Slackware ChangeLogs
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
Current (pre-release) ChangeLog for x86 (32-bit)
Thu Dec 1 08:49:20 UTC 2016
d/intltool-0.51.0-i586-3.txz: Rebuilt.
       Added a patch to fix issues when $(builddir) != $(srcdir). This avoids
       possible build failures when intltool is used with automake >= 1.15.
       Thanks to Willy Sudiarto Raharjo.
xap/mozilla-firefox-50.0.2-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/firefox.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
xap/mozilla-thunderbird-45.5.1-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
       (* Security fix *)
+--------------------------+
Mon Nov 21 19:21:22 UTC 2016
n/ntp-4.2.8p9-i586-1.txz: Upgraded.
       In addition to bug fixes and enhancements, this release fixes the
       following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
       5 low-severity vulnerabilities, and provides 28 other non-security
       fixes and improvements.
       CVE-2016-9311: Trap crash
       CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
       CVE-2016-7427: Broadcast Mode Replay Prevention DoS
       CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
       CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
       CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
       CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
       CVE-2016-7429: Interface selection attack
       CVE-2016-7426: Client rate limiting and server responses
       CVE-2016-7433: Reboot sync calculation problem
       For more information, see:
       https://www.kb.cert.org/vuls/id/633847
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
       (* Security fix *)
+--------------------------+
Sat Nov 19 22:45:38 UTC 2016
a/grep-2.26-i586-2.txz: Rebuilt.
       Reverted a speedup patch that is causing regressions when output is directed
       to /dev/null. Thanks to SeB.
+--------------------------+
Sat Nov 19 03:33:33 UTC 2016
a/bash-4.4.005-i586-1.txz: Upgraded.
a/kernel-firmware-20161118git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.32-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.32-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.32_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.32-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.32_smp-i686-1.txz: Upgraded.
ap/ghostscript-9.20-i586-1.txz: Upgraded.
d/kernel-headers-4.4.32_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.32_smp-noarch-1.txz: Upgraded.
n/nmap-7.31-i586-1.txz: Upgraded.
n/samba-4.5.1-i586-1.txz: Upgraded.
x/freeglut-3.0.0-i586-1.txz: Upgraded.
x/libXfont2-2.0.1-i586-1.txz: Added.
x/libdrm-2.4.73-i586-1.txz: Upgraded.
x/libxcb-1.12-i586-1.txz: Upgraded.
x/mesa-13.0.1-i586-1.txz: Upgraded.
x/xcb-proto-1.12-i586-1.txz: Upgraded.
x/xcb-util-cursor-0.1.3-i586-1.txz: Upgraded.
x/xf86-input-acecad-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-evdev-2.10.4-i586-1.txz: Upgraded.
x/xf86-input-joystick-1.6.3-i586-1.txz: Upgraded.
x/xf86-input-keyboard-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-mouse-1.9.2-i586-1.txz: Upgraded.
x/xf86-input-penmount-1.5.0-i586-10.txz: Rebuilt.
x/xf86-input-synaptics-1.9.0-i586-1.txz: Upgraded.
x/xf86-input-vmmouse-13.1.0-i586-5.txz: Rebuilt.
x/xf86-input-void-1.4.0-i586-10.txz: Rebuilt.
x/xf86-input-wacom-0.33.0-i586-2.txz: Rebuilt.
x/xf86-video-amdgpu-1.2.0-i586-1.txz: Upgraded.
x/xf86-video-apm-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-ark-0.7.5-i586-9.txz: Rebuilt.
x/xf86-video-ast-1.1.5-i586-3.txz: Rebuilt.
x/xf86-video-ati-7.8.0-i586-1.txz: Upgraded.
x/xf86-video-chips-1.2.6-i586-2.txz: Removed.
x/xf86-video-cirrus-1.5.3-i586-3.txz: Rebuilt.
x/xf86-video-dummy-0.3.7-i586-6.txz: Rebuilt.
x/xf86-video-geode-2.11.18-i586-2.txz: Rebuilt.
x/xf86-video-glint-1.2.8-i586-8.txz: Removed.
x/xf86-video-i128-1.3.6-i586-9.txz: Rebuilt.
x/xf86-video-i740-1.3.5-i586-3.txz: Removed.
x/xf86-video-intel-git_20161115_a1a0f76-i686-1.txz: Upgraded.
x/xf86-video-mach64-6.9.5-i586-3.txz: Rebuilt.
x/xf86-video-mga-1.6.4-i586-3.txz: Removed.
x/xf86-video-neomagic-1.2.9-i586-3.txz: Rebuilt.
x/xf86-video-nouveau-1.0.13-i586-1.txz: Upgraded.
x/xf86-video-nv-2.1.20-i586-9.txz: Removed.
x/xf86-video-openchrome-0.5.0-i586-2.txz: Rebuilt.
x/xf86-video-r128-6.10.1-i586-1.txz: Removed.
x/xf86-video-rendition-4.2.6-i586-2.txz: Rebuilt.
x/xf86-video-s3-0.6.5-i586-9.txz: Rebuilt.
x/xf86-video-s3virge-1.10.7-i586-3.txz: Rebuilt.
x/xf86-video-savage-2.3.8-i586-2.txz: Removed.
x/xf86-video-siliconmotion-1.7.8-i586-2.txz: Removed.
x/xf86-video-sis-0.10.8-i586-2.txz: Removed.
x/xf86-video-sisusb-0.9.6-i586-9.txz: Rebuilt.
x/xf86-video-tdfx-1.4.6-i586-3.txz: Removed.
x/xf86-video-tga-1.2.2-i586-9.txz: Rebuilt.
x/xf86-video-trident-1.3.7-i586-3.txz: Removed.
x/xf86-video-tseng-1.2.5-i586-9.txz: Rebuilt.
x/xf86-video-v4l-0.2.0-i586-14.txz: Rebuilt.
x/xf86-video-vesa-2.3.4-i586-3.txz: Rebuilt.
x/xf86-video-vmware-13.2.1-i586-1.txz: Upgraded.
x/xf86-video-voodoo-1.2.5-i586-10.txz: Rebuilt.
x/xf86-video-xgi-1.6.1-i586-2.txz: Removed.
x/xf86-video-xgixp-1.8.1-i586-8.txz: Removed.
x/xorg-server-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.19.0-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.19.0-i586-1.txz: Upgraded.
x/xproto-7.0.31-noarch-1.txz: Upgraded.
x/xterm-326-i586-1.txz: Upgraded.
xap/mozilla-firefox-50.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
extra/linux-4.4.32-nosmp-sdk/*: Upgraded.
extra/tigervnc/tigervnc-1.7.0-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Nov 4 03:31:38 UTC 2016
a/glibc-zoneinfo-2016i-noarch-1.txz: Upgraded.
ap/nano-2.7.1-i586-1.txz: Upgraded.
ap/vim-8.0.0055-i586-1.txz: Upgraded.
l/libcdio-paranoia-10.2+0.93+1-i586-2.txz: Rebuilt.
n/bind-9.10.4_P4-i586-1.txz: Upgraded.
       This update fixes a denial-of-service vulnerability. A defect in BIND's
       handling of responses containing a DNAME answer can cause a resolver to exit
       after encountering an assertion failure in db.c or resolver.c. A server
       encountering either of these error conditions will stop, resulting in denial
       of service to clients. The risk to authoritative servers is minimal;
       recursive servers are chiefly at risk.
       For more information, see:
       https://kb.isc.org/article/AA-01434
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
       (* Security fix *)
n/curl-7.51.0-i586-1.txz: Upgraded.
       This release fixes security issues:
       CVE-2016-8615: cookie injection for other servers
       CVE-2016-8616: case insensitive password comparison
       CVE-2016-8617: OOB write via unchecked multiplication
       CVE-2016-8618: double-free in curl_maprintf
       CVE-2016-8619: double-free in krb5 code
       CVE-2016-8620: glob parser write/read out of bounds
       CVE-2016-8621: curl_getdate read out of bounds
       CVE-2016-8622: URL unescape heap overflow via integer truncation
       CVE-2016-8623: Use-after-free via shared cookies
       CVE-2016-8624: invalid URL parsing with '#'
       CVE-2016-8625: IDNA 2003 makes curl use wrong host
       For more information, see:
       https://curl.haxx.se/docs/adv_20161102A.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
       https://curl.haxx.se/docs/adv_20161102B.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
       https://curl.haxx.se/docs/adv_20161102C.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
       https://curl.haxx.se/docs/adv_20161102D.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
       https://curl.haxx.se/docs/adv_20161102E.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
       https://curl.haxx.se/docs/adv_20161102F.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
       https://curl.haxx.se/docs/adv_20161102G.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
       https://curl.haxx.se/docs/adv_20161102H.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
       https://curl.haxx.se/docs/adv_20161102I.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
       https://curl.haxx.se/docs/adv_20161102J.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
       https://curl.haxx.se/docs/adv_20161102K.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
       (* Security fix *)
xap/gnuchess-6.2.4-i586-1.txz: Upgraded.
xap/vim-gvim-8.0.0055-i586-1.txz: Upgraded.
+--------------------------+
Mon Oct 31 23:38:24 UTC 2016
a/grep-2.26-i586-1.txz: Upgraded.
a/kernel-generic-4.4.29-i586-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-generic-smp-4.4.29_smp-i686-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-huge-4.4.29-i586-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-huge-smp-4.4.29_smp-i686-1.txz: Upgraded.
       Fixes a security issue (Dirty COW).
       (* Security fix *)
a/kernel-modules-4.4.29-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.29_smp-i686-1.txz: Upgraded.
ap/mariadb-10.0.28-i586-1.txz: Upgraded.
       This update fixes several security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663
       (* Security fix *)
d/gdb-7.12-i586-1.txz: Upgraded.
d/guile-2.0.13-i586-1.txz: Upgraded.
d/kernel-headers-4.4.29_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.29_smp-noarch-1.txz: Upgraded.
       This kernel fixes a security issue known as "Dirty COW". A race
       condition was found in the way the Linux kernel's memory subsystem
       handled the copy-on-write (COW) breakage of private read-only
       memory mappings. An unprivileged local user could use this flaw to
       gain write access to otherwise read-only memory mappings and thus
       increase their privileges on the system.
       For more information, see:
       https://dirtycow.ninja/
       https://www.kb.cert.org/vuls/id/243144
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
       (* Security fix *)
l/libcdio-0.94-i586-1.txz: Upgraded.
n/nmap-7.30-i586-1.txz: Upgraded.
n/php-5.6.27-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.27
       (* Security fix *)
x/libX11-1.6.4-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory read in XGetImage() or write in XListFonts().
       Affected versions libX11 <= 1.6.3.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
       (* Security fix *)
x/libXfixes-5.0.3-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause an integer
       overflow on 32 bit architectures.
       Affected versions : libXfixes <= 5.0.2.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
       (* Security fix *)
x/libXi-1.7.8-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected versions libXi <= 1.7.6.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
       (* Security fix *)
x/libXrandr-1.5.1-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected versions: libXrandr <= 1.5.0.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
       (* Security fix *)
x/libXrender-0.9.10-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory writes.
       Affected version: libXrender <= 0.9.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
       (* Security fix *)
x/libXtst-1.2.3-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory access or endless loops (Denial of Service).
       Affected version libXtst <= 1.2.2.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
       (* Security fix *)
x/libXv-1.0.11-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause out of boundary
       memory and memory corruption.
       Affected version libXv <= 1.0.10.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
       (* Security fix *)
x/libXvMC-1.0.10-i586-1.txz: Upgraded.
       Insufficient validation of data from the X server can cause a one byte buffer
       read underrun.
       Affected version: libXvMC <= 1.0.9.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
       (* Security fix *)
xap/mozilla-firefox-49.0.2-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/xscreensaver-5.36-i586-1.txz: Upgraded.
extra/linux-4.4.29-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Oct 1 17:11:13 UTC 2016
a/kernel-firmware-20161001git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.23-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.23-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.23-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.23_smp-i686-1.txz: Upgraded.
a/lvm2-2.02.166-i586-1.txz: Upgraded.
d/kernel-headers-4.4.23_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.23_smp-noarch-1.txz: Upgraded.
n/mutt-1.7.0-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.4.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
extra/linux-4.4.23-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Sep 28 23:24:37 UTC 2016
a/glibc-zoneinfo-2016g-noarch-1.txz: Upgraded.
       This package provides the latest timezone updates.
l/mpfr-3.1.5-i586-1.txz: Upgraded.
+--------------------------+
Tue Sep 27 19:16:56 UTC 2016
ap/hplip-3.16.9-i586-1.txz: Upgraded.
       Reenabled parallel port support. Thanks to Jas for the bug report.
n/bind-9.10.4_P3-i586-1.txz: Upgraded.
       This update fixes a denial-of-service vulnerability. Testing by ISC has
       uncovered a critical error condition which can occur when a nameserver is
       constructing a response. A defect in the rendering of messages into
       packets can cause named to exit with an assertion failure in buffer.c while
       constructing a response to a query that meets certain criteria.
       For more information, see:
       https://kb.isc.org/article/AA-01419/0
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776
       (* Security fix *)
xap/gnuchess-6.2.3-i586-1.txz: Upgraded.
       Upgraded to gnuchess-6.2.3 and xboard-4.9.1.
+--------------------------+
Mon Sep 26 18:14:08 UTC 2016
a/openssl-solibs-1.0.2j-i586-1.txz: Upgraded.
a/pkgtools-14.2-noarch-13.txz: Rebuilt.
       removepkg: Fixed removing filenames containing "%".
       Thanks to SeB for the bug report, and to Jim Hawkins for the patch.
n/openssl-1.0.2j-i586-1.txz: Upgraded.
       This update fixes a security issue:
       Missing CRL sanity check (CVE-2016-7052)
       For more information, see:
       https://www.openssl.org/news/secadv/20160926.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052
       (* Security fix *)
+--------------------------+
Sun Sep 25 02:32:25 UTC 2016
a/kernel-firmware-20160924git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.22-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.22_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.22-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.22_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.22-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.22_smp-i686-1.txz: Upgraded.
d/kernel-headers-4.4.22_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.22_smp-noarch-1.txz: Upgraded.
n/sshfs-2.8-i586-1.txz: Added.
       Thanks to Heinz Wiesinger.
extra/linux-4.4.22-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Sep 23 23:30:53 UTC 2016
n/php-5.6.26-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://php.net/ChangeLog-5.php#5.6.26
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
       (* Security fix *)
+--------------------------+
Thu Sep 22 18:38:07 UTC 2016
a/openssl-solibs-1.0.2i-i586-1.txz: Upgraded.
n/openssl-1.0.2i-i586-1.txz: Upgraded.
       This update fixes denial-of-service and other security issues.
       For more information, see:
       https://www.openssl.org/news/secadv/20160922.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308
       (* Security fix *)
+--------------------------+
Wed Sep 21 21:10:52 UTC 2016
n/irssi-0.8.20-i586-1.txz: Upgraded.
       This update fixes two remote crash and heap corruption vulnerabilites
       in Irssi's format parsing code. Impact: Remote crash and heap
       corruption. Remote code execution seems difficult since only Nuls are
       written. Bugs discovered by, and patches provided by Gabriel Campana
       and Adrien Guinet from Quarkslab.
       For more information, see:
       https://irssi.org/security/irssi_sa_2016.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045
       (* Security fix *)
+--------------------------+
Wed Sep 21 15:54:06 UTC 2016
a/mkinitrd-1.4.8-i586-9.txz: Rebuilt.
       When generating the initrd, include dmsetup whenever LUKS is requested.
       Thanks to TracyTiger for the bug report and Eric Hameleers for the patch.
e/emacs-25.1-i586-1.txz: Upgraded.
l/qt-4.8.7-i586-5.txz: Rebuilt.
       In the .prl files, make sure to use -L/usr/X11R6/lib64 on 64-bit to avoid
       ld warnings when using qmake on a multilib system.
       Thanks to Jonathan Woithe for the bug report and fix.
n/network-scripts-14.2-noarch-4.txz: Rebuilt.
       rc.inet1.new: Use return (not continue) to leave the if_up() function.
       Thanks to Tim Thomas for the bug report.
xap/mozilla-firefox-49.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/pidgin-2.11.0-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       https://www.pidgin.im/news/security/
       (* Security fix *)
+--------------------------+
Thu Sep 15 22:54:52 UTC 2016
a/bash-4.4.0-i586-1.txz: Upgraded.
a/btrfs-progs-v4.7.2-i586-1.txz: Upgraded.
a/e2fsprogs-1.43.3-i586-1.txz: Upgraded.
a/pkgtools-14.2-noarch-12.txz: Rebuilt.
       removepkg: Fixed removing packages with >= 3 hyphens in the package name
       when using just the package name rather than the full name including
       version, arch, and build.
       Thanks to coralfang for the bug report, Jim Hawkins and Stuart Winter for
       the patch, and SeB for testing and feedback.
       removepkg: Handle filenames that contain backslashes.
       Thanks to aaazen for the bug report and patch.
ap/vim-8.0.0005-i586-1.txz: Upgraded.
n/curl-7.50.3-i586-1.txz: Upgraded.
       Fixed heap overflows in four libcurl functions: curl_escape(),
       curl_easy_escape(), curl_unescape() and curl_easy_unescape().
       For more information, see:
       https://curl.haxx.se/docs/adv_20160914.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
       (* Security fix *)
xap/vim-gvim-8.0.0005-i586-1.txz: Upgraded.
+--------------------------+
Tue Sep 13 18:13:32 UTC 2016
ap/mariadb-10.0.27-i586-1.txz: Upgraded.
       This update fixes a critical vulnerability which can allow local and
       remote attackers to inject malicious settings into MySQL configuration
       files (my.cnf). A successful exploitation could allow attackers to
       execute arbitrary code with root privileges which would then allow them
       to fully compromise the server.
       This issue was discovered and reported by Dawid Golunski.
       For more information, see:
       http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
       https://jira.mariadb.org/browse/MDEV-10465
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
       (* Security fix *)
ap/vim-8.0.0003-i586-1.txz: Upgraded.
xap/vim-gvim-8.0.0003-i586-1.txz: Upgraded.
+--------------------------+
Mon Sep 12 18:39:03 UTC 2016
ap/texinfo-6.3-i586-1.txz: Upgraded.
d/guile-2.0.12-i586-2.txz: Rebuilt.
       Match timestamps across all $ARCH on *.go and *.scm files, otherwise
       on multilib systems the compiled (go) files may be detected as older
       than the source (scm) files, causing guile to attempt to recompile
       itself with every use.
l/sdl-1.2.15-i586-5.txz: Rebuilt.
       Fixed a regression that broke MOD support. Thanks to B Watson.
x/libXfont-1.5.2-i586-1.txz: Upgraded.
x/mesa-12.0.2-i586-1.txz: Upgraded.
+--------------------------+
Sat Sep 10 18:04:42 UTC 2016
l/gtk+2-2.24.31-i586-1.txz: Upgraded.
       This update fixes a security issue: Integer overflow in the
       gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote
       attackers to cause a denial of service (crash) via a large image file,
       which triggers a large memory allocation.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
       (* Security fix *)
n/gnutls-3.4.15-i586-1.txz: Upgraded.
       libgnutls: Corrected the comparison of the serial size in OCSP response.
       Previously the OCSP certificate check wouldn't verify the serial length
       and could succeed in cases it shouldn't (GNUTLS-SA-2016-3).
       Reported by Stefan Buehler.
       For more information, see:
       https://www.gnutls.org/security.html
       (* Security fix *)
+--------------------------+
Thu Sep 8 21:35:02 UTC 2016
a/kernel-generic-4.4.20-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.20-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.20-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.20_smp-i686-1.txz: Upgraded.
a/kmod-23-i586-2.txz: Rebuilt.
a/util-linux-2.28.2-i586-1.txz: Upgraded.
ap/hplip-3.16.8-i586-1.txz: Upgraded.
ap/nano-2.7.0-i586-1.txz: Upgraded.
ap/pamixer-1.3.1-i586-2.txz: Rebuilt.
ap/rpm-4.12.0.1-i586-2.txz: Rebuilt.
ap/vim-7.4.2342-i586-1.txz: Upgraded.
d/Cython-0.24.1-i586-1.txz: Upgraded.
d/gdb-7.11.1-i586-2.txz: Rebuilt.
d/kernel-headers-4.4.20_smp-x86-1.txz: Upgraded.
d/mercurial-3.9.1-i586-1.txz: Upgraded.
d/python-2.7.12-i586-1.txz: Upgraded.
       Compiled using --enable-unicode=ucs4.
       The upstream default for Python Unicode is ucs2, but ucs4 is more widely
       used and recommended now. Any Python scripts or binaries that use UCS-2
       will need to be recompiled. These can be identified with the following
       grep command: grep -r -l PyUnicodeUCS2 /usr 2> /dev/null
k/kernel-source-4.4.20_smp-noarch-1.txz: Upgraded.
kde/calligra-2.9.11-i586-6.txz: Rebuilt.
kde/kate-4.14.3-i586-3.txz: Rebuilt.
kde/kdev-python-1.7.2-i586-2.txz: Rebuilt.
kde/kig-4.14.3-i586-4.txz: Rebuilt.
kde/kross-interpreters-4.14.3-i586-3.txz: Rebuilt.
kde/pykde4-4.14.3-i586-4.txz: Rebuilt.
kde/superkaramba-4.14.3-i586-3.txz: Rebuilt.
l/PyQt-4.11.4-i586-2.txz: Rebuilt.
l/akonadi-1.13.0-i586-3.txz: Rebuilt.
l/boost-1.61.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/dbus-python-1.2.4-i586-2.txz: Rebuilt.
l/gdbm-1.12-i586-2.txz: Rebuilt.
l/glib2-2.46.2-i586-4.txz: Rebuilt.
l/gobject-introspection-1.46.0-i586-2.txz: Rebuilt.
l/libxml2-2.9.4-i586-3.txz: Rebuilt.
l/pilot-link-0.12.5-i586-11.txz: Rebuilt.
l/pycups-1.9.73-i586-2.txz: Rebuilt.
l/pycurl-7.43.0-i586-2.txz: Rebuilt.
l/pygobject-2.28.6-i486-3.txz: Rebuilt.
l/pygobject3-3.18.2-i586-2.txz: Rebuilt.
l/pygtk-2.24.0-i586-3.txz: Rebuilt.
l/python-pillow-3.0.0-i586-2.txz: Rebuilt.
l/sip-4.18.1-i586-1.txz: Upgraded.
n/php-5.6.25-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       http://php.net/ChangeLog-5.php#5.6.25
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
       (* Security fix *)
n/samba-4.5.0-i586-1.txz: Upgraded.
xap/blueman-2.0.4-i586-2.txz: Rebuilt.
xap/gimp-2.8.18-i586-2.txz: Rebuilt.
xap/vim-gvim-7.4.2342-i586-1.txz: Upgraded.
extra/brltty/brltty-5.4-i586-1.txz: Upgraded.
extra/linux-4.4.20-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Aug 31 20:43:10 UTC 2016
l/gsl-2.2.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-45.3.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Tue Aug 30 22:10:31 UTC 2016
testing/packages/gcc-6.2.0-i586-1.txz: Added.
testing/packages/gcc-g++-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gfortran-6.2.0-i586-1.txz: Added.
testing/packages/gcc-gnat-6.2.0-i586-1.txz: Added.
testing/packages/gcc-go-6.2.0-i586-1.txz: Added.
testing/packages/gcc-java-6.2.0-i586-1.txz: Added.
       Please note that if you install this package, gettext (specifically the
       gettext-tools package) will need to be recompiled.
testing/packages/gcc-objc-6.2.0-i586-1.txz: Added.
+--------------------------+
Mon Aug 29 22:51:27 UTC 2016
a/gawk-4.1.4-i586-1.txz: Upgraded.
l/gsl-2.2-i586-1.txz: Upgraded.
+--------------------------+
Wed Aug 24 19:37:40 UTC 2016
xap/mozilla-firefox-48.0.2-i586-1.txz: Upgraded.
+--------------------------+
Tue Aug 23 19:45:33 UTC 2016
a/glibc-solibs-2.24-i586-2.txz: Rebuilt.
a/kernel-firmware-20160823git-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.19-i586-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-generic-smp-4.4.19_smp-i686-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-huge-4.4.19-i586-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-huge-smp-4.4.19_smp-i686-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
a/kernel-modules-4.4.19-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.19_smp-i686-1.txz: Upgraded.
ap/diffutils-3.5-i586-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.72-i586-1.txz: Upgraded.
       Thanks to Stuart Winter.
ap/screen-4.4.0-i586-2.txz: Rebuilt.
       Reverted a change to /etc/screenrc.new that prevented the console from being
       cleared when a screen session was detached. Thanks to Stuart Winter.
d/binutils-2.27-i586-2.txz: Rebuilt.
       Recompiled with --disable-compressed-debug-sections, since other tools are
       not yet capable of parsing that.
       Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter.
d/kernel-headers-4.4.19_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.19_smp-noarch-1.txz: Upgraded.
       A flaw was found in the implementation of the Linux kernels handling of
       networking challenge ack where an attacker is able to determine the shared
       counter. This may allow an attacker located on different subnet to inject
       or take over a TCP connection between a server and client without having to
       be a traditional Man In the Middle (MITM) style attack.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
       (* Security fix *)
l/glib2-2.46.2-i586-3.txz: Rebuilt.
       Applied upstream patch to fix a use-before-allocate bug in libgio. Without
       this fix, Thunar will crash if $HOME is on an NFS volume.
       Thanks to Jonathan Woithe.
l/glibc-2.24-i586-2.txz: Rebuilt.
       If libm.so is a linker script, don't clobber it with a symlink.
       Thanks to guanx.
l/glibc-i18n-2.24-i586-2.txz: Rebuilt.
l/glibc-profile-2.24-i586-2.txz: Rebuilt.
n/gnupg-1.4.21-i586-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/libgcrypt-1.7.3-i586-1.txz: Upgraded.
       Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
       obtains 580 bytes from the standard RNG can trivially predict the next
       20 bytes of output. (This is according to the NEWS file included in the
       source. According to the annoucement linked below, an attacker who obtains
       4640 bits from the RNG can trivially predict the next 160 bits of output.)
       Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
       For more information, see:
       https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
       (* Security fix *)
n/network-scripts-14.2-noarch-3.txz: Rebuilt.
       In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
       to speed up the boot time slightly.
       Thanks to Amritpal Bath.
n/stunnel-5.35-i586-2.txz: Rebuilt.
       Fixed incorrect config file name in generate-stunnel-key.sh.
       Thanks to Ebben Aries.
xap/mozilla-firefox-48.0.1-i586-1.txz: Upgraded.
extra/linux-4.4.19-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Aug 11 18:24:29 UTC 2016
a/glibc-solibs-2.24-i586-1.txz: Upgraded.
a/glibc-zoneinfo-2016f-noarch-1.txz: Upgraded.
a/kernel-generic-4.4.17-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.17-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.17-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.17_smp-i686-1.txz: Upgraded.
ap/diffutils-3.4-i586-1.txz: Upgraded.
ap/vim-7.4.2196-i586-1.txz: Upgraded.
d/binutils-2.27-i586-1.txz: Upgraded.
d/gcc-5.4.0-i586-1.txz: Upgraded.
d/gcc-g++-5.4.0-i586-1.txz: Upgraded.
d/gcc-gfortran-5.4.0-i586-1.txz: Upgraded.
d/gcc-gnat-5.4.0-i586-1.txz: Upgraded.
d/gcc-go-5.4.0-i586-1.txz: Upgraded.
d/gcc-java-5.4.0-i586-1.txz: Upgraded.
d/gcc-objc-5.4.0-i586-1.txz: Upgraded.
d/kernel-headers-4.4.17_smp-x86-1.txz: Upgraded.
d/llvm-3.8.1-i586-1.txz: Upgraded.
d/oprofile-1.1.0-i586-2.txz: Rebuilt.
k/kernel-source-4.4.17_smp-noarch-1.txz: Upgraded.
l/glibc-2.24-i586-1.txz: Upgraded.
l/glibc-i18n-2.24-i586-1.txz: Upgraded.
l/glibc-profile-2.24-i586-1.txz: Upgraded.
xap/mozilla-firefox-48.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/firefox.html
       (* Security fix *)
xap/vim-gvim-7.4.2196-i586-1.txz: Upgraded.
extra/linux-4.4.17-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Aug 6 19:29:16 UTC 2016
n/curl-7.50.1-i586-1.txz: Upgraded.
       This release fixes security issues:
       TLS: switch off SSL session id when client cert is used
       TLS: only reuse connections with the same client cert
       curl_multi_cleanup: clear connection pointer for easy handles
       For more information, see:
       https://curl.haxx.se/docs/adv_20160803A.html
       https://curl.haxx.se/docs/adv_20160803B.html
       https://curl.haxx.se/docs/adv_20160803C.html
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
       (* Security fix *)
n/mutt-1.6.2-i586-1.txz: Upgraded.
n/openssh-7.3p1-i586-1.txz: Upgraded.
       This is primarily a bugfix release, and also addresses security issues.
       sshd(8): Mitigate a potential denial-of-service attack against the system's
       crypt(3) function via sshd(8).
       sshd(8): Mitigate timing differences in password authentication that could
       be used to discern valid from invalid account names when long passwords were
       sent and particular password hashing algorithms are in use on the server.
       ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
       countermeasures.
       ssh(1), sshd(8): Improve operation ordering of MAC verification for
       Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
       before decrypting any ciphertext.
       sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
       For more information, see:
       http://www.openssh.com/txt/release-7.3
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
       (* Security fix *)
n/stunnel-5.35-i586-1.txz: Upgraded.
       Fixes security issues:
       Fixed malfunctioning "verify = 4".
       Fixed incorrectly enforced client certificate requests.
       (* Security fix *)
+--------------------------+
Thu Jul 28 19:44:25 UTC 2016
a/kernel-generic-4.4.16-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.16_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.16-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.16_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.16-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.16_smp-i686-1.txz: Upgraded.
d/kernel-headers-4.4.16_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.16_smp-noarch-1.txz: Upgraded.
l/libidn-1.33-i586-1.txz: Upgraded.
       Fixed out-of-bounds read bugs. Fixed crashes on invalid UTF-8.
       Thanks to Hanno Böck.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
       (* Security fix *)
l/libtasn1-4.9-i586-1.txz: Upgraded.
n/bluez-5.41-i586-1.txz: Upgraded.
extra/linux-4.4.16-nosmp-sdk/*: Upgraded.
extra/tigervnc/tigervnc-1.6.0-i586-4.txz: Rebuilt.
       Recompiled for xorg-server-1.18.4.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Jul 25 19:59:06 UTC 2016
a/pkgtools-14.2-noarch-11.txz: Rebuilt.
       Changes to pkgtool:
       Remove option to install from floppy disks.
       Don't use the --file option, which appears to be broken in the latest version
       of dialog. The only reason --file was ever used in the first place was to
       work around the Linux ARG_MAX limit of 131072 bytes, and since Linux 2.6.23 a
       much larger limit is in place making it unlikely to become an issue again.
       So we'll go back to passing the package list on the command line.
       Thanks to David Miller for the bug report.
+--------------------------+
Fri Jul 22 20:51:23 UTC 2016
a/dialog-1.3_20160424-i586-1.txz: Upgraded.
a/kmod-23-i586-1.txz: Upgraded.
a/lvm2-2.02.161-i586-1.txz: Upgraded.
d/git-2.9.2-i586-1.txz: Upgraded.
l/desktop-file-utils-0.23-i586-1.txz: Upgraded.
l/freetype-2.6.5-i586-1.txz: Upgraded.
l/harfbuzz-1.3.0-i586-1.txz: Upgraded.
n/bind-9.10.4_P2-i586-1.txz: Upgraded.
       Fixed a security issue:
       getrrsetbyname with a non absolute name could trigger an infinite
       recursion bug in lwresd and named with lwres configured if when
       combined with a search list entry the resulting name is too long.
       (CVE-2016-2775) [RT #42694]
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
       (* Security fix *)
n/httpd-2.4.23-i586-1.txz: Upgraded.
n/lftp-4.7.3-i586-1.txz: Upgraded.
n/links-2.13-i586-1.txz: Upgraded.
x/xf86-video-openchrome-0.5.0-i586-1.txz: Upgraded.
x/xkeyboard-config-2.18-noarch-1.txz: Upgraded.
x/xorg-server-1.18.4-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.18.4-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.18.4-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.18.4-i586-1.txz: Upgraded.
+--------------------------+
Thu Jul 21 23:25:54 UTC 2016
ap/tmux-2.2-i586-2.txz: Upgraded.
       Moved from /testing.
d/guile-2.0.12-i586-1.txz: Upgraded.
l/freetype-2.6.4-i586-1.txz: Upgraded.
n/libgcrypt-1.7.2-i586-1.txz: Upgraded.
n/network-scripts-14.2-noarch-2.txz: Rebuilt.
       In rc.inet1.new, use -L option to dhcpcd to disable Zeroconf. This is
       (almost) never going to be wanted, and ends up used accidentally on slower
       systems (such as some ARM platforms), preventing a proper DHCP lease.
       Thanks to Stuart Winter.
n/php-5.6.24-i586-1.txz: Upgraded.
       This release fixes bugs and security issues.
       For more information, see:
       http://php.net/ChangeLog-5.php#5.6.24
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
       (* Security fix *)
xap/gimp-2.8.18-i586-1.txz: Upgraded.
       This release fixes a security issue:
       Use-after-free vulnerability in the xcf_load_image function in
       app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of
       service (program crash) or possibly execute arbitrary code via a crafted
       XCF file.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994
       (* Security fix *)
+--------------------------+
Tue Jul 12 03:48:34 UTC 2016
a/etc-14.2-i586-8.txz: Rebuilt.
       In /etc/profile.d/lang.{csh,sh}.new, make en_US.UTF-8 the default locale.
a/kernel-generic-4.4.15-i586-1.txz: Upgraded.
a/kernel-generic-smp-4.4.15_smp-i686-1.txz: Upgraded.
a/kernel-huge-4.4.15-i586-1.txz: Upgraded.
a/kernel-huge-smp-4.4.15_smp-i686-1.txz: Upgraded.
a/kernel-modules-4.4.15-i586-1.txz: Upgraded.
a/kernel-modules-smp-4.4.15_smp-i686-1.txz: Upgraded.
a/lilo-24.2-i586-3.txz: Rebuilt.
       In liloconfig: Skip the menu asking if the user wants a UTF-8 virtual
       console, and use the kernel default (currently this is UTF-8 active).
d/kernel-headers-4.4.15_smp-x86-1.txz: Upgraded.
k/kernel-source-4.4.15_smp-noarch-1.txz: Upgraded.
extra/linux-4.4.15-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Jul 9 18:35:56 UTC 2016
x/mesa-12.0.1-i586-1.txz: Upgraded.
+--------------------------+
Fri Jul 8 23:17:22 UTC 2016
x/mesa-12.0.0-i586-1.txz: Upgraded.
+--------------------------+
Thu Jul 7 19:52:36 UTC 2016
n/samba-4.4.5-i586-1.txz: Upgraded.
       This release fixes a security issue:
       Client side SMB2/3 required signing can be downgraded.
       It's possible for an attacker to downgrade the required signing for an
       SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
       SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can
       impersonate a server being connected to by Samba, and return malicious
       results.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
       (* Security fix *)
+--------------------------+
Tue Jul 5 04:52:45 UTC 2016
xap/mozilla-thunderbird-45.2.0-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
       (* Security fix *)
+--------------------------+
Sun Jul 3 19:29:33 UTC 2016
a/file-5.28-i586-1.txz: Upgraded.
a/util-linux-2.28-i586-1.txz: Upgraded.
xap/mozilla-firefox-47.0.1-i586-1.txz: Upgraded.
+--------------------------+
Thu Jun 30 20:26:57 UTC 2016
Slackware 14.2 x86 stable is released!

The long development cycle (the Linux community has lately been living in
"interesting times", as they say) is finally behind us, and we're proud to
announce the release of Slackware 14.2. The new release brings many updates
and modern tools, has switched from udev to eudev (no systemd), and adds
well over a hundred new packages to the system. Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
32-bit/64-bit x86/x86_64 DVD. Please consider supporting the Slackware
project by picking up a copy from store.slackware.com. We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Have fun! :-)
Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.