Rebuilt.
l/libfakekey-0.1-i486-1.txz: Added.
l/libffi-3.2.1-i486-1.txz: Upgraded.
l/libglade-2.6.4-i486-5.txz: Rebuilt.
l/libgnome-keyring-3.12.0-i486-1.txz: Upgraded.
l/libgphoto2-2.5.7-i486-1.txz: Upgraded.
l/libgpod-0.8.3-i486-1.txz: Upgraded.
l/libgsf-1.14.33-i486-1.txz: Upgraded.
l/libimobiledevice-1.2.0-i486-1.txz: Added.
l/libiodbc-3.52.10-i486-1.txz: Upgraded.
l/libjpeg-turbo-1.4.0-i486-1.txz: Added.
l/libjpeg-v8a-i486-2.txz: Removed.
l/liblastfm-1.0.9-i486-1.txz: Upgraded.
l/libmng-2.0.2-i486-1.txz: Upgraded.
l/libmtp-1.1.8-i486-1.txz: Upgraded.
l/libnl3-3.2.25-i486-1.txz: Upgraded.
l/libnotify-0.7.6-i486-1.txz: Upgraded.
l/libodfgen-0.1.3-i486-1.txz: Added.
l/libogg-1.3.2-i486-1.txz: Upgraded.
l/libplist-1.12-i486-1.txz: Upgraded.
l/libpng-1.6.16-i486-1.txz: Upgraded.
l/libraw1394-2.1.0-i486-1.txz: Upgraded.
l/librevenge-0.0.2-i486-1.txz: Added.
l/librsvg-2.40.9-i486-1.txz: Upgraded.
l/libsecret-0.18-i486-1.txz: Upgraded.
l/libsigsegv-2.10-i486-1.txz: Added.
l/libsoup-2.48.1-i486-1.txz: Upgraded.
l/libssh-0.6.4-i486-1.txz: Upgraded.
       This update fixes some security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
       (* Security fix *)
l/libtasn1-4.3-i486-1.txz: Upgraded.
l/libtiff-4.0.3-i486-1.txz: Upgraded.
l/libusbmuxd-1.0.10-i486-1.txz: Added.
l/libvncserver-0.9.10-i486-1.txz: Upgraded.
l/libvorbis-1.3.5-i486-1.txz: Upgraded.
l/libvpx-1.3.0-i486-1.txz: Added.
l/libwmf-0.2.8.4-i486-6.txz: Rebuilt.
l/libwmf-docs-0.2.8.4-noarch-6.txz: Rebuilt.
l/libwnck-2.31.0-i486-1.txz: Upgraded.
l/libwpd-0.10.0-i486-1.txz: Upgraded.
l/libxklavier-5.4-i486-1.txz: Upgraded.
l/libxml2-2.9.2-i486-1.txz: Upgraded.
l/libxslt-1.1.28-i486-2.txz: Rebuilt.
l/lzo-2.08-i486-1.txz: Upgraded.
l/netpbm-10.66.02-i486-1.txz: Upgraded.
l/newt-0.52.18-i486-1.txz: Added.
l/openexr-2.2.0-i486-1.txz: Upgraded.
l/openjpeg-2.1.0-i486-1.txz: Added.
l/orc-0.4.22-i486-1.txz: Added.
l/pango-1.36.8-i486-1.txz: Upgraded.
l/pcre-8.36-i486-1.txz: Upgraded.
l/phonon-4.8.3-i486-1.txz: Upgraded.
l/phonon-gstreamer-4.8.2-i486-1.txz: Upgraded.
l/phonon-mplayer-1b1fd1f_20110823git-i486-1.txz: Removed.
l/phonon-xine-4.4.4-i486-1.txz: Removed.
l/pil-1.1.7-i486-4.txz: Removed.
l/pilot-link-0.12.5-i486-8.txz: Rebuilt.
l/polkit-gnome-0.102-i486-2.txz: Rebuilt.
l/poppler-0.32.0-i486-1.txz: Upgraded.
l/poppler-data-0.4.7-noarch-1.txz: Upgraded.
l/pycairo-1.10.0-i486-1.txz: Upgraded.
l/pycups-1.9.70-i486-1.txz: Upgraded.
l/python-pillow-2.7.0-i486-1.txz: Added.
l/qt-4.8.6-i486-2.txz: Rebuilt.
       Fixed issues with BMP, ICO, and GIF handling that could lead to a denial
       of service or the execution of arbitrary code when processing malformed
       images.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860
       (* Security fix *)
l/qt-gstreamer-1.2.0-i486-1.txz: Added.
l/raptor2-2.0.15-i486-1.txz: Upgraded.
l/sdl-1.2.15-i486-2.txz: Rebuilt.
l/seamonkey-solibs-2.33.1-i486-1.txz: Upgraded.
l/shared-desktop-ontologies-0.11.0-i486-1.txz: Upgraded.
l/shared-mime-info-1.3-i486-1.txz: Upgraded.
l/slang-2.3.0-i486-1.txz: Upgraded.
l/soprano-2.9.4-i486-1.txz: Upgraded.
l/strigi-0.7.8-i486-1.txz: Upgraded.
l/svgalib-1.9.25-i486-3.txz: Rebuilt.
l/v4l-utils-1.6.2-i486-1.txz: Upgraded.
l/virtuoso-ose-6.1.8-i486-1.txz: Upgraded.
l/vte-0.28.2-i486-3.txz: Rebuilt.
l/wavpack-4.70.0-i486-1.txz: Upgraded.
l/xapian-core-1.2.17-i486-1.txz: Added.
n/ModemManager-1.4.4-i486-1.txz: Upgraded.
n/NetworkManager-1.0.0-i486-1.txz: Upgraded.
n/bind-9.10.2-i486-1.txz: Upgraded.
       Fix some denial-of-service and other security issues.
       For more information, see:
       https://kb.isc.org/article/AA-01166/
       https://kb.isc.org/article/AA-01161/
       https://kb.isc.org/article/AA-01167/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214
       (* Security fix *)
n/bluez-4.101-i486-1.txz: Upgraded.
n/bluez-hcidump-2.5-i486-1.txz: Upgraded.
n/crda-3.18-i486-1.txz: Upgraded.
n/curl-7.41.0-i486-1.txz: Upgraded.
n/dhcp-4.3.2-i486-1.txz: Upgraded.
n/dhcpcd-6.8.1-i486-1.txz: Upgraded.
n/dirmngr-1.1.1-i486-2.txz: Rebuilt.
n/dnsmasq-2.72-i486-1.txz: Upgraded.
n/fetchmail-6.3.26-i486-1.txz: Upgraded.
n/getmail-4.47.0-i486-1.txz: Upgraded.
n/gnupg-1.4.19-i486-1.txz: Upgraded.
       * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
       See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
       * Fixed data-dependent timing variations in modular exponentiation
       [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
       are Practical].
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
       (* Security fix *)
n/gnupg2-2.0.27-i486-1.txz: Upgraded.
n/gpa-0.9.7-i486-1.txz: Upgraded.
n/gpgme-1.5.3-i486-1.txz: Upgraded.
n/httpd-2.4.12-i486-1.txz: Upgraded.
       This update fixes the following security issues:
       * CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer
       over-read, with response headers' size above 8K.
       * CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an
       empty value. PR 56924.
       * CVE-2014-8109 mod_lua: Fix handling of the Require line when a
       LuaAuthzProvider is used in multiple Require directives with
       different arguments. PR57204.
       * CVE-2013-5704 core: HTTP trailers could be used to replace HTTP
       headers late during request processing, potentially undoing or
       otherwise confusing modules that examined or modified request
       headers earlier. Adds "MergeTrailers" directive to restore legacy
       behavior.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
       (* Security fix *)
n/iproute2-3.18.0-i486-1.txz: Upgraded.
n/iptables-1.4.21-i486-1.txz: Upgraded.
n/irssi-0.8.17-i486-1.txz: Upgraded.
n/lftp-4.6.1-i486-1.txz: Upgraded.
n/libassuan-2.2.0-i486-1.txz: Upgraded.
n/libgcrypt-1.6.3-i486-1.txz: Upgraded.
       * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
       See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
       * Fixed data-dependent timing variations in modular exponentiation
       [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
       are Practical].
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
       (* Security fix *)
n/libgpg-error-1.18-i486-1.txz: Upgraded.
n/libksba-1.3.2-i486-1.txz: Upgraded.
n/libmbim-1.12.2-i486-1.txz: Upgraded.
n/libndp-1.4-i486-1.txz: Added.
n/libnftnl-1.0.3-i486-1.txz: Upgraded.
n/libqmi-1.12.6-i486-1.txz: Upgraded.
n/links-2.9-i486-1.txz: Upgraded.
n/mutt-1.5.23-i486-2.txz: Rebuilt.
       Patched a vulnerability where malformed headers can cause mutt to crash.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
       (* Security fix *)
n/net-snmp-5.7.3-i486-1.txz: Upgraded.
n/netatalk-2.2.3-i486-5.txz: Rebuilt.
n/netkit-ftp-0.17-i486-2.txz: Rebuilt.
n/nfs-utils-1.3.1-i486-1.txz: Upgraded.
n/nftables-0.4-i486-1.txz: Upgraded.
n/ntp-4.2.8p2-i486-1.txz: Upgraded.
       In addition to bug fixes and enhancements, this release fixes the
       following medium-severity vulnerabilities involving private key
       authentication:
       * ntpd accepts unauthenticated packets with symmetric key crypto.
       * Authentication doesn't protect symmetric associations against DoS attacks.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
       (* Security fix *)
n/obex-data-server-0.4.6-i486-3.txz: Rebuilt.
n/openssl-1.0.1m-i486-1.txz: Upgraded.
       Fixes several bugs and security issues:
       o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
       o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
       o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
       o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
       o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
       o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
       o Removed the export ciphers from the DEFAULT ciphers
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
       (* Security fix *)
n/p11-kit-0.23.1-i486-1.txz: Upgraded.
n/php-5.6.8-i486-1.txz: Upgraded.
       This update fixes some security issues.
       Please note that this package build also moves the configuration files
       from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
       (* Security fix *)
n/pinentry-0.9.1-i486-1.txz: Upgraded.
n/popa3d-1.0.3-i486-1.txz: Upgraded.
n/ppp-2.4.7-i486-1.txz: Upgraded.
       Fixed a potential security issue in parsing option files.
       Fixed remotely triggerable PID overflow that causes pppd to crash.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310
       (* Security fix *)
n/proftpd-1.3.5-i486-1.txz: Upgraded.
       Patched an issue where mod_copy allowed unauthenticated copying
       of files via SITE CPFR/CPTO.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
       (* Security fix *)
n/samba-4.2.1-i486-1.txz: Upgraded.
n/slrn-1.0.2-i486-1.txz: Upgraded.
n/tftp-hpa-5.2-i486-2.txz: Rebuilt.
n/tin-2.2.1-i486-2.txz: Rebuilt.
n/wget-1.16.3-i486-1.txz: Upgraded.
n/whois-5.2.7-i486-1.txz: Upgraded.
n/wpa_supplicant-2.4-i486-1.txz: Upgraded.
t/tetex-3.0-i486-10.txz: Rebuilt.
t/tetex-doc-3.0-i486-10.txz: Rebuilt.
t/transfig-3.2.5e-i486-3.txz: Rebuilt.
t/xfig-3.2.5c-i486-3.txz: Rebuilt.
x/bdftopcf-1.0.5-i486-1.txz: Upgraded.
x/bitmap-1.0.8-i486-1.txz: Upgraded.
x/compiz-0.8.8-i486-2.txz: Rebuilt.
x/font-util-1.3.1-i486-1.txz: Upgraded.
x/fontconfig-2.11.1-i486-2.txz: Rebuilt.
x/fontsproto-2.1.3-noarch-1.txz: Upgraded.
x/fslsfonts-1.0.5-i486-1.txz: Upgraded.
x/fstobdf-1.0.6-i486-1.txz: Upgraded.
x/iceauth-1.0.7-i486-1.txz: Upgraded.
x/libX11-1.6.3-i486-1.txz: Upgraded.
x/libXaw3dXft-1.6.2d-i486-1.txz: Added.
x/libXdmcp-1.1.2-i486-1.txz: Upgraded.
x/libXfont-1.5.1-i486-1.txz: Upgraded.
x/libXft-2.3.2-i486-2.txz: Rebuilt.
x/libXp-1.0.3-i486-1.txz: Upgraded.
x/libXvMC-1.0.9-i486-1.txz: Upgraded.
x/libXxf86vm-1.1.4-i486-1.txz: Upgraded.
x/libevdev-1.4.1-i486-1.txz: Upgraded.
x/libpciaccess-0.13.3-i486-1.txz: Upgraded.
x/libva-1.5.1-i486-1.txz: Added.
x/libva-intel-driver-1.5.1-i486-1.txz: Added.
x/libvdpau-1.1-i486-1.txz: Upgraded.
x/libxshmfence-1.2-i486-1.txz: Upgraded.
x/mesa-10.5.3-i486-1.txz: Upgraded.
       Thanks to Robby Workman and Heinz Wiesinger.
x/mkfontscale-1.1.2-i486-1.txz: Upgraded.
x/motif-2.3.4-i486-2.txz: Rebuilt.
x/randrproto-1.4.1-noarch-1.txz: Upgraded.
x/rgb-1.0.6-i486-1.txz: Upgraded.
x/scim-1.4.15-i486-1.txz: Upgraded.
x/sessreg-1.1.0-i486-1.txz: Upgraded.
x/showfont-1.0.5-i486-1.txz: Upgraded.
x/xcalc-1.0.6-i486-1.txz: Upgraded.
x/xcb-util-0.4.0-i486-1.txz: Upgraded.
x/xcb-util-cursor-0.1.2-i486-1.txz: Upgraded.
x/xcb-util-image-0.4.0-i486-1.txz: Upgraded.
x/xcb-util-keysyms-0.4.0-i486-1.txz: Upgraded.
x/xcursorgen-1.0.6-i486-2.txz: Rebuilt.
x/xdg-utils-1.1.0_rc3-noarch-1.txz: Upgraded.
x/xdm-1.1.11-i486-5.txz: Rebuilt.
x/xedit-1.2.2-i486-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-i486-7.txz: Rebuilt.
x/xf86-input-aiptek-1.4.1-i486-7.txz: Rebuilt.
x/xf86-input-evdev-2.9.2-i486-1.txz: Upgraded.
x/xf86-input-joystick-1.6.1-i486-7.txz: Rebuilt.
x/xf86-input-keyboard-1.8.0-i486-2.txz: Rebuilt.
x/xf86-input-mouse-1.9.1-i486-2.txz: Rebuilt.
x/xf86-input-penmount-1.5.0-i486-7.txz: Rebuilt.
x/xf86-input-synaptics-1.8.2-i486-1.txz: Upgraded.
x/xf86-input-vmmouse-13.0.0-i486-6.txz: Rebuilt.
x/xf86-input-void-1.4.0-i486-7.txz: Rebuilt.
x/xf86-input-wacom-0.19.0-i486-6.txz: Rebuilt.
x/xf86-video-apm-1.2.5-i486-6.txz: Rebuilt.
x/xf86-video-ark-0.7.5-i486-6.txz: Rebuilt.
x/xf86-video-ast-1.0.1-i486-2.txz: Rebuilt.
x/xf86-video-ati-7.5.0-i486-1.txz: Upgraded.
x/xf86-video-chips-1.2.5-i486-6.txz: Rebuilt.
x/xf86-video-cirrus-1.5.2-i486-6.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-i486-3.txz: Rebuilt.
x/xf86-video-glint-1.2.8-i486-6.txz: Rebuilt.
x/xf86-video-i128-1.3.6-i486-6.txz: Rebuilt.
x/xf86-video-i740-1.3.5-i486-1.txz: Upgraded.
x/xf86-video-intel-2.99.917-i486-1.txz: Upgraded.
x/xf86-video-mach64-6.9.4-i486-6.txz: Rebuilt.
x/xf86-video-mga-1.6.4-i486-1.txz: Upgraded.
x/xf86-video-modesetting-0.9.0-i486-2.txz: Rebuilt.
x/xf86-video-neomagic-1.2.8-i486-4.txz: Rebuilt.
x/xf86-video-nouveau-1.0.11-i486-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-i486-7.txz: Rebuilt.
x/xf86-video-openchrome-0.3.3-i486-4.txz: Rebuilt.
x/xf86-video-r128-6.9.2-i486-3.txz: Rebuilt.
x/xf86-video-rendition-4.2.5-i486-6.txz: Rebuilt.
x/xf86-video-s3-0.6.5-i486-6.txz: Rebuilt.
x/xf86-video-s3virge-1.10.6-i486-7.txz: Rebuilt.
x/xf86-video-savage-2.3.7-i486-3.txz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-i486-7.txz: Rebuilt.
x/xf86-video-sis-0.10.7-i486-7.txz: Rebuilt.
x/xf86-video-sisusb-0.9.6-i486-6.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-i486-1.txz: Upgraded.
x/xf86-video-tga-1.2.2-i486-6.txz: Rebuilt.
x/xf86-video-trident-1.3.7-i486-1.txz: Upgraded.
x/xf86-video-tseng-1.2.5-i486-6.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-i486-11.txz: Rebuilt.
x/xf86-video-vesa-2.3.3-i486-3.txz: Rebuilt.
x/xf86-video-vmware-13.1.0-i486-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-i486-7.txz: Rebuilt.
x/xf86-video-xgi-git_5a3e0de677b7-i486-1.txz: Upgraded.
x/xf86-video-xgixp-1.8.1-i486-6.txz: Rebuilt.
x/xfsinfo-1.0.5-i486-1.txz: Upgraded.
x/xinit-1.3.4-i486-1.txz: Upgraded.
x/xkbcomp-1.3.0-i486-1.txz: Upgraded.
x/xman-1.1.4-i486-1.txz: Upgraded.
x/xorg-server-1.16.4-i486-1.txz: Upgraded.
x/xorg-server-xephyr-1.16.4-i486-1.txz: Upgraded.
x/xorg-server-xnest-1.16.4-i486-1.txz: Upgraded.
x/xorg-server-xvfb-1.16.4-i486-1.txz: Upgraded.
x/xproto-7.0.27-noarch-1.txz: Upgraded.
x/xterm-318-i486-1.txz: Upgraded.
x/xtrans-1.3.5-noarch-1.txz: Upgraded.
xap/MPlayer-20150403-i486-1.txz: Upgraded.
       Upgraded to MPlayer from trunk built against ffmpeg-2.6.1.
xap/audacious-3.6.1-i486-1.txz: Upgraded.
xap/audacious-plugins-3.6.1-i486-1.txz: Upgraded.
xap/blueman-r708-i486-4.txz: Rebuilt.
xap/electricsheep-20090306-i486-4.txz: Rebuilt.
xap/fvwm-2.6.5-i486-7.txz: Rebuilt.
xap/geeqie-20150329git-i486-1.txz: Upgraded.
xap/gftp-2.0.19-i486-4.txz: Rebuilt.
xap/gimp-2.8.14-i486-2.txz: Rebuilt.
xap/gnuchess-6.2.1-i486-1.txz: Upgraded.
       Upgraded to gnuchess-6.2.1 and xboard-4.8.0.
xap/gnuplot-4.6.6-i486-1.txz: Upgraded.
xap/gucharmap-3.12.1-i486-1.txz: Upgraded.
xap/imagemagick-6.9.0_10-i486-1.txz: Upgraded.
xap/mozilla-firefox-37.0.2-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.6.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/network-manager-applet-1.0.0-i486-1.txz: Upgraded.
xap/rdesktop-1.8.3-i486-1.txz: Upgraded.
xap/sane-1.0.24-i486-2.txz: Rebuilt.
xap/seamonkey-2.33.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
xap/vim-gvim-7.4.692-i486-1.txz: Upgraded.
xap/windowmaker-0.95.6-i486-1.txz: Upgraded.
xap/xaos-3.6-i686-1.txz: Upgraded.
xap/xchat-2.8.8-i486-10.txz: Rebuilt.
xap/xfractint-20.04p13-i486-1.txz: Upgraded.
xap/xine-lib-1.2.6-i686-1.txz: Upgraded.
xap/xine-ui-0.99.9-i686-1.txz: Upgraded.
xap/xlockmore-5.46-i486-1.txz: Upgraded.
xap/xpaint-2.9.10.3-i486-1.txz: Upgraded.
xap/xsane-0.999-i486-1.txz: Upgraded.
xap/xscreensaver-5.32-i486-1.txz: Upgraded.
xap/xv-3.10a-i486-7.txz: Rebuilt.
xfce/Thunar-1.6.7-i486-1.txz: Upgraded.
xfce/exo-0.10.4-i486-1.txz: Upgraded.
xfce/garcon-0.4.0-i486-1.txz: Upgraded.
xfce/gtk-xfce-engine-2.10.1-i486-1.txz: Upgraded.
xfce/libxfce4ui-4.12.1-i486-1.txz: Upgraded.
xfce/libxfce4util-4.12.1-i486-1.txz: Upgraded.
xfce/libxfcegui4-4.10.0-i486-2.txz: Removed.
xfce/orage-4.12.1-i486-1.txz: Upgraded.
xfce/thunar-volman-0.8.1-i486-1.txz: Upgraded.
xfce/tumbler-0.1.31-i486-1.txz: Upgraded.
xfce/xfce4-appfinder-4.12.0-i486-1.txz: Upgraded.
xfce/xfce4-clipman-plugin-1.2.3-i486-3.txz: Rebuilt.
xfce/xfce4-dev-tools-4.12.0-i486-1.txz: Upgraded.
xfce/xfce4-mixer-4.10.0-i486-1.txz: Upgraded.
xfce/xfce4-notifyd-0.2.4-i486-2.txz: Rebuilt.
xfce/xfce4-panel-4.12.0-i486-1.txz: Upgraded.
xfce/xfce4-power-manager-1.4.4-i486-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.8.2-i486-1.txz: Upgraded.
xfce/xfce4-session-4.12.1-i486-1.txz: Upgraded.
xfce/xfce4-settings-4.12.0-i486-1.txz: Upgraded.
xfce/xfce4-systemload-plugin-1.1.2-i486-1.txz: Upgraded.
xfce/xfce4-taskmanager-1.1.0-i486-1.txz: Upgraded.
xfce/xfce4-terminal-0.6.3-i486-1.txz: Upgraded.
xfce/xfce4-volumed-0.1.13-i486-2.txz: Rebuilt.
xfce/xfce4-weather-plugin-0.8.5-i486-1.txz: Upgraded.
xfce/xfconf-4.12.0-i486-1.txz: Upgraded.
xfce/xfdesktop-4.12.1-i486-1.txz: Upgraded.
xfce/xfwm4-4.12.2-i486-1.txz: Upgraded.
xfce/xfwm4-themes-4.10.0-i486-1.txz: Removed.
extra/linux-3.18.11-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/config-testing-4.0/*: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
usb-and-pxe-installers/usbimg2disk.sh: Patched to fix sfdisk bug.
       Thanks to Tim Thomas.
+--------------------------+
Thu Mar 5 21:56:15 UTC 2015
a/util-linux-2.26-i486-2.txz: Rebuilt.
       Removed dangling tunelp symlink. Thanks to Jesu Feran.
n/samba-4.2.0-i486-1.txz: Upgraded.
       This package fixes security issues since the last update:
       BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer
       in netlogon server could lead to security vulnerability.
       BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference
       a NULL pointer.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
       (* Security fix *)
n/wget-1.16.2-i486-1.txz: Upgraded.
xap/mozilla-firefox-36.0.1-i486-1.txz: Upgraded.
extra/google-chrome/google-chrome.SlackBuild: Patched.
       Fixed google-chrome repackaging script due to the change from lzma to xz.
       Thanks to Jennifer Doering.
+--------------------------+
Thu Feb 26 01:06:11 UTC 2015
ap/vim-7.4.640-i486-1.txz: Upgraded.
d/gdb-7.9-i486-1.txz: Upgraded.
n/nmap-6.47-i486-1.txz: Upgraded.
x/glew-1.10.0-i486-2.txz: Rebuilt.
       Added libGLEWmx to the package. Thanks to Klaatu and Larry Hajali.
xap/fluxbox-1.3.7-i486-1.txz: Upgraded.
xap/mozilla-firefox-36.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.5.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/vim-gvim-7.4.640-i486-1.txz: Upgraded.
xap/xchat-2.8.8-i486-9.txz: Rebuilt.
       Don't force the use of SSLv3, since many sites are dropping support for it.
       Thanks to Schism.
+--------------------------+
Sat Feb 21 00:00:27 UTC 2015
a/lilo-24.1-i486-1.txz: Upgraded.
       Filter fdisk output to fix detecting Linux partitions.
a/sysvinit-scripts-2.0-noarch-19.txz: Rebuilt.
       Removed -w from grep in rc.S to detect rtc ioports correctly.
       Thanks to Xsane.
a/util-linux-2.26-i486-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
       Patched to fix issues with EFI and GPT since switching to the new fdisk.
       Thanks to Ryan P.C. McQuen and Jonathan Li for the helpful hints.
usb-and-pxe-installers/usbboot.img: Rebuilt.
       Patched to fix issues with EFI and GPT since switching to the new fdisk.
       Thanks to Ryan P.C. McQuen and Jonathan Li for the helpful hints.
+--------------------------+
Mon Feb 16 19:33:36 UTC 2015
a/aaa_elflibs-14.1-i486-4.txz: Rebuilt.
a/btrfs-progs-20150213-i486-1.txz: Upgraded.
a/coreutils-8.23-i486-1.txz: Upgraded.
a/e2fsprogs-1.42.12-i486-1.txz: Upgraded.
a/glibc-solibs-2.21-i486-1.txz: Upgraded.
a/glibc-zoneinfo-2015a-noarch-1.txz: Upgraded.
a/kernel-firmware-20150212git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.33-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.33_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.33-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.33_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.33-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.33_smp-i686-1.txz: Upgraded.
a/patch-2.7.4-i486-1.txz: Upgraded.
       Patch no longer follows symbolic links to input and output files. This
       ensures that symbolic links created by git-style patches cannot cause
       patch to write outside the working directory.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
       (* Security fix *)
a/sharutils-4.15-i486-1.txz: Upgraded.
a/sysvinit-scripts-2.0-noarch-18.txz: Rebuilt.
       Patched the init scripts to produce nicer output from the new versions
       of mount/umount. Run the GTK+/FDo registry rebuilds in the background
       to speed up boot time. Optimize the search for icon cache files by only
       looking in the directories they might be in, rather than all directories
       under /usr/share/icons.
a/util-linux-2.25.2-i486-1.txz: Upgraded.
ap/sudo-1.8.12-i486-1.txz: Upgraded.
       This update fixes a potential security issue by only passing the TZ
       environment variable it is considered safe. This prevents exploiting bugs
       in glibc's TZ parser that could be used to read files that the user does
       not have access to, or to cause a denial of service.
       For more information, see:
       http://www.sudo.ws/sudo/alerts/tz.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
       (* Security fix *)
d/guile-2.0.11-i486-2.txz: Rebuilt.
       Recompiled against readline-6.3.
d/kernel-headers-3.14.33_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.33_smp-noarch-1.txz: Upgraded.
l/glibc-2.21-i486-1.txz: Upgraded.
l/glibc-i18n-2.21-i486-1.txz: Upgraded.
l/glibc-profile-2.21-i486-1.txz: Upgraded.
l/parted-3.2-i486-1.txz: Upgraded.
l/readline-6.3-i486-1.txz: Upgraded.
l/seamonkey-solibs-2.32.1-i486-1.txz: Upgraded.
n/ntp-4.2.8p1-i486-1.txz: Upgraded.
       Changed rc.ntpd to no longer save the system time to the hardware clock.
       This had been done in an effort to stop a time skew that may well have
       been caused by other issues with hwclock and the kernel. If removing
       this code causes any issues to return, let me know. Thanks to Xsane.
xap/seamonkey-2.32.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
extra/linux-3.14.33-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jan 28 19:23:00 UTC 2015
a/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded.
       Upgraded to tzcode2014j and tzdata2014j.
a/patch-2.7.2-i486-1.txz: Upgraded.
xap/mozilla-firefox-35.0.1-i486-1.txz: Upgraded.
+--------------------------+
Wed Jan 21 03:10:01 UTC 2015
d/gdb-7.8.2-i486-1.txz: Upgraded.
n/alpine-2.20-i486-1.txz: Upgraded.
n/imapd-2.20-i486-1.txz: Upgraded.
n/samba-4.1.16-i486-1.txz: Upgraded.
       This update is a security release in order to address CVE-2014-8143
       (Elevation of privilege to Active Directory Domain Controller).
       Samba's AD DC allows the administrator to delegate creation of user or
       computer accounts to specific users or groups. However, all released
       versions of Samba's AD DC did not implement the additional required
       check on the UF_SERVER_TRUST_ACCOUNT bit in the userAccountControl
       attributes. Most Samba deployments are not of the AD Domain Controller,
       but are of the classic domain controller, the file server or print server.
       Only the Active Directory Domain Controller is affected by this issue.
       Additionally, most sites running the AD Domain Controller do not configure
       delegation for the creation of user or computer accounts, and so are not
       vulnerable to this issue, as no writes are permitted to the
       userAccountControl attribute, no matter what the value.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143
       (* Security fix *)
+--------------------------+
Sat Jan 17 04:26:41 UTC 2015
a/kernel-generic-3.14.29-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.29_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.29-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.29_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.29-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.29_smp-i686-1.txz: Upgraded.
d/gcc-4.8.4-i486-1.txz: Upgraded.
d/gcc-g++-4.8.4-i486-1.txz: Upgraded.
d/gcc-gfortran-4.8.4-i486-1.txz: Upgraded.
d/gcc-gnat-4.8.4-i486-1.txz: Upgraded.
d/gcc-go-4.8.4-i486-1.txz: Upgraded.
d/gcc-java-4.8.4-i486-1.txz: Upgraded.
d/gcc-objc-4.8.4-i486-1.txz: Upgraded.
d/kernel-headers-3.14.29_smp-x86-1.txz: Upgraded.
d/libtool-2.4.4-i486-1.txz: Upgraded.
k/kernel-source-3.14.29_smp-noarch-1.txz: Upgraded.
l/freetype-2.5.5-i486-1.txz: Upgraded.
       This release fixes a security bug that could cause freetype to crash
       or run programs upon opening a specially crafted file.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
       (* Security fix *)
l/seamonkey-solibs-2.32-i486-1.txz: Upgraded.
xap/mozilla-firefox-35.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.4.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.32-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
extra/linux-3.14.29-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Jan 9 17:47:53 UTC 2015
a/openssl-solibs-1.0.1k-i486-1.txz: Upgraded.
       (* Security fix *)
n/openssl-1.0.1k-i486-1.txz: Upgraded.
       This update fixes several security issues:
       DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
       DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
       no-ssl3 configuration sets method to NULL (CVE-2014-3569)
       ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
       RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
       DH client certificates accepted without verification [Server] (CVE-2015-0205)
       Certificate fingerprints can be modified (CVE-2014-8275)
       Bignum squaring may produce incorrect results (CVE-2014-3570)
       For more information, see:
       https://www.openssl.org/news/secadv_20150108.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
       (* Security fix *)
xap/fluxbox-1.3.6-i486-1.txz: Upgraded.
+--------------------------+
Tue Dec 23 00:05:23 UTC 2014
a/kernel-generic-3.14.27-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.27_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.27-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.27_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.27-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.27_smp-i686-1.txz: Upgraded.
ap/vim-7.4.560-i486-1.txz: Upgraded.
d/kernel-headers-3.14.27_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.27_smp-noarch-1.txz: Upgraded.
l/libusb-1.0.19-i486-1.txz: Upgraded.
l/libusb-compat-0.1.5-i486-1.txz: Upgraded.
n/ntp-4.2.8-i486-1.txz: Upgraded.
       In addition to bug fixes and enhancements, this release fixes
       several high-severity vulnerabilities discovered by Neel Mehta
       and Stephen Roettger of the Google Security Team.
       For more information, see:
       https://www.kb.cert.org/vuls/id/852879
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
       (* Security fix *)
n/php-5.4.36-i486-1.txz: Upgraded.
       This update fixes bugs and security issues.
       #68545 (NULL pointer dereference in unserialize.c).
       #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142)
       #68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
       (* Security fix *)
x/libdrm-2.4.58-i486-1.txz: Upgraded.
x/libvdpau-0.9-i486-1.txz: Added.
       Thanks to Heinz Wiesinger.
x/mesa-10.3.5-i486-1.txz: Upgraded.
x/xorg-server-1.15.2-i486-3.txz: Rebuilt.
       This update fixes many security issues discovered by Ilja van Sprundel,
       a security researcher with IOActive.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103
       (* Security fix *)
x/xorg-server-xephyr-1.15.2-i486-3.txz: Rebuilt.
x/xorg-server-xnest-1.15.2-i486-3.txz: Rebuilt.
x/xorg-server-xvfb-1.15.2-i486-3.txz: Rebuilt.
xap/MPlayer-1.1_20130819-i486-3.txz: Rebuilt.
       Recompiled with support for libvdpau.
xap/vim-gvim-7.4.560-i486-1.txz: Upgraded.
extra/linux-3.14.27-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/config-testing-3.18.1/*: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Dec 11 01:18:35 UTC 2014
a/gptfdisk-0.8.10-i486-1.txz: Upgraded.
l/seamonkey-solibs-2.31-i486-1.txz: Upgraded.
n/bind-9.10.1_P1-i486-1.txz: Upgraded.
       This update fixes a security issue where a failure to place limits on
       delegation chaining can allow an attacker to crash BIND or cause memory
       exhaustion.
       For more information, see:
       https://kb.isc.org/article/AA-01216
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
       (* Security fix *)
n/openssh-6.7p1-i486-2.txz: Rebuilt.
       Restored support for tcpwrappers that was dropped by upstream.
       Thanks to mancha.
n/openvpn-2.3.6-i486-1.txz: Upgraded.
       This update fixes a security issue that allows remote authenticated
       users to cause a denial of service (server crash) via a small control
       channel packet.
       For more information, see:
       https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104
       (* Security fix *)
n/wpa_supplicant-2.3-i486-1.txz: Upgraded.
       This update fixes a remote command-execution vulnerability caused by a
       failure to adequately sanitize user-supplied input.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686
       (* Security fix *)
xap/pidgin-2.10.11-i486-1.txz: Upgraded.
       This update contains login fixes for MSN and some XMPP servers.
xap/seamonkey-2.31-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Wed Dec 3 07:03:12 UTC 2014
xap/mozilla-thunderbird-31.3.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Mon Dec 1 23:57:40 UTC 2014
a/grep-2.21-i486-1.txz: Upgraded.
ap/groff-1.22.3-i486-1.txz: Upgraded.
xap/mozilla-firefox-34.0.5-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
+--------------------------+
Sun Nov 16 22:41:20 UTC 2014
a/kernel-generic-3.14.24-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.24_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.24-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.24_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.24-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.24_smp-i686-1.txz: Upgraded.
d/kernel-headers-3.14.24_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.24_smp-noarch-1.txz: Upgraded.
xap/mozilla-firefox-33.1.1-i486-1.txz: Upgraded.
extra/linux-3.14.24-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/config-testing-3.17.3/*: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Nov 13 20:45:54 UTC 2014
ap/mariadb-5.5.40-i486-2.txz: Rebuilt.
       Reverted change to my_config.h that breaks compiling many applications
       that link against the MariaDB libraries.
       Thanks to Willy Sudiarto Raharjo.
xap/pidgin-2.10.10-i486-2.txz: Rebuilt.
       Fix Gadu-Gadu protocol when GnuTLS is not used. Thanks to mancha.
+--------------------------+
Tue Nov 11 04:53:57 UTC 2014
xap/mozilla-firefox-33.1-i486-1.txz: Upgraded.
+--------------------------+
Fri Nov 7 21:02:55 UTC 2014
a/bash-4.3.030-i486-1.txz: Upgraded.
       Applied all upstream patches. The previously applied patch requiring
       a specific prefix/suffix in order to parse variables for functions
       closed all of the known vulnerabilities anyway, but it's clear that
       until all the patches were applied that the "is this still vulnerable"
       questions were not going to end...
a/btrfs-progs-20141107-i486-1.txz: Upgraded.
       Added the header files to the package. Thanks to Vincent Batts.
a/kernel-firmware-20141106git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.23-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.23_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.23-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.23_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.23-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.23_smp-i686-1.txz: Upgraded.
ap/mpg123-1.21.0-i486-1.txz: Upgraded.
d/kernel-headers-3.14.23_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.23_smp-noarch-1.txz: Upgraded.
xfce/xfce4-weather-plugin-0.8.4-i486-1.txz: Upgraded.
extra/linux-3.14.23-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Nov 4 00:05:23 UTC 2014
ap/mariadb-5.5.40-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
       (* Security fix *)
l/seamonkey-solibs-2.30-i486-1.txz: Upgraded.
n/php-5.4.34-i486-1.txz: Upgraded.
       This update fixes bugs and security issues.
       #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
       #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
       #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
       (* Security fix *)
xap/mozilla-firefox-33.0.2-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/seamonkey-2.30-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Wed Oct 29 18:21:12 UTC 2014
ap/moc-2.5.0-i486-1.txz: Upgraded.
n/wget-1.16-i486-1.txz: Upgraded.
       This update fixes a symlink vulnerability that could allow an attacker
       to write outside of the expected directory.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
       (* Security fix *)
+--------------------------+
Sat Oct 25 04:30:31 UTC 2014
xap/gimp-2.8.14-i486-1.txz: Upgraded.
+--------------------------+
Fri Oct 24 21:11:15 UTC 2014
a/glibc-solibs-2.20-i486-2.txz: Rebuilt.
d/gcc-4.8.3-i486-2.txz: Rebuilt.
       Patched bug pr61801, which caused some failures with glibc-2.20.
d/gcc-g++-4.8.3-i486-2.txz: Rebuilt.
d/gcc-gfortran-4.8.3-i486-2.txz: Rebuilt.
d/gcc-gnat-4.8.3-i486-2.txz: Rebuilt.
d/gcc-go-4.8.3-i486-2.txz: Rebuilt.
d/gcc-java-4.8.3-i486-2.txz: Rebuilt.
d/gcc-objc-4.8.3-i486-2.txz: Rebuilt.
l/glibc-2.20-i486-2.txz: Rebuilt.
       Recompiled with patched gcc.
l/glibc-i18n-2.20-i486-2.txz: Rebuilt.
l/glibc-profile-2.20-i486-2.txz: Rebuilt.
+--------------------------+
Fri Oct 24 04:55:44 UTC 2014
a/glibc-solibs-2.20-i486-1.txz: Upgraded.
a/glibc-zoneinfo-2014i-noarch-1.txz: Upgraded.
       Upgraded to tzcode2014i and tzdata2014i.
l/glibc-2.20-i486-1.txz: Upgraded.
       This update fixes several security issues, and adds an extra security
       hardening patch from Florian Weimer. Thanks to mancha for help with
       tracking and backporting patches.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040
       (* Security fix *)
l/glibc-i18n-2.20-i486-1.txz: Upgraded.
l/glibc-profile-2.20-i486-1.txz: Upgraded.
xap/pidgin-2.10.10-i486-1.txz: Upgraded.
       This update fixes several security issues:
       Insufficient SSL certificate validation (CVE-2014-3694)
       Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
       Remote crash parsing malformed Groupwise message (CVE-2014-3696)
       Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
       Potential information leak from XMPP (CVE-2014-3698)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
       (* Security fix *)
+--------------------------+
Tue Oct 21 02:10:33 UTC 2014
e/emacs-24.4-i486-1.txz: Upgraded.
+--------------------------+
Mon Oct 20 22:21:45 UTC 2014
n/openssh-6.7p1-i486-1.txz: Upgraded.
       This update fixes a security issue that allows remote servers to trigger
       the skipping of SSHFP DNS RR checking by presenting an unacceptable
       HostCertificate.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
       (* Security fix *)
+--------------------------+
Wed Oct 15 17:28:59 UTC 2014
a/openssl-solibs-1.0.1j-i486-1.txz: Upgraded.
       (* Security fix *)
n/openssl-1.0.1j-i486-1.txz: Upgraded.
       This update fixes several security issues:
       SRTP Memory Leak (CVE-2014-3513):
       A flaw in the DTLS SRTP extension parsing code allows an attacker, who
       sends a carefully crafted handshake message, to cause OpenSSL to fail
       to free up to 64k of memory causing a memory leak. This could be
       exploited in a Denial Of Service attack.
       Session Ticket Memory Leak (CVE-2014-3567):
       When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
       integrity of that ticket is first verified. In the event of a session
       ticket integrity check failing, OpenSSL will fail to free memory
       causing a memory leak. By sending a large number of invalid session
       tickets an attacker could exploit this issue in a Denial Of Service
       attack.
       SSL 3.0 Fallback protection:
       OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
       to block the ability for a MITM attacker to force a protocol
       downgrade.
       Some client applications (such as browsers) will reconnect using a
       downgraded protocol to work around interoperability bugs in older
       servers. This could be exploited by an active man-in-the-middle to
       downgrade connections to SSL 3.0 even if both sides of the connection
       support higher protocols. SSL 3.0 contains a number of weaknesses
       including POODLE (CVE-2014-3566).
       Build option no-ssl3 is incomplete (CVE-2014-3568):
       When OpenSSL is configured with "no-ssl3" as a build option, servers
       could accept and complete a SSL 3.0 handshake, and clients could be
       configured to send them.
       For more information, see:
       https://www.openssl.org/news/secadv_20141015.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
       (* Security fix *)
+--------------------------+
Tue Oct 14 23:45:01 UTC 2014
xap/mozilla-firefox-33.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.2.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Sun Oct 5 00:38:31 UTC 2014
a/elilo-3.16-i486-1.txz: Upgraded.
       Thanks to fsLeg for the extra bit of sed that was needed to build the
       latest version.
xap/mozilla-firefox-32.0.3-i486-2.txz: Rebuilt.
       Recompiled with -O2 optimization to fix sluggishness on the 32-bit build.
+--------------------------+
Mon Sep 29 18:41:23 UTC 2014
a/bash-4.3.027-i486-1.txz: Upgraded.
       Another bash update. Here's some information included with the patch:
       "This patch changes the encoding bash uses for exported functions to avoid
       clashes with shell variables and to avoid depending only on an environment
       variable's contents to determine whether or not to interpret it as a shell
       function."
       After this update, an environment variable will not go through the parser
       unless it follows this naming structure: BASH_FUNC_*%%
       Most scripts never expected to import functions from environment variables,
       so this change (although not backwards compatible) is not likely to break
       many existing scripts. It will, however, close off access to the parser as
       an attack surface in the vast majority of cases. There's already another
       vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
       but this hardening patch prevents it (and likely many more similar ones).
       Thanks to Florian Weimer and Chet Ramey.
       (* Security fix *)
+--------------------------+
Sun Sep 28 23:07:39 UTC 2014
l/seamonkey-solibs-2.29.1-i486-1.txz: Upgraded.
xap/mozilla-firefox-32.0.3-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.1.2-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.29.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Fri Sep 26 22:23:32 UTC 2014
a/bash-4.3.026-i486-1.txz: Upgraded.
       This is essentially a rebuild as the preliminary patch for CVE-2014-7169
       has been accepted by upstream and is now signed. This also bumps the
       patchlevel, making it easy to tell this is the fixed version.
       Possibly more changes to come, given the ongoing discussions on oss-sec.
+--------------------------+
Thu Sep 25 19:55:13 UTC 2014
a/bash-4.3.025-i486-2.txz: Rebuilt.
       Patched an additional trailing string processing vulnerability discovered
       by Tavis Ormandy.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
       (* Security fix *)
ap/lxc-1.0.6-i486-1.txz: Upgraded.
       Fixed bash completion file. Thanks to dunric.
+--------------------------+
Wed Sep 24 22:52:53 UTC 2014
a/bash-4.3.025-i486-1.txz: Upgraded.
       This update fixes a vulnerability in bash related to how environment
       variables are processed: trailing code in function definitions was
       executed, independent of the variable name. In many common configurations
       (such as the use of CGI scripts), this vulnerability is exploitable over
       the network. Thanks to Stephane Chazelas for discovering this issue.
       For more information, see:
       http://seclists.org/oss-sec/2014/q3/650
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
       (* Security fix *)
l/mozilla-nss-3.16.5-i486-1.txz: Upgraded.
       Fixed an RSA Signature Forgery vulnerability.
       For more information, see:
       https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
       (* Security fix *)
+--------------------------+
Tue Sep 9 22:48:58 UTC 2014
a/btrfs-progs-20140909-i486-1.txz: Upgraded.
n/net-snmp-5.7.2.1-i486-1.txz: Upgraded.
       Patched to properly report Btrfs mounts in hrFS/hrStorage tables.
       Thanks to Jakub Jankowski.
+--------------------------+
Tue Sep 9 18:01:05 UTC 2014
a/kernel-firmware-20140909git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.18-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.18_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.18-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.18_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.18-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.18_smp-i686-1.txz: Upgraded.
d/kernel-headers-3.14.18_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.18_smp-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.29-i486-1.txz: Upgraded.
xap/rdesktop-1.8.2-i486-1.txz: Upgraded.
xap/seamonkey-2.29-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       (* Security fix *)
extra/linux-3.14.18-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
       Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
       Use syslinux-nomtools on the installer. Thanks to Didier Spaier.
+--------------------------+
Thu Sep 4 19:43:25 UTC 2014
xap/mozilla-firefox-32.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.1.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
n/php-5.4.32-i486-1.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
       (* Security fix *)
+--------------------------+
Thu Aug 28 23:17:47 UTC 2014
l/mozilla-nss-3.16.4-i486-1.txz: Upgraded.
       Upgraded to nss-3.16.4 and nspr-4.10.7.
+--------------------------+
Mon Aug 25 22:02:08 UTC 2014
a/kernel-generic-3.14.17-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.17-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.17-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.17_smp-i686-1.txz: Upgraded.
a/libcgroup-0.41-i486-1.txz: Upgraded.
d/kernel-headers-3.14.17_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.17_smp-noarch-1.txz: Upgraded.
       Changed these kernel options:
       CONNECTOR m -> y
       +PROC_EVENTS y
       Thanks to linuxxer.
l/freetype-2.5.3-i486-1.txz: Upgraded.
n/tin-2.2.1-i486-1.txz: Upgraded.
x/libxcb-1.11-i486-1.txz: Upgraded.
x/mesa-10.2.6-i486-1.txz: Upgraded.
       Upgraded to MesaLib-10.2.6 and mesa-demos-8.2.0.
x/xcb-proto-1.11-i486-1.txz: Upgraded.
x/xf86-input-mouse-1.9.1-i486-1.txz: Upgraded.
x/xf86-video-ast-1.0.1-i486-1.txz: Upgraded.
x/xfs-1.1.4-i486-1.txz: Upgraded.
x/xorg-server-1.15.2-i486-2.txz: Rebuilt.
       Added these explicit options for all X servers:
       --enable-kdrive-evdev --enable-kdrive-kbd --enable-kdrive-mouse
       Thanks to Dinithion.
x/xorg-server-xephyr-1.15.2-i486-2.txz: Rebuilt.
x/xorg-server-xnest-1.15.2-i486-2.txz: Rebuilt.
x/xorg-server-xvfb-1.15.2-i486-2.txz: Rebuilt.
x/xrandr-1.4.3-i486-1.txz: Upgraded.
extra/linux-3.14.17-nosmp-sdk/*: Upgraded.
extra/xf86-video-fbdev/xf86-video-fbdev-0.4.4-i486-2.txz: Rebuilt.
       Fix ABI mismatch. Thanks to dr.s.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Aug 8 19:02:50 UTC 2014
Welcome pi kernel! Unless we reach kernel 3.14.159, this is probably the best
approximation we're going to get. :-)
a/kernel-firmware-20140807git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.16-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.16_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.16-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.16_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.16-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.16_smp-i686-1.txz: Upgraded.
a/openssl-solibs-1.0.1i-i486-1.txz: Upgraded.
       (* Security fix *)
d/kernel-headers-3.14.16_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.16_smp-noarch-1.txz: Upgraded.
n/openssl-1.0.1i-i486-1.txz: Upgraded.
       This update fixes several security issues:
       Double Free when processing DTLS packets (CVE-2014-3505)
       DTLS memory exhaustion (CVE-2014-3506)
       DTLS memory leak from zero-length fragments (CVE-2014-3507)
       Information leak in pretty printing functions (CVE-2014-3508)
       Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
       OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
       OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
       SRP buffer overrun (CVE-2014-3512)
       Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
       For more information, see:
       https://www.openssl.org/news/secadv_20140806.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
       (* Security fix *)
extra/linux-3.14.16-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Aug 4 20:55:26 UTC 2014
a/gpm-1.20.7-i486-3.txz: Rebuilt.
       Removed the mouse-t.el file, which is older than the version in Emacs.
       Thanks to Richard Cranium.
+--------------------------+
Fri Aug 1 21:13:18 UTC 2014
n/dhcpcd-6.0.5-i486-3.txz: Rebuilt.
       This update fixes a security issue where a specially crafted packet
       received from a malicious DHCP server causes dhcpcd to enter an infinite
       loop causing a denial of service.
       Thanks to Tobias Stoeckmann for the bug report.
       (* Security fix *)
n/samba-4.1.11-i486-1.txz: Upgraded.
       This update fixes a remote code execution attack on unauthenticated nmbd
       NetBIOS name services. A malicious browser can send packets that may
       overwrite the heap of the target nmbd NetBIOS name services daemon.
       It may be possible to use this to generate a remote code execution
       vulnerability as the superuser (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
       (* Security fix *)
xap/xscreensaver-5.29-i486-2.txz: Rebuilt.
       Disabled nag screen that says "This version of XScreenSaver is very old!
       Please upgrade!" when the age of the software exceeds 12 months.
+--------------------------+
Wed Jul 30 00:08:00 UTC 2014
d/gdb-7.8-i486-1.txz: Upgraded.
d/guile-2.0.11-i486-1.txz: Upgraded.
x/libXext-1.3.3-i486-1.txz: Upgraded.
x/libXi-1.7.4-i486-1.txz: Upgraded.
x/xf86-video-geode-2.11.16-i486-1.txz: Upgraded.
x/xf86-video-intel-2.99.914-i486-1.txz: Upgraded.
x/xterm-310-i486-1.txz: Upgraded.
+--------------------------+
Wed Jul 23 23:00:34 UTC 2014
a/kernel-generic-3.14.13-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.13_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.13-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.13_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.13-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.13_smp-i686-1.txz: Upgraded.
ap/nano-2.3.6-i486-1.txz: Upgraded.
d/kernel-headers-3.14.13_smp-x86-1.txz: Upgraded.
e/emacs-24.3-i486-4.txz: Rebuilt.
       Renamed ctags manpage that conflicts with Exuberant Ctags. Thanks to Jim.
k/kernel-source-3.14.13_smp-noarch-1.txz: Upgraded.
n/httpd-2.4.10-i486-1.txz: Upgraded.
       This update fixes the following security issues:
       *) SECURITY: CVE-2014-0117 (cve.mitre.org)
       mod_proxy: Fix crash in Connection header handling which
       allowed a denial of service attack against a reverse proxy
       with a threaded MPM. [Ben Reser]
       *) SECURITY: CVE-2014-0118 (cve.mitre.org)
       mod_deflate: The DEFLATE input filter (inflates request bodies) now
       limits the length and compression ratio of inflated request bodies to
       avoid denial of sevice via highly compressed bodies. See directives
       DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
       and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
       *) SECURITY: CVE-2014-0226 (cve.mitre.org)
       Fix a race condition in scoreboard handling, which could lead to
       a heap buffer overflow. [Joe Orton, Eric Covener]
       *) SECURITY: CVE-2014-0231 (cve.mitre.org)
       mod_cgid: Fix a denial of service against CGI scripts that do
       not consume stdin that could lead to lingering HTTPD child processes
       filling up the scoreboard and eventually hanging the server. By
       default, the client I/O timeout (Timeout directive) now applies to
       communication with scripts. The CGIDScriptTimeout directive can be
       used to set a different timeout for communication with scripts.
       [Rainer Jung, Eric Covener, Yann Ylavic]
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
       (* Security fix *)
xap/mozilla-firefox-31.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-31.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
extra/linux-3.14.13-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Jul 20 05:00:36 UTC 2014
x/mesa-10.2.4-i486-1.txz: Upgraded.
       Added --with-egl-platforms="drm,x11". Without this, the EGL support for drm
       is not built leading to crashes with newer radeon hardware.
       Thanks to sberthelot and Robby Workman.
+--------------------------+
Wed Jul 16 05:31:30 UTC 2014
x/xf86-video-geode-2.11.15-i486-2.txz: Rebuilt.
x/xf86-video-intel-2.99.912-i486-1.txz: Upgraded.
       Looks like the stable driver won't compile with the new xorg-server, so
       we'll try this one.
+--------------------------+
Tue Jul 15 23:53:10 UTC 2014
Enjoy some new X related updates! Thanks to Robby Workman for lots of help
on the X.Org upgrades, and to alienBOB for an earlier SlackBuild for Motif
that I used as a reference for configure options and other fixes.
You can blame me for picking xorg-server-1.15.2 over xorg-server-1.14.7. ;-)
If you're using a proprietary video driver you'll probably need to recompile it
for the new X server... if you can.
ap/linuxdoc-tools-0.9.69-i486-2.txz: Rebuilt.
       Renamed /usr/bin/sgmlspl.pl back to /usr/bin/sgmlspl.
       Thanks to Matteo Bernardini for the report.
ap/lxc-1.0.5-i486-1.txz: Upgraded.
d/automake-1.14.1-noarch-1.txz: Upgraded.
d/llvm-3.4.2-i486-1.txz: Upgraded.
kde/calligra-2.8.5-i486-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca\@valencia-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-en_GB-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-es-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-eu-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-fi-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ia-2.7.5-noarch-1.txz: Removed.
kdei/calligra-l10n-it-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ja-2.8.5-noarch-1.txz: Added.
kdei/calligra-l10n-kk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nds-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sl-2.7.5-noarch-1.txz: Removed.
kdei/calligra-l10n-sv-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.7.5-noarch-1.txz: Removed.
kdei/calligra-l10n-uk-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.8.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.8.5-noarch-1.txz: Upgraded.
l/lesstif-0.95.2-i486-1.txz: Removed.
       LessTif is making way for real Motif.
       Thanks to the Hungry Programmers for a great run. :-)
t/tetex-3.0-i486-9.txz: Rebuilt.
       Recompiled /usr/bin/xdvi-motif.bin against Motif.
x/dri3proto-1.0-i486-1.txz: Added.
x/fontconfig-2.11.1-i486-1.txz: Upgraded.
x/freeglut-2.8.1-i486-1.txz: Upgraded.
x/gccmakedep-1.0.3-noarch-1.txz: Upgraded.
x/glamor-egl-0.6.0-i486-1.txz: Added.
x/glew-1.10.0-i486-1.txz: Upgraded.
x/glproto-1.4.17-noarch-1.txz: Upgraded.
x/imake-1.0.7-i486-1.txz: Upgraded.
x/inputproto-2.3.1-noarch-1.txz: Upgraded.
x/libFS-1.0.6-i486-1.txz: Upgraded.
x/libICE-1.0.9-i486-1.txz: Upgraded.
x/libXfont-1.4.8-i486-1.txz: Upgraded.
x/libXft-2.3.2-i486-1.txz: Upgraded.
x/libXi-1.7.3-i486-1.txz: Upgraded.
x/libdrm-2.4.54-i486-1.txz: Upgraded.
x/libevdev-1.2-i486-1.txz: Added.
x/libxcb-1.10-i486-1.txz: Upgraded.
x/libxshmfence-1.1-i486-1.txz: Added.
x/makedepend-1.0.5-i486-1.txz: Upgraded.
x/mesa-10.1.5-i486-1.txz: Upgraded.
x/motif-2.3.4-i486-1.txz: Added.
x/mtdev-1.1.5-i486-1.txz: Upgraded.
x/pixman-0.32.6-i486-1.txz: Upgraded.
x/presentproto-1.0-i486-1.txz: Added.
x/util-macros-1.19.0-noarch-1.txz: Upgraded.
x/xauth-1.0.9-i486-1.txz: Upgraded.
x/xcb-proto-1.10-i486-1.txz: Upgraded.
x/xcb-util-cursor-0.1.1-i486-1.txz: Upgraded.
x/xcb-util-renderutil-0.3.9-i486-1.txz: Upgraded.
x/xcb-util-wm-0.4.1-i486-1.txz: Upgraded.
x/xcursorgen-1.0.6-i486-1.txz: Upgraded.
x/xdg-user-dirs-0.15-i486-1.txz: Upgraded.
x/xextproto-7.3.0-i486-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-i486-6.txz: Rebuilt.
x/xf86-input-aiptek-1.4.1-i486-6.txz: Rebuilt.
x/xf86-input-evdev-2.9.0-i486-1.txz: Upgraded.
x/xf86-input-joystick-1.6.1-i486-6.txz: Rebuilt.
x/xf86-input-keyboard-1.8.0-i486-1.txz: Upgraded.
x/xf86-input-mouse-1.9.0-i486-4.txz: Rebuilt.
x/xf86-input-penmount-1.5.0-i486-6.txz: Rebuilt.
x/xf86-input-synaptics-1.8.0-i486-1.txz: Upgraded.
x/xf86-input-vmmouse-13.0.0-i486-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-i486-6.txz: Rebuilt.
x/xf86-input-wacom-0.19.0-i486-5.txz: Rebuilt.
x/xf86-video-apm-1.2.5-i486-5.txz: Rebuilt.
x/xf86-video-ark-0.7.5-i486-5.txz: Rebuilt.
x/xf86-video-ast-0.99.9-i486-1.txz: Upgraded.
x/xf86-video-ati-7.4.0-i486-1.txz: Upgraded.
x/xf86-video-chips-1.2.5-i486-5.txz: Rebuilt.
x/xf86-video-cirrus-1.5.2-i486-5.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-i486-2.txz: Rebuilt.
x/xf86-video-glint-1.2.8-i486-5.txz: Rebuilt.
x/xf86-video-i128-1.3.6-i486-5.txz: Rebuilt.
x/xf86-video-i740-1.3.4-i486-5.txz: Rebuilt.
x/xf86-video-mach64-6.9.4-i486-5.txz: Rebuilt.
x/xf86-video-mga-1.6.3-i486-1.txz: Upgraded.
x/xf86-video-modesetting-0.9.0-i486-1.txz: Upgraded.
x/xf86-video-neomagic-1.2.8-i486-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.10-i486-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-i486-6.txz: Rebuilt.
x/xf86-video-openchrome-0.3.3-i486-3.txz: Rebuilt.
x/xf86-video-r128-6.9.2-i486-2.txz: Rebuilt.
x/xf86-video-rendition-4.2.5-i486-5.txz: Rebuilt.
x/xf86-video-s3-0.6.5-i486-5.txz: Rebuilt.
x/xf86-video-s3virge-1.10.6-i486-6.txz: Rebuilt.
x/xf86-video-savage-2.3.7-i486-2.txz: Rebuilt.
x/xf86-video-siliconmotion-1.7.7-i486-6.txz: Rebuilt.
x/xf86-video-sis-0.10.7-i486-5.txz: Rebuilt.
x/xf86-video-sisusb-0.9.6-i486-5.txz: Rebuilt.
x/xf86-video-tdfx-1.4.5-i486-5.txz: Rebuilt.
x/xf86-video-tga-1.2.2-i486-5.txz: Rebuilt.
x/xf86-video-trident-1.3.6-i486-5.txz: Rebuilt.
x/xf86-video-tseng-1.2.5-i486-5.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-i486-10.txz: Rebuilt.
x/xf86-video-vesa-2.3.3-i486-2.txz: Rebuilt.
x/xf86-video-vmware-13.0.2-i486-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-i486-6.txz: Rebuilt.
x/xf86-video-xgi-git_be3abf8570a-i486-5.txz: Rebuilt.
x/xf86-video-xgixp-1.8.1-i486-5.txz: Rebuilt.
x/xkeyboard-config-2.11-noarch-1.txz: Upgraded.
x/xorg-cf-files-1.0.5-noarch-1.txz: Upgraded.
x/xorg-server-1.15.2-i486-1.txz: Upgraded.
x/xorg-server-xephyr-1.15.2-i486-1.txz: Upgraded.
x/xorg-server-xnest-1.15.2-i486-1.txz: Upgraded.
x/xorg-server-xvfb-1.15.2-i486-1.txz: Upgraded.
x/xproto-7.0.26-noarch-1.txz: Upgraded.
x/xrandr-1.4.2-i486-1.txz: Upgraded.
x/xscope-1.4.1-i486-1.txz: Upgraded.
x/xterm-309-i486-1.txz: Upgraded.
x/xtrans-1.3.4-noarch-1.txz: Upgraded.
xap/ddd-3.3.12-i486-3.txz: Rebuilt.
       Recompiled against Motif.
xap/xpdf-3.04-i486-1.txz: Upgraded.
+--------------------------+
Sat Jul 12 17:34:47 UTC 2014
ap/nano-2.3.5-i486-2.txz: Rebuilt.
       Provide --datadir to ./configure to work around a bug that installed the
       locale files in the wrong directory.
       Thanks to Wim Speekenbrink.
+--------------------------+
Sat Jul 12 02:24:10 UTC 2014
a/bash-4.3.018-i486-1.txz: Upgraded.
a/kernel-firmware-20140710git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.12-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.12_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.12-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.12_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.12-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.12_smp-i686-1.txz: Upgraded.
a/shadow-4.2.1-i486-1.txz: Upgraded.
       This adds support for subuid and subgid needed for unprivileged containers.
       Thanks to Christoph Willing.
ap/cgmanager-20140710_986cd44-i486-1.txz: Added.
       Thanks to Matteo Bernardini.
ap/linuxdoc-tools-0.9.69-i486-1.txz: Upgraded.
       Thanks to Stuart Winter.
ap/lxc-1.0.3-i486-1.txz: Upgraded.
       This adds a template for for lxc-create to create a minimal Slackware
       container using slackpkg. For example, this will create a container
       named "current":
       lxc-create -n current -t slackware
       There's an rc.lxc init script added to autorun/autostop containers, but it's
       not currently hooked in to the main init scripts, so if you want to use it
       you'll need to add it to your rc.local and rc.local_shutdown (and make it
       executable). The script will look for "lxc.start.auto = 1" in the container
       config file to determine if a container should be autostarted (1) or not (0).
       Thanks to Matteo Bernardini.
ap/lzip-1.15-i486-1.txz: Added.
ap/nano-2.3.5-i486-1.txz: Upgraded.
ap/slackpkg-2.82.0-noarch-13.tgz: Rebuilt.
       Patched to support $ROOT and $CONF environment variables.
       Thanks to Matteo Bernardini.
d/gnu-cobol-1.1-i486-1.txz: Added.
d/kernel-headers-3.14.12_smp-x86-1.txz: Upgraded.
d/open-cobol-1.1-i486-2.txz: Removed.
       This project has been renamed GNU Cobol.
d/slacktrack-2.16-i486-1.txz: Upgraded.
       Thanks to Stuart Winter.
k/kernel-source-3.14.12_smp-noarch-1.txz: Upgraded.
       Added back CONFIG_USER_NS=y now that it no longer conflicts with XFS.
       Thanks to Christoph Willing.
l/libnih-1.0.3-i486-1.txz: Added.
       Thanks to Matteo Bernardini.
l/taglib-1.9.1-i486-1.txz: Upgraded.
       Linked with -lstdc++. Thanks to comet.berkeley.
n/php-5.4.30-i486-1.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
       (* Security fix *)
extra/linux-3.14.12-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/config-testing-3.15.5/*: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jun 24 22:35:07 UTC 2014
ap/man-1.6g-i486-2.txz: Rebuilt.
       Moved config file to /etc.
ap/man-pages-3.69-noarch-1.txz: Upgraded.
l/seamonkey-solibs-2.26.1-i486-1.txz: Upgraded.
n/bind-9.9.5_P1-i486-1.txz: Upgraded.
       This fixes security issues and other bugs. Please note that the first
       CVE only affects Windows, and the second one was claimed to be fixed by
       an earlier version of BIND. But we'll update anyway just in case. :-)
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
n/gnupg-1.4.17-i486-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/gnupg2-2.0.24-i486-1.txz: Upgraded.
       This release includes a security fix to stop a denial of service using
       garbled compressed data packets which can be used to put gpg into an
       infinite loop.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
       (* Security fix *)
n/samba-4.1.9-i486-1.txz: Upgraded.
       This update fixes bugs and security issues, including a flaw in Samba's
       internal DNS server which can be exploited to cause a denial of service,
       a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
       configurations that use shadow_copy* for vfs objects to reveal potentially
       private server information, a denial of service on the nmbd NetBIOS name
       services daemon, and a denial of service crash involving overwriting
       memory on an authenticated connection to the smbd file server.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
       (* Security fix *)
xap/seamonkey-2.26.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
testing/packages/bind-9.10.0_P2-i486-1.txz: Added.
+--------------------------+
Tue Jun 17 22:19:30 UTC 2014
l/ncurses-5.9-i486-3.txz: Rebuilt.
       Applied upstream patch ncurses-5.9-20140308-patch.sh.
       Thanks to comet.berkeley.
n/yptools-2.14-i486-3.txz: Rebuilt.
       Corrected yppasswd patch that was causing password changes to fail.
       Thanks to Henrik Carlqvist.
xap/xscreensaver-5.29-i486-1.txz: Upgraded.
+--------------------------+
Thu Jun 12 05:11:52 UTC 2014
ap/ddrescue-1.18.1-i486-1.txz: Upgraded.
xap/mozilla-firefox-30.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.6.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Mon Jun 9 20:16:02 UTC 2014
n/php-5.4.29-i486-1.txz: Upgraded.
       This update fixes bugs and security issues, including a possible denial
       of service, and an issue where insecure default permissions on the FPM
       socket may allow local users to run arbitrary code as the apache user.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
       (* Security fix *)
+--------------------------+
Fri Jun 6 04:27:01 UTC 2014
a/openssl-solibs-1.0.1h-i486-1.txz: Upgraded.
ap/nano-2.3.4-i486-1.txz: Upgraded.
l/libtasn1-3.6-i486-1.txz: Upgraded.
       Multiple security issues have been corrected in the libtasn1 library.
       These errors allow a remote attacker to cause a denial of service, or
       possibly to execute arbitrary code.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/gnutls-3.2.15-i486-1.txz: Upgraded.
       A security issue has been corrected in gnutls. This vulnerability
       affects the client side of the gnutls library. A server that sends
       a specially crafted ServerHello could corrupt the memory of a requesting
       client. This may allow a remote attacker to execute arbitrary code.
       Additional vulnerabilities in the embedded libtasn1 library have also
       been patched.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
       (* Security fix *)
n/irssi-0.8.16-i486-1.txz: Upgraded.
n/openssl-1.0.1h-i486-1.txz: Upgraded.
       Multiple security issues have been corrected, including a possible
       man-in-the-middle attack where weak keying material is forced, denial
       of service, and the execution of arbitrary code.
       For more information, see:
       http://www.openssl.org/news/secadv_20140605.txt
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
       (* Security fix *)
n/sendmail-8.14.9-i486-1.txz: Upgraded.
       This release fixes one security related bug by properly closing file
       descriptors (except stdin, stdout, and stderr) before executing programs.
       This bug could enable local users to interfere with an open SMTP
       connection if they can execute their own program for mail delivery
       (e.g., via procmail or the prog mailer).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
       (* Security fix *)
n/sendmail-cf-8.14.9-noarch-1.txz: Upgraded.
+--------------------------+
Sun Jun 1 19:48:54 UTC 2014
a/gawk-4.1.1-i486-2.txz: Rebuilt.
       Removed pgawk.1.gz symlink in man1 since pgawk no longer exists.
       Compressed the man pages in man3.
a/kernel-generic-3.14.5-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.5-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.5_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.5-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.5_smp-i686-1.txz: Upgraded.
ap/mariadb-5.5.37-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2430
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2431
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2432
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2436
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2438
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2440
       (* Security fix *)
ap/nano-2.3.3-i486-1.txz: Upgraded.
d/gcc-4.8.3-i486-1.txz: Upgraded.
d/gcc-g++-4.8.3-i486-1.txz: Upgraded.
d/gcc-gfortran-4.8.3-i486-1.txz: Upgraded.
d/gcc-gnat-4.8.3-i486-1.txz: Upgraded.
d/gcc-go-4.8.3-i486-1.txz: Upgraded.
d/gcc-java-4.8.3-i486-1.txz: Upgraded.
d/gcc-objc-4.8.3-i486-1.txz: Upgraded.
d/kernel-headers-3.14.5_smp-x86-1.txz: Upgraded.
d/make-3.82-i486-5.txz: Rebuilt.
       Patched to fix a bug with parallel builds.
       Thanks to Danny Schmarsel.
k/kernel-source-3.14.5_smp-noarch-1.txz: Upgraded.
extra/linux-3.14.5-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue May 13 22:31:28 UTC 2014
l/libelf-0.8.13-i486-4.txz: Rebuilt.
       Use -D_FILE_OFFSET_BITS=64 on 32-bit x86 (needed for Chromium).
       Requested by alienBOB. :-)
+--------------------------+
Tue May 13 20:25:35 UTC 2014
a/kernel-generic-3.14.4-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.4-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.4-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.4_smp-i686-1.txz: Upgraded.
d/gdb-7.7.1-i486-1.txz: Upgraded.
d/kernel-headers-3.14.4_smp-x86-1.txz: Upgraded.
k/kernel-source-3.14.4_smp-noarch-1.txz: Upgraded.
       Disabled CONFIG_DEBUG_KERNEL, which had the effect of turning off seven
       other kernel debugging options. Besides fixing the nVidia issues, I wonder
       if getting rid of this stuff will speed the kernel up?
l/libelf-0.8.13-i486-3.txz: Rebuilt.
       Symlink headers to /usr/include, since Mesa wants them there.
       Thanks to Robby Workman.
xap/ddd-3.3.12-i486-2.txz: Rebuilt.
       Patched to fix the machine code view. Thanks to Christopher Oliver.
extra/linux-3.14.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon May 12 02:24:36 UTC 2014
l/seamonkey-solibs-2.26-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0.1-i486-1.txz: Upgraded.
xap/seamonkey-2.26-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Fri May 9 01:47:42 UTC 2014
a/glibc-solibs-2.19-i486-1.txz: Upgraded.
a/glibc-zoneinfo-2014b-noarch-1.txz: Upgraded.
a/kernel-firmware-20140506git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.3-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.14.3-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.14.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.14.3-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.14.3_smp-i686-1.txz: Upgraded.
d/binutils-2.24.51.0.3-i486-1.txz: Upgraded.
d/gcc-4.8.2-i486-2.txz: Rebuilt.
       Include libiberty.a since that's no longer in the binutils package.
d/gcc-g++-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gfortran-4.8.2-i486-2.txz: Rebuilt.
d/gcc-gnat-4.8.2-i486-2.txz: Rebuilt.
d/gcc-go-4.8.2-i486-2.txz: Rebuilt.
d/gcc-java-4.8.2-i486-2.txz: Rebuilt.
d/gcc-objc-4.8.2-i486-2.txz: Rebuilt.
d/kernel-headers-3.14.3_smp-x86-1.txz: Upgraded.
d/oprofile-0.9.7-i486-5.txz: Rebuilt.
k/kernel-source-3.14.3_smp-noarch-1.txz: Upgraded.
l/glibc-2.19-i486-1.txz: Upgraded.
l/glibc-i18n-2.19-i486-1.txz: Upgraded.
l/glibc-profile-2.19-i486-1.txz: Upgraded.
n/libnftnl-1.0.1-i486-1.txz: Added.
n/nftables-0.2-i486-1.txz: Added.
extra/bash-completion/bash-completion-2.1-noarch-2.txz: Rebuilt.
       Patched to fix an issue with bash-4.3. Thanks to ponce.
extra/linux-3.14.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Apr 29 23:35:59 UTC 2014
ap/screen-4.2.1-i486-1.txz: Upgraded.
l/qt-4.8.6-i486-1.txz: Upgraded.
xap/mozilla-firefox-29.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.5.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Tue Apr 22 17:31:48 UTC 2014
a/bash-4.3.011-i486-1.txz: Upgraded.
a/gawk-4.1.1-i486-1.txz: Upgraded.
a/grep-2.18-i486-1.txz: Upgraded.
ap/vim-7.4.258-i486-1.txz: Upgraded.
n/openssh-6.6p1-i486-2.txz: Rebuilt.
       Fixed a bug with curve25519-sha256 that caused a key exchange failure in
       about 1 in 512 connection attempts.
xap/vim-gvim-7.4.258-i486-1.txz: Upgraded.
+--------------------------+
Mon Apr 21 20:09:48 UTC 2014
l/libyaml-0.1.6-i486-1.txz: Upgraded.
       This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
       where a specially crafted string could cause a heap overflow leading to
       arbitrary code execution.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
       https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
       (* Security fix *)
n/php-5.4.27-i486-1.txz: Upgraded.
       This update fixes a security issue in the in the awk script detector
       which allows context-dependent attackers to cause a denial of service
       (CPU consumption) via a crafted ASCII file that triggers a large amount
       of backtracking.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
       (* Security fix *)
+--------------------------+
Tue Apr 8 14:19:51 UTC 2014
a/openssl-solibs-1.0.1g-i486-1.txz: Upgraded.
n/openssl-1.0.1g-i486-1.txz: Upgraded.
       This update fixes two security issues:
       A missing bounds check in the handling of the TLS heartbeat extension
       can be used to reveal up to 64k of memory to a connected client or server.
       Thanks for Neel Mehta of Google Security for discovering this bug and to
       Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
       preparing the fix.
       Fix for the attack described in the paper "Recovering OpenSSL
       ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
       by Yuval Yarom and Naomi Benger. Details can be obtained from:
       http://eprint.iacr.org/2014/140
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
       (* Security fix *)
+--------------------------+
Mon Mar 31 20:30:28 UTC 2014
l/apr-1.5.0-i486-1.txz: Upgraded.
l/apr-util-1.5.3-i486-1.txz: Upgraded.
n/httpd-2.4.9-i486-2.txz: Rebuilt.
       Recompiled against new apr/apr-util to restore missing mod_mpm_event.so.
+--------------------------+
Fri Mar 28 03:43:11 UTC 2014
l/mozilla-nss-3.16-i486-1.txz: Upgraded.
       This update fixes a security issue:
       The cert_TestHostName function in lib/certdb/certdb.c in the
       certificate-checking implementation in Mozilla Network Security Services
       (NSS) before 3.16 accepts a wildcard character that is embedded in an
       internationalized domain name's U-label, which might allow man-in-the-middle
       attackers to spoof SSL servers via a crafted certificate.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
       (* Security fix *)
l/seamonkey-solibs-2.25-i486-1.txz: Upgraded.
n/curl-7.36.0-i486-1.txz: Upgraded.
       This update fixes four security issues.
       For more information, see:
       http://curl.haxx.se/docs/adv_20140326A.html
       http://curl.haxx.se/docs/adv_20140326B.html
       http://curl.haxx.se/docs/adv_20140326C.html
       http://curl.haxx.se/docs/adv_20140326D.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
       (* Security fix *)
n/httpd-2.4.9-i486-1.txz: Upgraded.
       This update addresses two security issues.
       Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults
       when logging truncated cookies. Clean up the cookie logging parser to
       recognize only the cookie=value pairs, not valueless cookies.
       mod_dav: Keep track of length of cdata properly when removing leading
       spaces. Eliminates a potential denial of service from specifically crafted
       DAV WRITE requests.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
       (* Security fix *)
n/openssh-6.6p1-i486-1.txz: Upgraded.
       This update fixes a security issue when using environment passing with
       a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be
       tricked into accepting any environment variable that contains the
       characters before the wildcard character.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
       (* Security fix *)
n/tin-2.2.0-i486-1.txz: Upgraded.
xap/mozilla-firefox-28.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.4.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.25-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Sun Mar 16 02:52:28 UTC 2014
n/php-5.4.26-i486-1.txz: Upgraded.
       This update fixes a flaw where a specially crafted data file may cause a
       segfault or 100% CPU consumption when a web page uses fileinfo() on it.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
       (* Security fix *)
+--------------------------+
Fri Mar 14 00:44:48 UTC 2014
n/samba-4.1.6-i486-1.txz: Upgraded.
       This update fixes two security issues:
       CVE-2013-4496:
       Samba versions 3.4.0 and above allow the administrator to implement
       locking out Samba accounts after a number of bad password attempts.
       However, all released versions of Samba did not implement this check for
       password changes, such as are available over multiple SAMR and RAP
       interfaces, allowing password guessing attacks.
       CVE-2013-6442:
       Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
       smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
       command options it will remove the existing ACL on the object being
       modified, leaving the file or directory unprotected.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
       (* Security fix *)
+--------------------------+
Thu Mar 13 03:32:38 UTC 2014
n/mutt-1.5.23-i486-1.txz: Upgraded.
       This update fixes a buffer overflow where malformed RFC2047 header
       lines could result in denial of service or potentially the execution
       of arbitrary code as the user running mutt.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
       (* Security fix *)
+--------------------------+
Tue Mar 11 07:06:18 UTC 2014
a/udisks-1.0.5-i486-1.txz: Upgraded.
       This update fixes a stack-based buffer overflow when handling long path
       names. A malicious, local user could use this flaw to create a
       specially-crafted directory structure that could lead to arbitrary code
       execution with the privileges of the udisks daemon (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
       (* Security fix *)
a/udisks2-2.1.3-i486-1.txz: Upgraded.
       This update fixes a stack-based buffer overflow when handling long path
       names. A malicious, local user could use this flaw to create a
       specially-crafted directory structure that could lead to arbitrary code
       execution with the privileges of the udisks daemon (root).
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
       (* Security fix *)
+--------------------------+
Thu Mar 6 04:14:23 UTC 2014
ap/sudo-1.8.9p5-i486-1.txz: Upgraded.
+--------------------------+
Mon Mar 3 23:32:18 UTC 2014
n/gnutls-3.1.22-i486-1.txz: Upgraded.
       Fixed a security issue where a specially crafted certificate could
       bypass certificate validation checks.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
       (* Security fix *)
+--------------------------+
Thu Feb 27 20:43:28 UTC 2014
d/subversion-1.7.16-i486-1.txz: Upgraded.
       Fix denial of service bugs.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
       (* Security fix *)
+--------------------------+
Thu Feb 20 00:30:49 UTC 2014
a/kernel-firmware-20140215git-noarch-1.txz: Upgraded.
a/kernel-generic-3.10.30-i486-1.txz: Upgraded.
a/kernel-generic-smp-3.10.30_smp-i686-1.txz: Upgraded.
a/kernel-huge-3.10.30-i486-1.txz: Upgraded.
a/kernel-huge-smp-3.10.30_smp-i686-1.txz: Upgraded.
a/kernel-modules-3.10.30-i486-1.txz: Upgraded.
a/kernel-modules-smp-3.10.30_smp-i686-1.txz: Upgraded.
a/shadow-4.1.5.1-i486-3.txz: Rebuilt.
       Shadow 4.1.5 addressed a tty-hijacking vulnerability in "su -c"
       (CVE-2005-4890) by detaching the controlling terminal in the non-PAM
       case via a TIOCNOTTY request. Bi-directional protection is excessive
       and breaks a commonly-used methods for privilege escalation on non-PAM
       systems (e.g. xterm -e /bin/su -s /bin/bash -c /bin/bash myscript).
       This update relaxes the restriction and only detaches the controlling
       tty when the callee is not root (which is, after all, the threat vector).
       Thanks to mancha for the patch (and the above information).
ap/mariadb-5.5.35-i486-1.txz: Upgraded.
       This update fixes a buffer overflow in the mysql command line client which
       may allow malicious or compromised database servers to cause a denial of
       service (crash) and possibly execute arbitrary code via a long server
       version string.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
       (* Security fix *)
d/kernel-headers-3.10.30_smp-x86-1.txz: Upgraded.
k/kernel-source-3.10.30_smp-noarch-1.txz: Upgraded.
n/gnutls-3.1.21-i486-1.txz: Upgraded.
       This update fixes a flaw where a version 1 intermediate certificate would be
       considered as a CA certificate by GnuTLS by default.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
       (* Security fix *)
xap/mozilla-firefox-27.0.1-i486-1.txz: Upgraded.
extra/linux-3.10.30-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Feb 13 23:45:53 UTC 2014
n/curl-7.35.0-i486-1.txz: Upgraded.
       This update fixes a flaw where libcurl could, in some circumstances, reuse
       the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
       request.
       For more information, see:
       http://curl.haxx.se/docs/adv_20140129.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
       (* Security fix *)
n/ntp-4.2.6p5-i486-5.txz: Rebuilt.
       All stable versions of NTP remain vulnerable to a remote attack where the
       "ntpdc -c monlist" command can be used to amplify network traffic as part
       of a denial of service attack. By default, Slackware is not vulnerable
       since it includes "noquery" as a default restriction. However, it is
       vulnerable if this restriction is removed. To help mitigate this flaw,
       "disable monitor" has been added to the default ntp.conf (which will disable
       the monlist command even if other queries are allowed), and the default
       restrictions have been extended to IPv6 as well.
       All users of the NTP daemon should make sure that their ntp.conf contains
       "disable monitor" to prevent misuse of the NTP service. The new ntp.conf
       file will be installed as /etc/ntp.conf.new with a package upgrade, but the
       changes will need to be merged into any existing ntp.conf file by the admin.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
       http://www.kb.cert.org/vuls/id/348126
       (* Security fix *)
+--------------------------+
Sat Feb 8 18:41:15 UTC 2014
l/seamonkey-solibs-2.24-i486-1.txz: Upgraded.
xap/mozilla-firefox-27.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.3.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.24-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Mon Feb 3 20:58:32 UTC 2014
xap/pidgin-2.10.9-i486-1.txz: Upgraded.
       This update fixes various security issues and other bugs.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
       (* Security fix *)
+--------------------------+
Thu Jan 30 21:30:11 UTC 2014
n/openssh-6.5p1-i486-1.txz: Upgraded.
+--------------------------+
Tue Jan 28 21:07:13 UTC 2014
l/mozilla-nss-3.15.4-i486-1.txz: Upgraded.
       Upgraded to nss-3.15.4 and nspr-4.10.3.
       Fixes a possible man-in-the-middle issue.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
       (* Security fix *)
n/bind-9.9.4_P2-i486-1.txz: Upgraded.
       This update fixes a defect in the handling of NSEC3-signed zones that can
       cause BIND to be crashed by a specific set of queries.
       NOTE: According to the second link below, Slackware is probably not
       vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
       anyway, though.
       For more information, see:
       https://kb.isc.org/article/AA-01078
       https://kb.isc.org/article/AA-01085
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
       (* Security fix *)
+--------------------------+
Tue Jan 14 03:54:48 UTC 2014
a/openssl-solibs-1.0.1f-i486-1.txz: Upgraded.
d/llvm-3.4-i486-1.txz: Upgraded.
n/openssl-1.0.1f-i486-1.txz: Upgraded.
       This update fixes the following security issues:
       Fix for TLS record tampering bug CVE-2013-4353
       Fix for TLS version checking bug CVE-2013-6449
       Fix for DTLS retransmission bug CVE-2013-6450
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
       (* Security fix *)
n/php-5.4.24-i486-1.txz: Upgraded.
       The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
       5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
       parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
       which allows remote attackers to execute arbitrary code or cause a denial
       of service (memory corruption) via a crafted certificate that is not
       properly handled by the openssl_x509_parse function.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
       (* Security fix *)
n/samba-4.1.4-i486-1.txz: Upgraded.
       This update fixes a heap-based buffer overflow that may allow AD domain
       controllers to execute arbitrary code via an invalid fragment length in
       a DCE-RPC packet.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408
       (* Security fix *)
x/libXfont-1.4.7-i486-1.txz: Upgraded.
       This update fixes a stack overflow when reading a BDF font file containing
       a longer than expected string, which could lead to crashes or privilege
       escalation.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
       (* Security fix *)
+--------------------------+
Fri Dec 20 22:46:09 UTC 2013
n/gnupg-1.4.16-i486-1.txz: Upgraded.
       Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
       Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
       For more information, see:
       http://www.cs.tau.ac.il/~tromer/acoustic/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
       (* Security fix *)
+--------------------------+
Mon Dec 16 20:51:01 UTC 2013
d/llvm-3.3-i486-3.txz: Rebuilt.
       The LLVM package included binaries with an rpath pointing to the build
       location in /tmp. This allows an attacker with write access to /tmp to
       add modified libraries (and execute arbitrary code) as any user running
       the LLVM binaries. This updated package rebuilds LLVM to exclude the
       build directories from the rpath information.
       Thanks to Christopher Oliver for the bug report.
       (* Security fix *)
d/ruby-1.9.3_p484-i486-1.txz: Upgraded.
       This update fixes a heap overflow in floating point parsing. A specially
       crafted string could cause a heap overflow leading to a denial of service
       attack via segmentation faults and possibly arbitrary code execution.
       For more information, see:
       https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
       (* Security fix *)
l/cairo-1.12.16-i486-1.txz: Upgraded.
       Removed --enable-xcb-shm (may cause instability with GTK+3).
       Removed --enable-xlib-xcb (causes GIMP slowdown).
       Added --enable-ft and --enable-gl.
       If there are no problems reported with this update, perhaps it should be
       issued as a 14.1 bugfix?
l/libiodbc-3.52.8-i486-1.txz: Upgraded.
       This update fixes an rpath pointing to a location in /tmp that was found in
       two test programs (iodbctest and iodbctestw). This could have allowed a
       local attacker with write access to /tmp to add modified libraries (and
       execute arbitrary code) as any user running the test programs.
       Thanks to Christopher Oliver for the bug report.
       (* Security fix *)
l/libjpeg-v8a-i486-2.txz: Rebuilt.
       Fix use of uninitialized memory when decoding images with missing SOS data
       for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
       This could allow remote attackers to obtain sensitive information from
       uninitialized memory locations via a crafted JPEG image.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
       (* Security fix *)
l/seamonkey-solibs-2.23-i486-1.txz: Upgraded.
xap/mozilla-firefox-26.0-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/mozilla-thunderbird-24.2.0-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.23-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Thu Dec 5 22:20:36 UTC 2013
kde/calligra-2.7.5-i486-1.txz: Upgraded.
kdei/calligra-l10n-bs-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ca\@valencia-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-cs-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-da-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-de-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-el-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-es-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-et-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fi-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-fr-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-gl-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-hu-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ia-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-it-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-kk-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nb-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nds-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-nl-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pl-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-pt_BR-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-ru-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sk-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sl-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-sv-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-tr-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-uk-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_CN-2.7.5-noarch-1.txz: Upgraded.
kdei/calligra-l10n-zh_TW-2.7.5-noarch-1.txz: Upgraded.
l/mozilla-nss-3.15.3-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
       (* Security fix *)
l/seamonkey-solibs-2.22.1-i486-1.txz: Upgraded.
xap/gimp-2.8.10-i486-1.txz: Upgraded.
xap/mozilla-thunderbird-24.1.1-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
xap/seamonkey-2.22.1-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Mon Nov 18 20:52:16 UTC 2013
l/seamonkey-solibs-2.22-i486-1.txz: Upgraded.
n/openssh-6.4p1-i486-1.txz: Upgraded.
       sshd(8): fix a memory corruption problem triggered during rekeying
       when an AES-GCM cipher is selected.
       For more information, see:
       http://www.openssh.com/txt/gcmrekey.adv
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4548
       (* Security fix *)
n/php-5.4.22-i486-1.txz: Upgraded.
       This is a bugfix release.
n/samba-4.1.1-i486-1.txz: Upgraded.
       This update fixes two security issues:
       * Samba versions 3.2.0 and above do not check the underlying file or
       directory ACL when opening an alternate data stream.
       * In setups which provide ldap(s) and/or https services, the private key
       for SSL/TLS encryption might be world readable. This typically happens
       in active directory domain controller setups.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
       (* Security fix *)
       Added tdb.h, tdb.pc, and a libtdb.so symlink. Thanks to Matteo Bernardini.
xap/mozilla-firefox-25.0.1-i486-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/seamonkey-2.22-i486-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
       (* Security fix *)
+--------------------------+
Mon Nov 4 17:08:47 UTC 2013
Slackware 14.1 x86 stable is released!

It's been another interesting release cycle here at Slackware bringing
new features like support for UEFI machines, updated compilers and
development tools, the switch from MySQL to MariaDB, and many more
improvements throughout the system. Thanks to the team, the upstream
developers, the dedicated Slackware community, and everyone else who
pitched in to help make this release a reality.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware
project by picking up a copy from store.slackware.com. We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Have fun! :-)
Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.