ChangeLog for: 2013-02-08 04:57:05
a/elilo-3.14-x86_64-1.txz:  Added.
d/llvm-3.2-x86_64-3.txz:  Rebuilt.
  Fixed a few places where lib64 was hardcoded regardless of $ARCH.
  Thanks to Heinz Wiesinger.
l/sdl-1.2.15-x86_64-1.txz:  Upgraded.
  Upgraded to SDL-1.2.15, SDL_image-1.2.12, SDL_mixer-1.2.12,
  SDL_net-1.2.8, and SDL_ttf-2.0.11.
  Patched resizing and mouse clicking bugs.
n/curl-7.29.0-x86_64-1.txz:  Upgraded.
  When negotiating SASL DIGEST-MD5 authentication, the function
  Curl_sasl_create_digest_md5_message() uses the data provided from the
  server without doing the proper length checks and that data is then
  appended to a local fixed-size buffer on the stack.  This vulnerability
  can be exploited by someone who is in control of a server that a libcurl
  based program is accessing with POP3, SMTP or IMAP.  For applications
  that accept user provided URLs, it is also thinkable that a malicious
  user would feed an application with a URL to a server hosting code
  targeting this flaw.
  Affected versions: curl 7.26.0 to and including 7.28.1
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
  (* Security fix *)