slackware.com.rss.xml - sfeed_tests - sfeed tests and RSS and Atom files
(HTM) git clone git://git.codemadness.org/sfeed_tests
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
slackware.com.rss.xml (500216B)
---
1 <?xml version="1.0" encoding="UTF-8"?><rss version="2.0">
2 <channel>
3 <title>ChangeLog.txt for slackware-11.0</title>
4 <link>https://mirrors.slackware.com/slackware/slackware-11.0</link>
5 <description>generated by github.com/vbatts/sl-feeds</description>
6 <pubDate>Wed, 25 Jul 2012 02:02:40 +0000</pubDate>
7 <lastBuildDate>Wed, 25 Jul 2012 02:02:40 +0000</lastBuildDate>
8 <item>
9 <title>1 update. Including a (* Security fix *)!</title>
10 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1343181760</link>
11 <description><pre><blockquote>Wed Jul 25 02:02:40 UTC 2012<br>patches/packages/libpng-1.2.50-i486-1_slack11.0.tgz: Upgraded.<br> Fixed incorrect type (int copy should be png_size_t copy) in png_inflate()<br> (fixes CVE-2011-3045).<br> Revised png_set_text_2() to avoid potential memory corruption (fixes<br> CVE-2011-3048).<br> Changed "a+w" to "u+w" in Makefile.in to fix CVE-2012-3386.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386<br> (* Security fix *)<br></blockquote></pre></description>
12 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1343181760</guid>
13 <pubDate>Wed, 25 Jul 2012 02:02:40 +0000</pubDate>
14 </item>
15 <item>
16 <title>1 update. Including a (* Security fix *)!</title>
17 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1342589726</link>
18 <description><pre><blockquote>Wed Jul 18 05:35:26 UTC 2012<br>patches/packages/libexif-0.6.21-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes a number of remotely exploitable issues in libexif<br> with effects ranging from information leakage to potential remote<br> code execution.<br> For more information, see:<br> http://sourceforge.net/mailarchive/message.php?msg_id=29534027<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2845<br> (* Security fix *)<br></blockquote></pre></description>
19 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1342589726</guid>
20 <pubDate>Wed, 18 Jul 2012 05:35:26 +0000</pubDate>
21 </item>
22 <item>
23 <title>1 update. Including a (* Security fix *)!</title>
24 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1340591557</link>
25 <description><pre><blockquote>Mon Jun 25 02:32:37 UTC 2012<br>patches/packages/freetype-2.4.10-i486-1_slack11.0.tgz: Upgraded.<br> Since freetype-2.4.8 many fixes were made to better handle invalid fonts.<br> Many of them are vulnerabilities (see CVE-2012-1126 up to CVE-2012-1144<br> and SA48320) so all users should upgrade.<br> (* Security fix *)<br></blockquote></pre></description>
26 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1340591557</guid>
27 <pubDate>Mon, 25 Jun 2012 02:32:37 +0000</pubDate>
28 </item>
29 <item>
30 <title>1 update. Including a (* Security fix *)!</title>
31 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1339650159</link>
32 <description><pre><blockquote>Thu Jun 14 05:02:39 UTC 2012<br>####################################################################<br># NOTICE OF INPENDING EOL (END OF LIFE) FOR OLD SLACKWARE VERSIONS #<br># #<br># Effective August 1, 2012, security patches will no longer be #<br># provided for the following versions of Slackware (which will all #<br># be more than 5 years old at that time): #<br># Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0. #<br># If you are still running these versions you should consider #<br># migrating to a newer version (preferably as recent as possible). #<br># Alternately, you may make arrangements to handle your own #<br># security patches. If for some reason you are unable to upgrade #<br># or handle your own security patches, limited security support #<br># may be available for a fee. Inquire at security@slackware.com. #<br>####################################################################<br>patches/packages/bind-9.7.6_P1-i486-1_slack11.0.tgz: Upgraded.<br> This release fixes an issue that could crash BIND, leading to a denial of<br> service. It also fixes the so-called "ghost names attack" whereby a<br> remote attacker may trigger continued resolvability of revoked domain names.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1033<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667<br> IMPORTANT NOTE: This is a upgraded version of BIND, _not_ a patched one.<br> It is likely to be more strict about the correctness of configuration files.<br> Care should be taken about deploying this upgrade on production servers to<br> avoid an unintended interruption of service.<br> (* Security fix *)<br></blockquote></pre></description>
33 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1339650159</guid>
34 <pubDate>Thu, 14 Jun 2012 05:02:39 +0000</pubDate>
35 </item>
36 <item>
37 <title>1 update. Including a (* Security fix *)!</title>
38 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1337732092</link>
39 <description><pre><blockquote>Wed May 23 00:14:52 UTC 2012<br>patches/packages/libxml2-2.6.32-i486-2_slack11.0.tgz: Upgraded.<br> Patched an off-by-one error in XPointer that could lead to a crash or<br> possibly the execution of arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102<br> (* Security fix *)<br></blockquote></pre></description>
40 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1337732092</guid>
41 <pubDate>Wed, 23 May 2012 00:14:52 +0000</pubDate>
42 </item>
43 <item>
44 <title>2 updates. Including a (* Security fix *)!</title>
45 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1337454217</link>
46 <description><pre><blockquote>Sat May 19 19:03:37 UTC 2012<br>patches/packages/openssl-0.9.8x-i486-1_slack11.0.tgz: Upgraded.<br> This is a very minor security fix:<br> o Fix DTLS record length checking bug CVE-2012-2333<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8x-i486-1_slack11.0.tgz: Upgraded.<br> This is a very minor security fix:<br> o Fix DTLS record length checking bug CVE-2012-2333<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333<br> (* Security fix *)<br></blockquote></pre></description>
47 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1337454217</guid>
48 <pubDate>Sat, 19 May 2012 19:03:37 +0000</pubDate>
49 </item>
50 <item>
51 <title>2 updates. Including a (* Security fix *)!</title>
52 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1335488843</link>
53 <description><pre><blockquote>Fri Apr 27 01:07:23 UTC 2012<br>patches/packages/openssl-0.9.8w-i486-1_slack11.0.tgz: Upgraded.<br> Fixes some potentially exploitable buffer overflows.<br> Thanks to Tavis Ormandy, Google Security Team, for discovering this<br> issue and to Adam Langley <agl@chromium.org> for fixing it.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8w-i486-1_slack11.0.tgz: Upgraded.<br> Fixes some potentially exploitable buffer overflows.<br> Thanks to Tavis Ormandy, Google Security Team, for discovering this<br> issue and to Adam Langley <agl@chromium.org> for fixing it.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110<br> (* Security fix *)<br></blockquote></pre></description>
54 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1335488843</guid>
55 <pubDate>Fri, 27 Apr 2012 01:07:23 +0000</pubDate>
56 </item>
57 <item>
58 <title>2 updates. Including a (* Security fix *)!</title>
59 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1335205111</link>
60 <description><pre><blockquote>Mon Apr 23 18:18:31 UTC 2012<br>patches/packages/openssl-0.9.8v-i486-1_slack11.0.tgz: Upgraded.<br> Fixes some potentially exploitable buffer overflows.<br> Thanks to Tavis Ormandy, Google Security Team, for discovering this<br> issue and to Adam Langley <agl@chromium.org> for fixing it.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8v-i486-1_slack11.0.tgz: Upgraded.<br> Fixes some potentially exploitable buffer overflows.<br> Thanks to Tavis Ormandy, Google Security Team, for discovering this<br> issue and to Adam Langley <agl@chromium.org> for fixing it.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110<br> (* Security fix *)<br></blockquote></pre></description>
61 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1335205111</guid>
62 <pubDate>Mon, 23 Apr 2012 18:18:31 +0000</pubDate>
63 </item>
64 <item>
65 <title>1 update. Including a (* Security fix *)!</title>
66 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1334164592</link>
67 <description><pre><blockquote>Wed Apr 11 17:16:32 UTC 2012<br>patches/packages/samba-3.0.37-i486-5_slack11.0.tgz: Rebuilt.<br> This is a security release in order to address a vulnerability that allows<br> remote code execution as the "root" user. All sites running a Samba<br> server should update to the new Samba package and restart Samba.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182<br> (* Security fix *)<br></blockquote></pre></description>
68 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1334164592</guid>
69 <pubDate>Wed, 11 Apr 2012 17:16:32 +0000</pubDate>
70 </item>
71 <item>
72 <title>1 update. Including a (* Security fix *)!</title>
73 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1333835322</link>
74 <description><pre><blockquote>Sat Apr 7 21:48:42 UTC 2012<br>patches/packages/libtiff-3.8.2-i486-5_slack11.0.tgz: Rebuilt.<br> Patched overflows that could lead to arbitrary code execution when parsing<br> a malformed image file.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173<br> (* Security fix *)<br></blockquote></pre></description>
75 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1333835322</guid>
76 <pubDate>Sat, 07 Apr 2012 21:48:42 +0000</pubDate>
77 </item>
78 <item>
79 <title>1 update. Including a (* Security fix *)!</title>
80 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1329934498</link>
81 <description><pre><blockquote>Wed Feb 22 18:14:58 UTC 2012<br>patches/packages/libpng-1.2.47-i486-1_slack11.0.tgz: Upgraded.<br> All branches of libpng prior to versions 1.5.9, 1.4.9, 1.2.47, and 1.0.57,<br> respectively, fail to correctly validate a heap allocation in<br> png_decompress_chunk(), which can lead to a buffer-overrun and the<br> possibility of execution of hostile code on 32-bit systems.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026<br> (* Security fix *)<br></blockquote></pre></description>
82 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1329934498</guid>
83 <pubDate>Wed, 22 Feb 2012 18:14:58 +0000</pubDate>
84 </item>
85 <item>
86 <title>2 updates. Including a (* Security fix *)!</title>
87 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1328664102</link>
88 <description><pre><blockquote>Wed Feb 8 01:21:42 UTC 2012<br>patches/packages/proftpd-1.3.4a-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes a use-after-free() memory corruption error,<br> and possibly other unspecified issues.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4130<br> (* Security fix *)<br>patches/packages/vsftpd-2.3.5-i486-1_slack11.0.tgz: Upgraded.<br> Minor version bump, this also works around a hard to trigger heap overflow<br> in glibc (glibc zoneinfo caching vuln). For there to be any possibility<br> to trigger the glibc bug within vsftpd, the non-default option<br> "chroot_local_user" must be set in /etc/vsftpd.conf.<br> Considered 1) low severity (hard to exploit) and 2) not a vsftpd bug :-)<br> Nevertheless:<br> (* Security fix *)<br></blockquote></pre></description>
89 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1328664102</guid>
90 <pubDate>Wed, 08 Feb 2012 01:21:42 +0000</pubDate>
91 </item>
92 <item>
93 <title>3 updates. Including a (* Security fix *)!</title>
94 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1328138096</link>
95 <description><pre><blockquote>Wed Feb 1 23:14:56 UTC 2012<br>patches/packages/freetype-2.4.8-i486-1_slack11.0.tgz: Upgraded.<br> Some vulnerabilities in handling CID-keyed PostScript fonts have<br> been fixed.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439<br> (* Security fix *)<br>patches/packages/openssl-0.9.8t-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a bug where DTLS applications were not properly supported. This<br> bug could have allowed remote attackers to cause a denial of service via<br> unspecified vectors.<br> CVE-2012-0050 has been assigned to this issue.<br> For more details see:<br> http://openssl.org/news/secadv_20120118.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0050<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8t-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a bug where DTLS applications were not properly supported. This<br> bug could have allowed remote attackers to cause a denial of service via<br> unspecified vectors.<br> CVE-2012-0050 has been assigned to this issue.<br> For more details see:<br> http://openssl.org/news/secadv_20120118.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0050<br> (* Security fix *)<br></blockquote></pre></description>
96 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1328138096</guid>
97 <pubDate>Wed, 01 Feb 2012 23:14:56 +0000</pubDate>
98 </item>
99 <item>
100 <title>1 update. Including a (* Security fix *)!</title>
101 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1321495765</link>
102 <description><pre><blockquote>Thu Nov 17 02:09:25 UTC 2011<br>3218. [security] Cache lookup could return RRSIG data associated with<br>patches/packages/bind-9.4_ESV_R5_P1-i486-1_slack11.0.tgz: Upgraded.<br> --- 9.4-ESV-R5-P1 released ---<br> nonexistent records, leading to an assertion<br> failure. [RT #26590]<br> (* Security fix *)<br></blockquote></pre></description>
103 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1321495765</guid>
104 <pubDate>Thu, 17 Nov 2011 02:09:25 +0000</pubDate>
105 </item>
106 <item>
107 <title>1 update</title>
108 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1321037901</link>
109 <description><pre><blockquote>Fri Nov 11 18:58:21 UTC 2011<br> Good 11-11-11, everyone! Enjoy some fresh time. :)<br>patches/packages/glibc-zoneinfo-2011i_2011n-noarch-1.tgz: Upgraded.<br> New upstream homepage: http://www.iana.org/time-zones<br></blockquote></pre></description>
110 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1321037901</guid>
111 <pubDate>Fri, 11 Nov 2011 18:58:21 +0000</pubDate>
112 </item>
113 <item>
114 <title>1 update. Including a (* Security fix *)!</title>
115 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1314263445</link>
116 <description><pre><blockquote>Thu Aug 25 09:10:45 UTC 2011<br>extra/php5/php-5.3.8-i486-1_slack11.0.tgz: Upgraded.<br> Security fixes vs. 5.3.6 (5.3.7 was not usable):<br> Updated crypt_blowfish to 1.2. (CVE-2011-2483)<br> Fixed crash in error_log(). Reported by Mateusz Kocielski<br> Fixed buffer overflow on overlog salt in crypt().<br> Fixed bug #54939 (File path injection vulnerability in RFC1867<br> File upload filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)<br> Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)<br> Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483<br> For those upgrading from PHP 5.2.x, be aware that quite a bit has<br> changed, and it will very likely not 'drop in', but PHP 5.2.x is not<br> supported by php.net any longer, so there wasn't a lot of choice<br> in the matter. We're not able to support a security fork of<br> PHP 5.2.x here either, so you'll have to just bite the bullet on<br> this. You'll be better off in the long run. :)<br> (* Security fix *)<br></blockquote></pre></description>
117 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1314263445</guid>
118 <pubDate>Thu, 25 Aug 2011 09:10:45 +0000</pubDate>
119 </item>
120 <item>
121 <title>1 update. Including a (* Security fix *)!</title>
122 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1313191200</link>
123 <description><pre><blockquote>Fri Aug 12 23:20:00 UTC 2011<br>patches/packages/bind-9.4_ESV_R5-i486-1_slack11.0.tgz: Upgraded.<br> This BIND update addresses a couple of security issues:<br> * named, set up to be a caching resolver, is vulnerable to a user<br> querying a domain with very large resource record sets (RRSets)<br> when trying to negatively cache the response. Due to an off-by-one<br> error, caching the response could cause named to crash. [RT #24650]<br> [CVE-2011-1910]<br> * Change #2912 (see CHANGES) exposed a latent bug in the DNS message<br> processing code that could allow certain UPDATE requests to crash<br> named. [RT #24777] [CVE-2011-2464]<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464<br> (* Security fix *)<br></blockquote></pre></description>
124 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1313191200</guid>
125 <pubDate>Fri, 12 Aug 2011 23:20:00 +0000</pubDate>
126 </item>
127 <item>
128 <title>1 update. Including a (* Security fix *)!</title>
129 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1311963760</link>
130 <description><pre><blockquote>Fri Jul 29 18:22:40 UTC 2011<br>patches/packages/libpng-1.2.46-i486-1_slack11.0.tgz: Upgraded.<br> Fixed uninitialized memory read in png_format_buffer()<br> (Bug report by Frank Busse, related to CVE-2004-0421).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421<br> (* Security fix *)<br></blockquote></pre></description>
131 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1311963760</guid>
132 <pubDate>Fri, 29 Jul 2011 18:22:40 +0000</pubDate>
133 </item>
134 <item>
135 <title>1 update. Including a (* Security fix *)!</title>
136 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1308530974</link>
137 <description><pre><blockquote>Mon Jun 20 00:49:34 UTC 2011<br>patches/packages/fetchmail-6.3.20-i486-1_slack11.0.tgz: Upgraded.<br> This release fixes a denial of service in STARTTLS protocol phases.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947<br> http://www.fetchmail.info/fetchmail-SA-2011-01.txt<br> (* Security fix *)<br></blockquote></pre></description>
138 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1308530974</guid>
139 <pubDate>Mon, 20 Jun 2011 00:49:34 +0000</pubDate>
140 </item>
141 <item>
142 <title>1 update. Including a (* Security fix *)!</title>
143 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1306536960</link>
144 <description><pre><blockquote>Fri May 27 22:56:00 UTC 2011<br>patches/packages/bind-9.4_ESV_R4_P1-i486-1_slack11.0.tgz: Upgraded.<br> This release fixes security issues:<br> * A large RRSET from a remote authoritative server that results in<br> the recursive resolver trying to negatively cache the response can<br> hit an off by one code error in named, resulting in named crashing.<br> [RT #24650] [CVE-2011-1910]<br> * Zones that have a DS record in the parent zone but are also listed<br> in a DLV and won't validate without DLV could fail to validate. [RT<br> #24631]<br> For more information, see:<br> http://www.isc.org/software/bind/advisories/cve-2011-1910<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910<br> (* Security fix *)<br></blockquote></pre></description>
145 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1306536960</guid>
146 <pubDate>Fri, 27 May 2011 22:56:00 +0000</pubDate>
147 </item>
148 <item>
149 <title>2 updates. Including a (* Security fix *)!</title>
150 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1306353796</link>
151 <description><pre><blockquote>Wed May 25 20:03:16 UTC 2011<br>patches/packages/apr-1.4.5-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a possible denial of service due to a problem with a loop in<br> the new apr_fnmatch() implementation consuming CPU.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928<br> (* Security fix *)<br>patches/packages/apr-util-1.3.12-i486-1_slack11.0.tgz: Upgraded.<br> Fix crash because of NULL cleanup registered by apr_ldap_rebind_init().<br></blockquote></pre></description>
152 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1306353796</guid>
153 <pubDate>Wed, 25 May 2011 20:03:16 +0000</pubDate>
154 </item>
155 <item>
156 <title>2 updates. Including a (* Security fix *)!</title>
157 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1305318607</link>
158 <description><pre><blockquote>Fri May 13 20:30:07 UTC 2011<br>patches/packages/apr-1.4.4-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a possible denial of service due to an unconstrained, recursive<br> invocation of apr_fnmatch(). This function has been reimplemented using a<br> non-recursive algorithm. Thanks to William Rowe.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419<br> (* Security fix *)<br>patches/packages/apr-util-1.3.11-i486-1_slack11.0.tgz: Upgraded.<br></blockquote></pre></description>
159 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1305318607</guid>
160 <pubDate>Fri, 13 May 2011 20:30:07 +0000</pubDate>
161 </item>
162 <item>
163 <title>1 update. Including a (* Security fix *)!</title>
164 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1303355594</link>
165 <description><pre><blockquote>Thu Apr 21 03:13:14 UTC 2011<br>patches/packages/rdesktop-1.6.0-i486-2_slack11.0.tgz: Rebuilt.<br> Patched a traversal vulnerability (disallow /.. requests).<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1595<br> (* Security fix *)<br></blockquote></pre></description>
166 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1303355594</guid>
167 <pubDate>Thu, 21 Apr 2011 03:13:14 +0000</pubDate>
168 </item>
169 <item>
170 <title>1 update. Including a (* Security fix *)!</title>
171 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1303156790</link>
172 <description><pre><blockquote>Mon Apr 18 19:59:50 UTC 2011<br>patches/packages/acl-2.2.50-i486-1_slack11.0.tgz: Upgraded.<br> Fix the --physical option in setfacl and getfacl to prevent symlink attacks.<br> Thanks to Martijn Dekker for the notification.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4411<br> (* Security fix *)<br></blockquote></pre></description>
173 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1303156790</guid>
174 <pubDate>Mon, 18 Apr 2011 19:59:50 +0000</pubDate>
175 </item>
176 <item>
177 <title>1 update. Including a (* Security fix *)!</title>
178 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1302245928</link>
179 <description><pre><blockquote>Fri Apr 8 06:58:48 UTC 2011<br>patches/packages/libtiff-3.8.2-i486-4_slack11.0.tgz: Rebuilt.<br> Patched overflows that could lead to arbitrary code execution when parsing<br> a malformed image file.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167<br> (* Security fix *)<br></blockquote></pre></description>
180 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1302245928</guid>
181 <pubDate>Fri, 08 Apr 2011 06:58:48 +0000</pubDate>
182 </item>
183 <item>
184 <title>1 update. Including a (* Security fix *)!</title>
185 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1302149249</link>
186 <description><pre><blockquote>Thu Apr 7 04:07:29 UTC 2011<br>patches/packages/dhcp-3.1_ESV_R1-i486-1_slack11.0.tgz: Upgraded.<br> In dhclient, check the data for some string options for reasonableness<br> before passing it along to the script that interfaces with the OS.<br> This prevents some possible attacks by a hostile DHCP server.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997<br> (* Security fix *)<br></blockquote></pre></description>
187 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1302149249</guid>
188 <pubDate>Thu, 07 Apr 2011 04:07:29 +0000</pubDate>
189 </item>
190 <item>
191 <title>1 update. Including a (* Security fix *)!</title>
192 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1301980233</link>
193 <description><pre><blockquote>Tue Apr 5 05:10:33 UTC 2011<br>patches/packages/proftpd-1.3.3e-i486-1_slack11.0.tgz: Upgraded.<br> Fixes CVE-2011-1137 (badly formed SSH messages cause DoS).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1137<br> (* Security fix *)<br></blockquote></pre></description>
194 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1301980233</guid>
195 <pubDate>Tue, 05 Apr 2011 05:10:33 +0000</pubDate>
196 </item>
197 <item>
198 <title>1 update. Including a (* Security fix *)!</title>
199 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1298931548</link>
200 <description><pre><blockquote>Mon Feb 28 22:19:08 UTC 2011<br>patches/packages/samba-3.0.37-i486-4_slack11.0.tgz: Rebuilt.<br> Fix memory corruption denial of service issue.<br> For more information, see:<br> http://www.samba.org/samba/security/CVE-2011-0719<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719<br> (* Security fix *)<br></blockquote></pre></description>
201 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1298931548</guid>
202 <pubDate>Mon, 28 Feb 2011 22:19:08 +0000</pubDate>
203 </item>
204 <item>
205 <title>6 updates. Including a (* Security fix *)!</title>
206 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1297372778</link>
207 <description><pre><blockquote>Thu Feb 10 21:19:38 UTC 2011<br>patches/packages/apr-1.3.12-i486-1_slack11.0.tgz: Upgraded.<br>patches/packages/apr-util-1.3.10-i486-1_slack11.0.tgz: Upgraded.<br> Fixes a memory leak and DoS in apr_brigade_split_line().<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623<br> (* Security fix *)<br>patches/packages/expat-1.95.8-i486-2_slack11.0.tgz: Upgraded.<br> Fixed various crash and hang bugs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720<br> (* Security fix *)<br>patches/packages/openssl-0.9.8r-i486-1_slack11.0.tgz: Upgraded.<br> This OpenSSL update fixes an "OCSP stapling vulnerability".<br> For more information, see the included CHANGES and NEWS files, and:<br> http://www.openssl.org/news/secadv_20110208.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014<br> (* Security fix *)<br> Patched certwatch to work with recent versions of "file".<br> Thanks to Ulrich Sch�fer and Jan Rafaj.<br>patches/packages/openssl-solibs-0.9.8r-i486-1_slack11.0.tgz: Upgraded.<br> (* Security fix *)<br>patches/packages/sudo-1.7.4p6-i486-1_slack11.0.tgz: Upgraded.<br> Fix Runas group password checking.<br> For more information, see the included CHANGES and NEWS files, and:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010<br> (* Security fix *)<br></blockquote></pre></description>
208 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1297372778</guid>
209 <pubDate>Thu, 10 Feb 2011 21:19:38 +0000</pubDate>
210 </item>
211 <item>
212 <title>1 update. Including a (* Security fix *)!</title>
213 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1294689780</link>
214 <description><pre><blockquote>Mon Jan 10 20:03:00 UTC 2011<br>extra/php5/php-5.2.17-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes an infinite loop with conversions from string to<br> double that may result in a denial of service.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645<br> (* Security fix *)<br></blockquote></pre></description>
215 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1294689780</guid>
216 <pubDate>Mon, 10 Jan 2011 20:03:00 +0000</pubDate>
217 </item>
218 <item>
219 <title>2 updates. Including a (* Security fix *)!</title>
220 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1293151999</link>
221 <description><pre><blockquote>Fri Dec 24 00:53:19 UTC 2010<br>extra/php5/php-5.2.16-i486-1_slack11.0.tgz: Upgraded.<br> This fixes many bugs, including some security issues.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150<br> (* Security fix *)<br>patches/packages/proftpd-1.3.3d-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes an unbounded copy operation in sql_prepare_where() that<br> could be exploited to execute arbitrary code. However, this only affects<br> servers that use the sql_mod module (which Slackware does not ship), and<br> in addition the ability to exploit this depends on an SQL injection bug<br> that was already fixed in proftpd-1.3.2rc2 (this according to upstream).<br> So in theory, this fix should only be of academic interest.<br> But in practice, better safe than sorry.<br> (* Security fix *)<br></blockquote></pre></description>
222 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1293151999</guid>
223 <pubDate>Fri, 24 Dec 2010 00:53:19 +0000</pubDate>
224 </item>
225 <item>
226 <title>1 update. Including a (* Security fix *)!</title>
227 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1292525825</link>
228 <description><pre><blockquote>Thu Dec 16 18:57:05 UTC 2010<br>patches/packages/bind-9.4_ESV_R4-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes some security issues.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615<br> (* Security fix *)<br></blockquote></pre></description>
229 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1292525825</guid>
230 <pubDate>Thu, 16 Dec 2010 18:57:05 +0000</pubDate>
231 </item>
232 <item>
233 <title>2 updates. Including a (* Security fix *)!</title>
234 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1291698113</link>
235 <description><pre><blockquote>Tue Dec 7 05:01:53 UTC 2010<br>patches/packages/openssl-0.9.8q-i486-1_slack11.0.tgz: Upgraded.<br> This OpenSSL update contains some security related bugfixes.<br> For more information, see the included CHANGES and NEWS files, and:<br> http://www.openssl.org/news/secadv_20101202.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4252<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8q-i486-1_slack11.0.tgz: Upgraded.<br> (* Security fix *)<br></blockquote></pre></description>
236 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1291698113</guid>
237 <pubDate>Tue, 07 Dec 2010 05:01:53 +0000</pubDate>
238 </item>
239 <item>
240 <title>2 updates</title>
241 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1290399100</link>
242 <description><pre><blockquote>Mon Nov 22 04:11:40 UTC 2010<br> (* Security fix *)<br> (* Security fix *)<br>patches/packages/openssl-0.9.8p-i486-1_slack11.0.tgz: Rebuilt.<br> This OpenSSL update contains some security related bugfixes.<br> For more information, see the included CHANGES and NEWS files, and:<br> http://www.openssl.org/news/secadv_20101116.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864<br>patches/packages/openssl-solibs-0.9.8p-i486-1_slack11.0.tgz: Rebuilt.<br></blockquote></pre></description>
243 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1290399100</guid>
244 <pubDate>Mon, 22 Nov 2010 04:11:40 +0000</pubDate>
245 </item>
246 <item>
247 <title>1 update. Including a (* Security fix *)!</title>
248 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1290288027</link>
249 <description><pre><blockquote>Sat Nov 20 21:20:27 UTC 2010<br>patches/packages/xpdf-3.02pl5-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes security issues that could lead to an<br> application crash, or execution of arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704<br> (* Security fix *)<br></blockquote></pre></description>
250 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1290288027</guid>
251 <pubDate>Sat, 20 Nov 2010 21:20:27 +0000</pubDate>
252 </item>
253 <item>
254 <title>1 update. Including a (* Security fix *)!</title>
255 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1288653699</link>
256 <description><pre><blockquote>Mon Nov 1 23:21:39 UTC 2010<br>patches/packages/proftpd-1.3.3c-i486-1_slack11.0.tgz: Upgraded.<br> Fixed Telnet IAC stack overflow vulnerability (ZDI-CAN-925), which can<br> allow remote execution of arbitrary code as the user running the<br> ProFTPD daemon. Thanks to TippingPoint and the Zero Day Initiative (ZDI).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3867<br> (* Security fix *)<br></blockquote></pre></description>
257 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1288653699</guid>
258 <pubDate>Mon, 01 Nov 2010 23:21:39 +0000</pubDate>
259 </item>
260 <item>
261 <title>1 update. Including a (* Security fix *)!</title>
262 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1285007997</link>
263 <description><pre><blockquote>Mon Sep 20 18:39:57 UTC 2010<br>patches/packages/bzip2-1.0.6-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes an integer overflow that could allow a specially<br> crafted bzip2 archive to cause a crash (denial of service), or execute<br> arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405<br> (* Security fix *)<br></blockquote></pre></description>
264 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1285007997</guid>
265 <pubDate>Mon, 20 Sep 2010 18:39:57 +0000</pubDate>
266 </item>
267 <item>
268 <title>1 update</title>
269 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284576681</link>
270 <description><pre><blockquote>Wed Sep 15 18:51:21 UTC 2010<br>patches/packages/sudo-1.7.4p4-i486-3_slack11.0.tgz: Rebuilt.<br> Hi folks, since the patches for old systems (8.1 - 10.2) were briefly<br> available containing a /var/lib with incorrect permissions, I'm issuing<br> these again just to be 100% sure that no systems out there will be left<br> with problems due to that. This should do it (third time's the charm).<br></blockquote></pre></description>
271 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284576681</guid>
272 <pubDate>Wed, 15 Sep 2010 18:51:21 +0000</pubDate>
273 </item>
274 <item>
275 <title>1 update</title>
276 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284530335</link>
277 <description><pre><blockquote>Wed Sep 15 05:58:55 UTC 2010<br>patches/packages/sudo-1.7.4p4-i486-2_slack11.0.tgz: Rebuilt.<br> The last sudo packages accidentally changed the permissions on /var from<br> 755 to 700. This build restores the proper permissions.<br> Thanks to Petri Kaukasoina for pointing this out.<br></blockquote></pre></description>
278 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284530335</guid>
279 <pubDate>Wed, 15 Sep 2010 05:58:55 +0000</pubDate>
280 </item>
281 <item>
282 <title>2 updates. Including a (* Security fix *)!</title>
283 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284511273</link>
284 <description><pre><blockquote>Wed Sep 15 00:41:13 UTC 2010<br>patches/packages/samba-3.0.37-i486-3_slack11.0.tgz: Upgraded.<br> This upgrade fixes a buffer overflow in the sid_parse() function.<br> For more information, see:<br> http://www.samba.org/samba/security/CVE-2010-3069<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069<br> (* Security fix *)<br>patches/packages/sudo-1.7.4p4-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a flaw that could lead to privilege escalation.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956<br> (* Security fix *)<br></blockquote></pre></description>
285 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1284511273</guid>
286 <pubDate>Wed, 15 Sep 2010 00:41:13 +0000</pubDate>
287 </item>
288 <item>
289 <title>1 update. Including a (* Security fix *)!</title>
290 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1282868597</link>
291 <description><pre><blockquote>Fri Aug 27 00:23:17 UTC 2010<br>extra/php5/php-5.2.14-i486-1_slack11.0.tgz: Upgraded.<br> Fixed several security issues.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1917<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225<br> http://www.php-security.org/2010/05/31/mops-2010-060-php-session-serializer-session-data-injection-vulnerability/index.html<br> http://www.php-security.org/2010/06/25/mops-2010-061-php-splobjectstorage-deserialization-use-after-free-vulnerability/index.html<br> (* Security fix *)<br></blockquote></pre></description>
292 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1282868597</guid>
293 <pubDate>Fri, 27 Aug 2010 00:23:17 +0000</pubDate>
294 </item>
295 <item>
296 <title>2 updates. Including a (* Security fix *)!</title>
297 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277873509</link>
298 <description><pre><blockquote>Wed Jun 30 04:51:49 UTC 2010<br>patches/packages/libtiff-3.8.2-i486-3_slack11.0.tgz: Rebuilt.<br> This fixes image structure handling bugs that could lead to crashes or<br> execution of arbitrary code if a specially-crafted TIFF image is loaded.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067<br> (* Security fix *)<br>patches/packages/libpng-1.2.44-i486-1_slack11.0.tgz: Upgraded.<br> This fixes out-of-bounds memory write bugs that could lead to crashes<br> or the execution of arbitrary code, and a memory leak bug which could<br> lead to application crashes.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249<br> (* Security fix *)<br></blockquote></pre></description>
299 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277873509</guid>
300 <pubDate>Wed, 30 Jun 2010 04:51:49 +0000</pubDate>
301 </item>
302 <item>
303 <title>1 update</title>
304 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277611375</link>
305 <description><pre><blockquote>Sun Jun 27 04:02:55 UTC 2010<br>patches/packages/bind-9.4.3_P5-i486-2_slack11.0.tgz: Rebuilt.<br> At least some of these updates for 2.4.x systems were built under a<br> 2.6.x kernel, and didn't work. Sorry, I think I've fixed the<br> issue on this end this time. If the previous update did not work<br> for you, try this one.<br></blockquote></pre></description>
306 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277611375</guid>
307 <pubDate>Sun, 27 Jun 2010 04:02:55 +0000</pubDate>
308 </item>
309 <item>
310 <title>1 update. Including a (* Security fix *)!</title>
311 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277443682</link>
312 <description><pre><blockquote>Fri Jun 25 05:28:02 UTC 2010<br>patches/packages/bind-9.4.3_P5-i486-1_slack11.0.tgz: Upgraded.<br> This fixes possible DNS cache poisoning attacks when DNSSEC is enabled<br> and checking is disabled (CD).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097<br> (* Security fix *)<br></blockquote></pre></description>
313 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1277443682</guid>
314 <pubDate>Fri, 25 Jun 2010 05:28:02 +0000</pubDate>
315 </item>
316 <item>
317 <title>1 update. Including a (* Security fix *)!</title>
318 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1276884568</link>
319 <description><pre><blockquote>Fri Jun 18 18:09:28 UTC 2010<br>patches/packages/samba-3.0.37-i486-2_slack11.0.tgz: Rebuilt.<br> Patched a buffer overflow in smbd that allows remote attackers to cause<br> a denial of service (memory corruption and daemon crash) or possibly<br> execute arbitrary code via a crafted field in a packet.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063<br> (* Security fix *)<br></blockquote></pre></description>
320 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1276884568</guid>
321 <pubDate>Fri, 18 Jun 2010 18:09:28 +0000</pubDate>
322 </item>
323 <item>
324 <title>1 update. Including a (* Security fix *)!</title>
325 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1274040088</link>
326 <description><pre><blockquote>Sun May 16 20:01:28 UTC 2010<br>patches/packages/fetchmail-6.3.17-i486-1_slack11.0.tgz: Upgraded.<br> A crafted header or POP3 UIDL list could cause a memory leak and crash<br> leading to a denial of service.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167<br> (* Security fix *)<br></blockquote></pre></description>
327 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1274040088</guid>
328 <pubDate>Sun, 16 May 2010 20:01:28 +0000</pubDate>
329 </item>
330 <item>
331 <title>1 update</title>
332 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1272589632</link>
333 <description><pre><blockquote>Fri Apr 30 01:07:12 UTC 2010<br>patches/packages/irssi-0.8.15-i486-2_slack11.0.tgz: Rebuilt.<br> Sorry, the perl modules were a mess in that last build on systems that<br> don't use a vendor_perl dir. This should work better.<br></blockquote></pre></description>
334 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1272589632</guid>
335 <pubDate>Fri, 30 Apr 2010 01:07:12 +0000</pubDate>
336 </item>
337 <item>
338 <title>1 update. Including a (* Security fix *)!</title>
339 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1271963634</link>
340 <description><pre><blockquote>Thu Apr 22 19:13:54 UTC 2010<br>patches/packages/irssi-0.8.15-i486-1_slack11.0.tgz: Upgraded.<br> From the NEWS file:<br> - Check if an SSL certificate matches the hostname of the server we are<br> connecting to.<br> - Fix crash when checking for fuzzy nick match when not on the channel.<br> Reported by Aurelien Delaitre (SATE 2009).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1155<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1156<br> (* Security fix *)<br></blockquote></pre></description>
341 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1271963634</guid>
342 <pubDate>Thu, 22 Apr 2010 19:13:54 +0000</pubDate>
343 </item>
344 <item>
345 <title>1 update. Including a (* Security fix *)!</title>
346 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1271774724</link>
347 <description><pre><blockquote>Tue Apr 20 14:45:24 UTC 2010<br>patches/packages/sudo-1.7.2p6-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes security issues that may give a user with permission<br> to run sudoedit the ability to run arbitrary commands.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163<br> http://www.gratisoft.us/sudo/alerts/sudoedit_escalate.html<br> http://www.gratisoft.us/sudo/alerts/sudoedit_escalate2.html<br> (* Security fix *)<br></blockquote></pre></description>
348 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1271774724</guid>
349 <pubDate>Tue, 20 Apr 2010 14:45:24 +0000</pubDate>
350 </item>
351 <item>
352 <title>1 update. Including a (* Security fix *)!</title>
353 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1270436779</link>
354 <description><pre><blockquote>Mon Apr 5 03:06:19 UTC 2010<br>patches/packages/mozilla-thunderbird-2.0.0.24-i686-1.tgz: Upgraded.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
355 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1270436779</guid>
356 <pubDate>Mon, 05 Apr 2010 03:06:19 +0000</pubDate>
357 </item>
358 <item>
359 <title>4 updates. Including a (* Security fix *)!</title>
360 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1270011947</link>
361 <description><pre><blockquote>Wed Mar 31 05:05:47 UTC 2010<br> (* Security fix *)<br>patches/packages/openssl-0.9.8n-i486-1_slack11.0.tgz: Upgraded.<br> This OpenSSL update contains some security related bugfixes.<br> For more information, see the included CHANGES and NEWS files, and:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0433<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740<br>patches/packages/openssl-solibs-0.9.8n-i486-1_slack11.0.tgz: Upgraded.<br>patches/packages/proftpd-1.3.3-i486-2_slack11.0.tgz: Rebuilt.<br> Recompiled against openssl-0.9.8n.<br>patches/packages/seamonkey-1.1.19-i486-1_slack11.0.tgz: Upgraded.<br> Upgraded to seamonkey-1.1.19.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
362 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1270011947</guid>
363 <pubDate>Wed, 31 Mar 2010 05:05:47 +0000</pubDate>
364 </item>
365 <item>
366 <title>2 updates</title>
367 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1268170281</link>
368 <description><pre><blockquote>Tue Mar 9 21:31:21 UTC 2010<br>patches/packages/openssl-0.9.8m-i486-2_slack11.0.tgz: Rebuilt.<br>patches/packages/openssl-solibs-0.9.8m-i486-2_slack11.0.tgz: Rebuilt.<br> The OpenSSL package has been patched and recompiled to revert a change that<br> broke decrypting some files encrypted with previous versions of OpenSSL.<br> This same fix appears in the latest upstream snapshots.<br></blockquote></pre></description>
369 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1268170281</guid>
370 <pubDate>Tue, 09 Mar 2010 21:31:21 +0000</pubDate>
371 </item>
372 <item>
373 <title>3 updates</title>
374 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1267419741</link>
375 <description><pre><blockquote>Mon Mar 1 05:02:21 UTC 2010<br> (* Security fix *)<br>patches/packages/openssl-0.9.8m-i486-1_slack11.0.tgz: Upgraded.<br> This OpenSSL update contains some security related bugfixes.<br> For more information, see the included CHANGES and NEWS files, and:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355<br>patches/packages/openssl-solibs-0.9.8m-i486-1_slack11.0.tgz: Upgraded.<br>patches/packages/proftpd-1.3.3-i486-1_slack11.0.tgz: Upgraded.<br></blockquote></pre></description>
376 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1267419741</guid>
377 <pubDate>Mon, 01 Mar 2010 05:02:21 +0000</pubDate>
378 </item>
379 <item>
380 <title>1 update. Including a (* Security fix *)!</title>
381 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1264364566</link>
382 <description><pre><blockquote>Sun Jan 24 20:22:46 UTC 2010<br>extra/php5/php-5.2.12-i486-1_slack11.0.tgz: Upgraded.<br> This fixes many bugs, including a few security issues.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3557<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3558<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4143<br> (* Security fix *)<br></blockquote></pre></description>
383 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1264364566</guid>
384 <pubDate>Sun, 24 Jan 2010 20:22:46 +0000</pubDate>
385 </item>
386 <item>
387 <title>1 update. Including a (* Security fix *)!</title>
388 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1260403978</link>
389 <description><pre><blockquote>Thu Dec 10 00:12:58 UTC 2009<br>patches/packages/ntp-4.2.2p3-i486-3_slack11.0.tgz: Rebuilt.<br> Prevent a denial-of-service attack involving spoofed mode 7 packets.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563<br> (* Security fix *)<br></blockquote></pre></description>
390 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1260403978</guid>
391 <pubDate>Thu, 10 Dec 2009 00:12:58 +0000</pubDate>
392 </item>
393 <item>
394 <title>1 update. Including a (* Security fix *)!</title>
395 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1259787115</link>
396 <description><pre><blockquote>Wed Dec 2 20:51:55 UTC 2009<br>patches/packages/bind-9.4.3_P4-i486-1_slack11.0.tgz: Upgraded.<br> BIND 9.4.3-P4 is a SECURITY PATCH for BIND 9.4.3-P3. It addresses a<br> potential cache poisoning vulnerability, in which data in the additional<br> section of a response could be cached without proper DNSSEC validation.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022<br> http://www.kb.cert.org/vuls/id/418861<br> (* Security fix *)<br></blockquote></pre></description>
397 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1259787115</guid>
398 <pubDate>Wed, 02 Dec 2009 20:51:55 +0000</pubDate>
399 </item>
400 <item>
401 <title>2 updates. Including a (* Security fix *)!</title>
402 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1258397786</link>
403 <description><pre><blockquote>Mon Nov 16 18:56:26 UTC 2009<br>patches/packages/openssl-0.9.8h-i486-4_slack11.0.tgz: Rebuilt.<br> Patched to disable SSL renegotiation.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8h-i486-4_slack11.0.tgz: Rebuilt.<br> Patched to disable SSL renegotiation.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555<br> (* Security fix *)<br></blockquote></pre></description>
404 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1258397786</guid>
405 <pubDate>Mon, 16 Nov 2009 18:56:26 +0000</pubDate>
406 </item>
407 <item>
408 <title>1 update. Including a (* Security fix *)!</title>
409 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1256692999</link>
410 <description><pre><blockquote>Wed Oct 28 01:23:19 UTC 2009<br>patches/packages/xpdf-3.02pl4-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes several security issues that could lead to an<br> application crash, or execution of arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609<br> (* Security fix *)<br></blockquote></pre></description>
411 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1256692999</guid>
412 <pubDate>Wed, 28 Oct 2009 01:23:19 +0000</pubDate>
413 </item>
414 <item>
415 <title></title>
416 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1254593940</link>
417 <description><pre><blockquote>Sat Oct 3 18:19:00 CDT 2009<br>extra/php5/php-5.2.11-i486-1_slack11.0.tgz:<br> This release fixes some possible security issues, all of which have<br> "unknown impact and attack vectors".<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293<br> (* Security fix *)<br>patches/packages/samba-3.0.37-i486-1_slack11.0.tgz:<br> This update fixes the following security issues.<br> A misconfigured /etc/passwd with no defined home directory could allow<br> security restrictions to be bypassed.<br> mount.cifs could allow a local user to read the first line of an arbitrary<br> file if installed setuid. (On Slackware, it was not installed setuid)<br> Specially crafted SMB requests could cause a denial of service.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906<br> (* Security fix *)<br></blockquote></pre></description>
418 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1254593940</guid>
419 <pubDate>Sat, 03 Oct 2009 18:19:00 +0000</pubDate>
420 </item>
421 <item>
422 <title>1 update. Including a (* Security fix *)!</title>
423 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1252357064</link>
424 <description><pre><blockquote>Mon Sep 7 20:57:44 CDT 2009<br>patches/packages/seamonkey-1.1.18-i486-1_slack11.0.tgz: Upgraded.<br> Upgraded to seamonkey-1.1.18.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
425 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1252357064</guid>
426 <pubDate>Mon, 07 Sep 2009 20:57:44 +0000</pubDate>
427 </item>
428 <item>
429 <title></title>
430 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1250806320</link>
431 <description><pre><blockquote>Thu Aug 20 22:12:00 CDT 2009<br>patches/packages/mozilla-thunderbird-2.0.0.23-i686-1.tgz:<br> This upgrade fixes a security bug.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
432 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1250806320</guid>
433 <pubDate>Thu, 20 Aug 2009 22:12:00 +0000</pubDate>
434 </item>
435 <item>
436 <title></title>
437 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1250257346</link>
438 <description><pre><blockquote>Fri Aug 14 13:42:26 CDT 2009<br>patches/packages/curl-7.15.5-i486-3_slack11.0.tgz:<br> This update fixes a security issue where a zero byte embedded in an SSL<br> or TLS certificate could fool cURL into validating the security of a<br> connection to a system that the certificate was not issued for. It has<br> been reported that at least one Certificate Authority allowed such<br> certificates to be issued.<br> For more information, see:<br> http://curl.haxx.se/docs/security.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417<br> (* Security fix *)<br></blockquote></pre></description>
439 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1250257346</guid>
440 <pubDate>Fri, 14 Aug 2009 13:42:26 +0000</pubDate>
441 </item>
442 <item>
443 <title>1 update</title>
444 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249655103</link>
445 <description><pre><blockquote>Fri Aug 7 14:25:03 CDT 2009<br>patches/packages/samba-3.0.36-i486-1_slack11.0.tgz: Upgraded.<br> This is a bugfix release.<br></blockquote></pre></description>
446 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249655103</guid>
447 <pubDate>Fri, 07 Aug 2009 14:25:03 +0000</pubDate>
448 </item>
449 <item>
450 <title>2 updates. Including a (* Security fix *)!</title>
451 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249585654</link>
452 <description><pre><blockquote>Thu Aug 6 19:07:34 CDT 2009<br>patches/packages/apr-1.3.8-i486-1_slack11.0.tgz: Upgraded.<br> Fix overflow in pools and rmm, where size alignment was taking place.<br> [Matt Lewis <mattlewis@google.com>, Sander Striker]<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412<br> (* Security fix *)<br>patches/packages/apr-util-1.3.9-i486-1_slack11.0.tgz: Upgraded.<br> Fix overflow in rmm, where size alignment was taking place.<br> [Matt Lewis <mattlewis@google.com>, Sander Striker]<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412<br> (* Security fix *)<br></blockquote></pre></description>
453 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249585654</guid>
454 <pubDate>Thu, 06 Aug 2009 19:07:34 +0000</pubDate>
455 </item>
456 <item>
457 <title>1 update. Including a (* Security fix *)!</title>
458 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249519710</link>
459 <description><pre><blockquote>Thu Aug 6 00:48:30 CDT 2009<br>patches/packages/fetchmail-6.3.11-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes an SSL NUL prefix impersonation attack through NULs in a<br> part of a X.509 certificate's CommonName and subjectAltName fields.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666<br> (* Security fix *)<br></blockquote></pre></description>
460 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1249519710</guid>
461 <pubDate>Thu, 06 Aug 2009 00:48:30 +0000</pubDate>
462 </item>
463 <item>
464 <title>1 update. Including a (* Security fix *)!</title>
465 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1248909001</link>
466 <description><pre><blockquote>Wed Jul 29 23:10:01 CDT 2009<br>patches/packages/bind-9.4.3_P3-i486-1_slack11.0.tgz: Upgraded.<br> This BIND update fixes a security problem where a specially crafted<br> dynamic update message packet will cause named to exit resulting in<br> a denial of service.<br> An active remote exploit is in wide circulation at this time.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696<br> https://www.isc.org/node/479<br> (* Security fix *)<br></blockquote></pre></description>
467 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1248909001</guid>
468 <pubDate>Wed, 29 Jul 2009 23:10:01 +0000</pubDate>
469 </item>
470 <item>
471 <title>1 update. Including a (* Security fix *)!</title>
472 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1247594861</link>
473 <description><pre><blockquote>Tue Jul 14 18:07:41 CDT 2009<br>patches/packages/dhcp-3.1.2p1-i486-1_slack11.0.tgz: Upgraded.<br> A stack overflow vulnerability was fixed in dhclient that could allow<br> remote attackers to execute arbitrary commands as root on the system,<br> or simply terminate the client, by providing an over-long subnet-mask<br> option.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692<br> (* Security fix *)<br></blockquote></pre></description>
474 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1247594861</guid>
475 <pubDate>Tue, 14 Jul 2009 18:07:41 +0000</pubDate>
476 </item>
477 <item>
478 <title></title>
479 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1247336944</link>
480 <description><pre><blockquote>Sat Jul 11 18:29:04 CDT 2009<br>extra/php5/php-5.2.10-i486-2_slack11.0.tgz:<br> Rebuilt. Installed the pear.php.net.reg and pecl.php.net.reg files from<br> php-5.2.9, since the ones installed by php-5.2.10 are broken.<br> Thanks to Mike Peachey for the bug report.<br></blockquote></pre></description>
481 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1247336944</guid>
482 <pubDate>Sat, 11 Jul 2009 18:29:04 +0000</pubDate>
483 </item>
484 <item>
485 <title>1 update</title>
486 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246459063</link>
487 <description><pre><blockquote>Wed Jul 1 14:37:43 CDT 2009<br>extra/php5/php-5.2.10-i486-1_slack11.0.tgz: Upgraded.<br></blockquote></pre></description>
488 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246459063</guid>
489 <pubDate>Wed, 01 Jul 2009 14:37:43 +0000</pubDate>
490 </item>
491 <item>
492 <title></title>
493 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246128847</link>
494 <description><pre><blockquote>Sat Jun 27 18:54:07 CDT 2009<br>patches/packages/mozilla-thunderbird-2.0.0.22-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.22.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
495 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246128847</guid>
496 <pubDate>Sat, 27 Jun 2009 18:54:07 +0000</pubDate>
497 </item>
498 <item>
499 <title></title>
500 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246053935</link>
501 <description><pre><blockquote>Fri Jun 26 22:05:35 CDT 2009<br>patches/packages/samba-3.0.35-i486-1_slack11.0.tgz:<br> This upgrade fixes the following security issue:<br> o CVE-2009-1888:<br> In Samba 3.0.31 to 3.3.5 (inclusive), an uninitialized read of a<br> data value can potentially affect access control when "dos filemode"<br> is set to "yes".<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888<br> (* Security fix *)<br></blockquote></pre></description>
502 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1246053935</guid>
503 <pubDate>Fri, 26 Jun 2009 22:05:35 +0000</pubDate>
504 </item>
505 <item>
506 <title></title>
507 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245872788</link>
508 <description><pre><blockquote>Wed Jun 24 19:46:28 CDT 2009<br>patches/packages/seamonkey-1.1.17-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.17.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
509 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245872788</guid>
510 <pubDate>Wed, 24 Jun 2009 19:46:28 +0000</pubDate>
511 </item>
512 <item>
513 <title>1 update. Including a (* Security fix *)!</title>
514 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245435740</link>
515 <description><pre><blockquote>Fri Jun 19 18:22:20 CDT 2009<br>patches/packages/libpng-1.2.37-i486-1_slack11.0.tgz: Upgraded.<br> This update fixes a possible security issue. Jeff Phillips discovered an<br> uninitialized-memory-read bug affecting interlaced images that may have<br> security implications.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042<br> (* Security fix *)<br></blockquote></pre></description>
516 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245435740</guid>
517 <pubDate>Fri, 19 Jun 2009 18:22:20 +0000</pubDate>
518 </item>
519 <item>
520 <title>1 update. Including a (* Security fix *)!</title>
521 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245428809</link>
522 <description><pre><blockquote>Fri Jun 19 16:26:49 CDT 2009<br>patches/packages/ruby-1.8.6_p369-i486-1_slack11.0.tgz: Upgraded.<br> This fixes a denial of service issue caused by the BigDecimal method<br> handling large input values improperly that may allow attackers to<br> crash the interpreter. The issue affects most Rails applications.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904<br> (* Security fix *)<br></blockquote></pre></description>
523 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245428809</guid>
524 <pubDate>Fri, 19 Jun 2009 16:26:49 +0000</pubDate>
525 </item>
526 <item>
527 <title>2 updates. Including a (* Security fix *)!</title>
528 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245104085</link>
529 <description><pre><blockquote>Mon Jun 15 22:14:45 CDT 2009<br>patches/packages/apr-1.3.5-i486-1_slack11.0.tgz: Upgraded.<br>patches/packages/apr-util-1.3.7-i486-1_slack11.0.tgz: Upgraded.<br> Fix underflow in apr_strmatch_precompile.<br> Fix a denial of service attack against the apr_xml_* interface<br> using the "billion laughs" entity expansion technique.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955<br> (* Security fix *)<br></blockquote></pre></description>
530 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1245104085</guid>
531 <pubDate>Mon, 15 Jun 2009 22:14:45 +0000</pubDate>
532 </item>
533 <item>
534 <title></title>
535 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1244052592</link>
536 <description><pre><blockquote>Wed Jun 3 18:09:52 CDT 2009<br>patches/packages/ntp-4.2.2p3-i486-1_slack11.0.tgz:<br> Patched a stack-based buffer overflow in the cookedprint function in<br> ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows arbitrary code<br> execution by a malicious remote NTP server.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159<br> (* Security fix *)<br></blockquote></pre></description>
537 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1244052592</guid>
538 <pubDate>Wed, 03 Jun 2009 18:09:52 +0000</pubDate>
539 </item>
540 <item>
541 <title></title>
542 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1242324566</link>
543 <description><pre><blockquote>Thu May 14 18:09:26 CDT 2009<br>patches/packages/cyrus-sasl-2.1.23-i486-1_slack11.0.tgz:<br> Upgraded to cyrus-sasl-2.1.23.<br> This fixes a buffer overflow in the sasl_encode64() function that could lead<br> to crashes or the execution of arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688<br> (* Security fix *)<br></blockquote></pre></description>
544 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1242324566</guid>
545 <pubDate>Thu, 14 May 2009 18:09:26 +0000</pubDate>
546 </item>
547 <item>
548 <title></title>
549 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1241892221</link>
550 <description><pre><blockquote>Sat May 9 18:03:41 CDT 2009<br>patches/packages/xpdf-3.02pl3-i486-1_slack11.0.tgz:<br> Upgraded to xpdf-3.02pl3.<br> This update fixes several overflows that may result in crashes or the<br> execution of arbitrary code as the xpdf user.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183<br>(* Security fix *)<br></blockquote></pre></description>
551 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1241892221</guid>
552 <pubDate>Sat, 09 May 2009 18:03:41 +0000</pubDate>
553 </item>
554 <item>
555 <title></title>
556 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1241124977</link>
557 <description><pre><blockquote>Thu Apr 30 20:56:17 CDT 2009<br>patches/packages/ruby-1.8.6_p368-i486-1_slack11.0.tgz:<br> Upgraded to ruby-1.8.6-p368.<br> This update fixes a DoS in REXML.<br> For details, see:<br> http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/<br> (* Security fix *)<br></blockquote></pre></description>
558 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1241124977</guid>
559 <pubDate>Thu, 30 Apr 2009 20:56:17 +0000</pubDate>
560 </item>
561 <item>
562 <title></title>
563 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1240270065</link>
564 <description><pre><blockquote>Mon Apr 20 23:27:45 CDT 2009<br>patches/packages/udev-097-i486-11_slack11.0.tgz:<br> This package has been patched to fix a local root hole.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185<br> (* Security fix *)<br></blockquote></pre></description>
565 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1240270065</guid>
566 <pubDate>Mon, 20 Apr 2009 23:27:45 +0000</pubDate>
567 </item>
568 <item>
569 <title></title>
570 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1239639732</link>
571 <description><pre><blockquote>Mon Apr 13 16:22:12 CDT 2009<br>patches/packages/seamonkey-1.1.16-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.16.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
572 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1239639732</guid>
573 <pubDate>Mon, 13 Apr 2009 16:22:12 +0000</pubDate>
574 </item>
575 <item>
576 <title></title>
577 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1239123589</link>
578 <description><pre><blockquote>Tue Apr 7 16:59:49 CDT 2009<br>patches/packages/openssl-0.9.8h-i486-3_slack11.0.tgz: Patched (see below).<br>patches/packages/openssl-solibs-0.9.8h-i486-3_slack11.0.tgz:<br> Patched to fix possible crashes as well as a (fairly unlikely) case<br> where an invalid signature might verify as valid.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590<br> (* Security fix *)<br>patches/packages/xine-lib-1.1.16.3-i486-1_slack11.0.tgz:<br> Upgraded to xine-lib-1.1.16.3.<br> - Fix another possible int overflow in the 4XM demuxer.<br> (ref. TKADV2009-004, CVE-2009-0385)<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385<br> (* Security fix *)<br>extra/php5/php-5.2.9-i486-1_slack11.0.tgz: Upgraded to php-5.2.9.<br> This update fixes a few security issues:<br> - Fixed a crash on extract in zip when files or directories entry names<br> contain a relative path.<br> - Fixed security issue in imagerotate(), background colour isn't validated<br> correctly with a non truecolour image. (CVE-2008-5498)<br> Reported by Hamid Ebadi, APA Laboratory.<br> - Fixed a segfault when malformed string is passed to json_decode().<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498<br> (* Security fix *)<br></blockquote></pre></description>
579 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1239123589</guid>
580 <pubDate>Tue, 07 Apr 2009 16:59:49 +0000</pubDate>
581 </item>
582 <item>
583 <title></title>
584 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1237859770</link>
585 <description><pre><blockquote>Tue Mar 24 01:56:10 CDT 2009<br>patches/packages/lcms-1.18-i486-1_slack11.0.tgz: Upgraded to lcms-1.18.<br> This update fixes security issues discovered in LittleCMS by Chris Evans.<br> These flaws could cause program crashes (denial of service) or the execution<br> of arbitrary code as the user of the lcms-linked program.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-2.0.0.21-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.21.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.15-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.15.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
586 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1237859770</guid>
587 <pubDate>Tue, 24 Mar 2009 01:56:10 +0000</pubDate>
588 </item>
589 <item>
590 <title></title>
591 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1236557045</link>
592 <description><pre><blockquote>Mon Mar 9 00:04:05 CDT 2009<br>patches/packages/curl-7.15.5-i486-2_slack11.0.tgz:<br> Patched curl-7.15.5.<br> This fixes a security issue where automatic redirection could be made to<br> follow file:// URLs, reading or writing a local instead of remote file.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037<br> (* Security fix *)<br></blockquote></pre></description>
593 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1236557045</guid>
594 <pubDate>Mon, 09 Mar 2009 00:04:05 +0000</pubDate>
595 </item>
596 <item>
597 <title></title>
598 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1235150449</link>
599 <description><pre><blockquote>Fri Feb 20 17:20:49 CST 2009<br>patches/packages/libpng-1.2.35-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.35.<br> This fixes multiple memory-corruption vulnerabilities due to a failure to<br> properly initialize data structures.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040<br> ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt<br> (* Security fix *)<br></blockquote></pre></description>
600 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1235150449</guid>
601 <pubDate>Fri, 20 Feb 2009 17:20:49 +0000</pubDate>
602 </item>
603 <item>
604 <title></title>
605 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1232038080</link>
606 <description><pre><blockquote>Thu Jan 15 16:48:00 CST 2009<br>patches/packages/bind-9.3.6_P1-i486-2_slack11.0.tgz:<br> Recompiled. The -1_slack11.0 package was compiled on a Slackware 11.0<br> system running a 2.6.x kernel, and this caused problems for machines running<br> the default 2.4.33.3 kernel. This package should run correctly.<br></blockquote></pre></description>
607 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1232038080</guid>
608 <pubDate>Thu, 15 Jan 2009 16:48:00 +0000</pubDate>
609 </item>
610 <item>
611 <title></title>
612 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1231965459</link>
613 <description><pre><blockquote>Wed Jan 14 20:37:39 CST 2009<br>patches/packages/bind-9.3.6_P1-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.6-P1.<br> Fixed checking on return values from OpenSSL's EVP_VerifyFinal and<br> DSA_do_verify functions to prevent spoofing answers returned from zones using<br> the DNSKEY algorithms DSA and NSEC3DSA.<br> For more information, see:<br> https://www.isc.org/node/373<br> http://www.ocert.org/advisories/ocert-2008-016.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025<br> (* Security fix *)<br>patches/packages/ntp-4.2.4p6-i486-1_slack11.0.tgz:<br> [Sec 1111] Fix incorrect check of EVP_VerifyFinal()'s return value.<br> For more information, see:<br> https://lists.ntp.org/pipermail/announce/2009-January/000055.html<br> http://www.ocert.org/advisories/ocert-2008-016.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077<br> (* Security fix *)<br>patches/packages/openssl-0.9.8h-i486-2_slack11.0.tgz:<br> Patched to fix the return value EVP_VerifyFinal, preventing malformed<br> signatures from being considered good. This flaw could possibly allow a<br> 'man in the middle' attack.<br> For more information, see:<br> http://www.openssl.org/news/secadv_20090107.txt<br> http://www.ocert.org/advisories/ocert-2008-016.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8h-i486-2_slack11.0.tgz:<br> Patched to fix the return value EVP_VerifyFinal, preventing malformed<br> signatures from being considered good. This flaw could possibly allow a<br> 'man in the middle' attack.<br> For more information, see:<br> http://www.openssl.org/news/secadv_20090107.txt<br> http://www.ocert.org/advisories/ocert-2008-016.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077<br> (* Security fix *)<br></blockquote></pre></description>
614 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1231965459</guid>
615 <pubDate>Wed, 14 Jan 2009 20:37:39 +0000</pubDate>
616 </item>
617 <item>
618 <title></title>
619 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1230723343</link>
620 <description><pre><blockquote>Wed Dec 31 11:35:43 CST 2008<br>patches/packages/mozilla-thunderbird-2.0.0.19-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.19.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
621 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1230723343</guid>
622 <pubDate>Wed, 31 Dec 2008 11:35:43 +0000</pubDate>
623 </item>
624 <item>
625 <title></title>
626 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1230331551</link>
627 <description><pre><blockquote>Fri Dec 26 22:45:51 CST 2008<br>patches/packages/seamonkey-1.1.14-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.14.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
628 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1230331551</guid>
629 <pubDate>Fri, 26 Dec 2008 22:45:51 +0000</pubDate>
630 </item>
631 <item>
632 <title></title>
633 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1229604299</link>
634 <description><pre><blockquote>Thu Dec 18 12:44:59 CST 2008<br>patches/packages/mozilla-firefox-2.0.0.20-i686-1.tgz:<br> Upgraded to firefox-2.0.0.20.<br> This fixes some security issues:<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/firefox20.html<br> (* Security fix *)<br></blockquote></pre></description>
635 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1229604299</guid>
636 <pubDate>Thu, 18 Dec 2008 12:44:59 +0000</pubDate>
637 </item>
638 <item>
639 <title></title>
640 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1228713344</link>
641 <description><pre><blockquote>Mon Dec 8 05:15:44 CST 2008<br>extra/php5/php-5.2.8-i486-1_slack11.0.tgz:<br>Upgraded to php-5.2.8.<br> This is a bugfix release that reverts a change that broke magic_quotes_gpc.<br></blockquote></pre></description>
642 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1228713344</guid>
643 <pubDate>Mon, 08 Dec 2008 05:15:44 +0000</pubDate>
644 </item>
645 <item>
646 <title></title>
647 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1228510462</link>
648 <description><pre><blockquote>Fri Dec 5 20:54:22 CST 2008<br>extra/php5/php-5.2.7-i486-1_slack11.0.tgz:<br>Upgraded to php-5.2.7.<br> In addition to improvements and bug fixes, this new version of PHP also<br> addresses several security issues, including:<br> Fixed a crash inside gd with invalid fonts (Fixes CVE-2008-3658).<br> Fixed a possible overflow inside memnstr (Fixes CVE-2008-3659).<br> Fixed security issues detailed in CVE-2008-2665 and CVE-2008-2666.<br> Crash with URI/file..php (filename contains 2 dots). (Fixes CVE-2008-3660).<br> rfc822.c legacy routine buffer overflow. (Fixes CVE-2008-2829).<br> Fixed extraction of zip files or directories when the entry name is a<br> relative path: http://www.sektioneins.de/advisories/SE-2008-06.txt<br> These are the URLs to get more information:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2665<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2666<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2829<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660<br> http://www.sektioneins.de/advisories/SE-2008-06.txt<br> (* Security fix *)<br></blockquote></pre></description>
649 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1228510462</guid>
650 <pubDate>Fri, 05 Dec 2008 20:54:22 +0000</pubDate>
651 </item>
652 <item>
653 <title></title>
654 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227965824</link>
655 <description><pre><blockquote>Sat Nov 29 13:37:04 CST 2008<br>patches/packages/ruby-1.8.6_p287-i486-1_slack11.0.tgz:<br> Upgraded to ruby-1.8.6-p287.<br> This fixes several bugs in the previous Ruby update, including a security<br> issue where the DNS resolver did not randomize the source port and<br> transaction id sufficiently.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447<br> (* Security fix *)<br></blockquote></pre></description>
656 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227965824</guid>
657 <pubDate>Sat, 29 Nov 2008 13:37:04 +0000</pubDate>
658 </item>
659 <item>
660 <title></title>
661 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227889672</link>
662 <description><pre><blockquote>Fri Nov 28 16:27:52 CST 2008<br>patches/packages/samba-3.0.33-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.33.<br> This package fixes an important barrier against rogue clients reading from<br> uninitialized memory (though no proof-of-concept is known to exist).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314<br> (* Security fix *)<br></blockquote></pre></description>
663 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227889672</guid>
664 <pubDate>Fri, 28 Nov 2008 16:27:52 +0000</pubDate>
665 </item>
666 <item>
667 <title></title>
668 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227204867</link>
669 <description><pre><blockquote>Thu Nov 20 18:14:27 CST 2008<br>patches/packages/mozilla-thunderbird-2.0.0.18-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.18.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
670 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227204867</guid>
671 <pubDate>Thu, 20 Nov 2008 18:14:27 +0000</pubDate>
672 </item>
673 <item>
674 <title></title>
675 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227121992</link>
676 <description><pre><blockquote>Wed Nov 19 19:13:12 CST 2008<br>patches/packages/libxml2-2.6.32-i486-1_slack11.0.tgz:<br> Upgraded to libxml2-2.6.32 and patched.<br> This fixes vulnerabilities including denial of service, or possibly the<br> execution of arbitrary code as the user running a libxml2 linked application<br> if untrusted XML content is parsed.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226<br> (* Security fix *)<br></blockquote></pre></description>
677 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1227121992</guid>
678 <pubDate>Wed, 19 Nov 2008 19:13:12 +0000</pubDate>
679 </item>
680 <item>
681 <title></title>
682 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1226776963</link>
683 <description><pre><blockquote>Sat Nov 15 19:22:43 CST 2008<br>patches/packages/mozilla-firefox-2.0.0.18-i686-1.tgz<br> Upgraded to firefox-2.0.0.18.<br> This fixes some security issues:<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/firefox20.html<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.13-i486-1_slack11.0.tgz<br> Upgraded to seamonkey-1.1.13.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
684 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1226776963</guid>
685 <pubDate>Sat, 15 Nov 2008 19:22:43 +0000</pubDate>
686 </item>
687 <item>
688 <title></title>
689 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1223906301</link>
690 <description><pre><blockquote>Mon Oct 13 13:58:21 CDT 2008<br>patches/packages/glibc-zoneinfo-2.3.6-noarch-11_slack11.0.tgz:<br> Upgraded to tzdata2008h for the latest world timezone changes.<br></blockquote></pre></description>
691 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1223906301</guid>
692 <pubDate>Mon, 13 Oct 2008 13:58:21 +0000</pubDate>
693 </item>
694 <item>
695 <title></title>
696 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1222468712</link>
697 <description><pre><blockquote>Fri Sep 26 22:38:32 CDT 2008<br>patches/packages/mozilla-thunderbird-2.0.0.17-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.17.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br></blockquote></pre></description>
698 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1222468712</guid>
699 <pubDate>Fri, 26 Sep 2008 22:38:32 +0000</pubDate>
700 </item>
701 <item>
702 <title></title>
703 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1222385047</link>
704 <description><pre><blockquote>Thu Sep 25 23:24:07 CDT 2008<br>patches/packages/mozilla-firefox-2.0.0.17-i686-1.tgz:<br> Upgraded to firefox-2.0.0.17.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/firefox20.html<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.12-i486-1_slack11.0.tgz:<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
705 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1222385047</guid>
706 <pubDate>Thu, 25 Sep 2008 23:24:07 +0000</pubDate>
707 </item>
708 <item>
709 <title></title>
710 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1221618500</link>
711 <description><pre><blockquote>Wed Sep 17 02:28:20 CDT 2008<br>patches/packages/bind-9.3.5_P2-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.5-P2.<br> This version has performance gains over bind-9.3.5-P1.<br></blockquote></pre></description>
712 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1221618500</guid>
713 <pubDate>Wed, 17 Sep 2008 02:28:20 +0000</pubDate>
714 </item>
715 <item>
716 <title></title>
717 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1220471503</link>
718 <description><pre><blockquote>Wed Sep 3 19:51:43 CDT 2008<br>patches/packages/php-4.4.9-i486-1_slack11.0.tgz:<br> Upgraded to php-4.4.9. This upgrades the bundled PCRE library to fix<br> security issues, as well as fixing a few other security related bugs.<br> See the PHP4 ChangeLog for more details:<br> http://www.php.net/ChangeLog-4.php#4.4.9<br> Please note: PHP4 has been officially discontinued since last year, and<br> reached the announced EOL on 2008-08-08. Sites should consider migrating<br> to a supported release.<br> (* Security fix *)<br></blockquote></pre></description>
719 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1220471503</guid>
720 <pubDate>Wed, 03 Sep 2008 19:51:43 +0000</pubDate>
721 </item>
722 <item>
723 <title></title>
724 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1220306189</link>
725 <description><pre><blockquote>Mon Sep 1 21:56:29 CDT 2008<br>patches/packages/samba-3.0.32-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.32. This is a bugfix release. See the WHATSNEW.txt<br> file in the Samba docs for details on what has changed.<br></blockquote></pre></description>
726 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1220306189</guid>
727 <pubDate>Mon, 01 Sep 2008 21:56:29 +0000</pubDate>
728 </item>
729 <item>
730 <title></title>
731 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1219963696</link>
732 <description><pre><blockquote>Thu Aug 28 22:48:16 CDT 2008<br>patches/packages/amarok-1.4.10-i486-1_slack11.0.tgz:<br> Upgraded to amarok-1.4.10. This fixes a security issue in the Magnatune<br> online music library support which could be used by malicious local users to<br> overwrite system files. For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699<br> (* Security fix *)<br>patches/packages/libgpod-0.6.0-i486-1_slack11.0.tgz:<br> Upgraded to libgpod-0.6.0. This new version of libgpod is required for<br> amarok-1.4.10.<br></blockquote></pre></description>
733 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1219963696</guid>
734 <pubDate>Thu, 28 Aug 2008 22:48:16 +0000</pubDate>
735 </item>
736 <item>
737 <title></title>
738 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217858581</link>
739 <description><pre><blockquote>Mon Aug 4 14:03:01 CDT 2008<br>patches/packages/python-2.4.5-i486-1_slack11.0.tgz:<br> Upgraded to 2.4.5 and patched overflows and other security problems.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144<br> (* Security fix *)<br></blockquote></pre></description>
740 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217858581</guid>
741 <pubDate>Mon, 04 Aug 2008 14:03:01 +0000</pubDate>
742 </item>
743 <item>
744 <title></title>
745 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217338341</link>
746 <description><pre><blockquote>Tue Jul 29 13:32:21 CDT 2008<br>patches/packages/proftpd-1.3.1-i486-1_slack11.0.tgz:<br> Recompiled against new OpenSSL, since this evidently checks the OpenSSL<br> version and will only run against the libraries it was compiled against.<br> A small patch was also added due to changes in the system includes.<br> Thanks to Martin Schmitz for the info and a pointer to the patch.<br></blockquote></pre></description>
747 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217338341</guid>
748 <pubDate>Tue, 29 Jul 2008 13:32:21 +0000</pubDate>
749 </item>
750 <item>
751 <title></title>
752 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217282706</link>
753 <description><pre><blockquote>Mon Jul 28 22:05:06 CDT 2008<br>patches/packages/fetchmail-6.3.8-i486-1_slack11.0.tgz:<br> Patched to fix a possible denial of service when "-v -v" options are used.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2711<br> (* Security fix *)<br>patches/packages/links-2.1-i486-1_slack11.0.tgz:<br> Upgraded to links-2.1.<br> Unspecified vulnerability in Links before 2.1, when "only proxies" is<br> enabled, has unknown impact and attack vectors related to providing<br> "URLs to external programs."<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3329<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-2.0.0.16-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.16.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/thunderbird20.html<br> (* Security fix *)<br>patches/packages/openssh-5.1p1-i486-1_slack11.0.tgz:<br> Upgraded to openssh-5.1p1.<br> When upgrading OpenSSH, it is VERY IMPORTANT to also upgrade OpenSSL, or<br> it is possible to be unable to log back into sshd!<br>patches/packages/openssl-0.9.8h-i486-1_slack11.0.tgz:<br> Upgraded to OpenSSL 0.9.8h.<br> The Codenomicon TLS test suite uncovered security bugs in OpenSSL.<br> If OpenSSL was compiled using non-default options (Slackware's package<br> is not), then a malicious packet could cause a crash. Also, a malformed<br> TLS handshake could also lead to a crash.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0891<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1672<br> When upgrading OpenSSL, it is VERY IMPORTANT to also upgrade OpenSSH, or<br> it is possible to be unable to log back into sshd!<br> (* Security fix *)<br>patches/packages/openssl-solibs-0.9.8h-i486-1_slack11.0.tgz:<br> Upgraded to OpenSSL 0.9.8h shared libraries (see above).<br> (* Security fix *)<br>patches/packages/vim-7.1.330-i486-1_slack11.0.tgz:<br> Upgraded to vim-7.1.330. This fixes several security issues related to<br> the automatic processing of untrusted files.<br> For more information, see:<br> http://www.rdancer.org/vulnerablevim.html<br> (* Security fix *)<br>patches/packages/vim-gvim-7.1.330-i486-1_slack11.0.tgz:<br> Upgraded to vim-gvim-7.1.330.<br> See "vim" above for details.<br> (* Security fix *)<br></blockquote></pre></description>
754 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1217282706</guid>
755 <pubDate>Mon, 28 Jul 2008 22:05:06 +0000</pubDate>
756 </item>
757 <item>
758 <title></title>
759 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1216830441</link>
760 <description><pre><blockquote>Wed Jul 23 16:27:21 CDT 2008<br>patches/packages/dnsmasq-2.45-i486-1_slack11.0.tgz:<br> Upgraded to dnsmasq-2.45.<br> It was discovered that earlier versions of dnsmasq have DNS cache<br> weaknesses that are similar to the ones recently discovered in BIND.<br> This new release minimizes the risk of cache poisoning.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447<br> (* Security fix *)<br></blockquote></pre></description>
761 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1216830441</guid>
762 <pubDate>Wed, 23 Jul 2008 16:27:21 +0000</pubDate>
763 </item>
764 <item>
765 <title></title>
766 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1216236505</link>
767 <description><pre><blockquote>Wed Jul 16 19:28:25 CDT 2008<br>patches/packages/mozilla-firefox-2.0.0.16-i686-1.tgz:<br> Upgraded to firefox-2.0.0.16.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/firefox20.html<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.11-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.11.<br> This release fixes some more security vulnerabilities.<br> For more information, see:<br> http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html<br> (* Security fix *)<br></blockquote></pre></description>
768 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1216236505</guid>
769 <pubDate>Wed, 16 Jul 2008 19:28:25 +0000</pubDate>
770 </item>
771 <item>
772 <title></title>
773 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1215633837</link>
774 <description><pre><blockquote>Wed Jul 9 20:03:57 CDT 2008<br>patches/packages/bind-9.3.5_P1-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.5-P1.<br> This upgrade addresses a security flaw known as the CERT VU#800113 DNS Cache<br> Poisoning Issue. This is the summary of the problem from the BIND site:<br> "A weakness in the DNS protocol may enable the poisoning of caching<br> recurive resolvers with spoofed data. DNSSEC is the only full solution.<br> New versions of BIND provide increased resilience to the attack."<br> It is suggested that sites that run BIND upgrade to one of the new packages<br> in order to reduce their exposure to DNS cache poisoning attacks.<br> For more information, see:<br> http://www.isc.org/sw/bind/bind-security.php<br> http://www.kb.cert.org/vuls/id/800113<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447<br> (* Security fix *)<br>patches/packages/mozilla-firefox-2.0.0.15-i686-1.tgz:<br> Upgraded to firefox-2.0.0.15.<br> This release closes several possible security vulnerabilities and bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.10-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.10.<br> This release closes several possible security vulnerabilities and bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
775 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1215633837</guid>
776 <pubDate>Wed, 09 Jul 2008 20:03:57 +0000</pubDate>
777 </item>
778 <item>
779 <title></title>
780 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1214608640</link>
781 <description><pre><blockquote>Fri Jun 27 23:17:20 CDT 2008<br>patches/packages/ruby-1.8.6_p230-i486-1_slack11.0.tgz:<br> Upgraded to ruby-1.8.6-p230.<br> This fixes a number of security related bugs in Ruby which could lead to a<br> denial of service (DoS) condition or allow execution of arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726<br> (* Security fix *)<br></blockquote></pre></description>
782 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1214608640</guid>
783 <pubDate>Fri, 27 Jun 2008 23:17:20 +0000</pubDate>
784 </item>
785 <item>
786 <title></title>
787 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1212003982</link>
788 <description><pre><blockquote>Wed May 28 19:46:22 CDT 2008<br>patches/packages/samba-3.0.30-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.30.<br> This is a security release in order to address CVE-2008-1105 ("Boundary<br> failure when parsing SMB responses can result in a buffer overrun").<br> For more information on the security issue, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105<br> (* Security fix *)<br></blockquote></pre></description>
789 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1212003982</guid>
790 <pubDate>Wed, 28 May 2008 19:46:22 +0000</pubDate>
791 </item>
792 <item>
793 <title></title>
794 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1211925212</link>
795 <description><pre><blockquote>Tue May 27 21:53:32 CDT 2008<br>patches/packages/rdesktop-1.6.0-i486-1_slack11.0.tgz:<br> Upgraded to rdesktop-1.6.0.<br> According to the rdesktop ChangeLog, this contains a:<br> "* Fix for potential vulnerability against compromised/malicious servers<br> (reported by iDefense)"<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801<br> (* Security fix *)<br></blockquote></pre></description>
796 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1211925212</guid>
797 <pubDate>Tue, 27 May 2008 21:53:32 +0000</pubDate>
798 </item>
799 <item>
800 <title></title>
801 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1210174113</link>
802 <description><pre><blockquote>Wed May 7 15:28:33 CDT 2008<br>patches/packages/mozilla-thunderbird-2.0.0.14-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.14.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>extra/php5/php-5.2.6-i486-1_slack11.0.tgz:<br> Upgraded to php-5.2.6. PHP4 was standard in Slackware 11.0, which is why<br> this package is provided "in place" under /extra rather than under /patches<br> (where upgrade tools might mistakenly grab and install it where it would not<br> be desirable.)<br> This version of PHP contains many fixes and enhancements. Some of the fixes<br> are security related, and the PHP release announcement provides this list:<br> * Fixed possible stack buffer overflow in the FastCGI SAPI identified by<br> Andrei Nigmatulin.<br> * Fixed integer overflow in printf() identified by Maksymilian Aciemowicz.<br> * Fixed security issue detailed in CVE-2008-0599 identified by Ryan Permeh.<br> * Fixed a safe_mode bypass in cURL identified by Maksymilian Arciemowicz.<br> * Properly address incomplete multibyte chars inside escapeshellcmd()<br> identified by Stefan Esser.<br> * Upgraded bundled PCRE to version 7.6<br> When last checked, CVE-2008-0599 was not yet open. However, additional<br> information should become available at this URL:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599<br> The list reproduced above, as well as additional information about other<br> fixes in PHP 5.2.6 may be found in the PHP release announcement here:<br> http://www.php.net/releases/5_2_6.php<br> (* Security fix *)<br></blockquote></pre></description>
803 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1210174113</guid>
804 <pubDate>Wed, 07 May 2008 15:28:33 +0000</pubDate>
805 </item>
806 <item>
807 <title></title>
808 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1209426377</link>
809 <description><pre><blockquote>Mon Apr 28 23:46:17 CDT 2008<br>patches/packages/libpng-1.2.27-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.27.<br> This fixes various bugs, the most important of which have to do with the<br> handling of unknown chunks containing zero-length data. Processing a PNG<br> image that contains these could cause the application using libpng to crash<br> (possibly resulting in a denial of service), could potentially expose the<br> contents of uninitialized memory, or could cause the execution of arbitrary<br> code as the user running libpng (though it would probably be quite difficult<br> to cause the execution of attacker-chosen code). We recommend upgrading the<br> package as soon as possible.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382<br> ftp://ftp.simplesystems.org/pub/libpng/png/src/libpng-1.2.27-README.txt<br> (* Security fix *)<br></blockquote></pre></description>
810 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1209426377</guid>
811 <pubDate>Mon, 28 Apr 2008 23:46:17 +0000</pubDate>
812 </item>
813 <item>
814 <title></title>
815 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1208648965</link>
816 <description><pre><blockquote>Sat Apr 19 23:49:25 CDT 2008<br>patches/packages/xine-lib-1.1.11.1-i686-3_slack11.0.tgz:<br> Recompiled, with --without-speex (we didn't ship the speex library in<br> Slackware anyway, but for reference this issue would be CVE-2008-1686),<br> and with --disable-nosefart (the recently reported as insecurely<br> demuxed NSF format). As before in -2, this package fixes the two<br> regressions mentioned in the release notes for xine-lib-1.1.12:<br> http://sourceforge.net/project/shownotes.php?release_id=592185&group_id=9655<br> (* Security fix *)<br></blockquote></pre></description>
817 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1208648965</guid>
818 <pubDate>Sat, 19 Apr 2008 23:49:25 +0000</pubDate>
819 </item>
820 <item>
821 <title></title>
822 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1208449555</link>
823 <description><pre><blockquote>Thu Apr 17 16:25:55 CDT 2008<br>patches/packages/mozilla-firefox-2.0.0.14-i686-1.tgz:<br> Upgraded to firefox-2.0.0.14.<br> This upgrade fixes a potential security bug.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
824 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1208449555</guid>
825 <pubDate>Thu, 17 Apr 2008 16:25:55 +0000</pubDate>
826 </item>
827 <item>
828 <title></title>
829 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207613856</link>
830 <description><pre><blockquote>Tue Apr 8 00:17:36 CDT 2008<br>patches/packages/xine-lib-1.1.11.1-i686-2_slack11.0.tgz:<br> Patched to fix playback failure affecting several media formats<br> accidentally broken in the xine-lib-1.1.11.1 release. Thanks to Diogo Sousa<br> for pointing me to the new release notes on xinehq.de.<br></blockquote></pre></description>
831 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207613856</guid>
832 <pubDate>Tue, 08 Apr 2008 00:17:36 +0000</pubDate>
833 </item>
834 <item>
835 <title></title>
836 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207533898</link>
837 <description><pre><blockquote>Mon Apr 7 02:04:58 CDT 2008<br>patches/packages/bzip2-1.0.5-i486-1_slack11.0.tgz: Upgraded to bzip2-1.0.5.<br> Previous versions of bzip2 contained a buffer overread error that could cause<br> applications linked to libbz2 to crash, resulting in a denial of service.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372<br> (* Security fix *)<br>patches/packages/m4-1.4.11-i486-1_slack11.0.tgz: Upgraded to m4-1.4.11.<br> In addition to bugfixes and enhancements, this version of m4 also fixes two<br> issues with possible security implications. A minor security fix with the<br> use of "maketemp" and "mkstemp" -- these are now quoted to prevent the<br> (rather unlikely) possibility that an unquoted string could match an<br> existing macro causing operations to be done on the wrong file. Also,<br> a problem with the '-F' option (introduced with version 1.4) could cause a<br> core dump or possibly (with certain file names) the execution of arbitrary<br> code. For more information on these issues, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1687<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1688<br> (* Security fix *)<br></blockquote></pre></description>
838 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207533898</guid>
839 <pubDate>Mon, 07 Apr 2008 02:04:58 +0000</pubDate>
840 </item>
841 <item>
842 <title></title>
843 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207312597</link>
844 <description><pre><blockquote>Fri Apr 4 12:36:37 CDT 2008<br>patches/packages/openssh-5.0p1-i486-1_slack11.0.tgz:<br>Upgraded to openssh-5.0p1.<br> This version fixes a security issue where local users could hijack forwarded<br> X connections. Upgrading to the new package is highly recommended.<br> For more information on this security issue, please see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483<br> (* Security fix *)<br></blockquote></pre></description>
845 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207312597</guid>
846 <pubDate>Fri, 04 Apr 2008 12:36:37 +0000</pubDate>
847 </item>
848 <item>
849 <title></title>
850 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207006438</link>
851 <description><pre><blockquote>Mon Mar 31 23:33:58 CDT 2008<br>patches/packages/xine-lib-1.1.11.1-i686-1_slack11.0.tgz:<br> Upgraded to xine-lib-1.1.11.1.<br> Earlier versions of xine-lib suffer from an integer overflow which may lead<br> to a buffer overflow that could potentially be used to gain unauthorized<br> access to the machine if a malicious media file is played back. File types<br> affected this time include .flv, .mov, .rm, .mve, .mkv, and .cak.<br> For more information on this security issue, please see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1482<br> (* Security fix *)<br></blockquote></pre></description>
852 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1207006438</guid>
853 <pubDate>Mon, 31 Mar 2008 23:33:58 +0000</pubDate>
854 </item>
855 <item>
856 <title></title>
857 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1206760157</link>
858 <description><pre><blockquote>Sat Mar 29 03:09:17 CDT 2008<br>patches/packages/mozilla-firefox-2.0.0.13-i686-1.tgz:<br> Upgraded to firefox-2.0.0.13.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.9-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.9.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>patches/packages/xine-lib-1.1.11-i686-1_slack11.0.tgz:<br> Earlier versions of xine-lib suffer from an array index bug that<br> may have security implications if a malicious RTSP stream is<br> played. Playback of other media formats is not affected.<br> If you use RTSP, you should probably upgrade xine-lib.<br> For more information on the security issue, please see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0073<br> (* Security fix *)<br></blockquote></pre></description>
859 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1206760157</guid>
860 <pubDate>Sat, 29 Mar 2008 03:09:17 +0000</pubDate>
861 </item>
862 <item>
863 <title></title>
864 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1204416953</link>
865 <description><pre><blockquote>Sun Mar 2 00:15:53 CST 2008<br>patches/packages/espgs-8.15.3svn185-i486-3_slack11.0.tgz:<br> This patched version of ESP Ghostscript fixes a buffer overflow.<br> For more information on the security issue, please see:<br> http://scary.beasts.org/security/CESA-2008-001.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411<br> Thanks to Chris Evans and Will Drewry of Google Security for their work<br> on discovering and demonstrating the overflow.<br>(* Security fix *)<br></blockquote></pre></description>
866 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1204416953</guid>
867 <pubDate>Sun, 02 Mar 2008 00:15:53 +0000</pubDate>
868 </item>
869 <item>
870 <title></title>
871 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1204386928</link>
872 <description><pre><blockquote>Sat Mar 1 15:55:28 CST 2008<br>patches/packages/mozilla-thunderbird-2.0.0.12-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.12.<br> This update fixes the following security related issues:<br> MFSA 2008-12: Heap buffer overflow in external MIME bodies<br> MFSA 2008-05: Directory traversal via chrome: URI<br> MFSA 2008-03: Privilege escalation, XSS, Remote Code Execution<br> MFSA 2008-01: Crashes with evidence of memory corruption (rv:1.8.1.12)<br> For more information, see:<br> http://www.mozilla.org/security/announce/2008/mfsa2008-12.html<br> http://www.mozilla.org/security/announce/2008/mfsa2008-05.html<br> http://www.mozilla.org/security/announce/2008/mfsa2008-03.html<br> http://www.mozilla.org/security/announce/2008/mfsa2008-01.html<br> These are the related CVE entries:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413<br>(* Security fix *)<br></blockquote></pre></description>
873 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1204386928</guid>
874 <pubDate>Sat, 01 Mar 2008 15:55:28 +0000</pubDate>
875 </item>
876 <item>
877 <title></title>
878 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1203010658</link>
879 <description><pre><blockquote>Thu Feb 14 17:37:38 CST 2008<br>patches/packages/apache-1.3.41-i486-1_slack11.0.tgz:<br> Upgraded to apache-1.3.41, the last regular release of the<br> Apache 1.3.x series, and a security bugfix-only release.<br> For more information about the security issues fixed, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847<br> (* Security fix *)<br>patches/packages/mod_ssl-2.8.31_1.3.41-i486-1_slack11.0.tgz:<br> Upgraded to mod_ssl-2.8.31-1.3.41 to work with apache_1.3.41.<br>patches/packages/php-4.4.8-i486-1_slack11.0.tgz:<br> Upgraded to php-4.4.8. This is a security and bugfix release.<br> More information may be found here:<br> http://bugs.php.net/43010<br> This is the last regular release of PHP-4.4.x.<br> The EOL is scheduled for 2008-08-08.<br> (* Security fix *)<br></blockquote></pre></description>
880 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1203010658</guid>
881 <pubDate>Thu, 14 Feb 2008 17:37:38 +0000</pubDate>
882 </item>
883 <item>
884 <title></title>
885 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1202857654</link>
886 <description><pre><blockquote>Tue Feb 12 23:07:34 CST 2008<br>patches/packages/mozilla-firefox-2.0.0.12-i686-1.tgz:<br> Upgraded to firefox-2.0.0.12.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.8-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.8.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
887 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1202857654</guid>
888 <pubDate>Tue, 12 Feb 2008 23:07:34 +0000</pubDate>
889 </item>
890 <item>
891 <title></title>
892 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1199126992</link>
893 <description><pre><blockquote>Mon Dec 31 18:49:52 CST 2007<br>patches/packages/glibc-zoneinfo-2.3.6-noarch-10_slack11.0.tgz:<br> Some deja vu. ;-)<br> Upgraded to tzdata2007k. A new year should be started with the<br> latest timezone data, so here it is.<br> Happy holidays, and a happy new year to all! :-)<br></blockquote></pre></description>
894 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1199126992</guid>
895 <pubDate>Mon, 31 Dec 2007 18:49:52 +0000</pubDate>
896 </item>
897 <item>
898 <title></title>
899 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1198511666</link>
900 <description><pre><blockquote>Mon Dec 24 15:54:26 CST 2007<br>patches/packages/glibc-zoneinfo-2.3.6-noarch-9_slack11.0.tgz:<br> Upgraded to tzdata2007j. A new year should be started with the<br> latest timezone data, so here it is.<br> Happy holidays, and a happy new year to all! :-)<br></blockquote></pre></description>
901 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1198511666</guid>
902 <pubDate>Mon, 24 Dec 2007 15:54:26 +0000</pubDate>
903 </item>
904 <item>
905 <title></title>
906 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1197655439</link>
907 <description><pre><blockquote>Fri Dec 14 18:03:59 CST 2007<br>patches/packages/mysql-5.0.51-i486-1_slack11.0.tgz:<br> Upgraded to mysql-5.0.51.<br> This release fixes several bugs, including some security issues.<br> However, it also includes a potentially incompatible change, so be sure<br> to read the release notes before upgrading. It is possible that some<br> databases will need to be fixed in order to work with this (and future)<br> releases:<br> http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html<br> For more information about the security issues fixed, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3781<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969<br> (* Security fix *)<br></blockquote></pre></description>
908 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1197655439</guid>
909 <pubDate>Fri, 14 Dec 2007 18:03:59 +0000</pubDate>
910 </item>
911 <item>
912 <title></title>
913 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1197290735</link>
914 <description><pre><blockquote>Mon Dec 10 12:45:35 CST 2007<br>patches/packages/samba-3.0.28-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.28.<br> Samba 3.0.28 is a security release in order to address a boundary failure<br> in GETDC mailslot processing that can result in a buffer overrun leading<br> to possible code execution.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015<br> http://www.samba.org/samba/history/samba-3.0.28.html<br> http://secunia.com/secunia_research/2007-99/advisory/<br> (* Security fix *)<br></blockquote></pre></description>
915 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1197290735</guid>
916 <pubDate>Mon, 10 Dec 2007 12:45:35 +0000</pubDate>
917 </item>
918 <item>
919 <title></title>
920 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196711931</link>
921 <description><pre><blockquote>Mon Dec 3 19:58:51 CST 2007<br>patches/packages/cairo-1.4.12-i486-1_slack11.0.tgz:<br> Upgraded to cairo-1.4.12.<br> This fixes a possible security risk when decoding PNG files that may have<br> been maliciously tampered with:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503<br> (* Security fix *)<br>patches/packages/samba-3.0.27a-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.27a.<br> This update fixes a crash bug regression experienced by smbfs clients caused<br> by the fix for CVE-2007-4572.<br></blockquote></pre></description>
922 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196711931</guid>
923 <pubDate>Mon, 03 Dec 2007 19:58:51 +0000</pubDate>
924 </item>
925 <item>
926 <title></title>
927 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196528238</link>
928 <description><pre><blockquote>Sat Dec 1 16:57:18 CST 2007<br>patches/packages/rsync-2.6.9-i486-1_slack11.0.tgz:<br> Patched some security bugs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091<br> http://lists.samba.org/archive/rsync-announce/2007/000050.html<br> (* Security fix *)<br>patches/packages/mozilla-firefox-2.0.0.11-i686-1.tgz: Upgraded to Firefox<br> 2.0.0.11, which fixed a bug introduced by the 2.0.0.10 update in the<br> <canvas> feature that affected some web pages and extensions.<br></blockquote></pre></description>
929 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196528238</guid>
930 <pubDate>Sat, 01 Dec 2007 16:57:18 +0000</pubDate>
931 </item>
932 <item>
933 <title></title>
934 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196367570</link>
935 <description><pre><blockquote>Thu Nov 29 20:19:30 CST 2007<br>patches/packages/seamonkey-1.1.7-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.7.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
936 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196367570</guid>
937 <pubDate>Thu, 29 Nov 2007 20:19:30 +0000</pubDate>
938 </item>
939 <item>
940 <title></title>
941 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196180587</link>
942 <description><pre><blockquote>Tue Nov 27 16:23:07 CST 2007<br>patches/packages/mozilla-firefox-2.0.0.10-i686-1.tgz:<br> Upgraded to firefox-2.0.0.10.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
943 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1196180587</guid>
944 <pubDate>Tue, 27 Nov 2007 16:23:07 +0000</pubDate>
945 </item>
946 <item>
947 <title></title>
948 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195606551</link>
949 <description><pre><blockquote>Wed Nov 21 00:55:51 CST 2007<br>patches/packages/libpng-1.2.23-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.23.<br> Previous libpng versions may crash when loading malformed PNG files.<br> It is not currently known if this vulnerability can be exploited to<br> execute malicious code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5266<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5267<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5268<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269<br> (* Security fix *)<br></blockquote></pre></description>
950 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195606551</guid>
951 <pubDate>Wed, 21 Nov 2007 00:55:51 +0000</pubDate>
952 </item>
953 <item>
954 <title></title>
955 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195577398</link>
956 <description><pre><blockquote>Tue Nov 20 16:49:58 CST 2007<br>patches/packages/mozilla-thunderbird-2.0.0.9-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.9.<br> This update fixes the following security related issues:<br> URIs with invalid %-encoding mishandled by Windows (MFSA 2007-36).<br> Crashes with evidence of memory corruption (MFSA 2007-29).<br> OK, so the first one obviously does not affect us. :-) The second fix has<br> to do with the same JavaScript handling problem fixed before in Firefox.<br> JavaScript is not enabled by default in Thunderbird, and the developers<br> (at least in MFSA 2007-36) do not recommend turning it on.<br> For more information, see:<br> http://www.mozilla.org/security/announce/2007/mfsa2007-36.html<br> http://www.mozilla.org/security/announce/2007/mfsa2007-29.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4841<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339<br> (* Security fix *)<br></blockquote></pre></description>
957 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195577398</guid>
958 <pubDate>Tue, 20 Nov 2007 16:49:58 +0000</pubDate>
959 </item>
960 <item>
961 <title></title>
962 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195233738</link>
963 <description><pre><blockquote>Fri Nov 16 17:22:18 CST 2007<br>patches/packages/samba-3.0.27-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.27.<br> Samba 3.0.27 is a security release in order to address a stack buffer<br> overflow in nmbd's logon request processing, and remote code execution in<br> Samba's WINS server daemon (nmbd) when processing name registration followed<br> name query requests.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398<br> (* Security fix *)<br></blockquote></pre></description>
964 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1195233738</guid>
965 <pubDate>Fri, 16 Nov 2007 17:22:18 +0000</pubDate>
966 </item>
967 <item>
968 <title></title>
969 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194830734</link>
970 <description><pre><blockquote>Mon Nov 12 01:25:34 CST 2007<br>patches/packages/kdegraphics-3.5.4-i486-2_slack11.0.tgz:<br> Patched xpdf related bugs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393<br> (* Security fix *)<br>patches/packages/koffice-1.5.2-i486-5_slack11.0.tgz:<br> Patched xpdf related bugs.<br> For more information, see:<br> http://www.kde.org/info/security/advisory-20071107-1.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393<br> (* Security fix *)<br>patches/packages/xpdf-3.02pl2-i486-1_slack11.0.tgz:<br> Upgraded to xpdf-3.02pl2.<br> The pl2 patch fixes a crash in xpdf.<br> Some theorize that this could be used to execute arbitrary code if an<br> untrusted PDF file is opened, but no real-world examples are known (yet).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393<br> (* Security fix *)<br></blockquote></pre></description>
971 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194830734</guid>
972 <pubDate>Mon, 12 Nov 2007 01:25:34 +0000</pubDate>
973 </item>
974 <item>
975 <title></title>
976 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194733142</link>
977 <description><pre><blockquote>Sat Nov 10 22:19:02 CST 2007<br>extra/php5/php-5.2.5-i486-2_slack11.0.tgz:<br> The security/bug fix update for Slackware 11.0 has been reissued<br> to fix a zero-length /usr/bin/php-cgi. Thanks to TJ Munro for<br> pointing this out. We appreciate the fast weekend Q/A. :-)<br> This package should be installed rather than the previously<br> released php-5.2.5-i486-1_slack11.0 (unless you do not use<br> /usr/php/php-cgi in which case either package will do.)<br> (* Security fix *)<br></blockquote></pre></description>
978 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194733142</guid>
979 <pubDate>Sat, 10 Nov 2007 22:19:02 +0000</pubDate>
980 </item>
981 <item>
982 <title></title>
983 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194709019</link>
984 <description><pre><blockquote>Sat Nov 10 15:36:59 CST 2007<br>patches/packages/mozilla-firefox-2.0.0.9-i686-1.tgz:<br> Upgraded to firefox-2.0.0.9.<br> This upgrade improves the stability of Firefox.<br> For more information, see:<br> http://developer.mozilla.org/devnews/index.php/2007/11/01/firefox-2009-stability-update-now-available-for-download/<br>extra/php5/php-5.2.5-i486-1_slack11.0.tgz:<br> Upgraded to php-5.2.5.<br> This fixes bugs and security issues.<br> For more information, see:<br> http://www.php.net/releases/5_2_5.php<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4887<br> (* Security fix *)<br></blockquote></pre></description>
985 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194709019</guid>
986 <pubDate>Sat, 10 Nov 2007 15:36:59 +0000</pubDate>
987 </item>
988 <item>
989 <title></title>
990 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194626052</link>
991 <description><pre><blockquote>Fri Nov 9 16:34:12 CST 2007<br>patches/packages/seamonkey-1.1.6-i486-1_slack11.tgz:<br> Upgraded to SeaMonkey 1.1.6.<br> This upgrade fixes SeaMonkey's ability to display certain types of web pages.<br> That's about all we could find about it here:<br> http://www.mozilla.org/projects/seamonkey/<br></blockquote></pre></description>
992 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1194626052</guid>
993 <pubDate>Fri, 09 Nov 2007 16:34:12 +0000</pubDate>
994 </item>
995 <item>
996 <title></title>
997 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1193954633</link>
998 <description><pre><blockquote>Thu Nov 1 22:03:53 CDT 2007<br>patches/packages/cups-1.2.11-i486-2_slack12.0.tgz:<br> Patched cups-1.2.11.<br> An off-by-one error in ipp.c may allow a remote attacker to crash CUPS<br> resulting in a denial of service.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351<br> (* Security fix *)<br></blockquote></pre></description>
999 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1193954633</guid>
1000 <pubDate>Thu, 01 Nov 2007 22:03:53 +0000</pubDate>
1001 </item>
1002 <item>
1003 <title></title>
1004 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1193266948</link>
1005 <description><pre><blockquote>Wed Oct 24 23:02:28 CDT 2007<br>patches/packages/mozilla-firefox-2.0.0.8-i686-1.tgz:<br> Upgraded to firefox-2.0.0.8.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.5-i486-1_slack12.0.tgz:<br> Upgraded to seamonkey-1.1.5.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>extra/mozilla-2.0.0.6/: Removed. Since the 1.5.0.x branch is no longer<br> supported, there's little point in leaving it up (at least in /extra...)<br></blockquote></pre></description>
1006 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1193266948</guid>
1007 <pubDate>Wed, 24 Oct 2007 23:02:28 +0000</pubDate>
1008 </item>
1009 <item>
1010 <title></title>
1011 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1192017050</link>
1012 <description><pre><blockquote>Wed Oct 10 11:50:50 CDT 2007<br>patches/packages/glibc-zoneinfo-2.3.6-noarch-8_slack11.0.tgz:<br> Upgraded to timezone data from tzcode2007h and tzdata2007h.<br> This contains the latest timezone data from NIST, including some important<br> changes to daylight savings time in Brasil and New Zealand.<br></blockquote></pre></description>
1013 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1192017050</guid>
1014 <pubDate>Wed, 10 Oct 2007 11:50:50 +0000</pubDate>
1015 </item>
1016 <item>
1017 <title></title>
1018 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1189610406</link>
1019 <description><pre><blockquote>Wed Sep 12 15:20:06 CDT 2007<br>patches/packages/openssh-4.7p1-i486-1_slack11.0.tgz:<br> Upgraded to openssh-4.7p1.<br> From the OpenSSH release notes:<br> "Security bugs resolved in this release: Prevent ssh(1) from using a<br> trusted X11 cookie if creation of an untrusted cookie fails; found and<br> fixed by Jan Pechanec."<br> While it's fair to say that we here at Slackware don't see how this could<br> be leveraged to compromise a system, a) the OpenSSH people (who presumably<br> understand the code better) characterize this as a security bug, b) it has<br> been assigned a CVE entry, and c) OpenSSH is one of the most commonly used<br> network daemons. Better safe than sorry.<br> More information should appear here eventually:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752<br> (* Security fix *)<br>patches/packages/samba-3.0.26a-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.26a.<br> This fixes a security issue in all Samba 3.0.25 versions:<br> "Incorrect primary group assignment for domain users using the rfc2307<br> or sfu winbind nss info plugin."<br> For more information, see:<br> http://www.samba.org/samba/security/CVE-2007-4138.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4138<br> (* Security fix *)<br>extra/php5/php-5.2.4-i486-1_slack11.0.tgz:<br> Upgraded to php-5.2.4. The PHP announcement says this version fixes over<br> 120 bugs as well as "several low priority security bugs."<br> Read more about it here:<br> http://www.php.net/releases/5_2_4.php<br> (* Security fix *)<br></blockquote></pre></description>
1020 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1189610406</guid>
1021 <pubDate>Wed, 12 Sep 2007 15:20:06 +0000</pubDate>
1022 </item>
1023 <item>
1024 <title></title>
1025 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1187449232</link>
1026 <description><pre><blockquote>Sat Aug 18 15:00:32 CDT 2007<br>patches/packages/tcpdump-3.9.7-i486-1_slack11.0.tgz:<br> Upgraded to libpcap-0.9.7, tcpdump-3.9.7.<br> This new version fixes an integer overflow in the BGP dissector which<br> could possibly allow remote attackers to crash tcpdump or to execute<br> arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798<br> (* Security fix *)<br></blockquote></pre></description>
1027 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1187449232</guid>
1028 <pubDate>Sat, 18 Aug 2007 15:00:32 +0000</pubDate>
1029 </item>
1030 <item>
1031 <title></title>
1032 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1186785553</link>
1033 <description><pre><blockquote>Fri Aug 10 22:39:13 CDT 2007<br>patches/packages/gimp-2.2.17-i486-1_slack11.0.tgz:<br> Upgraded to gimp-2.2.17, which fixes buffer overflows when decoding<br> certain image types.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2949<br> (* Security fix *)<br>patches/packages/qt-3.3.8-i486-2_slack11.0.tgz:<br> Patched to fix several format string bugs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.4-i486-1_slack11.tgz:<br> Upgraded to seamonkey-1.1.4.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>patches/packages/xpdf-3.02pl1-i486-1_slack11.0.tgz:<br> Upgraded to xpdf-3.02pl1. This fixes an integer overflow that could possibly<br> be leveraged to run arbitrary code if a malicious PDF file is processed.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387<br> (* Security fix *)<br></blockquote></pre></description>
1034 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1186785553</guid>
1035 <pubDate>Fri, 10 Aug 2007 22:39:13 +0000</pubDate>
1036 </item>
1037 <item>
1038 <title></title>
1039 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1186155815</link>
1040 <description><pre><blockquote>Fri Aug 3 15:43:35 CDT 2007<br>patches/packages/mozilla-thunderbird-2.0.0.6-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.6.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br></blockquote></pre></description>
1041 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1186155815</guid>
1042 <pubDate>Fri, 03 Aug 2007 15:43:35 +0000</pubDate>
1043 </item>
1044 <item>
1045 <title></title>
1046 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185976371</link>
1047 <description><pre><blockquote>Wed Aug 1 13:52:51 CDT 2007<br>extra/mozilla-firefox-2.0.0.6/mozilla-firefox-2.0.0.6-i686-1.tgz:<br> Upgraded to firefox-2.0.0.6.<br> This upgrade fixes some more security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1048 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185976371</guid>
1049 <pubDate>Wed, 01 Aug 2007 13:52:51 +0000</pubDate>
1050 </item>
1051 <item>
1052 <title></title>
1053 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185465102</link>
1054 <description><pre><blockquote>Thu Jul 26 15:51:42 CDT 2007<br>patches/packages/bind-9.3.4_P1-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.4_P1 to fix a security issue.<br> The query IDs in BIND9 prior to BIND 9.3.4-P1 are cryptographically weak.<br> For more information on this issue, see:<br> http://www.isc.org/index.pl?/sw/bind/bind-security.php<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926<br> (* Security fix *)<br></blockquote></pre></description>
1055 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185465102</guid>
1056 <pubDate>Thu, 26 Jul 2007 15:51:42 +0000</pubDate>
1057 </item>
1058 <item>
1059 <title></title>
1060 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185280816</link>
1061 <description><pre><blockquote>Tue Jul 24 12:40:16 CDT 2007<br>patches/packages/mozilla-thunderbird-2.0.0.5-i686-1.tgz:<br> Upgraded to thunderbird-2.0.0.5. Since Thunderbird shares the browser engine<br> with Firefox it is susceptible to similar vulnerabilities. This update fixes<br> the same issues fixed in the recent Firefox patch.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.3-i486-1_slack11.tgz:<br> Upgraded to seamonkey-1.1.3. This is presumably a security update, but the<br> details on the net have been sparse. So far nothing has appeared at the<br> usual URL, but I would treat this as a security update unless it is announced<br> as otherwise.<br> For more information (if/when it appears), see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
1062 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1185280816</guid>
1063 <pubDate>Tue, 24 Jul 2007 12:40:16 +0000</pubDate>
1064 </item>
1065 <item>
1066 <title></title>
1067 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1184849748</link>
1068 <description><pre><blockquote>Thu Jul 19 12:55:48 CDT 2007<br>extra/mozilla-firefox-2.0.0.5/mozilla-firefox-2.0.0.5-i686-1.tgz:<br> Upgraded to firefox-2.0.0.5.<br> This upgrade fixes a couple of minor security bugs. Nobody here is launching<br> Firefox from Internet Explorer, right? :-)<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1069 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1184849748</guid>
1070 <pubDate>Thu, 19 Jul 2007 12:55:48 +0000</pubDate>
1071 </item>
1072 <item>
1073 <title></title>
1074 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1182906692</link>
1075 <description><pre><blockquote>Wed Jun 27 01:11:32 CDT 2007<br>patches/packages/gd-2.0.35-i486-1_slack11.0.tgz:<br> Upgraded to gd-2.0.35.<br> This fixes a few possible security issues:<br> * Possible infinite loop in the PNG reader<br> * Possible integer overflow in gdImageCreateTrueColor<br> * Possible crash in gdImageCreateXbm<br> * Numerous flaws in the GIF reader<br> (* Security fix *)<br></blockquote></pre></description>
1076 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1182906692</guid>
1077 <pubDate>Wed, 27 Jun 2007 01:11:32 +0000</pubDate>
1078 </item>
1079 <item>
1080 <title></title>
1081 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1181770983</link>
1082 <description><pre><blockquote>Wed Jun 13 21:43:03 CDT 2007<br>patches/packages/libexif-0.6.16-i486-1_slack11.0.tgz:<br> Upgraded to libexif-0.6.16.<br> An integer overflow in libexif can crash applications that use the library<br> on malformed images. The upstream advisory indicates that this flaw could<br> also be used to execute arbitrary code in the context of the user, but no<br> exploit is known (by us) to exist among iDefense's researchers or in the<br> wild. But, as a crash bug and heap overflow one must suppose that the<br> possibility exists.<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4168<br> (* Security fix *)<br></blockquote></pre></description>
1083 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1181770983</guid>
1084 <pubDate>Wed, 13 Jun 2007 21:43:03 +0000</pubDate>
1085 </item>
1086 <item>
1087 <title></title>
1088 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180734650</link>
1089 <description><pre><blockquote>Fri Jun 1 21:50:50 CDT 2007<br>patches/packages/mozilla-firefox-1.5.0.12-i686-1.tgz:<br> Upgraded to firefox-1.5.0.12.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-1.5.0.12-i686-1.tgz:<br> Upgraded to thunderbird-1.5.0.12.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>patches/packages/seamonkey-1.1.2-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.2.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>extra/mozilla-firefox-2.0.0.4/mozilla-firefox-2.0.0.4-i686-1.tgz:<br> Upgraded to firefox-2.0.0.4.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1090 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180734650</guid>
1091 <pubDate>Fri, 01 Jun 2007 21:50:50 +0000</pubDate>
1092 </item>
1093 <item>
1094 <title></title>
1095 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180709811</link>
1096 <description><pre><blockquote>Fri Jun 1 14:56:51 CDT 2007<br>extra/php5/php-5.2.3-i486-1_slack11.0.tgz:<br>Upgraded to php-5.2.3.<br> Here's some basic information about the release from php.net:<br> "This release continues to improve the security and the stability of the<br> 5.X branch as well as addressing two regressions introduced by the<br> previous 5.2 releases. These regressions relate to the timeout handling<br> over non-blocking SSL connections and the lack of HTTP_RAW_POST_DATA in<br> certain conditions. All users are encouraged to upgrade to this release."<br> For more complete information, see:<br> http://www.php.net/releases/5_2_3.php<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1900<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872<br> (* Security fix *)<br></blockquote></pre></description>
1097 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180709811</guid>
1098 <pubDate>Fri, 01 Jun 2007 14:56:51 +0000</pubDate>
1099 </item>
1100 <item>
1101 <title></title>
1102 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180092422</link>
1103 <description><pre><blockquote>Fri May 25 11:27:02 CDT 2007<br>patches/packages/samba-3.0.25a-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.25a. This fixes some major (non-security) bugs in<br> samba-3.0.25. See the WHATSNEW.txt for details.<br></blockquote></pre></description>
1104 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1180092422</guid>
1105 <pubDate>Fri, 25 May 2007 11:27:02 +0000</pubDate>
1106 </item>
1107 <item>
1108 <title></title>
1109 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179332219</link>
1110 <description><pre><blockquote>Wed May 16 16:16:59 CDT 2007<br>patches/packages/libpng-1.2.18-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.18.<br> A grayscale PNG image with a malformed (bad CRC) tRNS chunk will crash some<br> libpng applications. This vulnerability has been assigned the identifiers<br> CVE-2007-2445 and CERT VU#684664.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445<br> (* Security fix *)<br></blockquote></pre></description>
1111 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179332219</guid>
1112 <pubDate>Wed, 16 May 2007 16:16:59 +0000</pubDate>
1113 </item>
1114 <item>
1115 <title></title>
1116 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179166963</link>
1117 <description><pre><blockquote>Mon May 14 18:22:43 CDT 2007<br>patches/packages/samba-3.0.25-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.25.<br> Security Fixes included in the Samba 3.0.25 release are:<br> o CVE-2007-2444<br> Versions: Samba 3.0.23d - 3.0.25pre2<br> Local SID/Name translation bug can result in<br> user privilege elevation<br> o CVE-2007-2446<br> Versions: Samba 3.0.0 - 3.0.24<br> Multiple heap overflows allow remote code execution<br> o CVE-2007-2447<br> Versions: Samba 3.0.0 - 3.0.24<br> Unescaped user input parameters are passed as<br> arguments to /bin/sh allowing for remote command<br> execution<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2444<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447<br> (* Security fix *)<br></blockquote></pre></description>
1118 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179166963</guid>
1119 <pubDate>Mon, 14 May 2007 18:22:43 +0000</pubDate>
1120 </item>
1121 <item>
1122 <title></title>
1123 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179160771</link>
1124 <description><pre><blockquote>Mon May 14 16:39:31 CDT 2007<br>patches/packages/seamonkey-1.1.1-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.1.1. Removed various symlinks to NSS libraries.<br> If you plan to rebuild the pidgin package in unsupported/pidgin/stable for<br> any reason (you shouldn't need to), first upgrade to this package and then<br> upgradepkg --reinstall the mozilla-nss package.<br></blockquote></pre></description>
1125 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1179160771</guid>
1126 <pubDate>Mon, 14 May 2007 16:39:31 +0000</pubDate>
1127 </item>
1128 <item>
1129 <title></title>
1130 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178813674</link>
1131 <description><pre><blockquote>Thu May 10 16:14:34 CDT 2007<br>testing/packages/bash-3.2.017-i486-1_slack11.0.tgz: Upgraded to bash-3.2.017.<br> Moved here from /patches/packages. Honestly, I think /testing may be a<br> better place for bash-3.2 for a while longer -- it's causing trouble with<br> many old scripts. So, we'll give it a while longer to stabilize and for<br> scripts to catch up to any syntax changes which may have occured.<br></blockquote></pre></description>
1132 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178813674</guid>
1133 <pubDate>Thu, 10 May 2007 16:14:34 +0000</pubDate>
1134 </item>
1135 <item>
1136 <title></title>
1137 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178662743</link>
1138 <description><pre><blockquote>Tue May 8 22:19:03 CDT 2007<br>patches/packages/slackpkg-2.60-noarch-1.tgz:<br> Upgraded to slackpkg-2.60. Thanks to Piter Punk!<br></blockquote></pre></description>
1139 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178662743</guid>
1140 <pubDate>Tue, 08 May 2007 22:19:03 +0000</pubDate>
1141 </item>
1142 <item>
1143 <title></title>
1144 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178574915</link>
1145 <description><pre><blockquote>Mon May 7 21:55:15 CDT 2007<br>extra/php5/php-5.2.2-i486-1_slack11.0.tgz:<br> Upgraded to php-5.2.2.<br> This fixes bugs and improves security.<br> For more details, see:<br> http://www.php.net/releases/5_2_2.php<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001<br> (* Security fix *)<br>patches/packages/php-4.4.7-i486-1_slack11.0.tgz:<br> Upgraded to php-4.4.7.<br> This fixes bugs and improves security.<br> For more details, see:<br> http://www.php.net/releases/4_4_7.php<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001<br> (* Security fix *)<br></blockquote></pre></description>
1146 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178574915</guid>
1147 <pubDate>Mon, 07 May 2007 21:55:15 +0000</pubDate>
1148 </item>
1149 <item>
1150 <title></title>
1151 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178233369</link>
1152 <description><pre><blockquote>Thu May 3 23:02:49 CDT 2007<br>patches/packages/gnome-icon-theme-2.14.2-noarch-2_slack11.0.tgz:<br> gnome-icon-theme puts its pkgconfig file in the wrong directory,<br> which is (was) breaking compiles. Now it is in the right place.<br> Thanks to Robby Workman for pointing it out.<br></blockquote></pre></description>
1153 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1178233369</guid>
1154 <pubDate>Thu, 03 May 2007 23:02:49 +0000</pubDate>
1155 </item>
1156 <item>
1157 <title></title>
1158 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177514346</link>
1159 <description><pre><blockquote>Wed Apr 25 15:19:06 CDT 2007<br>patches/packages/fontconfig-2.4.2-i486-2_slack11.0.tgz:<br> Changed the font paths in /etc/fonts/fonts.conf to point to where the<br> fonts actually are, rather than through a symlink. The symlink<br> (/usr/X11R6/lib/fonts) *should* be made by the aaa_base package, but<br> still it's probably best to point to the real location.<br> Thanks to Zoran Davidovac for the suggestion.<br> Moved man pages to the proper location and gzipped them.<br> Created a /var/cache/fontconfig directory.<br></blockquote></pre></description>
1160 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177514346</guid>
1161 <pubDate>Wed, 25 Apr 2007 15:19:06 +0000</pubDate>
1162 </item>
1163 <item>
1164 <title></title>
1165 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177335170</link>
1166 <description><pre><blockquote>Mon Apr 23 13:32:50 CDT 2007<br>patches/packages/freetype-2.3.4-i486-2_slack11.0.tgz: Fixed the diffs<br> for the patented algorithms. Thanks to Eric Hameleers.<br></blockquote></pre></description>
1167 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177335170</guid>
1168 <pubDate>Mon, 23 Apr 2007 13:32:50 +0000</pubDate>
1169 </item>
1170 <item>
1171 <title></title>
1172 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177076859</link>
1173 <description><pre><blockquote>Fri Apr 20 13:47:39 CDT 2007<br>patches/packages/x11-6.9.0-i486-14_slack11.0.tgz:<br> Removed old versions of fc-cache and fc-list.<br> Somehow a couple of old fontconfig binaries snuck into this package, and<br> prevent fc-cache from working properly at boot (or any other time).<br> If you've already installed these upgrades, reinstalling the fontconfig<br> package will fix the issue. If you do that, there's no need to reinstall<br> this new x11 package -- it's been fixed so that there's no longer a problem<br> with the package install order (and because those fc-* binaries didn't<br> belong there). Sorry for any inconvenience...<br> Thanks to Petri Kaukasoina for pointing this out.<br> (* Fix *)<br></blockquote></pre></description>
1174 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177076859</guid>
1175 <pubDate>Fri, 20 Apr 2007 13:47:39 +0000</pubDate>
1176 </item>
1177 <item>
1178 <title></title>
1179 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177008788</link>
1180 <description><pre><blockquote>Thu Apr 19 18:53:08 CDT 2007<br>patches/packages/fontconfig-2.4.2-i486-1_slack11.0.tgz:<br> Upgraded to the fontconfig-2.4.2 to work better with freetype-2.3.4.<br>patches/packages/freetype-2.3.4-i486-1_slack11.0.tgz:<br> Fixed an overflow parsing BDF fonts.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351<br> (* Security fix *)<br>patches/packages/x11-6.9.0-i486-13_slack11.0.tgz:<br> Recompiled.<br>patches/packages/x11-devel-6.9.0-i486-13_slack11.0.tgz:<br> Recompiled.<br>patches/packages/x11-xdmx-6.9.0-i486-13_slack11.0.tgz:<br> Recompiled.<br>patches/packages/x11-xnest-6.9.0-i486-13_slack11.0.tgz:<br> Recompiled.<br>patches/packages/x11-xvfb-6.9.0-i486-13_slack11.0.tgz:<br> Recompiled.<br>patches/packages/xine-lib-1.1.6-i686-1_slack11.0.tgz:<br> Upgraded to xine-lib-1.1.6.<br> This fixes overflows in xine-lib in some little-used media formats in<br> xine-lib < 1.1.5 and other bugs in xine-lib < 1.1.6. The overflows in<br> xine-lib < 1.1.5 could definitely cause an application using xine-lib to<br> crash, and it is theorized that a malicious media file could be made to run<br> arbitrary code in the context of the user running the application.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1246<br> (* Security fix *)<br></blockquote></pre></description>
1181 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1177008788</guid>
1182 <pubDate>Thu, 19 Apr 2007 18:53:08 +0000</pubDate>
1183 </item>
1184 <item>
1185 <title></title>
1186 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1175693117</link>
1187 <description><pre><blockquote>Wed Apr 4 13:25:17 CDT 2007<br>patches/packages/ktorrent-2.1.3-i486-2_slack11.0.tgz:<br> Changed --prefix from /usr to /opt/kde.<br> (Slackware 11.0 still uses that, right? ;-)<br> Thanks to arny for pointing this out.<br>patches/packages/qca-tls-1.0-i486-4_slack11.0.tgz:<br> Recompiled for qt-3.3.8. Sorry to have forgotten about the 3.3.6<br> plugin location... thanks to Peter Valky for the reminder.<br></blockquote></pre></description>
1188 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1175693117</guid>
1189 <pubDate>Wed, 04 Apr 2007 13:25:17 +0000</pubDate>
1190 </item>
1191 <item>
1192 <title></title>
1193 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1175612517</link>
1194 <description><pre><blockquote>Tue Apr 3 15:01:57 CDT 2007<br>patches/packages/file-4.20-i486-1_slack11.0.tgz:<br> Upgraded to file-4.20.<br> This fixes a heap overflow that could allow code to be executed as the<br> user running file (note that there are many scenarios where file might be<br> used automatically, such as in virus scanners or spam filters).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536<br> (* Security fix *)<br>patches/packages/ktorrent-2.1.3-i486-1_slack11.0.tgz:<br> Upgraded to ktorrent-2.1.3.<br> A directory traversal vulnerability in torrent.cpp in versions < 2.1.2 may<br> allow remote attackers to overwrite the ktorrent user's files. A bug in<br> chunkcounter.cpp in versions < 2.1.2 allows remote attackers to crash<br> ktorrent and cause heap corruption by the use of an invalid idx value.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1384<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1385<br> (* Security fix *)<br>patches/packages/qt-3.3.8-i486-1_slack11.0.tgz:<br> Patched an issue where the Qt UTF 8 decoder may in some instances fail to<br> reject overlong sequences, possibly allowing "/../" path injection or XSS<br> errors.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242<br> (* Security fix *)<br></blockquote></pre></description>
1195 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1175612517</guid>
1196 <pubDate>Tue, 03 Apr 2007 15:01:57 +0000</pubDate>
1197 </item>
1198 <item>
1199 <title></title>
1200 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174942495</link>
1201 <description><pre><blockquote>Mon Mar 26 20:54:55 CDT 2007<br>patches/packages/libwpd-0.8.9-i486-1_slack11.0.tgz:<br> Upgraded to libwpd-0.8.9.<br> Various overflows may lead to application crashes upon opening a specially<br> crafted WordPerfect file. This vulnerability could also conceivably be<br> used by an attacker to execute arbitrary code.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-002<br> (* Security fix *)<br>patches/packages/mozilla-firefox-1.5.0.11-i686-1.tgz:<br> Upgraded to mozilla-firefox-1.5.0.11.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>extra/mozilla-firefox-2.0.0.3/mozilla-firefox-2.0.0.3-i686-1.tgz:<br> Upgraded to mozilla-firefox-2.0.0.3.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1202 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174942495</guid>
1203 <pubDate>Mon, 26 Mar 2007 20:54:55 +0000</pubDate>
1204 </item>
1205 <item>
1206 <title></title>
1207 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174763287</link>
1208 <description><pre><blockquote>Sat Mar 24 19:08:07 CDT 2007<br>patches/packages/bash-3.2.015-i486-1_slack11.0.tgz:<br> Upgraded to bash-3.2 patchlevel 15. This is an optional upgrade<br> issued due to some problem reports concerning the use of the old-<br> style backquotes in scripts. For example `ls -l` might fail where<br> $(ls -l) works (though the real-world examples are more complex<br> than these, of course. I'd say if you're not having problems with<br> bash you're better off leaving it alone, but if you're getting an<br> error like "unexpected EOF looking for matching `", you may wish<br> to give this package a try.<br> Thanks much to John Pate for helping with late-night debugging.<br></blockquote></pre></description>
1209 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174763287</guid>
1210 <pubDate>Sat, 24 Mar 2007 19:08:07 +0000</pubDate>
1211 </item>
1212 <item>
1213 <title></title>
1214 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174153303</link>
1215 <description><pre><blockquote>Sat Mar 17 17:41:43 CDT 2007<br>Happy St. Patrick's Day!<br>patches/packages/gaim-1.5.0-i486-3_slack11.0.tgz:<br> Recompiled against mozilla-nss. Also recompiled the GAIM beta in<br> the /pub/slackware/unsupported/ directory, if anyone is interested.<br>patches/packages/mozilla-nss-3.9.2-i486-1_slack11.0.tgz:<br> Added mozilla-nss to provide a more stable API/ABI for GAIM.<br></blockquote></pre></description>
1216 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1174153303</guid>
1217 <pubDate>Sat, 17 Mar 2007 17:41:43 +0000</pubDate>
1218 </item>
1219 <item>
1220 <title></title>
1221 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173901127</link>
1222 <description><pre><blockquote>Wed Mar 14 19:38:47 CDT 2007<br>patches/packages/libpng-1.2.16-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.16. This fixes some problems with the new<br> ImageMagick package, such as massive memory usage using "convert".<br> Thanks to Michael Johnson for letting me know about this.<br></blockquote></pre></description>
1223 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173901127</guid>
1224 <pubDate>Wed, 14 Mar 2007 19:38:47 +0000</pubDate>
1225 </item>
1226 <item>
1227 <title></title>
1228 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173810179</link>
1229 <description><pre><blockquote>Tue Mar 13 18:22:59 CDT 2007<br>patches/packages/php-4.4.6-i486-1_slack11.0.tgz:<br> Upgraded to php-4.4.6.<br> This version of PHP fixes a problem introduced with the last PHP release<br> where certain applications using "register_globals" may crash.<br></blockquote></pre></description>
1230 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173810179</guid>
1231 <pubDate>Tue, 13 Mar 2007 18:22:59 +0000</pubDate>
1232 </item>
1233 <item>
1234 <title></title>
1235 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173290270</link>
1236 <description><pre><blockquote>Wed Mar 7 17:57:50 CST 2007<br>patches/packages/gnupg-1.4.7-i486-1_slack11.0.tgz:<br> Upgraded to gnupg-1.4.7.<br> This fixes a security problem that can occur when GnuPG is used incorrectly.<br> Newer versions attempt to prevent such misuse.<br> For more information, see:<br> http://lists.gnupg.org/pipermail/gnupg-announce/2007q1/000251.html<br> (* Security fix *)<br>patches/packages/x11-6.9.0-i486-12_slack11.0.tgz: Patched.<br> This update fixes overflows in the dbe and render extensions. This could<br> possibly be exploited to overwrite parts of memory, possibly allowing<br> malicious code to execute, or (more likely) causing X to crash.<br> For information about some of the security fixes, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103<br> (* Security fix *)<br>patches/packages/mozilla-firefox-1.5.0.10-i686-1.tgz:<br> Upgraded to firefox-1.5.0.10.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-1.5.0.10-i686-1.tgz:<br> Upgraded to thunderbird-1.5.0.10.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>patches/packages/seamonkey-1.0.8-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.0.8.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>patches/packages/imagemagick-6.3.3_0-i486-1_slack11.0.tgz:<br> Upgraded to imagemagick-6.3.3-0.<br> The original fix for PALM image handling has been corrected.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5456<br> (* Security fix *)<br>extra/mozilla-firefox-2.0.0.2-i686-1.tgz:<br> Upgraded to firefox-2.0.0.2.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1237 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1173290270</guid>
1238 <pubDate>Wed, 07 Mar 2007 17:57:50 +0000</pubDate>
1239 </item>
1240 <item>
1241 <title></title>
1242 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1172178784</link>
1243 <description><pre><blockquote>Thu Feb 22 21:13:04 CST 2007<br>patches/packages/php-4.4.5-i486-1_slack11.0.tgz:<br> Upgraded to php-4.4.5 which improves stability and security.<br> For complete details, see http://www.php.net.<br> For imformation about some of the security fixes, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988<br> (* Security fix *)<br>extra/php5/php-5.2.1-i486-1_slack11.0.tgz:<br> Upgraded to php-5.2.1 which improves stability and security.<br> For imformation about some of the security fixes, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988<br> (* Security fix *)<br>patches/packages/amarok-1.4.5-i486-1_slack11.0.tgz: Upgraded to<br> amarok-1.4.5, which fixes the last.fm stream breakage after the<br> last upgrade to xine-lib.<br>patches/packages/libgpod-0.4.2-i486-1_slack11.0.tgz: Upgraded to<br> libgpod-0.4.2. This is needed for the amarok package.<br>patches/packages/libmtp-0.1.3-i486-1_slack11.0.tgz: Upgraded to<br> libmtp-0.1.3. This is needed for the amarok package.<br></blockquote></pre></description>
1244 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1172178784</guid>
1245 <pubDate>Thu, 22 Feb 2007 21:13:04 +0000</pubDate>
1246 </item>
1247 <item>
1248 <title></title>
1249 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1171812036</link>
1250 <description><pre><blockquote>Sun Feb 18 15:20:36 CST 2007<br>patches/packages/glibc-zoneinfo-2.3.6-noarch-7_slack11.0.tgz:<br> Updated with tzdata2007b for impending Daylight Savings Time<br> changes in the US.<br></blockquote></pre></description>
1251 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1171812036</guid>
1252 <pubDate>Sun, 18 Feb 2007 15:20:36 +0000</pubDate>
1253 </item>
1254 <item>
1255 <title></title>
1256 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1170851345</link>
1257 <description><pre><blockquote>Wed Feb 7 12:29:05 CST 2007<br>patches/packages/samba-3.0.24-i486-1_slack11.0.tgz:<br> Upgraded to samba-3.0.24. From the WHATSNEW.txt file:<br> "Important issues addressed in 3.0.24 include:<br> o Fixes for the following security advisories:<br> - CVE-2007-0452 (Potential Denial of Service bug in smbd)<br> - CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind<br> NSS library on Solaris)<br> - CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)"<br> Samba is Slackware is vulnerable to the first issue, which can cause smbd<br> to enter into an infinite loop, disrupting Samba services. Linux is not<br> vulnerable to the second issue, and Slackware does not ship the afsacl.so<br> VFS plugin (but it's something to be aware of if you build Samba with<br> custom options).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454<br> (* Security fix *)<br></blockquote></pre></description>
1258 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1170851345</guid>
1259 <pubDate>Wed, 07 Feb 2007 12:29:05 +0000</pubDate>
1260 </item>
1261 <item>
1262 <title></title>
1263 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1169851590</link>
1264 <description><pre><blockquote>Fri Jan 26 22:46:30 CST 2007<br>patches/packages/bind-9.3.4-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.4. This update fixes two denial of service<br> vulnerabilities where an attacker could crash the name server with<br> specially crafted malformed data.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494<br> (* Security fix *)<br></blockquote></pre></description>
1265 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1169851590</guid>
1266 <pubDate>Fri, 26 Jan 2007 22:46:30 +0000</pubDate>
1267 </item>
1268 <item>
1269 <title></title>
1270 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1169648107</link>
1271 <description><pre><blockquote>Wed Jan 24 14:15:07 CST 2007<br>patches/packages/fetchmail-6.3.6-i486-1_slack11.0.tgz:<br> Upgraded to fetchmail-6.3.6. This fixes two security issues. First, a bug<br> introduced in fetchmail-6.3.5 could cause fetchmail to crash. However,<br> no stable version of Slackware ever shipped fetchmail-6.3.5. Second, a long<br> standing bug (reported by Isaac Wilcox) could cause fetchmail to send a<br> password in clear text or omit using TLS even when configured otherwise.<br> All fetchmail users are encouraged to consider using getmail, or to upgrade<br> to the new fetchmail packages.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867<br> (* Security fix *)<br></blockquote></pre></description>
1272 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1169648107</guid>
1273 <pubDate>Wed, 24 Jan 2007 14:15:07 +0000</pubDate>
1274 </item>
1275 <item>
1276 <title></title>
1277 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1166891906</link>
1278 <description><pre><blockquote>Sat Dec 23 16:38:26 CST 2006<br>extra/mozilla-firefox-2.0.0.1/mozilla-firefox-2.0.0.1-i686-1.tgz:<br> Upgraded to Mozilla Firefox 2.0.0.1.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/mozilla-firefox-1.5.0.9-i686-1.tgz:<br> Upgraded to firefox-1.5.0.9.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-1.5.0.9-i686-1.tgz:<br> Upgraded to thunderbird-1.5.0.9.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>patches/packages/seamonkey-1.0.7-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.0.7.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>patches/packages/xine-lib-1.1.3-i686-1_slack11.0.tgz:<br> Upgraded to xine-lib-1.1.3 which fixes possible security problems<br> such as a heap overflow in libmms and a buffer overflow in the<br> Real Media input plugin.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200<br> (* Security fix *)<br></blockquote></pre></description>
1279 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1166891906</guid>
1280 <pubDate>Sat, 23 Dec 2006 16:38:26 +0000</pubDate>
1281 </item>
1282 <item>
1283 <title></title>
1284 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1165418166</link>
1285 <description><pre><blockquote>Wed Dec 6 15:16:06 CST 2006<br>patches/packages/gnupg-1.4.6-i486-1_slack11.0.tgz:<br> Upgraded to gnupg-1.4.6. This release fixes a severe and exploitable<br> bug in earlier versions of gnupg. All gnupg users should update to the<br> new packages as soon as possible. For details, see the information<br> concerning CVE-2006-6235 posted on lists.gnupg.org:<br> http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235<br> This update also addresses a more minor security issue possibly<br> exploitable when GnuPG is used in interactive mode. For more information<br> about that issue, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169<br> (* Security fix *)<br></blockquote></pre></description>
1286 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1165418166</guid>
1287 <pubDate>Wed, 06 Dec 2006 15:16:06 +0000</pubDate>
1288 </item>
1289 <item>
1290 <title></title>
1291 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1164985400</link>
1292 <description><pre><blockquote>Fri Dec 1 15:03:20 CST 2006<br>patches/packages/libpng-1.2.14-i486-1_slack11.0.tgz:<br> Upgraded to libpng-1.2.14. This fixes a bug where a specially crafted PNG<br> file could crash applications that use libpng.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793<br> (* Security fix *)<br>patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz:<br> Upgraded to proftpd-1.3.0a plus an additional security patch. Several<br> security issues were found in proftpd that could lead to the execution of<br> arbitrary code by a remote attacker, including one in mod_tls that does<br> not require the attacker to be authenticated first.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171<br> (* Security fix *)<br>patches/packages/tar-1.16-i486-1_slack11.0.tgz:<br> Upgraded to tar-1.16.<br> This fixes an issue where files may be extracted outside of the current<br> directory, possibly allowing a malicious tar archive, when extracted, to<br> overwrite any of the user's files (in the case of root, any file on the<br> system).<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097<br> (* Security fix *)<br></blockquote></pre></description>
1293 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1164985400</guid>
1294 <pubDate>Fri, 01 Dec 2006 15:03:20 +0000</pubDate>
1295 </item>
1296 <item>
1297 <title></title>
1298 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1163095491</link>
1299 <description><pre><blockquote>Thu Nov 9 18:04:51 CST 2006<br>extra/mozilla-firefox-2.0/mozilla-firefox-2.0-i686-1.tgz: Moved from /patches,<br> since it was pointed out that this sets LD_LIBRARY_PATH to use the libraries<br> in /usr/lib/firefox-2.0/ which aren't compatible with the SeaMonkey libraries<br> that are used to compile the gxine plugin, breaking it. I'm currently<br> looking for a workaround for this issue, but meanwhile using firefox-1.5.0.8<br> with the gxine plugin works just fine. Honestly, I hadn't expected to see<br> another firefox-1.x release once 2.0 came out or I might not have added it to<br> Slackware 11.0 after the release...<br>patches/packages/mozilla-firefox-1.5.0.8-i686-1.tgz:<br> Upgraded to firefox-1.5.0.8.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>patches/packages/mozilla-thunderbird-1.5.0.8-i686-1.tgz:<br> Upgraded to thunderbird-1.5.0.8.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>patches/packages/seamonkey-1.0.6-i486-1_slack11.0.tgz:<br> Upgraded to seamonkey-1.0.6.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
1300 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1163095491</guid>
1301 <pubDate>Thu, 09 Nov 2006 18:04:51 +0000</pubDate>
1302 </item>
1303 <item>
1304 <title></title>
1305 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162848564</link>
1306 <description><pre><blockquote>Mon Nov 6 21:29:24 CST 2006<br>patches/packages/bind-9.3.2_P2-i486-1_slack11.0.tgz:<br> Upgraded to bind-9.3.2-P2. This fixes some security issues related to<br> previous fixes in OpenSSL. The minimum OpenSSL version was raised to<br> OpenSSL 0.9.7l and OpenSSL 0.9.8d to avoid exposure to known security flaws<br> in older versions (these patches were already issued for Slackware). If you<br> have not upgraded yet, get those as well to prevent a potentially exploitable<br> security problem in named. In addition, the default RSA exponent was changed<br> from 3 to 65537. RSA keys using exponent 3 (which was previously BIND's<br> default) will need to be regenerated to protect against the forging<br> of RRSIGs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339<br> (* Security fix *)<br></blockquote></pre></description>
1307 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162848564</guid>
1308 <pubDate>Mon, 06 Nov 2006 21:29:24 +0000</pubDate>
1309 </item>
1310 <item>
1311 <title></title>
1312 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162595877</link>
1313 <description><pre><blockquote>Fri Nov 3 23:17:57 CST 2006<br>extra/php5/php-5.2.0-i486-1.tgz: Upgraded to php-5.2.0.<br> This release "includes a large number of new features, bug fixes and security<br> enhancements." In particular, when the UTF-8 charset is selected there are<br> buffer overflows in the htmlspecialchars() and htmlentities() that may be<br> exploited to execute arbitrary code.<br> More details about the vulnerability may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465<br> Further details about the release can be found in the release announcement:<br> http://www.php.net/releases/5_2_0.php<br> Some syntax has changed since PHP 5.1.x. An upgrading guide may be found at<br> this location:<br> http://www.php.net/UPDATE_5_2.txt<br> This package was placed in /extra rather than /patches to save people from<br> possible surprises with automated upgrade tools, since users of PHP4 and<br> PHP 5.1.x applications may need to make some code changes before things will<br> work again.<br> (* Security fix *)<br>patches/packages/php-4.4.4-i486-4_slack11.0.tgz: Patched the UTF-8 overflow.<br> More details about the vulnerability may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465<br> (* Security fix *)<br>patches/packages/screen-4.0.3-i486-1_slack11.0.tgz: Upgraded to screen-4.0.3.<br> This addresses an issue with the way screen handles UTF-8 character encoding<br> that could allow screen to be crashed (or possibly code to be executed in the<br> context of the screen user) if a specially crafted sequence of pseudo-UTF-8<br> characters are displayed withing a screen session.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573<br> (* Security fix *)<br></blockquote></pre></description>
1314 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162595877</guid>
1315 <pubDate>Fri, 03 Nov 2006 23:17:57 +0000</pubDate>
1316 </item>
1317 <item>
1318 <title></title>
1319 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162079558</link>
1320 <description><pre><blockquote>Sat Oct 28 23:52:38 CDT 2006<br>patches/packages/mozilla-firefox-2.0-i686-1.tgz:<br> Upgraded to Mozilla Firefox 2.0. This is a completely optional enhanced<br> feature package update. Usually I'd reserve this space only for security<br> patches (which this is not), but Firefox 2.0 is just so cool that I couldn't<br> resist upgrading it, especially with Slackware 11.0 so recently released.<br></blockquote></pre></description>
1321 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1162079558</guid>
1322 <pubDate>Sat, 28 Oct 2006 23:52:38 +0000</pubDate>
1323 </item>
1324 <item>
1325 <title></title>
1326 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1161791146</link>
1327 <description><pre><blockquote>Wed Oct 25 15:45:46 CDT 2006<br>patches/packages/qca-tls-1.0-i486-3_slack11.0.tgz: Rebuilt to place the plugin<br> in /usr/lib/qt-3.3.7/plugins/crypto/.<br>patches/packages/qt-3.3.7-i486-1_slack11.0.tgz: Upgraded to qt-x11-free-3.3.7.<br> This fixes an issue with Qt's handling of pixmap images that causes Qt linked<br> applications to crash if a specially crafted malicious image is loaded.<br> Inspection of the code in question makes it seem unlikely that this could<br> lead to more serious implications (such as arbitrary code execution), but it<br> is recommended that users upgrade to the new Qt package.<br> For more information, see:<br> http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811<br> (* Security fix *)<br></blockquote></pre></description>
1328 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1161791146</guid>
1329 <pubDate>Wed, 25 Oct 2006 15:45:46 +0000</pubDate>
1330 </item>
1331 <item>
1332 <title></title>
1333 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159746653</link>
1334 <description><pre><blockquote>Sun Oct 1 23:50:53 CDT 2006<br>Slackware 11.0 is released. Thanks to everyone who helped out and made this<br>release possible. If I forgot you in the ChangeLog, mea culpa, but you know<br>who you are, and thanks. :-)<br>Enjoy! -P.<br></blockquote></pre></description>
1335 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159746653</guid>
1336 <pubDate>Sun, 01 Oct 2006 23:50:53 +0000</pubDate>
1337 </item>
1338 <item>
1339 <title></title>
1340 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159721145</link>
1341 <description><pre><blockquote>Sun Oct 1 16:45:45 CDT 2006<br>l/jre-1_5_0_09-i586-1.tgz: Upgraded to Java(TM) 2 Platform Standard Edition<br> Runtime Environment Version 5.0, Release 9.<br>extra/bittornado/bittornado-0.3.15-noarch-1.tgz:<br> Upgraded to bittornado-0.3.15.<br>extra/jdk-1.5.0_09/jdk-1_5_0_09-i586-1.tgz: Upgraded to Java(TM) 2 Platform<br> Standard Edition Development Kit Version 5.0, Release 9.<br></blockquote></pre></description>
1342 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159721145</guid>
1343 <pubDate>Sun, 01 Oct 2006 16:45:45 +0000</pubDate>
1344 </item>
1345 <item>
1346 <title></title>
1347 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159653920</link>
1348 <description><pre><blockquote>Sat Sep 30 22:05:20 CDT 2006<br>extra/linux-smp-2.6.17.13/kernel-modules-smp-2.6.17.13-i686-3.tgz:<br> This had been named i486 when it's really an i686 arch package. <br></blockquote></pre></description>
1349 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159653920</guid>
1350 <pubDate>Sat, 30 Sep 2006 22:05:20 +0000</pubDate>
1351 </item>
1352 <item>
1353 <title>2 updates</title>
1354 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159644924</link>
1355 <description><pre><blockquote>Sat Sep 30 19:35:24 CDT 2006<br>a/etc-11.0-noarch-2.tgz: Added missing comment marks (#) for distcc ports<br> in /etc/services. Thanks to Michiel Broek.<br>n/popa3d-1.0.2-i486-2.tgz: Do better checking of passwd and group to avoid<br> adding redundant entries to these files. Thanks to Menno Duursma.<br>n/sendmail-8.13.8-i486-4.tgz: Do better checking of passwd and group to avoid<br> adding redundant entries to these files. Thanks to Menno Duursma.<br>extra/linux-smp-2.6.17.13/kernel-generic-smp-2.6.17.13-i686-3.tgz:<br>extra/linux-smp-2.6.17.13/kernel-modules-smp-2.6.17.13-i486-3.tgz: Recompiled.<br>n/sendmail-cf-8.13.8-noarch-4.tgz: Rebuilt.<br> Recompiled to add missing SMP/SMT support.<br> Thanks to arny for noticing that I'd started with the wrong .config.<br>extra/linux-smp-2.6.17.13/kernel-headers-smp-2.6.17.13-i386-3.tgz: Rebuilt.<br></blockquote></pre></description>
1356 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159644924</guid>
1357 <pubDate>Sat, 30 Sep 2006 19:35:24 +0000</pubDate>
1358 </item>
1359 <item>
1360 <title></title>
1361 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159581129</link>
1362 <description><pre><blockquote>Sat Sep 30 01:52:09 CDT 2006<br>testing/packages/fontconfig-2.4.1-i486-1.tgz: Upgraded to fontconfig-2.4.1.<br> Thanks to Fr�d�ric L. W. Meunier for pointing this out.<br>l/shared-mime-info-0.19-i486-1.tgz: Upgraded to shared-mime-info-0.19.<br></blockquote></pre></description>
1363 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159581129</guid>
1364 <pubDate>Sat, 30 Sep 2006 01:52:09 +0000</pubDate>
1365 </item>
1366 <item>
1367 <title>2 updates</title>
1368 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159573295</link>
1369 <description><pre><blockquote>Fri Sep 29 23:41:35 CDT 2006<br>l/libgpod-0.4.0-i486-1.tgz: Upgraded to libgpod-0.4.0. Thanks to Shilo Bacca.<br>l/pango-1.12.4-i486-1.tgz: Fixed bogus empty GPOS table warning and other<br> minor bugs.<br>extra/linux-smp-2.6.17.13/kernel-generic-smp-2.6.17.13-i686-2.tgz:<br> Rebuilt SMP kernels setting -smp in CONFIG_LOCALVERSION, not EXTRAVERSION.<br> Thanks to Tom B. for snapping me out of my old-skool ways.<br>testing/packages/iptables-1.3.6-i486-1.tgz: This one appeared too late to be<br>testing/packages/wpa_supplicant-0.4.9-i486-1.tgz: Added wpa_supplicant-0.4.9.<br>extra/linux-smp-2.6.17.13/kernel-headers-smp-2.6.17.13-i386-2.tgz: Rebuilt.<br>extra/linux-smp-2.6.17.13/kernel-modules-smp-2.6.17.13-i486-2.tgz: Rebuilt.<br> considered for mainline (not enough test time), but it _should_ be stable.<br> Thanks to Eric Hameleers for a good head-start on this one.<br></blockquote></pre></description>
1370 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159573295</guid>
1371 <pubDate>Fri, 29 Sep 2006 23:41:35 +0000</pubDate>
1372 </item>
1373 <item>
1374 <title></title>
1375 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159495815</link>
1376 <description><pre><blockquote>Fri Sep 29 02:10:15 CDT 2006<br>a/openssl-solibs-0.9.8d-i486-1.tgz: Upgraded to shared libraries from<br> openssl-0.9.8d. See openssl package update below.<br> (* Security fix *)<br>n/openssh-4.4p1-i486-1.tgz: Upgraded to openssh-4.4p1.<br> This fixes a few security related issues. From the release notes found at<br> http://www.openssh.com/txt/release-4.4:<br> * Fix a pre-authentication denial of service found by Tavis Ormandy,<br> that would cause sshd(8) to spin until the login grace time<br> expired.<br> * Fix an unsafe signal hander reported by Mark Dowd. The signal<br> handler was vulnerable to a race condition that could be exploited<br> to perform a pre-authentication denial of service. On portable<br> OpenSSH, this vulnerability could theoretically lead to<br> pre-authentication remote code execution if GSSAPI authentication<br> is enabled, but the likelihood of successful exploitation appears<br> remote.<br> * On portable OpenSSH, fix a GSSAPI authentication abort that could<br> be used to determine the validity of usernames on some platforms.<br> Links to the CVE entries will be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052<br> After this upgrade, make sure the permissions on /etc/rc.d/rc.sshd are set<br> the way you want them. Future upgrades will respect the existing permissions<br> settings. Thanks to Manuel Reimer for pointing out that upgrading openssh<br> would enable a previously disabled sshd daemon.<br> Do better checking of passwd, shadow, and group to avoid adding<br> redundant entries to these files. Thanks to Menno Duursma.<br> (* Security fix *)<br>n/openssl-0.9.8d-i486-1.tgz: Upgraded to openssl-0.9.8d.<br> This fixes a few security related issues:<br> During the parsing of certain invalid ASN.1 structures an error<br> condition is mishandled. This can result in an infinite loop which<br> consumes system memory (CVE-2006-2937). (This issue did not affect<br> OpenSSL versions prior to 0.9.7)<br> Thanks to Dr S. N. Henson of Open Network Security and NISCC.<br> Certain types of public key can take disproportionate amounts of<br> time to process. This could be used by an attacker in a denial of<br> service attack (CVE-2006-2940).<br> Thanks to Dr S. N. Henson of Open Network Security and NISCC.<br> A buffer overflow was discovered in the SSL_get_shared_ciphers()<br> utility function. An attacker could send a list of ciphers to an<br> application that uses this function and overrun a buffer.<br> (CVE-2006-3738)<br> Thanks to Tavis Ormandy and Will Drewry of the Google Security Team.<br> A flaw in the SSLv2 client code was discovered. When a client<br> application used OpenSSL to create an SSLv2 connection to a malicious<br> server, that server could cause the client to crash (CVE-2006-4343).<br> Thanks to Tavis Ormandy and Will Drewry of the Google Security Team.<br> Links to the CVE entries will be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343<br> (* Security fix *)<br>zipslack/zipslack.zip: Rebuilt ZipSlack with new openssl-solibs and<br> openssh packages.<br></blockquote></pre></description>
1377 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159495815</guid>
1378 <pubDate>Fri, 29 Sep 2006 02:10:15 +0000</pubDate>
1379 </item>
1380 <item>
1381 <title></title>
1382 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159414429</link>
1383 <description><pre><blockquote>Thu Sep 28 03:33:49 CDT 2006<br>ap/vorbis-tools-1.1.1-i486-3.tgz: Fixed UTF8 support.<br> Thanks to Igor Pashev for providing a simple patch from Gene Pavlovsky.<br>kernels/huge26.s/*: Added support for USB and IEEE1394 storage devices.<br>kernels/test26.s/*: Added support for USB and IEEE1394 storage devices.<br> Thanks to Tais M. Hansen for pointing out that these kernels lacked support<br> for USB storage devices. Using these kernels with udev may cause a few<br> warnings at boot time as udev attempts to load the already built-in support,<br> but these seem to be harmless.<br></blockquote></pre></description>
1384 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159414429</guid>
1385 <pubDate>Thu, 28 Sep 2006 03:33:49 +0000</pubDate>
1386 </item>
1387 <item>
1388 <title></title>
1389 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159250272</link>
1390 <description><pre><blockquote>Tue Sep 26 05:57:52 CDT 2006<br>a/aaa_base-11.0.0-noarch-2.tgz: Updated the "Welcome to Slackware" email.<br> Added /media directory, subdirectories, and symbolic links recommended by<br> the FHS, along with README files to help me understand the difference<br> between this directory and /mnt. ;-)<br>a/etc-11.0-noarch-1.tgz: Fixed a bug in /etc/csh.login that caused repeated<br> use of "csh -l" to duplicate search directories in the $path. Clearly<br> /etc/csh.login should set the path just as /etc/profile does.<br> This bug dates back at at least 1997, maybe earlier, so congratulations to<br> Dimitar Zhekov for winning this release's "smite the oldest bug" award.<br> Added distcc port to /etc/services. Thanks to Erik Jan Tromp and<br> Robby Workman for the continual reminders. ;-)<br>a/pkgtools-11.0.0-i486-4.tgz: Made upgradepkg a little bit more gentle -- if<br> it is run on a corrupted .tgz it will no longer remove the original package.<br> Thanks to Ric Anderson for the report.<br> Added rc.scanluns to the services setup menu.<br>a/sysvinit-2.84-i486-69.tgz: Fixed path to /sbin/initscript shown in init.8<br> (again). Thanks to Robby Workman.<br> Changed rc.S to run rc.serial according to whether the script is executable.<br>a/util-linux-2.12r-i486-5.tgz: Treat /etc/rc.d/rc.serial (to preserve file<br> permissions), /etc/serial.conf, and /etc/fdprm as '.new' config files.<br>ap/lm_sensors-2.10.0-i486-3.tgz: Fixed hardcoded /usr/local paths in<br> sensors-detect. Thanks to Jakub Jankowski.<br>kde/kdebase-3.5.4-i486-7.tgz: Patched to fix media:/ URLs in Konqueror without<br> requiring HAL. Thanks to everyone involved in reporting this issue and<br> seeing that it was addressed:<br> http://bugs.kde.org/show_bug.cgi?id=132281<br> A big thanks to coolo (Stephan Kulow) for coming up with a patch. :-)<br>zipslack/zipslack.zip: Added ZipSlack.<br></blockquote></pre></description>
1391 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1159250272</guid>
1392 <pubDate>Tue, 26 Sep 2006 05:57:52 +0000</pubDate>
1393 </item>
1394 <item>
1395 <title></title>
1396 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158983130</link>
1397 <description><pre><blockquote>Sat Sep 23 03:45:30 CDT 2006<br>a/sysvinit-2.84-i486-68.tgz: In rc.M, start rc.hplip if found. Fix the path<br> to /sbin/initscript shown in init.8. Thanks to Robby Workman.<br>xap/sane-1.0.18-i486-3.tgz: Added HPLIP backend (hpaio) to dll.conf.<br>testing/packages/cups-1.2.4/cups-1.2.4-i486-1.tgz: Upgraded to cups-1.2.4.<br> The web site says that more problems were fixed. I would still approach<br> this one cautiously, though I'm sure it (or its descendent) will be used<br> in Slackware 11.1. Unless you have a reason to need this now, I'd wait.<br>testing/packages/hplip-1.6.9-i486-1.tgz: Added hplip-1.6.9, a complete print,<br> scan, and fax system for HP devices. This isn't being merged into the AP<br> series as a replacement for hpijs solely because I'd like to see it get more<br> testing first. It is working perfectly here. Thanks to Robby Workman for<br> doing the vast majority of the work on this package. :-)<br>testing/packages/gutenprint-5.0.0-i486-2.tgz: Don't overwrite GIMP's "print"<br> plugin -- instead install the plugin as "gutenprint".<br> Thanks again to Stefano Vesa.<br></blockquote></pre></description>
1398 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158983130</guid>
1399 <pubDate>Sat, 23 Sep 2006 03:45:30 +0000</pubDate>
1400 </item>
1401 <item>
1402 <title></title>
1403 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158890272</link>
1404 <description><pre><blockquote>Fri Sep 22 01:57:52 CDT 2006<br>n/portmap-5.0-i486-3.tgz: In rc.rpc, fixed restart function.<br> Thanks to Grant.<br></blockquote></pre></description>
1405 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158890272</guid>
1406 <pubDate>Fri, 22 Sep 2006 01:57:52 +0000</pubDate>
1407 </item>
1408 <item>
1409 <title>1 update</title>
1410 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158811503</link>
1411 <description><pre><blockquote>Thu Sep 21 04:05:03 CDT 2006<br>This is still Slackware 11.0 release candidate 5 (for now), and is still the<br> last release candidate, scout's honor. We are nearly there. :-)<br>a/devs-2.3.1-noarch-25.tgz: Added /dev/i2c-* devices.<br> Thanks to Jean Delvare.<br> Just a reminder on devs, as I've had some email about it. As it stands, devs<br> is required to boot even if the machine runs a 2.6+ kernel and uses udev.<br>a/hotplug-2004_09_23-noarch-11.tgz: Don't allow dhcpcd -k to make noise at<br> shutdown time if dhcpcd is not running (as in cases where it was shut down<br> manually, or the lease time was infinite).<br>a/logrotate-3.7.4-i486-1.tgz: Upgraded to logrotate-3.7.4. After reading the<br> diff -u and doing some test rotations, this seems safe to include for 11.0.<br> Suggested by Mateus C�sar Gr�ess and Rafal Lorenc.<br> Rotate /var/log/btmp. Thanks to James Michael Fultz.<br>a/pkgtools-11.0.0-i486-3.tgz: Stripped /bin/dialog. Thanks to mRgOBLIN for<br> saving us 18K of hard drive space. :-)<br> In setup.services, rename rc.portmap to rc.rpc. This is no longer started<br> by default. Instead you must turn it on (only if you plan on mounting NFS<br> partitions manually). Otherwise, it will be run regardless of exec perms if<br> NFS shares or mounts are detected at boot time.<br>ap/diffstat-1.43-i486-1.tgz: Added Thomas Dickey's diffstat utility.<br> Suggested by Michael Iatrou.<br>ap/lm_sensors-2.10.0-i486-2.tgz: Edited slack-desc since the package contains<br> only the tools for lm_sensors, not the drivers. In the case of the 2.6+<br> kernel, these are included with the kernel-modules package. For 2.4, the<br> modules would have to be built by the end user. Also, there is still no<br> startup script included for this package, but that's something that will be<br> looked at for the next development cycle. Removed the mkdev.sh after<br> including the i2c devices in the devs package.<br> Thanks again to Jean Delvare for the advice, and for his work maintaining<br> lm_sensors upstream. :-)<br>n/mailx-12.1-i486-1.tgz: Upgraded to mailx-12.1 from nail-11.25 (renamed).<br> Thanks to Gerardo Exequiel Pozzi for pointing this out.<br>n/nfs-utils-1.0.10-i486-3.tgz: Moved rpc.lockd and rpc.statd to /sbin.<br> Reworked rc.nfsd to make use of the rc.rpc script in "portmap".<br>n/portmap-5.0-i486-2.tgz: Replaced /etc/rc.d/rc.portmap with /etc/rc.d/rc.rpc.<br> This script will start rpc.portmap, rpc.lockd, and rpc.statd. All of these<br> are needed to make proper use of NFS from either the server or client side,<br> so this approach should be more likely to work out of the box. Note that<br> nfs-utils will also be required in order to use rc.rpc or NFS, even as a<br> client. If rc.rpc is needed, another script will run it as long as it is<br> readable. The only reason to make rc.rpc executable would be to run it at<br> boot time when there are no shares in /etc/exports and no mounts in<br> /etc/fstab, but you wish to be able to mount NFS partitions manually.<br> Thanks to Arno G. Schielke and Cesar Suga for suggesting this idea.<br>n/tcpip-0.17-i486-39.tgz: Don't allow dhcpcd -k to make noise at shutdown<br> time if dhcpcd is not running (as in cases where it was shut down manually,<br> or the lease time was infinite).<br> Added support in rc.inet1 and rc.inet1.conf for adjustable DHCP_TIMEOUT.<br> Thanks to Eric Hameleers.<br>x/ttf-indic-fonts-0.4.7.1-noarch-1.tgz: Added TTF fonts for displaying Indic<br> scripts. This package supports Bengali, Devanagari, Gujarati, Kannada,<br> Malayalam, Oriya, Punjabi, Tamil, and Telugu.<br> For information about fully enabling Indic support (including input), see:<br> /usr/doc/Linux-HOWTOs/Indic-Fonts-HOWTO.<br>isolinux/initrd.img: Patched installer's network script to look for<br> network26.dsk if 2.6.17.13 (huge26.s) is used to boot/install.<br> Thanks to Piter Punk for work done (long ago) to fix probing for 2.6 modules.<br> Thanks to Eric Hameleers for helping debug loopback mounts in the installer<br> when using the 2.6.17.13 (huge26.s) kernel.<br> NFS installs with the test26.s kernel are not supported by this system,<br> but should work if you put the module(s) you need on a floppy or otherwise<br> make them available and load them manually.<br>isolinux/network26.dsk: Added network26.dsk for NFS installs with huge26.s.<br> Don't try to put this one on a floppy disk, folks. ;-)<br>kernels/huge26.s/*: Added built-in NLS (CONFIG_NLS_CODEPAGE_437,<br> CONFIG_NLS_ISO8859_1, and CONFIG_NLS_UTF8) to allow FAT filesystems to<br> loopback mount for NFS installs.<br>kernels/test26.s/*: Added 2.6.18 test26.s kernel.<br>rootdisks/install.1: Patched installer's network script.<br>rootdisks/install.zip: Patched installer's network script.<br>testing/packages/flex-2.5.33-i486-1.tgz: Added flex-2.5.33.<br>testing/packages/gutenprint-5.0.0-i486-1.tgz: Added gutenprint-5.0.0.<br>testing/packages/linux-2.6.18/kernel-generic-2.6.18-i486-1.tgz:<br>testing/packages/linux-2.6.18/kernel-headers-2.6.18-i386-1.tgz:<br>testing/packages/linux-2.6.18/kernel-modules-2.6.18-i486-1.tgz<br>testing/packages/linux-2.6.18/kernel-source-2.6.18-noarch-1.tgz<br>rootdisks/install.2: Rebuilt.<br> Requested by Alberto Sim�es.<br> This package was formerly known as "gimp-print", and will likely take the<br> place of gimp-print in the AP series after going through testing.<br> Suggested by Stefano Vesa.<br> Added Linux 2.6.18 generic kernel.<br> Added Linux 2.6.18 kernel headers.<br> Added Linux 2.6.18 kernel modules.<br> Added Linux 2.6.18 kernel source.<br></blockquote></pre></description>
1412 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158811503</guid>
1413 <pubDate>Thu, 21 Sep 2006 04:05:03 +0000</pubDate>
1414 </item>
1415 <item>
1416 <title></title>
1417 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158689589</link>
1418 <description><pre><blockquote>Tue Sep 19 18:13:09 CDT 2006<br>l/arts-1.5.4-i486-2.tgz: Patched an annoying bug where audio programs such<br> as ogg123 would not work unless KDE had been run first. I took several<br> stabs with me sword at ripping out kdebase's surprise HAL requirement as<br> well, but the best I could achieve was "Internal Error". Aarrr!!<br></blockquote></pre></description>
1419 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158689589</guid>
1420 <pubDate>Tue, 19 Sep 2006 18:13:09 +0000</pubDate>
1421 </item>
1422 <item>
1423 <title>1 update</title>
1424 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158674869</link>
1425 <description><pre><blockquote>Tue Sep 19 14:07:49 CDT 2006<br>a/gzip-1.3.5-i486-1.tgz: Upgraded to gzip-1.3.5, and fixed a variety of bugs.<br> Some of the bugs have possible security implications if gzip or its tools are<br> fed a carefully constructed malicious archive. Most of these issues were<br> recently discovered by Tavis Ormandy and the Google Security Team. Thanks<br> to them, and also to the ALT and Owl developers for cleaning up the patch.<br> For further details about the issues fixed, please see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338<br> (* Security fix *)<br>n/procmail-3.22-i486-2.tgz: Added support for large (2GB+) mailboxes.<br> Thanks to Dominik L. Borkowski.<br>isolinux/initrd.img: Patched installer to allow splitting a package series<br> over two or more pieces of optical media. If a package directory contains<br> a file named README_SPLIT.TXT, then it will be continued on the next disc.<br> An example of such a file can be found in /isolinux.<br> Thanks very much to Eric Hameleers for the initial patch and testing!<br>rootdisks/install.2: Patched to allow a split package series.<br>rootdisks/install.zip: Patched to allow a split package series.<br>rootdisks/install.1: Rebuilt.<br></blockquote></pre></description>
1426 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158674869</guid>
1427 <pubDate>Tue, 19 Sep 2006 14:07:49 +0000</pubDate>
1428 </item>
1429 <item>
1430 <title></title>
1431 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158592687</link>
1432 <description><pre><blockquote>Mon Sep 18 15:18:07 CDT 2006<br>l/neon-0.25.5-i486-2.tgz: Enabled missing SSL support.<br> Thanks much to Mircea Baciu!<br></blockquote></pre></description>
1433 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158592687</guid>
1434 <pubDate>Mon, 18 Sep 2006 15:18:07 +0000</pubDate>
1435 </item>
1436 <item>
1437 <title>1 update</title>
1438 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158557604</link>
1439 <description><pre><blockquote>Mon Sep 18 05:33:24 CDT 2006<br>Slackware 11.0 release candidate 5. This is the last one, scout's honor.<br>a/aaa_elflibs-11.0.0-i486-9.tgz: Stripped /lib/libbz2.so.1.0.3, added<br> /lib/libdm.so.0.0.4.<br>a/bzip2-1.0.3-i486-3.tgz: Stripped /lib/libbz2.so.1.0.3.<br>ap/espgs-8.15.3svn185-i486-1.tgz: Upgraded to espgs-8.15.3svn185.<br> OK, I don't like using repo versions at all, much less inserting them at the<br> last second. But, it seems like par for the course for ghostscript and its<br> offshoots where there wasn't much choice about shipping 8.15rc4 in Slackware<br> 10.2. In this case, building from svn fixes two critical problems: missing<br> support for CJK, and not correctly printing Umlauts with certain fonts.<br> Thanks to Shin-ichi Abe and Matthias Bachert.<br> If this version of espgs creates new problems that are worse than these,<br> please let me know as soon as possible. It's tested here and seems stable.<br>ap/vim-7.0.109-i486-1.tgz: Upgraded to vim-7.0.109.<br>d/subversion-1.4.0-i486-1.tgz: After a couple convincing assurances that this<br> was a safe and ABI/API compatible upgrade, I decided to allow this upgrade.<br> Thanks to Malcolm Rowe and Janusz Dziemidowicz.<br>l/desktop-file-utils-0.11-i486-1.tgz: Added desktop-file-utils-0.11.<br> The next XFce will need this freedesktop.org package.<br> Thanks to Robby Workman for the information.<br>l/libexif-0.6.13-i486-2.tgz: Fixed libexif.pc includedir.<br> Thanks to Charles Shannon Hendrix for pointing this out.<br>l/libtheora-1.0alpha7-i486-1.tgz: Added libtheora-1.0alpha7. This links with<br> (as far as I know) optional plugins only and is a safe last-second addition.<br> Furthermore, the Theora team has promised that files encoded with this<br> version of the codec will always be playable. The format is stable and ready<br> for production use, so keeping it out of 11.0 due to the "alpha" would be<br> plain silly. Suggested by Edo Hikmahtiar, and Diogo R.<br>l/libungif-4.1.4-i486-3.tgz: Added the utilities in /usr/bin, some of which<br> are used to detect that annoying image spam that's on the rise...<br> Thanks to Joran Kvalvaag.<br>l/neon-0.25.5-i486-1.tgz: Added neon package, split from subversion-deps-1.4.0.<br>x/dejavu-ttf-2.10-noarch-1.tgz: Upgraded to dejavu-ttf-2.10.<br>xap/vim-gvim-7.0.109-i486-1.tgz: Upgraded to vim-7.0.109.<br> Once again, this is just an add-on for the VIM package in ap. :-)<br>xap/xine-lib-1.1.2-i686-2.tgz: Recompiled against libtheora to include the<br> Theora codec plugin. Theora testsuite passed.<br>xap/xine-ui-0.99.4-i686-3.tgz: Patched an issue where xine-ui could block<br> input to Konsole. Thanks to Nuts Mueller.<br>extra/linux-smp-2.6.17.13/kernel-headers-smp-2.6.17.13-i386-1.tgz:<br> Fixed slack-desc typo. No actual rebuild, so no -$BUILD bump.<br> Thanks to David Somero.<br>isolinux/initrd.img: Fixed swap setup in the "Cancel" or unselecting all swap<br> partitions case. Thanks to Marcus Moeller.<br>rootdisks/install.2: Fixed swap setup.<br>rootdisks/install.zip: Fixed swap setup.<br>rootdisks/install.1: Rebuilt.<br></blockquote></pre></description>
1440 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158557604</guid>
1441 <pubDate>Mon, 18 Sep 2006 05:33:24 +0000</pubDate>
1442 </item>
1443 <item>
1444 <title></title>
1445 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158448129</link>
1446 <description><pre><blockquote>Sat Sep 16 23:08:49 CDT 2006<br>l/libgpod-0.3.2-i486-2.tgz: Added --enable-eject-command and<br> --enable-unmount-command. Thanks to Kody K.<br>kde/amarok-1.4.3-i486-4.tgz: Recompiled with a patch to fix non-latin1<br> playlist corruption by forcing UTF8.<br> Thanks to guilherme and the kind folks on #amarok.<br> Added explicit --emable-libgpod. Thanks to Kody K.<br>kde/kdeutils-3.5.4-i486-2.tgz: Fixed ark crash due to race condition on SMP<br> machines. Thanks to JaguarWan.<br>n/rdesktop-1.5.0-i486-1.tgz: Upgraded to rdesktop-1.5.0.<br> Thanks to Andrew Fuller for pointing it out.<br>x/x11-6.9.0-i486-11.tgz: Fixed an overflow in CID encoded Type1 font parsing.<br> For further reference, see:<br> http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740<br> (* Security fix *)<br> Also, fixed French Canadian keymap variant. Thanks to Patrice Tremblay.<br>x/x11-devel-6.9.0-i486-11.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-11.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-11.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-11.tgz: Recompiled.<br>extra/linux-smp-2.6.17.13/kernel-generic-smp-2.6.17.13-i686-1.tgz:<br> This is an optional kernel with support for SMP (up to 16), dual core<br> optimizations, and SMT (Hyperthreading). Fully tuned and ready to go.<br>extra/linux-smp-2.6.17.13/kernel-headers-smp-2.6.17.13-i386-1.tgz<br> Optional kernel headers. There will only be needed to compile a few things,<br> such as apps and libraries that use ALSA (it contains the /usr/include/sound<br> directory that for 2.4.x kernels is supplied in the alsa-driver package).<br>extra/linux-smp-2.6.17.13/kernel-modules-smp-2.6.17.13-i686-1.tgz:<br> Kernel modules for Linux 2.6.17.13-smp, including ALSA modules.<br> These install into /lib/modules/2.6.17.13-smp/.<br></blockquote></pre></description>
1447 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158448129</guid>
1448 <pubDate>Sat, 16 Sep 2006 23:08:49 +0000</pubDate>
1449 </item>
1450 <item>
1451 <title></title>
1452 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158262882</link>
1453 <description><pre><blockquote>Thu Sep 14 19:41:22 CDT 2006<br>d/git-1.4.2.1-i486-1.tgz: Upgraded to git-1.4.2.1.<br>xap/mozilla-firefox-1.5.0.7-i686-1.tgz: Upgraded to firefox-1.5.0.7.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>xap/mozilla-thunderbird-1.5.0.7-i686-1.tgz: Upgraded to thunderbird-1.5.0.7.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>xap/seamonkey-1.0.5-i486-1.tgz: Upgraded to seamonkey-1.0.5.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
1454 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158262882</guid>
1455 <pubDate>Thu, 14 Sep 2006 19:41:22 +0000</pubDate>
1456 </item>
1457 <item>
1458 <title></title>
1459 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158206257</link>
1460 <description><pre><blockquote>Thu Sep 14 03:57:37 CDT 2006<br>a/glibc-solibs-2.3.6-i486-6.tgz: Recompiled.<br>a/glibc-zoneinfo-2.3.6-noarch-6.tgz: Upgraded to tzcode2006k and tzdata2006k.<br> Added "ldconfig -r ." to install script. Thanks to Stuart Winter.<br>a/openssl-solibs-0.9.8b-i486-2.tgz: Patched an issue where it is possible to<br> forge certain kinds of RSA signatures. The patch is used instead of an<br> upgrade to openssl-0.9.8c as it was issued later with a corrected fix.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339<br> (* Security fix *)<br>a/udev-097-i486-10.tgz: If there's no udevd daemon, don't allow rc.udev to<br> try to start. Thanks to Eugene Crosser.<br>d/pkgconfig-0.21-i486-3.tgz: Added {curly brackets} around PKG_CONFIG_PATH<br> in /etc/profile.d/pkgconfig.*. Thanks to R�my Pagniez.<br>l/glibc-2.3.6-i486-6.tgz: Recompiled against 2.4.33.3 and 2.6.17.13 headers.<br> (these kernel versions are now "golden" for release)<br>l/glibc-i18n-2.3.6-noarch-6.tgz: Recompiled.<br>l/glibc-profile-2.3.6-i486-6.tgz: Recompiled.<br>n/openssl-0.9.8b-i486-2.tgz: Patched an issue where it is possible to<br> forge certain kinds of RSA signatures. The patch is used instead of an<br> upgrade to openssl-0.9.8c as it was issued later with a corrected fix.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339<br> (* Security fix *)<br>kernels/huge26.s/*: Added NFSv3 support.<br></blockquote></pre></description>
1461 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158206257</guid>
1462 <pubDate>Thu, 14 Sep 2006 03:57:37 +0000</pubDate>
1463 </item>
1464 <item>
1465 <title></title>
1466 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158042572</link>
1467 <description><pre><blockquote>Tue Sep 12 06:29:32 CDT 2006<br>a/sysvinit-2.84-i486-67.tgz: Sleep 3 seconds before mounting non-root<br> partitions. This was a sleep that I'd removed earlier in the devel cycle to<br> see what it would break (if anything), and the answer is some external hard<br> drives that take a couple seconds to hotplug. Thanks to Fabio Busatto.<br> In rc.M, restart udevd when returning from single user mode.<br> Thanks to James Michael Fultz.<br> Patched initscript.5 man page to show proper /sbin/initscript path.<br> Thanks to Robby Workman.<br> Found another assumption that the kernel has hotplug support in the rc.udev<br> stop function. Thanks again to Gary Hawco for the original bug report.<br>a/udev-097-i486-9.tgz: Uncommented dmsetup rule for LVM2 -- it doesn't seem<br> to hurt anything. Thanks to Dex Filmore.<br>ap/diffutils-2.8.1-i486-3.tgz: Fixed sdiff.1 man page.<br> Thanks to James Michael Fultz.<br>kde/amarok-1.4.3-i486-3.tgz: Recompiled against new libmtp.<br>l/libmtp-0.0.18-i486-1.tgz: Upgraded to libmtp-0.0.18.<br>l/libwpd-0.8.6-i486-1.tgz: Upgraded to libwpd-0.8.6.<br> Thanks to Eugene C. for the CXXFLAGS advice.<br>n/imapd-4.64-i486-3.tgz: Added missing md5.txt mentioned in the imapd man<br> page, plus a note about additional (large) documentation in the sources.<br> The docs directory was also moved to /usr/doc/imapd4.64.<br> Thanks to Mark Flacy for reminding me about this one.<br>n/rdesktop-1.4.1-i486-1.tgz: Added rdesktop-1.4.1. Yes, we're in release<br> candidates, but if this doesn't work at least it is small. :-) I've had<br> many, many requests, and it is needed by krdc, so that's my rationale.<br> Oh -- and thanks to everyone for positive feedback on libgpod. I also fixed<br> the typo in my request for feedback below. I hope that doesn't break too<br> many ChangeLog parsing scripts...<br>n/stunnel-4.17-i486-1.tgz: Upgraded to stunnel-4.17.<br> Thanks to Cal Peake for the notice.<br></blockquote></pre></description>
1468 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1158042572</guid>
1469 <pubDate>Tue, 12 Sep 2006 06:29:32 +0000</pubDate>
1470 </item>
1471 <item>
1472 <title></title>
1473 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157940619</link>
1474 <description><pre><blockquote>Mon Sep 11 02:10:19 CDT 2006<br>a/module-init-tools-3.2.2-i486-2.tgz: In /etc/modprobe.d/, if there's no<br> /etc/modprobe.d/modprobe.conf file, try to make a link to ../modprobe.conf.<br> This will retain legacy support for existing /etc/modprobe.conf files.<br> Thanks very much to Ivan Kalvatchev for persisting with this bug report<br> until I finally saw the light of day. :-)<br>l/libmtp-0.0.16-i486-2.tgz: Fixed hotplug and udev support.<br> Thanks to Carlos Corbacho for the help on this -- I knew it wasn't<br> working yet and was hoping someone would step up. Wow, that was fast!<br>l/libnjb-2.2.5-i486-2.tgz: Fixed hotplug and udev support.<br> Again, thanks to Carlos Corbacho. Now my NJB3 works. :-)<br> Anyone have any yea/nay feedback on libgpod and amaroK?<br></blockquote></pre></description>
1475 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157940619</guid>
1476 <pubDate>Mon, 11 Sep 2006 02:10:19 +0000</pubDate>
1477 </item>
1478 <item>
1479 <title></title>
1480 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157813798</link>
1481 <description><pre><blockquote>Sat Sep 9 14:56:38 CDT 2006<br>kernels/huge26.s/*: Upgraded huge26.s kernel to 2.6.17.13.<br>extra/linux-2.6.17.13/kernel-generic-2.6.17.13-i486-1.tgz:<br> Upgraded to Linux 2.6.17.13 generic kernel.<br>extra/linux-2.6.17.13/kernel-headers-2.6.17.13-i386-1.tgz:<br> Upgraded to Linux 2.6.17.13 kernel headers.<br>extra/linux-2.6.17.13/kernel-modules-2.6.17.13-i486-1.tgz<br> Upgraded to Linux 2.6.17.13 kernel modules.<br>extra/linux-2.6.17.13/kernel-source-2.6.17.13-noarch-1.tgz<br> Upgraded to Linux 2.6.17.13 kernel source.<br> [ Andrea was asleep when I noticed these, and I didn't want to find out<br> what happens when one wakes one's sleeping wife and asks her to start<br> building kernels, so... ]<br></blockquote></pre></description>
1482 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157813798</guid>
1483 <pubDate>Sat, 09 Sep 2006 14:56:38 +0000</pubDate>
1484 </item>
1485 <item>
1486 <title></title>
1487 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157764733</link>
1488 <description><pre><blockquote>Sat Sep 9 01:18:53 CDT 2006<br>d/ruby-1.8.4-i486-2.tgz: As it would so happen, ruby-1.8.5 fixes a security<br> problem, but also breaks a considerable number of things, including Ruby on<br> Rails (RoR being one of the biggest appeals of Ruby), and other applications<br> that make interesting use of it. So, for now anyway -- back to 1.8.4.<br>kde/amarok-1.4.3-i486-2.tgz: This was the only thing that touched the tainted<br> Ruby. ;-) Seriously, this will all get straightened out, but we have a<br> release to do. Should we wait for everyone to adopt the new Ruby API/ABI?<br> Or must it be: "works" / "secure" -- pick one? :-) It's always best to use<br> the right tool for the job or you can get hurt. Remember shop class?<br>kde/kdesdk-3.5.4-i486-2.tgz: Recompiled with configure flags that allow the<br> apr libraries to be found. Thanks to Giacomo Lozito.<br>y/bsd-games-2.13-i486-8.tgz: "pom" now supports a reasonable number of digits<br> with a command line option, as noted in the man page. Default behavior has<br> not been changed (it is still a rounded integer percentage). My own patch<br> didn't live long enough to see birth in a stable release, but who cares. :-)<br> Thanks to Eric Hameleers (who loves a good time-waster) for the better patch.<br> I knew he wouldn't be able to resist this one. ;-><br>bootdisks/raid.s: Reverted to the old megaraid driver since regaraid2 is<br> already in the scsi2.s bootdisk.<br>kernels/huge26.s/*: Fixed USB keyboard support in the installer (at least<br> tested on CD/DVD media). Thanks to Bruce Hill, Jr. for pointing out that<br> this was no longer working.<br> Please note that if you install with this you still need kernel-modules<br> from /extra, and that there's no alsa-driver for this kernel because it's<br> all built into kernel-modules and kernel-headers (well, and the kernel :-).<br> ALSA 1.0.11/12 specifically DO NOT support these newer kernels. Check out<br> the SUPPORTED_KERNELS file in the alsa-driver source. Feel free to play<br> with various combinations (many DO work, but without any noticable<br> improvement to me). I try very hard to not break your sound system, but<br> I'm already bending the rules with alsa-driver-1.0.11_2.4.33.3...<br> Also, if you find bugs in stuff I don't ship, contact the appropriate<br> maintainer too, please. I am not the hg repository for everything I ship. <br> (I know, I do look remarkably similar ;-)<br> "Is this the spacecraft assembly building?"<br>kernels/raid.s/*: Moved from the megaraid2 driver to the old megaraid<br> driver, after it was pointed out that megaraid2 is already in scsi2.s.<br></blockquote></pre></description>
1489 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157764733</guid>
1490 <pubDate>Sat, 09 Sep 2006 01:18:53 +0000</pubDate>
1491 </item>
1492 <item>
1493 <title></title>
1494 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157669980</link>
1495 <description><pre><blockquote>Thu Sep 7 22:59:40 CDT 2006<br>d/ruby-1.8.5-i486-1.tgz: Upgraded to ruby-1.8.5.<br>Honestly, I'm not sure these next three will help at the moment, but we're<br>laying some groundwork for later when HAL will take over (and sing "Daisy").<br>l/libgpod-0.3.2-i486-1.tgz: Added libgpod-0.3.2.<br>l/libmtp-0.0.16-i486-1.tgz: Added libmtp-0.0.16.<br>l/libnjb-2.2.5-i486-1.tgz: Added libnjb-2.2.5.<br>kde/amarok-1.4.3-i486-1.tgz: Upgraded to amarok-1.4.3. Added plugins linked<br> with libgpod, libmtp, and libnjb. Working status (even with a bit of DYI) is<br> not known (yet). It might require HAL to make it do anything at all.<br>n/bind-9.3.2_P1-i486-1.tgz: Upgraded to bind-9.3.2-P1.<br> This update addresses a denial of service vulnerability.<br> BIND's CHANGES file says this:<br> 2066. [security] Handle SIG queries gracefully. [RT #16300]<br> The best discussion I've found is in FreeBSD's advisory, so here's a link:<br> http://security.FreeBSD.org/advisories/FreeBSD-SA-06:20.bind.asc<br> Also, fixed some missing man pages. (noticed by Xavier Thomassin -- thanks)<br> (* Security fix *)<br>y/bsd-games-2.13-i486-7.tgz: Snipped part of a crufty old patch that wouldn't<br> apply. Added an (unapplied) patch to make pom give you two more digits of<br> accuracy. I didn't apply it since it wasn't quite done; it should have the<br> traditional default (no decimal places) that everyone is used to, and an<br> arbitrary accuracy selectable with a command line switch. Perhaps it should<br> be rewritten to use gmp. Oh, and the man page will then need fixing.<br> Eric? ;-)<br></blockquote></pre></description>
1496 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157669980</guid>
1497 <pubDate>Thu, 07 Sep 2006 22:59:40 +0000</pubDate>
1498 </item>
1499 <item>
1500 <title></title>
1501 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157313587</link>
1502 <description><pre><blockquote>Sun Sep 3 19:59:47 CDT 2006<br>a/udev-097-i486-8.tgz: Fixed a missing '[' in rc.udev. Thanks to<br> guilherme for pointing out the error, and to J., who found the missing<br> '['. (It had fallen off my desk and ended up under a table)<br>kernels/System.map: Forgot to gzip a bunch of these. Thanks, Steve'o.<br></blockquote></pre></description>
1503 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157313587</guid>
1504 <pubDate>Sun, 03 Sep 2006 19:59:47 +0000</pubDate>
1505 </item>
1506 <item>
1507 <title></title>
1508 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157248002</link>
1509 <description><pre><blockquote>Sun Sep 3 01:46:42 CDT 2006<br> I wasn't planning a Slackware 11.0 release candidate 4, but here we go.<br>a/kernel-ide-2.4.33.3-i486-1.tgz:<br> Upgraded to Linux 2.4.33.3 sata.i kernel.<br>a/kernel-modules-2.4.33.3-i486-1.tgz<br> Upgraded to Linux 2.4.33.3 kernel modules.<br>a/udev-097-i486-7.tgz: Make sure /proc/sys/kernel/hotplug exists before<br> writing to it. Thanks to Gary Hawco for the bug report.<br> Change log level from "crit" or "err" since udev doesn't support "crit".<br> Silly me, I saw some mention of syslog levels in the docs and assumed it<br> supported all of them. At least in unrecognized cases the default is "err"<br> anyway, so this bug didn't cause ill effects. Accuracy in documentation is,<br> nevertheless, always a good thing to strive for. (I'm referring here to<br> my own inaccurate additions to udev.conf...)<br> Thanks to Chris Vowden for pointing this out.<br> Don't fail to mount tmpfs on /dev because some other tmpfs mount exists.<br> Thanks to Ken Milmore for the patch.<br> Forget standards -- if k3b wants "/dev/writer" then that is good enough<br> justification for me. Try to make a link to the most full-featured burner.<br> Thanks to my good friend Dex Filmore.<br> Relaxed the perms on input events from 600 to 640 so that members of group<br> root can also read events. Mode 644 was suggested, but wouldn't that let<br> anyone on the box set up e.g. a keyboard logger? It didn't seem secure to<br> me, and 640 looks like a decent compromise.<br> Thanks to Jon Anders Skorpen.<br>ap/mysql-5.0.24a-i486-1.tgz: Upgraded to mysql-5.0.24a.<br> Evidently the ABI change in MySQL 5.0.24 was unintentional, so all the<br> packages that were recompiled before need another recompile. Oh well, maybe<br> this little exercise has fixed something else we didn't know about. :-)<br>d/kernel-headers-2.4.33.3-i386-1.tgz:<br> Upgraded to Linux 2.4.33.3 kernel headers.<br>d/perl-5.8.8-i486-3.tgz: Recompiled against libmysqlclient.<br>k/kernel-source-2.4.33.3-noarch-1.tgz<br> Upgraded to Linux 2.4.33.3 kernel source.<br>kde/koffice-1.5.2-i486-4.tgz: Recompiled against libmysqlclient.<br>kde/qt-3.3.6-i486-4.tgz: Recompiled against libmysqlclient.<br>l/alsa-driver-1.0.11_2.4.33.3-i486-1.tgz: Recompiled for Linux 2.4.33.3.<br> By the way, I did try ALSA 1.0.12 and noticed that emu10k1 wasn't compiling<br> for Linux 2.4.33.3. I think we are probably safer sticking with the well<br> tested ALSA 1.0.11 for the release.<br>n/bitchx-1.1-i486-5.tgz: Recompiled against libmysqlclient.<br>n/dhcp-3.0.4-i486-2.tgz: Fixed incorrect man page permissions.<br> Thanks to Jerome Pinot.<br>n/iptables-1.3.5-i486-2.tgz: Updated a rather ancient description file.<br> Thanks to Sean Donner for noticing that. I hope the many folks still<br> running Linux 2.2.x were adequately warned.<br>n/php-4.4.4-i486-3.tgz: Recompiled against libmysqlclient.<br>n/samba-3.0.23c-i486-1.tgz: Upgraded to samba-3.0.23c.<br>n/sendmail-8.13.8-i486-3.tgz: Recompiled with official patch.<br> "(2006-08-30) If sendmail is used with -bs and a mail filter (milter) is<br> configured, an assertion can be triggered. This patch fixes the bug."<br> Thanks much to Jakub Jankowski for the heads up.<br>n/sendmail-cf-8.13.8-noarch-3.tgz<br>extra/ktorrent/ktorrent-2.0.2-i486-1.tgz: Added ktorrent-2.0.2.<br> Thanks to Erik Jan Tromp for showing me this one. I've always used the<br> command line BT clients (usually in "screen"), but this is nice, doesn't<br> require mainline BitTorrent or any non-KDE dependencies, and will work<br> great for downloading (and seeding) Slackware ISO images. :-)<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.33.3-i486-1.tgz:<br> Recompiled for Linux 2.4.33.3.<br>extra/php5/php-5.1.6-i486-2.tgz: Recompiled against libmysqlclient.<br>bootdisks/*: Upgraded to Linux 2.4.33.3 kernels.<br>kernels/*: Upgraded to Linux 2.4.33.3 kernels, except the huge.s kernel.<br> In raid.s, switch from the megaraid to megaraid2 driver. This should<br> support everything the old driver did and then some. If there are<br> problems, let me know ASAP. Thanks to Michael Johnson. <br>isolinux/initrd.img: Upgraded USB/IEEE1394 modules to Linux 2.4.33.3.<br> Eric Hameleers and I did a bit more work on the NFS installer (in the<br> install.* rootdisks below, too). Now installing via NFS will attempt<br> to mount the root of the Slackware tree first, rather than only the<br> /slackware directory within. This (if successful), allows choosing<br> a kernel to install later on, just like installing from CD, DVD, or<br> hard drive. If it doesn't work (perhaps only /slackware is exported)<br> then the installer will fall back on the traditional behavior.<br> Thanks to everyone who suggested this idea from time to time, and<br> thanks to Eric for finally making it happen.<br>isolinux/network.dsk: Upgraded network modules to Linux 2.4.33.3.<br>isolinux/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.33.3.<br>rootdisks/install.1: Upgraded USB/IEEE1394 modules to Linux 2.4.33.3.<br>rootdisks/install.2: Upgraded USB/IEEE1394 modules to Linux 2.4.33.3.<br>rootdisks/install.zip: Upgraded USB/IEEE1394 modules to Linux 2.4.33.3.<br>rootdisks/network.dsk: Upgraded network modules to Linux 2.4.33.3.<br>rootdisks/pcmcia.dsk: Upgraded pcmcia network modules to Linux 2.4.33.3.<br> I can be off topic here, right?<br> BIG congratulations to my little sister Jennifer on the birth of her<br> daughter Abigail Jane. Mazel Tov! :-)<br></blockquote></pre></description>
1510 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1157248002</guid>
1511 <pubDate>Sun, 03 Sep 2006 01:46:42 +0000</pubDate>
1512 </item>
1513 <item>
1514 <title></title>
1515 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156832666</link>
1516 <description><pre><blockquote>Tue Aug 29 06:24:26 CDT 2006<br>a/util-linux-2.12r-i486-4.tgz: Fixed incorrect permissions on /var/lock.<br> Thanks to Steven Robson.<br>f/linux-howtos-20060829-noarch-1.tgz: Updated the HOWTOs again. I guess back<br> in February this must have been looking ready to release. ;-)<br> Thanks to Szymczak Artur for noticing the HOWTOs were stale.<br>x/x11-6.9.0-i486-10.tgz: Reverted the ATI hang patch after problem reports.<br> If you were helped by the patch it'll be held in /extra for the release so<br> that hopefully everyone can enjoy a working ATI card. :-)<br> Thanks again to Mark Canter, as this is a real problem but the patch does<br> seem to introduce some new issues of its own. It's good to have an<br> alternate driver just in case, though.<br>x/x11-devel-6.9.0-i486-10.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-10.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-10.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-10.tgz: Recompiled.<br>extra/slackpkg/slackpkg-2.09-noarch-1.tgz: Upgraded to slackpkg-2.09-noarch-1.<br> Thanks to Piter Punk.<br>extra/x11-radeon-patched/x11-radeon-patched-6.9.0-i486-1.tgz:<br> Here's the patched radeon module from the -9 X.Org Slackware packages.<br> There's a README file included with it explaining what it is for with<br> references to a discussion of the issue.<br>isolinux/initrd.img: Fixed an installer bug where setup would ask which<br> swap partitions you'd like to use and then conveniently set them all up<br> for you if you selected at least one. Thanks to DEF.<br>rootdisks/install.1: Fixed a bug where libraries that were moved to install.2<br> to make space on install.1 were needed by /bin/mount. Thanks to David Bray.<br>rootdisks/install.2: Moved a couple of libraries to install.1.<br> Fixed installer swap bug.<br>rootdisks/install.zip: Fixed installer swap bug.<br></blockquote></pre></description>
1517 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156832666</guid>
1518 <pubDate>Tue, 29 Aug 2006 06:24:26 +0000</pubDate>
1519 </item>
1520 <item>
1521 <title></title>
1522 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156657013</link>
1523 <description><pre><blockquote>Sun Aug 27 05:36:53 CDT 2006<br>ap/vim-7.0.066-i486-2.tgz: Use the default vanilla system vimrc as distributed<br> with the vim sources. Thanks to J for mentioning that using vim with<br> 'crontab -e' was working fine without any additions to the vimrc.<br>d/m4-1.4.6-i486-1.tgz: Upgraded to m4-1.4.6.<br>l/libpng-1.2.12-i486-2.tgz: Recompiled so that libpng.so.* links to libz and<br> libm. This has been a point of contention for a long time with the PNG folks<br> maintaining that you shouldn't have to link libpng this way. Well, just<br> about everyone else builds libpng to link with -lz and -lm automatically,<br> but I've held my ground along with the PNG team (usually I will defer to<br> upstream and will send people there with these kinds of requests). Today<br> Janusz Dziemidowicz pointed out that if you build libpng with ./configure<br> that now it *is* linking to these. Good enough reason to end this problem<br> right now. Thanks Janusz, for pointing out that discrepancy and sending in<br> a patch. :-)<br>n/irssi-0.8.10a-i486-4.tgz: Removed duplicates and unformatted files from<br> docs/help directory. Thanks to James Michael Fultz.<br>x/dejavu-ttf/dejavu-ttf-2.9-noarch-1.tgz: Upgraded to dejavu-ttf-2.9.<br> Moved from /extra into the X series.<br> Thanks to the DejaVu team (http://dejavu.sf.net) for the superb work.<br>x/fontconfig-2.2.3-i486-2.tgz: Patched /etc/fonts.conf to favor the DejaVu<br> fonts over the Vera ones if they are present on the machine. US English<br> users should notice only minor (if any) differences with this patch,<br> but other users could see their language displayed properly out-of-the box<br> for the first time. :-)<br>x/x11-6.9.0-i486-9.tgz: Patched a PCF font parsing bug that could crash X.<br> Fixed the Greek keyboard layout. Thanks to Thanos Kyritsis.<br> Fixed ATI lockup bugs. Thanks to Mark Canter.<br>x/x11-devel-6.9.0-i486-9.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-9.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-9.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-9.tgz: Recompiled.<br>xap/seamonkey-1.0.4-i486-3.tgz: Fixed world-writable docs.<br> Thanks to Piter Punk for pointing those out.<br>xap/vim-gvim-7.0.066-i486-2.tgz: Recompiled.<br>extra/lvm2/device-mapper-1.02.09-i486-1.tgz: Upgraded to<br> device-mapper-1.02.09, moved out of /testing.<br>extra/lvm2/lvm2-2.02.09-i486-1.tgz: Upgraded to LVM-2.02.09,<br> moved out of /testing.<br>extra/php5/php-5.1.6-i486-1.tgz: Upgraded to php-5.1.6,<br> moved out of /testing.<br></blockquote></pre></description>
1524 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156657013</guid>
1525 <pubDate>Sun, 27 Aug 2006 05:36:53 +0000</pubDate>
1526 </item>
1527 <item>
1528 <title>1 update</title>
1529 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156480522</link>
1530 <description><pre><blockquote>Fri Aug 25 04:35:22 CDT 2006<br>Here is Slackware 11.0 release candidate 3. I think most of the irresistible<br> upgrades are in here now, and the bug reports have been mostly handled.<br> There may still be a few changes, and possibly another release candidate,<br> but this is pretty close to final with the exception of updating<br> documentation and building ZipSlack. Thanks very much to everyone who is<br> helping to test these release candidates -- I think this is going to be a<br> very up to date and stable release. :-)<br>a/glibc-solibs-2.3.6-i486-5.tgz: Patched an issue with kernel version parsing<br> in ld-2.3.6.so that was leading glibc to treat 2.4 kernels with 4 version<br> parts (such as 2.4.33.2) as if they supported NPTL, leading to a crash<br> at boot.<br>a/glibc-zoneinfo-2.3.6-noarch-5.tgz: Updated timezone information from<br> tzdata2006j.<br>a/kernel-ide-2.4.33.2-i486-1.tgz: Upgraded to 2.4.33.2 sata.i kernel.<br> Enabled support for OOM killer and HIGHMEM4G.<br>a/kernel-modules-2.4.33.2-i486-1.tgz: Upgraded to Linux 2.4.33.2 modules.<br>a/udev-097-i486-6.tgz: Restore ttyUSB access to members of the tty group.<br> Thanks to Eugene Crosser.<br> In rc.udev, ignore lines that start with '#'.<br> Thanks to Ian Bates.<br> Removed hostap and hostap_cs dupes from blacklist.<br> Thanks to giovanni quadriglio.<br> Patched rc.optical-symlinks to avoid error messages with real SCSI devices<br> and the SCSI generic driver.<br> Thanks to Lorenzo Buzzi.<br>ap/lm_sensors-2.10.0-i486-1.tgz: Added lm_sensors-2.10.0, which contains the<br> libsensors library that KDE can use for hardware status monitoring.<br>ap/vim-7.0.066-i486-1.tgz: Upgraded to vim 7.0.066.<br> Added reasonable default vimrc if none exists. Thanks to Eric Hameleers.<br>xap/vim-gvim-7.0.066-i486-1.tgz: Upgraded to gvim 7.0.066 (requires vim).<br>d/kernel-headers-2.4.33.2-i386-1.tgz: Upgraded to Linux 2.4.33.2 headers.<br>d/perl-5.8.8-i486-2.tgz: Upgraded to DBD-mysql-3.0006 and DBI-1.52.<br> Eugene Crosser reported that DBD compiled against an older version of<br> libmysqlclient no longer worked without a recompile. Just to be on the<br> safe side, everything linked with libmysqlclient is getting recompiled.<br>d/pkgconfig-0.21-i486-2.tgz: Export PKG_CONFIG_PATH.<br>k/kernel-source-2.4.33.2-noarch-1.tgz: Upgraded to Linux 2.4.33.2 source.<br> Enabled support for OOM killer and HIGHMEM4G in default .config.<br>kde/amarok-1.4.2-i486-1.tgz: Upgraded to amarok-1.4.2.<br>kde/kdebase-3.5.4-i486-6.tgz: Recompiled to use libsensors with ksysguardd.<br> Fixed location of kdeglobals, removed font defaults but kept the<br> anti-aliasing fixes.<br>kde/koffice-1.5.2-i486-3.tgz: Recompiled against libmysqlclient and libruby.<br>kde/qt-3.3.6-i486-3.tgz: Recompiled against libmysqlclient, added symlink<br> in /usr/lib/pkgconfig to qt-mt.pc.<br>l/alsa-driver-1.0.11_2.4.33.2-i486-1.tgz: Recompiled for Linux 2.4.33.2.<br>l/glibc-2.3.6-i486-5.tgz: Patched an issue with kernel version parsing in<br> ld-2.3.6.so that was leading glibc to treat 2.4 kernels with 4 version parts<br> (such as 2.4.33.2) as if they supported NPTL, leading to a crash at boot.<br> Added sa_IN and ru_RU.CP1251 locale support.<br> Updated timezone information from tzdata2006j.<br> Updated timezone utilities from tzcode2006j.<br>l/glibc-profile-2.3.6-i486-5.tgz: Recompiled.<br>l/libmusicbrainz-2.1.4-i486-1.tgz: Upgraded to libmusicbrainz-2.1.4.<br>l/libvisual-0.4.0-i486-1.tgz: Added libvisual-0.4.0. Just the library for<br>n/bitchx-1.1-i486-4.tgz: Recompiled against libmysqlclient.<br>n/openldap-client-2.3.27-i486-1.tgz: Upgraded to openldap-client-2.3.27.<br>n/php-4.4.4-i486-2.tgz: Recompiled against libmysqlclient.<br>t/tetex-3.0-i486-4.tgz: Recompiled against new LessTif to stop warnings<br>t/tetex-doc-3.0-i486-4.tgz: Rebuilt. Moved info pages to /usr/info.<br>xap/gimp-2.2.13-i486-1.tgz: Upgraded to gimp-2.2.13.<br>extra/3dfx-glide/*: Removed, as it most likely doesn't work.<br>extra/k3b/k3b-0.12.17-i486-1.tgz: Upgraded to k3b-0.12.17.<br>extra/k3b/k3b-i18n-0.12.17-noarch-1.tgz: Upgraded to k3b-i18n-0.12.17.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.33.2-i486-1.tgz:<br>extra/slackpkg/slackpkg-2.08-noarch-3.tgz: Upgraded to slackpkg-2.08-noarch-3.<br>bootdisks/*: Upgraded to Linux 2.4.33.2 kernels.<br>isolinux/initrd.img: Upgraded USB/IEEE1394 modules to Linux 2.4.33.2.<br>isolinux/network.dsk: Upgraded network modules to Linux 2.4.33.2.<br>isolinux/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.33.2.<br>rootdisks/install.1: Upgraded USB/IEEE1394 modules to Linux 2.4.33.2.<br>rootdisks/install.2: Upgraded USB/IEEE1394 modules to Linux 2.4.33.2.<br>rootdisks/install.zip: Upgraded USB/IEEE1394 modules to Linux 2.4.33.2.<br>rootdisks/network.dsk: Upgraded network modules to Linux 2.4.33.2.<br>rootdisks/pcmcia.dsk: Upgraded pcmcia network modules to Linux 2.4.33.2.<br>kernels/*: Upgraded to Linux 2.4.33.2 kernels, except the huge.s kernel.<br><br>After much thought and consultation with developers, it has been decided to<br>move 2.6.17.x out of /testing and into /extra. It runs stable by all reports,<br>has better wireless support, and is not going to be stale as soon. In<br>addition, HIGHMEM4G has been enabled. This caused no problems with my old<br>486 with 24MB (the one I use for compiling KDE ;-), and Tomas Matejicek has<br>enabled this in SLAX for a long time with no reports of problems, so I<br>believe it is a safe option (and is needed by many modern machines).<br>Thanks again to Andrea for building these kernels and packages. :-)<br><br>kernels/huge26.s/*: Upgraded huge26.s kernel to 2.6.17.11.<br>extra/linux-2.6.17.11/kernel-generic-2.6.17.11-i486-1.tgz:<br>extra/linux-2.6.17.11/kernel-headers-2.6.17.11-i386-1.tgz:<br>extra/linux-2.6.17.11/kernel-modules-2.6.17.11-i486-1.tgz<br>extra/linux-2.6.17.11/kernel-source-2.6.17.11-noarch-1.tgz<br><br>testing/packages/cairo-1.2.4-i486-1.tgz: Added cairo-1.2.4.<br>testing/packages/fontconfig-2.3.95-i486-1.tgz: Added fontconfig-2.3.95.<br>testing/packages/php-5.1.5/php-5.1.5-i486-2.tgz: Recompiled against<br>l/glibc-i18n-2.3.6-noarch-5.tgz: Rebuilt.<br> Added sa_IN and ru_RU.CP1251 locale support.<br> now (no plugins), but this should make it much easier to compile and use<br> audio visualization plugins without having to recompile amaroK.<br> from xdvi.<br> Thanks to Kris Karas for pointing out the misplaced info pages.<br> Recompiled for Linux 2.4.33.2.<br> Thanks to Piter Punk.<br> Upgraded to Linux 2.6.17.11 generic kernel.<br> Upgraded to Linux 2.6.17.11 kernel headers.<br> Upgraded to Linux 2.6.17.11 kernel modules.<br> Load PC speaker support in rc.modules. Thanks to NetrixTardis.<br> Upgraded to Linux 2.6.17.11 kernel source.<br> libmysqlclient.<br></blockquote></pre></description>
1531 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156480522</guid>
1532 <pubDate>Fri, 25 Aug 2006 04:35:22 +0000</pubDate>
1533 </item>
1534 <item>
1535 <title></title>
1536 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156259435</link>
1537 <description><pre><blockquote>Tue Aug 22 15:10:35 CDT 2006<br>a/shadow-4.0.3-i486-13.tgz: Fixed deprecated root:bin ownerships.<br> Thanks to Stuart Winter.<br>a/util-linux-2.12r-i486-3.tgz: Fixed file permissions and ownerships in<br> /usr/doc. Thanks to Stuart Winter.<br></blockquote></pre></description>
1538 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156259435</guid>
1539 <pubDate>Tue, 22 Aug 2006 15:10:35 +0000</pubDate>
1540 </item>
1541 <item>
1542 <title></title>
1543 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156172048</link>
1544 <description><pre><blockquote>Mon Aug 21 14:54:08 CDT 2006<br>a/udev-097-i486-5.tgz: Fixed check in rc.udev for 2.6.15+ kernel.<br> Thanks to Richard Fuller for the fix.<br></blockquote></pre></description>
1545 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156172048</guid>
1546 <pubDate>Mon, 21 Aug 2006 14:54:08 +0000</pubDate>
1547 </item>
1548 <item>
1549 <title></title>
1550 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156117558</link>
1551 <description><pre><blockquote>Sun Aug 20 23:45:58 CDT 2006<br>a/gpm-1.20.1-i486-2.tgz: Patched to send all non-critical error messages to<br> the system logs rather than to the console.<br>a/pkgtools-11.0.0-i486-2.tgz: Merged in some more xorgsetup patches from<br> Irfan Acar, Daniil Bratashov, and Piter Punk.<br>a/shadow-4.0.3-i486-12.tgz: Patched for gcc-3.4.x.<br> Thanks to Dominik L. Borkowski for the patch.<br> Removed spurious id.1.gz manpage. Thanks to Cal Peake.<br> Removed obsolete options from the passwd program.<br>a/sysvinit-2.84-i486-66.tgz: In rc.M, fixed the nohotplug cmdline option.<br> Thanks to Eric Hameleers.<br> Sleep for a couple seconds after shutting down dhcpcd in rc.6 to allow time<br> for various files in /etc to restore themselves. Thanks to Cal Peake.<br> Don't try to mount usbfs if it's in /proc/mounts already.<br>a/tar-1.15.1-i486-2.tgz: Patched to be less strict about the option order.<br> Thanks to Jonathan A. Irwin for sending me a patch from Sergey Poznyakoff.<br>a/udev-097-i486-4.tgz: Changed default udev log level from err to crit.<br> Refuse to run udev unless the kernel is 2.6.15+. Thanks to Sean Donner.<br>a/util-linux-2.12r-i486-2.tgz: Added schedutils-1.5.0 which is apparently due<br> to be merged into util-linux upstream sometime soon anyway.<br> Thanks to Jonathan Woithe for the suggestion.<br>ap/diffutils-2.8.1-i486-2.tgz: Patched a bug in sdiff.<br> Thanks to James Michael Fultz for the patch and improved build script.<br>ap/vim-7.0.063-i486-1.tgz: Upgraded to vim 7.0.063.<br> Removed unpopular libruby dependency. :-)<br>e/emacs-21.4a-i486-3.tgz: Avoid a package file overlap between Emacs ctags and <br> Exuberant Ctags. Thanks to Michal Kowalski for pointing it out.<br>kde/kdebase-3.5.4-i486-5.tgz: Added /opt/kde/share/kdeglobals to set the Vera<br> fonts with anti-aliasing enabled as the defaults.<br>xap/seamonkey-1.0.4-i486-2.tgz: Added /usr/lib/seamonkey -> <br> /usr/lib/seamonkey-1.0.4 symlink. Thanks to Tsomi.<br>xap/vim-gvim-7.0.063-i486-1.tgz: Upgraded to vim 7.0.063.<br> Removed unpopular libruby dependency. :-)<br>extra/checkinstall/checkinstall-1.6.0-i486-2.tgz: Fixed 640 perms on FAQ.<br> Thanks to Michael Iatrou.<br>rootdisks/pcmcia.dsk,isolinux/pcmcia.dsk: Added ide-cs module.<br> Requested by Zack Smith.<br></blockquote></pre></description>
1552 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156117558</guid>
1553 <pubDate>Sun, 20 Aug 2006 23:45:58 +0000</pubDate>
1554 </item>
1555 <item>
1556 <title>4 updates</title>
1557 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156031907</link>
1558 <description><pre><blockquote>Sat Aug 19 23:58:27 CDT 2006<br>This is mostly frozen now unless bugs (or irresistible upgrades) come up, so<br>I'll call this update Slackware 11.0 release candidate 2. :-)<br>a/kernel-ide-2.4.33-i486-2.tgz:<br> Switched to the sata.i kernel which supports both parallel and serial ATA.<br>a/kernel-modules-2.4.33-i486-2.tgz: Recompiled.<br> Upgraded to Linux 2.4.33 kernel modules.<br>d/pkgconfig-0.21-i486-1.tgz: Upgraded to pkg-config-0.21.<br> Set the PKG_CONFIG_PATH to search in /usr/local/lib/pkgconfig and<br> /opt/kde/lib/pkgconfig, too. Thanks, Seb!<br>k/kernel-source-2.4.33-noarch-2.tgz:<br>l/alsa-driver-1.0.11_2.4.33-i486-2.tgz: Recompiled.<br>bootdisks/speakup.s: Added SATA support.<br>kernels/huge26.s/*: Recompiled.<br>kernels/sata.i/*: Recompiled.<br>kernels/speakup.s/*: Added SATA support.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.17.9.<br>To be consistent, bumped the build number on all of the 2.6.16.27 packages to -5.<br>extra/linux-2.6.16.27/alsa-driver-1.0.11_2.6.16.27-i486-5.tgz:<br>extra/linux-2.6.16.27/kernel-generic-2.6.16.27-i486-5.tgz:<br>extra/linux-2.6.16.27/kernel-headers-2.6.16.27-i386-5.tgz:<br>extra/linux-2.6.16.27/kernel-modules-2.6.16.27-i486-5.tgz:<br>extra/linux-2.6.16.27/kernel-source-2.6.16.27-noarch-5.tgz:<br>extra/slackpkg/slackpkg-2.08-noarch-2.tgz: Upgraded to slackpkg-2.08-noarch-2.<br>testing/packages/linux-2.6.17.9/kernel-generic-2.6.17.9-i486-1.tgz:<br>testing/packages/linux-2.6.17.9/kernel-headers-2.6.17.9-i386-1.tgz:<br>testing/packages/linux-2.6.17.9/kernel-modules-2.6.17.9-i486-1.tgz<br>testing/packages/linux-2.6.17.9/kernel-source-2.6.17.9-noarch-1.tgz<br>rootdisks/install.1: Updated. Thanks to Cal Peake for the idea about how to<br>rootdisks/network.dsk: Fixed to probe for tg3 cards.<br>d/kernel-headers-2.4.33-i386-2.tgz: Rebuilt.<br> Updated the default .config to include SATA support.<br> Oh, and yes I did see 2.4.33.1. Thanks for letting me know ;-), but that<br> kernel does not seem to be booting here so I'll stick with 2.4.33 for now.<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.4.33.<br>bootdisks/sata.i: Rebuilt.<br> Recompiled.<br> Recompiled.<br> Rebuilt.<br> Enabled CONFIG_X86_SPEEDSTEP_RELAXED_CAP_CHECK option so that<br> Piotr Wierzchowski's Thinkpad will run cooler and use less power. :-)<br> Rebuilt with CONFIG_X86_SPEEDSTEP_RELAXED_CAP_CHECK=y in .config.<br> Thanks to Piter Punk.<br> Upgraded to Linux 2.6.17.9 generic kernel.<br> Upgraded to Linux 2.6.17.9 kernel headers.<br> Upgraded to Linux 2.6.17.9 kernel modules.<br> Upgraded to Linux 2.6.17.9 kernel source.<br> Thanks to Andrea for building the 2.6.17.9 kernels.<br> improve the setup of swap partitions.<br> Updated most of the binaries on the installer, but not busybox. It seems<br> to be working fine, and the idea of messing with it now scares me. ;-)<br>rootdisks/install.2: Updated.<br>rootdisks/install.zip: Updated.<br> Thanks to Eric Hameleers and Bruce Hill, Jr.<br> Fixed module probing to work with 2.6 modules. Thanks to Piter Punk.<br></blockquote></pre></description>
1559 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1156031907</guid>
1560 <pubDate>Sat, 19 Aug 2006 23:58:27 +0000</pubDate>
1561 </item>
1562 <item>
1563 <title></title>
1564 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155860446</link>
1565 <description><pre><blockquote>Fri Aug 18 00:20:46 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-8.tgz: Upgraded to the mm-1.4.2 library, patched<br> libtiff, upgraded to pcre-6.7 libraries, and included the recompiled<br> cups-1.1.23 and slang libraries.<br>a/cups-1.1.23-i486-4.tgz: Fixed broken es and fr man page symlinks.<br>d/git-1.4.2-i486-1.tgz: Upgraded to git-1.4.2.<br>kde/kdenetwork-3.5.4-i486-2.tgz: Patched a bug in kopete that could freeze<br> KDE under certain circumstances. Thanks to JaguarWan and Olivier Goffart.<br>l/libtiff-3.8.2-i486-2.tgz: Patched vulnerabilities in libtiff which were<br> found by Tavis Ormandy of the Google Security Team. These issues could<br> be used to crash programs linked to libtiff or possibly to execute code<br> as the program's user. A low risk command-line overflow in tiffsplit was<br> also patched.<br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465<br> (* Security fix *)<br>l/mm-1.4.2-i486-1.tgz: Upgraded to mm-1.4.2.<br>l/pcre-6.7-i486-1.tgz: Upgraded to pcre-6.7.<br>l/slang-2.0.6-i486-2.tgz: Fixed uncompressed manpage.<br>n/php-4.4.4-i486-1.tgz: Upgraded to php-4.4.4.<br> Some of the security issues fixed in this release include:<br> * Added missing safe_mode/open_basedir checks inside the error_log(),<br> file_exists(), imap_open() and imap_reopen() functions.<br> * Fixed possible open_basedir/safe_mode bypass in cURL extension.<br> * Fixed a buffer overflow inside sscanf() function.<br> (* Security fix *)<br>testing/packages/cups-1.2.2/cups-1.2.2-i486-2.tgz:<br> Removed /usr/man/man8/disable.8.gz symlink.<br>testing/packages/php-5.1.5/php-5.1.5-i486-1.tgz:<br> Upgraded to php-5.1.5.<br> Some of the security issues fixed in this release include:<br> * Added missing safe_mode/open_basedir checks inside the error_log(),<br> file_exists(), imap_open() and imap_reopen() functions.<br> * Fixed possible open_basedir/safe_mode bypass in cURL extension and on<br> PHP 5 with realpath cache.<br> * Fixed a buffer overflow inside sscanf() function.<br> (* Security fix *)<br>kernels/sata.i/: Recompiled with Silicon Image PATA support. (there was<br> a conflict before with this and the Sil SATA driver but it was fixed)<br></blockquote></pre></description>
1566 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155860446</guid>
1567 <pubDate>Fri, 18 Aug 2006 00:20:46 +0000</pubDate>
1568 </item>
1569 <item>
1570 <title></title>
1571 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155755499</link>
1572 <description><pre><blockquote>Wed Aug 16 19:11:39 CDT 2006<br>a/aaa_base-11.0.0-noarch-1.tgz: Added /usr/share/info -> ../info symlink.<br> Bumped /etc/slackware-version number to 11.0.0.<br> Changed version number (but little else yet) in initial email.<br>a/hotplug-2004_09_23-noarch-10.tgz: Corrected typo in rc.hotplug.<br> Thanks to Willy Sudiarto Raharjo.<br>a/pcmcia-cs-3.2.8-i486-3.tgz: Commented out line in config.opts for old<br> Webgear wireless card.<br> chmod 644 /etc/pcmcia/*.opts.<br>a/pcmciautils-014-i486-2.tgz: Commented out line in config.opts for old<br> Webgear wireless card.<br> Moved man pages to /usr/man/man8, compressed with gzip.<br>a/sysvinit-2.84-i486-65.tgz: Don't run /lib/udev/rc.optical-symlinks in a<br> login shell, since the bug that required that kludge is now fixed.<br>a/udev-097-i486-3.tgz: Patched rc.optical-symlinks to be locale friendly.<br> Thanks to everyone who reported the bug, and to Michiel Broek and<br> Eric Hameleers for sending in patches.<br> Updated comments and removed obsolete options in udev.conf.<br> Thanks to Jakub Jankowski.<br> Removed /dev/loop0 and /dev/rtc from udev-script-devices.tar.gz.<br>l/gd-2.0.33-i486-1.tgz: Added gd-2.0.33.<br> Suggested by Cal Peake.<br>l/libidn-0.6.5-i486-1.tgz: Upgraded to libidn-0.6.5.<br> Suggested by Piotr Simon.<br>n/nfs-utils-1.0.10-i486-2.tgz: On 2.6.x kernels, mount nfsd in rc.nfsd.<br> Thanks to Piter Punk, Leonardo Roman, and George Iosif for the suggestion.<br>n/wireless-tools-28-i486-3.tgz: Fixed rc.wireless which contained a few ^M<br> that broke it. I think I did this saving the patch with my mailer -- sorry<br> about that.<br>xap/gnuplot-4.0.0-i486-2.tgz: Recompiled against new gd-2.0.33 package.<br> Thanks to Michael Iatrou for the suggestion.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.33-i486-1.tgz: Recompiled<br> kernel modules for Linux 2.4.33.<br></blockquote></pre></description>
1573 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155755499</guid>
1574 <pubDate>Wed, 16 Aug 2006 19:11:39 +0000</pubDate>
1575 </item>
1576 <item>
1577 <title></title>
1578 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155678353</link>
1579 <description><pre><blockquote>Tue Aug 15 21:45:53 CDT 2006<br>a/genpower-1.0.5-i486-1.tgz: Upgraded to genpower-1.0.5.<br> Thanks to Bernd Noessler for letting me know about this -- freshmeat.net<br> still points to a much older version of genpower.<br>a/less-394-i486-1.tgz: Upgraded to less-394. Thanks to Haakon Riiser for<br> suggesting this and confirming that less-394 is an official stable release.<br> Added RAR support to lesspipe.sh. Thanks to Manolis Tzanidakis.<br>a/sysvinit-2.84-i486-64.tgz: In rc.M, check better for udev before running<br> rc.optical-symlinks, and run the script in a login shell which might fix the<br> error "-bash: let: expression expected" that some people have reported.<br> Thanks to Michiel Broek for the hint about using a login shell.<br>ap/mt-st-0.9b-i486-1.tgz: Upgraded to mt-st-0.9b.<br> Thanks to Stuart Winter.<br>d/git-1.4.1.1-i486-2.tgz: Replaced hard links with symbolic links, since<br> Stuart Winter hates hard links. (I hope he doesn't find the other ones! ;-)<br> Thanks to Stuart Winter for the patch.<br>kde/kdebase-3.5.4-i486-4.tgz: Patched a bug in ksystraycmd.<br> Thanks to Dirk Mueller for the patch.<br>n/wireless-tools-28-i486-2.tgz: Patched rc.wireless for ESSIDs with spaces.<br> Thanks to Bruneel Micha�l and Eric Hameleers.<br>xap/imagemagick-6.2.8_8-i486-2.tgz: Reverted to ImageMagick-6.2.8-8 since<br> the "display" program in ImageMagick-6.2.9-0 crashes.<br> Thanks to Tomasz Luczak for the bug report.<br></blockquote></pre></description>
1580 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155678353</guid>
1581 <pubDate>Tue, 15 Aug 2006 21:45:53 +0000</pubDate>
1582 </item>
1583 <item>
1584 <title></title>
1585 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155604855</link>
1586 <description><pre><blockquote>Tue Aug 15 01:20:55 CDT 2006<br>a/devs-2.3.1-noarch-24.tgz: Added udev-style /dev/md/* devices to save people<br> who boot between 2.4.x and 2.6.x kernels some trouble.<br> Thanks to Mircea Baciu for pointing out this possibility.<br> Note: Upgrading the devs package while running udev will NOT work.<br>a/sysvinit-2.84-i486-63.tgz: Patched rc.4 to check both /usr/bin and /usr/sbin<br> for gdm. Thanks to Scott J. Harmon.<br> Added a warning in rc.S that if you make an rc.modules.local that the other<br> rc.modules script(s) will not be run.<br> Don't try to start udev if sysfs and tmpfs are not in the kernel.<br> Use grep '-q' option instead of '> /dev/null' in many places.<br>a/udev-097-i486-2.tgz: Don't run rc.udev if tmpfs is not in the kernel.<br> Thanks to Gunnar Florus Johansen.<br>ap/sysstat-7.0.0-i486-1.tgz: Added sysstat-7.0.0.<br> Suggested by grk wng and Jesper Juhl.<br>n/iproute2-2.6.16_060323-i486-1.tgz: Upgraded to iproute2-2.6.16-060323.<br>n/nfs-utils-1.0.10-i486-1.tgz: Upgraded to nfs-utils-1.0.10.<br>t/xfig-3.2.4-i486-1.tgz: Upgraded to xfig-3.2.4.<br> Thanks to Daniil Bratashov for the initial SlackBuild script.<br>xap/gimp-2.2.12-i486-3.tgz: Fixed icon path in gimp-2.2.desktop.<br> Thanks to Nikos Skalkotos for the bug report.<br>xap/imagemagick-6.2.9_0-i486-1.tgz: Upgraded to imagemagick-6.2.9-0.<br>extra/slackpkg/slackpkg-2.07-noarch-5.tgz: Upgraded to slackpkg-2.07-noarch-5.<br> Thanks to Piter Punk.<br></blockquote></pre></description>
1587 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155604855</guid>
1588 <pubDate>Tue, 15 Aug 2006 01:20:55 +0000</pubDate>
1589 </item>
1590 <item>
1591 <title>1 update</title>
1592 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155522210</link>
1593 <description><pre><blockquote>Mon Aug 14 02:23:30 CDT 2006<br>There are still a few changes yet to happen, but let's call this <br> Slackware 11.0 release candidate 1. :-)<br>a/glibc-solibs-2.3.6-i486-4.tgz: Recompiled.<br>a/glibc-zoneinfo-2.3.6-noarch-4.tgz: Updated to tzcode2006i and tzdata2006g.<br>a/kernel-ide-2.4.33-i486-1.tgz: Upgraded to Linux 2.4.33 bare.i kernel.<br>a/kernel-modules-2.4.33-i486-1.tgz: Upgraded to Linux 2.4.33 kernel modules.<br>a/udev-097-i486-1.tgz: Upgraded to udev-097.<br> Updated the rc.optical-symlinks script.<br> Added locking to cdrom-symlinks.sh and nethelper.sh scripts to avoid race<br> conditions at boot time. Thanks to Piter Punk.<br> Fixed bugs in rc.udev where the script attempts to mount devpts and usbfs<br> even if they are already mounted. Thanks to Gunnar Florus Johansen.<br>d/kernel-headers-2.4.33-i386-1.tgz: Upgraded to Linux 2.4.33 kernel headers.<br>k/kernel-source-2.4.33-noarch-1.tgz: Upgraded to Linux 2.4.33 kernel source.<br>l/alsa-driver-1.0.11_2.4.33-i486-1.tgz: Upgraded to alsa-driver compiled<br> for Linux 2.4.33.<br>l/glibc-2.3.6-i486-4.tgz: Recompiled against Linux 2.4.33 and 2.6.16.27<br> kernel headers.<br>l/glibc-profile-2.3.6-i486-4.tgz: Recompiled.<br>l/jre-1_5_0_08-i586-1.tgz: Upgraded to Java(TM) 2 Platform Standard Edition<br>n/tcpip-0.17-i486-38.tgz: Upgraded to ethtool-4.<br>extra/jdk-1.5.0_08/jdk-1_5_0_08-i586-1.tgz: Upgraded to Java(TM) 2<br>bootdisks/*: Upgraded to Linux 2.4.33 kernels.<br>isolinux/initrd.img: Upgraded USB/IEEE1394 modules to Linux 2.4.33.<br>isolinux/network.dsk: Upgraded network modules to Linux 2.4.33.<br>isolinux/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.33.<br>kernels/*: Upgraded 2.4.x kernels to Linux 2.4.33 kernels.<br>rootdisks/install.1: Upgraded USB/IEEE1394 modules to Linux 2.4.33.<br>rootdisks/install.2: Upgraded USB/IEEE1394 modules to Linux 2.4.33.<br>rootdisks/install.zip: Upgraded USB/IEEE1394 modules to Linux 2.4.33.<br>rootdisks/network.dsk: Upgraded network modules to Linux 2.4.33.<br>rootdisks/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.33.<br>l/glibc-i18n-2.3.6-noarch-4.tgz: Rebuilt.<br> Runtime Environment Version 5.0, Release 8.<br> Upgraded to tftp-0.42.<br> Relinked /bin/ftp with correct libreadline. Thanks to Udo A. Steinberg.<br> Platform Standard Edition Development Kit Version 5.0, Release 8.<br></blockquote></pre></description>
1594 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155522210</guid>
1595 <pubDate>Mon, 14 Aug 2006 02:23:30 +0000</pubDate>
1596 </item>
1597 <item>
1598 <title></title>
1599 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155345257</link>
1600 <description><pre><blockquote>Sat Aug 12 01:14:17 CDT 2006<br>a/hotplug-2004_09_23-noarch-9.tgz: Skip rc.hotplug if a new enough udev<br> is running on a 2.6 kernel. No wonder the boot time didn't seem faster! :-)<br>a/sysvinit-2.84-i486-62.tgz: If udev hasn't made /dev/cdrom and other symlinks,<br> call a script from rc.M to make them.<br> Added support to rc.K and rc.6 for an /etc/rc.d/rc.local_shutdown script.<br> Thanks to Robert Boucher for the idea.<br> Rob McGee and others have made similar requests before... thanks to all!<br>a/udev-096-i486-4.tgz: Generate network card naming rules in<br> /etc/udev/rules.d/network-devices.rules, but comment them out. I think<br> these additions are not quite reliable enough in all cases to be the default<br> for the Slackware 11 release (of course, you have udev occasionally detecting<br> multiple network cards in a different order, and so on some router machines<br> these rules will be needed). Or, you could run a 2.4.x kernel. ;-)<br> If your system is naming network devices strangely you should delete your<br> existing /etc/udev/rules.d/network-devices.rules and reboot. If that doesn't<br> do the trick you'll probably need to edit the file.<br> Instead of having udev make the CD/DVD symlinks, have a new script called<br> /lib/udev/rc.optical-symlinks do it. If you'd rather use Piter Punk's method<br> (which works better for hotplugging USB optical drives, for example), then<br> just comment/uncomment the appropriate rules in /etc/udev/rules.d/udev.rules.<br>n/whois-4.7.15-i486-1.tgz: Upgraded to whois-4.7.15.<br> Thanks to Gianluca Varisco for pointing out the new release.<br>xap/gimp-2.2.12-i486-2.tgz: Fixed broken gimptool man page symlink.<br></blockquote></pre></description>
1601 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155345257</guid>
1602 <pubDate>Sat, 12 Aug 2006 01:14:17 +0000</pubDate>
1603 </item>
1604 <item>
1605 <title>1 update</title>
1606 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155266298</link>
1607 <description><pre><blockquote>Fri Aug 11 03:18:18 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-7.tgz: Fixed libmm perms and location.<br> Thanks to Fred Emmott.<br> Upgraded libmm to 1.4.1.<br> Reverted to CUPS libraries from 1.1.23.<br>a/cups-1.1.23-i486-3.tgz: Reverted to cups-1.1.23 due to some applications<br> needing time to adjust to no longer having access to the private CUPS<br> functions. ;-) See below for more info.<br>a/etc-5.1-noarch-13.tgz: Upgraded /etc/services to include IPP (for CUPS) and<br> other new services. Thanks to Christophe Legras for reminding me to upgrade<br> this file, and to Two Beans for mailing me a more recent copy.<br>l/hicolor-icon-theme-0.9-noarch-2.tgz: Fixed slack-desc typo.<br> Reported by Willy Sudiarto Raharjo.<br>l/mm-1.4.1-i486-1.tgz: Upgraded to mm-1.4.1.<br> Looks like libmm was split out of the Apache package just in time. ;-)<br>n/samba-3.0.23b-i486-2.tgz: Recompiled against CUPS 1.1.23.<br>n/sendmail-8.13.8-i486-2.tgz: Recompiled with DBROKEN_PTHREAD_SLEEP defined<br> in site.config.m4, which fixes a problem with libmilter.a that can cause<br> sendmail milters to be unstable. Thanks to Jan Rafaj for reporting this<br> bug, the fix, and for testing the problem so throughly.<br>n/tcpip-0.17-i486-37.tgz: Removed redundant copy of /etc/services.<br>testing/packages/cups-1.2.2/cups-1.2.2-i486-1.tgz: It seems as if KDE might<br>n/sendmail-cf-8.13.8-noarch-2.tgz: Rebuilt.<br> still not be 100% ready for CUPS 1.2.x, so we're going to move this into<br> /testing again for the release, but by all means use it if it works for you.<br> It did mostly work here, but the problems with using it with KDE are also<br> reproducable. Thanks to Thomas Hansl�k for the information. Anyway, I had<br> my suspicions that *something* was going to have linked with private CUPS<br> functions or that this might break something in some way, but I also knew<br> this package would get better testing in slackware/a than in /testing. :-)<br> So, now we know that it's probably safer to wait on cups-1.2.x.<br> Thomas also mentioned a workaround -- editing cupsd.conf to comment<br> out this line:<br> # Listen /var/run/cups/cups.sock<br></blockquote></pre></description>
1608 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155266298</guid>
1609 <pubDate>Fri, 11 Aug 2006 03:18:18 +0000</pubDate>
1610 </item>
1611 <item>
1612 <title></title>
1613 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155175630</link>
1614 <description><pre><blockquote>Thu Aug 10 02:07:10 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-6.tgz: Added libmm.<br>a/pkgtools-11.0.0-i486-1.tgz: Fixed xwmconfig to only recommend installed<br> window managers. Thanks to Leandro Toledo.<br>Merged in patches for xorgsetup to support choosing a keyboard model, layout,<br> variant, and even automatically configuring a mouse scroll wheel! :-)<br> Thanks to Ismael Cortes for the patches.<br>l/gnome-icon-theme-2.14.2-noarch-1.tgz: Added gnome-icon-theme-2.14.2. It<br> seems that GTK+ applications such as Thunderbird use these, not just GNOME. <br>l/gtk+2-2.8.20-i486-1.tgz: Upgraded to gtk+-2.8.20.<br>l/hicolor-icon-theme-0.9-noarch-1.tgz: Added hicolor-icon-theme-0.9.<br>l/mm-1.4.0-i486-1.tgz: Moved mm library out of the Apache package so that apps<br> such as the standalone PHP interpreter can use it without installing Apache.<br> Thanks to Robert Easter for the suggestion.<br>l/shared-mime-info-0.18-i486-1.tgz: Upgraded to shared-mime-info-0.18.<br>n/apache-1.3.37-i486-2.tgz: Removed mm-1.4.0 from the build directory and<br> recompiled against the system mm package. This now depends on having the<br> mm package from the L series installed.<br>n/lftp-3.5.4-i486-1.tgz: Upgraded to lftp-3.5.4.<br>n/sendmail-8.13.8-i486-1.tgz: Upgraded to sendmail-8.13.8.<br> That's what I get for trying to patch 8.13.7 myself last night. ;-)<br>n/sendmail-cf-8.13.8-noarch-1.tgz: Upgraded to sendmail-8.13.8 configs.<br>x/x11-6.9.0-i486-8.tgz: More updates to the i945gm chipset support.<br> Thanks to Sergio A. Reyes-Peniche.<br>x/x11-devel-6.9.0-i486-8.tgz: Recompiled and removed fontconfig manpages.<br>x/x11-xdmx-6.9.0-i486-8.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-8.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-8.tgz: Recompiled.<br>xap/sane-1.0.18-i486-2.tgz: Added /etc/udev/rules.d/libsane.rules.<br> Thanks to David Somero for pointing out this file.<br>isolinux/initrd.img: Merged in many installer patches from Stuart Winter.<br>pasture/: Some cleanup...<br>rootdisks/install.1: Rebuilt with installer patches.<br>rootdisks/install.2: Rebuilt with installer patches.<br>rootdisks/install.zip: Rebuilt with installer patches.<br>rootdisks/network.dsk: Rebuilt with gcc-3.4.6 compiled modules.<br>rootdisks/pcmcia.dsk: Rebuilt with gcc-3.4.6 compiled modules.<br>testing/packages/php-5.1.4/php-5.1.4-i486-3.tgz: Recompiled with freetype.<br> Fixed FastCGI by removing --enable-discard-path from CGI version.<br> Added pdo_sqlite.so and sqlite.so modules.<br></blockquote></pre></description>
1615 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155175630</guid>
1616 <pubDate>Thu, 10 Aug 2006 02:07:10 +0000</pubDate>
1617 </item>
1618 <item>
1619 <title>1 update</title>
1620 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155083153</link>
1621 <description><pre><blockquote>Wed Aug 9 00:25:53 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-5.tgz: Added new CUPS libraries.<br>a/cups-1.2.2-i486-1.tgz: Upgraded to cups-1.2.2.<br>a/hdparm-6.6-i486-1.tgz: Upgraded to hdparm-6.6.<br> Suggested by Janusz Dziemidowicz.<br>a/udev-096-i486-3.tgz: In /etc/modprobe.d/blacklist, change module name from<br> i810_tco to i8xx_tco. Thanks to Janusz Dziemidowicz.<br> Piter Punk also wants me to remind everyone that this udev package requires<br> a 2.6.15+ kernel or it will not work. ;-)<br>ap/mc-4.6.1-i486-2.tgz: Fixed PHP syntax highlighting.<br> Thanks to Georgi Chorbadzhiyski for the patch.<br>n/samba-3.0.23b-i486-1.tgz: Upgraded to samba-3.0.23b.<br>n/sendmail-8.13.7-i486-2.tgz: Applied two errata patches from sendmail.org.<br> Thanks to Gerardo Exequiel Pozzi for pointing out these patches.<br>x/x11-6.9.0-i486-7.tgz: More updates to the i945gm chipset support.<br>x/x11-devel-6.9.0-i486-7.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-7.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-7.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-7.tgz: Recompiled.<br>n/sendmail-cf-8.13.7-noarch-2.tgz: Rebuilt.<br> Thanks to Rapha�l Prevost for the updated patch.<br></blockquote></pre></description>
1622 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1155083153</guid>
1623 <pubDate>Wed, 09 Aug 2006 00:25:53 +0000</pubDate>
1624 </item>
1625 <item>
1626 <title></title>
1627 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154998552</link>
1628 <description><pre><blockquote>Tue Aug 8 00:55:52 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-4.tgz: Added new version of libcurl.<br>a/etc-5.1-noarch-12.tgz: Patched /etc/profile and /etc/csh.login to fix a bug<br> where changing to another user with "su - someuser" would produce an error<br> message such as "/dev/pts/2: Operation not permitted".<br> Thanks to Menno Duursma for the fix.<br>a/findutils-4.2.28-i486-1.tgz: Upgraded to findutils-4.2.28.<br>a/gawk-3.1.5-i486-3.tgz: Patched a fieldwidths bug.<br> Thanks to Fabiano Caixeta Duarte for a pointer to the patch.<br>a/lilo-22.7.1-i486-2.tgz: Fixed a typo in liloconfig where installing to the<br> MBR was mentioned twice. Thanks to Keith McGavin for pointing this out.<br>a/udev-096-i486-2.tgz: Added the psmouse module to /etc/modprobe.d/blacklist<br> so that /etc/rc.d/rc.modules can load it using the option "proto=imps".<br> This change restores the mouse options used in Slackware 10.2. At least on<br> my machine, the default module options render the mouse completely unusable,<br> but feel free to remove the module from the blacklist or configure rc.modules<br> to your liking if this is not the ideal default for your machine. <br>ap/mdadm-2.5.3-i486-1.tgz: Upgraded to mdadm-2.5.3.<br> Thanks to James W. Laferriere and Gianluca Varisco for pointing this out.<br>kde/kdebase-3.5.4-i486-3.tgz: Patched a bug involving external taskbars that<br> expand as required to fit contents. Thanks to Dirk Mueller for the patch.<br>n/curl-7.15.5-i486-1.tgz: Upgraded to curl-7.15.5.<br> Thanks to Gianluca Varisco for suggesting this upgrade.<br>n/dnsmasq-2.33-i486-1.tgz: Upgraded to dnsmasq-2.33.<br> Thanks to Gianluca Varisco for suggesting this upgrade.<br>n/ncftp-3.2.0-i486-2.tgz: Fixed permissions in /usr/bin.<br> Thanks to many who noticed this mistake. ;-)<br>n/ntp-4.2.2p3-i486-1.tgz: Upgraded to ntp-4.2.2p3.<br> Thanks to James W. Laferriere for suggesting this upgrade.<br>x/x11-6.9.0-i486-6.tgz: Added support for newer revisions of the<br> i945gm chipset. Thanks to Rapha�l Prevost for the patch.<br>x/x11-devel-6.9.0-i486-6.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-6.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-6.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-6.tgz: Recompiled.<br>There are a few reports that the newest udev is not friendly to some systems.<br>Well, that's progress for you -- it isn't always a smooth journey. In most<br>cases the problems I've heard about could be fixed with a little bit of fine<br>tuning, such as blacklisting unwanted modules in /etc/modprobe.d/blacklist<br>and loading the desired replacements in /etc/rc.d/rc.modules. However, in<br>case either of these older versions of udev worked better for you, they'll<br>be kept in /extra for a while as alternates. Be aware that new kernels will<br>soon require the latest udev, though...<br>extra/udev-alternate-versions/udev-064-i486-2.tgz: Added alternate udev-064.<br>extra/udev-alternate-versions/udev-071-i486-2.tgz: Added alternate udev-071.<br>testing/packages/linux-2.6.17.8/kernel-generic-2.6.17.8-i486-1.tgz:<br> Upgraded to Linux 2.6.17.8 generic kernel.<br>testing/packages/linux-2.6.17.8/kernel-headers-2.6.17.8-i386-1.tgz:<br> Upgraded to Linux 2.6.17.8 kernel headers.<br>testing/packages/linux-2.6.17.8/kernel-modules-2.6.17.8-i486-1.tgz<br> Upgraded to Linux 2.6.17.8 kernel modules.<br>testing/packages/linux-2.6.17.8/kernel-source-2.6.17.8-noarch-1.tgz<br> Upgraded to Linux 2.6.17.8 kernel source.<br> Thanks again to Andrea Volkerding for building the 2.6.17.8 kernels.<br></blockquote></pre></description>
1629 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154998552</guid>
1630 <pubDate>Tue, 08 Aug 2006 00:55:52 +0000</pubDate>
1631 </item>
1632 <item>
1633 <title></title>
1634 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154915018</link>
1635 <description><pre><blockquote>Mon Aug 7 01:43:38 CDT 2006<br>a/pcmciautils-014-i486-1.tgz: Added pcmciautils-014, needed to configure PC<br> cards on systems running 2.6.x kernels.<br>a/sysfsutils-2.0.0-i486-2.tgz: Added missing libsysfs.so symlink.<br>a/sysvinit-2.84-i486-61.tgz: Merged Piter Punk's changes for the new udev.<br> Please make sure to move all the .new files in /etc/rc.d/ into place for<br> this to work correctly!<br>a/udev-096-i486-1.tgz: Upgraded to udev-096.<br> Thanks to Piter Punk for his great work to get this just exactly perfect.<br>a/grep-2.5-i486-3.tgz: Improved build script and rebuilt. I considered using<br> grep-2.5.1a, but found some problem reports concerning it and decided such<br> an upgrade would be best left for the next -current. There have been no<br> bug reports here concerning grep-2.5, so I see no reason to fix that which<br> does not appear to be broken. It's more important to have a known to be<br> stable grep than it is to have the latest version, IMHO.<br>a/pciutils-2.2.3-i486-2.tgz: Fixed missing pci/types.h header file.<br> Thanks to Konrad Rzepecki.<br>ap/man-pages-2.39-noarch-1.tgz: Upgraded to man-pages-2.39.<br>n/lftp-3.5.3-i486-1.tgz: Upgraded to lftp-3.5.3.<br>n/ncftp-3.2.0-i486-1.tgz: Upgraded to ncftp-3.2.0.<br>n/popa3d-1.0.2-i486-1.tgz: Upgraded to popa3d-1.0.2.<br>n/vsftpd-2.0.5-i486-1.tgz: Upgraded to vsftpd-2.0.5.<br>xap/imagemagick-6.2.8_8-i486-1.tgz: Upgraded to ImageMagick-6.2.8-8.<br>xap/sane-1.0.18-i486-1.tgz: Upgraded to sane-backends-1.0.18.<br>extra/grub/grub-0.97-i486-2.tgz: Upgraded to grubconfig-1.28.<br></blockquote></pre></description>
1636 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154915018</guid>
1637 <pubDate>Mon, 07 Aug 2006 01:43:38 +0000</pubDate>
1638 </item>
1639 <item>
1640 <title></title>
1641 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154820133</link>
1642 <description><pre><blockquote>Sat Aug 5 23:22:13 CDT 2006<br>a/usbutils-0.72-i486-1.tgz: Upgraded to usbutils-0.72, patched to add<br> back usbmodules since hotplug will need it for as long as the 2.4.x<br> kernel is supported.<br>ap/mdadm-2.5.2-i486-1.tgz: Upgraded to mdadm-2.5.2.<br>ap/mysql-5.0.24-i486-1.tgz: Upgraded to mysql-5.0.24.<br> Suggested by Willy Sudiarto Raharjo.<br>l/lesstif-0.95.0-i486-1.tgz: Upgraded to lesstif-0.95.0.<br> Suggested by Rene Huber.<br>xap/xpdf-3.01-i486-4.tgz: Fixed a window resizing bug.<br> Thanks to Luis for the patch.<br></blockquote></pre></description>
1643 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154820133</guid>
1644 <pubDate>Sat, 05 Aug 2006 23:22:13 +0000</pubDate>
1645 </item>
1646 <item>
1647 <title></title>
1648 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154738529</link>
1649 <description><pre><blockquote>Sat Aug 5 00:42:09 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-3.tgz: Added new versions of libattr and libacl.<br> Added lib/libsysfs.so.2.0.0.<br>a/acl-2.2.39_1-i486-1.tgz: Upgraded to acl-2.2.39-1.<br>a/attr-2.4.32_1-i486-1.tgz: Upgraded to attr-2.4.32-1.<br>a/pciutils-2.2.3-i486-1.tgz: Upgraded to pciutils-2.2.3.<br> Thanks to Eric Hameleers for the encouragement. :-)<br>a/pcmcia-cs-3.2.8-i486-2.tgz: Patched /etc/rc.d/rc.pcmcia to work with either<br> pcmcia-cs or pcmciautils.<br>a/sysfsutils-2.0.0-i486-1.tgz: Added sysfsutils-2.0.0.<br> Thanks to Piter Punk.<br>a/xfsprogs-2.8.10_1-i486-1.tgz: Upgraded to xfsprogs-2.8.10-1.<br> Thanks to Marco Berizzi for pointing out the new XFS programs.<br>ap/alsa-utils-1.0.11-i486-2.tgz: Fixed uncompressed manpage. Thanks to Seb.<br>ap/dmapi-2.2.5_1-i486-1.tgz: Upgraded to dmapi-2.2.5-1.<br>ap/xfsdump-2.2.38_1-i486-1.tgz: Upgraded to xfsdump-2.2.38-1.<br>kde/kdebase-3.5.4-i486-2.tgz: Patched to fix video redirects in Konqueror.<br> Thanks to Fr�d�ric L. W. Meunier for the bug report and patch link.<br>l/freetype-2.1.9-i486-1.tgz: Moved from the X to the L series.<br> This makes more sense because freetype does not depend on any X11 libraries,<br> and because PHP has now been built linked to libfreetype.<br>l/libusb-0.1.12-i486-1.tgz: Upgraded to libusb-0.1.12.<br> Thanks to Gunnar Florus Johansen and CJ Johnson for the recommendation.<br>n/links-2.1pre23-i486-1.tgz: Upgraded to links-2.1pre23.<br>n/php-4.4.3-i486-1.tgz: Upgraded to php-4.4.3.<br> From the announcement of the release:<br> The security issues resolved include the following:<br> * Disallow certain characters in session names.<br> * Fixed a buffer overflow inside the wordwrap() function.<br> * Prevent jumps to parent directory via the 2nd parameter of the<br> tempnam() function.<br> * Improved safe_mode check for the error_log() function.<br> * Fixed cross-site scripting inside the phpinfo() function.<br> The PHP 4.4.3 release announcement may be found on their web site:<br> http://www.php.net<br> NOTE: Slackware's PHP package now requires the freetype library.<br> (* Security fix *)<br>xap/xchat-2.6.6-i486-2.tgz: Patched to fix Finnish translation errors.<br> Thanks to C Johnson for pointing out that there was a new official patch.<br>extra/linux-2.6.16.27/kernel-modules-2.6.16.27-i486-4.tgz:<br> Fixed 2.4 kernel detection for loading the apm module.<br>testing/packages/linux-2.6.17.7/kernel-modules-2.6.17.7-i486-3.tgz:<br> Fixed 2.4 kernel detection for loading the apm module.<br></blockquote></pre></description>
1650 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154738529</guid>
1651 <pubDate>Sat, 05 Aug 2006 00:42:09 +0000</pubDate>
1652 </item>
1653 <item>
1654 <title></title>
1655 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154659014</link>
1656 <description><pre><blockquote>Fri Aug 4 02:36:54 CDT 2006<br>xap/mozilla-firefox-1.5.0.6-i686-1.tgz: Upgraded to firefox-1.5.0.6.<br>xap/seamonkey-1.0.4-i486-1.tgz: Upgraded to seamonkey-1.0.4.<br></blockquote></pre></description>
1657 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154659014</guid>
1658 <pubDate>Fri, 04 Aug 2006 02:36:54 +0000</pubDate>
1659 </item>
1660 <item>
1661 <title></title>
1662 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154568403</link>
1663 <description><pre><blockquote>Thu Aug 3 01:26:43 CDT 2006<br>a/gettext-0.15-i486-1.tgz: Upgraded to gettext-0.15.<br> Thanks to steveo for noticing that this was missing from the ChangeLog.<br>a/lilo-22.7.1-i486-1.tgz: Reverted to lilo-22.7.1 after reports from Aaron Lee<br> and Philip Langdale that versions 22.7.2+ skip the boot menu on some machines.<br>a/sysvinit-2.84-i486-60.tgz: Fixed rc.S to use /etc/rc.d/rc.modules.local<br> properly. Bug reported by Dieter Rauschenberger, Ricardo Garc�a, and Luis.<br> Use "/bin/sh" not "." to start rc.modules.local in case someone uses "exit".<br> Merged more LVM changes from Cal Peake in rc.S and rc.M, including removing<br> many uses of "sleep", so if anyone needed those let me know.<br>ap/at-3.1.10-i486-1.tgz: Upgraded to at-3.1.10. Added missing at_allow.5<br> manpage. Thanks to James Michael Fultz.<br>ap/cdparanoia-IIIalpha9.8-i486-2.tgz: Patched to compile with gcc-3.4.6, and<br> added a batch to the build directory for later that will use the 2.6.x<br> kernel's SG_IO ioctl. Thanks to Bradley Reed.<br>d/gettext-tools-0.15-i486-1.tgz: Upgraded to gettext-tools-0.15.<br> Thanks to steveo for noticing that this was missing from the ChangeLog.<br>l/arts-1.5.4-i486-1.tgz: Upgraded to arts-1.5.4.<br>kde/*: Upgraded to KDE 3.5.4. I know I told at least a few people that I<br> wasn't planning on including this in Slackware 11.0 at the last minute,<br> and there have been a couple of patches needed for it already.<br> Please test quickly. :-)<br>kdei/kde-i18n*: Upgraded kde-i18n packages for KDE 3.5.4.<br>n/dnsmasq-2.32-i486-2.tgz: Rebuilt after build script fixes from Fred Emmott<br> (moving the chown -R), and some more from me. Strangely, none of these<br> fixes seemed to make any difference in the package that was output,<br> but trust me, the build script is much better now. :-)<br>n/gnupg-1.4.5-i486-1.tgz: Upgraded to gnupg-1.4.5.<br> From the gnupg-1.4.5 NEWS file:<br> * Fixed 2 more possible memory allocation attacks. They are<br> similar to the problem we fixed with 1.4.4. This bug can easily<br> be be exploited for a DoS; remote code execution is not entirely<br> impossible.<br> (* Security fix *)<br></blockquote></pre></description>
1664 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154568403</guid>
1665 <pubDate>Thu, 03 Aug 2006 01:26:43 +0000</pubDate>
1666 </item>
1667 <item>
1668 <title></title>
1669 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154459092</link>
1670 <description><pre><blockquote>Tue Aug 1 19:04:52 CDT 2006<br>a/sysvinit-2.84-i486-59.tgz: In rc.S, give first priority to<br> "rc.modules.local" if it exists.<br> Try to shut down OpenLDAP in rc.6. Thanks to Ricardson Williams.<br> Merged some more LVM fixes into rc.6. Thanks to Cal Peake.<br>d/autoconf-2.60-noarch-1.tgz: Upgraded to autoconf-2.60.<br>kde/qca-tls-1.0-i486-2.tgz: Use the actual Qt installation path and not the<br> /usr/lib/qt symlink or the qca-tls module will be erased if the Qt package<br> is installed after this one (as happens in a new installation).<br> Thanks to Richard Fuller for the bug report.<br>extra/checkinstall/checkinstall-1.6.0-i486-1.tgz:<br> Upgraded to checkinstall-1.6.0.<br>testing/packages/lvm2/device-mapper-1.02.08-i486-1.tgz:<br> Upgraded to device-mapper.1.02.08.<br>testing/packages/lvm2/lvm2-2.02.07-i486-1.tgz: Upgraded to LVM2.2.02.07. <br></blockquote></pre></description>
1671 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154459092</guid>
1672 <pubDate>Tue, 01 Aug 2006 19:04:52 +0000</pubDate>
1673 </item>
1674 <item>
1675 <title></title>
1676 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154394671</link>
1677 <description><pre><blockquote>Tue Aug 1 01:11:11 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-2.tgz: Added /usr/lib/libslang.so.2.0.6.<br>a/bin-11.0-i486-3.tgz: Removed /sbin/rescan-scsi-bus, which is better packaged<br> along with the /etc/rc.d/rc.scanluns script in the sysvinit package.<br>a/sysvinit-2.84-i486-58.tgz: Added symlinks for lastb. Make the install<br> script create /var/log/btmp if it doesn't already exist.<br> Thanks to Menno Duursma, Tomas Matejicek, and Gerardo Exequiel Pozzi.<br> Upgraded to the latest rescan-scsi-bus script.<br> Thanks to Mircea Baciu for pointing it out.<br> Use "tac" to deactivate LVM partitions in reverse order.<br> Thanks to Luigi Genoni.<br> Make sure usbfs gets mounted if it's in the kernel but hotplug is not used.<br> Thanks to Cal Peake.<br> If rc.M sees an executable rc.openldap, start it.<br> Thanks to Christopher Linnet.<br> In rc.scanluns, show the command that's being executed.<br>ap/jed-0.99_18-i486-3.tgz: Relinked against libslang.so.2.0.6. This does<br> seem to be the path of least resistance. :-)<br>d/subversion-1.3.2-i486-3.tgz: Rebuilt to fix wrong file ownerships in the<br> book included in the documentation. Thanks to Philip Lyons.<br>kde/kdenetwork-3.5.3-i486-3a.tgz: Patched for ICQ protocol changes.<br>kde/qca-1.0-i486-1.tgz: Added qca-1.0.<br>kde/qca-tls-1.0-i486-1.tgz: Added qca-tls-1.0. This and the qca package are<br> needed to support SSL connections with the Jabber(R) protocol in Kopete.<br> Thanks to Eric Hameleers, Markus Stauffer, and "--==HITMAN==--" for<br> suggesting the addition of these QCA packages.<br>l/atk-1.10.3-i486-2.tgz: Fixed slack-desc typo. Thanks to Nick Chorley.<br>l/slang-2.0.6-i486-1.tgz: Added slang-2.0.6.<br>l/slang1-1.4.9-i486-1.tgz: Renamed from slang-1.4.9-i486-1.tgz.<br>n/irssi-0.8.10a-i486-3.tgz: Fixed some strange directory permissions in the<br> documentation directory. Thanks to J.<br>tcl/tcl-8.4.13-i486-2.tgz: Added /usr/include/tcl-private/{generic,unix}<br> headers. Thanks to Sergio Luis for recommending this, as there are some<br> sources out there that require these header files.<br></blockquote></pre></description>
1678 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154394671</guid>
1679 <pubDate>Tue, 01 Aug 2006 01:11:11 +0000</pubDate>
1680 </item>
1681 <item>
1682 <title></title>
1683 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154286998</link>
1684 <description><pre><blockquote>Sun Jul 30 19:16:38 CDT 2006<br>n/samba-3.0.23a-i486-2.tgz: Fixed bad symlink to "using_samba" in the docs.<br> Thanks to Valentin Avram and William Hunt for reporting this.<br>ap/jed-0.99_18-i486-2.tgz: Reverted to isearch.sl from jed-0.99_16.<br> The version shipped in 0.99_18 seems to have problems unless jed is linked<br> with slang-2, which we're putting off for a little while due to the major<br> version bump and to let code that uses slang have a little time to catch up.<br> Thanks to Luigi Genoni for the bug report and fix.<br> Thanks as well to Petri Kaukasoina who also reported the problem.<br>ap/mysql-5.0.22-i486-2.tgz: Reverted to MySQL-5.0.22. Evidently MySQL-5.0.23<br> was never officially released due to bugs, but made it to the mirror sites<br> anyway. Beat Vontobel's web site has some additional information about this:<br> http://www.futhark.ch/mysql/148.html<br> Thanks very much to Jakub Jankowski telling me the deal about 5.0.23.<br>ap/vim-7.0.042-i486-2.tgz: Upgraded to ctags-5.6.<br> Thanks to Michael Iatrou for pointing out the new ctags.<br> Fixed a bug in the build script's patchlevel determination if $CWD contains<br> a dot. Thanks to Christophe Legras for the bug report and fix.<br>xap/vim-gvim-7.0.042-i486-2.tgz: Rebuilt. Fixed a bug in the build script's<br> patchlevel determination. Thanks to Christophe Legras.<br> Fixed an undefined variable in the vim-gvim build script.<br> Thanks to Bryan Germann.<br></blockquote></pre></description>
1685 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154286998</guid>
1686 <pubDate>Sun, 30 Jul 2006 19:16:38 +0000</pubDate>
1687 </item>
1688 <item>
1689 <title></title>
1690 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154221556</link>
1691 <description><pre><blockquote>Sun Jul 30 01:05:56 CDT 2006<br>a/devs-2.3.1-noarch-23.tgz: Fixed /dev/usb/scanner* group.<br> Thanks to Niels Kristian Bech Jensen.<br> Added /dev/fuse device. Thanks to Piter Punk.<br> Added /dev/mapper/control device.<br>a/kernel-modules-2.4.32-i486-5.tgz: Applied a patch to fix the X11 direct<br> rendering support for X.Org versions 6.9.0 and newer.<br> Thanks to Marin Mitov.<br> Specify the kernel version in the install script's depmod.<br> Thanks to Piter Punk.<br>ap/mysql-5.0.23-i486-1.tgz: Upgraded to mysql-5.0.23.<br> Suggested by Willy Sudiarto Raharjo.<br>d/oprofile-0.9.1-i486-2.tgz: Recompiled with gcc-3.4.6.<br> Thanks to Sunil Amitkumar Janki for pointing out that this was the last<br> package in Slackware still linked to libstdc++.so.5.<br>d/subversion-1.3.2-i486-2.tgz: Recompiled against the new apr and apr-util<br> packages. See below for details.<br>k/kernel-source-2.4.32-noarch-2.tgz: Applied a patch to fix the X11 direct<br> rendering support for X.Org versions 6.9.0 and newer.<br> Thanks to Marin Mitov.<br>l/alsa-driver-1.0.11_2.4.32-i486-3.tgz: Specify the kernel version in the<br> install script's depmod. Thanks to Piter Punk.<br>l/apr-1.2.7-i486-1.tgz: Added apr-1.2.7. This is needed by subversion and<br> other projects like Apache2. Thanks to Eugene Crosser for the suggestion<br> and detailed rationale behind not using the apr/apr-util in subversion.<br>l/apr-util-1.2.7-i486-1.tgz: Added apr-util-1.2.7.<br> This is needed by subversion and other projects.<br>n/bind-9.3.2-i486-4.tgz: Recompiled with --enable-threads.<br> Thanks to Marin Mitov for the suggestion.<br>xap/gxine-0.5.7-i486-1.tgz: Upgraded to gxine-0.5.7.<br>xap/imagemagick-6.2.8_7-i486-1.tgz: Upgraded to ImageMagick-6.2.8-7.<br>bootdisks/*: Prepped bootdisk version numbers.<br>extra/linux-2.6.16.27/alsa-driver-1.0.11_2.6.16.27-i486-2.tgz: Specify the<br> kernel version in the install script's depmod. Thanks to Piter Punk.<br>extra/linux-2.6.16.27/kernel-modules-2.6.16.27-i486-3.tgz: Specify the<br> kernel version in the install script's depmod. Thanks to Piter Punk.<br>extra/slackpkg/slackpkg-2.06-noarch-1.tgz: Upgraded to slackpkg-2.06-noarch-1.<br> Thanks to Piter Punk.<br>testing/packages/linux-2.6.17.7/kernel-modules-2.6.17.7-i486-2.tgz: Specify<br> the kernel version in the install script's depmod. Thanks to Piter Punk.<br></blockquote></pre></description>
1692 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154221556</guid>
1693 <pubDate>Sun, 30 Jul 2006 01:05:56 +0000</pubDate>
1694 </item>
1695 <item>
1696 <title></title>
1697 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154107974</link>
1698 <description><pre><blockquote>Fri Jul 28 17:32:54 CDT 2006<br>n/apache-1.3.37-i486-1.tgz: Upgraded to apache-1.3.37.<br> From the announcement on httpd.apache.org:<br> This version of Apache is security fix release only. An off-by-one flaw<br> exists in the Rewrite module, mod_rewrite, as shipped with Apache 1.3<br> since 1.3.28, 2.0 since 2.0.46, and 2.2 since 2.2.0.<br> The Slackware Security Team feels that the vast majority of installations<br> will not be configured in a vulnerable way but still suggests upgrading to<br> the new apache and mod_ssl packages for maximum security.<br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747<br> And see Apache's announcement here:<br> http://www.apache.org/dist/httpd/Announcement1.3.html<br> (* Security fix *)<br>n/mod_ssl-2.8.28_1.3.37-i486-1.tgz: Upgraded to mod_ssl-2.8.28-1.3.37.<br></blockquote></pre></description>
1699 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154107974</guid>
1700 <pubDate>Fri, 28 Jul 2006 17:32:54 +0000</pubDate>
1701 </item>
1702 <item>
1703 <title></title>
1704 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154053690</link>
1705 <description><pre><blockquote>Fri Jul 28 02:28:10 CDT 2006<br>a/bin-11.0-i486-2.tgz: Updated rescan-scsi-bus for 2.6 kernel compatibility.<br> Upgraded to eject-2.1.5.<br></blockquote></pre></description>
1706 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154053690</guid>
1707 <pubDate>Fri, 28 Jul 2006 02:28:10 +0000</pubDate>
1708 </item>
1709 <item>
1710 <title></title>
1711 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154017677</link>
1712 <description><pre><blockquote>Thu Jul 27 16:27:57 CDT 2006<br>n/nmap-4.11-i486-1.tgz: Upgraded to nmap-4.11.<br> Suggested by Willy Sudiarto Raharjo.<br>xap/mozilla-firefox-1.5.0.5-i686-1.tgz: Upgraded to firefox-1.5.0.5.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>xap/mozilla-thunderbird-1.5.0.5-i686-1.tgz: Upgraded to thunderbird-1.5.0.5.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>xap/seamonkey-1.0.3-i486-1.tgz: Upgraded to seamonkey-1.0.3.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br></blockquote></pre></description>
1713 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1154017677</guid>
1714 <pubDate>Thu, 27 Jul 2006 16:27:57 +0000</pubDate>
1715 </item>
1716 <item>
1717 <title></title>
1718 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153947073</link>
1719 <description><pre><blockquote>Wed Jul 26 20:51:13 CDT 2006<br>a/aaa_elflibs-11.0.0-i486-1.tgz: Refreshed libraries, added attr and acl.<br>a/lilo-22.7.2.1-i486-2.tgz: OK, now the patch is actually applied. :-)<br> Thanks to arny -- I'm evidently too used to using "zcat" for patches.<br>a/sysvinit-2.84-i486-57.tgz: Merged the following changes:<br> Try to use a kernel specific rc.modules script if one is found.<br> Added rc.scanluns to look for devices on non-zero LUNs.<br> Shut down sshd in rc.6 so connections don't hang;<br> Thanks to Michael Iatrou and Steven Saner for reporting this issue.<br> Changed how LVM2 is deactivated in rc.6 (thanks to Cal Peake).<br> Previously there were problems since / might have already been remounted as<br> read-only before LVM2 was taken down. Now I suspect there could be problems<br> if the / is on LVM, so perhaps this is not the optimal solution...<br> Umount CIFS filesystems in rc.6 (thanks to Jef Oliver).<br> Umount NFS, SMB, and CIFS filesystems in rc.K;<br> Thanks to Drew, and to Eric Hameleers for the bug reports.<br> Fixed chown root:utmp in rc.S to use ':', not '.' (thanks to Adiel Mittmann).<br> Remove saslauthd.pid (if present) in rc.S (thanks to Andy Preston).<br> Stop saslauthd properly in rc.6 (thanks to Andy Preston).<br> Don't shut down networking in rc.6 if / is on NFS (thanks to Luca Fabbro).<br> Add a one second sleep after starting rc.udev. According to Robby Workman<br> this is just enough time for some slower devices to activate for mount.<br> Load rc.keymap in rc.K (thanks to Ignacio Bermejo).<br> Use "respawn" rather than "wait" for runlevel 4 (thanks to Wayne Marshall).<br> Don't try to mount sysfs twice in rc.S (thanks to Moo).<br>d/python-2.4.3-i486-4.tgz: Fixed build script bugs. Thanks to Fred Emmott.<br>d/ruby-1.8.4-i486-2.tgz: Recompiled with --enable-shared<br> and --enable-install-doc. Thanks to Fernando Lujan.<br>xap/fluxbox-1.0rc2-i486-1.tgz: Upgraded to fluxbox-1.0rc2.<br> Thanks to Andrew Brouwers for letting me know about this.<br>xap/xchat-2.6.6-i486-1.tgz: Upgraded to xchat-2.6.6. Thanks to CJ Johnson.<br></blockquote></pre></description>
1720 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153947073</guid>
1721 <pubDate>Wed, 26 Jul 2006 20:51:13 +0000</pubDate>
1722 </item>
1723 <item>
1724 <title>10 updates. Including a (* Security fix *)!</title>
1725 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153878938</link>
1726 <description><pre><blockquote>Wed Jul 26 01:55:38 CDT 2006<br>a/lilo-22.7.2.1-i486-1.tgz: Upgraded to lilo-22.7.2.1.<br> Thanks to James W. Laferriere for pointing out the patch.<br>a/kernel-ide-2.4.32-i486-4.tgz: Fixed gzipped System.map.<br>a/udev-071-i486-2.tgz: Applied pty patch from Ken Milmore.<br> Fixed world writable documentation permissions reported by John Jenkins after<br> a discussion about whether that was really the right course of action. ;-)<br> Merged IEEE1394 RAW device handling changes from Christian Casteyde.<br>ap/joe-3.5-i486-1.tgz: Upgraded to joe-3.5.<br>ap/vim-7.0.042-i486-1.tgz: Upgraded to the latest patchlevel.<br> Added many extra features.<br> Thanks to Ricardo Garc�a for requesting omni completion for<br> vim, which got me thinking about all kinds of ways to improve<br> this and the (renamed) vim-gvim package. :-)<br>d/clisp-2.39-i486-1.tgz: Upgraded to clisp-2.39 and libsigsegv-2.4.<br>d/git-1.4.1.1-i486-1.tgz: Upgraded to git-1.4.1.1.<br>d/m4-1.4.5-i486-1.tgz: Upgraded to m4-1.4.5.<br>d/mercurial-0.9.1-i486-1.tgz: Upgraded to mercurial-0.9.1.<br>d/python-2.4.3-i486-3.tgz: Merged the python, python-demo, and python-tools<br> packages, bloating the python package by a whopping 2%!<br>d/ruby-1.8.4-i486-1.tgz: Added Ruby since Amarok needs it...<br>kde/amarok-1.4.1-i486-1.tgz: Upgraded to amarok-1.4.1.<br>kde/kdeaccessibility-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdeaddons-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdeadmin-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdeartwork-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdebase-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdebindings-3.5.3-i486-3.tgz: Recompiled.<br> I wasn't able to get the Ruby binding to compile... sorry.<br>kde/kdeedu-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdegames-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdegraphics-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdelibs-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdemultimedia-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdenetwork-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdepim-3.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>kde/kdesdk-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdetoys-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdeutils-3.5.3-i486-3.tgz: Recompiled.<br>kde/kdevelop-3.3.3-i486-2.tgz: Recompiled.<br>kde/kdewebdev-3.5.3-i486-3.tgz: Recompiled.<br>kde/koffice-1.5.2-i486-2.tgz: Recompiled to use libpng.so.3.<br>kde/qt-3.3.6-i486-2.tgz: Recompiled with a patch by Lars Knoll to fix<br> Arabic scripts.<br>l/arts-1.5.3-i486-3.tgz: Recompiled to use libpng.so.3.<br>l/aspell-0.60.4-i486-1.tgz: Upgraded to aspell-0.60.4.<br>l/libpng-1.2.12-i486-1.tgz: Upgraded to libpng-1.2.12.<br> The libpng.so has gone .3 -> .0 -> .3. I'll see what I can do about getting<br> everything that's linked to .0 relinked with .3, as that's the major library<br> number Slackware 10.2's libpng.so is using. There is a .0 symlink to keep<br> any code that was compiled while that was the number working just fine, but<br> I will recompile a bunch of things mostly for the sake not using this link.<br> It works either way, but I have an OCD about silly things like this. ;-)<br>l/libwmf-0.2.8.4-i486-2.tgz: Recompiled to use libpng.so.3.<br>l/libmusicbrainz-2.1.3-i486-1.tgz: Upgraded to libmusicbrainz-2.1.3.<br>l/sdl-1.2.11-i486-1.tgz: Upgraded to sdl-1.2.11.<br>l/libtunepimp-0.4.2-i486-2.tgz: Patched an overflow (CVE-2006-3600).<br>n/dhcpcd-2.0.4-i486-2.tgz: Patched to move the pid/config directory back to<br>n/links-2.1pre22-i486-2.tgz: Recompiled to use libpng.so.3.<br>n/mutt-1.4.2.2i-i486-1.tgz: Upgraded to mutt-1.4.2.2i.<br>n/nfs-utils-1.0.9-i486-1.tgz: Upgraded to nfs-utils-1.0.9.<br>n/php-4.4.2-i486-5.tgz: Recompiled to use libpng.so.3.<br>n/samba-3.0.23a-i486-1.tgz: Upgraded to samba-3.0.23a.<br>t/tetex-3.0-i486-3.tgz: Recompiled against libpng-1.2.12.<br>x/fontconfig-2.2.3-i486-1.tgz: Split fontconfig into a separate package.<br>x/freetype-2.1.9-i486-1.tgz: Split freetype into a separate package.<br>x/x11-6.9.0-i486-5.tgz: Rebuilt. Removed fontconfig/freetype files.<br>x/x11-devel-6.9.0-i486-5.tgz: Rebuilt. Removed fontconfig/freetype files.<br>x/x11-docs-6.9.0-noarch-5.tgz: Rebuilt. Removed fontconfig/freetype files.<br>xap/gimp-2.2.12-i486-1.tgz: Upgraded to gimp-2.2.12.<br>xap/imagemagick-6.2.8_4-i486-1.tgz: Upgraded to ImageMagick-6.2.8-4.<br>xap/seamonkey-1.0.2-i486-2.tgz: Recompiled to use libpng.so.3.<br>xap/vim-gvim-7.0.042-i486-1.tgz: Renamed from "xvim", now requires the<br>xap/xine-lib-1.1.2-i686-1.tgz: Upgraded to xine-lib-1.1.2.<br>xap/xsane-0.991-i486-2.tgz: Recompiled to use libpng.so.3.<br>extra/aspell-word-lists/aspell-*tgz: Rebuilt, with several packages upgraded.<br>extra/dejavu-ttf/dejavu-ttf-20060720_995-noarch-1.tgz: Added DejaVu fonts.<br>extra/k3b/k3b-0.12.16-i486-2.tgz: Recompiled to use libpng.so.3.<br>extra/linux-2.6.16.27/kernel-modules-2.6.16.27-i486-2.tgz:<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.17.7.<br>testing/packages/linux-2.6.17.7/kernel-generic-2.6.17.7-i486-1.tgz:<br>testing/packages/linux-2.6.17.7/kernel-headers-2.6.17.7-i386-1.tgz:<br>testing/packages/linux-2.6.17.7/kernel-modules-2.6.17.7-i486-1.tgz<br>testing/packages/linux-2.6.17.7/kernel-source-2.6.17.7-noarch-1.tgz<br>l/libwmf-docs-0.2.8.4-noarch-2.tgz: Rebuilt.<br> Thanks to Jesper Juhl for the heads-up.<br> Yes, there is libtunepimp-0.5.0. Probably less supported by the existing<br> codebase, and certainly not tested for as long. We will wait for the next<br> cycle on that, especially as it requires a couple of new dependencies.<br> (* Security fix *)<br> (-current only)<br> /etc/dhcpc, since /var may not yet be mounted when dhcpcd is started.<br> Issue noted by John Jenkins.<br> This release fixes CVE-2006-3242, a buffer overflow that could be triggered<br> by a malicious IMAP server.<br> [Connecting to malicious IMAP servers must be common, right? -- Ed.]<br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242<br> (* Security fix *)<br> Removed /sbin/umount.smbfs symlink which was causing problems at shutdown.<br> Thanks to Robby Workman for the bug report.<br>t/tetex-doc-3.0-i486-3.tgz: Rebuilt.<br> Look, we're modularizing for ease of maintainance! :-)<br> Patched CVE-2006-1861 linux 2.6.x setuid() related bugs.<br> (* Security fix *)<br> Patched some more possible linux 2.6.x setuid() related bugs:<br> http://lists.freedesktop.org/archives/xorg-announce/2006-June/000100.html<br> (* Security fix *)<br> Patched with setuid() usage fixes as described above. Again, this issue<br> is only vulnerable on certain 2.6 kernels.<br> (* Security fix *)<br>x/x11-docs-html-6.9.0-noarch-5.tgz: Rebuilt.<br>x/x11-fonts-100dpi-6.9.0-noarch-5.tgz: Rebuilt.<br>x/x11-fonts-cyrillic-6.9.0-noarch-5.tgz: Rebuilt.<br>x/x11-fonts-misc-6.9.0-noarch-5.tgz: Rebuilt.<br>x/x11-fonts-scale-6.9.0-noarch-5.tgz: Rebuilt.<br>x/x11-xdmx-6.9.0-i486-5.tgz: Rebuilt.<br>x/x11-xnest-6.9.0-i486-5.tgz: Rebuilt.<br>x/x11-xvfb-6.9.0-i486-5.tgz: Rebuilt.<br> This release fixes a security hole in the XCF parser.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404<br> (* Security fix *)<br> vim package from the AP series. Shared files have been eliminated.<br> According to xinehq.de's announcement:<br> There are three security fixes:<br> - CVE-2005-4048: possible buffer overflow in libavcodec (crafted PNGs);<br> - CVE-2006-2802: possible buffer overflow in the HTTP plugin;<br> - possible buffer overflow via bad indexes in specially-crafted AVI files.<br> (* Security fix *)<br> Thanks to Lukasz Stelmach for the initial build script.<br> Made a slight adjustment to rc.modules-2.6.16.27 to attempt to silence it<br> when used on a machine running a 2.4.x kernel and without an activated<br> parallel port. I don't think it helped (or hurt) though...<br> Upgraded to Linux 2.6.17.7 generic kernel.<br> Upgraded to Linux 2.6.17.7 kernel headers.<br> Upgraded to Linux 2.6.17.7 kernel modules.<br> Upgraded to Linux 2.6.17.7 kernel source.<br></blockquote></pre></description>
1727 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153878938</guid>
1728 <pubDate>Wed, 26 Jul 2006 01:55:38 +0000</pubDate>
1729 </item>
1730 <item>
1731 <title></title>
1732 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153262246</link>
1733 <description><pre><blockquote>Tue Jul 18 22:37:26 CDT 2006<br>a/lilo-22.7.2-i486-1.tgz: Upgraded to lilo-22.7.2.<br>kde/koffice-1.5.2-i486-1.tgz: Upgraded to koffice-1.5.2.<br> Thanks to the KOffice team who did incredible work on this.<br>kdei/koffice-l10n-*-noarch-1.tgz:<br> Upgraded to l10n packages for koffice-1.5.2.<br>n/samba-3.0.23-i486-2.tgz: Patched a problem in nsswitch/wins.c that<br> caused crashes in the wins and/or winbind libraries. Thanks to<br> Mikhail Kshevetskiy for pointing out the issue and offering a<br> reference to the patch in Samba's source repository.<br>Thanks again to Andrea for this batch of kernel packages, and also thanks<br> for compiling all those intermediate kernels that were replaced upstream<br> and went unreleased in Slackware -current...<br> Ah, the things that go on here behind the scenes. ;-)<br>extra/linux-2.6.16.27/alsa-driver-1.0.11_2.6.16.27-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.27.<br>extra/linux-2.6.16.27/kernel-generic-2.6.16.27-i486-1.tgz:<br> Upgraded to Linux 2.6.16.27 generic kernel.<br>extra/linux-2.6.16.27/kernel-headers-2.6.16.27-i386-1.tgz:<br> Upgraded to Linux 2.6.16.27 kernel headers.<br>extra/linux-2.6.16.27/kernel-modules-2.6.16.27-i486-1.tgz<br> Upgraded to Linux 2.6.16.27 kernel modules.<br>extra/linux-2.6.16.27/kernel-source-2.6.16.27-noarch-1.tgz<br> Upgraded to Linux 2.6.16.27 kernel source.<br>kernels/huge26.s/*: Upgraded huge26.s kernel to 2.6.16.27.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.17.6.<br>testing/packages/linux-2.6.17.6/kernel-generic-2.6.17.6-i486-1.tgz:<br> Upgraded to Linux 2.6.17.6 generic kernel.<br>testing/packages/linux-2.6.17.6/kernel-headers-2.6.17.6-i386-1.tgz:<br> Upgraded to Linux 2.6.17.6 kernel headers.<br>testing/packages/linux-2.6.17.6/kernel-modules-2.6.17.6-i486-1.tgz<br> Upgraded to Linux 2.6.17.6 kernel modules.<br>testing/packages/linux-2.6.17.6/kernel-source-2.6.17.6-noarch-1.tgz<br> Upgraded to Linux 2.6.17.6 kernel source.<br></blockquote></pre></description>
1734 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1153262246</guid>
1735 <pubDate>Tue, 18 Jul 2006 22:37:26 +0000</pubDate>
1736 </item>
1737 <item>
1738 <title></title>
1739 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1152901880</link>
1740 <description><pre><blockquote>Fri Jul 14 18:31:20 CDT 2006<br>We *are* getting closer to 11.0, friends.<br>I'm hoping for a larger changeset soon, but this should be fun to play with<br>for now as I work on the TODO list; merging, compiling, and initial testing.<br>n/samba-3.0.23-i486-1.tgz: Upgraded to samba-3.0.23.<br> This fixes a minor memory exhaustion DoS in smbd.<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403<br> (* Security fix *)<br>kernels/huge26.s/*: Upgraded huge26.s kernel to 2.6.16.24.<br> The name of the big kernel with many built-in options has been changed from<br> test26.s to huge26.s to reflect that Slackware 11.0 will consider the<br> 2.6.16.x kernel series to be a supported kernel series. However, I'm<br> probably going to leave the bare.i 2.4.32 kernel as the default kernel (or<br> perhaps sata.i?) as it has very good performance and probably better security<br> due to the simpler and longer-tested design. I might apply or at least make<br> available in the kernel-source package for 2.4.32 a patch to fix direct<br> rendering with 2.4.x kernels and X.Org 6.9.0 or newer. Since anyone using<br> Slackware for server use isn't likely to be loading the DRI modules, it's<br> untouched code on those machines and won't affect server stability (well,<br> depending on what, if anything, outside of the module is changed in the<br> kernel). It is probably a safe enough patch to apply. I'd rather ship 100%<br> vanilla kernels (and might, with the patch "on the side"), but DRI does not<br> work without the patch past X.Org 6.8.2. Is this enough text here?<br> Perhaps I should rename this my "ChangeBlog".<br>Thanks to Andrea Volkerding for compiling these kernel packages: :-)<br>extra/linux-2.6.16.24/alsa-driver-1.0.11_2.6.16.24-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.24.<br>extra/linux-2.6.16.24/kernel-generic-2.6.16.24-i486-1.tgz:<br> Upgraded to Linux 2.6.16.24 generic kernel.<br>extra/linux-2.6.16.24/kernel-headers-2.6.16.24-i386-1.tgz:<br> Upgraded to Linux 2.6.16.24 kernel headers.<br>extra/linux-2.6.16.24/kernel-modules-2.6.16.24-i486-1.tgz<br> Upgraded to Linux 2.6.16.24 kernel modules.<br>extra/linux-2.6.16.24/kernel-source-2.6.16.24-noarch-1.tgz<br> Upgraded to Linux 2.6.16.24 kernel source.<br>testing/packages/linux-2.6.17.4/kernel-generic-2.6.17.4-i486-1.tgz:<br> Upgraded to Linux 2.6.17.4 generic kernel.<br>testing/packages/linux-2.6.17.4/kernel-headers-2.6.17.4-i386-1.tgz:<br> Upgraded to Linux 2.6.17.4 kernel headers.<br>testing/packages/linux-2.6.17.4/kernel-modules-2.6.17.4-i486-1.tgz<br> Upgraded to Linux 2.6.17.4 kernel modules.<br>testing/packages/linux-2.6.17.4/kernel-source-2.6.17.4-noarch-1.tgz<br> Upgraded to Linux 2.6.17.4 kernel source.<br></blockquote></pre></description>
1741 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1152901880</guid>
1742 <pubDate>Fri, 14 Jul 2006 18:31:20 +0000</pubDate>
1743 </item>
1744 <item>
1745 <title></title>
1746 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151546625</link>
1747 <description><pre><blockquote>Thu Jun 29 02:03:45 CDT 2006<br>n/ppp-2.4.4-i486-1.tgz: Upgraded to ppp-2.4.4.<br>n/rp-pppoe-3.8-i486-2.tgz: Recompiled with --enable-plugin.<br> Thanks to Fr�d�ric L. W. Meunier for the suggestion.<br>extra/k3b/k3b-0.12.16-i486-1.tgz: Upgraded to k3b-0.12.16.<br> Thanks to Matthew Johnson for pointing out the new release.<br>extra/k3b/k3b-i18n-0.12.16-noarch-1.tgz: Upgraded to k3b-i18n-0.12.16.<br></blockquote></pre></description>
1748 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151546625</guid>
1749 <pubDate>Thu, 29 Jun 2006 02:03:45 +0000</pubDate>
1750 </item>
1751 <item>
1752 <title></title>
1753 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151432310</link>
1754 <description><pre><blockquote>Tue Jun 27 18:18:30 CDT 2006<br>kde/kdebase-3.5.3-i486-2.tgz: Patched a problem with kdm where it could be<br> abused to read any file on the system.<br> The official KDE security advisory may be found here:<br> http://www.kde.org/info/security/advisory-20060614-1.txt<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449<br> (* Security fix *)<br> Also patched a non-security issue where KDE's screensaver would not activate.<br>l/arts-1.5.3-i486-2.tgz: Patched to fix a possible exploit if artswrapper is<br> setuid root (which, by default, it is not) and the system is running a 2.6<br> kernel. Systems running 2.4 kernels are not affected.<br> The official KDE security advisory may be found here:<br> http://www.kde.org/info/security/advisory-20060614-2.txt<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916<br> (* Security fix *)<br>n/gnupg-1.4.4-i486-1.tgz: Upgraded to gnupg-1.4.4.<br> This version fixes a memory allocation issue that could allow an attacker to<br> crash GnuPG creating a denial-of-service.<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3082<br>n/nn-6.7.3-i486-1.tgz: Upgraded to nn-6.7.3.<br> Thanks to Aaron Hsu for helping with this package.<br>extra/blackbox-0.70.1/blackbox-0.70.1-i486-1.tgz: Upgraded to blackbox-0.70.1.<br>extra/ham/xastir-1.8.2-i486-2.tgz: Upgraded to xastir-1.8.2.<br> Thanks to Arno Verhoeven for the upgraded package.<br></blockquote></pre></description>
1755 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151432310</guid>
1756 <pubDate>Tue, 27 Jun 2006 18:18:30 +0000</pubDate>
1757 </item>
1758 <item>
1759 <title></title>
1760 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151279951</link>
1761 <description><pre><blockquote>Sun Jun 25 23:59:11 CDT 2006<br>a/lilo-22.7.1-i486-1.tgz: Upgraded to lilo-22.7.1.<br> Thanks to George Iosif for reporting that this new LILO version is<br> needed to boot a Toshiba Tecra S3 laptop.<br> Thanks to Tomas Matejicek for suggestions on refining the build script.<br> This version was also suggested as an upgrade by Rene Huber and Grant.<br>a/procps-3.2.7-i486-1.tgz: Upgraded to procps-3.2.7 and psmisc-22.2.<br>ap/jed-0.99_18-i486-1.tgz: Upgraded to jed-0.99_18.<br>ap/sox-12.18.1-i486-1.tgz: Upgraded to sox-12.18.1.<br>l/mhash-0.9.7-i486-1.tgz: Upgraded to mhash-0.9.7, which should fix<br> some breakage reported by Bradley Reed.<br></blockquote></pre></description>
1762 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151279951</guid>
1763 <pubDate>Sun, 25 Jun 2006 23:59:11 +0000</pubDate>
1764 </item>
1765 <item>
1766 <title></title>
1767 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151196373</link>
1768 <description><pre><blockquote>Sun Jun 25 00:46:13 CDT 2006<br>a/coreutils-5.97-i486-1.tgz: Upgraded to coreutils-5.97.<br>a/gettext-0.14.6-i486-1.tgz: Upgraded to gettext-0.14.6.<br>ap/joe-3.4-i486-2.tgz: Fixed permissions on some documentation files.<br> Thanks to Nathan Black for noticing they were wrong.<br>ap/mdadm-2.5.1-i486-1.tgz: Upgraded to mdadm-2.5.1.<br>d/gdb-6.5-i486-1.tgz: Upgraded to gdb-6.5.<br>d/gettext-tools-0.14.6-i486-1.tgz: Upgraded to gettext-tools-0.14.6.<br>d/git-1.4.0-i486-1.tgz: Upgraded to git-1.4.0.<br> Added the man pages.<br> Thanks to Seb for pointing out the git-manpages archive on kernel.org.<br>l/gtk+2-2.8.19-i486-1.tgz: Upgraded to gtk+-2.8.19.<br> Looks like there's a bit more fallout over the PNG -lz debate...<br> Thanks to Jason A Miller and Giacomo Lozito for reporting the problem<br> with PNG images and pointing out the needed patch.<br>testing/packages/php-5.1.4/php-5.1.4-i486-2.tgz: Recompiled with --enable-soap.<br> Thanks to Aleksandar Jevremovic for the suggestion.<br></blockquote></pre></description>
1769 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151196373</guid>
1770 <pubDate>Sun, 25 Jun 2006 00:46:13 +0000</pubDate>
1771 </item>
1772 <item>
1773 <title></title>
1774 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151017853</link>
1775 <description><pre><blockquote>Thu Jun 22 23:10:53 CDT 2006<br>a/e2fsprogs-1.38-i486-2.tgz: Reverted to e2fsprogs-1.38 due to reports of<br> broken floppy support (e2fsck /dev/fd0). Since there were no bug reports<br> here regarding e2fsprogs-1.38 (other than it not being the latest version),<br> I'm reverting to the last known working version to play it safe.<br> Thanks to Mikhail Zotov for reporting this issue along with an example of<br> how to easily reproduce it.<br>n/getmail-4.6.3-noarch-1.tgz: Upgraded to getmail-4.6.3.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.22.<br>testing/packages/linux-2.6.16.22/alsa-driver-1.0.11_2.6.16.22-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.22.<br>testing/packages/linux-2.6.16.22/kernel-generic-2.6.16.22-i486-1.tgz:<br> Upgraded to Linux 2.6.16.22 generic kernel.<br> I hope everyone had plenty of time to test that last kernel. ;-)<br>testing/packages/linux-2.6.16.22/kernel-headers-2.6.16.22-i386-1.tgz:<br> Upgraded to Linux 2.6.16.22 kernel headers.<br>testing/packages/linux-2.6.16.22/kernel-modules-2.6.16.22-i486-1.tgz<br> Upgraded to Linux 2.6.16.22 kernel modules.<br>testing/packages/linux-2.6.16.22/kernel-source-2.6.16.22-noarch-1.tgz<br> Upgraded to Linux 2.6.16.22 kernel source.<br></blockquote></pre></description>
1776 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1151017853</guid>
1777 <pubDate>Thu, 22 Jun 2006 23:10:53 +0000</pubDate>
1778 </item>
1779 <item>
1780 <title></title>
1781 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150936830</link>
1782 <description><pre><blockquote>Thu Jun 22 00:40:30 CDT 2006<br>l/sdl-1.2.10-i486-3.tgz: Recompiled with --disable-x11-shared to<br> avoid problems with nVidia's drivers.<br> Thanks to Giacomo Lozito for reporting this issue.<br>n/dhcpcd-2.0.4-i486-1.tgz: Switched to dhcpcd version 2.0.4 after<br> receiving some reports of problems with the latest version. There<br> were no reports of problems with dhcpcd-2.0.1 here, and it was only<br> upgraded in order to have the new, shiny version. But, rather than<br> go all the way back to 2.0.1, we'll try 2.0.4 since one report was<br> detailed enough to note that 2.0.4 worked while 2.0.6 didn't.<br> Thanks to christian laubscher, Luca, and Dave Miller for providing<br> useful data about these problems.<br> In case anyone upstream is reading this, one of the problems was<br> dhcpcd failing to work with the DHCP server built into the ZyXEL<br> Prestige 650H-E1 router, and another issue was that after 2.0.4 it<br> would no longer work with token ring.<br> If any of these people have the time to test this new package and<br> report success or failure, it would be appreciated. :-)<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.21.<br>testing/packages/linux-2.6.16.21/alsa-driver-1.0.11_2.6.16.21-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.21.<br>testing/packages/linux-2.6.16.21/kernel-generic-2.6.16.21-i486-1.tgz:<br> Upgraded to Linux 2.6.16.21 generic kernel.<br>testing/packages/linux-2.6.16.21/kernel-headers-2.6.16.21-i386-1.tgz:<br> Upgraded to Linux 2.6.16.21 kernel headers.<br>testing/packages/linux-2.6.16.21/kernel-modules-2.6.16.21-i486-1.tgz<br> Upgraded to Linux 2.6.16.21 kernel modules.<br>testing/packages/linux-2.6.16.21/kernel-source-2.6.16.21-noarch-1.tgz<br> Upgraded to Linux 2.6.16.21 kernel source.<br></blockquote></pre></description>
1783 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150936830</guid>
1784 <pubDate>Thu, 22 Jun 2006 00:40:30 +0000</pubDate>
1785 </item>
1786 <item>
1787 <title></title>
1788 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150676933</link>
1789 <description><pre><blockquote>Mon Jun 19 00:28:53 CDT 2006<br>xap/xchat-2.6.4-i486-2.tgz: Patched to fix proxy support.<br> Thanks to Bren and Stefan Misch for pointing out the patch.<br></blockquote></pre></description>
1790 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150676933</guid>
1791 <pubDate>Mon, 19 Jun 2006 00:28:53 +0000</pubDate>
1792 </item>
1793 <item>
1794 <title></title>
1795 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150331944</link>
1796 <description><pre><blockquote>Thu Jun 15 00:39:04 CDT 2006<br>a/e2fsprogs-1.39-i486-1.tgz: Upgraded to e2fsprogs-1.39.<br>ap/man-pages-2.33-noarch-1.tgz: Upgraded to man-pages-2.33.<br>ap/quota-3.13-i486-1.tgz: Upgraded to quota-3.13.<br>d/cvs-1.11.22-i486-1.tgz: Upgraded to cvs-1.11.22.<br>l/fribidi-0.10.7-i486-1.tgz: Upgraded to fribidi-0.10.7.<br>l/libgsf-1.14.1-i486-1.tgz: Upgraded to libgsf-1.14.1.<br>l/librsvg-2.14.4-i486-1.tgz: Upgraded to librsvg-2.14.4.<br>l/libxml2-2.6.26-i486-1.tgz: Upgraded to libxml2-2.6.26.<br>l/libxslt-1.1.17-i486-1.tgz: Upgraded to libxslt-1.1.17.<br>l/libwmf-0.2.8.4-i486-1.tgz: Upgraded to libwmf-0.2.8.4.<br>l/libwmf-docs-0.2.8.4-noarch-1.tgz: Upgraded to libwmf-0.2.8.4 docs.<br>l/libwpd-0.8.5-i486-1.tgz: Upgraded to libwpd-0.8.5.<br> This might require a few things to be recompiled, so please report<br> any compatibility issues here.<br>l/mhash-0.9.6-i486-1.tgz: Upgraded to mhash-0.9.6.<br>n/curl-7.15.4-i486-1.tgz: Upgraded to curl-7.15.4.<br>n/irssi-0.8.10a-i486-2.tgz: Patched to fix a pointer bug that causes irssi<br> to dump core on exit. Thanks to Andrew Brouwers for the bug report and<br> pointers to a discussion and patch.<br>n/lftp-3.4.7-i486-1.tgz: Upgraded to lftp-3.4.7.<br>n/nmap-4.10-i486-1.tgz: Upgraded to nmap-4.10.<br>n/ntp-4.2.2-i486-1.tgz: Upgraded to ntp-4.2.2.<br>n/openldap-client-2.3.24-i486-1.tgz: Upgraded to openldap-2.3.24.<br>n/sendmail-8.13.7-i486-1.tgz: Upgraded to sendmail-8.13.7.<br> Fixes a potential denial of service problem caused by excessive recursion<br> leading to stack exhaustion when attempting delivery of a malformed MIME<br> message. This crashes sendmail's queue processing daemon, which in turn<br> can lead to two problems: depending on the settings, these crashed<br> processes may create coredumps which could fill a drive partition; and<br> such a malformed message in the queue will cause queue processing to<br> cease when the message is reached, causing messages that are later in<br> the queue to not be processed.<br> Sendmail's complete advisory may be found here:<br> http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc<br> Sendmail has also provided an FAQ about this issue:<br> http://www.sendmail.com/security/advisories/SA-200605-01/faq.shtml<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173<br> (* Security fix *)<br>n/sendmail-cf-8.13.7-noarch-1.tgz: Upgraded to sendmail-8.13.7 configs.<br>xap/fluxbox-1.0rc-i486-1.tgz: Upgraded to fluxbox-1.0rc.<br> I considered using --prefix=/usr here since X.Org will be moving from<br> /usr/X11R6 to /usr when Slackware absorbs the modular release, but I<br> think it will be best to wait and make those changes all at once.<br> This, BTW, will be sometime after the 11.0 release. This current to<br> stable cycle has already taken too much time (10.2 is in need of<br> replacement), and introducing changes that might break things at this<br> point would be foolhardy. Although there's still quite a bit in the<br> TODO queue here I'm making my steps carefully as -current is very<br> stable, and I think it should ship as a stable 11.0 soon so that we can<br> get back to the business of breaking things in -current. :-)<br>xap/imagemagick-6.2.8_0-i486-1.tgz: Upgraded to ImageMagick-6.2.8-0.<br>xap/xchat-2.6.4-i486-1.tgz: Upgraded to xchat-2.6.4.<br>xap/xsane-0.991-i486-1.tgz: Upgraded to xsane-0.991.<br> Thanks to Nicolas Friedli for pointing out that I'd had this source<br> ready to compile in source/xap/xsane for a couple of months. :-)<br></blockquote></pre></description>
1797 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150331944</guid>
1798 <pubDate>Thu, 15 Jun 2006 00:39:04 +0000</pubDate>
1799 </item>
1800 <item>
1801 <title></title>
1802 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150098386</link>
1803 <description><pre><blockquote>Mon Jun 12 07:46:26 CDT 2006<br>d/doxygen-1.4.7-i486-1.tgz: Touched/resynced as this package got mangled<br> in upload somehow. Thanks to Marin Mitov for pointing this out.<br></blockquote></pre></description>
1804 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150098386</guid>
1805 <pubDate>Mon, 12 Jun 2006 07:46:26 +0000</pubDate>
1806 </item>
1807 <item>
1808 <title></title>
1809 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150046852</link>
1810 <description><pre><blockquote>Sun Jun 11 17:27:32 CDT 2006<br>d/doxygen-1.4.7-i486-1.tgz: Upgraded to doxygen-1.4.7.<br>kde/amarok-1.4.0a-i486-1.tgz: Upgraded to amarok-1.4.0a.<br> Thanks to Steven Robson for pointing out the stealth re-release.<br>l/sdl-1.2.10-i486-2.tgz: Fixed the ./configure options so that SDL does not<br> use dlopen() to link to the shared graphics libraries, as dlopen() wasn't<br> working with the new PNG library. Thanks to Fran�ois Cojean and<br> Rapha�l Prevost for bug report and patch.<br>n/bootp-2.4.3-i486-2.tgz: Patched to work with 2.6.x kernels.<br> Thanks to Simon Munton.<br>n/dhcpcd-2.0.6-i486-1.tgz: Upgraded to dhcpcd-2.0.6.<br> Moved /etc/dhcpc/dhcpcd.exe to /etc/dhcpc/dhcpcd.exe-sample to prevent<br> error messages in the log files. The sources install this as non-<br> executable, and there's little reason that I can see to use it in its<br> default form as it only puts redundant information in the logs.<br> It might be a useful stub for some other purpose though...<br> Thanks to David Houlden and Luis for reporting the issue.<br>n/dnsmasq-2.32-i486-1.tgz: Upgraded to dnsmasq-2.32.<br>extra/slackpkg/slackpkg-2.05-noarch-7.tgz: Upgraded to slackpkg-2.05-noarch-7.<br> Thanks to Piter Punk.<br></blockquote></pre></description>
1811 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1150046852</guid>
1812 <pubDate>Sun, 11 Jun 2006 17:27:32 +0000</pubDate>
1813 </item>
1814 <item>
1815 <title>2 updates</title>
1816 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149725495</link>
1817 <description><pre><blockquote>Thu Jun 8 00:11:35 CDT 2006<br>a/acl-2.2.34-i486-1.tgz: Moved from AP series since so many binaries require<br> this (or will). Made acl an ADD (required) package in the tagfile.<br>a/attr-2.4.28-i486-1.tgz: Moved from AP series since so many binaries require<br> this (or will). Made attr an ADD (required) package in the tagfile.<br>d/mercurial-0.9-i486-2.tgz: Fixed missing man pages. (thanks to Seb)<br>d/python-2.4.3-i486-2.tgz: Rebuilt with --enable-ipv6.<br> I don't know if this option actually does anything, but it can't hurt. ;-)<br> Suggested by Lukasz Stelmach.<br>n/samba-3.0.22-i486-2.tgz: Recompiled with --with-acl-support=yes.<br>d/python-demo-2.4.3-noarch-2.tgz: Rebuilt.<br>d/python-tools-2.4.3-noarch-2.tgz: Rebuilt.<br> Suggested by Ricardson Williams.<br></blockquote></pre></description>
1818 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149725495</guid>
1819 <pubDate>Thu, 08 Jun 2006 00:11:35 +0000</pubDate>
1820 </item>
1821 <item>
1822 <title></title>
1823 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149533835</link>
1824 <description><pre><blockquote>Mon Jun 5 18:57:15 CDT 2006<br>a/jfsutils-1.1.11-i486-1.tgz: Upgraded to jfsutils-1.1.11.<br>n/apache-1.3.36-i486-1.tgz: Upgraded to apache-1.3.36.<br>n/mod_ssl-2.8.27_1.3.36-i486-1.tgz: Upgraded to mod_ssl-2.8.27-1.3.36.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.20.<br>testing/packages/linux-2.6.16.20/alsa-driver-1.0.11_2.6.16.20-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.20.<br>testing/packages/linux-2.6.16.20/kernel-generic-2.6.16.20-i486-1.tgz:<br> Upgraded to Linux 2.6.16.20 generic kernel.<br>testing/packages/linux-2.6.16.20/kernel-headers-2.6.16.20-i386-1.tgz:<br> Upgraded to Linux 2.6.16.20 kernel headers.<br>testing/packages/linux-2.6.16.20/kernel-modules-2.6.16.20-i486-1.tgz<br> Upgraded to Linux 2.6.16.20 kernel modules.<br>testing/packages/linux-2.6.16.20/kernel-source-2.6.16.20-noarch-1.tgz<br> Upgraded to Linux 2.6.16.20 kernel source.<br></blockquote></pre></description>
1825 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149533835</guid>
1826 <pubDate>Mon, 05 Jun 2006 18:57:15 +0000</pubDate>
1827 </item>
1828 <item>
1829 <title></title>
1830 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149459434</link>
1831 <description><pre><blockquote>Sun Jun 4 22:17:14 CDT 2006<br>a/sharutils-4.6.3-i486-1.tgz: Upgraded to sharutils-4.6.3.<br>ap/joe-3.4-i486-1.tgz: Upgraded to joe-3.4.<br>ap/mysql-5.0.22-i486-1.tgz: Upgraded to mysql-5.0.22.<br> This fixes an SQL injection vulnerability.<br> For more details, see the MySQL 5.0.22 release announcement here:<br> http://lists.mysql.com/announce/365<br> The CVE entry for this issue will be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2753<br> (* Security fix *)<br>kde/kdeaccessibility-3.5.3-i486-1.tgz: Upgraded to kdeaccessibility-3.5.3.<br>kde/kdeaddons-3.5.3-i486-1.tgz: Upgraded to kdeaddons-3.5.3.<br>kde/kdeadmin-3.5.3-i486-1.tgz: Upgraded to kdeadmin-3.5.3.<br>kde/kdeartwork-3.5.3-i486-1.tgz: Upgraded to kdeartwork-3.5.3.<br>kde/kdebase-3.5.3-i486-1.tgz: Upgraded to kdebase-3.5.3.<br>kde/kdebindings-3.5.3-i486-1.tgz: Upgraded to kdebindings-3.5.3.<br>kde/kdeedu-3.5.3-i486-1.tgz: Upgraded to kdeedu-3.5.3.<br>kde/kdegames-3.5.3-i486-1.tgz: Upgraded to kdegames-3.5.3.<br>kde/kdegraphics-3.5.3-i486-1.tgz: Upgraded to kdegraphics-3.5.3.<br>kde/kdelibs-3.5.3-i486-1.tgz: Upgraded to kdelibs-3.5.3.<br>kde/kdemultimedia-3.5.3-i486-1.tgz: Upgraded to kdemultimedia-3.5.3.<br>kde/kdenetwork-3.5.3-i486-1.tgz: Upgraded to kdenetwork-3.5.3.<br>kde/kdepim-3.5.3-i486-1.tgz: Upgraded to kdepim-3.5.3.<br>kde/kdesdk-3.5.3-i486-1.tgz: Upgraded to kdesdk-3.5.3.<br>kde/kdetoys-3.5.3-i486-1.tgz: Upgraded to kdetoys-3.5.3.<br>kde/kdeutils-3.5.3-i486-1.tgz: Upgraded to kdeutils-3.5.3.<br>kde/kdevelop-3.3.2-i486-1.tgz: Upgraded to kdevelop-3.3.2.<br>kde/kdewebdev-3.5.3-i486-1.tgz: Upgraded to kdewebdev-3.5.3.<br>kde/koffice-1.5.1-i486-1.tgz: Upgraded to koffice-1.5.1.<br>kdei/kde-i18n-*-3.5.3-noarch-1.tgz: Upgraded to kde-i18n-3.5.3.<br>kdei/koffice-l10n-*-1.5.1-noarch-1.tgz:<br> Upgraded to l10n packages for koffice-1.5.1.<br>l/arts-1.5.3-i486-1.tgz: Upgraded to arts-1.5.3.<br>l/jre-1_5_0_07-i586-1.tgz: Upgraded to Java(TM) 2 Platform Standard Edition<br> Runtime Environment Version 5.0, Release 7.<br>n/getmail-4.6.1-noarch-1.tgz: Upgraded to getmail-4.6.1.<br>n/links-2.1pre22-i486-1.tgz: Upgraded to links-2.1pre22.<br>xap/mozilla-firefox-1.5.0.4-i686-1.tgz: Upgraded to firefox-1.5.0.4.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>xap/mozilla-thunderbird-1.5.0.4-i686-1.tgz: Upgraded to thunderbird-1.5.0.4.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>xap/seamonkey-1.0.2-i486-1.tgz: Upgraded to seamonkey-1.0.2.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>xap/xlockmore-5.22-i486-1.tgz: Upgraded to xlockmore-5.22.<br>xap/xscreensaver-5.00-i486-1.tgz: Upgraded to xscreensaver-5.00.<br>extra/jdk-1.5.0_07/jdk-1_5_0_07-i586-1.tgz: Upgraded to Java(TM) 2<br> Platform Standard Edition Development Kit Version 5.0, Release 7.<br></blockquote></pre></description>
1832 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149459434</guid>
1833 <pubDate>Sun, 04 Jun 2006 22:17:14 +0000</pubDate>
1834 </item>
1835 <item>
1836 <title></title>
1837 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149100678</link>
1838 <description><pre><blockquote>Wed May 31 18:37:58 CDT 2006<br>a/hotplug-2004_09_23-noarch-8.tgz: Patched net.agent to use rc.inet1<br> to shut down interfaces that use DHCP. Thanks to Lew Pitcher,<br> Ismael Cortes, and Nuts Mueller, who all suggested possible solutions<br> for an issue which arose when dhcpcd's .pid file was shifted from<br> /etc/dhcpc/ to /var/run/.<br>ap/mdadm-2.5-i486-1.tgz: Upgraded to mdadm-2.5.<br>d/subversion-1.3.2-i486-1.tgz: Upgraded to subversion-1.3.2.<br> Added back the HTML book -- thanks to Jan Rafaj for pointing out that<br> this had gone missing in the last subversion package.<br>xap/gkrellm-2.2.9-i486-1.tgz: Upgraded to gkrellm-2.2.9.<br> Suggested by Willy Sudiarto Raharjo.<br>extra/slackpkg/slackpkg-2.04-noarch-6.tgz: Upgraded to<br> slackpkg-2.04-noarch-6. Thanks to Piter Punk.<br>testing/packages/linux-2.6.16.19/alsa-driver-1.0.11_2.6.16.19-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.19.<br>testing/packages/linux-2.6.16.19/kernel-generic-2.6.16.19-i486-1.tgz:<br> Upgraded to Linux 2.6.16.19 generic kernel.<br>testing/packages/linux-2.6.16.19/kernel-headers-2.6.16.19-i386-1.tgz:<br> Upgraded to Linux 2.6.16.19 kernel headers.<br>testing/packages/linux-2.6.16.19/kernel-modules-2.6.16.19-i486-1.tgz<br> Upgraded to Linux 2.6.16.19 kernel modules.<br> Thanks to Nuts Mueller for the rc.modules typo fixes.<br>testing/packages/linux-2.6.16.19/kernel-source-2.6.16.19-noarch-1.tgz<br> Upgraded to Linux 2.6.16.19 kernel source.<br></blockquote></pre></description>
1839 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1149100678</guid>
1840 <pubDate>Wed, 31 May 2006 18:37:58 +0000</pubDate>
1841 </item>
1842 <item>
1843 <title></title>
1844 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148757271</link>
1845 <description><pre><blockquote>Sat May 27 19:14:31 CDT 2006<br>a/coreutils-5.96-i486-1.tgz: Upgraded to coreutils-5.96.<br>l/glib2-2.10.3-i486-1.tgz: Upgraded to glib-2.10.3.<br>l/gtk+2-2.8.18-i486-1.tgz: Upgraded to gtk+-2.8.18.<br>l/pango-1.12.3-i486-1.tgz: Upgraded to pango-1.12.3.<br>n/dnsmasq-2.31-i486-1.tgz: Upgraded to dnsmasq-2.31.<br>n/cyrus-sasl-2.1.22-i486-1.tgz: Upgraded to cyrus-sasl-2.1.22.<br>n/openldap-client-2.3.23-i486-1.tgz: Upgraded to openldap-2.3.23.<br>xap/imagemagick-6.2.7_8-i486-1.tgz: Upgraded to ImageMagick-6.2.7-8.<br>extra/parted/parted-1.7.1-i486-1.tgz: Upgraded to parted-1.7.1.<br></blockquote></pre></description>
1846 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148757271</guid>
1847 <pubDate>Sat, 27 May 2006 19:14:31 +0000</pubDate>
1848 </item>
1849 <item>
1850 <title></title>
1851 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148334247</link>
1852 <description><pre><blockquote>Mon May 22 21:44:07 CDT 2006<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.18.<br>testing/packages/linux-2.6.16.18/alsa-driver-1.0.11_2.6.16.18-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.18.<br>testing/packages/linux-2.6.16.18/kernel-generic-2.6.16.18-i486-1.tgz:<br> Upgraded to Linux 2.6.16.18 generic kernel.<br>testing/packages/linux-2.6.16.18/kernel-headers-2.6.16.18-i386-1.tgz:<br> Upgraded to Linux 2.6.16.18 kernel headers.<br>testing/packages/linux-2.6.16.18/kernel-modules-2.6.16.18-i486-1.tgz<br> Upgraded to Linux 2.6.16.18 kernel modules.<br>testing/packages/linux-2.6.16.18/kernel-source-2.6.16.18-noarch-1.tgz<br> Upgraded to Linux 2.6.16.18 kernel source.<br></blockquote></pre></description>
1853 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148334247</guid>
1854 <pubDate>Mon, 22 May 2006 21:44:07 +0000</pubDate>
1855 </item>
1856 <item>
1857 <title>1 update</title>
1858 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148297028</link>
1859 <description><pre><blockquote>Mon May 22 11:23:48 CDT 2006<br>a/bin-11.0-i486-1.tgz: Upgraded to ncompress-4.2.4, eject-2.1.4, file-4.17,<br> and tree-1.5.0. Removed sharutils, which are now in a separate package.<br> Patched a security problem in zoo's fullpath() function that was reported by<br> Jean-Sebastien Guay-Leroux. At first this didn't seem like much as zoo is<br> old and hardly used, but there are virus scanning programs that scan zoo<br> archives. It is a possible problem on any system running zoo like this in<br> an automated way, and (of course) could also cause problems if a user were<br> to open a malicious zoo archive manually. (though I'd be pretty suspicious<br> if someone were to mail me anything using "zoo" in 2006...)<br> (* Security fix *)<br>a/coreutils-5.95-i486-1.tgz: Upgraded to coreutils-5.95.<br>a/sharutils-4.6.2-i486-1.tgz: Added new sharutils package,<br> upgraded to sharutils-4.6.2.<br>ap/linuxdoc-tools-0.9.21-i486-2.tgz: Added libsgmls-perl_1.03ii.<br> Upgraded to the latest upstream linuxdoc-tools package.<br> Moved jadetex out of this package and into the tetex package so that<br> "mktexlslr" won't need to be run to find jadetex.<br> Merged some miscellaneous fixes from the armedslack package.<br> Thanks again to Stuart Winter for help on SGML/Docbook issues. :-)<br>d/git-1.3.3-i486-1.tgz: Upgraded to git-1.3.3.<br>kde/amarok-1.4.0-i486-1.tgz: Upgraded to amarok-1.4.0.<br>l/glib2-2.10.2-i486-1.tgz: Upgraded to glib-2.10.2.<br>l/pango-1.12.2-i486-1.tgz: Upgraded to pango-1.12.2.<br>l/sdl-1.2.10-i486-1.tgz: Upgraded to SDL-1.2.10, SDL_image-1.2.5,<br> SDL_mixer-1.2.7, SDL_net-1.2.6, and SDL_ttf-2.0.8.<br>l/libxml2-2.6.24-i486-1.tgz: Upgraded to libxml2-2.6.24.<br>l/libxslt-1.1.16-i486-1.tgz: Upgraded to libxslt-1.1.16.<br>n/dhcp-3.0.4-i486-1.tgz: Upgraded to dhcp-3.0.4.<br>n/nfs-utils-1.0.8-i486-1.tgz: Upgraded to nfs-utils-1.0.8.<br>t/tetex-3.0-i486-2.tgz: Regenerated the etex.fmt files with etex, not pdfetex.<br> This is more appropriate since etex is a binary, not a link to pdfetex.<br> Thanks to John Breckenridge for reporting the issue.<br> Added --disable-a4, and fixed the texconfig for US paper default in the<br> build script. Thanks to Marc Benstein and Jingmin Zhou for reporting this.<br> Merged jadetex into the teTeX package.<br> Moved font build directory (only usable by root anyway) from<br> /var/tmp/texfonts to /var/lib/texmf.<br> Improved /tmp use security.<br> Patched a possible security issue in library code borrowed from xpdf that's<br> used in pdfetex.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193<br> (* Security fix *)<br>xap/gxine-0.5.6-i486-1.tgz: Upgraded to gxine-0.5.6.<br>xap/imagemagick-6.2.7_6-i486-1.tgz: Upgraded to ImageMagick-6.2.7-6.<br>xap/seamonkey-1.0.1-i486-2.tgz: Added seamonkey-1.0.1, which replaces the old<br>extra/parted/parted-1.7.0-i486-1.tgz: Upgraded to parted-1.7.0.<br>pasture/mozilla-1.7.13-i486-1.tgz: Moved here from XAP series.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.17.<br>testing/packages/linux-2.6.16.17/alsa-driver-1.0.11_2.6.16.17-i486-1.tgz:<br>testing/packages/linux-2.6.16.17/kernel-generic-2.6.16.17-i486-1.tgz:<br>testing/packages/linux-2.6.16.17/kernel-headers-2.6.16.17-i386-1.tgz:<br>testing/packages/linux-2.6.16.17/kernel-modules-2.6.16.17-i486-1.tgz<br>testing/packages/linux-2.6.16.17/kernel-source-2.6.16.17-noarch-1.tgz<br>t/tetex-doc-3.0-i486-2.tgz: Rebuilt.<br> Mozilla Suite in the XAP series. If Mozilla is not found on the machine, a<br> mozilla -> seamonkey link will be created to handle applications that might<br> still try to use "mozilla" to open URLs. Also, if Mozilla is not installed,<br> then symlinks will be made in /usr/lib/pkgconfig/ from mozilla* -><br> seamonkey*. This should allow most sources designed for Mozilla to compile.<br> This won't remain here long, so grab a copy if you want it...<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.17.<br> Upgraded to Linux 2.6.16.17 generic kernel.<br> Upgraded to Linux 2.6.16.17 kernel headers.<br> Upgraded to Linux 2.6.16.17 kernel modules.<br> Upgraded to Linux 2.6.16.17 kernel source.<br></blockquote></pre></description>
1860 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1148297028</guid>
1861 <pubDate>Mon, 22 May 2006 11:23:48 +0000</pubDate>
1862 </item>
1863 <item>
1864 <title></title>
1865 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147554028</link>
1866 <description><pre><blockquote>Sat May 13 21:00:28 CDT 2006<br>a/bash-3.1.017-i486-1.tgz: Upgraded to bash-3.1.17.<br>a/openssl-solibs-0.9.8b-i486-1.tgz: Upgraded to openssl-0.9.8b.<br>ap/vim-7.0.017-i486-1.tgz: Upgraded to vim-7.0.017.<br>d/git-1.3.2-i486-1.tgz: Added git-1.3.2.<br>d/mercurial-0.9-i486-1.tgz: Added mercurial-0.9.<br>n/openssh-4.3p2-i486-1.tgz: Upgraded to openssh-4.3p2.<br>n/openssl-0.9.8b-i486-1.tgz: Upgraded to openssl-0.9.8b.<br>xap/xvim-7.0.017-i486-1.tgz: Upgraded to vim-7.0.017 compiled with<br> X11 and GTK+ (version 2) support.<br>kernels/test26.s/*: Upgraded test26.s kernel to 2.6.16.16.<br>testing/packages/linux-2.6.16.16/alsa-driver-1.0.11_2.6.16.16-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.16.<br>testing/packages/linux-2.6.16.16/kernel-generic-2.6.16.16-i486-1.tgz:<br> Upgraded to Linux 2.6.16.16 generic kernel.<br>testing/packages/linux-2.6.16.16/kernel-headers-2.6.16.16-i386-1.tgz:<br> Upgraded to Linux 2.6.16.16 kernel headers.<br>testing/packages/linux-2.6.16.16/kernel-modules-2.6.16.16-i486-1.tgz<br> Upgraded to Linux 2.6.16.16 kernel modules.<br> Added many missing ISA network card modules (thanks to Marc Rubin).<br>testing/packages/linux-2.6.16.16/kernel-source-2.6.16.16-noarch-1.tgz<br> Upgraded to Linux 2.6.16.16 kernel source.<br></blockquote></pre></description>
1867 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147554028</guid>
1868 <pubDate>Sat, 13 May 2006 21:00:28 +0000</pubDate>
1869 </item>
1870 <item>
1871 <title></title>
1872 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147271037</link>
1873 <description><pre><blockquote>Wed May 10 14:23:57 CDT 2006<br>n/apache-1.3.35-i486-2.tgz: Patched to fix totally broken Include behavior.<br> Thanks to Francesco Gringoli for reporting this bug.<br></blockquote></pre></description>
1874 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147271037</guid>
1875 <pubDate>Wed, 10 May 2006 14:23:57 +0000</pubDate>
1876 </item>
1877 <item>
1878 <title></title>
1879 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147191033</link>
1880 <description><pre><blockquote>Tue May 9 16:10:33 CDT 2006<br>ap/cdrdao-1.2.1-i486-1.tgz: Upgraded to cdrdao-1.2.1.<br>ap/mysql-5.0.21-i486-1.tgz: Upgraded to mysql-5.0.21.<br> This fixes some security issues, including possible information leakage, and<br> execution of arbitrary code. Note that the information leakage bugs require<br> that the attacker have access to an account on the database. Also note that<br> by default, Slackware's rc.mysqld script does *not* allow access to the<br> database through the outside network (it uses the --skip-networking option).<br> If you've enabled network access to MySQL, it is a good idea to filter the<br> port (3306) to prevent access from unauthorized machines.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1518<br> (* Security fix *)<br>l/gmp-4.2.1-i486-1.tgz: Upgraded to gmp-4.2.1.<br>l/libpng-1.2.10-i486-2.tgz: Run ./configure --prefix=/usr to substitute macros<br> into libpng12.pc (even though we compile with the custom makefile.)<br> Thanks to Ian Bennett for the bug report.<br>l/mpfr-2.2.0p10-i486-1.tgz: Added mpfr-2.2.0p10. This used to be part of GMP<br> but is now a separate project (www.mpfr.org).<br>n/apache-1.3.35-i486-1.tgz: Upgraded to apache-1.3.35.<br> From the official announcement:<br> Of particular note is that 1.3.35 addresses and fixes 1 potential<br> security issue: CVE-2005-3352 (cve.mitre.org)<br> mod_imap: Escape untrusted referer header before outputting in HTML<br> to avoid potential cross-site scripting. Change also made to<br> ap_escape_html so we escape quotes. Reported by JPCERT<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352<br> (* Security fix *)<br> Upgraded the bundled mm (Shared Memory Allocation) library to mm-1.4.0.<br>n/gnupg-1.4.3-i486-1.tgz: Upgraded to gnupg-1.4.3.<br>n/mod_ssl-2.8.26_1.3.35-i486-1.tgz: Upgraded to mod_ssl-2.8.26-1.3.35.<br> This is an updated version designed for Apache 1.3.35.<br>n/php-4.4.2-i486-4.tgz: Recompiled against mm-1.4.0.<br> Upgraded to Mail-1.1.10 and XML_RPC-1.4.8 PEAR modules.<br> Added /usr/bin/php-cgi (thanks to AthlonRob).<br>testing/packages/php-5.1.4/php-5.1.4-i486-1.tgz: Upgraded to php-5.1.4.<br> Recompiled against mm-1.4.0 (bundled with the new Apache package).<br> Added /usr/bin/php-cgi (thanks to AthlonRob).<br> Added mysqli and pdo-mysql extensions (suggested by Janusz Dziemidowicz).<br></blockquote></pre></description>
1881 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1147191033</guid>
1882 <pubDate>Tue, 09 May 2006 16:10:33 +0000</pubDate>
1883 </item>
1884 <item>
1885 <title></title>
1886 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146692906</link>
1887 <description><pre><blockquote>Wed May 3 21:48:26 CDT 2006<br>xap/mozilla-firefox-1.5.0.3-i686-1.tgz: Upgraded to firefox-1.5.0.3.<br> This upgrade fixes a crash bug that could possibly be used to<br> execute code as the Firefox user.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br></blockquote></pre></description>
1888 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146692906</guid>
1889 <pubDate>Wed, 03 May 2006 21:48:26 +0000</pubDate>
1890 </item>
1891 <item>
1892 <title>9 updates</title>
1893 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146614498</link>
1894 <description><pre><blockquote>Wed May 3 00:01:38 CDT 2006<br>a/smartmontools-5.36-i486-1.tgz: Upgraded to smartmontools-5.36.<br> Thanks to Jonathan Woithe for letting me know that newer 2.6.x kernels<br> need this version to properly support SMART with SATA drives.<br>l/libpng-1.2.10-i486-1.tgz: Upgraded to libpng-1.2.10.<br>n/rsync-2.6.8-i486-1.tgz: Upgraded to rsync-2.6.8.<br>tcl/tcl-8.4.13-i486-1.tgz: Upgraded to tcl-8.4.13.<br>tcl/tk-8.4.13-i486-1.tgz: Upgraded to tk-8.4.13.<br>x/x11-6.9.0-i486-4.tgz: Patched with x11r6.9.0-mitri.diff and recompiled.<br> A typo in the X render extension allows an X client to crash the server<br> and possibly to execute arbitrary code as the X server user (typically<br> this is "root".) <br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526<br> The advisory from X.Org may be found here:<br> http://lists.freedesktop.org/archives/xorg/2006-May/015136.html<br> (* Security fix *)<br>x/x11-devel-6.9.0-i486-4.tgz: Patched and recompiled libXrender.<br> (* Security fix *)<br>The rest of these were rebuilt simply to keep the build number consistent.<br>x/x11-docs-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-docs-html-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-fonts-100dpi-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-fonts-cyrillic-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-fonts-misc-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-fonts-scale-6.9.0-noarch-4.tgz: Rebuilt.<br>x/x11-xdmx-6.9.0-i486-4.tgz: Rebuilt.<br>x/x11-xnest-6.9.0-i486-4.tgz: Rebuilt.<br>x/x11-xvfb-6.9.0-i486-4.tgz: Rebuilt.<br></blockquote></pre></description>
1895 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146614498</guid>
1896 <pubDate>Wed, 03 May 2006 00:01:38 +0000</pubDate>
1897 </item>
1898 <item>
1899 <title></title>
1900 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146418342</link>
1901 <description><pre><blockquote>Sun Apr 30 17:32:22 CDT 2006<br>a/hotplug-2004_09_23-noarch-7.tgz: Blacklisted the wireless access point<br> modules (hostap*) as they can interfere with normal usage of the interface.<br> Thanks to Piter Punk.<br>ap/espgs-8.15.2-i486-1.tgz: Upgraded to espgs-8.15.2.<br>l/alsa-driver-1.0.11_2.4.32-i486-2.tgz: Patched a problem with the<br> via82xx driver. Thanks to user MysticMgcn for entering the bug report,<br> to Ismael Cortes for getting me a copy of the patch from ALSA's Hg<br> repository, and to ALSA developer Takashi Iwai for the fix itself.<br>l/alsa-lib-1.0.11-i486-1.tgz: Moved from /testing.<br>n/nmap-4.03-i486-1.tgz: Upgraded to nmap-4.03.<br>n/proftpd-1.3.0-i486-1.tgz: Upgraded to proftpd-1.3.0.<br>n/tin-1.8.2-i486-1.tgz: Upgraded to tin-1.8.2.<br>n/wireless-tools-28-i486-1.tgz: Upgraded to wireless_tools.28.<br> Thanks to Eric Hameleers for the new version of rc.wireless.<br>xap/mozilla-thunderbird-1.5.0.2-i686-1.tgz: Upgraded to thunderbird-1.5.0.2.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#thunderbird<br> (* Security fix *)<br>testing/packages/linux-2.6.16.9/alsa-driver-1.0.11_2.6.16.9-i486-2.tgz:<br> Patched to fix via82xx driver.<br></blockquote></pre></description>
1902 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1146418342</guid>
1903 <pubDate>Sun, 30 Apr 2006 17:32:22 +0000</pubDate>
1904 </item>
1905 <item>
1906 <title></title>
1907 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1145888990</link>
1908 <description><pre><blockquote>Mon Apr 24 14:29:50 CDT 2006<br>a/hotplug-2004_09_23-noarch-6.tgz: Patched rc.hotplug.<br> On 2.4 kernels use /sbin/hotplug for hotpluging, but on 2.6 kernels use<br> /sbin/udevsend (if udev is being used) instead. This should work better<br> on systems using 2.6 kernels with udev and HAL. Among the people pushing<br> for this change for a while: Jon Grosshart, Piter Punk, and Eugene Crosser.<br> Blacklisted hw_random after reports that it causes some systems to crash.<br> Note that rc.hotplug is now installed as rc.hotplug.new, but upgradepkg<br> will still replace it for one more package iteration. This will cause<br> hotplug to be made executable on machines where it currently is not, so<br> be aware of that.<br>a/slocate-3.1-i486-1.tgz: Upgraded to slocate-3.1.<br> This uses a new database format, so you'll have to wait for the cron job or<br> run "updatedb -c /etc/updatedb.conf" as root. Thanks to Piotr Simon and <br> Erik Jan Tromp for pointing out that the docs for the previous package were<br> installed with incorrect permissions.<br>a/udev-071-i486-1.tgz: Upgraded to udev-071.<br> Set ttyUSB devices to mode 660 so that users in group tty can use them.<br> Get rid of the 10-udev.hotplug -> /sbin/udevsend symlink in<br> /etc/hotplug.d/default. This fixes a race condition with using the hotplug<br> event handling system now enabled by default in the latest udev.rules.<br> Another nice effect of this is that udevd no longer runs needlessly on 2.4<br> systems. WARNING: any existing udev.rules file will be overwritten, so save<br> your old file if you have custom rules you'd like to merge in).<br> Based on ideas suggested by Eugene Crosser, Piter Punk, and myself.<br> In /etc/udev/scripts/make_extra_nodes.sh and floppy-extra-devs.sh, use<br> ${udev_root} instead of hardcoding /dev. Thanks to Andreas Schnaiter.<br> In /etc/udev/scripts/make_extra_nodes.sh, fixed a bug that caused a bad<br> cdrom -> pktcdvd/control symlink to be created if the pktcdvd driver was<br> loaded prior to running the make_extra_nodes.sh script.<br> Thanks to Kenneth Pettersen for the bug report and fix, and to Giovanni<br> Quadriglio who also reported the issue.<br> Finally, thanks to Piter Punk for his continued exploration of udev's<br> bleeding edge. What's going on there is quite interesting, but there are<br> still some issues that have led me to decide it's best to take small steps<br> in that direction. For example, it was nice to be able to populate /dev<br> before checking the partitions and mounting them read-write, and it seems<br> that won't be possible any longer. I've had other reports of hardware that<br> wasn't hotplugged correctly, too (and ran into some myself). Mostly it<br> seems to be a question of figuring out the proper place in the boot process<br> to put udev, but there are also a lot of things we're left to figure out<br> concerning the udev rules. We'll get there, but maybe not in the next<br> release. This upgrade to udev-071 meets the minimum requirement in the<br> 2.6.16.9 Documentation/Changes file, and has been heavily tested here and<br> found to work well. udev-090 boot the machine faster, but isn't as<br> reliable (at least in testing here, with how it's called from our init<br> scripts), and I've never been in favor of trading reliability for speed.<br>ap/alsa-utils-1.0.11-i486-1.tgz: Upgraded to alsa-utils-1.0.11.<br>ap/mysql-5.0.20a-i486-1.tgz: Upgraded to mysql-5.0.20a.<br>d/guile-1.8.0-i486-1.tgz: Upgraded to guile-1.8.0.<br> I don't think anything in Slackware depends on guile any more, and that the<br> only thing that ever did was a solitaire game in GNOME. Since the GNOME<br> distributions for Slackware are already including their own guile packages,<br> I'm considering this package for removal. How generally useful is it?<br> Perhaps something like Ruby in the D series instead would be more useful.<br>l/alsa-driver-1.0.11_2.4.32-i486-1.tgz: Upgraded to alsa-driver-1.0.11,<br> compiled for Linux 2.4.32.<br>l/alsa-lib-1.0.11rc4-i486-1.tgz: Upgraded to alsa-lib-1.0.11rc4.<br> The reason for 11rc4 rather than 11 is that there was a new subsystem added<br> (src/pcm_rate_linear.c) in 11rc5, that I suspect causes aRts to break on<br> at least one system using snd-via82xx and/or snd-ac97-codec -- aRts bails<br> with a message about a CPU overload. The exact chipset is:<br> VIA Technologies, Inc. VT8233/A/8235/8237 AC97 Audio Controller (rev 60)<br> It would seem to me that rc4->rc5 was kind of a risky time in the release<br> cycle to introduce such a massive change to the codebase. In any case,<br> I think it's prudent to stick with alsa-lib-1.0.11rc4 as the default<br> alsa-lib version until this gets sorted out upstream.<br>l/alsa-oss-1.0.11-i486-1.tgz: Upgraded to alsa-oss-1.0.11.<br>l/libungif-4.1.4-i486-2.tgz: Fixed libgif.so* symlinks.<br> Thanks to Wim Speekenbrink.<br>xap/imagemagick-6.2.7_0-i486-1.tgz: Upgraded to ImageMagick-6.2.7-0.<br>xap/mozilla-1.7.13-i486-1.tgz: Upgraded to mozilla-1.7.13.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla<br> This release marks the end-of-life of the Mozilla 1.7.x series:<br> http://developer.mozilla.org/devnews/index.php/2006/04/12/sunset-announcement-for-fxtb-10x-and-mozilla-suite-17x/<br> Mozilla Corporation is recommending that users upgrade to Firefox and<br> Thunderbird, but if you're a fan of the style of the Mozilla Suite, I'd<br> recommend SeaMonkey myself. There's a good chance that Mozilla will not<br> ship in the next Slackware release, and SeaMonkey will ship in its place.<br> I'd been wondering which way to go with that, but getting an official<br> EOL statement about the Mozilla Suite makes it seem like the switch to<br> SeaMonkey should happen sooner rather than later.<br> (* Security fix *)<br>extra/slacktrack/slacktrack-1.29-i486-1.tgz: Upgraded to slacktrack-1.29-1.<br>testing/packages/alsa-lib-1.0.11-i486-1.tgz: Added alsa-lib-1.0.11. This is<br> primarily intended for people to verify the issue with VIA sound, look for<br> a similar issue with other chipsets as well (seems possible, since the issue<br> isn't in any VIA specific code in alsa-driver), and report any useful<br> information found to the upstream developers:<br> https://bugtrack.alsa-project.org/alsa-bug/<br> I reported the issue via (ha;) email, but not through the bug track system.<br> The developer I contacted couldn't reproduce the issue and didn't think it<br> had anything to do with the rate plugin additions. If other folks test<br> alsa-lib-1.0.11 and run into this, and have the time to jump through the<br> hoops needed to report the bug at the URL above, I'd appreciate the help.<br> At least it would demonstrate that it's not just my machine...<br>testing/packages/linux-2.6.16.9/alsa-driver-1.0.11_2.6.16.9-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.11 compiled for Linux 2.6.16.9.<br>testing/packages/linux-2.6.16.9/kernel-generic-2.6.16.9-i486-1.tgz:<br> Upgraded to Linux 2.6.16.9 generic kernel.<br>testing/packages/linux-2.6.16.9/kernel-headers-2.6.16.9-i386-1.tgz:<br> Upgraded to Linux 2.6.16.9 kernel headers.<br>testing/packages/linux-2.6.16.9/kernel-modules-2.6.16.9-i486-1.tgz<br> Upgraded to Linux 2.6.16.9 kernel modules.<br>testing/packages/linux-2.6.16.9/kernel-source-2.6.16.9-noarch-1.tgz<br> Upgraded to Linux 2.6.16.9 kernel source.<br> BTW, I think 2.6.16.x, being the first kernel series in the 2.6 series that<br> has been promised some long-lived support, will be the 2.6 kernel you'll see<br> in the next Slackware release. If/when 2.6.17 (or 18, etc.) come out, don't<br> expect to see me chasing after it immediately. I'm looking for a kernel<br> that can be counted on for stability -- not the bleeding edge. Of course,<br> once 2.6.16.x is considered tested enough to leave /testing (and it does<br> seem close), perhaps a newer kernel might take its place here just for fun.<br> Oh and yes -- I did see that 2.6.16.10 is out, and I know that the test26.s<br> kernel wasn't yet updated. Due to the Mozilla situation, I can't delay this<br> update to be a $SUCKER some more, but you'll see 2.6.16.10 soon. That is,<br> if there isn't a newer one first...<br></blockquote></pre></description>
1909 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1145888990</guid>
1910 <pubDate>Mon, 24 Apr 2006 14:29:50 +0000</pubDate>
1911 </item>
1912 <item>
1913 <title></title>
1914 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1145236935</link>
1915 <description><pre><blockquote>Mon Apr 17 01:22:15 CDT 2006<br>kde/koffice-1.5.0-i486-1.tgz: Upgraded to koffice-1.5.0.<br>kdei/koffice-l10n-*.tgz: Upgraded to l10n packages for koffice-1.5.0.<br>l/gtk+2-2.8.17-i486-1.tgz: Upgraded to gtk+-2.8.17.<br>l/lcms-1.15-i486-1.tgz: Upgraded to lcms-1.15.<br>l/libexif-0.6.13-i486-1.tgz: Upgraded to libexif-0.6.13.<br>l/libidl-0.8.6-i486-1.tgz: Upgraded to libIDL-0.8.6.<br>l/libglade-2.5.1-i486-1.tgz: Upgraded to libglade-2.5.1.<br>l/libgsf-1.14.0-i486-1.tgz: Upgraded to libgsf-1.14.0.<br> This has changed the major library version from .1 to .114...<br>l/libidn-0.6.3-i486-1.tgz: Upgraded to libidn-0.6.3.<br>l/librsvg-2.14.3-i486-1.tgz: Upgraded to librsvg-2.14.3.<br>l/libtiff-3.8.2-i486-1.tgz: Upgraded to libtiff-3.8.2.<br>l/libungif-4.1.4-i486-1.tgz: Upgraded to libungif-4.1.4.<br>l/libwpd-0.8.4-i486-2.tgz: Recompiled against libgsf-1.14.0.<br>l/wv2-0.2.2-i486-2.tgz: Recompiled against libgsf-1.14.0.<br> Apparently, this needed a recompile anyway (with or without new<br> dependencies) in order to fix a compiler incompatibility issue<br> between gcc-3.3.x and gcc-3.4.x that was breaking .doc support<br> in KWord. Thanks to Marin Mitov and Andrey V. Panov for reporting<br> this issue.<br>n/fetchmail-6.3.4-i486-1.tgz: Upgraded to fetchmail-6.3.4.<br>n/getmail-4.6.0-noarch-1.tgz: Upgraded to getmail-4.6.0.<br>n/lftp-3.4.4-i486-1.tgz: Upgraded to lftp-3.4.4.<br>xap/fluxbox-0.9.15.1-i486-1.tgz: Upgraded to fluxbox-0.9.15.1.<br>xap/gimp-2.2.11-i486-1.tgz: Upgraded to gimp-2.2.11.<br>xap/mozilla-firefox-1.5.0.2-i686-1.tgz: Upgraded to firefox-1.5.0.2.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox<br> (* Security fix *)<br>extra/k3b/k3b-0.12.15-i486-1.tgz: Upgraded to k3b-0.12.15.<br>extra/k3b/k3b-i18n-0.12.15-noarch-1.tgz: Upgraded to k3b-i18n-0.12.15.<br>testing/packages/seamonkey-1.0.1-i486-1.tgz: Upgraded to seamonkey-1.0.1.<br> This upgrade fixes several possible security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#seamonkey<br> (* Security fix *)<br>In other news, I am aware of the expat-2.0 release, but this has a couple of<br>API changes (and a new major library number) and it will take some time for<br>upstream sources to patch for it. Therefore, expat-2.0 will not be used for<br>Slackware 11.0 (but might be included in /testing).<br>There's also a new gmp-4.2, but the shared libraries that are built by this<br>have lower numbers than the ones from gmp-4.1.4, so that's probably not going<br>to make the cut this time around, either.<br></blockquote></pre></description>
1916 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1145236935</guid>
1917 <pubDate>Mon, 17 Apr 2006 01:22:15 +0000</pubDate>
1918 </item>
1919 <item>
1920 <title></title>
1921 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1144173981</link>
1922 <description><pre><blockquote>Tue Apr 4 18:06:21 CDT 2006<br>d/make-3.81-i486-1.tgz: Upgraded to make-3.81. Long live make!<br>d/subversion-1.3.1-i486-1.tgz: Upgraded to subversion-1.3.1.<br>xap/xscreensaver-4.24-i486-1.tgz: Upgraded to xscreensaver-4.24.<br></blockquote></pre></description>
1923 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1144173981</guid>
1924 <pubDate>Tue, 04 Apr 2006 18:06:21 +0000</pubDate>
1925 </item>
1926 <item>
1927 <title></title>
1928 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1144099083</link>
1929 <description><pre><blockquote>Mon Apr 3 21:18:03 CDT 2006<br>a/findutils-4.2.27-i486-1.tgz: Upgraded to findutils-4.2.27.<br>d/python-2.4.3-i486-1.tgz: Upgraded to python-2.4.3.<br> This now links with Berkeley DB 4.4.x. :-)<br>d/python-demo-2.4.3-noarch-1.tgz: Upgraded to python-2.4.3 demos.<br>d/python-tools-2.4.3-noarch-1.tgz: Upgraded to python-2.4.3 tools.<br>kde/amarok-1.3.9-i486-1.tgz: Added amaroK 1.3.9, a media player for KDE.<br>kde/kdeaccessibility-3.5.2-i486-1.tgz: Upgraded to kdeaccessibility-3.5.2.<br>kde/kdeaddons-3.5.2-i486-1.tgz: Upgraded to kdeaddons-3.5.2.<br>kde/kdeadmin-3.5.2-i486-1.tgz: Upgraded to kdeadmin-3.5.2.<br>kde/kdeartwork-3.5.2-i486-1.tgz: Upgraded to kdeartwork-3.5.2.<br>kde/kdebase-3.5.2-i486-1.tgz: Upgraded to kdebase-3.5.2.<br>kde/kdebindings-3.5.2-i486-1.tgz: Upgraded to kdebindings-3.5.2.<br>kde/kdeedu-3.5.2-i486-1.tgz: Upgraded to kdeedu-3.5.2.<br>kde/kdegames-3.5.2-i486-1.tgz: Upgraded to kdegames-3.5.2.<br>kde/kdegraphics-3.5.2-i486-1.tgz: Upgraded to kdegraphics-3.5.2.<br>kde/kdelibs-3.5.2-i486-1.tgz: Upgraded to kdelibs-3.5.2.<br>kde/kdemultimedia-3.5.2-i486-1.tgz: Upgraded to kdemultimedia-3.5.2.<br>kde/kdenetwork-3.5.2-i486-1.tgz: Upgraded to kdenetwork-3.5.2.<br>kde/kdepim-3.5.2-i486-1.tgz: Upgraded to kdepim-3.5.2.<br>kde/kdesdk-3.5.2-i486-1.tgz: Upgraded to kdesdk-3.5.2.<br>kde/kdetoys-3.5.2-i486-1.tgz: Upgraded to kdetoys-3.5.2.<br>kde/kdeutils-3.5.2-i486-1.tgz: Upgraded to kdeutils-3.5.2.<br>kde/kdevelop-3.3.2-i486-1.tgz: Upgraded to kdevelop-3.3.2.<br>kde/kdewebdev-3.5.2-i486-1.tgz: Upgraded to kdewebdev-3.5.2.<br>kde/qt-3.3.6-i486-1.tgz: Upgraded to qt-x11-free-3.3.6.<br>kdei/kde-i18n-*-3.5.2-noarch-1.tgz: Upgraded to kde-i18n-3.5.2.<br>l/arts-1.5.2-i486-1.tgz: Upgraded to arts-1.5.2.<br>l/libmusicbrainz-2.1.2-i486-1.tgz: Added libmusicbrainz-2.1.2, a library for<br> searching a user-maintained community music metadatabase. This is used<br> to tag media files by libtunepimp.<br>l/libtunepimp-0.4.2-i486-1.tgz: Added libtunepimp-0.4.2. This is a library<br> used to support adding metadata tags to music files using the MusicBrainz<br> client libraries. These libraries are used by several media players to look<br> up track information. (e.g. in Slackware, JuK and amaroK so far)<br>n/rp-pppoe-3.8-i486-1.tgz: Upgraded to rp-pppoe-3.8.<br>xap/abiword-2.2.9-i486-1.tgz: Removed. More recent versions of AbiWord no<br> longer support compiling without GNOME, and it looks like all of the GNOME<br> distributions for Slackware are shipping GNOMEified (and newer) versions of <br> this package anyway.<br></blockquote></pre></description>
1930 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1144099083</guid>
1931 <pubDate>Mon, 03 Apr 2006 21:18:03 +0000</pubDate>
1932 </item>
1933 <item>
1934 <title></title>
1935 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143753877</link>
1936 <description><pre><blockquote>Thu Mar 30 21:24:37 CST 2006<br>n/rsync-2.6.7-i486-1.tgz: Upgraded to rsync-2.6.7.<br>n/samba-3.0.22-i486-1.tgz: Upgraded to samba-3.0.22.<br> This fixes a security issue in previous samba releases where secret machine<br> credentials may be written into a log file that is readable by anyone with<br> a login account on the machine. The issue affects only the samba-3.0.21<br> series (including patches a, b, and c.)<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1059<br> (* Security fix *)<br></blockquote></pre></description>
1937 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143753877</guid>
1938 <pubDate>Thu, 30 Mar 2006 21:24:37 +0000</pubDate>
1939 </item>
1940 <item>
1941 <title></title>
1942 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143405748</link>
1943 <description><pre><blockquote>Sun Mar 26 20:42:28 CST 2006<br>a/aaa_base-10.2.0-noarch-4.tgz: Chowned all binary directories to root:root.<br> /media and /svc will not be added at this time, as /mnt (with subdirectory<br> mount points such as /mnt/cdrom and /mnt/tmp) and /var were already<br> perfectly adequate for the purposes for which /media and /svc were proposed.<br> Polluting the root directory is, IMHO, completely pointless. I suppose in<br> the future that at least compatibility symlinks will need to be considered,<br> though...<br>a/bash-3.1.014-i486-1.tgz: Upgraded to bash-3.1 patchlevel 014.<br>a/jfsutils-1.1.10-i486-1.tgz: Upgraded to jfsutils-1.1.10.<br>a/module-init-tools-3.2.2-i486-1.tgz: Upgraded to module-init-tools-3.2.2.<br> This new version of module-init-tools has been patched to look for module<br> configuration information in /etc/modprobe.conf only for 2.4.x kernels.<br> For 2.6.x kernels, files found in the directory /etc/modprobe.d/ are used<br> instead. Eventually, /etc/modprobe.conf will be phased out in favor of<br> the /etc/modprobe.d/ approach. If you have anything in your<br> /etc/modprobe.conf that you need, and you are using a 2.6.x kernel, be sure<br> to copy the configuration to a file (or files) in /etc/modprobe.d/.<br> Hint: ALSA expects sound modules to be configured in /etc/modprobe.d/sound.<br>ap/groff-1.19.2-i486-1.tgz: Upgraded to groff-1.19.2.<br>ap/hpijs-2.1.4-i486-1.tgz: Upgraded to hpijs-2.1.4.<br> Thanks to Giovanni Venturi for the reminder.<br>ap/lsof-4.76-i486-1.tgz: Upgraded to lsof-4.76.<br>ap/most-4.10.2-i486-1.tgz: Upgraded to most-4.10.2.<br>ap/mysql-5.0.19-i486-1.tgz: Upgraded to mysql-5.0.19.<br>ap/sox-12.17.9-i486-1.tgz: Upgraded to sox-12.17.9.<br>ap/vim-6.4.010-i486-1.tgz: Upgraded to VIM 6.4.010.<br>ap/zsh-4.2.6-i486-1.tgz: Upgraded to zsh-4.2.6.<br>d/subversion-1.3.0-i486-2.tgz: Fixed broken apr include file permissions.<br> Thanks to Andreas Schnaiter for pointing this out.<br>n/curl-7.15.3-i486-1.tgz: Upgraded to curl-7.15.3.<br> This release fixes a security issue discovered by Ulf Harnhammar.<br> libcurl uses the given file part of a TFTP URL in a manner that allows a<br> malicious user to overflow a heap-based memory buffer due to the lack of<br> boundary check. This overflow happens if you pass in a URL with a TFTP<br> protocol prefix ("tftp://"), using a valid host and a path part that is<br> longer than 512 bytes. The affected flaw can be triggered by a redirect,<br> if curl/libcurl is told to follow redirects and an HTTP server points<br> the client to a tftp URL with the characteristics described above.<br> There is no known exploit at the time of this writing.<br> No stable version of Slackware is affected, as the flaw exists only in<br> the curl-7.15.x series prior to curl-7.15.3. <br> The cURL advisory may be found here:<br> http://curl.haxx.se/docs/adv_20060320.html<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061<br> (* Security fix *)<br>n/epic4-2.4-i486-1.tgz: Upgraded to epic4-2.4.<br>n/openldap-client-2.3.20-i486-1.tgz: Upgraded to openldap-2.3.20 client<br> libraries.<br>xap/xvim-6.4.010-i486-1.tgz: Upgraded to VIM 6.4.010 (with X support.)<br>extra/brltty/brltty-3.7.2-i486-1.tgz: Upgraded to brltty-3.7.2.<br>extra/emacspeak/emacspeak-23.0-i486-1.tgz: Upgraded to emacspeak-23.0.<br>extra/inn/inn-2.4.3-i486-1.tgz: Upgraded to inn-2.4.3 compiled against<br> libdb-4.2. Note that this package DOES NOT preserve configuration<br> files, so back them up first! Also, any database files will need to<br> be rebuilt due to the move from db-3.3 to db-4.2.<br>extra/slacktrack/slacktrack-1.28-i486-1.tgz: Upgraded to slacktrack-1.28_1.<br></blockquote></pre></description>
1944 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143405748</guid>
1945 <pubDate>Sun, 26 Mar 2006 20:42:28 +0000</pubDate>
1946 </item>
1947 <item>
1948 <title></title>
1949 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143032483</link>
1950 <description><pre><blockquote>Wed Mar 22 13:01:23 CST 2006<br>n/sendmail-8.13.6-i486-1.tgz: Upgraded to sendmail-8.13.6.<br> This new version of sendmail contains a fix for a security problem<br> discovered by Mark Dowd of ISS X-Force. From sendmail's advisory:<br> Sendmail was notified by security researchers at ISS that, under some<br> specific timing conditions, this vulnerability may permit a specifically<br> crafted attack to take over the sendmail MTA process, allowing remote<br> attackers to execute commands and run arbitrary programs on the system<br> running the MTA, affecting email delivery, or tampering with other<br> programs and data on this system. Sendmail is not aware of any public<br> exploit code for this vulnerability. This connection-oriented<br> vulnerability does not occur in the normal course of sending and<br> receiving email. It is only triggered when specific conditions are<br> created through SMTP connection layer commands.<br> Sendmail's complete advisory may be found here:<br> http://www.sendmail.com/company/advisory/index.shtml<br> The CVE entry for this issue may be found here:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058<br> (* Security fix *)<br>n/sendmail-cf-8.13.6-noarch-1.tgz: Upgraded to sendmail-8.13.6 configuration<br> files.<br></blockquote></pre></description>
1951 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1143032483</guid>
1952 <pubDate>Wed, 22 Mar 2006 13:01:23 +0000</pubDate>
1953 </item>
1954 <item>
1955 <title>6 updates</title>
1956 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142939847</link>
1957 <description><pre><blockquote>Tue Mar 21 11:17:27 CST 2006<br>x/x11-6.9.0-i486-3.tgz: Fixed /usr/X11R6/bin/Xorg, which due to being not<br> setuid root could not be used by non-root users. Thanks to the many people<br> who reported this issue. I tracked it down to a new (or rather, back again)<br> behavior of "chown", which is removing the suid/sgid bits from any file that<br> it touches. I remember this same situation from the old days, and it's<br> why many of the older package builds use a package skeleton and then install<br> binaries using "cat" -- this prevents the changing of the permissions.<br> If I recall correctly, "strip" also used to do this. Looking in the kernel<br> source, I see some mention in fs/open.c about doing this as a safety feature.<br> IMO, it doesn't seem like the right thing to do, though. If I want chmod,<br> I'll use it, thank you. However, it looks like the feature was added years<br> ago, and I have no idea why it has just recently kicked in. I've gone back<br> and tested on a Slackware 10.2 box, and it's also showing the same effects<br> with "chown", so it seems to me that this sort of breakage should have<br> been happening when the x11*-6.9.0-i486-1.tgz packages were built, too,<br> but Xorg was properly setuid in that package set. I tried dropping back<br> to the previous coreutils, and this also didn't help. It's a mystery.<br> Anyway, my first thought was to simply move the "chmod 4711" on Xorg to<br> after the last "chown" in the build script, but decided that the best way<br> to handle this is to begin phasing out the use of the "bin" group on<br> binaries and binary directories. There was never any use to this ever, so<br> far as I can tell. I think someone working on the FHS just thought that<br> root:bin looked nicer, or something. ;-) Most distributions install<br> binaries as root:root now anyway, and the latest standards no longer<br> require root:bin. Since it doesn't matter, don't expect everything to<br> change all at once -- don't send bug reports concerning files or <br> directories that "should be" root:bin or root:root. We will move away<br> from root:bin to root:root as new packages are built.<br> I sure hope "strip" doesn't start acting up next...<br>x/x11-devel-6.9.0-i486-3.tgz: Rebuilt. Really, there was no need to rebuild<br> this or the below packages, but I like a consistent build number when it's<br> not too much trouble to have it.<br>x/x11-xdmx-6.9.0-i486-3.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-3.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-3.tgz: Recompiled.<br>x/x11-docs-6.9.0-noarch-3.tgz: Rebuilt.<br>x/x11-docs-html-6.9.0-noarch-3.tgz: Rebuilt.<br>x/x11-fonts-100dpi-6.9.0-noarch-3.tgz: Rebuilt.<br>x/x11-fonts-cyrillic-6.9.0-noarch-3.tgz: Rebuilt.<br>x/x11-fonts-misc-6.9.0-noarch-3.tgz: Rebuilt.<br>x/x11-fonts-scale-6.9.0-noarch-3.tgz: Rebuilt.<br></blockquote></pre></description>
1958 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142939847</guid>
1959 <pubDate>Tue, 21 Mar 2006 11:17:27 +0000</pubDate>
1960 </item>
1961 <item>
1962 <title>6 updates</title>
1963 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142846955</link>
1964 <description><pre><blockquote>Mon Mar 20 09:29:15 CST 2006<br>x/x11-6.9.0-i486-2.tgz: Patched with x11r6.9.0-geteuid.diff.<br> From the x.org security page:<br> * March 20, 2006 - A security vulnerability has been found in the X.Org<br> server as shipped with X11R6.9.0 and X11R7.0 (xorg-server 1.0.0 and<br> 1.0.1) -- this is CVE-2006-0745. Local users were able to escalate<br> privileges to root and cause a DoS if the Xorg server was installed<br> setuid root (the default). Note that earlier releases are not<br> vulnerable.<br> For more information (eventually), see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0745<br> (* Security fix *)<br> Since this issue does not affect any stable/released version of Slackware,<br> there will no security advisory on the mailing list. Those running -current<br> should keep up with the ChangeLog to stay on top of new developments.<br>x/x11-devel-6.9.0-i486-2.tgz: Recompiled.<br>x/x11-xdmx-6.9.0-i486-2.tgz: Recompiled.<br>x/x11-xnest-6.9.0-i486-2.tgz: Recompiled.<br>x/x11-xvfb-6.9.0-i486-2.tgz: Recompiled.<br>testing/packages/linux-2.6.15.6/kernel-source-2.6.15.6-noarch-2.tgz:<br>x/x11-docs-6.9.0-noarch-2.tgz: Rebuilt.<br>x/x11-docs-html-6.9.0-noarch-2.tgz: Rebuilt.<br>x/x11-fonts-100dpi-6.9.0-noarch-2.tgz: Rebuilt.<br>x/x11-fonts-cyrillic-6.9.0-noarch-2.tgz: Rebuilt.<br>x/x11-fonts-misc-6.9.0-noarch-2.tgz: Rebuilt.<br>x/x11-fonts-scale-6.9.0-noarch-2.tgz: Rebuilt.<br> Removed spurious "asm" symlink in /. Thanks to xgizzmo.<br></blockquote></pre></description>
1965 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142846955</guid>
1966 <pubDate>Mon, 20 Mar 2006 09:29:15 +0000</pubDate>
1967 </item>
1968 <item>
1969 <title></title>
1970 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142613760</link>
1971 <description><pre><blockquote>Fri Mar 17 16:42:40 CST 2006<br>l/cairo-1.0.4-i486-1.tgz: Upgraded to cairo-1.0.4.<br>l/gtk+2-2.8.16-i486-1.tgz: Upgraded to gtk+-2.8.16.<br>n/dnsmasq-2.27-i486-1.tgz: Upgraded to dnsmasq-2.27.<br>Oh, and happy St. Patrick's day! :-)<br></blockquote></pre></description>
1972 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142613760</guid>
1973 <pubDate>Fri, 17 Mar 2006 16:42:40 +0000</pubDate>
1974 </item>
1975 <item>
1976 <title></title>
1977 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142359286</link>
1978 <description><pre><blockquote>Tue Mar 14 18:01:26 CST 2006<br>n/stunnel-4.15-i486-2.tgz: Fixed messed up /var/lib perms.<br> Thanks to Adam Dawidowski for the bug report.<br></blockquote></pre></description>
1979 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142359286</guid>
1980 <pubDate>Tue, 14 Mar 2006 18:01:26 +0000</pubDate>
1981 </item>
1982 <item>
1983 <title>1 update. Including a (* Security fix *)!</title>
1984 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142276037</link>
1985 <description><pre><blockquote>Mon Mar 13 18:53:57 CST 2006<br>a/aaa_base-10.2.0-noarch-3.tgz: Added /var/empty directory.<br>a/gawk-3.1.5-i486-2.tgz: Applied bugfix from the gawk mailing list to fix a<br> problem with newer glibc versions pulling that "*** free(): invalid pointer"<br> trick we all love. :-) Thanks to Grant for sending in a link to the fix.<br>a/glibc-solibs-2.3.6-i486-3.tgz: Recompiled against 2.4.32 and 2.6.15.6<br> kernel headers. Yes, I have seen that shiny-looking glibc-2.4 release on<br> ftp.gnu.org, but glibc-2.4 completely drops support for linuxthreads, and<br> therefore will not support vanilla Linux 2.4.x kernels. I don't think<br> we're quite ready for that yet around here.<br>a/glibc-zoneinfo-2.3.6-noarch-3.tgz: Updated timezone data from tzdata2006c.<br>a/kernel-ide-2.4.32-i486-3.tgz: Recompiled with gcc-3.4.6.<br>a/kernel-modules-2.4.32-i486-4.tgz: Recompiled with gcc-3.4.6.<br> Thanks to Piter Punk for all the help revising the default entries in <br> /etc/rc.d/rc.modules.new to be more accurate for 2.6.x kernels. I've tried<br> to make it function in the default state under 2.4.x kernels too, though<br> some of the modules have different names in 2.4 vs. 2.6...<br> Also thanks to Didier Spaier for suggesting an example for DMA usage in the <br> section of rc.modules that loads the parallel-port support.<br>d/gcc-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>d/gcc-g++-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>d/gcc-g77-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>d/gcc-gnat-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>d/gcc-java-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>d/gcc-objc-3.4.6-i486-1.tgz: Upgraded to gcc-3.4.6.<br>l/alsa-driver-1.0.11rc3_2.4.32-i486-1.tgz: Upgraded to alsa-driver-1.0.11rc3<br> compiled for Linux 2.4.32. The 2.6.15.6 kernel does not work properly using<br> the modules in alsa-driver-1.0.10, but works fine with these. Although I'm<br> normally against using release candidates, I thought in this case that the<br> version of alsa-driver used by the 2.4 and 2.6 kernels should be the same<br> since the package does install some header files that would overlap. It's<br> worked fine on both 2.4.32 and 2.6.15.6 here, and the other alsa-* packages<br> compile against it without errors (so I don't see a need to update those).<br> I think this will work, but let me know if this upgrade causes any problems.<br>l/db44-4.4.20-i486-1.tgz: For consistency, change the name of this package from<br> db4 to db44, and move the header files into /usr/include/db44/, since that's<br> the directory where the next version of Python will be looking for them.<br> Oh, and on that topic, I've had a few people send in or provide links to<br> patches that fix compiling the latest Python with db-4.4. Thanks, but it's<br> still a more conservative approach to wait until db-4.4 is officially<br> supported upstream. BTW, none of the patches were exactly the same. :-)<br> db-4.3 would also work, but it's probably not worth introducing yet-another<br> already old version of db over.<br> Added the --enable-cxx option. (Suggested by Kevin Brammer)<br>l/glibc-2.3.6-i486-3.tgz: Recompiled against 2.4.32 and 2.6.15.6 kernel<br> headers. Added /var/run/nscd/ directory (thanks to Dirk van Deun).<br> Updated timezone data from tzdata2006c.<br>l/glibc-profile-2.3.6-i486-3.tgz: Recompiled against 2.4.32 and 2.6.15.6<br>l/gtk+2-2.8.14-i486-1.tgz: Upgraded to gtk+2-2.8.14.<br>n/gnupg-1.4.2.2-i486-1.tgz: Upgraded to gnupg-1.4.2.2.<br>n/popa3d-1.0.1-i486-1.tgz: Upgraded to popa3d-1.0.1.<br>n/stunnel-4.15-i486-1.tgz: Upgraded to stunnel-4.15.<br>bootdisks/*: Rebuilt using the recompiled 2.4.32 kernels.<br>extra/k3b/k3b-0.12.14-i486-1.tgz: Upgraded to k3b-0.12.14.<br>extra/k3b/k3b-i18n-0.12.14-noarch-1.tgz: Upgraded to k3b-i18n-0.12.14.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.32-i486-3.tgz:<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.3_2.6.15.6-i486-1.tgz:<br>kernels/*.?/*: Recompiled 2.4.32 kernels with gcc-3.4.6, upgraded<br>pasture/gnupg-1.2.7-i486-1.tgz: This can rest here for a little while<br>testing/packages/linux-2.6.15.6/alsa-driver-1.0.11rc3_2.6.15.6-i486-1.tgz<br>testing/packages/linux-2.6.15.6/kernel-generic-2.6.15.6-i486-1.tgz<br>testing/packages/linux-2.6.15.6/kernel-headers-2.6.15.6-i386-1.tgz<br>testing/packages/linux-2.6.15.6/kernel-modules-2.6.15.6-i486-1.tgz<br>testing/packages/linux-2.6.15.6/kernel-source-2.6.15.6-noarch-1.tgz<br>l/glibc-i18n-2.3.6-noarch-3.tgz: Rebuilt.<br> kernel headers.<br> There have been two security related issues reported recently with GnuPG.<br> From the GnuPG 1.4.2.1 and 1.4.2.2 NEWS files:<br> Noteworthy changes in version 1.4.2.2 (2006-03-08)<br> * Files containing several signed messages are not allowed any<br> longer as there is no clean way to report the status of such<br> files back to the caller. To partly revert to the old behaviour<br> the new option --allow-multisig-verification may be used.<br> Noteworthy changes in version 1.4.2.1 (2006-02-14)<br> * Security fix for a verification weakness in gpgv. Some input<br> could lead to gpgv exiting with 0 even if the detached signature<br> file did not carry any signature. This is not as fatal as it<br> might seem because the suggestion as always been not to rely on<br> th exit code but to parse the --status-fd messages. However it<br> is likely that gpgv is used in that simplified way and thus we<br> do this release. Same problem with "gpg --verify" but nobody<br> should have used this for signature verification without<br> checking the status codes anyway. Thanks to the taviso from<br> Gentoo for reporting this problem.<br> (* Security fix *)<br> Recompiled with gcc-3.4.6.<br> Recompiled with gcc-3.4.6 for Linux 2.6.15.6.<br> test26.s kernel to 2.6.15.6.<br> just in case gnupg-1.4.2.2 causes any problems, but I doubt it will.<br> I also think gnupg-1.2.7 is still secure when used securely (if that<br> makes any sense ;-), or I wouldn't even leave it in /pasture...<br> Upgraded to alsa-driver-1.0.11rc3 compiled for Linux 2.6.15.6.<br> This should fix the "free_hot_cold_page" issue that was occuring with<br> alsa-driver-1.0.10 and the 2.6.15+ kernels. It fixes it here,<br> anyway. :-)<br> Upgraded to Linux 2.6.15.6 generic kernel.<br> Upgraded to Linux 2.6.15.6 kernel headers.<br> Upgraded to Linux 2.6.15.6 kernel modules.<br> Upgraded to Linux 2.6.15.6 kernel source.<br></blockquote></pre></description>
1986 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1142276037</guid>
1987 <pubDate>Mon, 13 Mar 2006 18:53:57 +0000</pubDate>
1988 </item>
1989 <item>
1990 <title>2 updates</title>
1991 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141502066</link>
1992 <description><pre><blockquote>Sat Mar 4 19:54:26 CST 2006<br>a/xfsprogs-2.7.11-i486-2.tgz: Fixed .gz.gz double compression on<br> the manpages. Turns out they were already installed compressed.<br> Thanks to Dave Fullerton.<br> Fixed /usr/lib/libhandle.so symlink.<br> Thanks to Luigi Genoni.<br>ap/dmapi-2.2.3-i486-2.tgz: Fixed /usr/lib/libdm.so symlink.<br> Thanks to Luigi Genoni.<br>ap/xfsdump-2.2.33-i486-2.tgz: Recompiled to link with libhandle.<br>d/python-2.4.2-i486-2.tgz: Recompiled against Berkeley DB 4.2.52<br> to get _bsddb.so and dbm.so to build. Python finds the db-4.2.52<br> headers fine in /usr/include/db42/, so I guess that's the right<br> place for them. :-)<br>l/db42-4.2.52-i486-3.tgz: Added a db-4.2.52 package (called db42)<br>n/proftpd-1.3.0rc4-i486-1.tgz: Upgraded to proftpd-1.3.0rc4.<br>d/python-demo-2.4.2-noarch-2.tgz: Rebuilt.<br>d/python-tools-2.4.2-noarch-2.tgz: Rebuilt.<br> as a non-default version of Berkeley DB 4.x, since some things<br> still aren't ready for db-4.4.x, and it's probably best not to<br> force the issue until the changes needed for db-4.4.x are made<br> upstream where needed. Oh, I've had a report that subversion-1.3.0<br> isn't working with db-4.4.x -- can anyone confirm this? I'm not<br> running any kind of test repository here, so feedback on whether<br> subversion could use a recompile against db-4.2 would be helpful.<br></blockquote></pre></description>
1993 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141502066</guid>
1994 <pubDate>Sat, 04 Mar 2006 19:54:26 +0000</pubDate>
1995 </item>
1996 <item>
1997 <title></title>
1998 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141244756</link>
1999 <description><pre><blockquote>Wed Mar 1 20:25:56 CST 2006<br>a/coreutils-5.94-i486-2.tgz: Restored ginstall -> install symlinks<br> which are still needed to build some things. Thanks to Rich.<br>extra/bash-completion/bash-completion-20060301-noarch-1.tgz:<br> Upgraded to bash-completion-20060301.<br></blockquote></pre></description>
2000 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141244756</guid>
2001 <pubDate>Wed, 01 Mar 2006 20:25:56 +0000</pubDate>
2002 </item>
2003 <item>
2004 <title></title>
2005 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141159844</link>
2006 <description><pre><blockquote>Tue Feb 28 20:50:44 CST 2006<br>a/bash-3.1-i486-3.tgz: Patched with additional official patches<br> bash31-008 through bash31-011.<br>a/util-linux-2.12r-i486-1.tgz: Upgraded to util-linux-2.12r.<br>a/xfsprogs-2.7.11-i486-1.tgz: Upgraded to xfsprogs-2.7.11.<br> Split acl, attr, dmapi, and xfsdump into separate packages and<br> moved them into the AP series. This location was a bit of a judgement<br> call since acl, attr, and dmapi contain libraries, but so do some other<br> packages outside L. Anyway, it does seem to me that xfsdump should go<br> in AP, and that these packages should all be found in the same place.<br>ap/acl-2.2.34-i486-1.tgz: Upgraded to acl-2.2.34, split out of xfsprogs<br> package.<br>ap/attr-2.4.28-i486-1.tgz: Upgraded to attr-2.4.28, split out of xfsprogs<br> package.<br>ap/dmapi-2.2.3-i486-1.tgz: Upgraded to dmapi-2.2.3, split out of xfsprogs<br> package.<br>ap/xfsdump-2.2.33-i486-1.tgz: Upgraded to xfsdump-2.2.33, split out of<br> xfsprogs package.<br>d/clisp-2.38-i486-2.tgz: Added some additional modules for CLISP.<br> Thanks to Bradley Reed for the hint.<br>f/linux-faqs-20060228-noarch-1.tgz: Updated from ibiblio.org.<br>f/linux-howtos-20060228-noarch-1.tgz: Upgraded to Linux-HOWTOs-20060228.<br>l/gtk+2-2.8.13-i486-1.tgz: Upgraded to gtk+-2.8.13.<br>l/pango-1.10.4-i486-1.tgz: Upgraded to pango-1.10.4.<br>n/bind-9.3.2-i486-3.tgz: Modified rc.bind to try to use rndc to stop the<br> nameserver before resorting to killall, and added some additional comments<br> about loading the "capability" module on 2.6+ kernels.<br>n/samba-3.0.21c-i486-1.tgz: Upgraded to samba-3.0.21c.<br></blockquote></pre></description>
2007 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1141159844</guid>
2008 <pubDate>Tue, 28 Feb 2006 20:50:44 +0000</pubDate>
2009 </item>
2010 <item>
2011 <title></title>
2012 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1140445217</link>
2013 <description><pre><blockquote>Mon Feb 20 14:20:17 CST 2006<br>ap/dvd+rw-tools-6.1-i486-1.tgz: Upgraded to dvd+rw-tools-6.1.<br>kdei/kde-i18n-sv-3.5.1-noarch-1a.tgz: Fixed with a rebuild. Thanks to<br> Nille Kungen for pointing out that the -1 package was missing files.<br>n/bind-9.3.2-i486-2.tgz: Patched to remove the use of the obsolete setsockopt<br> SO_BSDCOMPAT that was putting annoying warnings in /var/log/syslog when bind<br> binaries were run under a 2.6.x kernel. Thanks to Marin Glibic.<br> Fixed missing nslookup.1 man page. Thanks to Lior Kadosh.<br>n/tin-1.8.1-i486-1.tgz: Upgraded to tin-1.8.1.<br></blockquote></pre></description>
2014 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1140445217</guid>
2015 <pubDate>Mon, 20 Feb 2006 14:20:17 +0000</pubDate>
2016 </item>
2017 <item>
2018 <title></title>
2019 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1140098486</link>
2020 <description><pre><blockquote>Thu Feb 16 14:01:26 CST 2006<br>OK, I think I have everything that used libreadline.so.4 recompiled<br>with the exception of AbiWord, as the --disable-gnome option no<br>longer seems to work with abiword-2.4.2 -- it still demands<br>libgnomeprint and all of its dependencies. Anyone know a way around<br>this one? If not, AbiWord will likely be removed soon. It's<br>included in all of the GNOME distributions for Slackware anyway...<br>a/bash-3.1-i486-2.tgz: Applied official bash patches 006 and 007.<br>a/coreutils-5.94-i486-1.tgz: Upgraded to coreutils-5.94.<br>a/sed-4.1.5-i486-1.tgz: Upgraded to sed-4.1.5.<br>ap/bc-1.06-i486-3.tgz: Recompiled with new libreadline.<br>ap/gimp-print-4.2.7-i486-2.tgz: Recompiled with new libreadline.<br>ap/rzip-2.1-i486-1.tgz: Upgraded to rzip-2.1.<br>d/guile-1.6.7-i486-2.tgz: Recompiled with new libreadline.<br>l/gtk+2-2.8.12-i486-1.tgz: Upgraded to gtk+2-2.8.12.<br>l/pilot-link-0.11.8-i486-3.tgz: Recompiled with new libreadline.<br>n/ntp-4.2.0a-i486-1.tgz: Upgraded to ntp-stable-4.2.0a-20060127<br> compiled with new libreadline.<br>xap/fvwm-2.4.19-i486-5.tgz: Recompiled with new libreadline.<br>xap/gftp-2.0.18-i486-2.tgz: Recompiled with new libreadline.<br>xap/gnuchess-5.07-i486-2.tgz: Recompiled with new libreadline.<br>xap/xine-ui-0.99.4-i686-2.tgz: Recompiled with new libreadline.<br>extra/parted/parted-1.6.25.1-i486-1.tgz: Upgraded to parted-1.6.25.1,<br> compiled with new libreadline.<br>testing/packages/gnupg-1.4.2.1-i486-1.tgz: Upgraded to gnupg-1.4.2.1.<br> This fixes an issue where gpg could exit with zero in certain cases<br> where a detached "signature" actually contained no signature.<br> However, according to the NEWS file "nobody should have used this<br> for signature verification without checking the status codes" with<br> --status-fd. Considering that (and especially this package's placement<br> in the /testing directory) I'm not going to issue an advisory here,<br> though the NEWS file does admit it is a security weakness.<br></blockquote></pre></description>
2021 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1140098486</guid>
2022 <pubDate>Thu, 16 Feb 2006 14:01:26 +0000</pubDate>
2023 </item>
2024 <item>
2025 <title></title>
2026 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139933332</link>
2027 <description><pre><blockquote>Tue Feb 14 16:08:52 CST 2006<br>n/php-4.4.2-i486-3.tgz: Fixed some more bugs from the 4.4.2 release...<br> hopefully the third time is the charm.<br> Replaced PEAR packages for which the 4.4.2 release contained incorrect<br> md5sums: Archive_Tar-1.3.1, Console_Getopt-1.2, and HTML_Template_IT-1.1.3.<br> (this last one was also not upgraded to the stable version that was released<br> on 2005-11-01) Sorry to have delayed the advisories, but these bugs had to<br> be fixed first. IMHO, the security issues are of dubious severity anyway,<br> or a more agressive approach would have been taken (though this would likely<br> have caused a lot of people to upgrade to the broken -1 or -2 package<br> revisions, so anyone who didn't know about this until now was probably saved<br> a hassle.)<br> Upgraded other PEAR modules to HTTP-1.4.0, Net_SMTP-1.2.8, and XML_RPC-1.4.5.<br> Thanks again to Krzysztof Oledzki for the bug report.<br>testing/packages/php-5.1.2/php-5.1.2-i486-2.tgz: The same junk<br> dotfiles were installed in php-5.1.2, too. Cleaned them out<br> of the root directory of the package. Thanks to Tyler McGrath<br> for reporting this.<br></blockquote></pre></description>
2028 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139933332</guid>
2029 <pubDate>Tue, 14 Feb 2006 16:08:52 +0000</pubDate>
2030 </item>
2031 <item>
2032 <title></title>
2033 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139598433</link>
2034 <description><pre><blockquote>Fri Feb 10 19:07:13 CST 2006<br>ap/man-1.6c-i486-2.tgz: Reversed man-1.6c change that caused<br> makewhatis to break. Thanks to Robby Workman for the patch.<br>n/php-4.4.2-i486-2.tgz: Rebuilt the package to clean up some junk<br> dotfiles that were installed in the / directory. Harmless, but<br> sloppy... Thanks to Krzysztof Oledzki for pointing this out.<br></blockquote></pre></description>
2035 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139598433</guid>
2036 <pubDate>Fri, 10 Feb 2006 19:07:13 +0000</pubDate>
2037 </item>
2038 <item>
2039 <title>1 update. Including a (* Security fix *)!</title>
2040 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139505865</link>
2041 <description><pre><blockquote>Thu Feb 9 17:24:25 CST 2006<br>a/aaa_elflibs-10.2.0-i486-4.tgz: Added /lib/libgcc_s.so.1 -><br> /usr/lib/libgcc_s.so.1 symlink, needed by Oracle 10g RAC support.<br> Thanks to Luigi Genoni.<br> Upgraded various other libraries.<br>a/bash-3.1-i486-1.tgz: Upgraded to bash-3.1.<br>a/coreutils-5.93-i486-1.tgz: Upgraded to coreutils-5.93.<br> The DEFAULT_POSIX2_VERSION=199209 is set to provide more<br> traditional behavior (thanks to Eric Hameleers), but this may change<br> in the future as the newer standards are accepted. Added<br> the uname patch (suggested by many), and moved color ls setup<br> out of /etc/profile and /etc/csh.login and into scripts in<br> /etc/profile.d/. These scripts also replace some functionality<br> (setting up aliases and defaults) that is no longer part of the<br> dircolors tool.<br>a/cups-1.1.23-i486-2.tgz: Recompiled against new OpenSSL.<br>a/cxxlibs-6.0.3-i486-1.tgz: Upgraded to libstdc++ from gcc-3.4.5.<br>a/etc-5.1-noarch-11.tgz: Removed color ls setup from /etc/profile<br> and /etc/csh.login. Fixed csh.login in cases where $TERM or $MANPATH<br> are not set. (thanks to Jim Diamond)<br>a/gettext-0.14.5-i486-1.tgz: Upgraded to gettext-0.14.5.<br>a/glibc-solibs-2.3.6-i486-2.tgz: Recompiled with gcc-3.4.5<br> against the 2.4.32 and 2.6.15.3 kernel headers.<br>a/glibc-zoneinfo-2.3.6-noarch-2.tgz: Recompiled.<br>a/gpm-1.20.1-i486-1.tgz: Upgraded to gpm-1.20.1, with many, many patches.<br>a/openssl-solibs-0.9.8a-i486-1.tgz: Upgraded to openssl-0.9.8a.<br> This may require many things to be recompiled. Let me know if I<br> skipped anything that matters. :-)<br>a/pkgtools-10.2.0-i486-6.tgz: Upgraded subset of terminfo database from<br> ncurses-5.5. Upgraded to dialog-1.0-20060126.<br>a/procps-3.2.6-i486-1.tgz: Upgraded to procps-3.2.6.<br>a/tcsh-6.14.00-i486-2.tgz: Patched to remove built-in color ls, as the new<br> coreutils adds an 'su' feature to the shared $LS_COLORS variable that<br> causes tcsh to exit. Perhaps tcsh should use a different variable name or<br> be less strict about using LS_COLORS? The GNU ls version is probably<br> better for most purposes anyway, though.<br>ap/espgs-8.15.1-i486-1.tgz: Upgraded to espgs-8.15.1.<br>ap/linuxdoc-tools-0.9.21-i486-1.tgz: Added linuxdoc-tools-0.9.21.<br> This package replaces the sgml-tools package and should contain the<br> essentials needed to handle modern Linux Docbook/SGML documents. Huge<br> thanks are due to Stuart Winter for doing most of the work on transitioning<br> Slackware from the old sgml-tools system to this one! :-)<br>ap/man-1.6c-i486-1.tgz: Upgraded to man-1.6c.<br>ap/man-pages-2.22-noarch-1.tgz: Upgraded to man-pages-2.22.<br>ap/mdadm-2.3.1-i486-1.tgz: Upgraded to mdadm-2.3.1.<br>ap/mysql-5.0.18-i486-1.tgz: Upgraded to mysql-5.0.18.<br> (this will require everything linked to MySQL libs to be recompiled)<br>ap/sgml-tools-1.0.9-i486-12.tgz: Removed. (replaced with linuxdoc-tools)<br>ap/sudo-1.6.8p12-i486-1.tgz: Upgraded to sudo-1.6.8p12.<br> This fixes an issue where a user able to run a Python script through sudo<br> may be able to gain root access.<br> IMHO, running any kind of scripting language from sudo is still not safe...<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0151<br> (* Security fix *)<br>ap/vorbis-tools-1.1.1-i486-2.tgz: Recompiled.<br>d/automake-1.9.6-noarch-1.tgz: Upgraded to automake-1.9.6.<br>d/bison-2.1-i486-1.tgz: Upgraded to bison-2.1.<br> I think enough of the upstream sources are expecting bison-2.x now, but let<br> me know if you find breakage (for which patches or pointers to upgrades<br> would be welcome.)<br>d/clisp-2.38-i486-1.tgz: Upgraded to clisp-2.38.<br>d/doxygen-1.4.6-i486-1.tgz: Upgraded to doxygen-1.4.6.<br>d/gdb-6.4-i486-1.tgz: Upgraded to gdb-6.4.<br>d/gettext-tools-0.14.5-i486-1.tgz: Upgraded to gettext-0.14.5 tools.<br>d/m4-1.4.4-i486-1.tgz: Upgraded to m4-1.4.4.<br>d/make-3.80-i486-2.tgz: Fixed an out-of-memory bug in make, since<br> nobody upstream seems concerned about putting out a fixed make<br> release any time soon. Is "make" dead? ;-)<br> Reported here by: Mihnea-Costin Grigore, penguinista, and ePAc.<br>d/nasm-0.98.39-i486-1.tgz: Upgraded to nasm-0.98.39.<br>d/perl-5.8.8-i486-1.tgz: Upgraded to perl-5.8.8 and DBI-1.50.<br>d/pkgconfig-0.20-i486-1.tgz: Upgraded to pkgconfig-0.20.<br>d/python-2.4.2-i486-1.tgz: Upgraded to python-2.4.2.<br> The bsddb module didn't build against the new 4.4.x version of<br> Berkeley DB. Does anyone care? Or perhaps have a patch? :-)<br>d/python-demo-2.4.2-noarch-1.tgz: Upgraded to python-2.4.2 demos.<br>d/python-tools-2.4.2-noarch-1.tgz: Upgraded to python-2.4.2 tools.<br>d/strace-4.5.14-i486-1.tgz: Upgraded to strace-4.5.14.<br>kde/k*.tgz: Upgraded to KDE 3.5.1.<br>kde/koffice-1.4.2-i486-1.tgz: Upgraded to koffice-1.4.2.<br>kde/qt-3.3.5-i486-1.tgz: Upgraded to qt-3.3.5.<br>l/arts-1.5.1-i486-1.tgz: Upgraded to arts-1.5.1.<br>l/aspell-0.60.2-i486-2.tgz: Recompiled.<br>l/atk-1.10.3-i486-1.tgz: Upgraded to atk-1.10.3.<br>l/cairo-1.0.2-i486-1.tgz: Added cairo graphics library for GTK+2.<br>l/db4-4.4.20-i486-1.tgz: Upgraded to Berkeley DB 4.4.20. This will<br> require rebuilding any databases that use the older spec as things<br> are recompiled to use this, and I'm planning to do that whereever<br> possible. Just be glad I don't do this with every new BDB release<br> like I used to. :-)<br>l/glib2-2.8.6-i486-1.tgz: Upgraded to glib-2.8.6.<br>l/glibc-2.3.6-i486-2.tgz: Recompiled with gcc-3.4.5<br> against the 2.4.32 and 2.6.15.3 kernel headers.<br>l/glibc-profile-2.3.6-i486-2.tgz: Recompiled with gcc-3.4.5<br>l/gmp-4.1.4-i486-3.tgz: Recompiled.<br>l/gtk+2-2.8.11-i486-1.tgz: Upgraded to gtk+-2.8.11.<br>l/jre-1_5_0_06-i586-1.tgz: Upgraded to Java(TM) 2 Platform Standard Edition<br>l/libogg-1.1.3-i486-1.tgz: Upgraded to libogg-1.1.3.<br>l/libtiff-3.7.4-i486-1.tgz: Upgraded to libtiff-3.7.4.<br>l/libvorbis-1.1.2-i486-1.tgz: Upgraded to libvorbis-1.1.2.<br>l/libwpd-0.8.4-i486-1.tgz: Upgraded to libwpd-0.8.4.<br>l/libxml2-2.6.23-i486-1.tgz: Upgraded to libxml2-2.6.23.<br>l/ncurses-5.5-i486-1.tgz: Upgraded to ncurses-5.5.<br>l/pango-1.10.3-i486-1.tgz: Upgraded to pango-1.10.3.<br>l/pcre-6.4-i486-2.tgz: Recompiled.<br>l/readline-5.1-i486-1.tgz: Upgraded to readline-5.1.<br>l/sdl-1.2.9-i486-2.tgz: Recompiled.<br>l/taglib-1.4-i486-2.tgz: Recompiled.<br>n/apache-1.3.34-i486-2.tgz: Recompiled against db-4.4.<br>n/bind-9.3.2-i486-1.tgz: Upgraded to bind-9.3.2.<br>n/bitchx-1.1-i486-3.tgz: Recompiled.<br>n/curl-7.15.1-i486-1.tgz: Upgraded to curl-7.15.1.<br>n/dhcpcd-2.0.1-i486-1.tgz: Upgraded to dhcpcd-2.0.1.<br>n/dnsmasq-2.26-i486-1.tgz: Upgraded to dnsmasq-2.26.<br>n/epic4-2.2-i486-1.tgz: Upgraded to epic4-2.2.<br>n/fetchmail-6.3.2-i486-1.tgz: Upgraded to fetchmail-6.3.2.<br>n/getmail-4.4.4-noarch-1.tgz: Upgraded to getmail-4.4.4.<br>n/imapd-4.64-i486-2.tgz: Recompiled against OpenLDAP client libs.<br>n/iproute2-2.6.15_060110-i486-1.tgz: Upgraded to iproute2-2.6.15-060110.<br>n/iptables-1.3.5-i486-1.tgz: Upgraded to iptables-1.3.5.<br>n/irssi-0.8.10a-i486-1.tgz: Upgraded to irssi-0.8.10a.<br>n/lftp-3.4.0-i486-1.tgz: Upgraded to lftp-3.4.0.<br>n/links-2.1pre20-i486-1.tgz: Upgraded to links-2.1pre20.<br>n/lynx-2.8.5rel.5-i486-2.tgz: Recompiled.<br>n/mod_ssl-2.8.25_1.3.34-i486-2.tgz: Recompiled against new OpenSSL.<br>n/mutt-1.4.2.1i-i486-2.tgz: Recompiled against new OpenSSL.<br>n/nail-11.25-i486-1.tgz: Upgraded to nail-11.25.<br>n/nmap-4.00-i486-1.tgz: Upgraded to nmap-4.00.<br>n/openldap-client-2.3.17-i486-1.tgz: Added client libraries and<br>n/openssh-4.3p1-i486-1.tgz: Upgraded to openssh-4.3p1.<br>n/openssl-0.9.8a-i486-1.tgz: Upgraded to openssl-0.9.8a.<br>n/php-4.4.2-i486-1.tgz: Upgraded to php-4.4.2.<br>n/pidentd-3.0.19-i486-1.tgz: Upgraded to pidentd-3.0.19.<br>n/pine-4.64-i486-2.tgz: Recompiled.<br>n/procmail-3.22-i486-1.tgz: Upgraded to procmail-3.22.<br>n/proftpd-1.3.0rc3-i486-1.tgz: Upgraded to proftpd-1.3.0rc3. Generally I<br>n/rp-pppoe-3.7-i486-1.tgz: Upgraded to rp-pppoe-3.7.<br>n/samba-3.0.21b-i486-1.tgz: Upgraded to samba-3.0.21b linked with OpenLDAP.<br>n/sendmail-8.13.5-i486-1.tgz: Upgraded to sendmail-8.13.5.<br>n/sendmail-cf-8.13.5-noarch-1.tgz: Upgraded to sendmail-8.13.5 config files.<br>n/slrn-0.9.8.1-i486-2.tgz: Recompiled.<br>n/stunnel-4.14-i486-1.tgz: Upgraded to stunnel-4.14.<br>n/tcpdump-3.9.4-i486-2.tgz: Recompiled.<br>n/tcpip-0.17-i486-36.tgz: Upgraded to vlan.1.9 and tftp-hpa-0.41.<br>n/vsftpd-2.0.4-i486-1.tgz: Upgraded to vsftpd-2.0.4.<br>n/wget-1.10.2-i486-2.tgz: Recompiled.<br>n/whois-4.7.11-i486-1.tgz: Upgraded to whois-4.7.11.<br>n/ytalk-3.3.0-i486-1.tgz: Upgraded to ytalk-3.3.0.<br>xap/fluxbox-0.9.14-i486-1.tgz: Upgraded to fluxbox-0.9.14.<br>xap/gaim-1.5.0-i486-2.tgz: Recompiled.<br>xap/gimp-2.2.10-i486-1.tgz: Upgraded to gimp-2.2.10.<br>xap/gxine-0.5.4-i486-1.tgz: Upgraded to gxine-0.5.4.<br>xap/imagemagick-6.2.6_1-i486-1.tgz: Upgraded to imagemagick-6.2.6-1.<br>xap/mozilla-1.7.12-i486-2.tgz: Linked libmozjs.so into /usr/lib since gxine<br>xap/mozilla-firefox-1.5.0.1-i686-1.tgz: Upgraded to firefox-1.5.0.1.<br>xap/pan-0.14.2.91-i486-2.tgz: Recompiled, fixed pan.desktop and moved it<br>xap/sane-1.0.17-i486-1.tgz: Upgraded to sane-backends-1.0.17 and<br>xap/xpdf-3.01-i486-3.tgz: Recompiled with xpdf-3.01pl2.patch to fix<br>xap/xchat-2.6.1-i486-1.tgz: Upgraded to xchat-2.6.1.<br>xap/xfce-4.2.3.2-i486-1.tgz: Upgraded to xfce-4.2.3.2.<br>xap/xine-lib-1.1.1-i686-1.tgz: Upgraded to xine-lib-1.1.1.<br>xap/xscreensaver-4.23-i486-1.tgz: Upgraded to xscreensaver-4.23.<br>extra/bittornado/bittornado-0.3.14-noarch-1.tgz: Upgraded to<br>extra/bittorrent/bittorrent-4.4.0-noarch-1.tgz: Upgraded to<br>extra/jdk-1.5.0_06/jdk-1_5_0_06-i586-1.tgz: Upgraded to Java(TM) 2<br>extra/k3b/k3b-0.12.10-i486-1.tgz: Upgraded to k3b-0.12.10.<br>extra/k3b/k3b-i18n-0.12.10-noarch-1.tgz: Upgraded to k3b-i18n-0.12.10.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.3_2.6.15.3-i486-1.tgz:<br>kernels/test26.s/*: Upgraded to full-featured Linux 2.6.15.3 kernel.<br>pasture/lprng-3.8.28-i486-2.tgz: Recompiled against new OpenSSL.<br>testing/packages/php-5.1.2/php-5.1.2-i486-1.tgz: Upgraded to php-5.1.2.<br>testing/packages/linux-2.6.15.3/alsa-driver-1.0.10_2.6.15.3-i486-1.tgz:<br>testing/packages/linux-2.6.15.3/kernel-generic-2.6.15.3-i486-1.tgz:<br>testing/packages/linux-2.6.15.3/kernel-headers-2.6.15.3-i386-1.tgz:<br>testing/packages/linux-2.6.15.3/kernel-modules-2.6.15.3-i486-1.tgz:<br>testing/packages/linux-2.6.15.3/kernel-source-2.6.15.3-noarch-1.tgz:<br>testing/packages/seamonkey-1.0-i486-1.tgz: Added seamonkey-1.0, which<br># Old bison packages from slackware/d and /extra moved to /pasture.<br># A few sources may still require these unless/until they are updated.<br>pasture/bison-1.35-i386-1.tgz: Moved to /pasture.<br>pasture/bison-1.875d-i486-1.tgz: Moved to /pasture.<br># We'll see if we can get away with a mass removal of old Berkeley DB<br># cruft. Yes, I know this will be painful, but it's not my fault that<br># BDB does not stay compatible with itself. This mess had to be cleaned<br># up sometime, and in preparation for a .0 release seems as good as any.<br>pasture/db3-3.3.11-i486-4.tgz: Moved to /pasture.<br>pasture/db31-3.1.17-i486-1.tgz: Moved to /pasture.<br>pasture/db4-4.1.25-i386-1.tgz: Moved to /pasture.<br>pasture/db4-4.2.52-i486-2.tgz: Moved to /pasture.<br>l/glibc-i18n-2.3.6-noarch-2.tgz: Rebuilt.<br> against the 2.4.32 and 2.6.15.3 kernel headers.<br> Runtime Environment Version 5.0, Release 6.<br> Support for db-3.3 removed.<br> Presumably this replaces all the known security problems with<br> a batch of new unknown ones. (fetchmail is improving, really ;-)<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321<br> (* Security fix *)<br> binaries for LDAP authentication. (Thanks to Eric Hameleers for<br> help with the ./configure options).<br> This fixes a security issue when using scp to copy files that could<br> cause commands embedded in filenames to be executed.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225<br> (* Security fix *)<br> Compiled against db-4.4.<br> Support for db-3.3 removed.<br> Claims to fix "a few small security issues".<br> For more information, see:<br> http://www.php.net/release_4_4_2.php<br> (* Security fix *)<br> don't like to use release candidates (especially with network services),<br> but this one was needed in order to work with the new OpenSSL.<br> This has been relinked with db-4.4.20, so any databases in /etc/mail will<br> have to be rebuilt. ( cd /etc/mail ; rm *.db ; make )<br> Applied Debian's net-tools patch at Cesare Tensi's urging. :-)<br> Thanks to Peter Santoro for the heads-up on the Javascript engine issue.<br> This has a new major library version number and will require anything<br> linked with the ImageMagick shared libraries to be recompiled.<br> Several security issues are fixed in this release.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4601<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0082<br> (* Security fix *)<br> needs to be able to find it.<br> This fixes a DoS issue and some other security bugs.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox1.5.0.1<br> (* Security fix *)<br> into the standard .desktop directory.<br> sane-frontends-1.0.14.<br> possible security bugs with malformed PDF files.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3191<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3192<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3193<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3624<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3625<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3626<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3627<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3628<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-0301<br> (* Security fix *)<br> BitTornado-0.3.14.<br> BitTorrent-4.4.0. Thanks to Erik Jan Tromp for the doinst.sh<br> to automatically edit /etc/mailcap!<br> Platform Standard Edition Development Kit Version 5.0, Release 6.<br> Thanks to Robby Workman for noticing that CXXFLAGS needed to be set.<br> Recompiled for Linux 2.6.15.3.<br> Recompiled ALSA modules for Linux 2.6.15.3.<br> Upgraded to Linux 2.6.15.3 generic kernel.<br> Upgraded to Linux 2.6.15.3 kernel headers.<br> Upgraded to Linux 2.6.15.3 kernel modules.<br> Upgraded to Linux 2.6.15.3 kernel source.<br> will probably be replacing mozilla-1.7.12 in slackware/xap/ soon unless<br> doing so ends up breaking too many things. Hopefully it won't -- please<br> help test it.<br></blockquote></pre></description>
2042 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1139505865</guid>
2043 <pubDate>Thu, 09 Feb 2006 17:24:25 +0000</pubDate>
2044 </item>
2045 <item>
2046 <title></title>
2047 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1137246086</link>
2048 <description><pre><blockquote>Sat Jan 14 13:41:26 CST 2006<br>a/kernel-ide-2.4.32-i486-2.tgz: Recompiled with gcc-3.4.5.<br> Apparently the nVidia driver demands that the kernel be compiled with the<br> same compiler that will be used to compile the kernel module wrapper for the<br> binary nVidia driver (though my guess is that if this restriction were not<br> coded into their installer that it would work fine), so I've recompiled all<br> the 2.4.32 kernels and modules using the new compiler.<br>a/kernel-modules-2.4.32-i486-3.tgz: Recompiled with gcc-3.4.5.<br>l/alsa-driver-1.0.10_2.4.32-i486-2.tgz: Recompiled with gcc-3.4.5.<br>x/x11-docs-html-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br> For those who may not be aware, this is is the exact same code base as<br> X11R7.0.0, but is packaged as the traditional single source archive using<br> the imake build system. Also, note that this still rightly (IMHO) contains<br> freetype-2.1.9. The newer release of freetype (2.1.10) removed some functions<br> that various applications use -- I'm hoping that these will be restored.<br> Finally, the kernel interface for direct rendering (DRI) seems to have changed,<br> and direct rendering with X11R6.9.0 only works on my machines with a 2.6<br> kernel. I spent several days trying to produce working DRM kernel modules<br> for Linux 2.4.32, but to no avail, so if you're still using a 2.4 kernel<br> you'll want to edit your xorg.conf so that the dri module is not loaded<br> or you'll likely corrupt your display requiring a reboot. I've tested this<br> only with ATI cards and the open source drivers. Perhaps the binary drivers<br> from ATI or nVidia would work.<br>x/x11-fonts-scale-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-devel-6.9.0-i486-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-fonts-100dpi-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-xnest-6.9.0-i486-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-xdmx-6.9.0-i486-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-fonts-misc-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-6.9.0-i486-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-docs-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-fonts-cyrillic-6.9.0-noarch-1.tgz: Upgraded to X11R6.9.0.<br>x/x11-xvfb-6.9.0-i486-1.tgz: Upgraded to X11R6.9.0.<br>xap/mozilla-thunderbird-1.5-i686-1.tgz: Upgraded to thunderbird-1.5.<br>bootdisks/*: Rebuilt using the recompiled 2.4.32 kernels.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.3_2.6.14.6-i486-1.tgz:<br> Recompiled for Linux 2.6.14.6.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.32-i486-2.tgz:<br> Recompiled with gcc-3.4.5.<br>kernels/*.?/*: Recompiled 2.4.32 kernels with gcc-3.4.5, upgraded<br> test26.s kernel to 2.6.14.6.<br>testing/packages/linux-2.6.14.6/alsa-driver-1.0.10_2.6.14.6-i486-2.tgz:<br> Recompiled for Linux 2.6.14.6.<br>testing/packages/linux-2.6.14.6/kernel-generic-2.6.14.6-i486-1.tgz:<br> Upgraded to Linux 2.6.14.6.<br>testing/packages/linux-2.6.14.6/kernel-headers-2.6.14.6-i386-1.tgz:<br> Upgraded to Linux 2.6.14.6 kernel headers.<br>testing/packages/linux-2.6.14.6/kernel-modules-2.6.14.6-i486-1.tgz:<br> Upgraded to Linux 2.6.14.6 kernel modules.<br>testing/packages/linux-2.6.14.6/kernel-source-2.6.14.6-noarch-1.tgz:<br> Upgraded to Linux 2.6.14.6 kernel source.<br></blockquote></pre></description>
2049 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1137246086</guid>
2050 <pubDate>Sat, 14 Jan 2006 13:41:26 +0000</pubDate>
2051 </item>
2052 <item>
2053 <title></title>
2054 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134657447</link>
2055 <description><pre><blockquote>Thu Dec 15 14:37:27 CST 2005<br>d/gcc-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br>d/gcc-g++-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br>d/gcc-g77-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br>d/gcc-gnat-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br>d/gcc-java-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br>d/gcc-objc-3.4.5-i486-1.tgz: Upgraded to gcc-3.4.5.<br></blockquote></pre></description>
2056 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134657447</guid>
2057 <pubDate>Thu, 15 Dec 2005 14:37:27 +0000</pubDate>
2058 </item>
2059 <item>
2060 <title></title>
2061 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134482497</link>
2062 <description><pre><blockquote>Tue Dec 13 14:01:37 CST 2005<br>a/kernel-modules-2.4.32-i486-2.tgz: That's what I meant to say below,<br> not "l/alsa-driver-1.0.10_2.4.32-i486-1.tgz". I'd been looking at the<br> alsa-driver package to see if it had the same issue (it doesn't), and<br> then listed the wrong package in the ChangeLog. Sorry about that.<br> Oh, and there was really nothing wrong with the modules in the<br> kernel-modules-2.4.32-i486-1 package that a 'depmod -a' wouldn't fix.<br> That's the only change that went into the package -- the modules are<br> the same. Thanks to Victor Keranov for pointing out my mistake.<br></blockquote></pre></description>
2063 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134482497</guid>
2064 <pubDate>Tue, 13 Dec 2005 14:01:37 +0000</pubDate>
2065 </item>
2066 <item>
2067 <title></title>
2068 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134398004</link>
2069 <description><pre><blockquote>Mon Dec 12 14:33:24 CST 2005<br>l/alsa-driver-1.0.10_2.4.32-i486-1.tgz: Regenerated 'depmod -a' files,<br> as these were referring to uncompressed modules rather than compressed<br> ones. Thanks to Malcolm Rowe for pointing this out.<br></blockquote></pre></description>
2070 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134398004</guid>
2071 <pubDate>Mon, 12 Dec 2005 14:33:24 +0000</pubDate>
2072 </item>
2073 <item>
2074 <title></title>
2075 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134257322</link>
2076 <description><pre><blockquote>Sat Dec 10 23:28:42 CST 2005<br><br>It's a girl! :-)<br><br>I know a lot of you have been wondering what's going on here, and the news<br>is that my wife Andrea delivered our first child, a daughter Briah Cecilia<br>(briah at slackware dot com :-) on 2005-11-22, and that event (and the weeks<br>that led up to it) has had to take priority over the usual tasks of<br>download/compile/test/package/upload. But, things should be getting back to<br>normal here (more or less) over the next couple of weeks, particularly after<br>the holiday season has come and gone. As you might expect, there are a lot of<br>friends and relatives who want to see her. :-)<br><br>Thanks for your patience, and we now return you to your regularly scheduled<br>ChangeLog...<br><br>a/bash-3.0-i486-4.tgz: Fixed an obscure bug where suspending the first process<br> started in a new shell would cause it to hang.<br> Thanks to Grant Coady for discovering and fixing this bug.<br>a/bzip2-1.0.3-i486-2.tgz: Patched a minor bug in the libbz2 shared library<br> Makefile to enable support for large files. Thanks to Timothy C. McGrath<br> and Manuel Jose Blanca Molinos both of whom pointed out this problem and<br> provided fixes.<br>a/glibc-solibs-2.3.6-i486-1.tgz: Upgraded to glibc-2.3.6 shared libraries.<br>a/glibc-zoneinfo-2.3.6-noarch-1.tgz: Upgraded to glibc-2.3.6 timezone info.<br>a/kernel-ide-2.4.32-i486-1.tgz: Upgraded to Linux 2.4.32 bare.i kernel.<br>a/kernel-modules-2.4.32-i486-1.tgz: Upgraded to Linux 2.4.32 kernel modules.<br>ap/alsa-utils-1.0.10-i486-1.tgz: Upgraded to alsa-utils-1.0.10.<br> In /etc/rc.d/rc.alsa, load snd-seq-oss. (Thanks to Tomas Matejicek)<br>d/gcc-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4. gcc-4.x isn't ready yet as<br> a prime time compiler yet, IMHO -- still too many things it can't compile,<br> internal compiler errors, and the like. How much of that is the compiler<br> and how much is source needing to be updated is a matter for debate,<br> though. Also, the -mcpu=i686 option used in Slackware to optimize<br> binaries for i686 or Athlon platforms has changed to -mtune=i686 with the<br> gcc-3.4.x compiler series. I'll be updating the SlackBuilds over time as<br> the packages are upgraded.<br>d/gcc-g++-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4.<br>d/gcc-g77-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4.<br>d/gcc-gnat-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4.<br>d/gcc-java-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4.<br>d/gcc-objc-3.4.4-i486-2.tgz: Upgraded to gcc-3.4.4.<br>d/kernel-headers-2.4.32-i386-1.tgz: Upgraded to Linux 2.4.32 kernel headers.<br>k/kernel-source-2.4.32-noarch-1.tgz: Upgraded to Linux 2.4.32 kernel source.<br>l/alsa-driver-1.0.10_2.4.32-i486-1.tgz: Upgraded to alsa-driver-1.0.10 for<br> Linux 2.4.32.<br>l/alsa-lib-1.0.10-i486-1.tgz: Upgraded to alsa-lib-1.0.10.<br>l/alsa-oss-1.0.10-i486-1.tgz: Upgraded to alsa-oss-1.0.10.<br>l/glibc-2.3.6-i486-1.tgz: Upgraded to glibc-2.3.6.<br>l/glibc-i18n-2.3.6-noarch-1.tgz: Upgraded to glibc-2.3.6 i18n files.<br> Added files in /usr/share/locale that hadn't previously been included in<br> this package (thanks to Lasse Collin).<br>l/glibc-profile-2.3.6-i486-1.tgz: Upgraded to glibc-2.3.6.<br>n/dnsmasq-2.24-i486-1.tgz: Upgraded to dnsmasq-2.24. Thanks to Simon Kelley<br> (and one of his anonymous testers) for helping to update the SlackBuild.<br>n/php-4.4.1-i486-2.tgz: Recompiled with a patch from PHP CVS that fixes issues<br> with SquirrelMail and possibly other PHP applications. I'd hoped there would<br> be a new PHP out quickly to address this but since there isn't I'm making an<br> exception to the usual policy here on merging patches from CVS as a fair<br> number of users seem to be affected by this issue. Let me know if this<br> doesn't help or if any undesired side effects are noticed.<br> This problem was first reported here by Gerardo Exequiel Pozzi, but was<br> later reported by too many people to list. Thanks, everyone! :-)<br>xap/mozilla-firefox-1.5-i686-1.tgz: Upgraded to firefox-1.5.<br>bootdisks/*: Upgraded to Linux 2.4.32.<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.1pre25_2.4.32-i486-1.tgz:<br> Upgraded to linux-wlan-ng-0.2.1pre25 (for Linux 2.4.32).<br>extra/linux-wlan-ng/linux-wlan-ng-0.2.3_2.6.14.3-i486-1.tgz<br> Upgraded to linux-wlan-ng-0.2.3 (for Linux 2.6.14.3).<br>isolinux/initrd.img: Upgraded USB/IEEE1394 modules to Linux 2.4.32.<br>isolinux/network.dsk: Upgraded network modules to Linux 2.4.32.<br>isolinux/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.32.<br>kernels/*: Upgraded to Linux 2.4.32 (and test.s to 2.6.14.3).<br>rootdisks/install.1: Upgraded USB/IEEE1394 modules to Linux 2.4.32.<br>rootdisks/install.2: Upgraded USB/IEEE1394 modules to Linux 2.4.32.<br>rootdisks/install.zip: Upgraded USB/IEEE1394 modules to Linux 2.4.32.<br>rootdisks/network.dsk: Upgraded network modules to Linux 2.4.32.<br>rootdisks/pcmcia.dsk: Upgraded pcmcia modules to Linux 2.4.32.<br>testing/packages/linux-2.6.14.3/alsa-driver-1.0.10_2.6.14.3-i486-1.tgz:<br> Upgraded to alsa-driver-1.0.10 for Linux 2.6.14.3.<br>testing/packages/linux-2.6.14.3/kernel-generic-2.6.14.3-i486-1.tgz:<br> Upgraded to Linux 2.6.14.3 (generic kernel).<br>testing/packages/linux-2.6.14.3/kernel-headers-2.6.14.3-i386-1.tgz:<br> Upgraded to kernel headers from Linux 2.6.14.3 (see the README<br> file in testing/packages/linux-2.6.14.3/ for information about<br> why you probably *don't* want to use these headers...)<br>testing/packages/linux-2.6.14.3/kernel-modules-2.6.14.3-i486-1.tgz:<br> Upgraded to kernel modules for Linux 2.6.14.3.<br>testing/packages/linux-2.6.14.3/kernel-source-2.6.14.3-noarch-1.tgz:<br> Upgraded to Linux 2.6.14.3 kernel source.<br>testing/packages/php-5.1.1/php-5.1.1-i486-1.tgz: Upgraded to php-5.1.1.<br> This no longer seems to ship with PEAR, and if anyone knows why this is or<br> how to go about adding it back to the package (if it's still required), I'd<br> be interested to know.<br>testing/packages/thunderbird-1.5rc1/mozilla-thunderbird-1.5rc1-i686-1.tgz:<br> Added thunderbird-1.5rc1.<br></blockquote></pre></description>
2077 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1134257322</guid>
2078 <pubDate>Sat, 10 Dec 2005 23:28:42 +0000</pubDate>
2079 </item>
2080 <item>
2081 <title></title>
2082 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1131393297</link>
2083 <description><pre><blockquote>Mon Nov 7 19:54:57 CST 2005<br>n/elm-2.5.8-i486-1.tgz: Upgraded to elm2.5.8.<br> This fixes a buffer overflow in the parsing of the Expires header that<br> could be used to execute arbitrary code as the user running Elm.<br> Thanks to Ulf Harnhammar for finding the bug and reminding me to get<br> out updated packages to address the issue.<br> A reference to the original advisory:<br> http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0688.html<br></blockquote></pre></description>
2084 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1131393297</guid>
2085 <pubDate>Mon, 07 Nov 2005 19:54:57 +0000</pubDate>
2086 </item>
2087 <item>
2088 <title></title>
2089 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1131227721</link>
2090 <description><pre><blockquote>Sat Nov 5 21:55:21 CST 2005<br>l/libxml2-2.6.22-i486-1.tgz: Upgraded to libxml2-2.6.22.<br> This fixes an issue where libxml2 had declared a variable XML_FEATURE_UNICODE<br> that was already used by the expat headers, causing PHP to fail to compile<br> when using Slackware's combination of ./configure options.<br>n/curl-7.12.2-i486-2.tgz: Patched. This addresses a buffer overflow in<br> libcurl's NTLM function that could have possible security implications.<br> For more details, see:<br> http://curl.haxx.se/docs/security.html<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185<br> (* Security fix *)<br>n/samba-3.0.20b-i486-1.tgz: Upgraded to samba-3.0.20b.<br> This includes various bugfixes. Thanks to Christopher Linnet for reporting<br> that this fixes a problem with printing to a printer on an XP machine from<br> CUPS. If you use such a configuration, you'll want this upgrade for sure.<br>n/mod_ssl-2.8.25_1.3.34-i486-1.tgz: Upgraded to mod_ssl-2.8.25-1.3.34.<br>n/wget-1.10.2-i486-1.tgz: Upgraded to wget-1.10.2.<br> This addresses a buffer overflow in wget's NTLM handling function that could<br> have possible security implications.<br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185<br> (* Security fix *)<br>n/php-4.4.1-i486-1.tgz: Upgraded to php-4.4.1.<br> Fixes a number of bugs, including several minor security fixes relating to<br> the overwriting of the GLOBALS array.<br> (* Security fix *)<br>n/lynx-2.8.5rel.5-i486-1.tgz: Upgraded to lynx-2.8.5rel.5.<br> Fixes an issue where the handling of Asian characters when using lynx to<br> connect to an NNTP server (is this a common use?) could result in a buffer<br> overflow causing the execution of arbitrary code. <br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3120<br> (* Security fix *)<br>n/apache-1.3.34-i486-1.tgz: Upgraded to apache-1.3.34.<br> Fixes this minor security bug: "If a request contains both Transfer-Encoding<br> and Content-Length headers, remove the Content-Length, mitigating some HTTP<br> Request Splitting/Spoofing attacks."<br> (* Security fix *)<br>n/pine-4.64-i486-1.tgz: Upgraded to pine-4.64.<br>n/tcpdump-3.9.4-i486-1.tgz: Upgraded to tcpdump-3.9.4.<br>n/imapd-4.64-i486-1.tgz: Upgraded to imapd-4.64.<br> A buffer overflow was reported in the mail_valid_net_parse_work function.<br> However, this function in the c-client library does not appear to be called<br> from anywhere in imapd. iDefense states that the issue is of LOW risk to<br> sites that allow users shell access, and LOW-MODERATE risk to other servers.<br> I believe it's possible that it is of NIL risk if the function is indeed<br> dead code to imapd, but draw your own conclusions...<br> (* Security fix *)<br>kde/koffice-1.4.1-i486-2.tgz: Patched.<br> Fixes a buffer overflow in KWord's RTF import discovered by Chris Evans.<br> For more details, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2971<br> (* Security fix *)<br><br> There, now hopefully we can start getting some REAL work done around here<br> again soon...<br></blockquote></pre></description>
2091 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1131227721</guid>
2092 <pubDate>Sat, 05 Nov 2005 21:55:21 +0000</pubDate>
2093 </item>
2094 <item>
2095 <title></title>
2096 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1129211845</link>
2097 <description><pre><blockquote>Thu Oct 13 13:57:25 PDT 2005<br>a/openssl-solibs-0.9.7g-i486-2.tgz: Patched.<br> Fixed a vulnerability that could, in rare circumstances, allow an attacker<br> acting as a "man in the middle" to force a client and a server to negotiate<br> the SSL 2.0 protocol (which is known to be weak) even if these parties both<br> support SSL 3.0 or TLS 1.0.<br> For more details, see:<br> http://www.openssl.org/news/secadv_20051011.txt<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969<br> (* Security fix *)<br>n/openssl-0.9.7g-i486-2.tgz: Patched.<br> (* Security fix *)<br></blockquote></pre></description>
2098 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1129211845</guid>
2099 <pubDate>Thu, 13 Oct 2005 13:57:25 +0000</pubDate>
2100 </item>
2101 <item>
2102 <title></title>
2103 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128957262</link>
2104 <description><pre><blockquote>Mon Oct 10 15:14:22 PDT 2005<br>xap/xine-lib-1.0.3a-i686-1.tgz: Upgraded to xine-lib-1.0.3a.<br> This fixes a format string bug where an attacker, if able to upload malicious<br> information to a CDDB server and then get a local user to play a certain<br> audio CD, may be able to run arbitrary code on the machine as the user<br> running the xine-lib linked application.<br> For more information, see:<br> http://xinehq.de/index.php/security/XSA-2005-1<br> (* Security fix *)<br></blockquote></pre></description>
2105 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128957262</guid>
2106 <pubDate>Mon, 10 Oct 2005 15:14:22 +0000</pubDate>
2107 </item>
2108 <item>
2109 <title></title>
2110 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128797174</link>
2111 <description><pre><blockquote>Sat Oct 8 18:46:14 PDT 2005<br>d/cvs-1.11.21-i486-1.tgz: Upgraded to cvs-1.11.21.<br></blockquote></pre></description>
2112 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128797174</guid>
2113 <pubDate>Sat, 08 Oct 2005 18:46:14 +0000</pubDate>
2114 </item>
2115 <item>
2116 <title></title>
2117 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128517455</link>
2118 <description><pre><blockquote>Wed Oct 5 13:04:15 PDT 2005<br>xap/mozilla-thunderbird-1.0.7-i686-1.tgz: Upgraded to thunderbird-1.0.7.<br> This fixes a security issue where URLs passed on the command line to the<br> thunderbird shell script were not correctly protected against<br> interpretation by the shell. As a result, a malicious URL could contain<br> embedded shell commands which would then be executed as the user running<br> Thunderbird.<br> For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#Thunderbird<br> (* Security fix *)<br></blockquote></pre></description>
2119 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1128517455</guid>
2120 <pubDate>Wed, 05 Oct 2005 13:04:15 +0000</pubDate>
2121 </item>
2122 <item>
2123 <title></title>
2124 <link>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1127685766</link>
2125 <description><pre><blockquote>Sun Sep 25 22:02:46 PDT 2005<br>x/x11-6.8.2-i486-4.tgz: Rebuilt with a modified patch for an earlier pixmap<br> overflow issue. The patch released by X.Org was slightly different than<br> the one that was circulated previously, and is an improved version. There<br> have been reports that the earlier patch broke WINE and possibly some<br> other programs.<br> For more information, see:<br> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495<br> (* Security fix *)<br>x/x11-xdmx-6.8.2-i486-4.tgz: Patched and rebuilt.<br>x/x11-xnest-6.8.2-i486-4.tgz: Patched and rebuilt.<br>x/x11-xvfb-6.8.2-i486-4.tgz: Patched and rebuilt.<br>xap/mozilla-1.7.12-i486-1.tgz: Upgraded to mozilla-1.7.12.<br> This fixes several security issues. For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#Mozilla<br> (* Security fix *)<br>xap/mozilla-firefox-1.0.7-i686-1.tgz: Upgraded to firefox-1.0.7.<br> This fixes several security issues. For more information, see:<br> http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox<br> (* Security fix *)<br></blockquote></pre></description>
2126 <guid>https://mirrors.slackware.com/slackware/slackware-11.0/ChangeLog.txt#src=feeds&time=1127685766</guid>
2127 <pubDate>Sun, 25 Sep 2005 22:02:46 +0000</pubDate>
2128 </item>
2129 </channel>
2130