summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2018-05-25 23:29:36 +0000
committer Eric Hameleers <alien@slackware.com>2018-05-31 15:16:15 -0700
commit3152fcc3bbd4cabf01c7e70766a305ce4c725881 (patch)
tree59b07e5d76b8023848dff79ce5fe6b83cd536925
parent9664bee729d487bcc0a0bc35859f8e13d5421c75 (diff)
downloadcurrent-14.0.tar.gz
current-14.0.tar.xz
Fri May 25 23:29:36 UTC 201814.0
patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txz: Rebuilt. Handle removal of US/Pacific-New timezone. If we see that the machine is using this, it will be automatically switched to US/Pacific.
-rw-r--r--ChangeLog.txt4490
-rw-r--r--FILELIST.TXT7203
-rw-r--r--READ_DVD.TXT6532
-rw-r--r--isolinux/isolinux.bootbin2048 -> 0 bytes
-rw-r--r--pasture/source/php/doinst.sh28
-rwxr-xr-xpasture/source/php/fetch-php.sh1
-rw-r--r--pasture/source/php/mod_php.conf.example29
-rw-r--r--pasture/source/php/php-fpm.conf.diff28
-rwxr-xr-xpasture/source/php/php.SlackBuild311
-rw-r--r--pasture/source/php/php.ini-development.diff58
-rw-r--r--pasture/source/php/slack-desc19
-rw-r--r--patches/packages/MPlayer-1.2_20160125-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/apr-1.5.0-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/apr-util-1.5.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/bash-4.2.053-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/bind-9.9.11_P1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/blueman-r708-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/bluez-4.99-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/ca-certificates-20161130-noarch-1_slack14.0.txt11
-rw-r--r--patches/packages/cups-1.5.4-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/curl-7.60.0-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txt11
-rw-r--r--patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/dnsmasq-2.78-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/emacs-25.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/expat-2.2.2-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/flac-1.3.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/gdk-pixbuf2-2.26.1-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/gegl-0.2.0-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/git-2.14.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/glibc-2.15-x86_64-9_slack14.0.txt11
-rw-r--r--patches/packages/glibc-i18n-2.15-x86_64-9_slack14.0.txt11
-rw-r--r--patches/packages/glibc-profile-2.15-x86_64-9_slack14.0.txt11
-rw-r--r--patches/packages/glibc-solibs-2.15-x86_64-9_slack14.0.txt11
-rw-r--r--patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txt11
-rw-r--r--patches/packages/gnupg-1.4.22-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/gnutls-3.3.26-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txt11
-rw-r--r--patches/packages/httpd-2.4.29-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/imagemagick-6.7.7_10-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/inputproto-2.3.2-noarch-1_slack14.0.txt11
-rw-r--r--patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/irssi-1.0.7-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/jasper-1.900.1-x86_64-4_slack14.0.txt11
-rw-r--r--patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/libX11-1.6.4-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXcursor-1.1.15-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXext-1.3.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXfixes-5.0.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXfont-1.4.7-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/libXi-1.7.8-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXrandr-1.5.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXrender-0.9.10-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXtst-1.2.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXv-1.0.11-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libXvMC-1.0.10-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libgcrypt-1.5.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libidn-1.34-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libiodbc-3.52.8-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libjpeg-v8a-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/libpcap-1.8.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libpng-1.4.20-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libsndfile-1.0.26-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libssh-0.7.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libtasn1-2.14-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libvorbis-1.3.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libwmf-0.2.8.4-x86_64-6_slack14.0.txt11
-rw-r--r--patches/packages/libxcb-1.11.1-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/libxml2-2.9.5-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libxslt-1.1.29-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/libyaml-0.1.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-firmware-20180104_65b1c68-noarch-1.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-generic-3.2.98-x86_64-1.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-headers-3.2.98-x86-1.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-huge-3.2.98-x86_64-1.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-modules-3.2.98-x86_64-1.txt11
-rw-r--r--patches/packages/linux-3.2.98/kernel-source-3.2.98-noarch-1.txt11
-rw-r--r--patches/packages/llvm-3.0-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/lm_sensors-3.3.4-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/loudmouth-1.5.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/lynx-2.8.8rel.2-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mailx-12.5-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/make-3.82-x86_64-4_slack14.0.txt11
-rw-r--r--patches/packages/mcabber-1.0.5-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mercurial-4.3.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/minicom-2.7.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mkinitrd-1.4.10-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mozilla-firefox-17.0.11esr-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mozilla-nss-3.23-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mozilla-thunderbird-17.0.11esr-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/mutt-1.5.23-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/mysql-5.5.52-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/nettle-2.7.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/ntp-4.2.8p11-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/openssh-7.4p1-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/openssl-1.0.1u-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/openssl-solibs-1.0.1u-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/openvpn-2.4.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/patch-2.7.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/perl-5.16.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/php-5.6.36-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/pidgin-2.12.0-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/polkit-0.105-x86_64-4_slack14.0.txt11
-rw-r--r--patches/packages/poppler-0.20.2-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/ppp-2.4.5-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/proftpd-1.3.5e-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/python-2.7.15-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/randrproto-1.5.0-noarch-1_slack14.0.txt11
-rw-r--r--patches/packages/rsync-3.1.3-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/ruby-1.9.3_p484-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/rxvt-2.7.10-x86_64-5_slack14.0.txt11
-rw-r--r--patches/packages/samba-4.4.16-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/sdl-1.2.14-x86_64-6_slack14.0.txt11
-rw-r--r--patches/packages/seamonkey-2.38-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/seamonkey-solibs-2.38-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/sendmail-8.14.9-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/sendmail-cf-8.14.9-noarch-1_slack14.0.txt11
-rw-r--r--patches/packages/sqlite-3.7.14.1-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/stunnel-5.35-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/subversion-1.7.22-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/sudo-1.8.20p2-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/tcpdump-4.9.2-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/tumbler-0.1.25-x86_64-3_slack14.0.txt11
-rw-r--r--patches/packages/udisks-1.0.5-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/udisks2-1.98.0-x86_64-2_slack14.0.txt11
-rw-r--r--patches/packages/vim-7.4.399-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/vim-gvim-7.4.399-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/wget-1.19.5-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/xcb-proto-1.11-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/xextproto-7.3.0-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/xfce4-weather-plugin-0.8.10-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/xorg-server-1.12.4-x86_64-5_slack14.0.txt11
-rw-r--r--patches/packages/xorg-server-xephyr-1.12.4-x86_64-5_slack14.0.txt11
-rw-r--r--patches/packages/xorg-server-xnest-1.12.4-x86_64-5_slack14.0.txt11
-rw-r--r--patches/packages/xorg-server-xvfb-1.12.4-x86_64-5_slack14.0.txt11
-rw-r--r--patches/packages/xpdf-3.03-x86_64-1_slack14.0.txt11
-rw-r--r--patches/packages/xproto-7.0.29-noarch-1_slack14.0.txt11
-rw-r--r--patches/packages/xscreensaver-5.38-x86_64-1_slack14.0.txt11
-rwxr-xr-xpatches/source/MPlayer/MPlayer.SlackBuild488
-rw-r--r--patches/source/MPlayer/slack-desc20
-rwxr-xr-xpatches/source/apr-util/apr-util.SlackBuild124
-rw-r--r--patches/source/apr-util/apr-util.url2
-rw-r--r--patches/source/apr-util/slack-desc19
-rwxr-xr-xpatches/source/apr/apr.SlackBuild110
-rw-r--r--patches/source/apr/apr.url2
-rw-r--r--patches/source/apr/slack-desc19
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00178
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00260
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-003318
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00453
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-005131
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00646
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00746
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00874
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-00982
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01061
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01146
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-012151
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01352
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01447
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01581
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01646
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01747
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01874
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-01947
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02060
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02161
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02261
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02362
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02445
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-025143
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02658
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02747
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-02852
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-029524
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-030178
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03180
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03275
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03357
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03446
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03566
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03692
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-037112
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03847
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-03958
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04056
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04147
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04257
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04365
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04470
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04553
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04655
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04749
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-048104
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-04943
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-050217
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-051173
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-05259
-rw-r--r--patches/source/bash/bash-4.2-patches/bash42-053132
-rw-r--r--patches/source/bash/bash.CVE-2016-0634.bash43-047150
-rw-r--r--patches/source/bash/bash.CVE-2016-7543.bash43-04854
-rwxr-xr-xpatches/source/bash/bash.SlackBuild173
-rw-r--r--patches/source/bash/doinst.sh18
-rw-r--r--patches/source/bash/slack-desc19
-rw-r--r--patches/source/bind/3link.sh136
-rwxr-xr-xpatches/source/bind/bind.SlackBuild166
-rw-r--r--patches/source/bind/bind.so_bsdcompat.diff11
-rw-r--r--patches/source/bind/caching-example/localhost.zone11
-rw-r--r--patches/source/bind/caching-example/named.conf31
-rw-r--r--patches/source/bind/caching-example/named.local10
-rw-r--r--patches/source/bind/caching-example/named.root90
-rw-r--r--patches/source/bind/doinst.sh36
-rw-r--r--patches/source/bind/rc.bind112
-rw-r--r--patches/source/bind/slack-desc19
-rw-r--r--patches/source/blueman/blueman-open114
-rw-r--r--patches/source/blueman/blueman-use_blueman-open_for_obexfs.diff12
-rw-r--r--patches/source/blueman/blueman.CVE-2015-8612.diff21
-rwxr-xr-xpatches/source/blueman/blueman.SlackBuild134
-rw-r--r--patches/source/blueman/doinst.sh23
-rw-r--r--patches/source/blueman/slack-desc19
-rw-r--r--patches/source/bluez/bluez-4.99.tar.sign17
-rw-r--r--patches/source/bluez/bluez.CVE-2017-1000251.diff27
-rwxr-xr-xpatches/source/bluez/bluez.SlackBuild189
-rw-r--r--patches/source/bluez/bluez.enable.audio.socket.diff12
-rw-r--r--patches/source/bluez/config/bluetooth.modprobe3
-rw-r--r--patches/source/bluez/config/rc.bluetooth29
-rw-r--r--patches/source/bluez/doinst.sh28
-rw-r--r--patches/source/bluez/slack-desc19
-rwxr-xr-xpatches/source/ca-certificates/ca-certificates.SlackBuild91
-rw-r--r--patches/source/ca-certificates/doinst.sh19
-rw-r--r--patches/source/ca-certificates/patches/fixup_DESTDIR.diff49
-rw-r--r--patches/source/ca-certificates/patches/fixup_update-ca-certificates.diff12
-rw-r--r--patches/source/ca-certificates/setup.11.cacerts3
-rw-r--r--patches/source/ca-certificates/slack-desc19
-rwxr-xr-xpatches/source/cups/cups.SlackBuild196
-rw-r--r--patches/source/cups/cups.url1
-rw-r--r--patches/source/cups/doinst.sh34
-rw-r--r--patches/source/cups/slack-desc19
-rw-r--r--patches/source/cups/str4609-1.5.patch341
-rw-r--r--patches/source/cups/usb-backend-reset-after-job-only-for-specific-devices.patch74
-rwxr-xr-xpatches/source/curl/cacert-fetch.sh1
-rw-r--r--patches/source/curl/cacert.pem3338
-rwxr-xr-xpatches/source/curl/curl.SlackBuild152
-rw-r--r--patches/source/curl/slack-desc19
-rw-r--r--patches/source/dbus/dbus-1.4.x-allow_root_globally.diff18
-rw-r--r--patches/source/dbus/dbus.CVE-2013-2168.diff91
-rwxr-xr-xpatches/source/dbus/dbus.SlackBuild145
-rw-r--r--patches/source/dbus/dbus.set.home.diff22
-rw-r--r--patches/source/dbus/doinst.sh22
-rw-r--r--patches/source/dbus/rc.messagebus82
-rw-r--r--patches/source/dbus/slack-desc18
-rw-r--r--patches/source/dhcp/dhclient-script.PATH.diff13
-rwxr-xr-xpatches/source/dhcp/dhcp-remove-bind-tarball.sh49
-rwxr-xr-xpatches/source/dhcp/dhcp.SlackBuild179
-rw-r--r--patches/source/dhcp/doinst.sh21
-rw-r--r--patches/source/dhcp/slack-desc19
-rw-r--r--patches/source/dhcpcd/COPYRIGHT26
-rw-r--r--patches/source/dhcpcd/define-SERVICEstuff-for-Slackware.patch32
-rwxr-xr-xpatches/source/dhcpcd/dhcpcd.SlackBuild134
-rw-r--r--patches/source/dhcpcd/dhcpcd.dho_optionsoverloaded.dos.patch11
-rw-r--r--patches/source/dhcpcd/doinst.sh15
-rw-r--r--patches/source/dhcpcd/slack-desc19
-rwxr-xr-xpatches/source/dnsmasq/dnsmasq.SlackBuild107
-rw-r--r--patches/source/dnsmasq/dnsmasq.leasedir.diff24
-rw-r--r--patches/source/dnsmasq/doinst.sh26
-rw-r--r--patches/source/dnsmasq/rc.dnsmasq36
-rw-r--r--patches/source/dnsmasq/slack-desc19
-rw-r--r--patches/source/emacs/doinst.sh10
-rwxr-xr-xpatches/source/emacs/emacs.SlackBuild190
-rw-r--r--patches/source/emacs/slack-desc12
-rwxr-xr-xpatches/source/expat/expat.SlackBuild101
-rw-r--r--patches/source/expat/slack-desc19
-rwxr-xr-xpatches/source/flac/flac.SlackBuild124
-rw-r--r--patches/source/flac/flac.man.diff12
-rw-r--r--patches/source/flac/slack-desc19
-rw-r--r--patches/source/freetype/freetype.CVE-2017-8287.diff31
-rwxr-xr-xpatches/source/freetype/freetype.SlackBuild123
-rw-r--r--patches/source/freetype/freetype.illadvisederror.diff31
-rw-r--r--patches/source/freetype/freetype.subpixel.rendering.diff11
-rw-r--r--patches/source/freetype/slack-desc19
-rw-r--r--patches/source/gdk-pixbuf2/doinst.sh1
-rw-r--r--patches/source/gdk-pixbuf2/gdk-pixbuf.CVE-2015-4491.diff64
-rw-r--r--patches/source/gdk-pixbuf2/gdk-pixbuf.pnglz.diff12
-rwxr-xr-xpatches/source/gdk-pixbuf2/gdk-pixbuf2.SlackBuild155
-rw-r--r--patches/source/gdk-pixbuf2/slack-desc19
-rw-r--r--patches/source/gdk-pixbuf2/update-gdk-pixbuf-loaders60
-rw-r--r--patches/source/gegl/0001-matting-levin-Fix-the-build-with-recent-suitesparse-.patch68
-rw-r--r--patches/source/gegl/gegl-0.2.0-CVE-2012-4433.patch159
-rw-r--r--patches/source/gegl/gegl-0.2.0-libopenraw.patch71
-rw-r--r--patches/source/gegl/gegl-0.2.0-linker-flags.patch36
-rw-r--r--patches/source/gegl/gegl-0.2.0-lua-5.2.patch53
-rw-r--r--patches/source/gegl/gegl-0.2.0-remove-src-over-op.patch195
-rwxr-xr-xpatches/source/gegl/gegl.SlackBuild116
-rw-r--r--patches/source/gegl/slack-desc19
-rwxr-xr-xpatches/source/gimp/gimp.SlackBuild135
-rw-r--r--patches/source/gimp/slack-desc19
-rw-r--r--patches/source/git/git-2.14.1.tar.signbin0 -> 543 bytes
-rwxr-xr-xpatches/source/git/git.SlackBuild170
-rw-r--r--patches/source/git/git.url1
-rw-r--r--patches/source/git/slack-desc19
-rw-r--r--patches/source/glibc-zoneinfo/doinst.sh57
-rwxr-xr-xpatches/source/glibc-zoneinfo/glibc-zoneinfo.SlackBuild147
-rw-r--r--patches/source/glibc-zoneinfo/slack-desc19
-rwxr-xr-xpatches/source/glibc-zoneinfo/timezone-scripts/output-updated-timeconfig.sh60
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/00132
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/01585
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/0228
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/03585
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/0433
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/parts/README2
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/setup.timeconfig3
-rw-r--r--patches/source/glibc-zoneinfo/timezone-scripts/timeconfig1363
-rw-r--r--patches/source/glibc/doinst.sh-glibc192
-rw-r--r--patches/source/glibc/doinst.sh-glibc-solibs131
-rw-r--r--patches/source/glibc/doinst.sh-glibc-zoneinfo17
-rw-r--r--patches/source/glibc/glibc-2.10-dns-no-gethostbyname4.diff26
-rw-r--r--patches/source/glibc/glibc-2.14-reexport-rpc-interface.patch26
-rw-r--r--patches/source/glibc/glibc-2.14-reinstall-nis-rpc-headers.patch27
-rw-r--r--patches/source/glibc/glibc-2.14.1-fixes-1.patch159
-rw-r--r--patches/source/glibc/glibc-2.15-revert-c5a0802a.diff226
-rw-r--r--patches/source/glibc/glibc-2.15.nscd-race-fix.diff47
-rw-r--r--patches/source/glibc/glibc-2.15_avx1.diff54
-rw-r--r--patches/source/glibc/glibc-2.15_avx2.diff171
-rw-r--r--patches/source/glibc/glibc-2.15_avx3.diff13
-rwxr-xr-xpatches/source/glibc/glibc-cvs-checkout.sh3
-rw-r--r--patches/source/glibc/glibc.CVE-2013-4332.diff64
-rw-r--r--patches/source/glibc/glibc.CVE-2015-0235.glibc215.diff208
-rwxr-xr-xpatches/source/glibc/glibc.SlackBuild520
-rw-r--r--patches/source/glibc/glibc.disable.broken.optimized.memcpy.diff30
-rw-r--r--patches/source/glibc/glibc.getcwd.max.macro.diff10
-rw-r--r--patches/source/glibc/glibc.git-4a531bb0b3b582cb693de9f76d2d97d970f9a5d5.patch1212
-rw-r--r--patches/source/glibc/glibc.git-6ee65ed6ddbf04402fad0bec6aa9c73b9d982ae4.diff322
-rw-r--r--patches/source/glibc/glibc.git-96611391ad8823ba58405325d78cefeae5cdf699-CVE-2010-3847b.patch27
-rw-r--r--patches/source/glibc/glibc.ldd.trace.through.dynamic.linker.diff49
-rw-r--r--patches/source/glibc/glibc.locale.no-archive.diff10
-rw-r--r--patches/source/glibc/glibc.make-3.82.diff28
-rw-r--r--patches/source/glibc/glibc.nis-netgroups.diff12
-rw-r--r--patches/source/glibc/glibc.revert.to.fix.build.breakages.diff13
-rw-r--r--patches/source/glibc/glibc.ru_RU.CP1251.diff10
-rw-r--r--patches/source/glibc/glibc.strtod.CVE-2012-3480.diff407
-rw-r--r--patches/source/glibc/is_IS.diff19
-rwxr-xr-xpatches/source/glibc/profile.d/glibc.csh.new9
-rwxr-xr-xpatches/source/glibc/profile.d/glibc.sh.new8
-rw-r--r--patches/source/glibc/slack-desc.glibc19
-rw-r--r--patches/source/glibc/slack-desc.glibc-debug19
-rw-r--r--patches/source/glibc/slack-desc.glibc-i18n19
-rw-r--r--patches/source/glibc/slack-desc.glibc-profile19
-rw-r--r--patches/source/glibc/slack-desc.glibc-solibs19
-rw-r--r--patches/source/glibc/slack-desc.glibc-solibs-linuxthreads18
-rw-r--r--patches/source/glibc/slack-desc.glibc-zoneinfo19
-rw-r--r--patches/source/glibc/slack-desc.glibc-zoneinfo.olson19
-rw-r--r--patches/source/glibc/timezone-scripts/output-updated-timeconfig.sh53
-rw-r--r--patches/source/glibc/timezone-scripts/parts/00131
-rw-r--r--patches/source/glibc/timezone-scripts/parts/011658
-rw-r--r--patches/source/glibc/timezone-scripts/parts/0228
-rw-r--r--patches/source/glibc/timezone-scripts/parts/031658
-rw-r--r--patches/source/glibc/timezone-scripts/parts/0432
-rw-r--r--patches/source/glibc/timezone-scripts/parts/README2
-rw-r--r--patches/source/glibc/timezone-scripts/setup.timeconfig3
-rw-r--r--patches/source/glibc/timezone-scripts/timeconfig3695
-rwxr-xr-xpatches/source/gnupg/gnupg.SlackBuild115
-rw-r--r--patches/source/gnupg/slack-desc.gnupg19
-rwxr-xr-xpatches/source/gnupg2/gnupg2.SlackBuild163
-rw-r--r--patches/source/gnupg2/slack-desc19
-rwxr-xr-xpatches/source/gnutls/gnutls.SlackBuild150
-rw-r--r--patches/source/gnutls/slack-desc19
-rw-r--r--patches/source/hplip/doinst.sh4
-rw-r--r--patches/source/hplip/hplip.CVE-2010-4267.diff12
-rw-r--r--patches/source/hplip/hplip.CVE-2013-4325.diff38
-rwxr-xr-xpatches/source/hplip/hplip.SlackBuild128
-rw-r--r--patches/source/hplip/hplip.no.upgrade.diff16
-rw-r--r--patches/source/hplip/slack-desc19
-rw-r--r--patches/source/httpd/apache-2.4.CVE-2017-9798.optionsbleed.patch15
-rw-r--r--patches/source/httpd/doinst.sh71
-rwxr-xr-xpatches/source/httpd/httpd.SlackBuild246
-rw-r--r--patches/source/httpd/httpd.runasapache.diff13
-rw-r--r--patches/source/httpd/httpd.url2
-rw-r--r--patches/source/httpd/logrotate.httpd12
-rw-r--r--patches/source/httpd/rc.httpd44
-rw-r--r--patches/source/httpd/slack-desc19
-rw-r--r--patches/source/imagemagick/blob.c.undef.have_popen.diff10
-rwxr-xr-xpatches/source/imagemagick/imagemagick.SlackBuild182
-rw-r--r--patches/source/imagemagick/policy.xml.diff19
-rw-r--r--patches/source/imagemagick/slack-desc19
-rw-r--r--patches/source/inputproto/arch.use.flags9
-rw-r--r--patches/source/inputproto/build/inputproto1
-rw-r--r--patches/source/inputproto/configure/configure13
-rwxr-xr-xpatches/source/inputproto/inputproto.SlackBuild2
-rw-r--r--patches/source/inputproto/modularize279
-rw-r--r--patches/source/inputproto/noarch75
-rw-r--r--patches/source/inputproto/package-blacklist44
-rw-r--r--patches/source/inputproto/slack-desc/inputproto19
-rwxr-xr-xpatches/source/inputproto/x11.SlackBuild381
-rwxr-xr-xpatches/source/iptables/iptables.SlackBuild122
-rw-r--r--patches/source/iptables/iptables.fixrestore.diff29
-rw-r--r--patches/source/iptables/slack-desc19
-rw-r--r--patches/source/irssi/doinst.sh12
-rwxr-xr-xpatches/source/irssi/irssi.SlackBuild143
-rw-r--r--patches/source/irssi/slack-desc19
-rwxr-xr-xpatches/source/jasper/jasper.SlackBuild137
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-CVE-2008-3520.patch928
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-CVE-2008-3522.patch14
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-CVE-2011-4516-CVE-2011-4517-CERT-VU-887409.patch23
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-BAD_SIZEOF.patch17
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-CHECKED_RETURN.patch141
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-FORWARD_NULL.patch44
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-NULL_RETURNS.patch61
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-RESOURCE_LEAK.patch202
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-UNREACHABLE.patch37
-rw-r--r--patches/source/jasper/patches/jasper-1.900.1-Coverity-UNUSED_VALUE.patch41
-rw-r--r--patches/source/jasper/patches/jasper-CVE-2014-8137.patch57
-rw-r--r--patches/source/jasper/patches/jasper-CVE-2014-8138.patch14
-rw-r--r--patches/source/jasper/patches/jasper-CVE-2014-8157.patch12
-rw-r--r--patches/source/jasper/patches/jasper-CVE-2014-8158.patch329
-rw-r--r--patches/source/jasper/patches/jasper-CVE-2014-9029.patch29
-rw-r--r--patches/source/jasper/patches/jpc_dec.c.patch18
-rw-r--r--patches/source/jasper/patches/patch-libjasper-stepsizes-overflow.diff14
-rw-r--r--patches/source/jasper/slack-desc19
-rwxr-xr-xpatches/source/kdelibs/KDE.SlackBuild532
-rw-r--r--patches/source/kdelibs/KDE.options58
-rw-r--r--patches/source/kdelibs/build/kdelibs1
-rw-r--r--patches/source/kdelibs/cmake/kdelibs17
-rw-r--r--patches/source/kdelibs/doinst.sh/kdelibs9
-rwxr-xr-xpatches/source/kdelibs/kdelibs.SlackBuild2
-rw-r--r--patches/source/kdelibs/modularize268
-rw-r--r--patches/source/kdelibs/modules/kdelibs1
-rw-r--r--patches/source/kdelibs/noarch5
-rw-r--r--patches/source/kdelibs/package-blacklist9
-rw-r--r--patches/source/kdelibs/patch/kdelibs.patch11
-rw-r--r--patches/source/kdelibs/patch/kdelibs/kdelibs.CVE-2017-8422.diff201
-rw-r--r--patches/source/kdelibs/patch/kdelibs/kdelibs.docbook.patch11
-rw-r--r--patches/source/kdelibs/patch/kdelibs/kdelibs.upnp_conditional.patch15
-rw-r--r--patches/source/kdelibs/post-install/kdelibs.post-install2
-rw-r--r--patches/source/kdelibs/slack-desc/kdelibs19
-rw-r--r--patches/source/libX11/arch.use.flags9
-rw-r--r--patches/source/libX11/build/libX111
-rw-r--r--patches/source/libX11/configure/libX1112
-rwxr-xr-xpatches/source/libX11/libX11.SlackBuild2
-rw-r--r--patches/source/libX11/modularize279
-rw-r--r--patches/source/libX11/noarch75
-rw-r--r--patches/source/libX11/package-blacklist44
-rw-r--r--patches/source/libX11/post-install/libX11.post-install2
-rw-r--r--patches/source/libX11/slack-desc/libX1119
-rwxr-xr-xpatches/source/libX11/x11.SlackBuild381
-rw-r--r--patches/source/libXcursor/arch.use.flags7
-rwxr-xr-xpatches/source/libXcursor/build/increment.sh17
-rw-r--r--patches/source/libXcursor/build/libXcursor1
-rw-r--r--patches/source/libXcursor/configure/configure12
-rwxr-xr-xpatches/source/libXcursor/libXcursor.SlackBuild26
-rw-r--r--patches/source/libXcursor/modularize272
-rw-r--r--patches/source/libXcursor/noarch76
-rw-r--r--patches/source/libXcursor/package-blacklist43
-rw-r--r--patches/source/libXcursor/slack-desc/libXcursor19
-rwxr-xr-xpatches/source/libXcursor/x11-build-script.sh374
-rw-r--r--patches/source/libXext/arch.use.flags9
-rw-r--r--patches/source/libXext/build/libXext1
-rw-r--r--patches/source/libXext/configure/configure13
-rwxr-xr-xpatches/source/libXext/libXext.SlackBuild2
-rw-r--r--patches/source/libXext/modularize279
-rw-r--r--patches/source/libXext/noarch75
-rw-r--r--patches/source/libXext/package-blacklist44
-rw-r--r--patches/source/libXext/slack-desc/libXext19
-rwxr-xr-xpatches/source/libXext/x11.SlackBuild381
-rw-r--r--patches/source/libXfixes/arch.use.flags9
-rw-r--r--patches/source/libXfixes/build/libXfixes1
-rw-r--r--patches/source/libXfixes/configure/configure13
-rwxr-xr-xpatches/source/libXfixes/libXfixes.SlackBuild2
-rw-r--r--patches/source/libXfixes/modularize279
-rw-r--r--patches/source/libXfixes/noarch75
-rw-r--r--patches/source/libXfixes/package-blacklist44
-rw-r--r--patches/source/libXfixes/slack-desc/libXfixes19
-rwxr-xr-xpatches/source/libXfixes/x11.SlackBuild381
-rw-r--r--patches/source/libXfont/arch.use.flags7
-rwxr-xr-xpatches/source/libXfont/build/increment.sh17
-rw-r--r--patches/source/libXfont/build/libXfont1
-rw-r--r--patches/source/libXfont/configure/configure12
-rwxr-xr-xpatches/source/libXfont/libXfont.SlackBuild26
-rw-r--r--patches/source/libXfont/modularize272
-rw-r--r--patches/source/libXfont/noarch76
-rw-r--r--patches/source/libXfont/package-blacklist43
-rw-r--r--patches/source/libXfont/patch/libXfont.patch1
-rw-r--r--patches/source/libXfont/patch/libXfont/libXfont.CVE-2017-16611.diff85
-rw-r--r--patches/source/libXfont/slack-desc/libXfont19
-rwxr-xr-xpatches/source/libXfont/x11-build-script.sh374
-rw-r--r--patches/source/libXi/arch.use.flags9
-rw-r--r--patches/source/libXi/build/libXi1
-rw-r--r--patches/source/libXi/configure/configure13
-rwxr-xr-xpatches/source/libXi/libXi.SlackBuild2
-rw-r--r--patches/source/libXi/modularize279
-rw-r--r--patches/source/libXi/noarch75
-rw-r--r--patches/source/libXi/package-blacklist44
-rw-r--r--patches/source/libXi/slack-desc/libXi19
-rw-r--r--patches/source/libXi/slack-desc/libXinerama19
-rwxr-xr-xpatches/source/libXi/x11.SlackBuild381
-rw-r--r--patches/source/libXrandr/arch.use.flags9
-rw-r--r--patches/source/libXrandr/build/libXrandr1
-rw-r--r--patches/source/libXrandr/configure/configure13
-rwxr-xr-xpatches/source/libXrandr/libXrandr.SlackBuild2
-rw-r--r--patches/source/libXrandr/modularize279
-rw-r--r--patches/source/libXrandr/noarch75
-rw-r--r--patches/source/libXrandr/package-blacklist44
-rw-r--r--patches/source/libXrandr/slack-desc/libXrandr19
-rwxr-xr-xpatches/source/libXrandr/x11.SlackBuild381
-rw-r--r--patches/source/libXrender/arch.use.flags9
-rw-r--r--patches/source/libXrender/build/libXrender1
-rw-r--r--patches/source/libXrender/configure/configure13
-rwxr-xr-xpatches/source/libXrender/libXrender.SlackBuild2
-rw-r--r--patches/source/libXrender/modularize279
-rw-r--r--patches/source/libXrender/noarch75
-rw-r--r--patches/source/libXrender/package-blacklist44
-rw-r--r--patches/source/libXrender/slack-desc/libXrender19
-rwxr-xr-xpatches/source/libXrender/x11.SlackBuild381
-rw-r--r--patches/source/libXtst/arch.use.flags9
-rw-r--r--patches/source/libXtst/build/libXtst1
-rw-r--r--patches/source/libXtst/configure/configure13
-rwxr-xr-xpatches/source/libXtst/libXtst.SlackBuild2
-rw-r--r--patches/source/libXtst/modularize279
-rw-r--r--patches/source/libXtst/noarch75
-rw-r--r--patches/source/libXtst/package-blacklist44
-rw-r--r--patches/source/libXtst/slack-desc/libXtst19
-rwxr-xr-xpatches/source/libXtst/x11.SlackBuild381
-rw-r--r--patches/source/libXv/arch.use.flags9
-rw-r--r--patches/source/libXv/build/libXv1
-rw-r--r--patches/source/libXv/configure/configure13
-rwxr-xr-xpatches/source/libXv/libXv.SlackBuild2
-rw-r--r--patches/source/libXv/modularize279
-rw-r--r--patches/source/libXv/noarch75
-rw-r--r--patches/source/libXv/package-blacklist44
-rw-r--r--patches/source/libXv/slack-desc/libXv19
-rw-r--r--patches/source/libXv/slack-desc/libXvMC19
-rwxr-xr-xpatches/source/libXv/x11.SlackBuild381
-rw-r--r--patches/source/libXvMC/arch.use.flags9
-rw-r--r--patches/source/libXvMC/build/libXvMC1
-rw-r--r--patches/source/libXvMC/configure/configure13
-rwxr-xr-xpatches/source/libXvMC/libXvMC.SlackBuild2
-rw-r--r--patches/source/libXvMC/modularize279
-rw-r--r--patches/source/libXvMC/noarch75
-rw-r--r--patches/source/libXvMC/package-blacklist44
-rw-r--r--patches/source/libXvMC/slack-desc/libXvMC19
-rwxr-xr-xpatches/source/libXvMC/x11.SlackBuild381
-rwxr-xr-xpatches/source/libgcrypt/libgcrypt.SlackBuild124
-rw-r--r--patches/source/libgcrypt/slack-desc19
-rwxr-xr-xpatches/source/libgpg-error/libgpg-error.SlackBuild118
-rw-r--r--patches/source/libgpg-error/slack-desc19
-rwxr-xr-xpatches/source/libidn/libidn.SlackBuild137
-rw-r--r--patches/source/libidn/slack-desc19
-rwxr-xr-xpatches/source/libiodbc/libiodbc.SlackBuild126
-rw-r--r--patches/source/libiodbc/libiodbc.disable.rpath.diff11
-rw-r--r--patches/source/libiodbc/slack-desc19
-rw-r--r--patches/source/libjpeg/jpeg.CVE-2013-6629.diff32
-rwxr-xr-xpatches/source/libjpeg/libjpeg.SlackBuild112
-rw-r--r--patches/source/libjpeg/slack-desc19
-rwxr-xr-xpatches/source/libpcap/libpcap.SlackBuild128
-rw-r--r--patches/source/libpcap/slack-desc19
-rwxr-xr-xpatches/source/libpng/libpng.SlackBuild134
-rw-r--r--patches/source/libpng/libpng.url1
-rw-r--r--patches/source/libpng/slack-desc19
-rwxr-xr-xpatches/source/libsndfile/libsndfile.SlackBuild106
-rw-r--r--patches/source/libsndfile/slack-desc19
-rwxr-xr-xpatches/source/libssh/libssh.SlackBuild113
-rw-r--r--patches/source/libssh/slack-desc19
-rw-r--r--patches/source/libtasn1/libtasn1.CVE-2014-3467_8_9.diff152
-rwxr-xr-xpatches/source/libtasn1/libtasn1.SlackBuild127
-rw-r--r--patches/source/libtasn1/slack-desc19
-rwxr-xr-xpatches/source/libtiff/libtiff.SlackBuild122
-rw-r--r--patches/source/libtiff/slack-desc19
-rw-r--r--patches/source/libtiff/tiff-3.9.7_CVE-2012-4447_CVE-2012-4564_CVE-2013-1960_CVE-2013-1961.diff3813
-rw-r--r--patches/source/libtiff/tiff-3.9.7_CVE-2013-4231.diff23
-rw-r--r--patches/source/libtiff/tiff-3.9.7_CVE-2013-4232.diff24
-rw-r--r--patches/source/libtiff/tiff-3.9.7_CVE-2013-4244.diff24
-rwxr-xr-xpatches/source/libvorbis/libvorbis.SlackBuild102
-rw-r--r--patches/source/libvorbis/slack-desc19
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2004-0941.patch17
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2006-3376.patch27
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2007-0455.patch11
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2007-2756.patch16
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2007-3472.patch61
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2007-3473.patch13
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2007-3477.patch38
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2009-3546.patch13
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2015-0848+CVE-2015-4588.patch118
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2015-4695.patch56
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2015-4696.patch23
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2016-10167.patch30
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2016-10168.patch14
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2016-9011.patch36
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2016-9317.patch21
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-CVE-2017-6362.patch32
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-fallbackfont.patch18
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-pixbufloaderdir.patch14
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-reducesymbols.patch520
-rw-r--r--patches/source/libwmf/libwmf-0.2.8.4-useafterfree.patch10
-rwxr-xr-xpatches/source/libwmf/libwmf.SlackBuild142
-rw-r--r--patches/source/libwmf/libwmf.png14.diff11
-rw-r--r--patches/source/libwmf/slack-desc19
-rw-r--r--patches/source/libxcb/arch.use.flags9
-rw-r--r--patches/source/libxcb/build/libxcb1
-rw-r--r--patches/source/libxcb/configure/libxcb14
-rwxr-xr-xpatches/source/libxcb/libxcb.SlackBuild2
-rw-r--r--patches/source/libxcb/modularize279
-rw-r--r--patches/source/libxcb/noarch75
-rw-r--r--patches/source/libxcb/package-blacklist44
-rw-r--r--patches/source/libxcb/post-install/libxcb.post-install66
-rw-r--r--patches/source/libxcb/slack-desc/libxcb19
-rwxr-xr-xpatches/source/libxcb/x11.SlackBuild381
-rwxr-xr-xpatches/source/libxml2/libxml2.SlackBuild112
-rw-r--r--patches/source/libxml2/libxml2.do-not-check-crc.diff35
-rw-r--r--patches/source/libxml2/slack-desc19
-rwxr-xr-xpatches/source/libxslt/libxslt.SlackBuild100
-rw-r--r--patches/source/libxslt/slack-desc19
-rwxr-xr-xpatches/source/libyaml/libyaml.SlackBuild114
-rw-r--r--patches/source/libyaml/libyaml.url1
-rw-r--r--patches/source/libyaml/slack-desc19
-rwxr-xr-xpatches/source/llvm/llvm.SlackBuild176
-rw-r--r--patches/source/llvm/llvm.rpath.fix.diff14
-rw-r--r--patches/source/llvm/llvm.url2
-rw-r--r--patches/source/llvm/slack-desc19
-rwxr-xr-xpatches/source/lm_sensors/lm_sensors.SlackBuild125
-rw-r--r--patches/source/lm_sensors/lm_sensors.makefile.diff15
-rw-r--r--patches/source/lm_sensors/slack-desc19
-rwxr-xr-xpatches/source/loudmouth/loudmouth.SlackBuild133
-rw-r--r--patches/source/loudmouth/slack-desc19
-rw-r--r--patches/source/lynx/doinst.sh13
-rwxr-xr-xpatches/source/lynx/lynx.SlackBuild155
-rw-r--r--patches/source/lynx/lynx.cfg.diff31
-rw-r--r--patches/source/lynx/slack-desc19
-rw-r--r--patches/source/mailx/doinst.sh14
-rw-r--r--patches/source/mailx/heirloom-mailx-12.5-fixes-1.patch232
-rwxr-xr-xpatches/source/mailx/mailx.SlackBuild142
-rw-r--r--patches/source/mailx/slack-desc19
-rw-r--r--patches/source/make/make-3.82-android-build-fix.diff16
-rw-r--r--patches/source/make/make-3.82-bugfixes.patch250
-rwxr-xr-xpatches/source/make/make.SlackBuild110
-rw-r--r--patches/source/make/slack-desc19
-rwxr-xr-xpatches/source/mcabber/mcabber.SlackBuild128
-rw-r--r--patches/source/mcabber/slack-desc19
-rw-r--r--patches/source/mercurial/doinst.sh13
-rwxr-xr-xpatches/source/mercurial/mercurial.SlackBuild109
-rw-r--r--patches/source/mercurial/slack-desc22
-rw-r--r--patches/source/minicom/config.sub-x86_64.diff20
-rw-r--r--patches/source/minicom/doinst.sh15
-rw-r--r--patches/source/minicom/lrzsz_0.12.21-5.diff4194
-rwxr-xr-xpatches/source/minicom/minicom.SlackBuild160
-rw-r--r--patches/source/minicom/minicom.users36
-rw-r--r--patches/source/minicom/slack-desc19
-rw-r--r--patches/source/mkinitrd/README.initrd99
l---------patches/source/mkinitrd/busybox-dot-config1
-rw-r--r--patches/source/mkinitrd/busybox-dot-config.1.20.x1024
-rw-r--r--patches/source/mkinitrd/fixes-1.20.2/busybox-1.20.2-kernel_ver.patch25
-rw-r--r--patches/source/mkinitrd/fixes-1.20.2/busybox-1.20.2-ntpd.patch11
-rw-r--r--patches/source/mkinitrd/fixes-1.20.2/busybox-1.20.2-pkg-config-selinux.patch67
-rw-r--r--patches/source/mkinitrd/fixes-1.20.2/busybox-1.20.2-sys-resource.patch123
-rwxr-xr-xpatches/source/mkinitrd/init350
-rw-r--r--patches/source/mkinitrd/mkinitrd740
-rw-r--r--patches/source/mkinitrd/mkinitrd.8279
-rwxr-xr-xpatches/source/mkinitrd/mkinitrd.SlackBuild146
-rw-r--r--patches/source/mkinitrd/mkinitrd.conf.5244
-rw-r--r--patches/source/mkinitrd/mkinitrd.conf.sample21
-rw-r--r--patches/source/mkinitrd/mkinitrd_command_generator.8187
-rw-r--r--patches/source/mkinitrd/mkinitrd_command_generator.sh872
-rw-r--r--patches/source/mkinitrd/slack-desc19
-rw-r--r--patches/source/mozilla-firefox/firefox.moz_plugin_path.diff17
-rw-r--r--patches/source/mozilla-firefox/mimeTypes.rdf28
-rw-r--r--patches/source/mozilla-firefox/mozilla-firefox-mimeTypes-fix.diff45
-rwxr-xr-xpatches/source/mozilla-firefox/mozilla-firefox.SlackBuild279
-rw-r--r--patches/source/mozilla-firefox/mozilla-firefox.desktop80
-rw-r--r--patches/source/mozilla-firefox/slack-desc19
-rw-r--r--patches/source/mozilla-nss/MPL-1.1.txt470
-rw-r--r--patches/source/mozilla-nss/faq.html364
-rw-r--r--patches/source/mozilla-nss/gpl-2.0.txt339
-rw-r--r--patches/source/mozilla-nss/lgpl-2.1.txt504
-rwxr-xr-xpatches/source/mozilla-nss/mozilla-nss.SlackBuild183
-rw-r--r--patches/source/mozilla-nss/nss-config.in145
-rw-r--r--patches/source/mozilla-nss/slack-desc19
-rw-r--r--patches/source/mozilla-thunderbird/mozilla-firefox.xpcom_arm.patch18
-rwxr-xr-xpatches/source/mozilla-thunderbird/mozilla-thunderbird.SlackBuild247
-rw-r--r--patches/source/mozilla-thunderbird/mozilla-thunderbird.desktop84
-rw-r--r--patches/source/mozilla-thunderbird/slack-desc19
-rw-r--r--patches/source/mozilla-thunderbird/thunderbird.pngbin0 -> 47617 bytes
-rw-r--r--patches/source/mutt/doinst.sh13
-rw-r--r--patches/source/mutt/mutt.CVE-2014-9116.diff34
-rwxr-xr-xpatches/source/mutt/mutt.SlackBuild128
-rw-r--r--patches/source/mutt/slack-desc19
-rw-r--r--patches/source/mysql/README.mysql-embedded7
-rw-r--r--patches/source/mysql/doinst.sh23
-rwxr-xr-xpatches/source/mysql/mysql-embedded.SlackBuild221
-rwxr-xr-xpatches/source/mysql/mysql.SlackBuild221
-rw-r--r--patches/source/mysql/rc.mysqld86
-rw-r--r--patches/source/mysql/slack-desc19
-rwxr-xr-xpatches/source/nettle/nettle.SlackBuild127
-rw-r--r--patches/source/nettle/slack-desc19
-rw-r--r--patches/source/ntp/doinst.sh28
-rwxr-xr-xpatches/source/ntp/ntp.SlackBuild158
-rw-r--r--patches/source/ntp/ntp.conf72
-rw-r--r--patches/source/ntp/ntp.keys2
-rw-r--r--patches/source/ntp/ntp.nano.diff17
-rw-r--r--patches/source/ntp/rc.ntpd71
-rw-r--r--patches/source/ntp/slack-desc19
-rw-r--r--patches/source/openssh/doinst.sh49
-rw-r--r--patches/source/openssh/openssh-7.4p1-libwrap.diff137
-rw-r--r--patches/source/openssh/openssh.CVE-2017-15906.patch19
-rwxr-xr-xpatches/source/openssh/openssh.SlackBuild169
-rw-r--r--patches/source/openssh/rc.sshd59
-rw-r--r--patches/source/openssh/slack-desc19
-rw-r--r--patches/source/openssl/certwatch130
-rw-r--r--patches/source/openssl/doinst.sh-openssl26
-rw-r--r--patches/source/openssl/doinst.sh-openssl-solibs12
-rwxr-xr-xpatches/source/openssl/openssl.SlackBuild211
-rw-r--r--patches/source/openssl/openssl.optsx86.diff11
-rw-r--r--patches/source/openssl/openssl.soname.diff11
-rw-r--r--patches/source/openssl/openssl0/certwatch130
-rw-r--r--patches/source/openssl/openssl0/doinst.sh-openssl21
-rw-r--r--patches/source/openssl/openssl0/doinst.sh-openssl-solibs12
-rwxr-xr-xpatches/source/openssl/openssl0/openssl.SlackBuild199
-rw-r--r--patches/source/openssl/openssl0/openssl.no.weak.sslv2.ciphers.diff51
-rw-r--r--patches/source/openssl/openssl0/openssl.no.weak.sslv3.ciphers.diff356
-rw-r--r--patches/source/openssl/openssl0/openssl.optsx86.diff11
-rw-r--r--patches/source/openssl/openssl0/openssl.soname.diff11
-rwxr-xr-xpatches/source/openssl/openssl0/openssl0.build202
-rw-r--r--patches/source/openssl/openssl0/slack-desc.openssl19
-rw-r--r--patches/source/openssl/openssl0/slack-desc.openssl-solibs19
-rw-r--r--patches/source/openssl/slack-desc.openssl19
-rw-r--r--patches/source/openssl/slack-desc.openssl-solibs19
-rw-r--r--patches/source/openvpn/README26
-rw-r--r--patches/source/openvpn/doinst.sh25
-rwxr-xr-xpatches/source/openvpn/openvpn.SlackBuild169
-rw-r--r--patches/source/openvpn/openvpn.url2
-rw-r--r--patches/source/openvpn/rc.openvpn111
-rw-r--r--patches/source/openvpn/slack-desc19
-rw-r--r--patches/source/openvpn/slackware.conf178
-rw-r--r--patches/source/patch/0001-Refuse-to-apply-ed-scripts-by-default.patch178
-rwxr-xr-xpatches/source/patch/patch.SlackBuild131
-rw-r--r--patches/source/patch/slack-desc19
-rwxr-xr-xpatches/source/perl/perl.SlackBuild304
-rw-r--r--patches/source/perl/perl.configure.multilib.patch35
-rw-r--r--patches/source/perl/slack-desc19
-rw-r--r--patches/source/php/doinst.sh28
-rwxr-xr-xpatches/source/php/fetch-php.sh2
-rw-r--r--patches/source/php/mod_php.conf.example29
-rw-r--r--patches/source/php/php-fpm.conf.diff28
-rwxr-xr-xpatches/source/php/php.SlackBuild311
-rw-r--r--patches/source/php/php.ini-development.diff61
-rw-r--r--patches/source/php/slack-desc19
-rw-r--r--patches/source/pidgin/fix-gmain_h-compile-error.diff17
-rwxr-xr-xpatches/source/pidgin/pidgin.SlackBuild227
-rw-r--r--patches/source/pidgin/slack-desc19
-rw-r--r--patches/source/polkit/05_revert-admin-identities-unix-group-wheel.patch39
-rw-r--r--patches/source/polkit/10-org.freedesktop.NetworkManager.pkla6
-rw-r--r--patches/source/polkit/20-plugdev-group-mount-override.pkla6
-rw-r--r--patches/source/polkit/doinst.sh13
-rwxr-xr-xpatches/source/polkit/polkit.SlackBuild152
-rw-r--r--patches/source/polkit/slack-desc19
-rw-r--r--patches/source/poppler/poppler.CVE-2012-2142.diff64
-rwxr-xr-xpatches/source/poppler/poppler.SlackBuild131
-rw-r--r--patches/source/poppler/poppler_xyscale.patch47
-rw-r--r--patches/source/poppler/slack-desc19
-rw-r--r--patches/source/ppp/doinst.sh21
-rw-r--r--patches/source/ppp/options.new276
-rw-r--r--patches/source/ppp/ppp.CVE-2014-3158.diff30
-rw-r--r--patches/source/ppp/ppp.CVE-2015-3310.diff11
-rwxr-xr-xpatches/source/ppp/ppp.SlackBuild172
-rw-r--r--patches/source/ppp/ppp.slack.diff28
-rw-r--r--patches/source/ppp/pppsetup-1.98.backupfiles.diff26
-rw-r--r--patches/source/ppp/pppsetup-1.98.moredevs.diff105
-rw-r--r--patches/source/ppp/pppsetup-1.98.pppoff.diff19
-rw-r--r--patches/source/ppp/pppsetup-1.98.slack.diff1709
-rw-r--r--patches/source/ppp/radius.msdict81
-rw-r--r--patches/source/ppp/realms22
-rw-r--r--patches/source/ppp/servers4
-rw-r--r--patches/source/ppp/slack-desc19
-rw-r--r--patches/source/proftpd/doinst.sh18
-rw-r--r--patches/source/proftpd/etc/ftpusers22
-rw-r--r--patches/source/proftpd/etc/proftpd.conf74
-rwxr-xr-xpatches/source/proftpd/proftpd.SlackBuild138
-rw-r--r--patches/source/proftpd/slack-desc19
-rwxr-xr-xpatches/source/python/python.SlackBuild167
-rw-r--r--patches/source/python/python.no-static-library.diff49
-rw-r--r--patches/source/python/python.readline.set_pre_input_hook.diff12
-rw-r--r--patches/source/python/python.x86_64.diff174
-rw-r--r--patches/source/python/slack-desc19
-rw-r--r--patches/source/randrproto/arch.use.flags9
-rw-r--r--patches/source/randrproto/build/randrproto1
-rw-r--r--patches/source/randrproto/configure/configure13
-rw-r--r--patches/source/randrproto/modularize279
-rw-r--r--patches/source/randrproto/noarch75
-rw-r--r--patches/source/randrproto/package-blacklist44
-rwxr-xr-xpatches/source/randrproto/randrproto.SlackBuild2
-rw-r--r--patches/source/randrproto/slack-desc/randrproto19
-rwxr-xr-xpatches/source/randrproto/x11.SlackBuild381
-rwxr-xr-xpatches/source/rsync/rsync.SlackBuild110
-rw-r--r--patches/source/rsync/slack-desc19
-rwxr-xr-xpatches/source/ruby/ruby.SlackBuild130
-rw-r--r--patches/source/ruby/slack-desc19
-rw-r--r--patches/source/rxvt/rxvt-integer-overflow-fix.patch11
-rwxr-xr-xpatches/source/rxvt/rxvt.SlackBuild127
-rw-r--r--patches/source/rxvt/rxvt.utempter.diff277
-rw-r--r--patches/source/rxvt/slack-desc19
-rw-r--r--patches/source/samba/doinst.sh18
-rw-r--r--patches/source/samba/pytalloc-util.pc11
-rw-r--r--patches/source/samba/rc.samba46
-rw-r--r--patches/source/samba/samba-4.4.16-CVE-2018-1057.patch903
-rw-r--r--patches/source/samba/samba-4.5.14-security-2017-11-21.patch110
-rwxr-xr-xpatches/source/samba/samba.SlackBuild224
-rw-r--r--patches/source/samba/samba.install.talloc.tevent.tdb.diff102
-rw-r--r--patches/source/samba/samba.url2
-rw-r--r--patches/source/samba/slack-desc19
-rw-r--r--patches/source/samba/smb.conf.default223
-rw-r--r--patches/source/samba/smb.conf.default.orig223
-rw-r--r--patches/source/samba/smb.conf.diff29
-rw-r--r--patches/source/samba/talloc.pc11
-rw-r--r--patches/source/sdl/sdl-1.2.14-fix-mouse-clicking.patch23
-rwxr-xr-xpatches/source/sdl/sdl.SlackBuild253
-rw-r--r--patches/source/sdl/sdl.linux-2.6.31.input_absinfo.diff38
-rw-r--r--patches/source/sdl/slack-desc19
-rw-r--r--patches/source/seamonkey/doinst.sh11
-rwxr-xr-xpatches/source/seamonkey/gold/gold2
l---------patches/source/seamonkey/gold/ld1
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-gtkmozembed.pc11
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-libxul.pc11
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-nspr.pc12
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-nss.pc11
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-plugin.pc10
-rw-r--r--patches/source/seamonkey/pkgconfig/seamonkey-xpcom.pc12
-rw-r--r--patches/source/seamonkey/seamonkey-icon.pngbin0 -> 12796 bytes
-rw-r--r--patches/source/seamonkey/seamonkey-mail-icon.pngbin0 -> 185 bytes
-rw-r--r--patches/source/seamonkey/seamonkey-mail.desktop8
-rwxr-xr-xpatches/source/seamonkey/seamonkey.SlackBuild289
-rw-r--r--patches/source/seamonkey/seamonkey.desktop9
-rw-r--r--patches/source/seamonkey/slack-desc19
-rw-r--r--patches/source/sendmail/Build29
-rwxr-xr-xpatches/source/sendmail/SlackBuild-sendmail168
-rwxr-xr-xpatches/source/sendmail/SlackBuild-sendmail-cf57
-rw-r--r--patches/source/sendmail/linux.uucp.mc8
-rw-r--r--patches/source/sendmail/sendmail-slackware-tls-sasl.mc61
-rw-r--r--patches/source/sendmail/sendmail-slackware-tls.mc56
-rw-r--r--patches/source/sendmail/sendmail-slackware.mc42
-rwxr-xr-xpatches/source/sendmail/sendmail.SlackBuild3
-rw-r--r--patches/source/sendmail/site.config.m48
-rw-r--r--patches/source/sendmail/slack-desc.sendmail19
-rw-r--r--patches/source/sendmail/slack-desc.sendmail-cf19
-rw-r--r--patches/source/sqlite/COPYRIGHT68
-rw-r--r--patches/source/sqlite/slack-desc19
-rwxr-xr-xpatches/source/sqlite/sqlite.SlackBuild133
-rw-r--r--patches/source/stunnel/doinst.sh12
-rw-r--r--patches/source/stunnel/generate-stunnel-key.sh13
-rw-r--r--patches/source/stunnel/slack-desc19
-rwxr-xr-xpatches/source/stunnel/stunnel.SlackBuild140
-rwxr-xr-xpatches/source/subversion/get-svn-book.sh9
-rw-r--r--patches/source/subversion/slack-desc19
-rw-r--r--patches/source/subversion/subversion.CVE-2015-5343.diff16
-rw-r--r--patches/source/subversion/subversion.CVE-2016-2167.diff11
-rw-r--r--patches/source/subversion/subversion.CVE-2016-2168.diff32
-rw-r--r--patches/source/subversion/subversion.CVE-2017-9800.diff105
-rwxr-xr-xpatches/source/subversion/subversion.SlackBuild183
-rw-r--r--patches/source/sudo/doinst.sh14
-rw-r--r--patches/source/sudo/slack-desc19
-rwxr-xr-xpatches/source/sudo/sudo.SlackBuild122
-rw-r--r--patches/source/tcpdump/slack-desc19
-rwxr-xr-xpatches/source/tcpdump/tcpdump.SlackBuild104
-rw-r--r--patches/source/tumbler/set-gststate-on-error.diff23
-rw-r--r--patches/source/tumbler/slack-desc19
-rwxr-xr-xpatches/source/tumbler/tumbler.SlackBuild137
-rw-r--r--patches/source/udisks/slack-desc19
-rwxr-xr-xpatches/source/udisks/udisks.SlackBuild119
-rw-r--r--patches/source/udisks/udisks.url1
-rw-r--r--patches/source/udisks2/doinst.sh12
-rw-r--r--patches/source/udisks2/slack-desc19
-rw-r--r--patches/source/udisks2/udisks2.CVE-2014-0004.diff106
-rwxr-xr-xpatches/source/udisks2/udisks2.SlackBuild142
-rw-r--r--patches/source/vim/doinst.sh5
-rw-r--r--patches/source/vim/gvim.desktop120
-rw-r--r--patches/source/vim/gvim.pngbin0 -> 8249 bytes
-rw-r--r--patches/source/vim/patches/7.4.001489
-rw-r--r--patches/source/vim/patches/7.4.00277
-rw-r--r--patches/source/vim/patches/7.4.003100
-rw-r--r--patches/source/vim/patches/7.4.004232
-rw-r--r--patches/source/vim/patches/7.4.00548
-rw-r--r--patches/source/vim/patches/7.4.00666
-rw-r--r--patches/source/vim/patches/7.4.00795
-rw-r--r--patches/source/vim/patches/7.4.00871
-rw-r--r--patches/source/vim/patches/7.4.00964
-rw-r--r--patches/source/vim/patches/7.4.01079
-rw-r--r--patches/source/vim/patches/7.4.011100
-rw-r--r--patches/source/vim/patches/7.4.012202
-rw-r--r--patches/source/vim/patches/7.4.01399
-rw-r--r--patches/source/vim/patches/7.4.014102
-rw-r--r--patches/source/vim/patches/7.4.015106
-rw-r--r--patches/source/vim/patches/7.4.016221
-rw-r--r--patches/source/vim/patches/7.4.01778
-rw-r--r--patches/source/vim/patches/7.4.01845
-rw-r--r--patches/source/vim/patches/7.4.01961
-rw-r--r--patches/source/vim/patches/7.4.02082
-rw-r--r--patches/source/vim/patches/7.4.02186
-rw-r--r--patches/source/vim/patches/7.4.022148
-rw-r--r--patches/source/vim/patches/7.4.02353
-rw-r--r--patches/source/vim/patches/7.4.02461
-rw-r--r--patches/source/vim/patches/7.4.02562
-rw-r--r--patches/source/vim/patches/7.4.02665
-rw-r--r--patches/source/vim/patches/7.4.02789
-rw-r--r--patches/source/vim/patches/7.4.028753
-rw-r--r--patches/source/vim/patches/7.4.02963
-rw-r--r--patches/source/vim/patches/7.4.030109
-rw-r--r--patches/source/vim/patches/7.4.03154
-rw-r--r--patches/source/vim/patches/7.4.03282
-rw-r--r--patches/source/vim/patches/7.4.033116
-rw-r--r--patches/source/vim/patches/7.4.034180
-rw-r--r--patches/source/vim/patches/7.4.03553
-rw-r--r--patches/source/vim/patches/7.4.036273
-rw-r--r--patches/source/vim/patches/7.4.037130
-rw-r--r--patches/source/vim/patches/7.4.038116
-rw-r--r--patches/source/vim/patches/7.4.039217
-rw-r--r--patches/source/vim/patches/7.4.04068
-rw-r--r--patches/source/vim/patches/7.4.04161
-rw-r--r--patches/source/vim/patches/7.4.04271
-rw-r--r--patches/source/vim/patches/7.4.04389
-rw-r--r--patches/source/vim/patches/7.4.04483
-rw-r--r--patches/source/vim/patches/7.4.045111
-rw-r--r--patches/source/vim/patches/7.4.04680
-rw-r--r--patches/source/vim/patches/7.4.04756
-rw-r--r--patches/source/vim/patches/7.4.04896
-rw-r--r--patches/source/vim/patches/7.4.04967
-rw-r--r--patches/source/vim/patches/7.4.05090
-rw-r--r--patches/source/vim/patches/7.4.05167
-rw-r--r--patches/source/vim/patches/7.4.052197
-rw-r--r--patches/source/vim/patches/7.4.05345
-rw-r--r--patches/source/vim/patches/7.4.05453
-rw-r--r--patches/source/vim/patches/7.4.055138
-rw-r--r--patches/source/vim/patches/7.4.05651
-rw-r--r--patches/source/vim/patches/7.4.057252
-rw-r--r--patches/source/vim/patches/7.4.05867
-rw-r--r--patches/source/vim/patches/7.4.05953
-rw-r--r--patches/source/vim/patches/7.4.06071
-rw-r--r--patches/source/vim/patches/7.4.061144
-rw-r--r--patches/source/vim/patches/7.4.06287
-rw-r--r--patches/source/vim/patches/7.4.063105
-rw-r--r--patches/source/vim/patches/7.4.064bin0 -> 5346 bytes
-rw-r--r--patches/source/vim/patches/7.4.06570
-rw-r--r--patches/source/vim/patches/7.4.066354
-rw-r--r--patches/source/vim/patches/7.4.067126
-rw-r--r--patches/source/vim/patches/7.4.068131
-rw-r--r--patches/source/vim/patches/7.4.0692559
-rw-r--r--patches/source/vim/patches/7.4.07047
-rw-r--r--patches/source/vim/patches/7.4.0711302
-rw-r--r--patches/source/vim/patches/7.4.07261
-rw-r--r--patches/source/vim/patches/7.4.073404
-rw-r--r--patches/source/vim/patches/7.4.07467
-rw-r--r--patches/source/vim/patches/7.4.075290
-rw-r--r--patches/source/vim/patches/7.4.07666
-rw-r--r--patches/source/vim/patches/7.4.07763
-rw-r--r--patches/source/vim/patches/7.4.078114
-rw-r--r--patches/source/vim/patches/7.4.079470
-rw-r--r--patches/source/vim/patches/7.4.08052
-rw-r--r--patches/source/vim/patches/7.4.08152
-rw-r--r--patches/source/vim/patches/7.4.082344
-rw-r--r--patches/source/vim/patches/7.4.083136
-rw-r--r--patches/source/vim/patches/7.4.084184
-rw-r--r--patches/source/vim/patches/7.4.085118
-rw-r--r--patches/source/vim/patches/7.4.086145
-rw-r--r--patches/source/vim/patches/7.4.08756
-rw-r--r--patches/source/vim/patches/7.4.088564
-rw-r--r--patches/source/vim/patches/7.4.08947
-rw-r--r--patches/source/vim/patches/7.4.090223
-rw-r--r--patches/source/vim/patches/7.4.09159
-rw-r--r--patches/source/vim/patches/7.4.09262
-rw-r--r--patches/source/vim/patches/7.4.09372
-rw-r--r--patches/source/vim/patches/7.4.094139
-rw-r--r--patches/source/vim/patches/7.4.09573
-rw-r--r--patches/source/vim/patches/7.4.09696
-rw-r--r--patches/source/vim/patches/7.4.09750
-rw-r--r--patches/source/vim/patches/7.4.098243
-rw-r--r--patches/source/vim/patches/7.4.099113
-rw-r--r--patches/source/vim/patches/7.4.10082
-rw-r--r--patches/source/vim/patches/7.4.10193
-rw-r--r--patches/source/vim/patches/7.4.10284
-rw-r--r--patches/source/vim/patches/7.4.10393
-rw-r--r--patches/source/vim/patches/7.4.104107
-rw-r--r--patches/source/vim/patches/7.4.10558
-rw-r--r--patches/source/vim/patches/7.4.10668
-rw-r--r--patches/source/vim/patches/7.4.107639
-rw-r--r--patches/source/vim/patches/7.4.108215
-rw-r--r--patches/source/vim/patches/7.4.109123
-rw-r--r--patches/source/vim/patches/7.4.110102
-rw-r--r--patches/source/vim/patches/7.4.11163
-rw-r--r--patches/source/vim/patches/7.4.11270
-rw-r--r--patches/source/vim/patches/7.4.113101
-rw-r--r--patches/source/vim/patches/7.4.11456
-rw-r--r--patches/source/vim/patches/7.4.11552
-rw-r--r--patches/source/vim/patches/7.4.11646
-rw-r--r--patches/source/vim/patches/7.4.117263
-rw-r--r--patches/source/vim/patches/7.4.11890
-rw-r--r--patches/source/vim/patches/7.4.119245
-rw-r--r--patches/source/vim/patches/7.4.12053
-rw-r--r--patches/source/vim/patches/7.4.12148
-rw-r--r--patches/source/vim/patches/7.4.122215
-rw-r--r--patches/source/vim/patches/7.4.12364
-rw-r--r--patches/source/vim/patches/7.4.12463
-rw-r--r--patches/source/vim/patches/7.4.12557
-rw-r--r--patches/source/vim/patches/7.4.12668
-rw-r--r--patches/source/vim/patches/7.4.12767
-rw-r--r--patches/source/vim/patches/7.4.12866
-rw-r--r--patches/source/vim/patches/7.4.12956
-rw-r--r--patches/source/vim/patches/7.4.13069
-rw-r--r--patches/source/vim/patches/7.4.131113
-rw-r--r--patches/source/vim/patches/7.4.13254
-rw-r--r--patches/source/vim/patches/7.4.13374
-rw-r--r--patches/source/vim/patches/7.4.13453
-rw-r--r--patches/source/vim/patches/7.4.13551
-rw-r--r--patches/source/vim/patches/7.4.13675
-rw-r--r--patches/source/vim/patches/7.4.137239
-rw-r--r--patches/source/vim/patches/7.4.13855
-rw-r--r--patches/source/vim/patches/7.4.13976
-rw-r--r--patches/source/vim/patches/7.4.140174
-rw-r--r--patches/source/vim/patches/7.4.14188
-rw-r--r--patches/source/vim/patches/7.4.142186
-rw-r--r--patches/source/vim/patches/7.4.143214
-rw-r--r--patches/source/vim/patches/7.4.14452
-rw-r--r--patches/source/vim/patches/7.4.14575
-rw-r--r--patches/source/vim/patches/7.4.14667
-rw-r--r--patches/source/vim/patches/7.4.147bin0 -> 2583 bytes
-rw-r--r--patches/source/vim/patches/7.4.14883
-rw-r--r--patches/source/vim/patches/7.4.149822
-rw-r--r--patches/source/vim/patches/7.4.15093
-rw-r--r--patches/source/vim/patches/7.4.1511470
-rw-r--r--patches/source/vim/patches/7.4.152708
-rw-r--r--patches/source/vim/patches/7.4.153176
-rw-r--r--patches/source/vim/patches/7.4.154153
-rw-r--r--patches/source/vim/patches/7.4.15583
-rw-r--r--patches/source/vim/patches/7.4.15649
-rw-r--r--patches/source/vim/patches/7.4.15753
-rw-r--r--patches/source/vim/patches/7.4.158140
-rw-r--r--patches/source/vim/patches/7.4.159116
-rw-r--r--patches/source/vim/patches/7.4.16066
-rw-r--r--patches/source/vim/patches/7.4.16175
-rw-r--r--patches/source/vim/patches/7.4.16245
-rw-r--r--patches/source/vim/patches/7.4.16375
-rw-r--r--patches/source/vim/patches/7.4.16478
-rw-r--r--patches/source/vim/patches/7.4.16571
-rw-r--r--patches/source/vim/patches/7.4.16653
-rw-r--r--patches/source/vim/patches/7.4.167195
-rw-r--r--patches/source/vim/patches/7.4.16891
-rw-r--r--patches/source/vim/patches/7.4.16953
-rw-r--r--patches/source/vim/patches/7.4.17090
-rw-r--r--patches/source/vim/patches/7.4.171841
-rw-r--r--patches/source/vim/patches/7.4.172346
-rw-r--r--patches/source/vim/patches/7.4.17361
-rw-r--r--patches/source/vim/patches/7.4.17494
-rw-r--r--patches/source/vim/patches/7.4.175180
-rw-r--r--patches/source/vim/patches/7.4.17691
-rw-r--r--patches/source/vim/patches/7.4.17748
-rw-r--r--patches/source/vim/patches/7.4.17862
-rw-r--r--patches/source/vim/patches/7.4.17957
-rw-r--r--patches/source/vim/patches/7.4.18076
-rw-r--r--patches/source/vim/patches/7.4.18168
-rw-r--r--patches/source/vim/patches/7.4.18256
-rw-r--r--patches/source/vim/patches/7.4.18349
-rw-r--r--patches/source/vim/patches/7.4.184250
-rw-r--r--patches/source/vim/patches/7.4.18564
-rw-r--r--patches/source/vim/patches/7.4.186164
-rw-r--r--patches/source/vim/patches/7.4.187136
-rw-r--r--patches/source/vim/patches/7.4.188617
-rw-r--r--patches/source/vim/patches/7.4.18952
-rw-r--r--patches/source/vim/patches/7.4.19070
-rw-r--r--patches/source/vim/patches/7.4.191689
-rw-r--r--patches/source/vim/patches/7.4.19244
-rw-r--r--patches/source/vim/patches/7.4.193106
-rw-r--r--patches/source/vim/patches/7.4.19453
-rw-r--r--patches/source/vim/patches/7.4.195164
-rw-r--r--patches/source/vim/patches/7.4.19651
-rw-r--r--patches/source/vim/patches/7.4.1971052
-rw-r--r--patches/source/vim/patches/7.4.198103
-rw-r--r--patches/source/vim/patches/7.4.199106
-rw-r--r--patches/source/vim/patches/7.4.20068
-rw-r--r--patches/source/vim/patches/7.4.201273
-rw-r--r--patches/source/vim/patches/7.4.202281
-rw-r--r--patches/source/vim/patches/7.4.203203
-rw-r--r--patches/source/vim/patches/7.4.204113
-rw-r--r--patches/source/vim/patches/7.4.205113
-rw-r--r--patches/source/vim/patches/7.4.20672
-rw-r--r--patches/source/vim/patches/7.4.207176
-rw-r--r--patches/source/vim/patches/7.4.20836
-rw-r--r--patches/source/vim/patches/7.4.20963
-rw-r--r--patches/source/vim/patches/7.4.210133
-rw-r--r--patches/source/vim/patches/7.4.21168
-rw-r--r--patches/source/vim/patches/7.4.2125720
-rw-r--r--patches/source/vim/patches/7.4.213211
-rw-r--r--patches/source/vim/patches/7.4.21450
-rw-r--r--patches/source/vim/patches/7.4.21587
-rw-r--r--patches/source/vim/patches/7.4.21673
-rw-r--r--patches/source/vim/patches/7.4.21785
-rw-r--r--patches/source/vim/patches/7.4.218578
-rw-r--r--patches/source/vim/patches/7.4.219100
-rw-r--r--patches/source/vim/patches/7.4.220106
-rw-r--r--patches/source/vim/patches/7.4.22162
-rw-r--r--patches/source/vim/patches/7.4.22283
-rw-r--r--patches/source/vim/patches/7.4.2236557
-rw-r--r--patches/source/vim/patches/7.4.224210
-rw-r--r--patches/source/vim/patches/7.4.22583
-rw-r--r--patches/source/vim/patches/7.4.226136
-rw-r--r--patches/source/vim/patches/7.4.22787
-rw-r--r--patches/source/vim/patches/7.4.228189
-rw-r--r--patches/source/vim/patches/7.4.229141
-rw-r--r--patches/source/vim/patches/7.4.23053
-rw-r--r--patches/source/vim/patches/7.4.231267
-rw-r--r--patches/source/vim/patches/7.4.232109
-rw-r--r--patches/source/vim/patches/7.4.23380
-rw-r--r--patches/source/vim/patches/7.4.23495
-rw-r--r--patches/source/vim/patches/7.4.235552
-rw-r--r--patches/source/vim/patches/7.4.236159
-rw-r--r--patches/source/vim/patches/7.4.237127
-rw-r--r--patches/source/vim/patches/7.4.238505
-rw-r--r--patches/source/vim/patches/7.4.23955
-rw-r--r--patches/source/vim/patches/7.4.24057
-rw-r--r--patches/source/vim/patches/7.4.241386
-rw-r--r--patches/source/vim/patches/7.4.242520
-rw-r--r--patches/source/vim/patches/7.4.2431109
-rw-r--r--patches/source/vim/patches/7.4.24460
-rw-r--r--patches/source/vim/patches/7.4.24552
-rw-r--r--patches/source/vim/patches/7.4.246121
-rw-r--r--patches/source/vim/patches/7.4.247227
-rw-r--r--patches/source/vim/patches/7.4.248515
-rw-r--r--patches/source/vim/patches/7.4.249bin0 -> 6037 bytes
-rw-r--r--patches/source/vim/patches/7.4.25052
-rw-r--r--patches/source/vim/patches/7.4.251164
-rw-r--r--patches/source/vim/patches/7.4.25247
-rw-r--r--patches/source/vim/patches/7.4.25376
-rw-r--r--patches/source/vim/patches/7.4.254183
-rw-r--r--patches/source/vim/patches/7.4.255108
-rw-r--r--patches/source/vim/patches/7.4.25683
-rw-r--r--patches/source/vim/patches/7.4.25764
-rw-r--r--patches/source/vim/patches/7.4.258114
-rw-r--r--patches/source/vim/patches/7.4.25953
-rw-r--r--patches/source/vim/patches/7.4.260281
-rw-r--r--patches/source/vim/patches/7.4.261106
-rw-r--r--patches/source/vim/patches/7.4.262314
-rw-r--r--patches/source/vim/patches/7.4.26344
-rw-r--r--patches/source/vim/patches/7.4.264176
-rw-r--r--patches/source/vim/patches/7.4.265153
-rw-r--r--patches/source/vim/patches/7.4.26646
-rw-r--r--patches/source/vim/patches/7.4.267438
-rw-r--r--patches/source/vim/patches/7.4.268108
-rw-r--r--patches/source/vim/patches/7.4.269213
-rw-r--r--patches/source/vim/patches/7.4.27062
-rw-r--r--patches/source/vim/patches/7.4.27152
-rw-r--r--patches/source/vim/patches/7.4.272148
-rw-r--r--patches/source/vim/patches/7.4.27357
-rw-r--r--patches/source/vim/patches/7.4.27446
-rw-r--r--patches/source/vim/patches/7.4.27556
-rw-r--r--patches/source/vim/patches/7.4.276302
-rw-r--r--patches/source/vim/patches/7.4.27780
-rw-r--r--patches/source/vim/patches/7.4.278183
-rw-r--r--patches/source/vim/patches/7.4.279616
-rw-r--r--patches/source/vim/patches/7.4.280125
-rw-r--r--patches/source/vim/patches/7.4.28180
-rw-r--r--patches/source/vim/patches/7.4.28248
-rw-r--r--patches/source/vim/patches/7.4.28356
-rw-r--r--patches/source/vim/patches/7.4.28453
-rw-r--r--patches/source/vim/patches/7.4.28549
-rw-r--r--patches/source/vim/patches/7.4.28652
-rw-r--r--patches/source/vim/patches/7.4.28747
-rw-r--r--patches/source/vim/patches/7.4.28846
-rw-r--r--patches/source/vim/patches/7.4.289122
-rw-r--r--patches/source/vim/patches/7.4.290156
-rw-r--r--patches/source/vim/patches/7.4.29156
-rw-r--r--patches/source/vim/patches/7.4.292139
-rw-r--r--patches/source/vim/patches/7.4.293301
-rw-r--r--patches/source/vim/patches/7.4.294125
-rw-r--r--patches/source/vim/patches/7.4.295144
-rw-r--r--patches/source/vim/patches/7.4.29653
-rw-r--r--patches/source/vim/patches/7.4.29776
-rw-r--r--patches/source/vim/patches/7.4.29852
-rw-r--r--patches/source/vim/patches/7.4.299458
-rw-r--r--patches/source/vim/patches/7.4.30062
-rw-r--r--patches/source/vim/patches/7.4.30153
-rw-r--r--patches/source/vim/patches/7.4.30278
-rw-r--r--patches/source/vim/patches/7.4.30385
-rw-r--r--patches/source/vim/patches/7.4.30445
-rw-r--r--patches/source/vim/patches/7.4.305.gzbin0 -> 2653 bytes
-rw-r--r--patches/source/vim/patches/7.4.30684
-rw-r--r--patches/source/vim/patches/7.4.307147
-rw-r--r--patches/source/vim/patches/7.4.30847
-rw-r--r--patches/source/vim/patches/7.4.30988
-rw-r--r--patches/source/vim/patches/7.4.310373
-rw-r--r--patches/source/vim/patches/7.4.311127
-rw-r--r--patches/source/vim/patches/7.4.312194
-rw-r--r--patches/source/vim/patches/7.4.313320
-rw-r--r--patches/source/vim/patches/7.4.314178
-rw-r--r--patches/source/vim/patches/7.4.315229
-rw-r--r--patches/source/vim/patches/7.4.31652
-rw-r--r--patches/source/vim/patches/7.4.31757
-rw-r--r--patches/source/vim/patches/7.4.31852
-rw-r--r--patches/source/vim/patches/7.4.31955
-rw-r--r--patches/source/vim/patches/7.4.320143
-rw-r--r--patches/source/vim/patches/7.4.32171
-rw-r--r--patches/source/vim/patches/7.4.32292
-rw-r--r--patches/source/vim/patches/7.4.32396
-rw-r--r--patches/source/vim/patches/7.4.324190
-rw-r--r--patches/source/vim/patches/7.4.32562
-rw-r--r--patches/source/vim/patches/7.4.32651
-rw-r--r--patches/source/vim/patches/7.4.327163
-rw-r--r--patches/source/vim/patches/7.4.32882
-rw-r--r--patches/source/vim/patches/7.4.32955
-rw-r--r--patches/source/vim/patches/7.4.3301131
-rw-r--r--patches/source/vim/patches/7.4.33147
-rw-r--r--patches/source/vim/patches/7.4.332118
-rw-r--r--patches/source/vim/patches/7.4.33372
-rw-r--r--patches/source/vim/patches/7.4.334112
-rw-r--r--patches/source/vim/patches/7.4.335108
-rw-r--r--patches/source/vim/patches/7.4.336100
-rw-r--r--patches/source/vim/patches/7.4.33751
-rw-r--r--patches/source/vim/patches/7.4.3381830
-rw-r--r--patches/source/vim/patches/7.4.33979
-rw-r--r--patches/source/vim/patches/7.4.34097
-rw-r--r--patches/source/vim/patches/7.4.341178
-rw-r--r--patches/source/vim/patches/7.4.34267
-rw-r--r--patches/source/vim/patches/7.4.34360
-rw-r--r--patches/source/vim/patches/7.4.344180
-rw-r--r--patches/source/vim/patches/7.4.34573
-rw-r--r--patches/source/vim/patches/7.4.34661
-rw-r--r--patches/source/vim/patches/7.4.34774
-rw-r--r--patches/source/vim/patches/7.4.34858
-rw-r--r--patches/source/vim/patches/7.4.349111
-rw-r--r--patches/source/vim/patches/7.4.350139
-rw-r--r--patches/source/vim/patches/7.4.351160
-rw-r--r--patches/source/vim/patches/7.4.352101
-rw-r--r--patches/source/vim/patches/7.4.353489
-rw-r--r--patches/source/vim/patches/7.4.35456
-rw-r--r--patches/source/vim/patches/7.4.355929
-rw-r--r--patches/source/vim/patches/7.4.35638
-rw-r--r--patches/source/vim/patches/7.4.35752
-rw-r--r--patches/source/vim/patches/7.4.358290
-rw-r--r--patches/source/vim/patches/7.4.359103
-rw-r--r--patches/source/vim/patches/7.4.36080
-rw-r--r--patches/source/vim/patches/7.4.36148
-rw-r--r--patches/source/vim/patches/7.4.36253
-rw-r--r--patches/source/vim/patches/7.4.363160
-rw-r--r--patches/source/vim/patches/7.4.36470
-rw-r--r--patches/source/vim/patches/7.4.365159
-rw-r--r--patches/source/vim/patches/7.4.36653
-rw-r--r--patches/source/vim/patches/7.4.36767
-rw-r--r--patches/source/vim/patches/7.4.36879
-rw-r--r--patches/source/vim/patches/7.4.36970
-rw-r--r--patches/source/vim/patches/7.4.370316
-rw-r--r--patches/source/vim/patches/7.4.37159
-rw-r--r--patches/source/vim/patches/7.4.372188
-rw-r--r--patches/source/vim/patches/7.4.37398
-rw-r--r--patches/source/vim/patches/7.4.37471
-rw-r--r--patches/source/vim/patches/7.4.37559
-rw-r--r--patches/source/vim/patches/7.4.37657
-rw-r--r--patches/source/vim/patches/7.4.377144
-rw-r--r--patches/source/vim/patches/7.4.378336
-rw-r--r--patches/source/vim/patches/7.4.37945
-rw-r--r--patches/source/vim/patches/7.4.380115
-rw-r--r--patches/source/vim/patches/7.4.38145
-rw-r--r--patches/source/vim/patches/7.4.38252
-rw-r--r--patches/source/vim/patches/7.4.38352
-rw-r--r--patches/source/vim/patches/7.4.38447
-rw-r--r--patches/source/vim/patches/7.4.38576
-rw-r--r--patches/source/vim/patches/7.4.386186
-rw-r--r--patches/source/vim/patches/7.4.387199
-rw-r--r--patches/source/vim/patches/7.4.38898
-rw-r--r--patches/source/vim/patches/7.4.389490
-rw-r--r--patches/source/vim/patches/7.4.39051
-rw-r--r--patches/source/vim/patches/7.4.391118
-rw-r--r--patches/source/vim/patches/7.4.39286
-rw-r--r--patches/source/vim/patches/7.4.3931946
-rw-r--r--patches/source/vim/patches/7.4.39456
-rw-r--r--patches/source/vim/patches/7.4.39599
-rw-r--r--patches/source/vim/patches/7.4.396291
-rw-r--r--patches/source/vim/patches/7.4.397150
-rw-r--r--patches/source/vim/patches/7.4.39852
-rw-r--r--patches/source/vim/patches/7.4.3995059
-rw-r--r--patches/source/vim/slack-desc.vim19
-rw-r--r--patches/source/vim/slack-desc.vim-gvim19
-rwxr-xr-xpatches/source/vim/vim-gvim.SlackBuild222
-rw-r--r--patches/source/vim/vim-runtime-syntax-20131002.diff0
-rwxr-xr-xpatches/source/vim/vim.SlackBuild228
-rw-r--r--patches/source/vim/vim.vimrc.diff12
-rw-r--r--patches/source/wget/doinst.sh14
-rw-r--r--patches/source/wget/slack-desc19
-rwxr-xr-xpatches/source/wget/wget.SlackBuild109
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch174
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch250
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch184
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch79
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch64
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch132
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch43
-rw-r--r--patches/source/wpa_supplicant/2017-1/rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch82
-rw-r--r--patches/source/wpa_supplicant/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt226
-rw-r--r--patches/source/wpa_supplicant/README.slackware55
-rw-r--r--patches/source/wpa_supplicant/config/dot.config37
-rw-r--r--patches/source/wpa_supplicant/config/wpa_gui.desktop7
-rw-r--r--patches/source/wpa_supplicant/config/wpa_gui.pngbin0 -> 5124 bytes
-rw-r--r--patches/source/wpa_supplicant/config/wpa_supplicant.conf2
-rw-r--r--patches/source/wpa_supplicant/config/wpa_supplicant.logrotate6
-rw-r--r--patches/source/wpa_supplicant/doinst.sh15
-rw-r--r--patches/source/wpa_supplicant/patches/assoc-timeout.diff16
-rw-r--r--patches/source/wpa_supplicant/patches/dbus-service-file-args.diff20
-rw-r--r--patches/source/wpa_supplicant/patches/flush-debug-output.diff50
-rw-r--r--patches/source/wpa_supplicant/patches/quiet-scan-results-message.diff16
-rw-r--r--patches/source/wpa_supplicant/slack-desc18
-rwxr-xr-xpatches/source/wpa_supplicant/wpa_supplicant.SlackBuild181
-rw-r--r--patches/source/xcb-proto/arch.use.flags9
-rw-r--r--patches/source/xcb-proto/build/xcb-proto1
-rw-r--r--patches/source/xcb-proto/configure/configure13
-rw-r--r--patches/source/xcb-proto/modularize279
-rw-r--r--patches/source/xcb-proto/noarch75
-rw-r--r--patches/source/xcb-proto/package-blacklist44
-rw-r--r--patches/source/xcb-proto/post-install/xcb-proto.post-install5
-rw-r--r--patches/source/xcb-proto/slack-desc/xcb-proto19
-rwxr-xr-xpatches/source/xcb-proto/x11.SlackBuild381
-rwxr-xr-xpatches/source/xcb-proto/xcb-proto.SlackBuild2
-rw-r--r--patches/source/xextproto/arch.use.flags9
-rw-r--r--patches/source/xextproto/build/xextproto1
-rw-r--r--patches/source/xextproto/configure/configure13
-rw-r--r--patches/source/xextproto/modularize279
-rw-r--r--patches/source/xextproto/noarch75
-rw-r--r--patches/source/xextproto/package-blacklist44
-rw-r--r--patches/source/xextproto/slack-desc/xextproto19
-rwxr-xr-xpatches/source/xextproto/x11.SlackBuild381
-rwxr-xr-xpatches/source/xextproto/xextproto.SlackBuild2
-rw-r--r--patches/source/xfce4-weather-plugin/slack-desc19
-rwxr-xr-xpatches/source/xfce4-weather-plugin/xfce4-weather-plugin.SlackBuild107
-rw-r--r--patches/source/xfce4-weather-plugin/xfce4-weather-plugin.url1
-rw-r--r--patches/source/xorg-server/arch.use.flags7
-rw-r--r--patches/source/xorg-server/build/xorg-server1
-rw-r--r--patches/source/xorg-server/configure/xorg-server44
-rw-r--r--patches/source/xorg-server/makepkg/xorg-server35
-rw-r--r--patches/source/xorg-server/modularize265
-rw-r--r--patches/source/xorg-server/noarch76
-rw-r--r--patches/source/xorg-server/package-blacklist39
-rw-r--r--patches/source/xorg-server/patch/xorg-server.patch8
-rw-r--r--patches/source/xorg-server/patch/xorg-server/x11.startwithblackscreen.diff14
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2013-1940.diff12
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2013-4396.diff73
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2017-10971.diff40
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2017-10972.diff36
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2017-12176.diff31
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2017-12183.diff95
-rw-r--r--patches/source/xorg-server/patch/xorg-server/xorg-server.CVE-2017-13723.diff116
-rw-r--r--patches/source/xorg-server/post-install/xorg-server.post-install66
-rw-r--r--patches/source/xorg-server/slack-desc/xorg-server19
-rw-r--r--patches/source/xorg-server/slack-desc/xorg-server-xephyr19
-rw-r--r--patches/source/xorg-server/slack-desc/xorg-server-xnest19
-rw-r--r--patches/source/xorg-server/slack-desc/xorg-server-xvfb19
-rwxr-xr-xpatches/source/xorg-server/x11.SlackBuild364
-rwxr-xr-xpatches/source/xorg-server/xorg-server.SlackBuild2
-rw-r--r--patches/source/xpdf/doinst.sh19
-rw-r--r--patches/source/xpdf/lang/xpdf-arabic.diff7
-rw-r--r--patches/source/xpdf/lang/xpdf-chinese-simplified.diff19
-rw-r--r--patches/source/xpdf/lang/xpdf-chinese-traditional.diff17
-rw-r--r--patches/source/xpdf/lang/xpdf-cyrillic.diff9
-rw-r--r--patches/source/xpdf/lang/xpdf-greek.diff9
-rw-r--r--patches/source/xpdf/lang/xpdf-hebrew.diff9
-rw-r--r--patches/source/xpdf/lang/xpdf-japanese.diff55
-rw-r--r--patches/source/xpdf/lang/xpdf-korean.diff15
-rw-r--r--patches/source/xpdf/lang/xpdf-latin2.diff7
-rw-r--r--patches/source/xpdf/lang/xpdf-thai.diff9
-rw-r--r--patches/source/xpdf/lang/xpdf-turkish.diff7
-rw-r--r--patches/source/xpdf/patches/xpdf-3.03-CVE-2012-2142.diff55
-rw-r--r--patches/source/xpdf/patches/xpdf.XPDFViewer.diff11
-rw-r--r--patches/source/xpdf/patches/xpdfrc.diff43
-rw-r--r--patches/source/xpdf/slack-desc19
-rwxr-xr-xpatches/source/xpdf/xpdf.SlackBuild151
-rw-r--r--patches/source/xpdf/xpdf.desktop98
-rw-r--r--patches/source/xproto/arch.use.flags9
-rw-r--r--patches/source/xproto/build/xproto1
-rw-r--r--patches/source/xproto/configure/configure13
-rw-r--r--patches/source/xproto/modularize279
-rw-r--r--patches/source/xproto/noarch75
-rw-r--r--patches/source/xproto/package-blacklist44
-rw-r--r--patches/source/xproto/post-install/xproto.post-install2
-rw-r--r--patches/source/xproto/slack-desc/xproto19
-rwxr-xr-xpatches/source/xproto/x11.SlackBuild381
-rwxr-xr-xpatches/source/xproto/xproto.SlackBuild2
-rwxr-xr-xpatches/source/xscreensaver/dump.android.osx.sources.sh14
-rw-r--r--patches/source/xscreensaver/setuid.c274
-rw-r--r--patches/source/xscreensaver/slack-desc19
-rw-r--r--patches/source/xscreensaver/xscreensaver-getimage-file-5.14555
-rwxr-xr-xpatches/source/xscreensaver/xscreensaver.SlackBuild141
-rw-r--r--patches/source/xscreensaver/xscreensaver.electricsheep.diff20
-rw-r--r--patches/source/xscreensaver/xscreensaver.no.expiration.date.diff29
-rw-r--r--patches/source/xscreensaver/xscreensaver.setuid.diff179
-rwxr-xr-xrecompress.sh3251
-rw-r--r--slackbook/html/TRADEMARKS.html80
-rw-r--r--slackbook/html/archive-files-bzip2.html103
-rw-r--r--slackbook/html/archive-files-tar.html232
-rw-r--r--slackbook/html/archive-files-zip.html114
-rw-r--r--slackbook/html/archive-files.html145
-rw-r--r--slackbook/html/basic-network-commands-dns.html181
-rw-r--r--slackbook/html/basic-network-commands-email.html241
-rw-r--r--slackbook/html/basic-network-commands-finger.html132
-rw-r--r--slackbook/html/basic-network-commands-ftp.html279
-rw-r--r--slackbook/html/basic-network-commands-ssh.html100
-rw-r--r--slackbook/html/basic-network-commands-talk.html184
-rw-r--r--slackbook/html/basic-network-commands-telnet.html173
-rw-r--r--slackbook/html/basic-network-commands-traceroute.html106
-rw-r--r--slackbook/html/basic-network-commands-web.html215
-rw-r--r--slackbook/html/basic-network-commands.html142
-rw-r--r--slackbook/html/basic-network-commands/elm.pngbin3421 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/links.pngbin5204 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/lynx.pngbin7544 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/mutt.pngbin2489 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/pine.pngbin4689 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/talk.pngbin491 -> 0 bytes
-rw-r--r--slackbook/html/basic-network-commands/ytalk.pngbin952 -> 0 bytes
-rw-r--r--slackbook/html/book-preface.html404
-rw-r--r--slackbook/html/book.html13511
-rw-r--r--slackbook/html/booting-dual.html341
-rw-r--r--slackbook/html/booting-loadlin.html116
-rw-r--r--slackbook/html/booting.html202
-rw-r--r--slackbook/html/booting/setup-lilo-expert-w.pngbin6986 -> 0 bytes
-rw-r--r--slackbook/html/booting/setup-lilo-w.pngbin5824 -> 0 bytes
-rw-r--r--slackbook/html/docbook.css162
-rw-r--r--slackbook/html/emacs-basic-editing.html227
-rw-r--r--slackbook/html/emacs-buffers.html112
-rw-r--r--slackbook/html/emacs-modes.html141
-rw-r--r--slackbook/html/emacs-saving-files.html136
-rw-r--r--slackbook/html/emacs.html173
-rw-r--r--slackbook/html/emacs/emacs.pngbin7842 -> 0 bytes
-rw-r--r--slackbook/html/essential-sysadmin-hardusers.html202
-rw-r--r--slackbook/html/essential-sysadmin-shutdown.html236
-rw-r--r--slackbook/html/essential-sysadmin.html524
-rw-r--r--slackbook/html/file-commands-copymove.html166
-rw-r--r--slackbook/html/file-commands-creation.html143
-rw-r--r--slackbook/html/file-commands-deletion.html189
-rw-r--r--slackbook/html/file-commands-link.html105
-rw-r--r--slackbook/html/file-commands-output.html147
-rw-r--r--slackbook/html/file-commands-pagers.html144
-rw-r--r--slackbook/html/file-commands.html275
-rw-r--r--slackbook/html/filesystem-structure-links.html105
-rw-r--r--slackbook/html/filesystem-structure-mounting.html184
-rw-r--r--slackbook/html/filesystem-structure-nfs.html78
-rw-r--r--slackbook/html/filesystem-structure-permissions.html314
-rw-r--r--slackbook/html/filesystem-structure.html168
-rw-r--r--slackbook/html/glossary.html647
-rw-r--r--slackbook/html/gpl.html452
-rw-r--r--slackbook/html/help-online.html247
-rw-r--r--slackbook/html/help.html292
-rw-r--r--slackbook/html/imagelib/admon/note.pngbin338 -> 0 bytes
-rw-r--r--slackbook/html/imagelib/admon/warning.pngbin1090 -> 0 bytes
-rw-r--r--slackbook/html/index.html1013
-rw-r--r--slackbook/html/installation-partitioning.html218
-rw-r--r--slackbook/html/installation-requirements.html388
-rw-r--r--slackbook/html/installation-setup.html387
-rw-r--r--slackbook/html/installation.html176
-rw-r--r--slackbook/html/installation/setup-bootdisk-w.pngbin4010 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-font-w.pngbin3856 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-hardware-clock-w.pngbin3916 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-help-w.pngbin4715 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-install-w.pngbin7100 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-kernel-w.pngbin6442 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-keymap-w.pngbin4526 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-lilo-w.pngbin5824 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-modem-w.pngbin5356 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-mouse-w.pngbin6516 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-program-w.pngbin5705 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-select-w.pngbin6817 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-source-w.pngbin3238 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-swap-w.pngbin3066 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-target-w.pngbin3153 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-timezone-w.pngbin3593 -> 0 bytes
-rw-r--r--slackbook/html/installation/setup-xwmconfig-w.pngbin6767 -> 0 bytes
-rw-r--r--slackbook/html/introduction-opensource.html126
-rw-r--r--slackbook/html/introduction-slackware.html93
-rw-r--r--slackbook/html/introduction.html122
-rw-r--r--slackbook/html/network-configuration-hardware.html173
-rw-r--r--slackbook/html/network-configuration-nfs.html308
-rw-r--r--slackbook/html/network-configuration-ppp.html166
-rw-r--r--slackbook/html/network-configuration-tcpip.html324
-rw-r--r--slackbook/html/network-configuration-wireless.html208
-rw-r--r--slackbook/html/network-configuration.html146
-rw-r--r--slackbook/html/package-management-making-packages.html120
-rw-r--r--slackbook/html/package-management-making-tags-and-tagfiles.html136
-rw-r--r--slackbook/html/package-management-package-utilities.html330
-rw-r--r--slackbook/html/package-management.html148
-rw-r--r--slackbook/html/package-management/pkgtool-view-w.pngbin5817 -> 0 bytes
-rw-r--r--slackbook/html/package-management/pkgtool-w.pngbin4784 -> 0 bytes
-rw-r--r--slackbook/html/process-control-foregrounding.html138
-rw-r--r--slackbook/html/process-control-kill.html182
-rw-r--r--slackbook/html/process-control-ps.html243
-rw-r--r--slackbook/html/process-control-top.html168
-rw-r--r--slackbook/html/process-control.html138
-rw-r--r--slackbook/html/security-current.html138
-rw-r--r--slackbook/html/security-host.html307
-rw-r--r--slackbook/html/security.html218
-rw-r--r--slackbook/html/shell-bash.html234
-rw-r--r--slackbook/html/shell-command-line.html307
-rw-r--r--slackbook/html/shell-vt.html137
-rw-r--r--slackbook/html/shell.html166
-rw-r--r--slackbook/html/slackware_logo.pngbin3675 -> 0 bytes
-rw-r--r--slackbook/html/system-configuration-kernel.html354
-rw-r--r--slackbook/html/system-configuration.html589
-rw-r--r--slackbook/html/system-configuration/make-menuconfig-w.pngbin6421 -> 0 bytes
-rw-r--r--slackbook/html/vi-configuration.html96
-rw-r--r--slackbook/html/vi-keys.html279
-rw-r--r--slackbook/html/vi-modes.html200
-rw-r--r--slackbook/html/vi-opening-files.html109
-rw-r--r--slackbook/html/vi-quitting-vi.html80
-rw-r--r--slackbook/html/vi-saving-files.html103
-rw-r--r--slackbook/html/vi.html199
-rw-r--r--slackbook/html/vi/vim-splitedit.pngbin3515 -> 0 bytes
-rw-r--r--slackbook/html/x-window-system-xdm.html202
-rw-r--r--slackbook/html/x-window-system-xinitrc.html145
-rw-r--r--slackbook/html/x-window-system-xorgsetup.html84
-rw-r--r--slackbook/html/x-window-system-xwmconfig.html134
-rw-r--r--slackbook/html/x-window-system.html210
-rw-r--r--slackbook/html/x-window-system/xorgconfig1-w.pngbin4003 -> 0 bytes
-rw-r--r--slackbook/html/x-window-system/xorgconfig2-w.pngbin6872 -> 0 bytes
-rw-r--r--slackbook/html/x-window-system/xorgconfig3-w.pngbin3069 -> 0 bytes
-rw-r--r--slackbook/html/x-window-system/xorgconfig4-w.pngbin5245 -> 0 bytes
-rw-r--r--slackbook/html/x-window-system/xwmconfig-w.pngbin6767 -> 0 bytes
-rw-r--r--slackbook/html/zipslack-booting.html93
-rw-r--r--slackbook/html/zipslack-getting.html110
-rw-r--r--slackbook/html/zipslack.html128
-rw-r--r--slackbook/slackbook-2.0.pdfbin1863038 -> 0 bytes
-rw-r--r--slackbook/slackbook-2.0.ps86611
1524 files changed, 186078 insertions, 127517 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 3aeaae10..06244c94 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,4493 @@
+Fri May 25 23:29:36 UTC 2018
+patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txz: Rebuilt.
+ Handle removal of US/Pacific-New timezone. If we see that the machine is
+ using this, it will be automatically switched to US/Pacific.
++--------------------------+
+Thu May 17 04:13:16 UTC 2018
+patches/packages/curl-7.60.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes:
+ FTP: shutdown response buffer overflow
+ RTSP: bad headers buffer over-read
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
+ (* Security fix *)
+patches/packages/php-5.6.36-x86_64-1_slack14.0.txz: Upgraded.
+ This fixes many bugs, including some security issues:
+ Heap Buffer Overflow (READ: 1786) in exif_iif_add_value
+ stream filter convert.iconv leads to infinite loop on invalid sequence
+ Malicious LDAP-Server Response causes crash
+ fix for CVE-2018-5712 may not be complete
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10549
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10546
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547
+ (* Security fix *)
++--------------------------+
+Thu May 10 01:24:19 UTC 2018
+patches/packages/glibc-zoneinfo-2018e-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/wget-1.19.5-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed a security issue where a malicious web server could inject arbitrary
+ cookies into the cookie jar file.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494
+ (* Security fix *)
++--------------------------+
+Fri May 4 19:40:52 UTC 2018
+patches/packages/python-2.7.15-x86_64-1_slack14.0.txz: Upgraded.
+ Updated to the latest 2.7.x release.
+ This fixes some security issues in difflib and poplib (regexes vulnerable
+ to denial of service attacks), as well as security issues with the bundled
+ expat library.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
+ (* Security fix *)
++--------------------------+
+Mon Apr 30 22:35:43 UTC 2018
+patches/packages/libwmf-0.2.8.4-x86_64-6_slack14.0.txz: Rebuilt.
+ Patched denial of service and possible execution of arbitrary code
+ security issues.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0941
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362
+ (* Security fix *)
++--------------------------+
+Fri Apr 27 03:58:48 UTC 2018
+patches/packages/openvpn-2.4.6-x86_64-1_slack14.0.txz: Upgraded.
+ This is a security update fixing a potential double-free() in Interactive
+ Service. This usually only leads to a process crash (DoS by an unprivileged
+ local account) but since it could possibly lead to memory corruption if
+ happening while multiple other threads are active at the same time,
+ CVE-2018-9336 has been assigned to acknowledge this risk.
+ For more information, see:
+ https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9336
+ (* Security fix *)
++--------------------------+
+Fri Apr 6 20:47:43 UTC 2018
+patches/packages/patch-2.7.6-x86_64-1_slack14.0.txz: Upgraded.
+ Fix arbitrary shell execution possible with obsolete ed format patches.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156
+ (* Security fix *)
++--------------------------+
+Sun Apr 1 19:45:12 UTC 2018
+patches/packages/libidn-1.34-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues:
+ Fix integer overflow in combine_hangul()
+ Fix integer overflow in punycode decoder
+ Fix NULL pointer dereference in g_utf8_normalize()
+ Fix NULL pointer dereference in stringprep_ucs4_nfkc_normalize()
+ (* Security fix *)
++--------------------------+
+Sun Apr 1 02:53:26 UTC 2018
+patches/packages/php-5.6.35-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where sensitive data belonging to other
+ accounts might be accessed by a local user.
+ For more information, see:
+ http://bugs.php.net/75605
+ (* Security fix *)
++--------------------------+
+Fri Mar 23 22:28:20 UTC 2018
+patches/packages/glibc-zoneinfo-2018d-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Sun Mar 18 00:55:39 UTC 2018
+patches/packages/libvorbis-1.3.6-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes security issues.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146
+ (* Security fix *)
++--------------------------+
+Fri Mar 16 02:29:29 UTC 2018
+patches/packages/curl-7.59.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues:
+ FTP path trickery leads to NIL byte out of bounds write
+ LDAP NULL pointer dereference
+ RTSP RTP buffer over-read
+ For more information, see:
+ https://curl.haxx.se/docs/adv_2018-9cd6.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
+ https://curl.haxx.se/docs/adv_2018-97a2.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
+ https://curl.haxx.se/docs/adv_2018-b047.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
+ (* Security fix *)
++--------------------------+
+Tue Mar 13 21:12:51 UTC 2018
+patches/packages/samba-4.4.16-x86_64-3_slack14.0.txz: Rebuilt.
+ This is a security update in order to patch the following defect:
+ On a Samba 4 AD DC the LDAP server in all versions of Samba from
+ 4.0.0 onwards incorrectly validates permissions to modify passwords
+ over LDAP allowing authenticated users to change any other users`
+ passwords, including administrative users.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2018-1057.html
+ https://wiki.samba.org/index.php/CVE-2018-1057
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
+ (* Security fix *)
++--------------------------+
+Thu Mar 8 07:07:45 UTC 2018
+patches/packages/openssh-7.4p1-x86_64-2_slack14.0.txz: Rebuilt.
+ sftp-server: in read-only mode, sftp-server was incorrectly permitting
+ creation of zero-length files. Reported by Michal Zalewski.
+ Thanks to arny (of Bluewhite64 fame) for the heads-up.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906
+ (* Security fix *)
+patches/packages/php-5.6.34-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a stack buffer overflow vulnerability.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
+ (* Security fix *)
++--------------------------+
+Thu Mar 1 23:24:54 UTC 2018
+patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ Corrected an issue where large sized 'X/x' format options were causing
+ option handling logic to overwrite memory when expanding them to human
+ readable form. Reported by Felix Wilhelm, Google Security Team.
+ Option reference count was not correctly decremented in error path
+ when parsing buffer for options. Reported by Felix Wilhelm, Google
+ Security Team.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733
+ (* Security fix *)
+patches/packages/ntp-4.2.8p11-x86_64-1_slack14.0.txz: Upgraded.
+ This release addresses five security issues in ntpd:
+ * LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability:
+ ephemeral association attack. While fixed in ntp-4.2.8p7, there are
+ significant additional protections for this issue in 4.2.8p11.
+ Reported by Matt Van Gundy of Cisco.
+ * INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909: ctl_getitem(): buffer
+ read overrun leads to undefined behavior and information leak.
+ Reported by Yihan Lian of Qihoo 360.
+ * LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated
+ ephemeral associations. Reported on the questions@ list.
+ * LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode
+ cannot recover from bad state. Reported by Miroslav Lichvar of Red Hat.
+ * LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909: Unauthenticated packet
+ can reset authenticated interleaved association.
+ Reported by Miroslav Lichvar of Red Hat.
+ For more information, see:
+ http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185
+ (* Security fix *)
++--------------------------+
+Sat Feb 24 07:41:40 UTC 2018
+patches/packages/wget-1.19.4-x86_64-2_slack14.0.txz: Rebuilt.
+ Applied upstream patch to fix logging in background mode.
+ Thanks to Willy Sudiarto Raharjo.
++--------------------------+
+Fri Feb 16 03:19:36 UTC 2018
+patches/packages/irssi-1.0.7-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues.
+ For more information, see:
+ https://irssi.org/security/html/irssi_sa_2018_02
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7054
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7053
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7050
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7052
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7051
+ (* Security fix *)
++--------------------------+
+Sun Feb 4 05:13:27 UTC 2018
+patches/packages/php-5.6.33-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues, including:
+ Potential infinite loop in gdImageCreateFromGifCtx.
+ Reflected XSS in .phar 404 page.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
+ (* Security fix *)
++--------------------------+
+Thu Feb 1 18:24:15 UTC 2018
+patches/packages/rsync-3.1.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ Fixed a buffer overrun in the protocol's handling of xattr names and
+ ensure that the received name is null terminated.
+ Fix an issue with --protect-args where the user could specify the arg in
+ the protected-arg list and short-circuit some of the arg-sanitizing code.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764
+ (* Security fix *)
++--------------------------+
+Thu Jan 25 02:24:04 UTC 2018
+patches/packages/curl-7.58.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues:
+ HTTP authentication leak in redirects
+ HTTP/2 trailer out-of-bounds read
+ For more information, see:
+ https://curl.haxx.se/docs/adv_2018-b3bf.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
+ https://curl.haxx.se/docs/adv_2018-824a.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005
+ (* Security fix *)
++--------------------------+
+Wed Jan 24 04:21:44 UTC 2018
+patches/packages/glibc-zoneinfo-2018c-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Mon Jan 22 22:47:47 UTC 2018
+patches/packages/wget-1.19.4-x86_64-1_slack14.0.txz: Upgraded.
+ More bug fixes:
+ A major bug that caused GZip'ed pages to never be decompressed has been fixed
+ Support for Content-Encoding and Transfer-Encoding have been marked as
+ experimental and disabled by default
++--------------------------+
+Sat Jan 20 16:00:51 UTC 2018
+patches/packages/wget-1.19.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes various non-security bugs, including this one:
+ Prevent erroneous decompression of .gz and .tgz files with broken servers.
++--------------------------+
+Wed Jan 17 21:36:23 UTC 2018
+patches/packages/bind-9.9.11_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a high severity security issue:
+ Improper sequencing during cleanup can lead to a use-after-free error,
+ triggering an assertion failure and crash in named.
+ For more information, see:
+ https://kb.isc.org/article/AA-01542
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145
+ (* Security fix *)
++--------------------------+
+Mon Jan 15 23:13:01 UTC 2018
+patches/packages/linux-3.2.98/*: Upgraded.
+ This kernel includes mitigations for the Spectre (variant 2) and Meltdown
+ speculative side channel attacks.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
+ (* Security fix *)
++--------------------------+
+Tue Jan 9 00:54:19 UTC 2018
+patches/packages/irssi-1.0.6-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes multiple security vulnerabilities.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2018_01.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5205
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5206
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5207
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5208
+ (* Security fix *)
++--------------------------+
+Mon Dec 25 00:00:16 UTC 2017
+patches/packages/xscreensaver-5.38-x86_64-1_slack14.0.txz: Upgraded.
+ Here's an upgrade to the latest xscreensaver.
++--------------------------+
+Wed Nov 29 21:48:33 UTC 2017
+patches/packages/curl-7.57.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues:
+ SSL out of buffer access
+ FTP wildcard out of bounds read
+ NTLM buffer overflow via integer overflow
+ For more information, see:
+ https://curl.haxx.se/docs/adv_2017-af0a.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818
+ https://curl.haxx.se/docs/adv_2017-ae72.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
+ https://curl.haxx.se/docs/adv_2017-12e7.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
+ (* Security fix *)
++--------------------------+
+Wed Nov 29 08:15:09 UTC 2017
+patches/packages/libXcursor-1.1.15-x86_64-1_slack14.0.txz: Upgraded.
+ Fix heap overflows when parsing malicious files. (CVE-2017-16612)
+ It is possible to trigger heap overflows due to an integer overflow
+ while parsing images and a signedness issue while parsing comments.
+ The integer overflow occurs because the chosen limit 0x10000 for
+ dimensions is too large for 32 bit systems, because each pixel takes
+ 4 bytes. Properly chosen values allow an overflow which in turn will
+ lead to less allocated memory than needed for subsequent reads.
+ The signedness bug is triggered by reading the length of a comment
+ as unsigned int, but casting it to int when calling the function
+ XcursorCommentCreate. Turning length into a negative value allows the
+ check against XCURSOR_COMMENT_MAX_LEN to pass, and the following
+ addition of sizeof (XcursorComment) + 1 makes it possible to allocate
+ less memory than needed for subsequent reads.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
+ (* Security fix *)
+patches/packages/libXfont-1.4.7-x86_64-2_slack14.0.txz: Rebuilt.
+ Open files with O_NOFOLLOW. (CVE-2017-16611)
+ A non-privileged X client can instruct X server running under root
+ to open any file by creating own directory with "fonts.dir",
+ "fonts.alias" or any font file being a symbolic link to any other
+ file in the system. X server will then open it. This can be issue
+ with special files such as /dev/watchdog (which could then reboot
+ the system).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
+ (* Security fix *)
++--------------------------+
+Tue Nov 28 06:20:03 UTC 2017
+patches/packages/samba-4.4.16-x86_64-2_slack14.0.txz: Rebuilt.
+ This is a security update in order to patch the following defects:
+ CVE-2017-14746 (Use-after-free vulnerability.)
+ All versions of Samba from 4.0.0 onwards are vulnerable to a use after
+ free vulnerability, where a malicious SMB1 request can be used to
+ control the contents of heap memory via a deallocated heap pointer. It
+ is possible this may be used to compromise the SMB server.
+ CVE-2017-15275 (Server heap memory information leak.)
+ All versions of Samba from 3.6.0 onwards are vulnerable to a heap
+ memory information leak, where server allocated heap memory may be
+ returned to the client without being cleared.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2017-14746.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
+ https://www.samba.org/samba/security/CVE-2017-15275.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
+ (* Security fix *)
++--------------------------+
+Fri Oct 27 20:34:35 UTC 2017
+patches/packages/php-5.6.32-x86_64-1_slack14.0.txz: Upgraded.
+ Several security bugs were fixed in this release:
+ Out of bounds read in timelib_meridian().
+ The arcfour encryption stream filter crashes PHP.
+ Applied upstream patch for PCRE (CVE-2016-1283).
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283
+ (* Security fix *)
+patches/packages/wget-1.19.2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes stack and heap overflows in in HTTP protocol handling.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090
+ (* Security fix *)
++--------------------------+
+Wed Oct 25 19:09:26 UTC 2017
+patches/packages/glibc-zoneinfo-2017c-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/httpd-2.4.29-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/irssi-1.0.5-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some remote denial of service issues.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2017_10.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15228
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15227
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15721
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15723
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15722
+ (* Security fix *)
+patches/packages/xfce4-weather-plugin-0.8.10-x86_64-1_slack14.0.txz: Upgraded.
+ This has a bugfix related to setting the location:
+ https://bugzilla.xfce.org/show_bug.cgi?id=13877
++--------------------------+
+Tue Oct 24 05:31:18 UTC 2017
+patches/packages/curl-7.56.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue:
+ IMAP FETCH response out of bounds read may cause a crash or information leak.
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20171023.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
+ (* Security fix *)
++--------------------------+
+Wed Oct 18 18:21:18 UTC 2017
+patches/packages/wpa_supplicant-2.6-x86_64-1_slack14.0.txz: Upgraded.
+ This update includes patches to mitigate the WPA2 protocol issues known
+ as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data,
+ hijack TCP connections, and to forge and inject packets. This is the
+ list of vulnerabilities that are addressed here:
+ CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the
+ 4-way handshake.
+ CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake.
+ CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way
+ handshake.
+ CVE-2017-13080: Reinstallation of the group key (GTK) in the group key
+ handshake.
+ CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group
+ key handshake.
+ CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)
+ Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)
+ while processing it.
+ CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
+ CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
+ PeerKey (TPK) key in the TDLS handshake.
+ CVE-2017-13087: reinstallation of the group key (GTK) when processing a
+ Wireless Network Management (WNM) Sleep Mode Response frame.
+ CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
+ processing a Wireless Network Management (WNM) Sleep Mode Response frame.
+ For more information, see:
+ https://www.krackattacks.com/
+ https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
+ (* Security fix *)
+patches/packages/xorg-server-1.12.4-x86_64-5_slack14.0.txz: Rebuilt.
+ This update fixes integer overflows and other possible security issues.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
+ (* Security fix *)
+patches/packages/xorg-server-xephyr-1.12.4-x86_64-5_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xnest-1.12.4-x86_64-5_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xvfb-1.12.4-x86_64-5_slack14.0.txz: Rebuilt.
++--------------------------+
+Fri Oct 6 06:32:32 UTC 2017
+patches/packages/curl-7.56.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue:
+ libcurl may read outside of a heap allocated buffer when doing FTP.
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20171004.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
+ (* Security fix *)
+patches/packages/xorg-server-1.12.4-x86_64-4_slack14.0.txz: Rebuilt.
+ This update fixes a security issue:
+ Generating strings for XKB data used a single shared static buffer,
+ which offered several opportunities for errors. Use a ring of
+ resizable buffers instead, to avoid problems when strings end up
+ longer than anticipated.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723
+ (* Security fix *)
+patches/packages/xorg-server-xephyr-1.12.4-x86_64-4_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xnest-1.12.4-x86_64-4_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xvfb-1.12.4-x86_64-4_slack14.0.txz: Rebuilt.
++--------------------------+
+Mon Oct 2 17:16:06 UTC 2017
+patches/packages/dnsmasq-2.78-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and remotely exploitable security issues that may
+ have impacts including denial of service, information leak, and execution
+ of arbitrary code. Thanks to Felix Wilhelm, Fermin J. Serna, Gabriel Campana,
+ Kevin Hamacher, Ron Bowes, and Gynvael Coldwind of the Google Security Team.
+ For more information, see:
+ https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496
+ (* Security fix *)
++--------------------------+
+Thu Sep 28 05:31:20 UTC 2017
+patches/packages/gegl-0.2.0-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched integer overflows in operations/external/ppm-load.c that could allow
+ a denial of service (application crash) or possibly the execution of
+ arbitrary code via a large width or height value in a ppm image.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4433
+ (* Security fix *)
++--------------------------+
+Sat Sep 23 01:02:32 UTC 2017
+patches/packages/libxml2-2.9.5-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes some security issues:
+ Detect infinite recursion in parameter entities (Nick Wellnhofer),
+ Fix handling of parameter-entity references (Nick Wellnhofer),
+ Disallow namespace nodes in XPointer ranges (Nick Wellnhofer),
+ Fix XPointer paths beginning with range-to (Nick Wellnhofer).
+ (* Security fix *)
+patches/packages/python-2.7.14-x86_64-1_slack14.0.txz: Upgraded.
+ Updated to the latest 2.7.x release.
+ This fixes some security issues related to the bundled expat library.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
+ (* Security fix *)
++--------------------------+
+Thu Sep 21 01:23:24 UTC 2017
+patches/packages/samba-4.4.16-x86_64-1_slack14.0.txz: Upgraded.
+ This is a security release in order to address the following defects:
+ SMB1/2/3 connections may not require signing where they should. A man in the
+ middle attack may hijack client connections.
+ SMB3 connections don't keep encryption across DFS redirects. A man in the
+ middle attack can read and may alter confidential documents transferred via
+ a client connection, which are reached via DFS redirect when the original
+ connection used SMB3.
+ Server memory information leak over SMB1. Client with write access to a share
+ can cause server memory contents to be written into a file or printer.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2017-12150.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
+ https://www.samba.org/samba/security/CVE-2017-12151.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
+ https://www.samba.org/samba/security/CVE-2017-12163.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
+ (* Security fix *)
++--------------------------+
+Mon Sep 18 19:15:03 UTC 2017
+patches/packages/httpd-2.4.27-x86_64-2_slack14.0.txz: Rebuilt.
+ This update patches a security issue ("Optionsbleed") with the OPTIONS http
+ method which may leak arbitrary pieces of memory to a potential attacker.
+ Thanks to Hanno Bo:ck.
+ For more information, see:
+ http://seclists.org/oss-sec/2017/q3/477
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
+ (* Security fix *)
++--------------------------+
+Fri Sep 15 17:31:57 UTC 2017
+patches/packages/bluez-4.99-x86_64-3_slack14.0.txz: Rebuilt.
+ Fixed an information disclosure vulnerability which allows remote attackers
+ to obtain sensitive information from the bluetoothd process memory. This
+ vulnerability lies in the processing of SDP search attribute requests.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250
+ (* Security fix *)
++--------------------------+
+Tue Sep 12 22:18:51 UTC 2017
+patches/packages/emacs-25.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security vulnerability in Emacs. Gnus no longer
+ supports "richtext" and "enriched" inline MIME objects. This support
+ was disabled to avoid evaluation of arbitrary Lisp code contained in
+ email messages and news articles.
+ For more information, see:
+ http://seclists.org/oss-sec/2017/q3/422
+ https://bugs.gnu.org/28350
+ (* Security fix *)
++--------------------------+
+Fri Sep 8 17:56:01 UTC 2017
+patches/packages/bash-4.2.053-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes two security issues found in bash before 4.4:
+ The expansion of '\h' in the prompt string allows remote authenticated users
+ to execute arbitrary code via shell metacharacters placed in 'hostname' of a
+ machine. The theoretical attack vector is a hostile DHCP server providing a
+ crafted hostname, but this is unlikely to occur in a normal Slackware
+ configuration as we ignore the hostname provided by DHCP.
+ Specially crafted SHELLOPTS+PS4 environment variables used against bogus
+ setuid binaries using system()/popen() allowed local attackers to execute
+ arbitrary code as root.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543
+ (* Security fix *)
+patches/packages/tcpdump-4.9.2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and many security issues (see the included
+ CHANGES file).
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725
+ (* Security fix *)
++--------------------------+
+Tue Aug 15 22:16:12 UTC 2017
+patches/packages/xorg-server-1.12.4-x86_64-3_slack14.0.txz: Rebuilt.
+ This update fixes two security issues:
+ A user authenticated to an X Session could crash or execute code in the
+ context of the X Server by exploiting a stack overflow in the endianness
+ conversion of X Events.
+ Uninitialized data in endianness conversion in the XEvent handling of the
+ X.Org X Server allowed authenticated malicious users to access potentially
+ privileged data from the X server.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
+ (* Security fix *)
+patches/packages/xorg-server-xephyr-1.12.4-x86_64-3_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xnest-1.12.4-x86_64-3_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xvfb-1.12.4-x86_64-3_slack14.0.txz: Rebuilt.
++--------------------------+
+Fri Aug 11 23:02:43 UTC 2017
+patches/packages/git-2.14.1-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes security issues:
+ A "ssh://..." URL can result in a "ssh" command line with a hostname that
+ begins with a dash "-", which would cause the "ssh" command to instead
+ (mis)treat it as an option. This is now prevented by forbidding such a
+ hostname (which should not impact any real-world usage).
+ Similarly, when GIT_PROXY_COMMAND is configured, the command is run with
+ host and port that are parsed out from "ssh://..." URL; a poorly written
+ GIT_PROXY_COMMAND could be tricked into treating a string that begins with a
+ dash "-" as an option. This is now prevented by forbidding such a hostname
+ and port number (again, which should not impact any real-world usage).
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117
+ (* Security fix *)
+patches/packages/mercurial-4.3.1-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes security issues:
+ Mercurial's symlink auditing was incomplete prior to 4.3, and could
+ be abused to write to files outside the repository.
+ Mercurial was not sanitizing hostnames passed to ssh, allowing
+ shell injection attacks on clients by specifying a hostname starting
+ with -oProxyCommand.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000115
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000116
+ (* Security fix *)
+patches/packages/subversion-1.7.22-x86_64-3_slack14.0.txz: Rebuilt.
+ Fixed client side arbitrary code execution vulnerability.
+ For more information, see:
+ https://subversion.apache.org/security/CVE-2017-9800-advisory.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800
+ (* Security fix *)
++--------------------------+
+Wed Aug 9 20:23:16 UTC 2017
+patches/packages/curl-7.55.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes three security issues:
+ URL globbing out of bounds read
+ TFTP sends more than buffer size
+ FILE buffer read out of bounds
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20170809A.html
+ https://curl.haxx.se/docs/adv_20170809B.html
+ https://curl.haxx.se/docs/adv_20170809C.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000099
+ (* Security fix *)
++--------------------------+
+Wed Aug 2 03:43:51 UTC 2017
+patches/packages/gnupg-1.4.22-x86_64-1_slack14.0.txz: Upgraded.
+ Mitigate a flush+reload side-channel attack on RSA secret keys dubbed
+ "Sliding right into disaster".
+ For more information, see:
+ https://eprint.iacr.org/2017/627
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
+ (* Security fix *)
++--------------------------+
+Tue Jul 25 21:09:42 UTC 2017
+patches/packages/bind-9.9.10_P3-x86_64-1_slack14.0.txz: Upgraded.
+ Fix a regression in the previous BIND release that broke verification
+ of TSIG signed TCP message sequences where not all the messages contain
+ TSIG records.
++--------------------------+
+Mon Jul 24 19:59:34 UTC 2017
+patches/packages/tcpdump-4.9.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an issue where tcpdump 4.9.0 allows remote attackers
+ to cause a denial of service (heap-based buffer over-read and application
+ crash) via crafted packet data.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108
+ (* Security fix *)
++--------------------------+
+Tue Jul 18 23:10:25 UTC 2017
+patches/packages/expat-2.2.2-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes security issues including:
+ External entity infinite loop DoS
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
+ https://libexpat.github.io/doc/cve-2017-9233/
+ (* Security fix *)
++--------------------------+
+Fri Jul 14 22:11:58 UTC 2017
+patches/packages/samba-4.4.15-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an authentication validation bypass security issue:
+ "Orpheus' Lyre mutual authentication validation bypass"
+ All versions of Samba from 4.0.0 onwards using embedded Heimdal
+ Kerberos are vulnerable to a man-in-the-middle attack impersonating
+ a trusted server, who may gain elevated access to the domain by
+ returning malicious replication or authorization data.
+ Samba binaries built against MIT Kerberos are not vulnerable.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2017-11103.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
+ (* Security fix *)
++--------------------------+
+Thu Jul 13 18:19:01 UTC 2017
+patches/packages/httpd-2.4.27-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ Read after free in mod_http2 (CVE-2017-9789)
+ Uninitialized memory reflection in mod_auth_digest (CVE-2017-9788)
+ Thanks to Robert Swiecki for reporting these issues.
+ For more information, see:
+ https://httpd.apache.org/security/vulnerabilities_24.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9789
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
+ (* Security fix *)
++--------------------------+
+Sun Jul 9 20:38:08 UTC 2017
+patches/packages/irssi-1.0.4-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes two remote crash issues as well as a few bugs.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2017_07.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10965
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10966
+ (* Security fix *)
++--------------------------+
+Sat Jul 8 00:11:34 UTC 2017
+patches/packages/ca-certificates-20161130-noarch-1_slack14.0.txz: Upgraded.
+ This update provides the latest CA certificates to check for the
+ authenticity of SSL connections.
+patches/packages/php-5.6.31-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://php.net/ChangeLog-5.php#5.6.31
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9224
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9226
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229
+ (* Security fix *)
++--------------------------+
+Thu Jul 6 00:57:41 UTC 2017
+patches/packages/xscreensaver-5.37-x86_64-1_slack14.0.txz: Upgraded.
+ Here's an upgrade to the latest xscreensaver.
++--------------------------+
+Mon Jul 3 23:09:19 UTC 2017
+patches/packages/linux-3.2.90/*: Upgraded.
+ This kernel fixes security issues (including "Stack Clash"). The issues
+ may result in denial-of-service conditions or may allow attackers to
+ execute arbitrary code with elevated privileges.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ For more information, see:
+ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
+ (* Security fix *)
++--------------------------+
+Thu Jun 29 20:55:09 UTC 2017
+patches/packages/bind-9.9.10_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a high severity security issue:
+ An error in TSIG handling could permit unauthorized zone transfers
+ or zone updates.
+ For more information, see:
+ https://kb.isc.org/article/AA-01503/0
+ https://kb.isc.org/article/AA-01504/0
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143
+ (* Security fix *)
+patches/packages/httpd-2.4.26-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues which may lead to an authentication bypass
+ or a denial of service:
+ important: ap_get_basic_auth_pw() Authentication Bypass CVE-2017-3167
+ important: mod_ssl Null Pointer Dereference CVE-2017-3169
+ important: mod_http2 Null Pointer Dereference CVE-2017-7659
+ important: ap_find_token() Buffer Overread CVE-2017-7668
+ important: mod_mime Buffer Overread CVE-2017-7679
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
+ (* Security fix *)
+patches/packages/mkinitrd-1.4.10-x86_64-1_slack14.0.txz: Upgraded.
+ Added support for -P option and MICROCODE_ARCH in mkinitrd.conf to specify
+ a microcode archive to be prepended to the initrd for early CPU microcode
+ patching by the kernel. Thanks to SeB.
++--------------------------+
+Wed Jun 21 18:38:46 UTC 2017
+patches/packages/openvpn-2.3.17-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several denial of service issues discovered
+ by Guido Vranken.
+ For more information, see:
+ https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7512
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522
+ (* Security fix *)
++--------------------------+
+Wed Jun 14 22:04:45 UTC 2017
+patches/packages/bind-9.9.10_P1-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed denial of service security issue:
+ Some RPZ configurations could go into an infinite query loop when
+ encountering responses with TTL=0.
+ For more information, see:
+ https://kb.isc.org/article/AA-01495
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
+ (* Security fix *)
++--------------------------+
+Wed Jun 7 22:42:04 UTC 2017
+patches/packages/irssi-1.0.3-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed security issues that may result in a denial of service.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2017_06.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9468
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9469
+ (* Security fix *)
++--------------------------+
+Wed May 31 23:07:23 UTC 2017
+patches/packages/sudo-1.8.20p2-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release:
+ Fixed a bug parsing /proc/pid/stat when the process name contains
+ a newline. This is not exploitable due to the /dev traversal changes
+ made in sudo 1.8.20p1.
++--------------------------+
+Tue May 30 17:39:17 UTC 2017
+patches/packages/lynx-2.8.8rel.2-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed lynx startup without a URL by correcting STARTFILE in lynx.cfg to use
+ the new URL for the Lynx homepage. Thanks to John David Yost.
+patches/packages/sudo-1.8.20p1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a potential overwrite of arbitrary system files.
+ This bug was discovered and analyzed by Qualys, Inc.
+ For more information, see:
+ https://www.sudo.ws/alerts/linux_tty.html
+ http://www.openwall.com/lists/oss-security/2017/05/30/16
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
+ (* Security fix *)
++--------------------------+
+Wed May 24 19:38:59 UTC 2017
+patches/packages/samba-4.4.14-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a remote code execution vulnerability, allowing a
+ malicious client to upload a shared library to a writable share, and
+ then cause the server to load and execute it.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2017-7494.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494
+ (* Security fix *)
++--------------------------+
+Tue May 16 20:11:03 UTC 2017
+patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes an out-of-bounds write caused by a heap-based buffer
+ overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
+ (* Security fix *)
+patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a security issue with KAuth that can lead to gaining
+ root from an unprivileged account.
+ For more information, see:
+ http://www.openwall.com/lists/oss-security/2017/05/10/3
+ https://www.kde.org/info/security/advisory-20170510-1.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422
+ (* Security fix *)
++--------------------------+
+Mon May 1 23:31:02 UTC 2017
+patches/packages/rxvt-2.7.10-x86_64-5_slack14.0.txz: Rebuilt.
+ Patched an integer overflow that can crash rxvt with an escape sequence,
+ or possibly have unspecified other impact.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7483
+ (* Security fix *)
++--------------------------+
+Wed Apr 26 23:09:45 UTC 2017
+patches/packages/xfce4-weather-plugin-0.8.9-x86_64-1_slack14.0.txz: Upgraded.
+ Package upgraded to fix the API used to fetch weather data.
+ Thanks to Robby Workman.
++--------------------------+
+Fri Apr 21 22:40:12 UTC 2017
+patches/packages/ntp-4.2.8p10-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes security
+ issues of medium and low severity:
+ Denial of Service via Malformed Config (Medium)
+ Authenticated DoS via Malicious Config Option (Medium)
+ Potential Overflows in ctl_put() functions (Medium)
+ Buffer Overflow in ntpq when fetching reslist from a malicious ntpd (Medium)
+ 0rigin DoS (Medium)
+ Buffer Overflow in DPTS Clock (Low)
+ Improper use of snprintf() in mx4200_send() (Low)
+ The following issues do not apply to Linux systems:
+ Privileged execution of User Library code (WINDOWS PPSAPI ONLY) (Low)
+ Stack Buffer Overflow from Command Line (WINDOWS installer ONLY) (Low)
+ Data Structure terminated insufficiently (WINDOWS installer ONLY) (Low)
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6455
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6452
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6459
+ (* Security fix *)
+patches/packages/proftpd-1.3.5e-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a security issue:
+ AllowChrootSymlinks off does not check entire DefaultRoot path for symlinks.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7418
+ (* Security fix *)
++--------------------------+
+Wed Apr 19 04:46:45 UTC 2017
+patches/packages/minicom-2.7.1-x86_64-1_slack14.0.txz: Upgraded.
+ Fix an out of bounds data access that can lead to remote code execution.
+ This issue was found by Solar Designer of Openwall during a security audit
+ of the Virtuozzo 7 product, which contains derived downstream code in its
+ prl-vzvncserver component.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467
+ (* Security fix *)
++--------------------------+
+Thu Apr 13 21:19:45 UTC 2017
+patches/packages/bind-9.9.9_P8-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed denial of service security issues.
+ For more information, see:
+ https://kb.isc.org/article/AA-01465
+ https://kb.isc.org/article/AA-01466
+ https://kb.isc.org/article/AA-01471
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
+ (* Security fix *)
++--------------------------+
+Mon Apr 10 18:08:13 UTC 2017
+patches/packages/vim-7.4.399-x86_64-1_slack14.0.txz: Upgraded.
+ In Vim 7.3+ but prior to 7.4.399, blowfish encryption is weak.
+ Upgrade to Vim 7.4.399 to address this issue.
+ For more information, see:
+ https://dgl.cx/2014/10/vim-blowfish
+ (* Security fix *)
+patches/packages/vim-gvim-7.4.399-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sat Apr 1 05:16:59 UTC 2017
+patches/packages/samba-4.4.13-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bug fix release to address a regression introduced by the security
+ fixes for CVE-2017-2619 (Symlink race allows access outside share definition).
+ Please see https://bugzilla.samba.org/show_bug.cgi?id=12721 for details.
++--------------------------+
+Thu Mar 23 21:38:23 UTC 2017
+patches/packages/glibc-zoneinfo-2017b-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/mcabber-1.0.5-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue:
+ An incorrect implementation of XEP-0280: Message Carbons in multiple XMPP
+ clients allows a remote attacker to impersonate any user, including
+ contacts, in the vulnerable application's display. This allows for various
+ kinds of social engineering attacks.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5604
+ (* Security fix *)
+patches/packages/samba-4.4.12-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue:
+ All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
+ a malicious client using a symlink race to allow access to areas of
+ the server file system not exported under the share definition.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619
+ (* Security fix *)
++--------------------------+
+Thu Mar 16 01:37:05 UTC 2017
+patches/packages/pidgin-2.12.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a minor security issue (out of bounds memory read in
+ purple_markup_unescape_entity).
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640
+ (* Security fix *)
++--------------------------+
+Tue Feb 28 23:51:55 UTC 2017
+patches/packages/glibc-zoneinfo-2017a-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Fri Feb 10 21:07:35 UTC 2017
+patches/packages/bind-9.9.9_P6-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a denial-of-service vulnerability. Under some conditions
+ when using both DNS64 and RPZ to rewrite query responses, query processing
+ can resume in an inconsistent state leading to either an INSIST assertion
+ failure or an attempt to read through a NULL pointer.
+ For more information, see:
+ https://kb.isc.org/article/AA-01453
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
+ (* Security fix *)
+patches/packages/libpcap-1.8.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update is required for the new version of tcpdump.
+patches/packages/php-5.6.30-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://php.net/ChangeLog-5.php#5.6.30
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
+ (* Security fix *)
+patches/packages/tcpdump-4.9.0-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed bugs which allow an attacker to crash tcpdump (denial of service).
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486
+ (* Security fix *)
++--------------------------+
+Thu Jan 12 01:15:52 UTC 2017
+patches/packages/bind-9.9.9_P5-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a denial-of-service vulnerability. An error in handling
+ certain queries can cause an assertion failure when a server is using the
+ nxdomain-redirect feature to cover a zone for which it is also providing
+ authoritative service. A vulnerable server could be intentionally stopped
+ by an attacker if it was using a configuration that met the criteria for
+ the vulnerability and if the attacker could cause it to accept a query
+ that possessed the required attributes.
+ Please note: This vulnerability affects the "nxdomain-redirect" feature,
+ which is one of two methods of handling NXDOMAIN redirection, and is only
+ available in certain versions of BIND. Redirection using zones of type
+ "redirect" is not affected by this vulnerability.
+ For more information, see:
+ https://kb.isc.org/article/AA-01442
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9778
+ (* Security fix *)
+patches/packages/gnutls-3.3.26-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ https://gnutls.org/security.html#GNUTLS-SA-2017-1
+ https://gnutls.org/security.html#GNUTLS-SA-2017-2
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
+ (* Security fix *)
+patches/packages/irssi-0.8.21-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed security issues that may result in a denial of service.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2017_01.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196
+ (* Security fix *)
+patches/packages/python-2.7.13-x86_64-2_slack14.0.txz: Rebuilt.
+ This is a rebuilt package to fix a build-time regression with the
+ multiprocessing.synchronize module.
+ Thanks to Damien Goutte-Gattat for the bug report.
++--------------------------+
+Fri Dec 30 19:29:13 UTC 2016
+patches/packages/libpng-1.4.20-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes an old NULL pointer dereference bug in png_set_text_2()
+ discovered and patched by Patrick Keshishian. The potential "NULL
+ dereference" bug has existed in libpng since version 0.71 of June 26, 1995.
+ To be vulnerable, an application has to load a text chunk into the png
+ structure, then delete all text, then add another text chunk to the same
+ png structure, which seems to be an unlikely sequence, but it has happened.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
+ (* Security fix *)
++--------------------------+
+Wed Dec 28 21:05:19 UTC 2016
+patches/packages/python-2.7.13-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes security issues:
+ Issue #27850: Remove 3DES from ssl module's default cipher list to counter
+ measure sweet32 attack (CVE-2016-2183).
+ Issue #27568: Prevent HTTPoxy attack (CVE-2016-1000110). Ignore the
+ HTTP_PROXY variable when REQUEST_METHOD environment is set, which indicates
+ that the script is in CGI mode.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110
+ (* Security fix *)
++--------------------------+
+Sat Dec 24 18:14:51 UTC 2016
+patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues:
+ Multiple integer overflows in XML_GetBuffer.
+ Fix crash on malformed input.
+ Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716.
+ Use more entropy for hash initialization.
+ Resolve troublesome internal call to srand.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
+ (* Security fix *)
++--------------------------+
+Sat Dec 24 02:36:05 UTC 2016
+patches/packages/httpd-2.4.25-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ * CVE-2016-8740: mod_http2: Mitigate DoS memory exhaustion via endless
+ CONTINUATION frames.
+ * CVE-2016-5387: core: Mitigate [f]cgi "httpoxy" issues.
+ * CVE-2016-2161: mod_auth_digest: Prevent segfaults during client entry
+ allocation when the shared memory space is exhausted.
+ * CVE-2016-0736: mod_session_crypto: Authenticate the session data/cookie
+ with a MAC (SipHash) to prevent deciphering or tampering with a padding
+ oracle attack.
+ * CVE-2016-8743: Enforce HTTP request grammar corresponding to RFC7230 for
+ request lines and request headers, to prevent response splitting and
+ cache pollution by malicious clients or downstream proxies.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
+ (* Security fix *)
+patches/packages/openssh-7.4p1-x86_64-1_slack14.0.txz: Upgraded.
+ This is primarily a bugfix release, and also addresses security issues.
+ ssh-agent(1): Will now refuse to load PKCS#11 modules from paths outside
+ a trusted whitelist.
+ sshd(8): When privilege separation is disabled, forwarded Unix-domain
+ sockets would be created by sshd(8) with the privileges of 'root'.
+ sshd(8): Avoid theoretical leak of host private key material to
+ privilege-separated child processes via realloc().
+ sshd(8): The shared memory manager used by pre-authentication compression
+ support had a bounds checks that could be elided by some optimising
+ compilers to potentially allow attacks against the privileged monitor.
+ process from the sandboxed privilege-separation process.
+ sshd(8): Validate address ranges for AllowUser and DenyUsers directives at
+ configuration load time and refuse to accept invalid ones. It was
+ previously possible to specify invalid CIDR address ranges
+ (e.g. user@127.1.2.3/55) and these would always match, possibly resulting
+ in granting access where it was not intended.
+ For more information, see:
+ https://www.openssh.com/txt/release-7.4
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012
+ (* Security fix *)
+patches/packages/xfce4-weather-plugin-0.8.8-x86_64-1_slack14.0.txz: Upgraded.
+ Package upgraded to fix the API used to fetch weather data.
+ Thanks to Robby Workman.
++--------------------------+
+Sun Dec 18 05:20:25 UTC 2016
+patches/packages/glibc-zoneinfo-2016j-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Mon Dec 12 21:25:50 UTC 2016
+patches/packages/loudmouth-1.5.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update is needed for the mcabber security update.
+patches/packages/mcabber-1.0.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue which can lead to a malicious actor
+ MITMing a conversation, or adding themselves as an entity on a third
+ parties roster (thereby granting themselves the associated priviledges
+ such as observing when the user is online).
+ For more information, see:
+ https://gultsch.de/gajim_roster_push_and_message_interception.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9928
+ (* Security fix *)
+patches/packages/php-5.6.29-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://php.net/ChangeLog-5.php#5.6.29
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935
+ (* Security fix *)
++--------------------------+
+Mon Nov 21 19:21:22 UTC 2016
+patches/packages/ntp-4.2.8p9-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes the
+ following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
+ 5 low-severity vulnerabilities, and provides 28 other non-security
+ fixes and improvements.
+ CVE-2016-9311: Trap crash
+ CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
+ CVE-2016-7427: Broadcast Mode Replay Prevention DoS
+ CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
+ CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
+ CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
+ CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
+ CVE-2016-7429: Interface selection attack
+ CVE-2016-7426: Client rate limiting and server responses
+ CVE-2016-7433: Reboot sync calculation problem
+ For more information, see:
+ https://www.kb.cert.org/vuls/id/633847
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433
+ (* Security fix *)
++--------------------------+
+Fri Nov 18 22:49:40 UTC 2016
+patches/packages/libxcb-1.11.1-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a regression where previously compiled binaries could be
+ broken due to a changed shared library soname. This package adds
+ compatibility symlinks to the old names where needed.
++--------------------------+
+Fri Nov 4 03:31:38 UTC 2016
+patches/packages/bind-9.9.9_P4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a denial-of-service vulnerability. A defect in BIND's
+ handling of responses containing a DNAME answer can cause a resolver to exit
+ after encountering an assertion failure in db.c or resolver.c. A server
+ encountering either of these error conditions will stop, resulting in denial
+ of service to clients. The risk to authoritative servers is minimal;
+ recursive servers are chiefly at risk.
+ For more information, see:
+ https://kb.isc.org/article/AA-01434
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
+ (* Security fix *)
+patches/packages/curl-7.51.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes security issues:
+ CVE-2016-8615: cookie injection for other servers
+ CVE-2016-8616: case insensitive password comparison
+ CVE-2016-8617: OOB write via unchecked multiplication
+ CVE-2016-8618: double-free in curl_maprintf
+ CVE-2016-8619: double-free in krb5 code
+ CVE-2016-8620: glob parser write/read out of bounds
+ CVE-2016-8621: curl_getdate read out of bounds
+ CVE-2016-8622: URL unescape heap overflow via integer truncation
+ CVE-2016-8623: Use-after-free via shared cookies
+ CVE-2016-8624: invalid URL parsing with '#'
+ CVE-2016-8625: IDNA 2003 makes curl use wrong host
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20161102A.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
+ https://curl.haxx.se/docs/adv_20161102B.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
+ https://curl.haxx.se/docs/adv_20161102C.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
+ https://curl.haxx.se/docs/adv_20161102D.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
+ https://curl.haxx.se/docs/adv_20161102E.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
+ https://curl.haxx.se/docs/adv_20161102F.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
+ https://curl.haxx.se/docs/adv_20161102G.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
+ https://curl.haxx.se/docs/adv_20161102H.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
+ https://curl.haxx.se/docs/adv_20161102I.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
+ https://curl.haxx.se/docs/adv_20161102J.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
+ https://curl.haxx.se/docs/adv_20161102K.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
+ (* Security fix *)
+patches/packages/glibc-zoneinfo-2016i-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Mon Oct 31 23:38:24 UTC 2016
+patches/packages/inputproto-2.3.2-noarch-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/libX11-1.6.4-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory read in XGetImage() or write in XListFonts().
+ Affected versions libX11 <= 1.6.3.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
+ (* Security fix *)
+patches/packages/libXext-1.3.3-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/libXfixes-5.0.3-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause an integer
+ overflow on 32 bit architectures.
+ Affected versions : libXfixes <= 5.0.2.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944
+ (* Security fix *)
+patches/packages/libXi-1.7.8-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory access or endless loops (Denial of Service).
+ Affected versions libXi <= 1.7.6.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
+ (* Security fix *)
+patches/packages/libXrandr-1.5.1-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory writes.
+ Affected versions: libXrandr <= 1.5.0.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948
+ (* Security fix *)
+patches/packages/libXrender-0.9.10-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory writes.
+ Affected version: libXrender <= 0.9.9.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
+ (* Security fix *)
+patches/packages/libXtst-1.2.3-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory access or endless loops (Denial of Service).
+ Affected version libXtst <= 1.2.2.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
+ (* Security fix *)
+patches/packages/libXv-1.0.11-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause out of boundary
+ memory and memory corruption.
+ Affected version libXv <= 1.0.10.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407
+ (* Security fix *)
+patches/packages/libXvMC-1.0.10-x86_64-1_slack14.0.txz: Upgraded.
+ Insufficient validation of data from the X server can cause a one byte buffer
+ read underrun.
+ Affected version: libXvMC <= 1.0.9.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953
+ (* Security fix *)
+patches/packages/libxcb-1.11.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/linux-3.2.83/*: Upgraded.
+ This kernel fixes a security issue known as "Dirty COW". A race
+ condition was found in the way the Linux kernel's memory subsystem
+ handled the copy-on-write (COW) breakage of private read-only
+ memory mappings. An unprivileged local user could use this flaw to
+ gain write access to otherwise read-only memory mappings and thus
+ increase their privileges on the system.
+ Be sure to upgrade your initrd and reinstall LILO after upgrading
+ the kernel packages.
+ For more information, see:
+ https://dirtycow.ninja/
+ https://www.kb.cert.org/vuls/id/243144
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
+ (* Security fix *)
+patches/packages/php-5.6.27-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://php.net/ChangeLog-5.php#5.6.27
+ (* Security fix *)
+patches/packages/randrproto-1.5.0-noarch-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/xcb-proto-1.11-x86_64-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/xextproto-7.3.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/xproto-7.0.29-noarch-1_slack14.0.txz: Upgraded.
+ This update is a prerequisite for other security updates.
+patches/packages/xscreensaver-5.36-x86_64-1_slack14.0.txz: Upgraded.
+ Here's an upgrade to the latest xscreensaver.
++--------------------------+
+Wed Sep 28 23:24:37 UTC 2016
+patches/packages/glibc-zoneinfo-2016g-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Tue Sep 27 19:16:56 UTC 2016
+patches/packages/bind-9.9.9_P3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a denial-of-service vulnerability. Testing by ISC has
+ uncovered a critical error condition which can occur when a nameserver is
+ constructing a response. A defect in the rendering of messages into
+ packets can cause named to exit with an assertion failure in buffer.c while
+ constructing a response to a query that meets certain criteria.
+ For more information, see:
+ https://kb.isc.org/article/AA-01419/0
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776
+ (* Security fix *)
++--------------------------+
+Fri Sep 23 23:30:53 UTC 2016
+patches/packages/php-5.6.26-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://php.net/ChangeLog-5.php#5.6.26
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418
+ (* Security fix *)
++--------------------------+
+Thu Sep 22 18:38:07 UTC 2016
+patches/packages/openssl-1.0.1u-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes denial-of-service and other security issues.
+ For more information, see:
+ https://www.openssl.org/news/secadv/20160922.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6305
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6307
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6308
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1u-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/pidgin-2.11.0-x86_64-1_slack14.0.txz: Upgraded.
+ NOTE: These packages provide updates to pidgin-2.11.0, since the previous
+ version was mistakenly reissued for Slackware 13.0 - 14.1. Sorry!
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://www.pidgin.im/news/security/
+ (* Security fix *)
++--------------------------+
+Wed Sep 21 21:10:52 UTC 2016
+patches/packages/irssi-0.8.20-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two remote crash and heap corruption vulnerabilites
+ in Irssi's format parsing code. Impact: Remote crash and heap
+ corruption. Remote code execution seems difficult since only Nuls are
+ written. Bugs discovered by, and patches provided by Gabriel Campana
+ and Adrien Guinet from Quarkslab.
+ For more information, see:
+ https://irssi.org/security/irssi_sa_2016.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045
+ (* Security fix *)
++--------------------------+
+Wed Sep 21 15:54:06 UTC 2016
+patches/packages/pidgin-2.10.11-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ https://www.pidgin.im/news/security/
+ (* Security fix *)
++--------------------------+
+Thu Sep 15 22:54:52 UTC 2016
+patches/packages/curl-7.50.3-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed heap overflows in four libcurl functions: curl_escape(),
+ curl_easy_escape(), curl_unescape() and curl_easy_unescape().
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20160914.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
+ (* Security fix *)
++--------------------------+
+Tue Sep 13 19:10:48 UTC 2016
+patches/packages/mysql-5.5.52-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a critical vulnerability which can allow local and
+ remote attackers to inject malicious settings into MySQL configuration
+ files (my.cnf). A successful exploitation could allow attackers to
+ execute arbitrary code with root privileges which would then allow them
+ to fully compromise the server.
+ This issue was discovered and reported by Dawid Golunski.
+ For more information, see:
+ http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662
+ (* Security fix *)
++--------------------------+
+Sat Sep 10 18:04:42 UTC 2016
+patches/packages/gnutls-3.3.24-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
+ http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
+ (* Security fix *)
++--------------------------+
+Thu Sep 8 21:35:02 UTC 2016
+patches/packages/php-5.6.25-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.25
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7133
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134
+ (* Security fix *)
++--------------------------+
+Tue Aug 23 19:45:33 UTC 2016
+patches/packages/gnupg-1.4.21-x86_64-1_slack14.0.txz: Upgraded.
+ Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
+ obtains 580 bytes from the standard RNG can trivially predict the next
+ 20 bytes of output. (This is according to the NEWS file included in the
+ source. According to the annoucement linked below, an attacker who obtains
+ 4640 bits from the RNG can trivially predict the next 160 bits of output.)
+ Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
+ For more information, see:
+ https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
+ (* Security fix *)
+patches/packages/libgcrypt-1.5.6-x86_64-1_slack14.0.txz: Upgraded.
+ Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
+ obtains 580 bytes from the standard RNG can trivially predict the next
+ 20 bytes of output. (This is according to the NEWS file included in the
+ source. According to the annoucement linked below, an attacker who obtains
+ 4640 bits from the RNG can trivially predict the next 160 bits of output.)
+ Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
+ For more information, see:
+ https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
+ (* Security fix *)
+patches/packages/stunnel-5.35-x86_64-2_slack14.0.txz: Rebuilt.
+ Fixed incorrect config file name in generate-stunnel-key.sh.
+ Thanks to Ebben Aries.
++--------------------------+
+Thu Aug 11 18:55:48 UTC 2016
+patches/packages/glibc-zoneinfo-2016f-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Sat Aug 6 19:29:16 UTC 2016
+patches/packages/curl-7.50.1-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes security issues:
+ TLS: switch off SSL session id when client cert is used
+ TLS: only reuse connections with the same client cert
+ curl_multi_cleanup: clear connection pointer for easy handles
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20160803A.html
+ https://curl.haxx.se/docs/adv_20160803B.html
+ https://curl.haxx.se/docs/adv_20160803C.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
+ (* Security fix *)
+patches/packages/openssh-7.3p1-x86_64-1_slack14.0.txz: Upgraded.
+ This is primarily a bugfix release, and also addresses security issues.
+ sshd(8): Mitigate a potential denial-of-service attack against the system's
+ crypt(3) function via sshd(8).
+ sshd(8): Mitigate timing differences in password authentication that could
+ be used to discern valid from invalid account names when long passwords were
+ sent and particular password hashing algorithms are in use on the server.
+ ssh(1), sshd(8): Fix observable timing weakness in the CBC padding oracle
+ countermeasures.
+ ssh(1), sshd(8): Improve operation ordering of MAC verification for
+ Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the MAC
+ before decrypting any ciphertext.
+ sshd(8): (portable only) Ignore PAM environment vars when UseLogin=yes.
+ For more information, see:
+ http://www.openssh.com/txt/release-7.3
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325
+ (* Security fix *)
+patches/packages/stunnel-5.35-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes security issues:
+ Fixed malfunctioning "verify = 4".
+ Fixed incorrectly enforced client certificate requests.
+ (* Security fix *)
++--------------------------+
+Thu Jul 28 18:17:17 UTC 2016
+patches/packages/libidn-1.33-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed out-of-bounds read bugs. Fixed crashes on invalid UTF-8.
+ Thanks to Hanno Böck.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
+ (* Security fix *)
++--------------------------+
+Fri Jul 22 20:51:23 UTC 2016
+patches/packages/bind-9.9.9_P2-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed a security issue:
+ getrrsetbyname with a non absolute name could trigger an infinite
+ recursion bug in lwresd and named with lwres configured if when
+ combined with a search list entry the resulting name is too long.
+ (CVE-2016-2775) [RT #42694]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
+ (* Security fix *)
++--------------------------+
+Thu Jul 21 23:25:54 UTC 2016
+patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a security issue:
+ Use-after-free vulnerability in the xcf_load_image function in
+ app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of
+ service (program crash) or possibly execute arbitrary code via a crafted
+ XCF file.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994
+ (* Security fix *)
+patches/packages/php-5.6.24-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.24
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207
+ (* Security fix *)
++--------------------------+
+Thu Jul 7 19:52:36 UTC 2016
+patches/packages/samba-4.2.14-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a security issue:
+ Client side SMB2/3 required signing can be downgraded.
+ It's possible for an attacker to downgrade the required signing for an
+ SMB2/3 client connection, by injecting the SMB2_SESSION_FLAG_IS_GUEST or
+ SMB2_SESSION_FLAG_IS_NULL flags. This means that the attacker can
+ impersonate a server being connected to by Samba, and return malicious
+ results.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119
+ (* Security fix *)
++--------------------------+
+Fri Jun 24 23:37:19 UTC 2016
+patches/packages/php-5.6.23-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.23
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
+ (* Security fix *)
++--------------------------+
+Wed Jun 15 01:57:05 UTC 2016
+patches/packages/glibc-zoneinfo-2016e-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Mon Jun 13 07:07:39 UTC 2016
+patches/packages/wget-1.18-x86_64-1_slack14.0.txz: Upgraded.
+ This version fixes a security vulnerability present in all old versions
+ of wget. On a server redirect from HTTP to a FTP resource, wget would
+ trust the HTTP server and use the name in the redirected URL as the
+ destination filename. This behaviour was changed and now it works
+ similarly as a redirect from HTTP to another HTTP resource so the original
+ name is used as the destination file. To keep the previous behaviour the
+ user must provide --trust-server-names.
+ The vulnerability was discovered by Dawid Golunski and was reported by
+ Beyond Security's SecuriTeam.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
+ (* Security fix *)
++--------------------------+
+Fri Jun 3 23:36:07 UTC 2016
+patches/packages/libxml2-2.9.4-x86_64-2_slack14.0.txz: Rebuilt.
+ Fix attribute decoding during XML schema validation.
+ Thanks to Andreas Vögele.
+patches/packages/ntp-4.2.8p8-x86_64-1_slack14.0.txz: Upgraded.
+ This release patches one high and four low severity security issues:
+ CVE-2016-4957: Crypto-NAK crash
+ CVE-2016-4953: Bad authentication demobilizes ephemeral associations
+ CVE-2016-4954: Processing spoofed server packets
+ CVE-2016-4955: Autokey association reset
+ CVE-2016-4956: Broadcast interleave
+ For more information, see:
+ http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956
+ (* Security fix *)
++--------------------------+
+Thu Jun 2 19:08:13 UTC 2016
+patches/packages/xscreensaver-5.35-x86_64-2_slack14.0.txz: Rebuilt.
+ Fixed missing '\' in the build script which caused a few configure options
+ to be skipped. Thanks to Stuart Winter.
++--------------------------+
+Tue May 31 05:42:04 UTC 2016
+patches/packages/imagemagick-6.7.7_10-x86_64-3_slack14.0.txz: Rebuilt.
+ Removed popen() support to prevent another shell vulnerability. This
+ issue was discovered by Bob Friesenhahn, of the GraphicsMagick project.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
+ (* Security fix *)
+patches/packages/xscreensaver-5.35-x86_64-1_slack14.0.txz: Upgraded.
+ Here's an upgrade to the latest xscreensaver.
++--------------------------+
+Fri May 27 23:08:17 UTC 2016
+patches/packages/libxml2-2.9.4-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues:
+ Heap-based buffer underreads due to xmlParseName (CVE-2016-4447).
+ Format string vulnerability (CVE-2016-4448).
+ Inappropriate fetch of entities content (CVE-2016-4449).
+ For more information, see:
+ http://xmlsoft.org/news.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449
+ (* Security fix *)
+patches/packages/libxslt-1.1.29-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and a security issue:
+ Fix for type confusion in preprocessing attributes (Daniel Veillard).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
+ (* Security fix *)
+patches/packages/php-5.6.22-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.22
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096
+ (* Security fix *)
++--------------------------+
+Fri May 20 21:20:29 UTC 2016
+patches/packages/curl-7.49.0-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed a TLS certificate check bypass with mbedTLS/PolarSSL.
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20160518.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
+ (* Security fix *)
++--------------------------+
+Wed May 11 05:20:01 UTC 2016
+patches/packages/git-2.8.2-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix package update to change color "lime" to "00FF00" in
+ gitk. Otherwise it might not start if "lime" is not defined.
+ Thanks to AlvaroG.
+patches/packages/imagemagick-6.7.7_10-x86_64-2_slack14.0.txz: Rebuilt.
+ This update addresses several security issues in ImageMagick, including:
+ Insufficient shell characters filtering allows code execution (CVE-2016-3714)
+ Server Side Request Forgery (CVE-2016-3718)
+ File deletion (CVE-2016-3715)
+ File moving (CVE-2016-3716)
+ Local file read (CVE-2016-3717)
+ To mitigate these issues, the default policy.xml config file has been
+ modified to disable all of the vulnerable coders.
+ For more information, see:
+ https://imagetragick.com
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
+ (* Security fix *)
++--------------------------+
+Tue May 3 19:35:56 UTC 2016
+patches/packages/openssl-1.0.1t-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ Memory corruption in the ASN.1 encoder (CVE-2016-2108)
+ Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
+ EVP_EncodeUpdate overflow (CVE-2016-2105)
+ EVP_EncryptUpdate overflow (CVE-2016-2106)
+ ASN.1 BIO excessive memory allocation (CVE-2016-2109)
+ EBCDIC overread (CVE-2016-2176)
+ For more information, see:
+ https://www.openssl.org/news/secadv/20160503.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1t-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon May 2 19:42:54 UTC 2016
+patches/packages/mercurial-3.8.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes possible arbitrary code execution when converting Git
+ repos. Mercurial prior to 3.8 allowed arbitrary code execution when using
+ the convert extension on Git repos with hostile names. This could affect
+ automated code conversion services that allow arbitrary repository names.
+ This is a further side-effect of Git CVE-2015-7545.
+ Reported and fixed by Blake Burkhart.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105
+ (* Security fix *)
+patches/packages/samba-4.2.12-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
++--------------------------+
+Sat Apr 30 20:28:33 UTC 2016
+patches/packages/subversion-1.7.22-x86_64-2_slack14.0.txz: Rebuilt.
+ This update patches two security issues:
+ CVE-2016-2167: svnserve/sasl may authenticate users using the wrong realm.
+ CVE-2016-2168: Remotely triggerable DoS vulnerability in mod_authz_svn
+ during COPY/MOVE authorization check.
+ For more information, see:
+ http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
+ http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
+ (* Security fix *)
++--------------------------+
+Fri Apr 29 20:54:01 UTC 2016
+patches/packages/ntp-4.2.8p7-x86_64-1_slack14.0.txz: Upgraded.
+ This release patches several low and medium severity security issues:
+ CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering
+ CVE-2016-1549: Sybil vulnerability: ephemeral association attack,
+ AKA: ntp-sybil - MITIGATION ONLY
+ CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion
+ botch
+ CVE-2016-2517: Remote configuration trustedkey/requestkey values are not
+ properly validated
+ CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with
+ MATCH_ASSOC
+ CVE-2016-2519: ctl_getitem() return value not always checked
+ CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos
+ CVE-2016-1548: Interleave-pivot - MITIGATION ONLY
+ CVE-2015-7704: KoD fix: peer associations were broken by the fix for
+ NtpBug2901, AKA: Symmetric active/passive mode is broken
+ CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks
+ CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,
+ authdecrypt-timing, AKA: authdecrypt-timing
+ For more information, see:
+ http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519
+ (* Security fix *)
+patches/packages/php-5.6.21-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.21
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
+ (* Security fix *)
++--------------------------+
+Sun Apr 24 00:53:14 UTC 2016
+patches/packages/ca-certificates-20160104-noarch-1_slack14.0.txz: Upgraded.
+ This update provides the latest CA certificates to check for the
+ authenticity of SSL connections.
++--------------------------+
+Mon Apr 18 22:21:58 UTC 2016
+patches/packages/glibc-zoneinfo-2016d-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Fri Apr 15 20:37:37 UTC 2016
+patches/packages/samba-4.2.11-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the security issues known as "badlock" (or "sadlock"),
+ which may allow man-in-the-middle or denial-of-service attacks:
+ CVE-2015-5370 (Multiple errors in DCE-RPC code)
+ CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)
+ CVE-2016-2111 (NETLOGON Spoofing Vulnerability)
+ CVE-2016-2112 (LDAP client and server don't enforce integrity)
+ CVE-2016-2113 (Missing TLS certificate validation)
+ CVE-2016-2114 ("server signing = mandatory" not enforced)
+ CVE-2016-2115 (SMB IPC traffic is not integrity protected)
+ CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
+ (* Security fix *)
++--------------------------+
+Wed Apr 6 05:07:44 UTC 2016
+patches/packages/subversion-1.7.22-x86_64-1_slack14.0.txz: Upgraded.
+ Subversion servers and clients are vulnerable to a remotely triggerable
+ heap-based buffer overflow and out-of-bounds read that may allow remote
+ attackers to cause a denial of service or possibly execute arbitrary code
+ under the context of the targeted process.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343
+ (* Security fix *)
++--------------------------+
+Fri Apr 1 21:17:37 UTC 2016
+patches/packages/dhcp-4.3.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and (previously patched) security issues.
+patches/packages/mercurial-3.7.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues and bugs, including remote code execution
+ in binary delta decoding, arbitrary code execution with Git subrepos, and
+ arbitrary code execution when converting Git repos.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069
+ (* Security fix *)
+patches/packages/php-5.6.20-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.20
+ (* Security fix *)
++--------------------------+
+Fri Mar 25 20:43:59 UTC 2016
+patches/packages/glibc-zoneinfo-2016c-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Fri Mar 18 20:02:40 UTC 2016
+patches/packages/git-2.7.4-x86_64-1_slack14.0.txz: Upgraded.
+ NOTE: Issuing this patch again since the bug reporter listed the
+ wrong git version (2.7.1) as fixed. The vulnerability was actually
+ patched in git-2.7.4.
+ Fixed buffer overflows allowing server and client side remote code
+ execution in all git versions before 2.7.4.
+ For more information, see:
+ http://seclists.org/oss-sec/2016/q1/645
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
+ (* Security fix *)
++--------------------------+
+Tue Mar 15 21:31:49 UTC 2016
+patches/packages/git-2.7.3-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed buffer overflows allowing server and client side remote code
+ execution in all git versions before 2.7.1.
+ For more information, see:
+ http://seclists.org/oss-sec/2016/q1/645
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324
+ (* Security fix *)
+patches/packages/glibc-zoneinfo-2016b-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Thu Mar 10 23:43:47 UTC 2016
+patches/packages/openssh-7.2p2-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a security bug:
+ sshd(8): sanitise X11 authentication credentials to avoid xauth
+ command injection when X11Forwarding is enabled.
+ For more information, see:
+ http://www.openssh.com/txt/x11fwd.adv
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115
+ (* Security fix *)
++--------------------------+
+Thu Mar 10 02:46:49 UTC 2016
+patches/packages/bind-9.9.8_P4-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed security issues:
+ Fix resolver assertion failure due to improper DNAME handling when
+ parsing fetch reply messages. (CVE-2016-1286) [RT #41753]
+ Malformed control messages can trigger assertions in named and rndc.
+ (CVE-2016-1285) [RT #41666]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285
+ (* Security fix *)
+patches/packages/mozilla-nss-3.23-x86_64-1_slack14.0.txz: Upgraded.
+ Upgraded to nss-3.23 and nspr-4.12.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/nss.html
+ (* Security fix *)
++--------------------------+
+Tue Mar 8 01:54:33 UTC 2016
+patches/packages/php-5.6.19-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.19
+ (* Security fix *)
++--------------------------+
+Thu Mar 3 05:41:26 UTC 2016
+patches/packages/mailx-12.5-x86_64-2_slack14.0.txz: Rebuilt.
+ Drop SSLv2 support (no longer supported by OpenSSL), and fix security issues
+ that could allow a local attacker to cause mailx to execute arbitrary
+ shell commands through the use of a specially-crafted email address.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844
+ (* Security fix *)
+patches/packages/openssl-1.0.1s-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
+ Double-free in DSA code (CVE-2016-0705)
+ Memory leak in SRP database lookups (CVE-2016-0798)
+ BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
+ Fix memory issues in BIO_*printf functions (CVE-2016-0799)
+ Side channel attack on modular exponentiation (CVE-2016-0702)
+ To avoid breaking the ABI, "enable-ssl2" is used, but all the vulnerable or
+ weak ciphers have been removed.
+ For more information, see:
+ https://www.openssl.org/news/secadv/20160301.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1s-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/php-5.6.18-x86_64-1_slack14.1.txz: Upgraded.
+ This release fixes bugs and security issues.
+ For more information, see:
+ http://php.net/ChangeLog-5.php#5.6.18
+ (* Security fix *)
++--------------------------+
+Fri Feb 26 22:54:05 UTC 2016
+patches/packages/libssh-0.7.3-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed weak key generation. Due to a bug in the ephemeral secret key
+ generation for the diffie-hellman-group1 and diffie-hellman-group14
+ methods, ephemeral secret keys of size 128 bits are generated, instead
+ of the recommended sizes of 1024 and 2048 bits, giving a practical
+ security of 63 bits.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739
+ (* Security fix *)
++--------------------------+
+Tue Feb 23 19:31:59 UTC 2016
+patches/packages/bind-9.9.8_P3-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes two possible denial-of-service issues:
+ render_ecs errors were mishandled when printing out a OPT record resulting
+ in a assertion failure. (CVE-2015-8705) [RT #41397]
+ Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705
+ (* Security fix *)
+patches/packages/libgcrypt-1.5.5-x86_64-1_slack14.0.txz: Upgraded.
+ Mitigate chosen cipher text attacks on ECDH with Weierstrass curves.
+ Use ciphertext blinding for Elgamal decryption.
+ For more information, see:
+ http://www.cs.tau.ac.IL/~tromer/ecdh/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
+ (* Security fix *)
+patches/packages/ntp-4.2.8p6-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes
+ several low and medium severity vulnerabilities.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158
+ (* Security fix *)
++--------------------------+
+Mon Feb 8 22:08:35 UTC 2016
+patches/packages/curl-7.47.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where NTLM credentials are not checked
+ for proxy connection reuse. The effects of this flaw is that the application
+ could be reusing a proxy connection using the previously used credentials
+ and thus it could be given to or prevented access from resources that it
+ wasn't intended to. Thanks to Isaac Boukris.
+ For more information, see:
+ https://curl.haxx.se/docs/adv_20160127A.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
+ (* Security fix *)
+patches/packages/flac-1.3.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update is needed by the latest version of libsndfile.
+patches/packages/libsndfile-1.0.26-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes security issues which may allow attackers to cause
+ a denial of service, or possibly execute arbitrary code.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805
+ (* Security fix *)
++--------------------------+
+Wed Feb 3 22:39:25 UTC 2016
+patches/packages/glibc-zoneinfo-2016a-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/MPlayer-1.2_20160125-x86_64-1_slack14.0.txz: Upgraded.
+ This is the latest MPlayer-1.2 branch, identical to the 1.2.1 stable release.
+ The bundled ffmpeg has been upgraded to 2.8.5, which fixes two security
+ issues by which a remote attacker may conduct a cross-origin attack and read
+ arbitrary files on the system.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1897
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1898
+ (* Security fix *)
+patches/packages/openssl-1.0.1r-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issue:
+ SSLv2 doesn't block disabled ciphers (CVE-2015-3197).
+ For more information, see:
+ https://openssl.org/news/secadv/20160128.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1r-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/php-5.6.17-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes bugs and security issues.
+ *****************************************************************
+ * IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
+ *****************************************************************
+ PHP 5.4.x has been declared EOL (end of life) and is no longer receiving
+ upstream support. PHP 5.5.x is also no longer on active support status and
+ security fixes will continue only until 5 months from now. For this reason
+ we have provided PHP 5.6 packages as security updates. Be aware that PHP
+ 5.6 is not 100% compatible with PHP 5.4, and some changes may be required
+ to existing web pages written for PHP 5.4.
+ For information on how to migrate from PHP 5.4, please see:
+ http://php.net/manual/en/migration55.php
+ http://php.net/manual/en/migration56.php
+ The final PHP 5.4 packages may be found in /pasture in case there is a need
+ to revert this update.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903
+ (* Security fix *)
++--------------------------+
+Fri Jan 15 02:29:54 UTC 2016
+patches/packages/openssh-7.1p2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an information leak and a buffer overflow. In particular,
+ the information leak allows a malicious SSH server to steal the client's
+ private keys. Thanks to Qualys for reporting this issue.
+ For more information, see:
+ https://www.qualys.com/2016/01/14/cve-2016-0777-cve-2016-0778/openssh-cve-2016-0777-cve-2016-0778.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778
+ *****************************************************************
+ * IMPORTANT: READ BELOW ABOUT POTENTIALLY INCOMPATIBLE CHANGES *
+ *****************************************************************
+ Rather than backport the fix for the information leak (which is the only
+ hazardous flaw), we have upgraded to the latest OpenSSH. As of version
+ 7.0, OpenSSH has deprecated some older (and presumably less secure)
+ algorithms, and also (by default) only allows root login by public-key,
+ hostbased and GSSAPI authentication. Make sure that your keys and
+ authentication method will allow you to continue accessing your system
+ after the upgrade.
+ The release notes for OpenSSH 7.0 list the following incompatible changes
+ to be aware of:
+ * Support for the legacy SSH version 1 protocol is disabled by
+ default at compile time.
+ * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
+ is disabled by default at run-time. It may be re-enabled using
+ the instructions at http://www.openssh.com/legacy.html
+ * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
+ by default at run-time. These may be re-enabled using the
+ instructions at http://www.openssh.com/legacy.html
+ * Support for the legacy v00 cert format has been removed.
+ * The default for the sshd_config(5) PermitRootLogin option has
+ changed from "yes" to "prohibit-password".
+ * PermitRootLogin=without-password/prohibit-password now bans all
+ interactive authentication methods, allowing only public-key,
+ hostbased and GSSAPI authentication (previously it permitted
+ keyboard-interactive and password-less authentication if those
+ were enabled).
+ (* Security fix *)
++--------------------------+
+Wed Jan 13 00:01:23 UTC 2016
+patches/packages/dhcp-4.3.3_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a denial-of-service vulnerability.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605
+ (* Security fix *)
+patches/packages/xscreensaver-5.34-x86_64-1_slack14.0.txz: Upgraded.
+ I promised jwz that I'd keep this updated in -stable when I removed (against
+ his wishes) the nag screen that complains if a year has passed since that
+ version was released. So, here's the latest one.
++--------------------------+
+Wed Dec 23 05:20:09 UTC 2015
+patches/packages/blueman-r708-x86_64-3_slack14.0.txz: Rebuilt.
+ This update fixes a local privilege escalation vulnerability.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8612
+ (* Security fix *)
++--------------------------+
+Fri Dec 18 05:28:25 UTC 2015
+patches/packages/libpng-1.4.19-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed an out-of-range read in png_check_keyword(). Thanks to Qixue Xiao.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
+ (* Security fix *)
++--------------------------+
+Wed Dec 16 04:21:07 UTC 2015
+patches/packages/bind-9.9.8_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes three security issues:
+ Update allowed OpenSSL versions as named is potentially vulnerable
+ to CVE-2015-3193.
+ Insufficient testing when parsing a message allowed records with an
+ incorrect class to be be accepted, triggering a REQUIRE failure when
+ those records were subsequently cached. (CVE-2015-8000)
+ Address fetch context reference count handling error on socket error.
+ (CVE-2015-8461)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8461
+ (* Security fix *)
+patches/packages/libpng-1.4.18-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed incorrect implementation of png_set_PLTE() that uses png_ptr
+ not info_ptr, that left png_set_PLTE() open to the CVE-2015-8126
+ vulnerability.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472
+ (* Security fix *)
+patches/packages/openssl-1.0.1q-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193).
+ Certificate verify crash with missing PSS parameter (CVE-2015-3194).
+ X509_ATTRIBUTE memory leak (CVE-2015-3195).
+ Race condition handling PSK identify hint (CVE-2015-3196).
+ Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794).
+ For more information, see:
+ https://openssl.org/news/secadv_20151203.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1q-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Thu Dec 3 07:28:30 UTC 2015
+patches/packages/libpng-1.4.17-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed buffer overflows in the png_set_PLTE(), png_get_PLTE(),
+ png_set_tIME(), and png_convert_to_rfc1123() functions that allow
+ attackers to cause a denial of service (application crash) or
+ possibly have unspecified other impact via a small bit-depth value
+ in an IHDR (aka image header) chunk in a PNG image.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126.
+ (* Security fix *)
++--------------------------+
+Fri Nov 6 01:15:43 UTC 2015
+patches/packages/mozilla-nss-3.20.1-x86_64-1_slack14.0.txz: Upgraded.
+ Upgraded to nss-3.20.1 and nspr-4.10.10.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
+ (* Security fix *)
++--------------------------+
+Thu Oct 29 20:12:14 UTC 2015
+patches/packages/curl-7.45.0-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes some security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
+ (* Security fix *)
+patches/packages/jasper-1.900.1-x86_64-4_slack14.0.txz: Rebuilt.
+ Applied many security and bug fixes.
+ Thanks to Heinz Wiesinger.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029
+ (* Security fix *)
+patches/packages/ntp-4.2.8p4-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes
+ several low and medium severity vulnerabilities.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
+ (* Security fix *)
++--------------------------+
+Mon Oct 5 17:24:30 UTC 2015
+patches/packages/glibc-zoneinfo-2015g-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Thu Oct 1 21:21:36 UTC 2015
+patches/packages/php-5.4.45-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838
+ (* Security fix *)
+patches/packages/seamonkey-2.38-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.38-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Sep 15 22:36:17 UTC 2015
+patches/packages/ca-certificates-20150426-noarch-2_slack14.0.txz: Rebuilt.
+ Patched update-ca-certificates to remove incompatible command operators
+ used to call 'run-parts'. Thanks to Stuart Winter.
++--------------------------+
+Thu Sep 3 22:02:39 UTC 2015
+patches/packages/seamonkey-2.35-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.35-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Wed Sep 2 19:36:31 UTC 2015
+patches/packages/bind-9.9.7_P3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two denial-of-service vulnerabilities:
+ + CVE-2015-5722 is a denial-of-service vector which can be
+ exploited remotely against a BIND server that is performing
+ validation on DNSSEC-signed records. Validating recursive
+ resolvers are at the greatest risk from this defect, but it has not
+ been ruled out that it could be exploited against an
+ authoritative-only nameserver under limited conditions. Servers
+ that are not performing validation are not vulnerable. However,
+ ISC does not recommend disabling validation as a workaround to
+ this issue as it exposes the server to other types of attacks.
+ Upgrading to the patched versions is the recommended solution.
+ All versions of BIND since 9.0.0 are vulnerable to CVE-2015-5722.
+ + CVE-2015-5986 is a denial-of-service vector which can be used
+ against a BIND server that is performing recursion. Validation
+ is not required. Recursive resolvers are at the greatest risk
+ from this defect, but it has not been ruled out that it could
+ be exploited against an authoritative-only nameserver under
+ limited conditions.
+ Only versions of BIND since 9.9.7 and 9.10.2 are vulnerable to
+ CVE-2015-5986.
+ For more information, see:
+ https://kb.isc.org/article/AA-01287/0
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
+ https://kb.isc.org/article/AA-01291/0
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
+ (* Security fix *)
++--------------------------+
+Tue Sep 1 23:29:22 UTC 2015
+patches/packages/gdk-pixbuf2-2.26.1-x86_64-3_slack14.0.txz: Rebuilt.
+ Gustavo Grieco discovered a heap overflow in the processing of BMP images
+ which may result in the execution of arbitrary code if a malformed image
+ is opened.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
+ (* Security fix *)
++--------------------------+
+Fri Aug 21 21:17:48 UTC 2015
+patches/packages/gnutls-3.3.17.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
+ http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
+ (* Security fix *)
+patches/packages/nettle-2.7.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update is required for the new version of gnutls.
++--------------------------+
+Fri Aug 7 22:55:40 UTC 2015
+patches/packages/ca-certificates-20150426-noarch-1_slack14.0.txz: Upgraded.
+ This package updates to the latest CA certificates.
+patches/packages/mozilla-nss-3.19.2-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/nss.html
+ (* Security fix *)
++--------------------------+
+Tue Jul 28 19:36:39 UTC 2015
+patches/packages/bind-9.9.7_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where an error in the handling of TKEY
+ queries can be exploited by an attacker for use as a denial-of-service
+ vector, as a constructed packet can use the defect to trigger a REQUIRE
+ assertion failure, causing BIND to exit.
+ Impact:
+ Both recursive and authoritative servers are vulnerable to this defect.
+ Additionally, exposure is not prevented by either ACLs or configuration
+ options limiting or denying service because the exploitable code occurs
+ early in the packet handling, before checks enforcing those boundaries.
+ Operators should take steps to upgrade to a patched version as soon as
+ possible.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
+ https://kb.isc.org/article/AA-01272
+ (* Security fix *)
++--------------------------+
+Fri Jul 17 19:38:52 UTC 2015
+patches/packages/httpd-2.4.16-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ * CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local
+ URL-path with the INCLUDES filter active, introduced in 2.4.11.
+ * CVE-2015-0228: mod_lua: A maliciously crafted websockets PING after a
+ script calls r:wsupgrade() can cause a child process crash.
+ * CVE-2015-3183: core: Fix chunk header parsing defect. Remove
+ apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
+ filter, parse chunks in a single pass with zero copy. Limit accepted
+ chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
+ * CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
+ httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
+ (* Security fix *)
+patches/packages/php-5.4.43-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4642
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644
+ (* Security fix *)
++--------------------------+
+Thu Jul 9 18:29:23 UTC 2015
+patches/packages/openssl-1.0.1p-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issue:
+ Alternative chains certificate forgery (CVE-2015-1793).
+ During certificate verification, OpenSSL (starting from version 1.0.1n and
+ 1.0.2b) will attempt to find an alternative certificate chain if the first
+ attempt to build such a chain fails. An error in the implementation of this
+ logic can mean that an attacker could cause certain checks on untrusted
+ certificates to be bypassed, such as the CA flag, enabling them to use a
+ valid leaf certificate to act as a CA and "issue" an invalid certificate.
+ This issue will impact any application that verifies certificates including
+ SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
+ This issue affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n and 1.0.1o.
+ This issue was reported to OpenSSL on 24th June 2015 by Adam Langley/David
+ Benjamin (Google/BoringSSL). The fix was developed by the BoringSSL project.
+ For more information, see:
+ https://openssl.org/news/secadv_20150709.txt
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1p-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Jul 7 22:59:17 UTC 2015
+patches/packages/bind-9.9.7_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where an attacker who can cause
+ a validating resolver to query a zone containing specifically constructed
+ contents can cause that resolver to fail an assertion and terminate due
+ to a defect in validation code. This means that a recursive resolver that
+ is performing DNSSEC validation can be deliberately stopped by an attacker
+ who can cause the resolver to perform a query against a
+ maliciously-constructed zone. This will result in a denial of service to
+ clients who rely on that resolver.
+ For more information, see:
+ https://kb.isc.org/article/AA-01267/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
+ (* Security fix *)
+patches/packages/cups-1.5.4-x86_64-3_slack14.0.txz: Rebuilt.
+ This release fixes a security issue:
+ CWE-911: Improper Update of Reference Count - CVE-2015-1158
+ This bug could allow an attacker to upload a replacement CUPS
+ configuration file and mount further attacks.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
+ (* Security fix *)
+patches/packages/ntp-4.2.8p3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where under specific circumstances an
+ attacker can send a crafted packet to cause a vulnerable ntpd instance to
+ crash. Since this requires 1) ntpd set up to allow remote configuration
+ (not allowed by default), and 2) knowledge of the configuration password,
+ and 3) access to a computer entrusted to perform remote configuration,
+ the vulnerability is considered low-risk.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
+ (* Security fix *)
++--------------------------+
+Fri Jun 12 17:58:45 UTC 2015
+patches/packages/openssl-1.0.1o-x86_64-1_slack14.0.txz: Upgraded.
+ New release to resolve 1.0.1n HMAC ABI incompatibility.
+patches/packages/openssl-solibs-1.0.1o-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Thu Jun 11 21:31:47 UTC 2015
+patches/packages/openssl-1.0.1n-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes several bugs and security issues:
+ o Malformed ECParameters causes infinite loop (CVE-2015-1788)
+ o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
+ o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
+ o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
+ o Race condition handling NewSessionTicket (CVE-2015-1791)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1n-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/php-5.4.41-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some bugs and security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4025
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026
+ (* Security fix *)
++--------------------------+
+Tue May 12 07:17:33 UTC 2015
+patches/packages/mysql-5.5.43-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499
+ (* Security fix *)
+patches/packages/wpa_supplicant-2.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes potential denial of service issues.
+ For more information, see:
+ http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
+ http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
+ http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
+ http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
+ (* Security fix *)
++--------------------------+
+Wed Apr 29 05:10:52 UTC 2015
+patches/packages/gnupg-1.4.19-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched to fix spurious debug messages that may break sbopkg and slackpkg.
+ Thanks to Willy Sudiarto Raharjo.
++--------------------------+
+Tue Apr 21 23:44:00 UTC 2015
+patches/packages/bind-9.9.6_P2-x86_64-1_slack14.0.txz: Upgraded.
+ Fix some denial-of-service and other security issues.
+ For more information, see:
+ https://kb.isc.org/article/AA-01166/
+ https://kb.isc.org/article/AA-01161/
+ https://kb.isc.org/article/AA-01167/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8680
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3214
+ (* Security fix *)
+patches/packages/gnupg-1.4.19-x86_64-1_slack14.0.txz: Upgraded.
+ * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
+ See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
+ * Fixed data-dependent timing variations in modular exponentiation
+ [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
+ are Practical].
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
+ (* Security fix *)
+patches/packages/httpd-2.4.12-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ * CVE-2014-3583 mod_proxy_fcgi: Fix a potential crash due to buffer
+ over-read, with response headers' size above 8K.
+ * CVE-2014-3581 mod_cache: Avoid a crash when Content-Type has an
+ empty value. PR 56924.
+ * CVE-2014-8109 mod_lua: Fix handling of the Require line when a
+ LuaAuthzProvider is used in multiple Require directives with
+ different arguments. PR57204.
+ * CVE-2013-5704 core: HTTP trailers could be used to replace HTTP
+ headers late during request processing, potentially undoing or
+ otherwise confusing modules that examined or modified request
+ headers earlier. Adds "MergeTrailers" directive to restore legacy
+ behavior.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
+ (* Security fix *)
+patches/packages/libssh-0.6.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132
+ (* Security fix *)
+patches/packages/mutt-1.5.23-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched a vulnerability where malformed headers can cause mutt to crash.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116
+ (* Security fix *)
+patches/packages/ntp-4.2.8p2-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes the
+ following medium-severity vulnerabilities involving private key
+ authentication:
+ * ntpd accepts unauthenticated packets with symmetric key crypto.
+ * Authentication doesn't protect symmetric associations against DoS attacks.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799
+ (* Security fix *)
+patches/packages/openssl-1.0.1m-x86_64-1_slack14.0.txz: Upgraded.
+ Fixes several bugs and security issues:
+ o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
+ o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
+ o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
+ o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
+ o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
+ o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
+ o Removed the export ciphers from the DEFAULT ciphers
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1m-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/php-5.4.40-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some security issues.
+ Please note that this package build also moves the configuration files
+ from /etc/httpd to /etc, /etc/php.d, and /etc/php-fpm.d.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330
+ (* Security fix *)
+patches/packages/ppp-2.4.5-x86_64-2_slack14.0.txz: Rebuilt.
+ Fixed a potential security issue in parsing option files.
+ Fixed remotely triggerable PID overflow that causes pppd to crash.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310
+ (* Security fix *)
+patches/packages/proftpd-1.3.4e-x86_64-1_slack14.0.txz: Upgraded.
+ Patched an issue where mod_copy allowed unauthenticated copying
+ of files via SITE CPFR/CPTO.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
+ (* Security fix *)
+patches/packages/seamonkey-2.33.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.33.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon Feb 16 19:33:36 UTC 2015
+patches/packages/patch-2.7.4-x86_64-1_slack14.0.txz: Upgraded.
+ Patch no longer follows symbolic links to input and output files. This
+ ensures that symbolic links created by git-style patches cannot cause
+ patch to write outside the working directory.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
+ (* Security fix *)
+patches/packages/seamonkey-2.32.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.32.1-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/sudo-1.8.12-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a potential security issue by only passing the TZ
+ environment variable it is considered safe. This prevents exploiting bugs
+ in glibc's TZ parser that could be used to read files that the user does
+ not have access to, or to cause a denial of service.
+ For more information, see:
+ http://www.sudo.ws/sudo/alerts/tz.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
+ (* Security fix *)
++--------------------------+
+Wed Jan 28 19:23:00 UTC 2015
+patches/packages/glibc-2.15-x86_64-9_slack14.0.txz: Rebuilt.
+ This update patches a security issue __nss_hostname_digits_dots() function
+ of glibc which may be triggered through the gethostbyname*() set of
+ functions. This flaw could allow local or remote attackers to take control
+ of a machine running a vulnerable version of glibc. Thanks to Qualys for
+ discovering this issue (also known as the GHOST vulnerability.)
+ For more information, see:
+ https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
+ (* Security fix *)
+patches/packages/glibc-i18n-2.15-x86_64-9_slack14.0.txz: Rebuilt.
+patches/packages/glibc-profile-2.15-x86_64-9_slack14.0.txz: Rebuilt.
+patches/packages/glibc-solibs-2.15-x86_64-9_slack14.0.txz: Rebuilt.
+patches/packages/glibc-zoneinfo-2014j-noarch-1.txz: Upgraded.
+ Upgraded to tzcode2014j and tzdata2014j.
++--------------------------+
+Sat Jan 17 04:26:41 UTC 2015
+patches/packages/freetype-2.5.5-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/seamonkey-2.32-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.32-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Fri Jan 9 17:47:53 UTC 2015
+patches/packages/openssl-1.0.1k-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several security issues:
+ DTLS segmentation fault in dtls1_get_record (CVE-2014-3571)
+ DTLS memory leak in dtls1_buffer_record (CVE-2015-0206)
+ no-ssl3 configuration sets method to NULL (CVE-2014-3569)
+ ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572)
+ RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204)
+ DH client certificates accepted without verification [Server] (CVE-2015-0205)
+ Certificate fingerprints can be modified (CVE-2014-8275)
+ Bignum squaring may produce incorrect results (CVE-2014-3570)
+ For more information, see:
+ https://www.openssl.org/news/secadv_20150108.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1k-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Dec 23 00:05:23 UTC 2014
+patches/packages/ntp-4.2.8-x86_64-1_slack14.0.txz: Upgraded.
+ In addition to bug fixes and enhancements, this release fixes
+ several high-severity vulnerabilities discovered by Neel Mehta
+ and Stephen Roettger of the Google Security Team.
+ For more information, see:
+ https://www.kb.cert.org/vuls/id/852879
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296
+ (* Security fix *)
+patches/packages/php-5.4.36-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues.
+ #68545 (NULL pointer dereference in unserialize.c).
+ #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142)
+ #68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
+ (* Security fix *)
++--------------------------+
+Thu Dec 11 01:18:35 UTC 2014
+patches/packages/bind-9.9.6_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where a failure to place limits on
+ delegation chaining can allow an attacker to crash BIND or cause memory
+ exhaustion.
+ For more information, see:
+ https://kb.isc.org/article/AA-01216
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
+ (* Security fix *)
+patches/packages/openssh-6.7p1-x86_64-2_slack14.0.txz: Rebuilt.
+ Restored support for tcpwrappers that was dropped by upstream.
+ Thanks to mancha.
+patches/packages/openvpn-2.3.6-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue that allows remote authenticated
+ users to cause a denial of service (server crash) via a small control
+ channel packet.
+ For more information, see:
+ https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104
+ (* Security fix *)
+patches/packages/pidgin-2.10.11-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains login fixes for MSN and some XMPP servers.
+patches/packages/seamonkey-2.31-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.31-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/wpa_supplicant-1.0-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a remote command-execution vulnerability caused by a
+ failure to adequately sanitize user-supplied input.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686
+ (* Security fix *)
++--------------------------+
+Thu Nov 13 20:45:54 UTC 2014
+patches/packages/pidgin-2.10.10-x86_64-2_slack14.0.txz: Rebuilt.
+ Fix Gadu-Gadu protocol when GnuTLS is not used. Thanks to mancha.
++--------------------------+
+Fri Nov 7 21:02:55 UTC 2014
+patches/packages/bash-4.2.053-x86_64-1_slack14.0.txz: Upgraded.
+ Applied all upstream patches. The previously applied patch requiring
+ a specific prefix/suffix in order to parse variables for functions
+ closed all of the known vulnerabilities anyway, but it's clear that
+ until all the patches were applied that the "is this still vulnerable"
+ questions were not going to end...
++--------------------------+
+Tue Nov 4 00:05:23 UTC 2014
+patches/packages/php-5.4.34-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues.
+ #68044 (Integer overflow in unserialize() (32-bits only)). (CVE-2014-3669)
+ #68113 (Heap corruption in exif_thumbnail()). (CVE-2014-3670)
+ #68027 (Global buffer overflow in mkgmtime() function). (CVE-2014-3668)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668
+ (* Security fix *)
+patches/packages/seamonkey-2.30-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.30-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Wed Oct 29 18:21:12 UTC 2014
+patches/packages/wget-1.14-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a symlink vulnerability that could allow an attacker
+ to write outside of the expected directory.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
+ (* Security fix *)
++--------------------------+
+Fri Oct 24 04:55:44 UTC 2014
+patches/packages/glibc-zoneinfo-2014i-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/pidgin-2.10.10-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several security issues:
+ Insufficient SSL certificate validation (CVE-2014-3694)
+ Remote crash parsing malformed MXit emoticon (CVE-2014-3695)
+ Remote crash parsing malformed Groupwise message (CVE-2014-3696)
+ Malicious smiley themes could alter arbitrary files (CVE-2014-3697)
+ Potential information leak from XMPP (CVE-2014-3698)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698
+ (* Security fix *)
++--------------------------+
+Mon Oct 20 22:21:45 UTC 2014
+patches/packages/openssh-6.7p1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue that allows remote servers to trigger
+ the skipping of SSHFP DNS RR checking by presenting an unacceptable
+ HostCertificate.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653
+ (* Security fix *)
++--------------------------+
+Wed Oct 15 17:28:59 UTC 2014
+patches/packages/openssl-solibs-1.0.1j-x86_64-1_slack14.0.txz: Upgraded.
+ (* Security fix *)
+patches/packages/openssl-1.0.1j-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several security issues:
+ SRTP Memory Leak (CVE-2014-3513):
+ A flaw in the DTLS SRTP extension parsing code allows an attacker, who
+ sends a carefully crafted handshake message, to cause OpenSSL to fail
+ to free up to 64k of memory causing a memory leak. This could be
+ exploited in a Denial Of Service attack.
+ Session Ticket Memory Leak (CVE-2014-3567):
+ When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
+ integrity of that ticket is first verified. In the event of a session
+ ticket integrity check failing, OpenSSL will fail to free memory
+ causing a memory leak. By sending a large number of invalid session
+ tickets an attacker could exploit this issue in a Denial Of Service
+ attack.
+ SSL 3.0 Fallback protection:
+ OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
+ to block the ability for a MITM attacker to force a protocol
+ downgrade.
+ Some client applications (such as browsers) will reconnect using a
+ downgraded protocol to work around interoperability bugs in older
+ servers. This could be exploited by an active man-in-the-middle to
+ downgrade connections to SSL 3.0 even if both sides of the connection
+ support higher protocols. SSL 3.0 contains a number of weaknesses
+ including POODLE (CVE-2014-3566).
+ Build option no-ssl3 is incomplete (CVE-2014-3568):
+ When OpenSSL is configured with "no-ssl3" as a build option, servers
+ could accept and complete a SSL 3.0 handshake, and clients could be
+ configured to send them.
+ For more information, see:
+ https://www.openssl.org/news/secadv_20141015.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
+ (* Security fix *)
++--------------------------+
+Mon Sep 29 18:41:23 UTC 2014
+patches/packages/bash-4.2.050-x86_64-1_slack14.0.txz: Upgraded.
+ Another bash update. Here's some information included with the patch:
+ "This patch changes the encoding bash uses for exported functions to avoid
+ clashes with shell variables and to avoid depending only on an environment
+ variable's contents to determine whether or not to interpret it as a shell
+ function."
+ After this update, an environment variable will not go through the parser
+ unless it follows this naming structure: BASH_FUNC_*%%
+ Most scripts never expected to import functions from environment variables,
+ so this change (although not backwards compatible) is not likely to break
+ many existing scripts. It will, however, close off access to the parser as
+ an attack surface in the vast majority of cases. There's already another
+ vulnerability similar to CVE-2014-6271 for which there is not yet a fix,
+ but this hardening patch prevents it (and likely many more similar ones).
+ Thanks to Florian Weimer and Chet Ramey.
+ (* Security fix *)
++--------------------------+
+Sun Sep 28 23:07:39 UTC 2014
+patches/packages/seamonkey-2.29.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.29.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Fri Sep 26 22:23:32 UTC 2014
+patches/packages/bash-4.2.049-x86_64-2_slack14.0.txz: Upgraded.
+ This is essentially a rebuild as the preliminary patch for CVE-2014-7169
+ has been accepted by upstream and is now signed. This also bumps the
+ patchlevel, making it easy to tell this is the fixed version.
+ Possibly more changes to come, given the ongoing discussions on oss-sec.
++--------------------------+
+Thu Sep 25 19:55:13 UTC 2014
+patches/packages/bash-4.2.048-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched an additional trailing string processing vulnerability discovered
+ by Tavis Ormandy.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
+ (* Security fix *)
++--------------------------+
+Wed Sep 24 22:52:53 UTC 2014
+patches/packages/bash-4.2.048-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a vulnerability in bash related to how environment
+ variables are processed: trailing code in function definitions was
+ executed, independent of the variable name. In many common configurations
+ (such as the use of CGI scripts), this vulnerability is exploitable over
+ the network. Thanks to Stephane Chazelas for discovering this issue.
+ For more information, see:
+ http://seclists.org/oss-sec/2014/q3/650
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ (* Security fix *)
+patches/packages/mozilla-nss-3.16.5-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed an RSA Signature Forgery vulnerability.
+ For more information, see:
+ https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
+ (* Security fix *)
++--------------------------+
+Tue Sep 9 18:01:05 UTC 2014
+patches/packages/seamonkey-2.29-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.29-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Thu Sep 4 19:43:25 UTC 2014
+patches/packages/php-5.4.32-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120
+ (* Security fix *)
++--------------------------+
+Thu Aug 28 23:17:47 UTC 2014
+patches/packages/mozilla-nss-3.16.4-x86_64-1.txz: Upgraded.
+ Upgraded to nss-3.16.4 and nspr-4.10.7.
++--------------------------+
+Fri Aug 8 19:02:50 UTC 2014
+patches/packages/openssl-1.0.1i-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several security issues:
+ Double Free when processing DTLS packets (CVE-2014-3505)
+ DTLS memory exhaustion (CVE-2014-3506)
+ DTLS memory leak from zero-length fragments (CVE-2014-3507)
+ Information leak in pretty printing functions (CVE-2014-3508)
+ Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
+ OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
+ OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
+ SRP buffer overrun (CVE-2014-3512)
+ Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
+ For more information, see:
+ https://www.openssl.org/news/secadv_20140806.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1i-x86_64-1_slack14.0.txz: Upgraded.
+ (* Security fix *)
++--------------------------+
+Fri Aug 1 21:13:18 UTC 2014
+patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a security issue where a specially crafted packet
+ received from a malicious DHCP server causes dhcpcd to enter an infinite
+ loop causing a denial of service.
+ Thanks to Tobias Stoeckmann for the bug report.
+ (* Security fix *)
++--------------------------+
+Wed Jul 23 23:00:34 UTC 2014
+patches/packages/httpd-2.4.10-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ *) SECURITY: CVE-2014-0117 (cve.mitre.org)
+ mod_proxy: Fix crash in Connection header handling which
+ allowed a denial of service attack against a reverse proxy
+ with a threaded MPM. [Ben Reser]
+ *) SECURITY: CVE-2014-0118 (cve.mitre.org)
+ mod_deflate: The DEFLATE input filter (inflates request bodies) now
+ limits the length and compression ratio of inflated request bodies to
+ avoid denial of sevice via highly compressed bodies. See directives
+ DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
+ and DeflateInflateRatioBurst. [Yann Ylavic, Eric Covener]
+ *) SECURITY: CVE-2014-0226 (cve.mitre.org)
+ Fix a race condition in scoreboard handling, which could lead to
+ a heap buffer overflow. [Joe Orton, Eric Covener]
+ *) SECURITY: CVE-2014-0231 (cve.mitre.org)
+ mod_cgid: Fix a denial of service against CGI scripts that do
+ not consume stdin that could lead to lingering HTTPD child processes
+ filling up the scoreboard and eventually hanging the server. By
+ default, the client I/O timeout (Timeout directive) now applies to
+ communication with scripts. The CGIDScriptTimeout directive can be
+ used to set a different timeout for communication with scripts.
+ [Rainer Jung, Eric Covener, Yann Ylavic]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
+ (* Security fix *)
++--------------------------+
+Sat Jul 12 02:24:10 UTC 2014
+patches/packages/php-5.4.30-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0207
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3478
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3479
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3480
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3487
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3981
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
+ (* Security fix *)
++--------------------------+
+Tue Jun 24 22:35:07 UTC 2014
+patches/packages/bind-9.9.5_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This fixes security issues and other bugs. Please note that the first
+ CVE only affects Windows, and the second one was claimed to be fixed by
+ an earlier version of BIND. But we'll update anyway just in case. :-)
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6230
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
+ (* Security fix *)
+patches/packages/gnupg-1.4.17-x86_64-1_slack14.0.txz: Upgraded.
+ This release includes a security fix to stop a denial of service using
+ garbled compressed data packets which can be used to put gpg into an
+ infinite loop.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
+ (* Security fix *)
+patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txz: Upgraded.
+ This release includes a security fix to stop a denial of service using
+ garbled compressed data packets which can be used to put gpg into an
+ infinite loop.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
+ (* Security fix *)
+patches/packages/samba-3.6.24-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues, including a flaw in Samba's
+ internal DNS server which can be exploited to cause a denial of service,
+ a flaw in SRV_SNAPSHOT_ARRAY that permits attackers to leverage
+ configurations that use shadow_copy* for vfs objects to reveal potentially
+ private server information, a denial of service on the nmbd NetBIOS name
+ services daemon, and a denial of service crash involving overwriting
+ memory on an authenticated connection to the smbd file server.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493
+ (* Security fix *)
+patches/packages/seamonkey-2.26.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.26.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon Jun 9 20:16:02 UTC 2014
+patches/packages/php-5.4.29-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes bugs and security issues, including a possible denial
+ of service, and an issue where insecure default permissions on the FPM
+ socket may allow local users to run arbitrary code as the apache user.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
+ (* Security fix *)
++--------------------------+
+Fri Jun 6 04:27:01 UTC 2014
+patches/packages/gnutls-3.0.32-x86_64-1_slack14.0.txz: Upgraded.
+ A security issue has been corrected in gnutls. This vulnerability
+ affects the client side of the gnutls library. A server that sends
+ a specially crafted ServerHello could corrupt the memory of a requesting
+ client. This may allow a remote attacker to execute arbitrary code.
+ Additional vulnerabilities in the embedded libtasn1 library have also
+ been patched.
+ Thanks to mancha for the backported patches.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
+ (* Security fix *)
+patches/packages/libtasn1-2.14-x86_64-1_slack14.0.txz: Upgraded.
+ Multiple security issues have been corrected in the libtasn1 library.
+ These errors allow a remote attacker to cause a denial of service, or
+ possibly to execute arbitrary code.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
+ (* Security fix *)
+patches/packages/openssl-1.0.1h-x86_64-1_slack14.0.txz: Upgraded.
+ Multiple security issues have been corrected, including a possible
+ man-in-the-middle attack where weak keying material is forced, denial
+ of service, and the execution of arbitrary code.
+ For more information, see:
+ http://www.openssl.org/news/secadv_20140605.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1h-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/sendmail-8.14.9-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes one security related bug by properly closing file
+ descriptors (except stdin, stdout, and stderr) before executing programs.
+ This bug could enable local users to interfere with an open SMTP
+ connection if they can execute their own program for mail delivery
+ (e.g., via procmail or the prog mailer).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
+ (* Security fix *)
+patches/packages/sendmail-cf-8.14.9-noarch-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon May 12 02:24:36 UTC 2014
+patches/packages/seamonkey-2.26-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.26-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Apr 22 17:31:48 UTC 2014
+patches/packages/openssh-6.6p1-x86_64-2_slack14.0.txz: Rebuilt.
+ Fixed a bug with curve25519-sha256 that caused a key exchange failure in
+ about 1 in 512 connection attempts.
++--------------------------+
+Mon Apr 21 20:09:48 UTC 2014
+patches/packages/libyaml-0.1.6-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a heap overflow in URI escape parsing of YAML in Ruby,
+ where a specially crafted string could cause a heap overflow leading to
+ arbitrary code execution.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
+ https://www.ruby-lang.org/en/news/2014/03/29/heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525/
+ (* Security fix *)
+patches/packages/php-5.4.27-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue in the in the awk script detector
+ which allows context-dependent attackers to cause a denial of service
+ (CPU consumption) via a crafted ASCII file that triggers a large amount
+ of backtracking.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345
+ (* Security fix *)
++--------------------------+
+Tue Apr 8 14:19:51 UTC 2014
+patches/packages/openssl-1.0.1g-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ A missing bounds check in the handling of the TLS heartbeat extension
+ can be used to reveal up to 64k of memory to a connected client or server.
+ Thanks for Neel Mehta of Google Security for discovering this bug and to
+ Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
+ preparing the fix.
+ Fix for the attack described in the paper "Recovering OpenSSL
+ ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
+ by Yuval Yarom and Naomi Benger. Details can be obtained from:
+ http://eprint.iacr.org/2014/140
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1g-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon Mar 31 20:30:28 UTC 2014
+patches/packages/apr-1.5.0-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/apr-util-1.5.3-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/httpd-2.4.9-x86_64-2_slack14.0.txz: Rebuilt.
+ Recompiled against new apr/apr-util to restore missing mod_mpm_event.so.
++--------------------------+
+Fri Mar 28 03:43:11 UTC 2014
+patches/packages/curl-7.36.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes four security issues.
+ For more information, see:
+ http://curl.haxx.se/docs/adv_20140326A.html
+ http://curl.haxx.se/docs/adv_20140326B.html
+ http://curl.haxx.se/docs/adv_20140326C.html
+ http://curl.haxx.se/docs/adv_20140326D.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1263
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2522
+ (* Security fix *)
+patches/packages/httpd-2.4.9-x86_64-1_slack14.0.txz: Upgraded.
+ This update addresses two security issues.
+ Segfaults with truncated cookie logging. mod_log_config: Prevent segfaults
+ when logging truncated cookies. Clean up the cookie logging parser to
+ recognize only the cookie=value pairs, not valueless cookies.
+ mod_dav: Keep track of length of cdata properly when removing leading
+ spaces. Eliminates a potential denial of service from specifically crafted
+ DAV WRITE requests.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
+ (* Security fix *)
+patches/packages/mozilla-nss-3.16-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue:
+ The cert_TestHostName function in lib/certdb/certdb.c in the
+ certificate-checking implementation in Mozilla Network Security Services
+ (NSS) before 3.16 accepts a wildcard character that is embedded in an
+ internationalized domain name's U-label, which might allow man-in-the-middle
+ attackers to spoof SSL servers via a crafted certificate.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492
+ (* Security fix *)
+patches/packages/openssh-6.6p1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue when using environment passing with
+ a sshd_config(5) AcceptEnv pattern with a wildcard. OpenSSH could be
+ tricked into accepting any environment variable that contains the
+ characters before the wildcard character.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532
+ (* Security fix *)
+patches/packages/seamonkey-2.25-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.25-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sun Mar 16 02:52:28 UTC 2014
+patches/packages/php-5.4.26-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a flaw where a specially crafted data file may cause a
+ segfault or 100% CPU consumption when a web page uses fileinfo() on it.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
+ (* Security fix *)
++--------------------------+
+Fri Mar 14 00:44:48 UTC 2014
+patches/packages/samba-3.6.23-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ CVE-2013-4496:
+ Samba versions 3.4.0 and above allow the administrator to implement
+ locking out Samba accounts after a number of bad password attempts.
+ However, all released versions of Samba did not implement this check for
+ password changes, such as are available over multiple SAMR and RAP
+ interfaces, allowing password guessing attacks.
+ CVE-2013-6442:
+ Samba versions 4.0.0 and above have a flaw in the smbcacls command. If
+ smbcacls is used with the "-C|--chown name" or "-G|--chgrp name"
+ command options it will remove the existing ACL on the object being
+ modified, leaving the file or directory unprotected.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442
+ (* Security fix *)
++--------------------------+
+Thu Mar 13 03:32:38 UTC 2014
+patches/packages/mutt-1.5.23-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a buffer overflow where malformed RFC2047 header
+ lines could result in denial of service or potentially the execution
+ of arbitrary code as the user running mutt.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467
+ (* Security fix *)
++--------------------------+
+Tue Mar 11 07:06:18 UTC 2014
+patches/packages/udisks-1.0.5-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a stack-based buffer overflow when handling long path
+ names. A malicious, local user could use this flaw to create a
+ specially-crafted directory structure that could lead to arbitrary code
+ execution with the privileges of the udisks daemon (root).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
+ (* Security fix *)
+patches/packages/udisks2-1.98.0-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a stack-based buffer overflow when handling long path
+ names. A malicious, local user could use this flaw to create a
+ specially-crafted directory structure that could lead to arbitrary code
+ execution with the privileges of the udisks daemon (root).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
+ (* Security fix *)
++--------------------------+
+Mon Mar 3 23:32:18 UTC 2014
+patches/packages/gnutls-3.0.31-x86_64-3_slack14.0.txz: Rebuilt.
+ Fixed a security issue where a specially crafted certificate could
+ bypass certificate validation checks.
+ Thanks to mancha for the backported patch.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
+ (* Security fix *)
++--------------------------+
+Thu Feb 27 20:43:28 UTC 2014
+patches/packages/subversion-1.7.16-x86_64-1_slack14.0.txz: Upgraded.
+ Fix denial of service bugs.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
+ (* Security fix *)
++--------------------------+
+Thu Feb 20 00:30:49 UTC 2014
+patches/packages/gnutls-3.0.31-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a flaw where a version 1 intermediate certificate would be
+ considered as a CA certificate by GnuTLS by default.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
+ (* Security fix *)
+patches/packages/mysql-5.5.36-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a buffer overflow in the mysql command line client which
+ may allow malicious or compromised database servers to cause a denial of
+ service (crash) and possibly execute arbitrary code via a long server
+ version string.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
+ (* Security fix *)
++--------------------------+
+Thu Feb 13 23:45:53 UTC 2014
+patches/packages/curl-7.35.0-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a flaw where libcurl could, in some circumstances, reuse
+ the wrong connection when asked to do an NTLM-authenticated HTTP or HTTPS
+ request.
+ For more information, see:
+ http://curl.haxx.se/docs/adv_20140129.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
+ (* Security fix *)
+patches/packages/ntp-4.2.6p5-x86_64-3_slack14.0.txz: Rebuilt.
+ All stable versions of NTP remain vulnerable to a remote attack where the
+ "ntpdc -c monlist" command can be used to amplify network traffic as part
+ of a denial of service attack. By default, Slackware is not vulnerable
+ since it includes "noquery" as a default restriction. However, it is
+ vulnerable if this restriction is removed. To help mitigate this flaw,
+ "disable monitor" has been added to the default ntp.conf (which will disable
+ the monlist command even if other queries are allowed), and the default
+ restrictions have been extended to IPv6 as well.
+ All users of the NTP daemon should make sure that their ntp.conf contains
+ "disable monitor" to prevent misuse of the NTP service. The new ntp.conf
+ file will be installed as /etc/ntp.conf.new with a package upgrade, but the
+ changes will need to be merged into any existing ntp.conf file by the admin.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
+ http://www.kb.cert.org/vuls/id/348126
+ (* Security fix *)
++--------------------------+
+Sat Feb 8 18:41:15 UTC 2014
+patches/packages/seamonkey-2.24-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.24-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon Feb 3 20:58:32 UTC 2014
+patches/packages/pidgin-2.10.9-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes various security issues and other bugs.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020
+ (* Security fix *)
++--------------------------+
+Tue Jan 28 21:07:13 UTC 2014
+patches/packages/bind-9.9.4_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a defect in the handling of NSEC3-signed zones that can
+ cause BIND to be crashed by a specific set of queries.
+ NOTE: According to the second link below, Slackware is probably not
+ vulnerable since we aren't using glibc-2.18 yet. Might as well fix it
+ anyway, though.
+ For more information, see:
+ https://kb.isc.org/article/AA-01078
+ https://kb.isc.org/article/AA-01085
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591
+ (* Security fix *)
+patches/packages/mozilla-nss-3.15.4-x86_64-1_slack14.0.txz: Upgraded.
+ Upgraded to nss-3.15.4 and nspr-4.10.3.
+ Fixes a possible man-in-the-middle issue.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740
+ (* Security fix *)
++--------------------------+
+Tue Jan 14 03:54:48 UTC 2014
+patches/packages/libXfont-1.4.7-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a stack overflow when reading a BDF font file containing
+ a longer than expected string, which could lead to crashes or privilege
+ escalation.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462
+ (* Security fix *)
+patches/packages/openssl-1.0.1f-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes the following security issues:
+ Fix for TLS record tampering bug CVE-2013-4353
+ Fix for TLS version checking bug CVE-2013-6449
+ Fix for DTLS retransmission bug CVE-2013-6450
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1f-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/php-5.4.24-x86_64-1_slack14.0.txz: Upgraded.
+ The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before
+ 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly
+ parse (1) notBefore and (2) notAfter timestamps in X.509 certificates,
+ which allows remote attackers to execute arbitrary code or cause a denial
+ of service (memory corruption) via a crafted certificate that is not
+ properly handled by the openssl_x509_parse function.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420
+ (* Security fix *)
++--------------------------+
+Fri Dec 20 22:46:09 UTC 2013
+patches/packages/gnupg-1.4.16-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
+ Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
+ For more information, see:
+ http://www.cs.tau.ac.il/~tromer/acoustic/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4576
+ (* Security fix *)
++--------------------------+
+Mon Dec 16 20:51:01 UTC 2013
+patches/packages/libiodbc-3.52.8-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an rpath pointing to a location in /tmp that was found in
+ two test programs (iodbctest and iodbctestw). This could have allowed a
+ local attacker with write access to /tmp to add modified libraries (and
+ execute arbitrary code) as any user running the test programs.
+ Thanks to Christopher Oliver for the bug report.
+ (* Security fix *)
+patches/packages/libjpeg-v8a-x86_64-2_slack14.0.txz: Rebuilt.
+ Fix use of uninitialized memory when decoding images with missing SOS data
+ for the luminance component (Y) in presence of valid chroma data (Cr, Cb).
+ This could allow remote attackers to obtain sensitive information from
+ uninitialized memory locations via a crafted JPEG image.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
+ (* Security fix *)
+patches/packages/llvm-3.0-x86_64-3_slack14.0.txz: Rebuilt.
+ The LLVM package included binaries with an rpath pointing to the build
+ location in /tmp. This allows an attacker with write access to /tmp to
+ add modified libraries (and execute arbitrary code) as any user running
+ the LLVM binaries. This updated package rebuilds LLVM to exclude the
+ build directories from the rpath information.
+ Thanks to Christopher Oliver for the bug report.
+ (* Security fix *)
+patches/packages/ruby-1.9.3_p484-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a heap overflow in floating point parsing. A specially
+ crafted string could cause a heap overflow leading to a denial of service
+ attack via segmentation faults and possibly arbitrary code execution.
+ For more information, see:
+ https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
+ (* Security fix *)
+patches/packages/seamonkey-2.23-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.23-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Thu Dec 5 22:20:36 UTC 2013
+patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txz: Rebuilt.
+ This update disables the automatic upgrade feature which can be easily
+ fooled into downloading an arbitrary binary and executing it. This
+ issue affects only Slackware 14.0 (earlier versions do not have the
+ feature, and newer ones had already disabled it).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
+ (* Security fix *)
+patches/packages/mozilla-nss-3.15.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.11esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
+ (* Security fix *)
+patches/packages/seamonkey-2.22.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.22.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Mon Nov 18 20:52:16 UTC 2013
+patches/packages/mozilla-firefox-17.0.11esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
+ (* Security fix *)
+patches/packages/php-5.4.22-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/samba-3.6.20-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes two security issues:
+ * Samba versions 3.2.0 and above do not check the underlying file or
+ directory ACL when opening an alternate data stream.
+ * In setups which provide ldap(s) and/or https services, the private key
+ for SSL/TLS encryption might be world readable. This typically happens
+ in active directory domain controller setups.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476
+ (* Security fix *)
+patches/packages/seamonkey-2.22-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.22-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sun Nov 3 06:07:52 UTC 2013
+patches/packages/mozilla-thunderbird-17.0.10esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
+ (* Security fix *)
++--------------------------+
+Sat Oct 19 03:42:15 UTC 2013
+patches/packages/hplip-3.12.9-x86_64-3_slack14.0.txz: Rebuilt.
+ This fixes a polkit race condition that could allow local users to bypass
+ intended access restrictions.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
+ (* Security fix *)
++--------------------------+
+Fri Oct 18 02:41:09 UTC 2013
+patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txz: Upgraded.
+ Patched overflows, crashes, and out of bounds writes.
+ Thanks to mancha for the backported patches.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244
+ (* Security fix *)
++--------------------------+
+Mon Oct 14 22:09:17 UTC 2013
+patches/packages/gnupg-1.4.15-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed possible infinite recursion in the compressed packet
+ parser. [CVE-2013-4402]
+ Protect against rogue keyservers sending secret keys.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
+ (* Security fix *)
+patches/packages/gnupg2-2.0.22-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed possible infinite recursion in the compressed packet
+ parser. [CVE-2013-4402]
+ Protect against rogue keyservers sending secret keys.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
+ (* Security fix *)
+patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txz: Upgraded.
+ This package upgrade was needed by the new version of gnupg2.
+patches/packages/xorg-server-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched a use-after-free bug that can cause an X server crash or
+ memory corruption.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396
+ (* Security fix *)
+patches/packages/xorg-server-xephyr-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xnest-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
+patches/packages/xorg-server-xvfb-1.12.4-x86_64-2_slack14.0.txz: Rebuilt.
++--------------------------+
+Thu Oct 3 02:57:44 UTC 2013
+patches/packages/mozilla-nss-3.15.2-x86_64-1_slack14.0.txz: Upgraded.
+ Upgraded to nss-3.15.2 and nspr-4.10.1.
+ This should help keep Google Chrome updates working for a while.
+ Also, adding /lib and /usr/lib (or /lib64 and /usr/lib64) to the
+ top of /etc/ld.so.conf will help Chrome use the correct libraries
+ instead of the ones from Seamonkey.
++--------------------------+
+Wed Oct 2 03:25:01 UTC 2013
+patches/packages/ca-certificates-20130906-noarch-1_slack14.0.txz: Upgraded.
+ This package updates to the latest CA certificates.
++--------------------------+
+Sun Sep 29 02:39:29 UTC 2013
+patches/packages/lm_sensors-3.3.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes issues with sensors-detect that may cause serious trouble
+ on recent hardware (most notably laptops.) The symptoms are that the
+ display starts misbehaving (wrong resolution or wrong gamma factor.)
+ The risk is mitigated in this package by changing the default behavior of
+ sensors-detect to no longer touch EDID EEPROMs and then to no longer probe
+ graphics adapters at all unless the user asks for it.
+patches/packages/seamonkey-2.21-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.21-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Wed Sep 18 02:56:19 UTC 2013
+patches/packages/glibc-2.15-x86_64-8_slack14.0.txz: Rebuilt.
+ Patched to fix integer overflows in pvalloc, valloc, and
+ posix_memalign/memalign/aligned_alloc.
+ Thanks to mancha for the backported patch.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
+ (* Security fix *)
+ Also, as long as these packages were being respun anyway, I added a patch
+ to fix the check for AVX opcodes. This was causing crashes on Xen.
+ Thanks to Dale Gallagher.
+patches/packages/glibc-i18n-2.15-x86_64-8_slack14.0.txz: Rebuilt.
+patches/packages/glibc-profile-2.15-x86_64-8_slack14.0.txz: Rebuilt.
+patches/packages/glibc-solibs-2.15-x86_64-8_slack14.0.txz: Rebuilt.
+patches/packages/glibc-zoneinfo-2013d_2013d-noarch-8_slack14.0.txz: Rebuilt.
+patches/packages/mozilla-firefox-17.0.9esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.9esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbirdESR.html
+ (* Security fix *)
++--------------------------+
+Mon Sep 9 03:34:59 UTC 2013
+patches/packages/subversion-1.7.13-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a local privilege escalation vulnerability via
+ symlink attack.
+ For more information, see:
+ http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277
+ (* Security fix *)
++--------------------------+
+Fri Aug 30 19:39:38 UTC 2013
+patches/packages/gnutls-3.0.31-x86_64-1_slack14.0.txz: Upgraded.
+ [Updated to the correct version to fix fetching the "latest" from gnu.org]
+ This update prevents a side-channel attack which may allow remote attackers
+ to conduct distinguishing attacks and plaintext recovery attacks using
+ statistical analysis of timing data for crafted packets.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
+ (* Security fix *)
+patches/packages/samba-3.6.18-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
++--------------------------+
+Fri Aug 30 06:26:06 UTC 2013
+patches/packages/gnutls-3.0.26-x86_64-1_slack14.0.txz: Upgraded.
+ This update prevents a side-channel attack which may allow remote attackers
+ to conduct distinguishing attacks and plaintext recovery attacks using
+ statistical analysis of timing data for crafted packets.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
+ (* Security fix *)
+patches/packages/php-5.4.19-x86_64-1_slack14.0.txz: Upgraded.
+ Fixed handling null bytes in subjectAltName (CVE-2013-4248).
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
+ (* Security fix *)
++--------------------------+
+Wed Aug 21 18:27:33 UTC 2013
+patches/packages/hplip-3.12.9-x86_64-2_slack14.0.txz: Rebuilt.
+ This update fixes a stack-based buffer overflow in the hpmud_get_pml
+ function that can allow remote attackers to cause a denial of service
+ (crash) and possibly execute arbitrary code via a crafted SNMP response
+ with a large length value.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
+ (* Security fix *)
+patches/packages/poppler-0.20.2-x86_64-2_slack14.0.txz: Rebuilt.
+ Sanitize error messages to remove escape sequences that could be used to
+ exploit vulnerable terminal emulators.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
+ (* Security fix *)
+patches/packages/xpdf-3.03-x86_64-1_slack14.0.txz: Upgraded.
+ Sanitize error messages to remove escape sequences that could be used to
+ exploit vulnerable terminal emulators.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2142
+ Thanks to mancha.
+ (* Security fix *)
++--------------------------+
+Thu Aug 15 03:46:12 UTC 2013
+patches/packages/seamonkey-2.20-x86_64-2_slack14.0.txz: Rebuilt.
+ Recompiled without the --enable-shared-js option to fix the Mozilla
+ Lightning plugin. This removes libmozjs.so, but there's a standalone js
+ package now anyway.
+ Thanks to ljb643.
+patches/packages/seamonkey-solibs-2.20-x86_64-2_slack14.0.txz: Rebuilt.
+ Recompiled without the --enable-shared-js option to fix the Mozilla
+ Lightning plugin. This removes libmozjs.so, but there's a standalone js
+ package now anyway.
+ Thanks to ljb643.
++--------------------------+
+Thu Aug 8 02:22:40 UTC 2013
+patches/packages/mozilla-firefox-17.0.8esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.8-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
+patches/packages/seamonkey-2.20-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.20-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Aug 6 05:23:34 UTC 2013
+patches/packages/bind-9.9.3_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where a specially crafted query can cause
+ BIND to terminate abnormally, resulting in a denial of service.
+ For more information, see:
+ https://kb.isc.org/article/AA-01015
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
+ (* Security fix *)
+patches/packages/httpd-2.4.6-x86_64-1_slack14.0.txz: Upgraded.
+ This update addresses two security issues:
+ * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against
+ a URI handled by mod_dav_svn with the source href (sent as part of the
+ request body as XML) pointing to a URI that is not configured for DAV
+ will trigger a segfault.
+ * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that
+ dirty flag is respected when saving sessions, and ensure the session ID
+ is changed each time the session changes. This changes the format of the
+ updatesession SQL statement. Existing configurations must be changed.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
+ (* Security fix *)
+patches/packages/samba-3.6.17-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes missing integer wrap protection in an EA list reading
+ that can allow authenticated or guest connections to cause the server to
+ loop, resulting in a denial of service.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ (* Security fix *)
++--------------------------+
+Sat Aug 3 20:36:53 UTC 2013
+patches/packages/gnupg-1.4.14-x86_64-1_slack14.0.txz: Upgraded.
+ Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
+ secret keys.
+ For more information, see:
+ http://eprint.iacr.org/2013/448
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
+ (* Security fix *)
+patches/packages/libgcrypt-1.5.3-x86_64-1_slack14.0.txz: Upgraded.
+ Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
+ secret keys.
+ For more information, see:
+ http://eprint.iacr.org/2013/448
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242
+ (* Security fix *)
++--------------------------+
+Tue Jul 16 21:18:56 UTC 2013
+patches/packages/php-5.4.17-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an issue where XML in PHP does not properly consider
+ parsing depth, which allows remote attackers to cause a denial of service
+ (heap memory corruption) or possibly have unspecified other impact via a
+ crafted document that is processed by the xml_parse_into_struct function.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113
+ (* Security fix *)
++--------------------------+
+Wed Jul 10 07:15:30 UTC 2013
+patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txz: Rebuilt.
+ This update fixes a security issue where misuse of va_list could be used to
+ cause a denial of service for system services.
+ Vulnerability reported by Alexandru Cornea.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168
+ (* Security fix *)
++--------------------------+
+Sun Jul 7 01:31:24 UTC 2013
+patches/packages/httpd-2.4.4-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched htpasswd hash generation bug.
+ Thanks to MadMaverick9.
++--------------------------+
+Sat Jun 29 22:08:25 UTC 2013
+patches/packages/mozilla-firefox-17.0.7esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
+ (* Security fix *)
+ We had to switch to ESR here as well, as there's a problem running Firefox
+ 22.0 on Slackware 14.0 under KDE (crash when oxygen-gtk2 is installed).
+ Forcing people to uninstall oxygen-gtk2 isn't really an option for a
+ security fix, and upgrading to the latest oxygen-gtk2 did not help.
+ It's possible that future Firefox/Thunderbird security updates will always
+ come from the ESR branch.
+patches/packages/mozilla-thunderbird-17.0.7-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Thu Jun 27 23:56:34 UTC 2013
+patches/packages/ruby-1.9.3_p448-x86_64-1_slack14.0.txz: Upgraded.
+ This update patches a vulnerability in Ruby's SSL client that could allow
+ man-in-the-middle attackers to spoof SSL servers via a valid certificate
+ issued by a trusted certification authority.
+ For more information, see:
+ http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
+ (* Security fix *)
++--------------------------+
+Sun Jun 23 21:00:00 UTC 2013
+patches/packages/curl-7.29.0-x86_64-3_slack14.0.txz: Rebuilt.
+ This fixes a minor security issue where a decode buffer boundary flaw in
+ libcurl could lead to heap corruption.
+ For more information, see:
+ http://curl.haxx.se/docs/adv_20130622.html
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
+ (* Security fix *)
++--------------------------+
+Mon Jun 10 21:51:54 UTC 2013
+patches/packages/php-5.4.16-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release. It also fixes a security issue -- a heap-based
+ overflow in the quoted_printable_encode() function, which could be used by
+ a remote attacker to crash PHP or execute code as the 'apache' user.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
+ (* Security fix *)
++--------------------------+
+Mon Jun 3 22:10:16 UTC 2013
+patches/packages/linux-3.2.45/*: Rebuilt.
+ One more reverted commit. This one was leading to hangs on systems with
+ Intel graphics. The previous revert was also reverted in 3.2.46, but it
+ seems safer to just get this one manually than to take the newer kernel and
+ still have to do another patch to it anyway. Hopefully the third time is
+ the charm. :)
++--------------------------+
+Wed May 22 14:11:13 UTC 2013
+patches/packages/linux-3.2.45/*: Rebuilt.
+ It appears a bad commit slipped into 3.2.45 and it's causing problems on
+ systems that use Intel graphics. The commit has been reverted in the kernel
+ source packages and the kernels and modules have been rebuilt. If you ran
+ into the black screen problem before, this should fix it up.
++--------------------------+
+Mon May 20 21:01:33 UTC 2013
+patches/packages/linux-3.2.45/*: Upgraded.
+ Upgraded to new kernels that fix CVE-2013-2094, a bug that can allow local
+ users to gain a root shell. Be sure to upgrade your initrd and reinstall
+ LILO after upgrading the kernel packages.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
+ (* Security fix *)
++--------------------------+
+Thu May 16 21:42:08 UTC 2013
+patches/packages/ruby-1.9.3_p429-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue in DL and Fiddle included in Ruby where
+ tainted strings can be used by system calls regardless of the $SAFE level
+ setting.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065
+ http://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
+ (* Security fix *)
++--------------------------+
+Thu May 16 18:28:01 UTC 2013
+patches/packages/mozilla-thunderbird-17.0.6-x86_64-1_slack14.0.txz: Upgraded.
+ Here's the package that was missing from the last batch. The wrong entry in
+ the ChangeLog was removed to prevent slackpkg from having trouble with it.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Wed May 15 23:38:49 UTC 2013
+patches/packages/mozilla-firefox-21.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
++--------------------------+
+Fri Apr 19 21:24:48 UTC 2013
+patches/packages/xorg-server-1.12.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes an input flush bug with evdev. Under exceptional
+ conditions (keyboard input during device hotplugging), this could leak
+ a small amount of information intended for the X server.
+ This issue was evaluated to be of low impact.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
+ http://lists.x.org/archives/xorg-devel/2013-April/036014.html
+ (* Security fix *)
+patches/packages/xorg-server-xephyr-1.12.4-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/xorg-server-xnest-1.12.4-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/xorg-server-xvfb-1.12.4-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Wed Apr 17 02:09:43 UTC 2013
+patches/packages/seamonkey-2.17.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-solibs-2.17.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sun Apr 7 23:23:38 UTC 2013
+patches/packages/seamonkey-2.17-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.17-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Fri Apr 5 05:21:45 UTC 2013
+patches/packages/subversion-1.7.9-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes some denial of service bugs:
+ mod_dav_svn excessive memory usage from property changes
+ mod_dav_svn crashes on LOCK requests against activity URLs
+ mod_dav_svn crashes on LOCK requests against non-existant URLs
+ mod_dav_svn crashes on PROPFIND requests against activity URLs
+ mod_dav_svn crashes on out of range limit in log REPORT request
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884
+ (* Security fix *)
++--------------------------+
+Wed Apr 3 06:58:59 UTC 2013
+patches/packages/mozilla-firefox-20.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.5-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Fri Mar 29 00:27:36 UTC 2013
+patches/packages/libssh-0.5.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a possible denial of service issue.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176
+ (* Security fix *)
++--------------------------+
+Thu Mar 28 06:59:52 UTC 2013
+patches/packages/tumbler-0.1.25-x86_64-3_slack14.0.txz: Rebuilt.
+ Patched a bug that caused tumbler to hold files open preventing volumes from
+ being ejected.
++--------------------------+
+Wed Mar 27 06:09:29 UTC 2013
+patches/packages/bind-9.9.2_P2-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a critical defect in BIND 9 that allows an attacker
+ to cause excessive memory consumption in named or other programs linked
+ to libdns.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
+ https://kb.isc.org/article/AA-00871
+ (* Security fix *)
+patches/packages/dhcp-4.2.5_P1-x86_64-1_slack14.0.txz: Upgraded.
+ This update replaces the included BIND 9 code that the DHCP programs
+ link against. Those contained a defect that could possibly lead to
+ excessive memory consumption and a denial of service.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
+ (* Security fix *)
++--------------------------+
+Sat Mar 23 20:22:12 UTC 2013
+patches/packages/php-5.4.13-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes two security issues in SOAP:
+ Added check that soap.wsdl_cache_dir conforms to open_basedir.
+ Disabled external entities loading.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
+ (* Security fix *)
++--------------------------+
+Sat Mar 16 19:35:45 UTC 2013
+patches/packages/seamonkey-2.16.2-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-solibs-2.16.2-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sat Mar 16 07:10:09 UTC 2013
+patches/packages/ruby-1.9.3_p392-x86_64-1_slack14.0.txz: Upgraded.
+ This release includes security fixes about bundled JSON and REXML.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821
+ (* Security fix *)
++--------------------------+
+Thu Mar 14 03:55:33 UTC 2013
+patches/packages/perl-5.16.3-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a flaw in the rehashing code that can be exploited
+ to carry out a denial of service attack against code that uses arbitrary
+ user input as hash keys.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
+ (* Security fix *)
+patches/packages/seamonkey-2.16.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.16.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Tue Mar 12 06:59:27 UTC 2013
+patches/packages/glibc-zoneinfo-2013b-noarch-1_slack14.0.txz: Upgraded.
+ This package provides the latest timezone updates.
++--------------------------+
+Sat Mar 9 06:19:05 UTC 2013
+patches/packages/mozilla-firefox-19.0.2-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.4esr-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Thu Mar 7 00:16:35 UTC 2013
+patches/packages/sudo-1.8.6p7-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes security issues that could allow a user to run commands
+ without authenticating after the password timeout has already expired.
+ Note that the vulnerability did not permit a user to run commands other
+ than those allowed by the sudoers policy.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776
+ (* Security fix *)
++--------------------------+
+Sun Mar 3 22:10:56 UTC 2013
+patches/packages/httpd-2.4.4-x86_64-1_slack14.0.txz: Upgraded.
+ This update provides bugfixes and enhancements.
+ Two security issues are fixed:
+ * Various XSS flaws due to unescaped hostnames and URIs HTML output in
+ mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
+ [Jim Jagielski, Stefan Fritsch, Niels Heinen <heinenn google com>]
+ * XSS in mod_proxy_balancer manager interface. [Jim Jagielski,
+ Niels Heinen <heinenn google com>]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
+ (* Security fix *)
++--------------------------+
+Mon Feb 25 19:45:33 UTC 2013
+patches/packages/seamonkey-2.16-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.16-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Wed Feb 20 05:24:23 UTC 2013
+patches/packages/mozilla-firefox-19.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.3-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Fri Feb 15 22:46:52 UTC 2013
+patches/packages/pidgin-2.10.7-x86_64-3_slack14.0.txz: Rebuilt.
+ Fixed linking libirc.so with libsasl2.
+ Added Makefile.in and Makefile to the patch, and applied it after
+ running ./configure. Using autoreconf is not an option since most
+ versions of Slackware aren't using the same libtools versions as the
+ Pidgin developers are. Third times the charm?
+ Thanks to Willy Sudiarto Raharjo.
+patches/packages/polkit-0.105-x86_64-4_slack14.0.txz: Rebuilt.
+ Reverted a patch that set the members of the wheel group as the
+ authorized administrators. On Slackware, root is the administrator
+ and the wheel group is mostly unused. Thanks to Gérard Monpontet.
++--------------------------+
+Fri Feb 15 07:26:45 UTC 2013
+patches/packages/make-3.82-x86_64-4_slack14.0.txz: Rebuilt.
+ Applied patch containing upstream bugfixes.
+patches/packages/pidgin-2.10.7-x86_64-2_slack14.0.txz: Rebuilt.
+ Fixed IRC support. When building with SASL support (new in 2.10.7), the
+ IRC plugin needs to link against libsasl2, otherwise it will fail to load.
++--------------------------+
+Thu Feb 14 05:35:22 UTC 2013
+patches/packages/pidgin-2.10.7-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes several security issues:
+ Remote MXit user could specify local file path.
+ MXit buffer overflow reading data from network.
+ Sametime crash with long user IDs.
+ Crash when receiving a UPnP response with abnormally long values.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274
+ (* Security fix *)
++--------------------------+
+Tue Feb 12 21:33:16 UTC 2013
+patches/packages/curl-7.29.0-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched to fix a segfault when closing an unused multi.
+ Thanks to Willy Sudiarto Raharjo.
++--------------------------+
+Tue Feb 12 02:34:07 UTC 2013
+patches/packages/openssl-1.0.1e-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a regression in openssl-1.0.1d, where the fix for
+ CVE-2013-0169 caused data corruption on CPUs with AES-NI support.
+patches/packages/openssl-solibs-1.0.1e-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sat Feb 9 21:45:56 UTC 2013
+patches/packages/openssl-1.0.1d-x86_64-1_slack14.0.txz: Upgraded.
+ Make the decoding of SSLv3, TLS and DTLS CBC records constant time.
+ This addresses the flaw in CBC record processing discovered by
+ Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
+ at: http://www.isg.rhul.ac.uk/tls/
+ Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
+ Security Group at Royal Holloway, University of London
+ (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
+ Emilia Käsper for the initial patch.
+ (CVE-2013-0169)
+ [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]
+ Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode
+ ciphersuites which can be exploited in a denial of service attack.
+ Thanks go to and to Adam Langley <agl@chromium.org> for discovering
+ and detecting this bug and to Wolfgang Ettlinger
+ <wolfgang.ettlinger@gmail.com> for independently discovering this issue.
+ (CVE-2012-2686)
+ [Adam Langley]
+ Return an error when checking OCSP signatures when key is NULL.
+ This fixes a DoS attack. (CVE-2013-0166)
+ [Steve Henson]
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
+ (* Security fix *)
+patches/packages/openssl-solibs-1.0.1d-x86_64-1_slack14.0.txz: Upgraded.
+ (* Security fix *)
++--------------------------+
+Fri Feb 8 03:57:05 UTC 2013
+patches/packages/curl-7.29.0-x86_64-1_slack14.0.txz: Upgraded.
+ When negotiating SASL DIGEST-MD5 authentication, the function
+ Curl_sasl_create_digest_md5_message() uses the data provided from the
+ server without doing the proper length checks and that data is then
+ appended to a local fixed-size buffer on the stack. This vulnerability
+ can be exploited by someone who is in control of a server that a libcurl
+ based program is accessing with POP3, SMTP or IMAP. For applications
+ that accept user provided URLs, it is also thinkable that a malicious
+ user would feed an application with a URL to a server hosting code
+ targeting this flaw.
+ Affected versions: curl 7.26.0 to and including 7.28.1
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
+ (* Security fix *)
+patches/packages/sdl-1.2.14-x86_64-6_slack14.0.txz: Rebuilt.
+ Patched mouse clicking bug.
++--------------------------+
+Wed Feb 6 07:14:25 UTC 2013
+patches/packages/seamonkey-2.15.2-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-solibs-2.15.2-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/mozilla-firefox-18.0.2-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
++--------------------------+
+Tue Jan 22 23:40:16 UTC 2013
+patches/packages/mysql-5.5.29-x86_64-1_slack14.0.txz: Upgraded.
+ Upgraded to the latest upstream version to fix security issues and provide
+ other bug fixes and improvements. Note that some of the changes may
+ possibly introduce incompatibilities with the previous package.
+ (* Security fix *)
++--------------------------+
+Mon Jan 21 22:46:22 UTC 2013
+patches/packages/seamonkey-2.15.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-solibs-2.15.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Sun Jan 20 07:50:53 UTC 2013
+patches/packages/mozilla-firefox-18.0.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
++--------------------------+
+Wed Jan 16 02:54:52 UTC 2013
+patches/packages/freetype-2.4.11-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes several security bugs that could cause freetype to
+ crash or run programs upon opening a specially crafted file.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
+ (* Security fix *)
++--------------------------+
+Thu Jan 10 08:17:57 UTC 2013
+patches/packages/mozilla-firefox-18.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0.2-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
+patches/packages/seamonkey-2.15-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.15-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Fri Dec 7 01:41:59 UTC 2012
+patches/packages/bind-9.9.2_P1-x86_64-1_slack14.0.txz: Upgraded.
+ IMPORTANT NOTE: This package updates BIND from 9.7.6_P4 to
+ 9.8.4_P1 since the 9.7 series is no longer supported. It is
+ possible that some changes may be required to your local
+ configuration.
+ This release addresses some denial-of-service and other bugs.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868
+ (* Security fix *)
+patches/packages/libssh-0.5.3-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes several security bugs.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562
+ (* Security fix *)
+patches/packages/libxml2-2.8.0-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched a heap-based buffer underflow in the xmlParseAttValueComplex
+ function in parser.c in libxml2 2.9.0 and earlier that could allow a
+ remote attacker to cause a denial of service or possibly execute
+ arbitrary code via crafted entities in an XML document.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134
+ (* Security fix *)
+patches/packages/ruby-1.9.3_p327-x86_64-1_slack14.0.txz: Upgraded.
+ This release fixes a hash-flooding DoS vulnerability and many other bugs.
+ For more information, see:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5371
+ (* Security fix *)
+patches/packages/sqlite-3.7.14.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
++--------------------------+
+Tue Dec 4 05:52:37 UTC 2012
+patches/packages/mozilla-firefox-17.0.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-2.14.1-x86_64-1_slack14.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/seamonkey-solibs-2.14.1-x86_64-1_slack14.0.txz: Upgraded.
++--------------------------+
+Thu Nov 22 01:57:50 UTC 2012
+patches/packages/mozilla-firefox-17.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-17.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.14-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/seamonkey-2.14-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
++--------------------------+
+Wed Oct 31 00:32:25 UTC 2012
+patches/packages/mozilla-thunderbird-16.0.2-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.13.2-x86_64-1_slack14.0.txz: Upgraded.
+patches/packages/seamonkey-2.13.2-x86_64-1_slack14.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
++--------------------------+
+Sat Oct 27 01:13:00 UTC 2012
+patches/packages/mozilla-firefox-16.0.2-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
++--------------------------+
+Mon Oct 15 01:59:59 UTC 2012
+patches/packages/seamonkey-2.13.1-x86_64-1.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
+ (* Security fix *)
+patches/packages/seamonkey-solibs-2.13.1-x86_64-1.txz: Upgraded.
++--------------------------+
+Thu Oct 11 21:25:20 UTC 2012
+patches/packages/mozilla-firefox-16.0.1-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security vulnerability that could allow a malicious
+ site to potentially determine which websites users have visited and have
+ access to the URL or URL parameters.
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-16.0.1-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/thunderbird.html
+ (* Security fix *)
++--------------------------+
+Thu Oct 11 01:14:57 UTC 2012
+patches/packages/bind-9.9.1_P4-x86_64-1_slack14.0.txz: Upgraded.
+ This update fixes a security issue where a certain combination of records
+ in the RBT could cause named to hang while populating the additional
+ section of a response. [RT #31090]
+ (* Security fix *)
+patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txz: Rebuilt.
+ Patched to fix a compiler related bug in iptables-restore.
+ Thanks to linuxxer for the report and David Somero for a link to the patch.
++--------------------------+
+Wed Oct 10 03:06:03 UTC 2012
+patches/packages/mozilla-firefox-16.0-x86_64-1_slack14.0.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ http://www.mozilla.org/security/known-vulnerabilities/firefox.html
+ (* Security fix *)
++--------------------------+
Wed Sep 26 01:10:42 UTC 2012
Slackware 14.0 x86_64 stable is released!
diff --git a/FILELIST.TXT b/FILELIST.TXT
index 75e1dc30..62892be1 100644
--- a/FILELIST.TXT
+++ b/FILELIST.TXT
@@ -1,20 +1,6277 @@
-Wed Sep 26 03:38:46 UTC 2012
+Fri May 25 23:50:48 UTC 2018
Here is the file list for this directory. If you are using a
mirror site and find missing or extra files in the disk
subdirectories, please have the archive administrator refresh
the mirror.
-drwxr-xr-x 3 root root 4096 2012-09-26 03:38 .
--rw-r--r-- 1 root root 423531 2012-09-26 03:38 ./CHECKSUMS.md5
--rw-r--r-- 1 root root 198 2012-09-26 03:38 ./CHECKSUMS.md5.asc
--rw-r--r-- 1 root root 590029 2012-09-26 03:38 ./FILELIST.TXT
--rw-r--r-- 1 root root 229153 2012-09-26 03:38 ./READ_DVD.TXT
-drwxr-xr-x 19 root root 4096 2012-09-26 03:38 ./source
--rw-r--r-- 1 root root 383911 2012-09-26 03:38 ./source/CHECKSUMS.md5
--rw-r--r-- 1 root root 198 2012-09-26 03:38 ./source/CHECKSUMS.md5.asc
--rw-r--r-- 1 root root 542117 2012-09-26 03:38 ./source/FILE_LIST
--rw-r--r-- 1 root root 8380089 2012-09-26 03:38 ./source/MANIFEST.bz2
+drwxr-xr-x 11 root root 4096 2018-05-25 23:29 .
+-rw-r--r-- 1 root root 9963 2012-09-19 22:53 ./ANNOUNCE.14_0
+-rw-r--r-- 1 root root 20933 2006-10-02 04:36 ./BOOTING.TXT
+-rw-r--r-- 1 root root 15941 2012-09-19 23:00 ./CHANGES_AND_HINTS.TXT
+-rw-r--r-- 1 root root 906451 2018-05-17 04:27 ./CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2018-05-17 04:27 ./CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING
+-rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3
+-rw-r--r-- 1 root root 19531 2009-08-26 02:07 ./COPYRIGHT.TXT
+-rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT
+-rw-r--r-- 1 root root 416550 2018-05-25 23:29 ./ChangeLog.txt
+-rw-r--r-- 1 root root 1208394 2018-05-17 04:26 ./FILELIST.TXT
+-rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY
+-rw-r--r-- 1 root root 613454 2012-09-25 17:59 ./PACKAGES.TXT
+-rw-r--r-- 1 root root 9074 2012-09-24 19:27 ./README.TXT
+-rw-r--r-- 1 root root 3629 2012-09-17 18:39 ./README.initrd
+-rw-r--r-- 1 root root 34046 2012-09-18 22:03 ./README_CRYPT.TXT
+-rw-r--r-- 1 root root 8970 2012-09-18 22:03 ./README_LVM.TXT
+-rw-r--r-- 1 root root 17957 2011-03-15 18:32 ./README_RAID.TXT
+-rw-r--r-- 1 root root 4580 2012-09-19 23:37 ./RELEASE_NOTES
+-rw-r--r-- 1 root root 13855 2008-12-08 18:13 ./SPEAKUP_DOCS.TXT
+-rw-r--r-- 1 root root 17294 2008-12-08 18:13 ./SPEAK_INSTALL.TXT
+-rw-r--r-- 1 root root 58732 2010-05-18 21:47 ./Slackware-HOWTO
+-rw-r--r-- 1 root root 7040 2012-09-17 22:51 ./UPGRADE.TXT
+drwxr-xr-x 17 root root 4096 2012-08-30 23:54 ./extra
+-rw-r--r-- 1 root root 31390 2012-08-30 23:54 ./extra/CHECKSUMS.md5
+-rw-r--r-- 1 root root 198 2012-08-30 23:54 ./extra/CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 39730 2012-08-30 23:54 ./extra/FILE_LIST
+-rw-r--r-- 1 root root 86290 2012-08-30 23:54 ./extra/MANIFEST.bz2
+-rw-r--r-- 1 root root 32603 2012-08-30 23:54 ./extra/PACKAGES.TXT
+-rw-r--r-- 1 root root 149 2002-02-09 00:18 ./extra/README.TXT
+drwxr-xr-x 2 root root 20480 2009-08-14 20:40 ./extra/aspell-word-lists
+-rw-r--r-- 1 root root 171 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-af-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 868976 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-af-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-af-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-am-0.03_1-noarch-4.txt
+-rw-r--r-- 1 root root 106700 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-am-0.03_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-am-0.03_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 195 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-az-0.02_0-noarch-4.txt
+-rw-r--r-- 1 root root 126472 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-az-0.02_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-az-0.02_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 199 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-be-0.01-noarch-4.txt
+-rw-r--r-- 1 root root 9455764 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-be-0.01-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-be-0.01-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-bg-4.0_0-noarch-4.txt
+-rw-r--r-- 1 root root 5413300 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-bg-4.0_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-bg-4.0_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 193 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-bn-0.01.1_1-noarch-4.txt
+-rw-r--r-- 1 root root 582408 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-bn-0.01.1_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-bn-0.01.1_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 168 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-br-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 308936 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-br-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-br-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 185 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ca-20040130_1-noarch-4.txt
+-rw-r--r-- 1 root root 1052772 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ca-20040130_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ca-20040130_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 185 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-cs-20040614_1-noarch-4.txt
+-rw-r--r-- 1 root root 2049648 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-cs-20040614_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-cs-20040614_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 203 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-csb-0.02_0-noarch-4.txt
+-rw-r--r-- 1 root root 42324 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-csb-0.02_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-csb-0.02_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 167 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-cy-0.50_3-noarch-4.txt
+-rw-r--r-- 1 root root 1745716 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-cy-0.50_3-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-cy-0.50_3-noarch-4.txz.asc
+-rw-r--r-- 1 root root 182 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-da-1.4.42_1-noarch-4.txt
+-rw-r--r-- 1 root root 3045652 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-da-1.4.42_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-da-1.4.42_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 186 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-de-20030222_1-noarch-4.txt
+-rw-r--r-- 1 root root 2872868 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-de-20030222_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-de-20030222_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 167 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-el-0.50_3-noarch-4.txt
+-rw-r--r-- 1 root root 3216592 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-el-0.50_3-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-el-0.50_3-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-eo-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 3797376 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-eo-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-eo-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-es-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 2958592 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-es-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-es-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 176 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-et-0.1.21_1-noarch-4.txt
+-rw-r--r-- 1 root root 877160 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-et-0.1.21_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-et-0.1.21_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 188 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fa-0.02_0-noarch-4.txt
+-rw-r--r-- 1 root root 1488308 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fa-0.02_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fa-0.02_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 175 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fi-0.7_0-noarch-4.txt
+-rw-r--r-- 1 root root 606924 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fi-0.7_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-fi-0.7_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 186 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-fo-0.2.16_1-noarch-4.txt
+-rw-r--r-- 1 root root 997552 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-fo-0.2.16_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-fo-0.2.16_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 168 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-fr-0.50_3-noarch-4.txt
+-rw-r--r-- 1 root root 4365324 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-fr-0.50_3-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-fr-0.50_3-noarch-4.txz.asc
+-rw-r--r-- 1 root root 183 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ga-3.6_0-noarch-4.txt
+-rw-r--r-- 1 root root 2144676 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ga-3.6_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ga-3.6_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 194 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gd-0.1.1_1-noarch-4.txt
+-rw-r--r-- 1 root root 131084 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gd-0.1.1_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gd-0.1.1_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 170 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gl-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 2981948 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gl-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gl-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 200 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gu-0.02_0-noarch-4.txt
+-rw-r--r-- 1 root root 59216 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gu-0.02_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-gu-0.02_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 173 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gv-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 218880 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gv-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-gv-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 187 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-he-1.0_0-noarch-4.txt
+-rw-r--r-- 1 root root 1991800 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-he-1.0_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-he-1.0_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 191 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hi-0.01_0-noarch-4.txt
+-rw-r--r-- 1 root root 116448 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hi-0.01_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hi-0.01_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hil-0.11_0-noarch-4.txt
+-rw-r--r-- 1 root root 114780 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hil-0.11_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hil-0.11_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 170 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-hr-0.51_0-noarch-4.txt
+-rw-r--r-- 1 root root 1945240 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-hr-0.51_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-hr-0.51_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 209 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hsb-0.01_1-noarch-4.txt
+-rw-r--r-- 1 root root 318392 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hsb-0.01_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hsb-0.01_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 177 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hu-0.99.4.2_0-noarch-4.txt
+-rw-r--r-- 1 root root 1586716 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hu-0.99.4.2_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-hu-0.99.4.2_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 173 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-ia-0.50_1-noarch-4.txt
+-rw-r--r-- 1 root root 549808 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-ia-0.50_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-ia-0.50_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-id-1.2_0-noarch-4.txt
+-rw-r--r-- 1 root root 213320 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-id-1.2_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-id-1.2_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-is-0.51.1_0-noarch-4.txt
+-rw-r--r-- 1 root root 1505496 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-is-0.51.1_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:55 ./extra/aspell-word-lists/aspell-is-0.51.1_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 186 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-it-2.2_20050523_0-noarch-4.txt
+-rw-r--r-- 1 root root 643296 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-it-2.2_20050523_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-it-2.2_20050523_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 182 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ku-0.12_0-noarch-4.txt
+-rw-r--r-- 1 root root 55296 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ku-0.12_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ku-0.12_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 173 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-la-20020503_0-noarch-4.txt
+-rw-r--r-- 1 root root 122204 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-la-20020503_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-la-20020503_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lt-1.1+cvs20060103_0-noarch-4.txt
+-rw-r--r-- 1 root root 567968 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lt-1.1+cvs20060103_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lt-1.1+cvs20060103_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 175 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lv-0.5.5_1-noarch-4.txt
+-rw-r--r-- 1 root root 186808 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lv-0.5.5_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-lv-0.5.5_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 176 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mg-0.03_0-noarch-4.txt
+-rw-r--r-- 1 root root 116888 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mg-0.03_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mg-0.03_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 167 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mi-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 144836 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mi-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mi-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 172 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mk-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 1250820 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mk-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mk-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 192 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mn-0.01_0-noarch-4.txt
+-rw-r--r-- 1 root root 68124 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mn-0.01_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mn-0.01_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 193 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mr-0.10_0-noarch-4.txt
+-rw-r--r-- 1 root root 474624 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mr-0.10_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-mr-0.10_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 167 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ms-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 116524 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ms-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ms-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mt-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 5060516 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mt-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-mt-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 178 2009-08-13 02:40 ./extra/aspell-word-lists/aspell-nb-0.50.1_0-noarch-4.txt
+-rw-r--r-- 1 root root 3039436 2009-08-13 02:40 ./extra/aspell-word-lists/aspell-nb-0.50.1_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2009-08-13 02:40 ./extra/aspell-word-lists/aspell-nb-0.50.1_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 206 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-nds-0.01_0-noarch-4.txt
+-rw-r--r-- 1 root root 39836 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-nds-0.01_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-nds-0.01_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 167 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nl-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 1495132 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nl-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nl-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 179 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nn-0.50.1_1-noarch-4.txt
+-rw-r--r-- 1 root root 1907332 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nn-0.50.1_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-nn-0.50.1_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-no-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 1250336 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-no-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-no-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 176 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ny-0.01_0-noarch-4.txt
+-rw-r--r-- 1 root root 40792 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ny-0.01_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-ny-0.01_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 191 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-or-0.03_1-noarch-4.txt
+-rw-r--r-- 1 root root 14948 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-or-0.03_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-or-0.03_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 196 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-pa-0.01_1-noarch-4.txt
+-rw-r--r-- 1 root root 21904 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-pa-0.01_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-pa-0.01_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 168 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pl-0.51_0-noarch-4.txt
+-rw-r--r-- 1 root root 13943900 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pl-0.51_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pl-0.51_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 172 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pt-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 2279084 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pt-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-pt-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 246 2009-06-22 22:05 ./extra/aspell-word-lists/aspell-pt_BR-20080707_0-noarch-4.txt
+-rw-r--r-- 1 root root 2450800 2009-06-22 22:05 ./extra/aspell-word-lists/aspell-pt_BR-20080707_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2009-06-22 22:05 ./extra/aspell-word-lists/aspell-pt_BR-20080707_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 196 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-qu-0.02_0-noarch-4.txt
+-rw-r--r-- 1 root root 303040 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-qu-0.02_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-qu-0.02_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 170 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ro-0.50_2-noarch-4.txt
+-rw-r--r-- 1 root root 281784 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ro-0.50_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-ro-0.50_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 192 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ru-0.99f7_1-noarch-4.txt
+-rw-r--r-- 1 root root 1425980 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ru-0.99f7_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ru-0.99f7_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 173 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-rw-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 37644 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-rw-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-rw-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-sc-1.0-noarch-4.txt
+-rw-r--r-- 1 root root 4911444 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-sc-1.0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-sc-1.0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 168 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-sk-0.52_0-noarch-4.txt
+-rw-r--r-- 1 root root 4641936 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-sk-0.52_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:56 ./extra/aspell-word-lists/aspell-sk-0.52_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sl-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 5272152 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sl-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sl-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-sr-0.02-noarch-4.txt
+-rw-r--r-- 1 root root 3705620 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-sr-0.02-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-sr-0.02-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sv-0.51_0-noarch-4.txt
+-rw-r--r-- 1 root root 985180 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sv-0.51_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sv-0.51_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sw-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 301120 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sw-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-sw-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 191 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ta-20040424_1-noarch-4.txt
+-rw-r--r-- 1 root root 99988 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ta-20040424_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-ta-20040424_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 195 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-te-0.01_2-noarch-4.txt
+-rw-r--r-- 1 root root 906648 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-te-0.01_2-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-te-0.01_2-noarch-4.txz.asc
+-rw-r--r-- 1 root root 179 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tet-0.1.1-noarch-4.txt
+-rw-r--r-- 1 root root 65792 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tet-0.1.1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tet-0.1.1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 175 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tl-0.02_1-noarch-4.txt
+-rw-r--r-- 1 root root 97512 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tl-0.02_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tl-0.02_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 176 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tn-1.0.1_0-noarch-4.txt
+-rw-r--r-- 1 root root 42928 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tn-1.0.1_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:58 ./extra/aspell-word-lists/aspell-tn-1.0.1_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-tr-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 494344 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-tr-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-tr-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 171 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-uk-0.51_0-noarch-4.txt
+-rw-r--r-- 1 root root 4719068 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-uk-0.51_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-uk-0.51_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 200 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uk-1.1_0-noarch-4.txt
+-rw-r--r-- 1 root root 527632 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uk-1.1_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uk-1.1_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uz-0.5_0-noarch-4.txt
+-rw-r--r-- 1 root root 235116 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uz-0.5_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-uz-0.5_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 193 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-vi-0.01.1_1-noarch-4.txt
+-rw-r--r-- 1 root root 42408 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-vi-0.01.1_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-vi-0.01.1_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 169 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-wa-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 647916 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-wa-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-wa-0.50_0-noarch-4.txz.asc
+-rw-r--r-- 1 root root 190 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-yi-0.01.1_1-noarch-4.txt
+-rw-r--r-- 1 root root 396496 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-yi-0.01.1_1-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:59 ./extra/aspell-word-lists/aspell-yi-0.01.1_1-noarch-4.txz.asc
+-rw-r--r-- 1 root root 166 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-zu-0.50_0-noarch-4.txt
+-rw-r--r-- 1 root root 489764 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-zu-0.50_0-noarch-4.txz
+-rw-r--r-- 1 root root 197 2008-10-03 20:57 ./extra/aspell-word-lists/aspell-zu-0.50_0-noarch-4.txz.asc
+drwxr-xr-x 2 root root 4096 2012-07-25 02:27 ./extra/bash-completion
+-rw-r--r-- 1 root root 669 2012-07-25 01:11 ./extra/bash-completion/bash-completion-2.0-noarch-2.txt
+-rw-r--r-- 1 root root 139396 2012-07-25 01:11 ./extra/bash-completion/bash-completion-2.0-noarch-2.txz
+-rw-r--r-- 1 root root 198 2012-07-25 01:11 ./extra/bash-completion/bash-completion-2.0-noarch-2.txz.asc
+drwxr-xr-x 2 root root 4096 2012-06-25 02:53 ./extra/bittornado
+-rw-r--r-- 1 root root 444 2012-06-23 18:20 ./extra/bittornado/bittornado-0.3.18-noarch-3.txt
+-rw-r--r-- 1 root root 236800 2012-06-23 18:20 ./extra/bittornado/bittornado-0.3.18-noarch-3.txz
+-rw-r--r-- 1 root root 198 2012-06-23 18:20 ./extra/bittornado/bittornado-0.3.18-noarch-3.txz.asc
+drwxr-xr-x 2 root root 4096 2012-06-25 02:53 ./extra/bittorrent
+-rw-r--r-- 1 root root 1279 2006-02-08 01:38 ./extra/bittorrent/README
+-rw-r--r-- 1 root root 613 2012-06-23 18:21 ./extra/bittorrent/bittorrent-4.4.0-noarch-4.txt
+-rw-r--r-- 1 root root 337716 2012-06-23 18:21 ./extra/bittorrent/bittorrent-4.4.0-noarch-4.txz
+-rw-r--r-- 1 root root 198 2012-06-23 18:21 ./extra/bittorrent/bittorrent-4.4.0-noarch-4.txz.asc
+drwxr-xr-x 2 root root 4096 2012-06-25 02:53 ./extra/brltty
+-rw-r--r-- 1 root root 326 2012-06-23 18:17 ./extra/brltty/brltty-4.4-x86_64-1.txt
+-rw-r--r-- 1 root root 1672248 2012-06-23 18:17 ./extra/brltty/brltty-4.4-x86_64-1.txz
+-rw-r--r-- 1 root root 198 2012-06-23 18:17 ./extra/brltty/brltty-4.4-x86_64-1.txz.asc
+drwxr-xr-x 2 root root 4096 2012-06-25 02:53 ./extra/emacspeak
+-rw-r--r-- 1 root root 6992 2012-06-23 21:23 ./extra/emacspeak/HOWTO_emacspeak-on-slack.txt
+-rw-r--r-- 1 root root 665 2012-06-23 20:51 ./extra/emacspeak/emacspeak-36.0-x86_64-1.txt
+-rw-r--r-- 1 root root 4238764 2012-06-23 20:51 ./extra/emacspeak/emacspeak-36.0-x86_64-1.txz
+-rw-r--r-- 1 root root 198 2012-06-23 20:51 ./extra/emacspeak/emacspeak-36.0-x86_64-1.txz.asc
+lrwxrwxrwx 1 root root 25 2009-08-23 23:37 ./extra/flashplayer-plugin -> source/flashplayer-plugin
+drwxr-xr-x 2 root root 4096 2012-07-29 16:35 ./extra/google-chrome
+-rw-r--r-- 1 root root 1448 2012-07-29 16:35 ./extra/google-chrome/README
+-rw-r--r-- 1 root root 714 2011-04-03 05:15 ./extra/google-chrome/google-chrome-pam-solibs-1.1.3-x86_64-1.txt
+-rw-r--r-- 1 root root 20068 2011-04-03 05:15 ./extra/google-chrome/google-chrome-pam-solibs-1.1.3-x86_64-1.txz
+-rw-r--r-- 1 root root 198 2011-04-03 05:15 ./extra/google-chrome/google-chrome-pam-solibs-1.1.3-x86_64-1.txz.asc
+-rwxr-xr-x 1 root root 4059 2012-08-01 18:48 ./extra/google-chrome/google-chrome.SlackBuild
+-rw-r--r-- 1 root root 844 2011-03-22 05:07 ./extra/google-chrome/slack-desc
+lrwxrwxrwx 1 root root 11 2012-07-30 20:41 ./extra/java -> source/java
+drwxr-xr-x 2 root root 4096 2009-05-19 20:54 ./extra/mplayerplug-in
+-rw-r--r-- 1 root root 534 2009-05-19 19:32 ./extra/mplayerplug-in/mplayerplug-in-3.55-x86_64-1.txt
+-rw-r--r-- 1 root root 176148 2009-05-19 19:32 ./extra/mplayerplug-in/mplayerplug-in-3.55-x86_64-1.txz
+-rw-r--r-- 1 root root 197 2009-05-19 19:32 ./extra/mplayerplug-in/mplayerplug-in-3.55-x86_64-1.txz.asc
+drwxr-xr-x 2 root root 4096 2010-05-03 08:59 ./extra/partitionmanager
+-rw-r--r-- 1 root root 391 2010-05-03 08:42 ./extra/partitionmanager/partitionmanager-1.0.2-x86_64-1.txt
+-rw-r--r-- 1 root root 423800 2010-05-03 08:42 ./extra/partitionmanager/partitionmanager-1.0.2-x86_64-1.txz
+-rw-r--r-- 1 root root 198 2010-05-03 08:42 ./extra/partitionmanager/partitionmanager-1.0.2-x86_64-1.txz.asc
+drwxr-xr-x 2 root root 4096 2012-06-25 02:53 ./extra/recordmydesktop
+-rw-r--r-- 1 root root 674 2012-06-23 18:23 ./extra/recordmydesktop/recordmydesktop-0.3.8.1-x86_64-3.txt
+-rw-r--r-- 1 root root 130060 2012-06-23 18:23 ./extra/recordmydesktop/recordmydesktop-0.3.8.1-x86_64-3.txz
+-rw-r--r-- 1 root root 198 2012-06-23 18:23 ./extra/recordmydesktop/recordmydesktop-0.3.8.1-x86_64-3.txz.asc
+drwxr-xr-x 17 root root 4096 2012-08-27 17:16 ./extra/source
+drwxr-xr-x 2 root root 4096 2012-07-25 00:01 ./extra/source/bash-completion
+-rw-r--r-- 1 root root 250560 2012-06-19 06:06 ./extra/source/bash-completion/bash-completion-2.0.tar.bz2
+-rwxr-xr-x 1 root root 2996 2012-07-25 00:01 ./extra/source/bash-completion/bash-completion.SlackBuild
+-rw-r--r-- 1 root root 458 2011-03-22 03:01 ./extra/source/bash-completion/fixup-sh-script-completions.diff.gz
+-rw-r--r-- 1 root root 1135 2009-07-15 06:04 ./extra/source/bash-completion/slack-desc
+-rw-r--r-- 1 root root 701 2012-07-25 00:00 ./extra/source/bash-completion/slackpkg-slapt-get-Update-the-list-of-package-sets.patch.gz
+drwxr-xr-x 2 root root 4096 2007-02-10 02:08 ./extra/source/bittornado
+-rw-r--r-- 1 root root 159270 2006-12-23 20:52 ./extra/source/bittornado/BitTornado-0.3.18.tar.bz2
+-rwxr-xr-x 1 root root 1026 2012-06-23 18:20 ./extra/source/bittornado/bittornado.SlackBuild
+-rw-r--r-- 1 root root 913 2005-07-14 22:53 ./extra/source/bittornado/btdownloadxterm.sh.gz
+-rw-r--r-- 1 root root 283 2006-02-08 01:28 ./extra/source/bittornado/doinst.sh.gz
+-rw-r--r-- 1 root root 905 2005-01-04 06:25 ./extra/source/bittornado/slack-desc
+drwxr-xr-x 2 root root 4096 2009-05-19 19:16 ./extra/source/bittorrent
+-rw-r--r-- 1 root root 678768 2006-01-31 20:24 ./extra/source/bittorrent/BitTorrent-4.4.0.tar.bz2
+-rw-r--r-- 1 root root 940 2006-02-08 01:07 ./extra/source/bittorrent/bittorrent-xterm.sh.gz
+-rwxr-xr-x 1 root root 2473 2012-06-23 18:21 ./extra/source/bittorrent/bittorrent.SlackBuild
+-rw-r--r-- 1 root root 270 2006-02-08 01:08 ./extra/source/bittorrent/doinst.sh.gz
+-rw-r--r-- 1 root root 1074 2003-09-21 04:50 ./extra/source/bittorrent/slack-desc
+drwxr-xr-x 2 root root 4096 2012-06-23 18:16 ./extra/source/brltty
+-rw-r--r-- 1 root root 2018008 2012-06-07 12:21 ./extra/source/brltty/brltty-4.4.tar.xz
+-rwxr-xr-x 1 root root 4016 2012-06-23 18:16 ./extra/source/brltty/brltty.SlackBuild
+-rw-r--r-- 1 root root 783 2002-06-07 04:09 ./extra/source/brltty/slack-desc
+drwxr-xr-x 2 root root 4096 2012-06-23 18:28 ./extra/source/emacspeak
+-rw-r--r-- 1 root root 4103616 2012-05-03 23:31 ./extra/source/emacspeak/emacspeak-36.0.tar.xz
+-rwxr-xr-x 1 root root 4438 2011-03-12 20:44 ./extra/source/emacspeak/emacspeak.SlackBuild
+-rw-r--r-- 1 root root 513 2011-03-12 20:43 ./extra/source/emacspeak/emacspeak.tcl8.5.diff.gz
+-rw-r--r-- 1 root root 1125 2002-06-07 01:43 ./extra/source/emacspeak/slack-desc
+drwxr-xr-x 2 root root 4096 2011-03-08 23:06 ./extra/source/flashplayer-plugin
+-rwxr-xr-- 1 root root 8964 2012-06-19 07:12 ./extra/source/flashplayer-plugin/flashplayer-plugin.SlackBuild
+-rw-r--r-- 1 root root 1017 2008-12-16 13:11 ./extra/source/flashplayer-plugin/slack-desc
+drwxr-xr-x 2 root root 4096 2009-05-19 21:29 ./extra/source/grub
+-rw-r--r-- 1 root root 7697 2009-03-14 03:58 ./extra/source/grub/grub-0.97-x86_64.patch.gz
+-rw-r--r-- 1 root root 971783 2005-07-31 00:45 ./extra/source/grub/grub-0.97.tar.gz
+-rw-r--r-- 1 root root 65 2005-05-08 03:16 ./extra/source/grub/grub-0.97.tar.gz.sig
+-rwxr-xr-x 1 root root 3549 2009-05-19 20:11 ./extra/source/grub/grub.SlackBuild
+-rw-r--r-- 1 root root 1746 2008-03-05 06:43 ./extra/source/grub/grub_support_256byte_inode.patch.gz
+-rw-r--r-- 1 root root 11715 2006-03-25 17:05 ./extra/source/grub/grubconfig-1.28.tar.gz
+-rw-r--r-- 1 root root 466 2007-06-06 03:32 ./extra/source/grub/grubconfig_localefix.patch.gz
+-rw-r--r-- 1 root root 959 2005-09-01 15:26 ./extra/source/grub/slack-desc
+drwxr-xr-x 3 root root 4096 2012-07-30 19:20 ./extra/source/java
+-rw-r--r-- 1 root root 654 2012-07-30 19:32 ./extra/source/java/README
+-rwxr-xr-x 1 root root 5687 2012-08-02 15:50 ./extra/source/java/java.SlackBuild
+drwxr-xr-x 2 root root 4096 2012-07-30 18:44 ./extra/source/java/profile.d
+-rwxr-xr-x 1 root root 143 2007-08-29 00:32 ./extra/source/java/profile.d/jdk.csh
+-rwxr-xr-x 1 root root 146 2007-08-29 00:33 ./extra/source/java/profile.d/jdk.sh
+-rwxr-xr-x 1 root root 122 2009-04-29 17:28 ./extra/source/java/profile.d/jre.csh
+-rwxr-xr-x 1 root root 125 2009-04-29 17:29 ./extra/source/java/profile.d/jre.sh
+-rw-r--r-- 1 root root 822 2010-12-18 23:16 ./extra/source/java/slack-desc.jdk
+-rw-r--r-- 1 root root 864 2012-07-10 20:02 ./extra/source/java/slack-desc.jre
+drwxr-xr-x 2 root root 4096 2009-05-19 19:29 ./extra/source/mplayerplug-in
+-rw-r--r-- 1 root root 281845 2008-06-24 13:19 ./extra/source/mplayerplug-in/mplayerplug-in-3.55.tar.gz
+-rwxr-xr-- 1 root root 8298 2009-05-19 20:12 ./extra/source/mplayerplug-in/mplayerplug-in.SlackBuild
+-rw-r--r-- 1 root root 999 2006-11-06 21:20 ./extra/source/mplayerplug-in/slack-desc
+drwxr-xr-x 3 root root 4096 2011-04-03 05:16 ./extra/source/pam
+-rw-r--r-- 1 root root 863472 2010-10-28 14:19 ./extra/source/pam/Linux-PAM-1.1.3.tar.xz
+-rwxr-xr-x 1 root root 3514 2011-04-03 05:15 ./extra/source/pam/make-pam-solibs-for-chrome.sh
+-rw-r--r-- 1 root root 36304 2008-12-16 15:14 ./extra/source/pam/pam-redhat-0.99.10-1.tar.bz2
+-rwxr-xr-x 1 root root 5966 2011-04-03 04:43 ./extra/source/pam/pam.SlackBuild
+drwxr-xr-x 2 root root 4096 2011-04-03 04:29 ./extra/source/pam/patches
+-rw-r--r-- 1 root root 508 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.0.90-redhat-modules.patch.gz
+-rw-r--r-- 1 root root 947 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.0.91-std-noclose.patch.gz
+-rw-r--r-- 1 root root 354 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.0-notally.patch.gz
+-rw-r--r-- 1 root root 11569 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.1-faillock.patch.gz
+-rw-r--r-- 1 root root 443 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.2-noflex.patch.gz
+-rw-r--r-- 1 root root 1893 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-faillock-screensaver.patch.gz
+-rw-r--r-- 1 root root 976 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-limits-nosetreuid.patch.gz
+-rw-r--r-- 1 root root 3174 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-limits-range.patch.gz
+-rw-r--r-- 1 root root 487 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-nouserenv.patch.gz
+-rw-r--r-- 1 root root 667 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-pwhistory-incomplete.patch.gz
+-rw-r--r-- 1 root root 1590 2011-02-08 14:09 ./extra/source/pam/patches/pam-1.1.3-securetty-console.patch.gz
+-rw-r--r-- 1 root root 896 2011-04-03 03:08 ./extra/source/pam/slack-desc
+drwxr-xr-x 2 root root 4096 2010-05-03 07:40 ./extra/source/partitionmanager
+-rw-r--r-- 1 root root 118 2007-12-24 16:27 ./extra/source/partitionmanager/doinst.sh.gz
+-rw-r--r-- 1 root root 292808 2010-04-24 10:00 ./extra/source/partitionmanager/partitionmanager-1.0.2.tar.xz
+-rwxr-xr-x 1 root root 3258 2010-05-03 07:41 ./extra/source/partitionmanager/partitionmanager.SlackBuild
+-rw-r--r-- 1 root root 852 2009-01-13 16:02 ./extra/source/partitionmanager/slack-desc
+drwxr-xr-x 2 root root 4096 2009-05-19 20:26 ./extra/source/recordmydesktop
+-rw-r--r-- 1 root root 185528 2008-11-23 15:35 ./extra/source/recordmydesktop/qt-recordmydesktop-0.3.8.tar.gz
+-rw-r--r-- 1 root root 198732 2008-12-13 17:56 ./extra/source/recordmydesktop/recordmydesktop-0.3.8.1.tar.gz
+-rwxr-xr-- 1 root root 8651 2012-06-28 21:07 ./extra/source/recordmydesktop/recordmydesktop.SlackBuild
+-rw-r--r-- 1 root root 1140 2010-02-19 15:58 ./extra/source/recordmydesktop/slack-desc
+drwxr-xr-x 2 root root 4096 2009-06-03 00:11 ./extra/source/tightvnc
+-rw-r--r-- 1 root root 8109 2009-06-02 21:35 ./extra/source/tightvnc/_tightvnc.tar.gz
+-rw-r--r-- 1 root root 387 2009-06-02 22:04 ./extra/source/tightvnc/doinst.sh.gz
+-rw-r--r-- 1 root root 989 2008-12-04 21:29 ./extra/source/tightvnc/slack-desc
+-rw-r--r-- 1 root root 1549080 2009-03-06 05:15 ./extra/source/tightvnc/tightvnc-1.3.10_unixsrc.tar.xz
+-rwxr-xr-- 1 root root 4093 2009-06-14 18:18 ./extra/source/tightvnc/tightvnc.SlackBuild
+-rw-r--r-- 1 root root 728 2009-06-02 21:57 ./extra/source/tightvnc/tightvnc.paths-and-perms.diff.gz
+drwxr-xr-x 2 root root 4096 2012-05-09 19:10 ./extra/source/wicd
+-rw-r--r-- 1 root root 719 2012-03-19 16:58 ./extra/source/wicd/README.SLACKWARE
+-rw-r--r-- 1 root root 512 2012-03-12 01:39 ./extra/source/wicd/doinst.sh.gz
+-rw-r--r-- 1 root root 863 2009-06-05 15:22 ./extra/source/wicd/slack-desc
+-rw-r--r-- 1 root root 309 2012-05-09 19:09 ./extra/source/wicd/wicd-1.7.2.4.sanitize.string.bugfix.diff.gz
+-rw-r--r-- 1 root root 336140 2012-04-30 19:38 ./extra/source/wicd/wicd-1.7.2.4.tar.xz
+-rwxr-xr-x 1 root root 3516 2012-08-09 17:57 ./extra/source/wicd/wicd.SlackBuild
+drwxr-xr-x 2 root root 4096 2012-08-27 17:15 ./extra/source/xf86-video-fbdev
+-rw-r--r-- 1 root root 878 2012-05-08 16:28 ./extra/source/xf86-video-fbdev/slack-desc
+-rw-r--r-- 1 root root 236328 2012-07-02 12:04 ./extra/source/xf86-video-fbdev/xf86-video-fbdev-0.4.3.tar.xz
+-rwxr-xr-x 1 root root 3996 2012-08-27 17:16 ./extra/source/xf86-video-fbdev/xf86-video-fbdev.SlackBuild
+drwxr-xr-x 2 root root 4096 2009-06-03 23:48 ./extra/tightvnc
+-rw-r--r-- 1 root root 530 2009-06-03 00:11 ./extra/tightvnc/tightvnc-1.3.10-x86_64-1.txt
+-rw-r--r-- 1 root root 777368 2009-06-03 00:11 ./extra/tightvnc/tightvnc-1.3.10-x86_64-1.txz
+-rw-r--r-- 1 root root 197 2009-06-03 00:11 ./extra/tightvnc/tightvnc-1.3.10-x86_64-1.txz.asc
+drwxr-xr-x 2 root root 4096 2012-08-09 22:46 ./extra/wicd
+-rw-r--r-- 1 root root 719 2012-03-19 16:58 ./extra/wicd/README.SLACKWARE
+-rw-r--r-- 1 root root 407 2012-08-09 17:57 ./extra/wicd/wicd-1.7.2.4-x86_64-4.txt
+-rw-r--r-- 1 root root 349952 2012-08-09 17:57 ./extra/wicd/wicd-1.7.2.4-x86_64-4.txz
+-rw-r--r-- 1 root root 198 2012-08-09 17:57 ./extra/wicd/wicd-1.7.2.4-x86_64-4.txz.asc
+drwxr-xr-x 2 root root 4096 2012-08-30 23:54 ./extra/xf86-video-fbdev
+-rw-r--r-- 1 root root 411 2012-08-27 17:16 ./extra/xf86-video-fbdev/xf86-video-fbdev-0.4.3-x86_64-1.txt
+-rw-r--r-- 1 root root 10756 2012-08-27 17:16 ./extra/xf86-video-fbdev/xf86-video-fbdev-0.4.3-x86_64-1.txz
+-rw-r--r-- 1 root root 198 2012-08-27 17:16 ./extra/xf86-video-fbdev/xf86-video-fbdev-0.4.3-x86_64-1.txz.asc
+drwxr-xr-x 2 root root 4096 2011-01-31 03:46 ./extra/xf86-video-nouveau-blacklist
+-rw-r--r-- 1 root root 645 2010-04-27 21:47 ./extra/xf86-video-nouveau-blacklist/xf86-video-nouveau-blacklist-noarch-1.txt
+-rw-r--r-- 1 root root 880 2010-04-27 21:47 ./extra/xf86-video-nouveau-blacklist/xf86-video-nouveau-blacklist-noarch-1.txz
+-rw-r--r-- 1 root root 198 2010-04-27 21:47 ./extra/xf86-video-nouveau-blacklist/xf86-video-nouveau-blacklist-noarch-1.txz.asc
+drwxr-xr-x 3 root root 4096 2012-09-24 18:48 ./isolinux
+-rw-r--r-- 1 root root 5052 2012-09-20 20:42 ./isolinux/README.TXT
+-rw-r--r-- 1 root root 788 2007-03-17 19:50 ./isolinux/README_SPLIT.TXT
+-rw-r--r-- 1 root root 467 2012-09-04 19:09 ./isolinux/f2.txt
+-rw-r--r-- 1 root root 25691891 2012-09-24 18:43 ./isolinux/initrd.img
+-rw-r--r-- 1 root root 50 2003-01-18 00:02 ./isolinux/iso.sort
+-rw-r--r-- 1 root root 24576 2012-06-25 16:21 ./isolinux/isolinux.bin
+-rw-r--r-- 1 root root 417 2011-03-25 03:15 ./isolinux/isolinux.cfg
+-rw-r--r-- 1 root root 642 2012-09-17 21:11 ./isolinux/message.txt
+drwxr-xr-x 2 root root 4096 2003-03-17 07:31 ./isolinux/sbootmgr
+-rwxr-xr-x 1 root root 36064 1995-05-12 01:23 ./isolinux/sbootmgr/RAWRITE.EXE
+-rw-r--r-- 1 root root 2138 1997-12-01 01:21 ./isolinux/sbootmgr/RAWRITE12.DOC
+-rwxr-xr-x 1 root root 13052 1997-12-01 01:21 ./isolinux/sbootmgr/RAWRITE12.EXE
+lrwxrwxrwx 1 root root 11 2009-08-23 23:37 ./isolinux/sbootmgr/RAWRITE13.EXE -> RAWRITE.EXE
+-rw-r--r-- 1 root root 6170 2000-08-29 08:23 ./isolinux/sbootmgr/RAWRITENT.DOC
+-rwxr-xr-x 1 root root 24576 2000-08-29 08:26 ./isolinux/sbootmgr/RAWRITENT.EXE
+-rw-r--r-- 1 root root 1291 2003-03-17 07:31 ./isolinux/sbootmgr/README.TXT
+-rw-r--r-- 1 root root 110592 2003-03-16 08:38 ./isolinux/sbootmgr/sbootmgr.dsk
+-rw-r--r-- 1 root root 2943 2012-07-22 21:24 ./isolinux/setpkg
+drwxr-xr-x 5 root root 4096 2012-09-17 21:11 ./kernels
+-rw-r--r-- 1 root root 39 2012-09-17 21:11 ./kernels/VERSIONS.TXT
+drwxr-xr-x 2 root root 4096 2012-09-17 19:19 ./kernels/huge.s
+-rw-r--r-- 1 root root 659081 2012-09-17 19:19 ./kernels/huge.s/System.map.gz
+-rw-r--r-- 1 root root 6192448 2012-09-17 19:19 ./kernels/huge.s/bzImage
+-rw-r--r-- 1 root root 121324 2012-09-17 19:16 ./kernels/huge.s/config
+drwxr-xr-x 2 root root 4096 2011-03-25 03:15 ./kernels/memtest
+-rw-r--r-- 1 root root 60 2011-03-24 00:19 ./kernels/memtest/README
+-rw-r--r-- 1 root root 164504 2011-03-23 23:53 ./kernels/memtest/memtest
+drwxr-xr-x 2 root root 4096 2011-03-02 22:16 ./kernels/speakup.s
+-rw-r--r-- 1 root root 240 2011-03-02 22:16 ./kernels/speakup.s/README.TXT
+drwxr-xr-x 3 root root 4096 2016-02-03 23:02 ./pasture
+-rw-r--r-- 1 root root 1282 2016-02-03 23:02 ./pasture/CHECKSUMS.md5
+-rw-r--r-- 1 root root 181 2016-02-03 23:02 ./pasture/CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 1358 2016-02-03 23:02 ./pasture/FILE_LIST
+-rw-r--r-- 1 root root 109353 2016-02-03 23:02 ./pasture/MANIFEST.bz2
+-rw-r--r-- 1 root root 774 2016-02-03 23:02 ./pasture/PACKAGES.TXT
+-rw-r--r-- 1 root root 376 2015-09-30 01:55 ./pasture/php-5.4.45-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 8357380 2015-09-30 01:55 ./pasture/php-5.4.45-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-09-30 01:55 ./pasture/php-5.4.45-x86_64-1_slack14.0.txz.asc
+drwxr-xr-x 3 root root 4096 2016-02-03 21:50 ./pasture/source
+drwxr-xr-x 3 root root 4096 2015-09-30 01:49 ./pasture/source/php
+-rw-r--r-- 1 root root 428 2012-08-09 01:10 ./pasture/source/php/doinst.sh.gz
+-rwxr-xr-x 1 root root 59 2015-09-30 01:46 ./pasture/source/php/fetch-php.sh
+-rw-r--r-- 1 root root 1022 2009-10-02 23:56 ./pasture/source/php/mod_php.conf.example
+drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear
+-rw-r--r-- 1 root root 10613136 2015-09-04 19:00 ./pasture/source/php/php-5.4.45.tar.xz
+-rw-r--r-- 1 root root 531 2012-05-21 15:34 ./pasture/source/php/php-fpm.conf.diff.gz
+-rwxr-xr-x 1 root root 9358 2015-04-15 18:30 ./pasture/source/php/php.SlackBuild
+-rw-r--r-- 1 root root 724 2012-08-09 01:06 ./pasture/source/php/php.ini-development.diff.gz
+-rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc
+drwxr-xr-x 4 root root 4096 2018-05-25 23:50 ./patches
+-rw-r--r-- 1 root root 142356 2018-05-25 23:50 ./patches/CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2018-05-25 23:50 ./patches/CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 201923 2018-05-25 23:50 ./patches/FILE_LIST
+-rw-r--r-- 1 root root 4660909 2018-05-25 23:50 ./patches/MANIFEST.bz2
+-rw-r--r-- 1 root root 83106 2018-05-25 23:50 ./patches/PACKAGES.TXT
+drwxr-xr-x 3 root root 28672 2018-05-25 23:50 ./patches/packages
+-rw-r--r-- 1 root root 625 2016-01-25 21:05 ./patches/packages/MPlayer-1.2_20160125-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 13381656 2016-01-25 21:05 ./patches/packages/MPlayer-1.2_20160125-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-01-25 21:05 ./patches/packages/MPlayer-1.2_20160125-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 275 2014-03-31 19:50 ./patches/packages/apr-1.5.0-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 231124 2014-03-31 19:50 ./patches/packages/apr-1.5.0-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-03-31 19:50 ./patches/packages/apr-1.5.0-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 483 2014-03-31 19:47 ./patches/packages/apr-util-1.5.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 124508 2014-03-31 19:47 ./patches/packages/apr-util-1.5.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-03-31 19:47 ./patches/packages/apr-util-1.5.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 510 2017-09-07 20:28 ./patches/packages/bash-4.2.053-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 1046016 2017-09-07 20:28 ./patches/packages/bash-4.2.053-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-09-07 20:28 ./patches/packages/bash-4.2.053-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 336 2018-01-17 03:09 ./patches/packages/bind-9.9.11_P1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 2218040 2018-01-17 03:09 ./patches/packages/bind-9.9.11_P1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-01-17 03:09 ./patches/packages/bind-9.9.11_P1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 424 2015-12-19 22:31 ./patches/packages/blueman-r708-x86_64-3_slack14.0.txt
+-rw-r--r-- 1 root root 539804 2015-12-19 22:31 ./patches/packages/blueman-r708-x86_64-3_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-12-19 22:31 ./patches/packages/blueman-r708-x86_64-3_slack14.0.txz.asc
+-rw-r--r-- 1 root root 347 2017-09-14 17:21 ./patches/packages/bluez-4.99-x86_64-3_slack14.0.txt
+-rw-r--r-- 1 root root 664752 2017-09-14 17:21 ./patches/packages/bluez-4.99-x86_64-3_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-09-14 17:21 ./patches/packages/bluez-4.99-x86_64-3_slack14.0.txz.asc
+-rw-r--r-- 1 root root 430 2017-07-07 20:47 ./patches/packages/ca-certificates-20161130-noarch-1_slack14.0.txt
+-rw-r--r-- 1 root root 156092 2017-07-07 20:47 ./patches/packages/ca-certificates-20161130-noarch-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-07-07 20:47 ./patches/packages/ca-certificates-20161130-noarch-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 644 2015-07-07 19:26 ./patches/packages/cups-1.5.4-x86_64-3_slack14.0.txt
+-rw-r--r-- 1 root root 1931780 2015-07-07 19:26 ./patches/packages/cups-1.5.4-x86_64-3_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-07-07 19:26 ./patches/packages/cups-1.5.4-x86_64-3_slack14.0.txz.asc
+-rw-r--r-- 1 root root 555 2018-05-16 20:30 ./patches/packages/curl-7.60.0-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 1207548 2018-05-16 20:30 ./patches/packages/curl-7.60.0-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-05-16 20:30 ./patches/packages/curl-7.60.0-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 491 2013-07-09 23:44 ./patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txt
+-rw-r--r-- 1 root root 455264 2013-07-09 23:44 ./patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-07-09 23:44 ./patches/packages/dbus-1.4.20-x86_64-4_slack14.0.txz.asc
+-rw-r--r-- 1 root root 644 2018-02-28 21:58 ./patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 1796464 2018-02-28 21:58 ./patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-02-28 21:58 ./patches/packages/dhcp-4.4.1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 443 2014-08-01 20:47 ./patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 68204 2014-08-01 20:47 ./patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-08-01 20:47 ./patches/packages/dhcpcd-5.5.6-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 444 2017-10-02 17:02 ./patches/packages/dnsmasq-2.78-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 327024 2017-10-02 17:02 ./patches/packages/dnsmasq-2.78-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-10-02 17:02 ./patches/packages/dnsmasq-2.78-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 471 2017-09-12 19:03 ./patches/packages/emacs-25.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 41420156 2017-09-12 19:03 ./patches/packages/emacs-25.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-09-12 19:03 ./patches/packages/emacs-25.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 264 2017-07-18 05:25 ./patches/packages/expat-2.2.2-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 105092 2017-07-18 05:25 ./patches/packages/expat-2.2.2-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-07-18 05:25 ./patches/packages/expat-2.2.2-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 603 2016-02-08 21:52 ./patches/packages/flac-1.3.1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 483992 2016-02-08 21:52 ./patches/packages/flac-1.3.1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-02-08 21:52 ./patches/packages/flac-1.3.1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 344 2017-05-16 06:07 ./patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 460688 2017-05-16 06:07 ./patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-05-16 06:07 ./patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 538 2015-09-01 19:45 ./patches/packages/gdk-pixbuf2-2.26.1-x86_64-3_slack14.0.txt
+-rw-r--r-- 1 root root 612832 2015-09-01 19:45 ./patches/packages/gdk-pixbuf2-2.26.1-x86_64-3_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-09-01 19:45 ./patches/packages/gdk-pixbuf2-2.26.1-x86_64-3_slack14.0.txz.asc
+-rw-r--r-- 1 root root 406 2017-09-27 19:10 ./patches/packages/gegl-0.2.0-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 477472 2017-09-27 19:10 ./patches/packages/gegl-0.2.0-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-09-27 19:10 ./patches/packages/gegl-0.2.0-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 473 2016-07-14 20:20 ./patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 12667256 2016-07-14 20:20 ./patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-07-14 20:20 ./patches/packages/gimp-2.8.18-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 397 2017-08-11 20:36 ./patches/packages/git-2.14.1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 5309376 2017-08-11 20:36 ./patches/packages/git-2.14.1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-08-11 20:36 ./patches/packages/git-2.14.1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 389 2015-01-28 06:27 ./patches/packages/glibc-2.15-x86_64-9_slack14.0.txt
+-rw-r--r-- 1 root root 12424880 2015-01-28 06:27 ./patches/packages/glibc-2.15-x86_64-9_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-01-28 06:27 ./patches/packages/glibc-2.15-x86_64-9_slack14.0.txz.asc
+-rw-r--r-- 1 root root 333 2015-01-28 06:26 ./patches/packages/glibc-i18n-2.15-x86_64-9_slack14.0.txt
+-rw-r--r-- 1 root root 6850264 2015-01-28 06:26 ./patches/packages/glibc-i18n-2.15-x86_64-9_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-01-28 06:26 ./patches/packages/glibc-i18n-2.15-x86_64-9_slack14.0.txz.asc
+-rw-r--r-- 1 root root 508 2015-01-28 06:25 ./patches/packages/glibc-profile-2.15-x86_64-9_slack14.0.txt
+-rw-r--r-- 1 root root 1211824 2015-01-28 06:25 ./patches/packages/glibc-profile-2.15-x86_64-9_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-01-28 06:25 ./patches/packages/glibc-profile-2.15-x86_64-9_slack14.0.txz.asc
+-rw-r--r-- 1 root root 323 2015-01-28 06:26 ./patches/packages/glibc-solibs-2.15-x86_64-9_slack14.0.txt
+-rw-r--r-- 1 root root 2544476 2015-01-28 06:26 ./patches/packages/glibc-solibs-2.15-x86_64-9_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-01-28 06:26 ./patches/packages/glibc-solibs-2.15-x86_64-9_slack14.0.txz.asc
+-rw-r--r-- 1 root root 504 2018-05-24 18:06 ./patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txt
+-rw-r--r-- 1 root root 193864 2018-05-24 18:06 ./patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-05-24 18:06 ./patches/packages/glibc-zoneinfo-2018e-noarch-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 371 2017-08-02 03:21 ./patches/packages/gnupg-1.4.22-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 1166920 2017-08-02 03:21 ./patches/packages/gnupg-1.4.22-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-08-02 03:21 ./patches/packages/gnupg-1.4.22-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 601 2014-06-24 20:07 ./patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 1695056 2014-06-24 20:07 ./patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-06-24 20:07 ./patches/packages/gnupg2-2.0.24-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 493 2017-01-11 01:25 ./patches/packages/gnutls-3.3.26-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 2056060 2017-01-11 01:25 ./patches/packages/gnutls-3.3.26-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-01-11 01:25 ./patches/packages/gnutls-3.3.26-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 477 2013-12-05 22:00 ./patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txt
+-rw-r--r-- 1 root root 12482048 2013-12-05 22:00 ./patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-12-05 22:00 ./patches/packages/hplip-3.12.9-x86_64-4_slack14.0.txz.asc
+-rw-r--r-- 1 root root 514 2017-10-25 16:47 ./patches/packages/httpd-2.4.29-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 3603852 2017-10-25 16:47 ./patches/packages/httpd-2.4.29-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-10-25 16:47 ./patches/packages/httpd-2.4.29-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 540 2016-05-30 19:59 ./patches/packages/imagemagick-6.7.7_10-x86_64-3_slack14.0.txt
+-rw-r--r-- 1 root root 6175968 2016-05-30 19:59 ./patches/packages/imagemagick-6.7.7_10-x86_64-3_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-05-30 19:59 ./patches/packages/imagemagick-6.7.7_10-x86_64-3_slack14.0.txz.asc
+-rw-r--r-- 1 root root 359 2016-10-27 05:49 ./patches/packages/inputproto-2.3.2-noarch-1_slack14.0.txt
+-rw-r--r-- 1 root root 92016 2016-10-27 05:49 ./patches/packages/inputproto-2.3.2-noarch-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:49 ./patches/packages/inputproto-2.3.2-noarch-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 670 2012-10-10 23:26 ./patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 296428 2012-10-10 23:26 ./patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 198 2012-10-10 23:26 ./patches/packages/iptables-1.4.14-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 333 2018-02-15 21:21 ./patches/packages/irssi-1.0.7-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 606484 2018-02-15 21:21 ./patches/packages/irssi-1.0.7-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-02-15 21:21 ./patches/packages/irssi-1.0.7-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 390 2015-10-15 22:12 ./patches/packages/jasper-1.900.1-x86_64-4_slack14.0.txt
+-rw-r--r-- 1 root root 160732 2015-10-15 22:12 ./patches/packages/jasper-1.900.1-x86_64-4_slack14.0.txz
+-rw-r--r-- 1 root root 181 2015-10-15 22:12 ./patches/packages/jasper-1.900.1-x86_64-4_slack14.0.txz.asc
+-rw-r--r-- 1 root root 191 2017-05-16 18:02 ./patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 12458532 2017-05-16 18:02 ./patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-05-16 18:02 ./patches/packages/kdelibs-4.8.5-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 305 2016-10-27 05:42 ./patches/packages/libX11-1.6.4-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 2643992 2016-10-27 05:42 ./patches/packages/libX11-1.6.4-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:42 ./patches/packages/libX11-1.6.4-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 366 2017-11-29 07:10 ./patches/packages/libXcursor-1.1.15-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 42160 2017-11-29 07:10 ./patches/packages/libXcursor-1.1.15-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-11-29 07:10 ./patches/packages/libXcursor-1.1.15-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 335 2016-10-27 05:51 ./patches/packages/libXext-1.3.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 137588 2016-10-27 05:51 ./patches/packages/libXext-1.3.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:51 ./patches/packages/libXext-1.3.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 351 2016-10-27 05:53 ./patches/packages/libXfixes-5.0.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 24040 2016-10-27 05:53 ./patches/packages/libXfixes-5.0.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:53 ./patches/packages/libXfixes-5.0.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 575 2017-11-29 06:42 ./patches/packages/libXfont-1.4.7-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 136132 2017-11-29 06:42 ./patches/packages/libXfont-1.4.7-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-11-29 06:42 ./patches/packages/libXfont-1.4.7-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 293 2016-10-27 05:55 ./patches/packages/libXi-1.7.8-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 187820 2016-10-27 05:55 ./patches/packages/libXi-1.7.8-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:55 ./patches/packages/libXi-1.7.8-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 361 2016-10-27 05:57 ./patches/packages/libXrandr-1.5.1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 38160 2016-10-27 05:57 ./patches/packages/libXrandr-1.5.1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:57 ./patches/packages/libXrandr-1.5.1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 377 2016-10-27 05:58 ./patches/packages/libXrender-0.9.10-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 34788 2016-10-27 05:58 ./patches/packages/libXrender-0.9.10-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 05:58 ./patches/packages/libXrender-0.9.10-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 334 2016-10-27 06:01 ./patches/packages/libXtst-1.2.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 55480 2016-10-27 06:01 ./patches/packages/libXtst-1.2.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 06:01 ./patches/packages/libXtst-1.2.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 321 2016-10-27 06:02 ./patches/packages/libXv-1.0.11-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 47448 2016-10-27 06:02 ./patches/packages/libXv-1.0.11-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 06:02 ./patches/packages/libXv-1.0.11-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 319 2016-10-27 06:04 ./patches/packages/libXvMC-1.0.10-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 32936 2016-10-27 06:04 ./patches/packages/libXvMC-1.0.10-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-10-27 06:04 ./patches/packages/libXvMC-1.0.10-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 245 2016-08-23 18:26 ./patches/packages/libgcrypt-1.5.6-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 343372 2016-08-23 18:26 ./patches/packages/libgcrypt-1.5.6-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-08-23 18:26 ./patches/packages/libgcrypt-1.5.6-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 393 2013-10-05 20:55 ./patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 83228 2013-10-05 20:55 ./patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-10-05 20:55 ./patches/packages/libgpg-error-1.11-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 336 2018-04-01 19:18 ./patches/packages/libidn-1.34-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 296192 2018-04-01 19:18 ./patches/packages/libidn-1.34-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-04-01 19:18 ./patches/packages/libidn-1.34-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 438 2013-12-13 00:34 ./patches/packages/libiodbc-3.52.8-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 264020 2013-12-13 00:34 ./patches/packages/libiodbc-3.52.8-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-12-13 00:34 ./patches/packages/libiodbc-3.52.8-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 662 2013-12-14 06:10 ./patches/packages/libjpeg-v8a-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 182804 2013-12-14 06:10 ./patches/packages/libjpeg-v8a-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-12-14 06:10 ./patches/packages/libjpeg-v8a-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 432 2017-02-10 20:50 ./patches/packages/libpcap-1.8.1-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 274672 2017-02-10 20:50 ./patches/packages/libpcap-1.8.1-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-02-10 20:50 ./patches/packages/libpcap-1.8.1-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 492 2016-12-30 17:05 ./patches/packages/libpng-1.4.20-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 602152 2016-12-30 17:05 ./patches/packages/libpng-1.4.20-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-12-30 17:05 ./patches/packages/libpng-1.4.20-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 370 2016-02-08 21:54 ./patches/packages/libsndfile-1.0.26-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 279096 2016-02-08 21:54 ./patches/packages/libsndfile-1.0.26-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-02-08 21:54 ./patches/packages/libsndfile-1.0.26-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 406 2016-02-26 18:22 ./patches/packages/libssh-0.7.3-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 191312 2016-02-26 18:22 ./patches/packages/libssh-0.7.3-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-02-26 18:22 ./patches/packages/libssh-0.7.3-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 426 2014-06-05 21:53 ./patches/packages/libtasn1-2.14-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 115720 2014-06-05 21:53 ./patches/packages/libtasn1-2.14-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-06-05 21:53 ./patches/packages/libtasn1-2.14-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 394 2013-10-17 23:25 ./patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 473736 2013-10-17 23:25 ./patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 198 2013-10-17 23:25 ./patches/packages/libtiff-3.9.7-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 558 2018-03-17 19:47 ./patches/packages/libvorbis-1.3.6-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 283268 2018-03-17 19:47 ./patches/packages/libvorbis-1.3.6-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-03-17 19:47 ./patches/packages/libvorbis-1.3.6-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 288 2018-04-30 22:08 ./patches/packages/libwmf-0.2.8.4-x86_64-6_slack14.0.txt
+-rw-r--r-- 1 root root 969676 2018-04-30 22:08 ./patches/packages/libwmf-0.2.8.4-x86_64-6_slack14.0.txz
+-rw-r--r-- 1 root root 163 2018-04-30 22:08 ./patches/packages/libwmf-0.2.8.4-x86_64-6_slack14.0.txz.asc
+-rw-r--r-- 1 root root 446 2016-11-15 19:56 ./patches/packages/libxcb-1.11.1-x86_64-2_slack14.0.txt
+-rw-r--r-- 1 root root 884776 2016-11-15 19:56 ./patches/packages/libxcb-1.11.1-x86_64-2_slack14.0.txz
+-rw-r--r-- 1 root root 163 2016-11-15 19:56 ./patches/packages/libxcb-1.11.1-x86_64-2_slack14.0.txz.asc
+-rw-r--r-- 1 root root 522 2017-09-21 22:00 ./patches/packages/libxml2-2.9.5-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 1221496 2017-09-21 22:00 ./patches/packages/libxml2-2.9.5-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 163 2017-09-21 22:00 ./patches/packages/libxml2-2.9.5-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 220 2016-05-27 20:30 ./patches/packages/libxslt-1.1.29-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 361988 2016-05-27 20:30 ./patches/packages/libxslt-1.1.29-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2016-05-27 20:30 ./patches/packages/libxslt-1.1.29-x86_64-1_slack14.0.txz.asc
+-rw-r--r-- 1 root root 287 2014-04-21 18:49 ./patches/packages/libyaml-0.1.6-x86_64-1_slack14.0.txt
+-rw-r--r-- 1 root root 108964 2014-04-21 18:49 ./patches/packages/libyaml-0.1.6-x86_64-1_slack14.0.txz
+-rw-r--r-- 1 root root 181 2014-04-21 18:49 ./patches/packages/libyaml-0.1.6-x86_64-1_slack14.0.txz.asc
+drwxr-xr-x 2 root root 4096 2018-01-15 23:34 ./patches/packages/linux-3.2.98
+-rw-r--r-- 1 root root 423 2018-01-05 21:50 ./patches/packages/linux-3.2.98/kernel-firmware-20180104_65b1c68-noarch-1.txt
+-rw-r--r-- 1 root root 68340016 2018-01-05 21:50 ./patches/packages/linux-3.2.98/kernel-firmware-20180104_65b1c68-noarch-1.txz
+-rw-r--r-- 1 root root 163 2018-01-05 21:50 ./patches/packages/linux-3.2.98/kernel-firmware-20180104_65b1c68-noarch-1.txz.asc
+-rw-r--r-- 1 root root 626 2018-01-11 22:04 ./patches/packages/linux-3.2.98/kernel-generic-3.2.98-x86_64-1.txt
+-rw-r--r-- 1 root root 3510924 2018-01-11 22:04 ./patches/packages/linux-3.2.98/kernel-generic-3.2.98-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2018-01-11 22:04 ./patches/packages/linux-3.2.98/kernel-generic-3.2.98-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 332 2018-01-11 21:52 ./patches/packages/linux-3.2.98/kernel-headers-3.2.98-x86-1.txt
+-rw-r--r-- 1 root root 605228 2018-01-11 21:52 ./patches/packages/linux-3.2.98/kernel-headers-3.2.98-x86-1.txz
+-rw-r--r-- 1 root root 163 2018-01-11 21:52 ./patches/packages/linux-3.2.98/kernel-headers-3.2.98-x86-1.txz.asc
+-rw-r--r-- 1 root root 638 2018-01-11 22:19 ./patches/packages/linux-3.2.98/kernel-huge-3.2.98-x86_64-1.txt
+-rw-r--r-- 1 root root 6734232 2018-01-11 22:19 ./patches/packages/linux-3.2.98/kernel-huge-3.2.98-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2018-01-11 22:19 ./patches/packages/linux-3.2.98/kernel-huge-3.2.98-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 569 2018-01-11 22:08 ./patches/packages/linux-3.2.98/kernel-modules-3.2.98-x86_64-1.txt
+-rw-r--r-- 1 root root 22267816 2018-01-11 22:08 ./patches/packages/linux-3.2.98/kernel-modules-3.2.98-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2018-01-11 22:08 ./patches/packages/linux-3.2.98/kernel-modules-3.2.98-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 317 2018-01-11 21:50 ./patches/packages/linux-3.2.98/kernel-source-3.2.98-noarch-1.txt
+-rw-r--r-- 1 root root 68448976 2018-01-11 21:50 ./patches/packages/linux-3.2.98/kernel-source-3.2.98-noarch-1.txz
+-rw-r--r-- 1 root roo