Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-current ChangeLog (2019-10-02) ====== ====== Wed Oct 2 19:41:47 UTC 2019 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware.current>a/haveged-1.9.8-i586-1.txz]] * [[slackware.current>ap/screen-4.7.0-i586-1.txz]] * [[slackware.current>ap/vim-8.1.2108-i586-1.txz]] * [[slackware.current>d/rust-1.37.0-i686-1.txz]] \\ Reverting to rust-1.37.0 after verified reports that the newer Rust is \\ unable to compile Firefox or Thunderbird. There are some patches for this \\ appearing in the repos, but they are extensive changes that don't look like \\ they could be cherry-picked. Hey, at least this Rust version works and is \\ not bloated. :) Moving forward we'll be testing new versions of Rust to \\ make sure that they can compile the sources that we need Rust for before \\ merging them into the tree. Firefox has been verified to build here with \\ rust-1.37.0 and gcc/g++ from gcc-9.2.0 or clang/clang++ from llvm-9.0.0. * [[slackware.current>l/libcap-ng-0.7.10-i586-1.txz]] * [[slackware.current>xap/vim-gvim-8.1.2108-i586-1.txz]] ====== Wed Oct 2 06:46:20 UTC 2019 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware.current>a/kernel-generic-4.19.76-i586-1.txz]] * [[slackware.current>a/kernel-generic-smp-4.19.76_smp-i686-1.txz]] * [[slackware.current>a/kernel-huge-4.19.76-i586-1.txz]] * [[slackware.current>a/kernel-huge-smp-4.19.76_smp-i686-1.txz]] * [[slackware.current>a/kernel-modules-4.19.76-i586-1.txz]] * [[slackware.current>a/kernel-modules-smp-4.19.76_smp-i686-1.txz]] * [[slackware.current>ap/sysstat-12.1.7-i586-1.txz]] * [[slackware.current>d/kernel-headers-4.19.76_smp-x86-1.txz]] * [[slackware.current>d/ruby-2.6.5-i586-1.txz]] \\ This update fixes bugs and security issues: \\ A code injection vulnerability of Shell#[] and Shell#test. \\ HTTP response splitting in WEBrick (Additional fix). \\ A NUL injection vulnerability of File.fnmatch and File.fnmatch?. \\ Regular Expression Denial of Service vulnerability of WEBrick's Digest \\ access authentication. \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201 \\ (* Security fix *) * [[slackware.current>k/kernel-source-4.19.76_smp-noarch-1.txz]] * [[slackware.current>l/harfbuzz-2.6.2-i586-1.txz]] * [[slackware.current>l/libpcap-1.9.1-i586-1.txz]] * [[slackware.current>n/p11-kit-0.23.18.1-i586-1.txz]] * [[slackware.current>n/tcpdump-4.9.3-i586-1.txz]] \\ Fix buffer overflow/overread vulnerabilities and command line \\ argument/local issues. \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16808 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15167 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879 \\ (* Security fix *) * [[slackware.current>extra/linux-4.19.76-nosmp-sdk/*]] * [[slackware.current>kernels/*]] ==== Rebuilt ==== * [[slackware.current>isolinux/initrd.img]] * [[slackware.current>usb-and-pxe-installers/usbboot.img]] {{tag>slackware changelog slackware-current 2019/10}} news/2019/10/02/slackware-current-changelog.txt Last modified: 5 years agoby Giuseppe Di Terlizzi Log In