The signs are agreeing with a release, since the m68k machine I was
building stuff on crashed today. Figures.
Anyway, the 2.1r4 release will happen tomorrow (Monday). I have all
the packages recompiled now, so everything should be ready. Pending
missing dependencies, those still need to be checked.
Security updates:
package : amd
version : 102-23.slink2
architectures: alpha i386 m68k sparc
vulnerability: remote exploit
package : bind
version : 8.2.2p5-0slink1
architectures: alpha i386 m68k sparc
vulnerability: remote DoS
package : dump
version : 0.4b9-0slink1
architectures: alpha i386 m68k sparc
vulnerability: local exploit
package : kernel-source-2.0.38
version : 2.0.38-0
architectures: i386
vulnerability: various
package : htdig
version : 3.1.2-4slink6
architectures: alpha i386 m68k sparc
vulnerability: remote exploit
package : inn
version : 1.7.2-4.1
architectures: alpha i386 m68k sparc
vulnerability: fix buffer overflow in inews
package : libdb2
version : 1.85.4-4
architectures: alpha
vulnerability: buffer overflow
package : lpr
version : 0.46-1-0slink1
architectures: alpha i386 m68k sparc
vulnerability: local exploit (users could print files they couldn't read)
package : mirror
version : 2.9-2.1
architectures: all
vulnerability: remote exploit
package : netkit-telnet
version : 0.12-4slink.1
architectures: alpha i386 m68k sparc
vulnerability: remote DoS
package : nfs-server
version : 2.2beta37-1slink.1
architectures: alpha i386 m68k sparc
vulnerability: remote exploit
package : nis
version : 3.5-2
architectures: alpha i386 m68k sparc
vulnerability: remote exploit
package : proftpd
version : 1.2.0pre9-4
architectures: alpha i386 m68k sparc
vulnerability: remote exploit
package : pvm
version : 3.4beta7-4
architectures: i386
vulnerability: local exploit
package : rvplayer
version : 5.0-9
architectures: i386
vulnerability: local exploit
package : termcap-compat
version : 1.1.2
architectures: i386 m68k (not applicable to alpha, sparc)
vulnerability: local exploit (buffer overflows)
package : sendmail
version : 8.9.3-3slink1.0.1
architectures: alpha i386 m68k sparc
vulnerability: local exploit
package : sendmail-wide
version : 8.9.3+3.2W-3slink1
architectures: alpha i386 m68k sparc
vulnerability: local exploit
Y2K updates:
package : cvs
version : 1.10.7-1.99.slink.y2k.0
architectures: alpha i386 m68k sparc
issue : date in logs
package : egcs
version : 1.1.2-0slink1 and 1.1.2-0slink2
architectures: alpha i386 m68k sparc
issue : date handling in g77
package : elm-me+
version : 2.4pl25ME+65-0.slink.0
architectures: alpha i386 m68k sparc
issue : incorrect handling of long numbers causing errors
in date sorting
package : enscript
version : 1.6.2-3.99.slink.y2k.0
architectures: alpha i386 m68k sparc
issue : Versions < 1.6.1 are known to have problems with y2k dates.
package : gnats
version : 3.113-0slink1
architectures: alpha i386 m68k sparc
issue : fix y2k problem
package : gs
version : 5.10-3.99.slink.1
architectures: alpha i386 m68k sparc
issue : fix y2k problem
package : sharutils
version : 1:4.2.1-1
architectures: alpha i386 m68k sparc
issue : date handling in shar files
package : smartlist
version : 3.13-2
architectures: alpha i386 m68k sparc
issue : volume number in digest processing
Other updates:
package : selfhtml
version : 7.0-3
architectures: alpha i386 m68k sparc
problem : trademark violation
package : pcmcia-cs
version : 3.0.5-10.slink.1
architectures: i386
problem : recompile for new 2.0.38 kernel
package : trn
version : 3.6-9.3.2
architectures: m68k
problem : sync with other archs.
package : vflib2
version : 2.24.2-2.99.slink.0
architectures: alpha i386 m68k sparc
issue : needed by new gs.
--
________________________________________________________________
/ Generally uninteresting signature - ignore at your convenience \
| wichert@liacs.nl http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0 2805 3CB8 9250 2FA3 BC2D |
Attachment:
pgp1FpVHL4kim.pgp
Description: PGP signature