diff options
author | Adrien Nader <adrien@notk.org> | 2015-02-16 23:11:20 +0100 |
---|---|---|
committer | Adrien Nader <adrien@notk.org> | 2015-02-16 23:11:20 +0100 |
commit | 9d4d1f7c390210e5ae6eafec59721e217943a7e2 (patch) | |
tree | 0aea787721b1533ac2c34b322af76152eec6eb69 /slackware64-current/isolinux | |
parent | eb5fd26ed8bb67296cb3287630a72ebf60d167c5 (diff) |
Mon Feb 16 19:33:36 UTC 2015
a/aaa_elflibs-14.1-x86_64-4.txz: Rebuilt.
a/btrfs-progs-20150213-x86_64-1.txz: Upgraded.
a/coreutils-8.23-x86_64-1.txz: Upgraded.
a/e2fsprogs-1.42.12-x86_64-1.txz: Upgraded.
a/glibc-solibs-2.21-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2015a-noarch-1.txz: Upgraded.
a/kernel-firmware-20150212git-noarch-1.txz: Upgraded.
a/kernel-generic-3.14.33-x86_64-1.txz: Upgraded.
a/kernel-huge-3.14.33-x86_64-1.txz: Upgraded.
a/kernel-modules-3.14.33-x86_64-1.txz: Upgraded.
a/patch-2.7.4-x86_64-1.txz: Upgraded.
Patch no longer follows symbolic links to input and output files. This
ensures that symbolic links created by git-style patches cannot cause
patch to write outside the working directory.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
(* Security fix *)
a/sharutils-4.15-x86_64-1.txz: Upgraded.
a/sysvinit-scripts-2.0-noarch-18.txz: Rebuilt.
Patched the init scripts to produce nicer output from the new versions
of mount/umount. Run the GTK+/FDo registry rebuilds in the background
to speed up boot time. Optimize the search for icon cache files by only
looking in the directories they might be in, rather than all directories
under /usr/share/icons.
a/util-linux-2.25.2-x86_64-1.txz: Upgraded.
ap/sudo-1.8.12-x86_64-1.txz: Upgraded.
This update fixes a potential security issue by only passing the TZ
environment variable it is considered safe. This prevents exploiting bugs
in glibc's TZ parser that could be used to read files that the user does
not have access to, or to cause a denial of service.
For more information, see:
http://www.sudo.ws/sudo/alerts/tz.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
(* Security fix *)
d/guile-2.0.11-x86_64-2.txz: Rebuilt.
Recompiled against readline-6.3.
d/kernel-headers-3.14.33-x86-1.txz: Upgraded.
k/kernel-source-3.14.33-noarch-1.txz: Upgraded.
l/glibc-2.21-x86_64-1.txz: Upgraded.
l/glibc-i18n-2.21-x86_64-1.txz: Upgraded.
l/glibc-profile-2.21-x86_64-1.txz: Upgraded.
l/parted-3.2-x86_64-1.txz: Upgraded.
l/readline-6.3-x86_64-1.txz: Upgraded.
l/seamonkey-solibs-2.32.1-x86_64-1.txz: Upgraded.
n/ntp-4.2.8p1-x86_64-1.txz: Upgraded.
Changed rc.ntpd to no longer save the system time to the hardware clock.
This had been done in an effort to stop a time skew that may well have
been caused by other issues with hwclock and the kernel. If removing
this code causes any issues to return, let me know. Thanks to Xsane.
xap/seamonkey-2.32.1-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'slackware64-current/isolinux')
-rw-r--r-- | slackware64-current/isolinux/initrd.img | 2 | ||||
-rw-r--r-- | slackware64-current/isolinux/message.txt | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/slackware64-current/isolinux/initrd.img b/slackware64-current/isolinux/initrd.img index 365483959..af5b4c747 100644 --- a/slackware64-current/isolinux/initrd.img +++ b/slackware64-current/isolinux/initrd.img @@ -1 +1 @@ -cfb32d751d7ad63c88a792a388a695d94eccdaec +97a8041592f00cb6529ac7bb995361b8b7cdff2c diff --git a/slackware64-current/isolinux/message.txt b/slackware64-current/isolinux/message.txt index fd5892571..11e1a9f0a 100644 --- a/slackware64-current/isolinux/message.txt +++ b/slackware64-current/isolinux/message.txt @@ -1,5 +1,5 @@ -Welcome to 09Slackware6407 version 14.1 (Linux kernel 3.14.29)! +Welcome to 09Slackware6407 version 14.1 (Linux kernel 3.14.33)! If you need to pass extra parameters to the kernel, enter them at the prompt below after the name of the kernel to boot (huge.s etc). |