[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

list of 2.1r4 changes (was: Re: Last call for updated non-i386 packages.)



Here is an attempt to make a proper list for a release announcement.
This is all from memory so far, so some things are missing or possible
incorrect. Vincent: can you check this list, fix any errors in it
and fill in the blanks?

Security updates:
  package      : amd
  version      : 102-23.slink2
  architectures: alpha i386 m68k sparc
  vulnerability: remote exploit

  package      : bind
  version      : 8.2.2p5-0slink1
  architectures: alpha i386 m68k sparc
  vulnerability: remote DoS

  package      : dump
  version      : 0.4b9-0slink1
  architectures: alpha i386 m68k sparc
  vulnerability: local exploit

  package      : kernel-source-2.0.38
  version      : 2.0.38-0
  architectures: i386 (ALPHA & M68k MISSING!!)
  vulnerability: various

  package      : inn
  version      : 1.7.2-4.1
  architectures: alpha i386 m68k sparc
  vulnerability: remove DoS (CHECK!)

  package      : libdb2
  version      : 1.85.4-4
  architectures: alpha
  vulnerability: CHECK!

  package      : lpr
  version      : 0.46-1-0slink1
  architectures: alpha i386 m68k sparc
  vulnerability: remote exploit (CHECK!)

  package      : mirror
  version      : 2.9-2.1
  architectures: all
  vulnerability: remote exploit

  package      : netkit-telnet
  version      : 0.12-4slink.1
  architectures: alpha i386 m68k sparc
  vulnerability: remote DoS

  package      : nfs-server
  version      : 2.2beta37-1slink.1
  architectures: alpha i386 m68k sparc  (ALPHA MISSING!!!!)
  vulnerability: remote exploit

  package      : nis
  version      : 3.5-2
  architectures: alpha i386 m68k sparc
  vulnerability: remote exploit

  package      : proftpd
  version      : 1.2.0pre9-4
  architectures: alpha i386 m68k sparc
  vulnerability: remote exploit

  package      : pvm
  version      : 3.4beta7-4
  architectures: i386 m68k
  vulnerability: local exploit

  package      : rvplayer
  version      : 5.0-9
  architectures: alpha i386 m68k sparc
  vulnerability: CHECK!!

  package      : termcap-compat
  version      : 1.1.2
  architectures: i386 m68k
  vulnerability: CHECK!!

  package      : 
  version      :
  architectures: alpha i386 m68k sparc
  vulnerability: 


Y2K updates:
  package      : cvs
  version      : 1.10.7-1.99.slink.y2k.0
  architectures: alpha i386 m68k (SPARC MISSING!!!!)
  issue        : CHECK!!

  package      : egcs
  version      : 1.1.2-0slink1 and 1.1.2-0slink2
  architectures: alpha i386 m68k (SPARC MISSING!!!!)
  issue        : date handling in g77

  package      : enscript
  version      : 1.6.2-3.99.slink.y2k.0
  architectures: alpha i386 (M68K and SPARC MISSING!!!!)
  issue        : CHECK!!!

  package      : gnats
  version      : 3.113-0slink1
  architectures: alpha i386 m68k (SPARC MISSING!!!!)
  issue        : CHECK!!

  package      : gs
  version      : 5.10-3.99.slink.1
  architectures: i386 (ALPHA, M68K and SPARC MISSING!!!!)
  issue        : CHECK!!!

  package      : htdig
  version      : 3.1.2-4slink5
  architectures: alpha i386 (M68K and SPARC MISSING!!!!)
  issue        : CHECK!!!

  package      : smartlist
  version      : 3.13-2
  architectures: alpha i386 m68k (SPARC MISSING!!!!)
  issue        : CHECK!!!

  package      : vblib2
  version      : 2.24.2-2.99.slink.0
  architectures: alpha i386 m68k (SPARC MISSING!!!!)
  issue        : CHECK!!

Other updates:
  package      : selfhtml
  version      : 7.0-3
  architectures: alpha i386 m68k sparc
  problem      : trademark violation

  package      : pcmcia-cs
  version      : 38-0_i386
  architectures: i386 (are the others relevant???) 
  problem      : CHECK!!!

Wichert.

-- 
   ________________________________________________________________
 / Generally uninteresting signature - ignore at your convenience  \
| wichert@liacs.nl                    http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |

Attachment: pgpA8mbuBx1qt.pgp
Description: PGP signature


Reply to: