ChangeLog for: 2013-08-06 06:23:34

Looks like 3.10.x got LTS status, but more importantly fixes the power issue on resume with some Intel machines. So, we're bumping the kernel to 3.10.5, and will stick with that series for the release. A few more things to look at before calling this a beta, but it's pretty close. Enjoy! a/glibc-solibs-2.17-x86_64-5.txz: Rebuilt. a/glibc-zoneinfo-2013d-noarch-5.txz: Rebuilt. Upgraded to tzcode2013d and tzdata2013d. a/kernel-generic-3.10.5-x86_64-1.txz: Upgraded. a/kernel-huge-3.10.5-x86_64-1.txz: Upgraded. a/kernel-modules-3.10.5-x86_64-1.txz: Upgraded. d/kernel-headers-3.10.5-x86-1.txz: Upgraded. k/kernel-source-3.10.5-noarch-1.txz: Upgraded. l/glibc-2.17-x86_64-5.txz: Rebuilt. l/glibc-i18n-2.17-x86_64-5.txz: Rebuilt. l/glibc-profile-2.17-x86_64-5.txz: Rebuilt. n/bind-9.9.3_P2-x86_64-1.txz: Upgraded. This update fixes a security issue where a specially crafted query can cause BIND to terminate abnormally, resulting in a denial of service. For more information, see: https://kb.isc.org/article/AA-01015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854 (* Security fix *) n/httpd-2.4.6-x86_64-1.txz: Upgraded. This update addresses two security issues: * SECURITY: CVE-2013-1896 (cve.mitre.org) Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. * SECURITY: CVE-2013-2249 (cve.mitre.org) mod_session_dbd: Make sure that dirty flag is respected when saving sessions, and ensure the session ID is changed each time the session changes. This changes the format of the updatesession SQL statement. Existing configurations must be changed. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249 (* Security fix *) n/samba-4.0.8-x86_64-1.txz: Upgraded. This update fixes missing integer wrap protection in an EA list reading that can allow authenticated or guest connections to cause the server to loop, resulting in a denial of service. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.