ChangeLog for: 2013-08-06 06:23:34
Looks like 3.10.x got LTS status, but more importantly fixes the power issue
on resume with some Intel machines.  So, we're bumping the kernel to 3.10.5,
and will stick with that series for the release.  A few more things to look at
before calling this a beta, but it's pretty close.  Enjoy!
a/glibc-solibs-2.17-x86_64-5.txz:  Rebuilt.
a/glibc-zoneinfo-2013d-noarch-5.txz:  Rebuilt.
  Upgraded to tzcode2013d and tzdata2013d.
a/kernel-generic-3.10.5-x86_64-1.txz:  Upgraded.
a/kernel-huge-3.10.5-x86_64-1.txz:  Upgraded.
a/kernel-modules-3.10.5-x86_64-1.txz:  Upgraded.
d/kernel-headers-3.10.5-x86-1.txz:  Upgraded.
k/kernel-source-3.10.5-noarch-1.txz:  Upgraded.
l/glibc-2.17-x86_64-5.txz:  Rebuilt.
l/glibc-i18n-2.17-x86_64-5.txz:  Rebuilt.
l/glibc-profile-2.17-x86_64-5.txz:  Rebuilt.
n/bind-9.9.3_P2-x86_64-1.txz:  Upgraded.
  This update fixes a security issue where a specially crafted query can cause
  BIND to terminate abnormally, resulting in a denial of service.
  For more information, see:
    https://kb.isc.org/article/AA-01015
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
  (* Security fix *)
n/httpd-2.4.6-x86_64-1.txz:  Upgraded.
  This update addresses two security issues:
  * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against
    a URI handled by mod_dav_svn with the source href (sent as part of the
    request body as XML) pointing to a URI that is not configured for DAV
    will trigger a segfault.
  * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that
    dirty flag is respected when saving sessions, and ensure the session ID
    is changed each time the session changes.  This changes the format of the
    updatesession SQL statement.  Existing configurations must be changed.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
  (* Security fix *)
n/samba-4.0.8-x86_64-1.txz:  Upgraded.
  This update fixes missing integer wrap protection in an EA list reading
  that can allow authenticated or guest connections to cause the server to
  loop, resulting in a denial of service.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.