From 506c39cf96580a36cdecb054059ab37d8d3fdf65 Mon Sep 17 00:00:00 2001 From: Adrien Nader Date: Tue, 23 Dec 2014 07:10:32 +0100 Subject: Tue Dec 23 00:05:23 UTC 2014 a/kernel-generic-3.14.27-x86_64-1.txz: Upgraded. a/kernel-huge-3.14.27-x86_64-1.txz: Upgraded. a/kernel-modules-3.14.27-x86_64-1.txz: Upgraded. ap/vim-7.4.560-x86_64-1.txz: Upgraded. d/kernel-headers-3.14.27-x86-1.txz: Upgraded. k/kernel-source-3.14.27-noarch-1.txz: Upgraded. l/libusb-1.0.19-x86_64-1.txz: Upgraded. l/libusb-compat-0.1.5-x86_64-1.txz: Upgraded. n/ntp-4.2.8-x86_64-1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several high-severity vulnerabilities discovered by Neel Mehta and Stephen Roettger of the Google Security Team. For more information, see: https://www.kb.cert.org/vuls/id/852879 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296 (* Security fix *) n/php-5.4.36-x86_64-1.txz: Upgraded. This update fixes bugs and security issues. #68545 (NULL pointer dereference in unserialize.c). #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142) #68283 (fileinfo: out-of-bounds read in elf note headers). (CVE-2014-3710) For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142 (* Security fix *) x/libdrm-2.4.58-x86_64-1.txz: Upgraded. x/libvdpau-0.9-x86_64-1.txz: Added. Thanks to Heinz Wiesinger. x/mesa-10.3.5-x86_64-1.txz: Upgraded. x/xorg-server-1.15.2-x86_64-3.txz: Rebuilt. This update fixes many security issues discovered by Ilja van Sprundel, a security researcher with IOActive. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103 (* Security fix *) x/xorg-server-xephyr-1.15.2-x86_64-3.txz: Rebuilt. x/xorg-server-xnest-1.15.2-x86_64-3.txz: Rebuilt. x/xorg-server-xvfb-1.15.2-x86_64-3.txz: Rebuilt. xap/MPlayer-1.1_20130819-x86_64-3.txz: Rebuilt. Recompiled with support for libvdpau. xap/vim-gvim-7.4.560-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/source/config-testing-3.18.1/*: Added. usb-and-pxe-installers/usbboot.img: Rebuilt. --- x/mesa/mesa.SlackBuild | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/x/mesa/mesa.SlackBuild b/x/mesa/mesa.SlackBuild index c86eef8..617f90f 100755 --- a/x/mesa/mesa.SlackBuild +++ b/x/mesa/mesa.SlackBuild @@ -21,7 +21,7 @@ # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PKGNAM=mesa -VERSION=10.2.6 +VERSION=10.3.5 DEMOVERS=8.2.0 BUILD=${BUILD:-1} @@ -77,13 +77,15 @@ find . \ # Apply patches from git (and maybe elsewhere): # Patches obtained by: # git checkout origin/10.2 -# git format-patch 816d37e5c59b50167e0b13c5e290a08f04ee166c.. # 10.2.4 release +# git format-patch b14b3e678f011591ef7972fb61263bb202082add.. # 10.2.7 release if /bin/ls $CWD/patches/*.patch 1> /dev/null 2> /dev/null ; then for patch in $CWD/patches/*.patch ; do patch -p1 < $patch || exit 1 ; done fi +./autogen.sh + CFLAGS="$SLKCFLAGS" \ ./configure \ --prefix=/usr \ @@ -99,7 +101,7 @@ CFLAGS="$SLKCFLAGS" \ --enable-llvm-shared-libs \ --enable-egl \ --enable-texture-float \ - --disable-gallium-egl \ + --enable-gallium-egl \ --enable-shared-glapi \ --enable-xa \ --enable-osmesa \ @@ -112,6 +114,7 @@ CFLAGS="$SLKCFLAGS" \ --enable-glx-tls \ --enable-gles1 \ --enable-gles2 \ + --enable-vdpau \ --build=$ARCH-slackware-linux make $NUMJOBS || make || exit 1 -- cgit v1.2.3-70-g09d2 From 205c4743b095b6b946aa480fd123cf565903de99 Mon Sep 17 00:00:00 2001 From: Adrien Nader Date: Fri, 9 Jan 2015 20:09:50 +0100 Subject: Fri Jan 9 17:47:53 UTC 2015 a/openssl-solibs-1.0.1k-x86_64-1.txz: Upgraded. (* Security fix *) n/openssl-1.0.1k-x86_64-1.txz: Upgraded. This update fixes several security issues: DTLS segmentation fault in dtls1_get_record (CVE-2014-3571) DTLS memory leak in dtls1_buffer_record (CVE-2015-0206) no-ssl3 configuration sets method to NULL (CVE-2014-3569) ECDHE silently downgrades to ECDH [Client] (CVE-2014-3572) RSA silently downgrades to EXPORT_RSA [Client] (CVE-2015-0204) DH client certificates accepted without verification [Server] (CVE-2015-0205) Certificate fingerprints can be modified (CVE-2014-8275) Bignum squaring may produce incorrect results (CVE-2014-3570) For more information, see: https://www.openssl.org/news/secadv_20150108.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570 (* Security fix *) xap/fluxbox-1.3.6-x86_64-1.txz: Upgraded. --- n/openssl/openssl-1.0.1j.tar.gz.asc | 11 ----------- n/openssl/openssl-1.0.1k.tar.gz.asc | 11 +++++++++++ n/openssl/openssl0/openssl-0.9.8zc.tar.gz.asc | 11 ----------- n/openssl/openssl0/openssl-0.9.8zd.tar.gz.asc | 11 +++++++++++ 4 files changed, 22 insertions(+), 22 deletions(-) delete mode 100644 n/openssl/openssl-1.0.1j.tar.gz.asc create mode 100644 n/openssl/openssl-1.0.1k.tar.gz.asc delete mode 100644 n/openssl/openssl0/openssl-0.9.8zc.tar.gz.asc create mode 100644 n/openssl/openssl0/openssl-0.9.8zd.tar.gz.asc diff --git a/n/openssl/openssl-1.0.1j.tar.gz.asc b/n/openssl/openssl-1.0.1j.tar.gz.asc deleted file mode 100644 index 034cd29..0000000 --- a/n/openssl/openssl-1.0.1j.tar.gz.asc +++ /dev/null @@ -1,11 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v1 - -iQEcBAABAgAGBQJUPm6ZAAoJENnE0m0OYESRnTMH/3C0nbnYzAn5mO+PIZUs/yJ5 -DWFKNY4nUeJDuI6V1M95qhnQVn4ae3ikCQeXXVQEMMeWf2giATGJAmt0bJsyylfE -M/q9K6/hyshJDMXNWK0BvoC/XjE5ohwZQEFHjqvcS1+ednOsuLoBPNslghA2CNTC -8+iv9+eOMcTJyraEh09jjCzn7WNaL2IMyvx1b7xtj4zvZ6chVEoqSSYM820NdqZQ -1xoClVOXn/IEkoUOG81NgzsMol7AjPM8AVeG7UGHqqKy/TGKHAiik6gpLjOpGpzv -iyU7nMzK+YhWU1UgJdXu7De0FjekTFgZgHCANdw1FmPcGpiXJsZcY+jPaYNCouQ= -=h6ga ------END PGP SIGNATURE----- diff --git a/n/openssl/openssl-1.0.1k.tar.gz.asc b/n/openssl/openssl-1.0.1k.tar.gz.asc new file mode 100644 index 0000000..27cd786 --- /dev/null +++ b/n/openssl/openssl-1.0.1k.tar.gz.asc @@ -0,0 +1,11 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQEcBAABAgAGBQJUro4+AAoJENnE0m0OYESRdWQH/0h7DRno0VcesRBkHE0S8zyt +DNbIyJ2QwyhFw3yKvUcau2qP6DCAi+6Fcs/MONRI6uRAN7NWxsROBstkjIVEWLq/ +fvhF27QWGCEUB9iYIk00dOtISGpUBuB0e5goOH5Gyb89c10wPkDa5ZLpAavZxzne +BFdfXQU624nt8D4k2Can9JIme3QCr6LgxVQhbU7pmXQN+dFOv8Bza9Fnm5sfo2fP +MDZNOIJusCpu15lSyJdoKpkCFy2OaQrDw6h/VAWfHENdklbkWJtCsJIV5zL6OlWn +2+6hABhE0ErmS3ax9uhWbDW9/Z0fz6WLSRGuWOVHb1ighzOj7K4WgTdMILcINQg= +=kQEU +-----END PGP SIGNATURE----- diff --git a/n/openssl/openssl0/openssl-0.9.8zc.tar.gz.asc b/n/openssl/openssl0/openssl-0.9.8zc.tar.gz.asc deleted file mode 100644 index 528fd09..0000000 --- a/n/openssl/openssl0/openssl-0.9.8zc.tar.gz.asc +++ /dev/null @@ -1,11 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v1 - -iQEcBAABAgAGBQJUPm02AAoJENnE0m0OYESRGW0IALSPAfr5hpZwuktYojERPifz -uD4ZYk67tGFffAhhkV09P57m2ahPO8f+7lG1aHmKr+/OiI8PPaTd3wetF9Nt5S1n -dfptpmUPx/wFLvatD55litJtf4AmNhb5g+rvC8PSr9VaBvpudtoJVd+b22f8lCMc -YoGBkg/AeTjvA1ddSCdMFTvlcjx4Z/BL3KHZldB9aoNs68ByDzFkbe9pW4uK3k8C -Timj2HIS06HOVfEpnySk+iXMLXuEWAmlY6BsI3Ij2dTgJpAlN/vIRLb+aG9sO38W -R1BxfbMsBPVBEQFGY/iTYIe2Ohyl/UoGLHfvMD3BYE8nTuSDuda/AIJ9AcIrMZ4= -=1i6h ------END PGP SIGNATURE----- diff --git a/n/openssl/openssl0/openssl-0.9.8zd.tar.gz.asc b/n/openssl/openssl0/openssl-0.9.8zd.tar.gz.asc new file mode 100644 index 0000000..ae9dcca --- /dev/null +++ b/n/openssl/openssl0/openssl-0.9.8zd.tar.gz.asc @@ -0,0 +1,11 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1 + +iQEcBAABAgAGBQJUrpVNAAoJENnE0m0OYESRU8gH/1CrBXxPBd5xdixxZfp5g3F1 +6VPUHcnBk/Q8jFeD8LGfsdZ4vAQhsg6hLdCSyNSNbkLOw86ec/lKhMzgnnWGtSXW +N7Pr93PU6mSVd/kEBg0m3JQNNyQbHPT0pkIDgJ2pyofx9ulIGhzGQhOZ5MY69du1 +NKrMGqufwH6K9KZpONnZCp9I3PSWPKDj67M04mmvdHlmrXTXqy6ErtayS57G5+it +YFc1SfFWFz+I/RI470Yw/GI2lklbouxG7XvADLXAqXBw2b8I3HYGag0MVNmRnwpG +D6rjYX2k1Z2X8mghiWTn35YYCmy1qpdZ9YCDrRBhcRiFsLEZ+V+6djo0wXMKXfM= +=wrb0 +-----END PGP SIGNATURE----- -- cgit v1.2.3-70-g09d2