summaryrefslogtreecommitdiffstats
path: root/testing (follow)
Commit message (Expand)AuthorAgeFilesLines
* Sat Oct 28 22:03:51 UTC 2023...d/rust-1.70.0-x86_64-3.txz: Rebuilt. Fixed the installation of rls and added rust-analyzer (the successor to rls) and rust-demangler. Thanks to Heinz Wiesinger. l/enchant-2.6.2-x86_64-1.txz: Upgraded. l/gexiv2-0.14.2-x86_64-2.txz: Rebuilt. Recompiled against exiv2-0.28.0. l/libsigc++3-3.6.0-x86_64-1.txz: Upgraded. l/vid.stab-1.1.1-x86_64-1.txz: Upgraded. x/ibus-m17n-1.4.23-x86_64-1.txz: Upgraded. testing/packages/rust-1.73.0-x86_64-2.txz: Rebuilt. Fixed the installation of rls and added rust-analyzer (the successor to rls) and rust-demangler. Thanks to Heinz Wiesinger. 20231028220351 Patrick J Volkerding2023-10-291-2/+7
* Wed Oct 11 22:22:40 UTC 2023...l/libcaca-0.99.beta20-x86_64-1.txz: Upgraded. Fixed a crash bug (a crafted file defining width of zero leads to divide by zero and a crash). Seems to be merely a bug rather than a security issue, but I'd been meaning to get beta20 building so this was a good excuse. Thanks to marav. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-0856 (* Security fix *) l/libcue-2.3.0-x86_64-1.txz: Upgraded. xap/xscreensaver-6.08-x86_64-1.txz: Upgraded. testing/packages/rust-1.73.0-x86_64-1.txz: Upgraded. 20231011222240 Patrick J Volkerding2023-10-122-7/+7
* Mon Oct 9 18:10:01 UTC 2023...a/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt. ap/qpdf-11.6.2-x86_64-1.txz: Upgraded. ap/vim-9.0.2009-x86_64-1.txz: Upgraded. l/desktop-file-utils-0.27-x86_64-1.txz: Upgraded. l/glibc-2.38-x86_64-2.txz: Rebuilt. These glibc packages are the exact ones that were previously in /testing. A test mass rebuild was done here finding no new FTBFS, so I think these are good to go. :) l/glibc-i18n-2.38-x86_64-2.txz: Rebuilt. l/glibc-profile-2.38-x86_64-2.txz: Rebuilt. l/imagemagick-7.1.1_20-x86_64-1.txz: Upgraded. l/libxkbcommon-1.6.0-x86_64-1.txz: Upgraded. l/shared-mime-info-2.3-x86_64-1.txz: Upgraded. n/c-ares-1.20.0-x86_64-1.txz: Upgraded. n/libtirpc-1.3.4-x86_64-1.txz: Upgraded. n/proftpd-1.3.8a-x86_64-1.txz: Upgraded. n/whois-5.5.19-x86_64-1.txz: Upgraded. Fixed english support for Japanese queries to not add again the /e argument if it had already been provided by the user. (Closes: #1050171) Added the .ye and .*************** (.xn--54b7fta0cc, Bangladesh) TLD servers. Updated the .ba, .bb, .dk, .es, .gt, .jo, .ml, .mo, .pa, .pn, .sv, .uy, .a+-la-r+-d+.n+, (.xn--mgbayh7gpa, Jordan) and .****** (.xn--mix891f, Macao) TLD servers. Upgraded the TLD URLs to HTTPS whenever possible. Updated the charset for whois.jprs.jp. Removed 3 new gTLDs which are no longer active. Removed support for the obsolete as32 dot notation. x/xterm-386-x86_64-1.txz: Upgraded. xap/vim-gvim-9.0.2009-x86_64-1.txz: Upgraded. 20231009181001 Patrick J Volkerding2023-10-0919-2081/+0
* Tue Oct 3 22:19:10 UTC 2023...a/aaa_glibc-solibs-2.37-x86_64-3.txz: Rebuilt. a/dialog-1.3_20231002-x86_64-1.txz: Upgraded. ap/mpg123-1.32.3-x86_64-1.txz: Upgraded. d/llvm-17.0.2-x86_64-1.txz: Upgraded. d/meson-1.2.2-x86_64-2.txz: Rebuilt. [PATCH] Revert rust: apply global, project, and environment C args to bindgen. This fixes building Mesa. Thanks to lucabon and marav. kde/calligra-3.2.1-x86_64-34.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/cantor-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kfilemetadata-5.110.0-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kile-2.9.93-x86_64-28.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/kitinerary-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/krita-5.1.5-x86_64-15.txz: Rebuilt. Recompiled against poppler-23.10.0. kde/okular-23.08.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.10.0. l/glibc-2.37-x86_64-3.txz: Rebuilt. l/glibc-i18n-2.37-x86_64-3.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) l/glibc-profile-2.37-x86_64-3.txz: Rebuilt. l/mozilla-nss-3.94-x86_64-1.txz: Upgraded. l/poppler-23.10.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.44.2-x86_64-1.txz: Upgraded. n/irssi-1.4.5-x86_64-1.txz: Upgraded. x/fcitx5-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-gtk-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-hangul-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-kkc-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-m17n-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.1-x86_64-1.txz: Upgraded. x/fcitx5-sayura-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-extra-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-table-other-5.1.0-x86_64-1.txz: Upgraded. x/fcitx5-unikey-5.1.1-x86_64-1.txz: Upgraded. x/libX11-1.8.7-x86_64-1.txz: Upgraded. This update fixes security issues: libX11: out-of-bounds memory access in _XkbReadKeySyms(). libX11: stack exhaustion from infinite recursion in PutSubImage(). libX11: integer overflow in XCreateImage() leading to a heap overflow. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43785 https://www.cve.org/CVERecord?id=CVE-2023-43786 https://www.cve.org/CVERecord?id=CVE-2023-43787 (* Security fix *) x/libXpm-3.5.17-x86_64-1.txz: Upgraded. This update fixes security issues: libXpm: out of bounds read in XpmCreateXpmImageFromBuffer(). libXpm: out of bounds read on XPM with corrupted colormap. For more information, see: https://lists.x.org/archives/xorg-announce/2023-October/003424.html https://www.cve.org/CVERecord?id=CVE-2023-43788 https://www.cve.org/CVERecord?id=CVE-2023-43789 (* Security fix *) testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-2.38-x86_64-2.txz: Rebuilt. Patched to fix the "Looney Tunables" vulnerability, a local privilege escalation in ld.so. This vulnerability was introduced in April 2021 (glibc 2.34) by commit 2ed18c. Thanks to Qualys Research Labs for reporting this issue. For more information, see: https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.cve.org/CVERecord?id=CVE-2023-4911 (* Security fix *) testing/packages/glibc-i18n-2.38-x86_64-2.txz: Rebuilt. testing/packages/glibc-profile-2.38-x86_64-2.txz: Rebuilt. 20231003221910 Patrick J Volkerding2023-10-042-1/+174
* Fri Sep 29 19:45:18 UTC 2023...d/meson-1.2.2-x86_64-1.txz: Upgraded. l/nodejs-20.8.0-x86_64-1.txz: Upgraded. l/sof-firmware-2023.09-noarch-1.txz: Upgraded. n/bluez-5.70-x86_64-1.txz: Upgraded. n/php-8.2.11-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.php.net/ChangeLog-8.php#8.2.11 x/mesa-23.2.1-x86_64-1.txz: Upgraded. x/xman-1.1.6-x86_64-1.txz: Upgraded. xfce/xfce4-clipman-plugin-1.6.5-x86_64-1.txz: Upgraded. 20230929194518 Patrick J Volkerding2023-09-291-3/+14
* Thu Sep 28 21:37:06 UTC 2023...ap/mpg123-1.32.2-x86_64-1.txz: Upgraded. l/cairo-1.18.0-x86_64-1.txz: Upgraded. l/gtk4-4.12.3-x86_64-1.txz: Upgraded. x/fonttosfnt-1.2.3-x86_64-1.txz: Upgraded. xap/geeqie-2.1-x86_64-2.txz: Rebuilt. Patched and recompiled against lua-5.4.6. xap/mozilla-firefox-115.3.1esr-x86_64-1.txz: Upgraded. This update contains a security fix. For more information, see: https://www.mozilla.org/en-US/firefox/115.3.1/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/ https://www.cve.org/CVERecord?id=CVE-2023-5217 (* Security fix *) xfce/xfce4-panel-4.18.5-x86_64-1.txz: Upgraded. testing/packages/aaa_glibc-solibs-2.38-x86_64-1.txz: Added. testing/packages/glibc-2.38-x86_64-1.txz: Added. Instead of building the deprecated glibc crypt library, bundle libxcrypt-4.4.36 (both .so.1 compat version and .so.2 new API version). testing/packages/glibc-i18n-2.38-x86_64-1.txz: Added. testing/packages/glibc-profile-2.38-x86_64-1.txz: Added. 20230928213706 Patrick J Volkerding2023-09-2918-0/+1897
* Wed Sep 20 00:08:45 UTC 2023...a/gettext-0.22.1-x86_64-1.txz: Upgraded. a/kernel-firmware-20230918_3672cca-noarch-1.txz: Upgraded. a/kernel-generic-6.1.54-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.54-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.54-x86_64-1.txz: Upgraded. a/openssl-solibs-3.1.3-x86_64-1.txz: Upgraded. ap/ghostscript-10.02.0-x86_64-2.txz: Rebuilt. [PATCH] PDF interpreter - fix PageList processing. Thanks to denydias. d/gettext-tools-0.22.1-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.54-x86-1.txz: Upgraded. k/kernel-source-6.1.54-noarch-1.txz: Upgraded. l/dconf-editor-45.0-x86_64-1.txz: Upgraded. l/harfbuzz-8.2.1-x86_64-1.txz: Upgraded. l/nodejs-20.7.0-x86_64-1.txz: Upgraded. n/openssl-3.1.3-x86_64-1.txz: Upgraded. This update fixes bugs and a security issue that does not affect Linux: Fix POLY1305 MAC implementation corrupting XMM registers on Windows. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-4807 isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.72.1-x86_64-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230920000845 Patrick J Volkerding2023-09-202-3/+3
* Sat Sep 9 18:05:16 UTC 2023...a/mcelog-195-x86_64-1.txz: Upgraded. d/rust-1.70.0-x86_64-2.txz: Rebuilt. Fixed path in rust-lldb. Thanks to gildbg. l/glib2-2.78.0-x86_64-1.txz: Upgraded. l/gobject-introspection-1.78.0-x86_64-1.txz: Upgraded. l/harfbuzz-8.2.0-x86_64-1.txz: Upgraded. l/nodejs-20.6.1-x86_64-1.txz: Upgraded. n/mutt-2.2.12-x86_64-1.txz: Upgraded. x/font-util-1.4.1-x86_64-1.txz: Upgraded. testing/packages/rust-1.72.0-x86_64-2.txz: Rebuilt. Fixed path in rust-lldb. Thanks to gildbg. 20230909180516 Patrick J Volkerding2023-09-091-1/+8
* Sat Aug 26 05:08:30 UTC 2023...kde/calligra-3.2.1-x86_64-32.txz: Rebuilt. Recompiled against okular-23.08.0. l/freetype-2.13.2-x86_64-1.txz: Upgraded. n/bluez-5.69-x86_64-1.txz: Upgraded. t/fig2dev-3.2.9-x86_64-1.txz: Upgraded. t/xfig-3.2.9-x86_64-1.txz: Upgraded. x/libinput-1.24.0-x86_64-1.txz: Upgraded. x/xf86-input-libinput-1.4.0-x86_64-1.txz: Upgraded. testing/packages/rust-1.72.0-x86_64-1.txz: Upgraded. 20230826050830 Patrick J Volkerding2023-08-262-7/+7
* Fri Aug 4 20:17:36 UTC 2023...a/hwdata-0.373-noarch-1.txz: Upgraded. a/kernel-firmware-20230731_253cc17-noarch-1.txz: Upgraded. a/kernel-generic-6.1.43-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.43-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.43-x86_64-1.txz: Upgraded. a/sysklogd-2.5.1-x86_64-1.txz: Upgraded. a/xz-5.4.4-x86_64-1.txz: Upgraded. ap/man-pages-6.05.01-noarch-1.txz: Upgraded. d/kernel-headers-6.1.43-x86-1.txz: Upgraded. k/kernel-source-6.1.43-noarch-1.txz: Upgraded. kde/ktextaddons-1.4.0-x86_64-1.txz: Upgraded. l/SDL2-2.28.2-x86_64-1.txz: Upgraded. l/harfbuzz-8.1.1-x86_64-1.txz: Upgraded. l/mozjs102-102.14.0esr-x86_64-1.txz: Upgraded. l/netpbm-11.03.01-x86_64-1.txz: Upgraded. l/openexr-3.1.10-x86_64-1.txz: Upgraded. l/pipewire-0.3.77-x86_64-1.txz: Upgraded. l/poppler-23.08.0-x86_64-1.txz: Upgraded. xap/mozilla-firefox-115.1.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/115.1.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/ https://www.cve.org/CVERecord?id=CVE-2023-4045 https://www.cve.org/CVERecord?id=CVE-2023-4046 https://www.cve.org/CVERecord?id=CVE-2023-4047 https://www.cve.org/CVERecord?id=CVE-2023-4048 https://www.cve.org/CVERecord?id=CVE-2023-4049 https://www.cve.org/CVERecord?id=CVE-2023-4050 https://www.cve.org/CVERecord?id=CVE-2023-4052 https://www.cve.org/CVERecord?id=CVE-2023-4054 https://www.cve.org/CVERecord?id=CVE-2023-4055 https://www.cve.org/CVERecord?id=CVE-2023-4056 https://www.cve.org/CVERecord?id=CVE-2023-4057 (* Security fix *) xap/mozilla-thunderbird-115.1.0-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/115.1.0/releasenotes/ isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.71.1-x86_64-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230804201736 Patrick J Volkerding2023-08-0416-1810/+2
* Fri Jul 14 17:53:34 UTC 2023...ap/vim-9.0.1677-x86_64-1.txz: Upgraded. n/nftables-1.0.8-x86_64-1.txz: Upgraded. x/xeyes-1.3.0-x86_64-1.txz: Upgraded. xap/vim-gvim-9.0.1677-x86_64-1.txz: Upgraded. testing/packages/rust-1.71.0-x86_64-1.txz: Added. 20230714175334 Patrick J Volkerding2023-07-145-0/+407
* Wed Jul 12 20:41:16 UTC 2023...ap/inxi-3.3.28_1-noarch-1.txz: Upgraded. ap/sudo-1.9.14p1-x86_64-1.txz: Upgraded. d/rust-1.70.0-x86_64-1.txz: Upgraded. l/harfbuzz-8.0.1-x86_64-1.txz: Upgraded. l/lmdb-0.9.31-x86_64-1.txz: Upgraded. l/pipewire-0.3.74-x86_64-1.txz: Upgraded. n/krb5-1.21.1-x86_64-1.txz: Upgraded. Fix potential uninitialized pointer free in kadm5 XDR parsing. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-36054 (* Security fix *) n/libnftnl-1.2.6-x86_64-1.txz: Upgraded. n/nghttp2-1.55.0-x86_64-1.txz: Upgraded. n/openldap-2.6.5-x86_64-1.txz: Upgraded. x/ibus-table-1.17.1-x86_64-1.txz: Upgraded. x/xterm-384-x86_64-1.txz: Upgraded. xap/mozilla-firefox-115.0.2esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/115.0.2esr/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2023-26/ https://www.cve.org/CVERecord?id=CVE-2023-3600 (* Security fix *) testing/packages/mozilla-thunderbird-115.0-x86_64-1.txz: Added. 20230712204116 Patrick J Volkerding2023-07-1217-359/+1761
* Mon Jun 12 20:37:03 UTC 2023...ap/xorriso-1.5.6.pl01-x86_64-1.txz: Upgraded. d/rust-1.69.0-x86_64-1.txz: Upgraded. n/ntp-4.2.8p17-x86_64-2.txz: Rebuilt. Fixed typo in ntp.conf comments. Fixed logic in ntp.logrotate to allow proper rotation on systems where ntpd is not automatically started at boot. Thanks to allend. x/xkeyboard-config-2.39-noarch-1.txz: Upgraded. testing/packages/rust-1.70.0-x86_64-1.txz: Upgraded. 20230612203703 Patrick J Volkerding2023-06-132-8/+7
* Tue Jun 6 20:26:59 UTC 2023...a/kernel-firmware-20230531_fc90c59-noarch-1.txz: Upgraded. a/kernel-generic-6.1.32-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.32-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.32-x86_64-1.txz: Upgraded. d/gcc-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-gm2-13.1.0-x86_64-2.txz: Added. d/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-go-13.1.0-x86_64-2.txz: Rebuilt. d/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt. d/kernel-headers-6.1.32-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-5.txz: Rebuilt. Recompiled to update embedded GCC version number. k/kernel-source-6.1.32-noarch-1.txz: Upgraded. kde/calligra-3.2.1-x86_64-30.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/cantor-23.04.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/kfilemetadata-5.106.0-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/kile-2.9.93-x86_64-25.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/kitinerary-23.04.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/krita-5.1.5-x86_64-10.txz: Rebuilt. Recompiled against poppler-23.06.0. kde/okteta-0.26.11-x86_64-1.txz: Upgraded. kde/okular-23.04.1-x86_64-2.txz: Rebuilt. Recompiled against poppler-23.06.0. l/enchant-2.5.0-x86_64-1.txz: Upgraded. l/gtk4-4.10.4-x86_64-1.txz: Upgraded. l/mozilla-nss-3.90-x86_64-1.txz: Upgraded. l/openexr-3.1.8-x86_64-1.txz: Upgraded. l/poppler-23.06.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/qtkeychain-0.14.1-x86_64-1.txz: Upgraded. n/krb5-1.21-x86_64-1.txz: Upgraded. n/ntp-4.2.8p17-x86_64-1.txz: Upgraded. This is a bugfix release. n/postfix-3.8.1-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-23.1.2-x86_64-1.txz: Upgraded. x/xorgproto-2023.1-x86_64-1.txz: Upgraded. xap/mozilla-firefox-114.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/114.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2023-20/ https://www.cve.org/CVERecord?id=CVE-2023-34414 https://www.cve.org/CVERecord?id=CVE-2023-34415 https://www.cve.org/CVERecord?id=CVE-2023-34416 https://www.cve.org/CVERecord?id=CVE-2023-34417 (* Security fix *) xfce/xfce4-panel-profiles-1.0.14-x86_64-1.txz: Upgraded. extra/sendmail/sendmail-8.17.2-x86_64-2.txz: Rebuilt. Recompiled without -DUSE_EAI or ICU libraries as this experimental option is still leading to regressions. extra/sendmail/sendmail-cf-8.17.2-noarch-2.txz: Rebuilt. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230606202659 Patrick J Volkerding2023-06-0712-862/+0
* Mon May 8 23:42:23 UTC 2023...a/less-633-x86_64-1.txz: Upgraded. ap/inxi-3.3.27_1-noarch-1.txz: Upgraded. d/rust-1.68.2-x86_64-2.txz: Upgraded. l/mlt-7.16.0-x86_64-1.txz: Upgraded. x/m17n-lib-1.8.1-x86_64-1.txz: Upgraded. x/xf86-video-dummy-0.4.1-x86_64-1.txz: Upgraded. testing/packages/rust-1.69.0-x86_64-1.txz: Upgraded. 20230508234223 Patrick J Volkerding2023-05-092-8/+8
* Fri May 5 22:49:16 UTC 2023...ap/at-3.2.5-x86_64-1.txz: Upgraded. l/babl-0.1.106-x86_64-1.txz: Upgraded. l/libdiscid-0.6.4-x86_64-2.txz: Rebuilt. Patched to fix pkgconfig file. Thanks to ponce. tcl/tclx-8.6.1-x86_64-1.txz: Upgraded. x/libevdev-1.13.1-x86_64-1.txz: Upgraded. x/xcalc-1.1.2-x86_64-1.txz: Upgraded. testing/packages/gcc-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-gm2-13.1.0-x86_64-2.txz: Added. testing/packages/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-go-13.1.0-x86_64-2.txz: Rebuilt. testing/packages/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt. 20230505224916 Patrick J Volkerding2023-05-062-6/+60
* Thu Apr 27 04:40:20 UTC 2023...a/kernel-generic-6.1.26-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.26-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.26-x86_64-1.txz: Upgraded. ap/dc3dd-7.3.1-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.26-x86-1.txz: Upgraded. k/kernel-source-6.1.26-noarch-1.txz: Upgraded. l/harfbuzz-7.2.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/gcc-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-g++-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-gdc-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-gfortran-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-gnat-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-go-13.1.0-x86_64-1.txz: Added. testing/packages/gcc-objc-13.1.0-x86_64-1.txz: Added. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230427044020 Patrick J Volkerding2023-04-2711-0/+808
* Fri Mar 31 18:01:09 UTC 2023...a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230331180109 Patrick J Volkerding2023-03-311-2/+2
* Tue Mar 28 19:36:46 UTC 2023...a/grub-2.06-x86_64-5.txz: Rebuilt. [PATCH] fs/ext2: Ignore checksum seed incompat feature. Fixes using ext4 with the default options in e2fsprogs-1.47.0. Thanks to USUARIONUEVO. a/shadow-4.13-x86_64-1.txz: Upgraded. ap/squashfs-tools-4.6.1-x86_64-1.txz: Upgraded. l/gsettings-desktop-schemas-44.0-x86_64-1.txz: Upgraded. l/gvfs-1.50.4-x86_64-1.txz: Upgraded. l/libcap-2.68-x86_64-1.txz: Upgraded. x/libva-utils-2.18.1-x86_64-1.txz: Upgraded. xfce/xfce4-screensaver-4.18.1-x86_64-1.txz: Upgraded. testing/packages/rust-1.68.2-x86_64-1.txz: Upgraded. 20230328193646 Patrick J Volkerding2023-03-282-2/+2
* Thu Mar 23 20:36:39 UTC 2023...a/grep-3.10-x86_64-1.txz: Upgraded. d/cmake-3.26.1-x86_64-1.txz: Upgraded. d/parallel-20230322-noarch-1.txz: Upgraded. l/netpbm-11.01.03-x86_64-1.txz: Upgraded. testing/packages/rust-1.68.1-x86_64-1.txz: Upgraded. 20230323203639 Patrick J Volkerding2023-03-232-2/+2
* Mon Mar 13 23:15:32 UTC 2023...a/kernel-firmware-20230313_c761dbe-noarch-1.txz: Upgraded. a/kernel-generic-6.1.19-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.19-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.19-x86_64-1.txz: Upgraded. a/mcelog-192-x86_64-1.txz: Upgraded. d/ccache-4.8-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.19-x86-1.txz: Upgraded. d/rust-1.67.1-x86_64-2.txz: Rebuilt. Moved here from /testing (not actually rebuilt). k/kernel-source-6.1.19-noarch-1.txz: Upgraded. l/imagemagick-7.1.1_3-x86_64-1.txz: Upgraded. n/vsftpd-3.0.5-x86_64-3.txz: Rebuilt. Patched to compile against openssl-3.0.8. Thanks to Stuart Winter. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.0-x86_64-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230313231532 Patrick J Volkerding2023-03-142-8/+8
* Wed Mar 8 20:26:54 UTC 2023...Hey folks, just some more updates on the road to an eventual beta. :-) At this point nothing remains linked with openssl-1.1.1 except for python2 and modules, and vsftpd. I think nobody cares about trying to force python2 to use openssl3... it's EOL but still a zombie, unfortunately. I have seen some patches for vsftpd and intend to take a look at them. We've bumped PHP to 8.2 and just gone ahead and killed 8.0 and 8.1. Like 7.4, 8.0 is not compatible with openssl3 and it doesn't seem worthwhile to try to patch it. And with 8.2 already out for several revisions, 8.1 does not seem particularly valuable. If you make use of PHP you should be used to it being a moving target by now. Enjoy, and let me know if anything isn't working right. Cheers! a/aaa_libraries-15.1-x86_64-19.txz: Rebuilt. Recompiled against openssl-3.0.8: libcups.so.2, libcurl.so.4.8.0, libldap.so.2.0.200, libssh2.so.1.0.1. a/cryptsetup-2.6.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. a/kmod-30-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. a/openssl-solibs-3.0.8-x86_64-1.txz: Upgraded. Shared library .so-version bump. a/openssl11-solibs-1.1.1t-x86_64-1.txz: Added. ap/cups-2.4.2-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. ap/hplip-3.20.5-x86_64-7.txz: Rebuilt. Recompiled against openssl-3.0.8. ap/lxc-4.0.12-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. ap/mariadb-10.6.12-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. ap/qpdf-11.3.0-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. ap/sudo-1.9.13p3-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. d/cargo-vendor-filterer-0.5.7-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. d/cvs-1.11.23-x86_64-9.txz: Rebuilt. Recompiled against openssl-3.0.8. d/git-2.39.2-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. d/perl-5.36.0-x86_64-5.txz: Rebuilt. Recompiled against openssl-3.0.8. d/python3-3.9.16-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. d/ruby-3.2.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. d/rust-1.66.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. d/scons-4.5.1-x86_64-1.txz: Upgraded. kde/falkon-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. kde/kitinerary-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/M2Crypto-0.38.0-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. l/SDL2-2.26.4-x86_64-1.txz: Upgraded. l/gst-plugins-bad-free-1.22.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/libarchive-3.6.2-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. l/libevent-2.1.12-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. l/libimobiledevice-20211124_2c6121d-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. l/libssh2-1.10.0-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/libvncserver-0.9.14-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/mlt-7.14.0-x86_64-1.txz: Upgraded. l/neon-0.32.5-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/nodejs-19.7.0-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/opusfile-0.12-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. l/pipewire-0.3.66-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/pulseaudio-16.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/pycurl-7.44.1-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. l/qca-2.3.5-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. l/qt5-5.15.8_20230304_d8b881f0-x86_64-1.txz: Upgraded. Compiled against openssl-3.0.8. l/serf-1.3.9-x86_64-8.txz: Rebuilt. Recompiled against openssl-3.0.8. n/alpine-2.26-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/bind-9.18.12-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/curl-7.88.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/cyrus-sasl-2.1.28-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/dovecot-2.3.20-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/epic5-2.1.12-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. n/fetchmail-6.4.37-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/htdig-3.2.0b6-x86_64-9.txz: Rebuilt. Recompiled against openssl-3.0.8. n/httpd-2.4.56-x86_64-1.txz: Upgraded. This update fixes two security issues: HTTP Response Smuggling vulnerability via mod_proxy_uwsgi. HTTP Request Smuggling attack via mod_rewrite and mod_proxy. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.56 https://www.cve.org/CVERecord?id=CVE-2023-27522 https://www.cve.org/CVERecord?id=CVE-2023-25690 (* Security fix *) NOTE: This package is compiled against openssl-3.0.8. n/irssi-1.4.3-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/krb5-1.20.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/lftp-4.9.2-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. n/links-2.28-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/lynx-2.9.0dev.10-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/mutt-2.2.9-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/net-snmp-5.9.3-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/netatalk-3.1.14-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/nmap-7.93-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/ntp-4.2.8p15-x86_64-12.txz: Rebuilt. Recompiled against openssl-3.0.8. n/openldap-2.6.4-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/openssh-9.2p1-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/openssl-3.0.8-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/openssl11-1.1.1t-x86_64-1.txz: Added. n/openvpn-2.6.0-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/php-8.2.3-x86_64-1.txz: Upgraded. Compiled against openssl-3.0.8. n/pidentd-3.0.19-x86_64-7.txz: Rebuilt. Recompiled against openssl-3.0.8. n/popa3d-1.0.3-x86_64-7.txz: Rebuilt. Recompiled against openssl-3.0.8. n/postfix-3.7.4-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/ppp-2.4.9-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. n/proftpd-1.3.8-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/rsync-3.2.7-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/s-nail-14.9.24-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/samba-4.18.0-x86_64-1.txz: Upgraded. Build with the bundled Heimdal instead of the system MIT Kerberos. Thanks again to rpenny. n/slrn-1.0.3a-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. n/snownews-1.9-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/socat-1.7.4.4-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/stunnel-5.69-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/tcpdump-4.99.3-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. n/wget-1.21.3-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. n/wpa_supplicant-2.10-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/freerdp-2.10.0-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/gftp-2.9.1b-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/gkrellm-2.3.11-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/hexchat-2.16.1-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/sane-1.0.32-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/x3270-4.0ga14-x86_64-3.txz: Rebuilt. Recompiled against openssl-3.0.8. xap/xine-lib-1.2.13-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. y/bsd-games-2.17-x86_64-4.txz: Rebuilt. Recompiled against openssl-3.0.8. extra/php80/php80-8.0.28-x86_64-1.txz: Removed. extra/php81/php81-8.1.16-x86_64-1.txz: Removed. extra/rust-for-mozilla/rust-1.60.0-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. extra/sendmail/sendmail-8.17.1-x86_64-7.txz: Rebuilt. Recompiled against openssl-3.0.8. extra/sendmail/sendmail-cf-8.17.1-noarch-7.txz: Rebuilt. testing/packages/rust-1.67.1-x86_64-2.txz: Rebuilt. Recompiled against openssl-3.0.8. testing/packages/samba-4.17.5-x86_64-2.txz: Removed. 20230308202654 Patrick J Volkerding2023-03-0810-854/+1
* Wed Feb 15 03:05:40 UTC 2023...a/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded. a/kernel-generic-6.1.12-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.12-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.12-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.12-x86-1.txz: Upgraded. d/rust-1.66.1-x86_64-1.txz: Upgraded. k/kernel-source-6.1.12-noarch-1.txz: Upgraded. kde/bluedevil-5.27.0-x86_64-1.txz: Upgraded. kde/breeze-5.27.0-x86_64-1.txz: Upgraded. kde/breeze-grub-5.27.0-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.27.0-x86_64-1.txz: Upgraded. kde/drkonqi-5.27.0-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.27.0-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.27.0-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.27.0-x86_64-1.txz: Upgraded. kde/kdecoration-5.27.0-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.27.0-x86_64-1.txz: Upgraded. kde/kgamma5-5.27.0-x86_64-1.txz: Upgraded. kde/khotkeys-5.27.0-x86_64-1.txz: Upgraded. kde/kinfocenter-5.27.0-x86_64-1.txz: Upgraded. kde/kmenuedit-5.27.0-x86_64-1.txz: Upgraded. kde/kpipewire-5.27.0-x86_64-1.txz: Upgraded. kde/kscreen-5.27.0-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.27.0-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.27.0-x86_64-1.txz: Upgraded. kde/ksystemstats-5.27.0-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.27.0-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.27.0-x86_64-1.txz: Upgraded. kde/kwin-5.27.0-x86_64-1.txz: Upgraded. kde/kwrited-5.27.0-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.27.0-x86_64-1.txz: Upgraded. kde/libkscreen-5.27.0-x86_64-1.txz: Upgraded. kde/libksysguard-5.27.0-x86_64-1.txz: Upgraded. kde/milou-5.27.0-x86_64-1.txz: Upgraded. kde/oxygen-5.27.0-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-disks-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-integration-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-nm-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-pa-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-vault-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.27.0-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.27.0-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.27.0-x86_64-1.txz: Upgraded. kde/powerdevil-5.27.0-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.27.0-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.27.0-x86_64-1.txz: Upgraded. kde/systemsettings-5.27.0-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.27.0-x86_64-1.txz: Upgraded. l/mozjs102-102.8.0esr-x86_64-1.txz: Upgraded. n/php-7.4.33-x86_64-3.txz: Rebuilt. This update fixes security issues: Core: Password_verify() always return true with some hash. Core: 1-byte array overrun in common path resolve code. SAPI: DOS vulnerability when parsing multipart request body. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0567 https://www.cve.org/CVERecord?id=CVE-2023-0568 https://www.cve.org/CVERecord?id=CVE-2023-0662 (* Security fix *) xap/mozilla-firefox-110.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/110.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-05/ https://www.cve.org/CVERecord?id=CVE-2023-25728 https://www.cve.org/CVERecord?id=CVE-2023-25730 https://www.cve.org/CVERecord?id=CVE-2023-25743 https://www.cve.org/CVERecord?id=CVE-2023-0767 https://www.cve.org/CVERecord?id=CVE-2023-25735 https://www.cve.org/CVERecord?id=CVE-2023-25737 https://www.cve.org/CVERecord?id=CVE-2023-25738 https://www.cve.org/CVERecord?id=CVE-2023-25739 https://www.cve.org/CVERecord?id=CVE-2023-25729 https://www.cve.org/CVERecord?id=CVE-2023-25732 https://www.cve.org/CVERecord?id=CVE-2023-25734 https://www.cve.org/CVERecord?id=CVE-2023-25740 https://www.cve.org/CVERecord?id=CVE-2023-25731 https://www.cve.org/CVERecord?id=CVE-2023-25733 https://www.cve.org/CVERecord?id=CVE-2023-25736 https://www.cve.org/CVERecord?id=CVE-2023-25741 https://www.cve.org/CVERecord?id=CVE-2023-25742 https://www.cve.org/CVERecord?id=CVE-2023-25744 https://www.cve.org/CVERecord?id=CVE-2023-25745 (* Security fix *) extra/php80/php80-8.0.28-x86_64-1.txz: Upgraded. This update fixes security issues: Core: Password_verify() always return true with some hash. Core: 1-byte array overrun in common path resolve code. SAPI: DOS vulnerability when parsing multipart request body. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0567 https://www.cve.org/CVERecord?id=CVE-2023-0568 https://www.cve.org/CVERecord?id=CVE-2023-0662 (* Security fix *) extra/php81/php81-8.1.16-x86_64-1.txz: Upgraded. This update fixes security issues: Core: Password_verify() always return true with some hash. Core: 1-byte array overrun in common path resolve code. SAPI: DOS vulnerability when parsing multipart request body. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0567 https://www.cve.org/CVERecord?id=CVE-2023-0568 https://www.cve.org/CVERecord?id=CVE-2023-0662 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.67.1-x86_64-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230215030540 Patrick J Volkerding2023-02-152-7/+7
* Fri Feb 3 20:04:33 UTC 2023...a/aaa_glibc-solibs-2.37-x86_64-2.txz: Rebuilt. a/e2fsprogs-1.46.6-x86_64-1.txz: Upgraded. a/hwdata-0.367-noarch-1.txz: Upgraded. l/glibc-2.37-x86_64-2.txz: Rebuilt. [PATCH] Account for grouping in printf width (bug 23432). This issue could cause a overflow with sprintf in the corner case where an application computes the size of buffer to be exactly enough to fit the digits in question, but sprintf ends up writing a couple of extra bytes. Thanks to marav for the heads-up. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-25139 (* Security fix *) l/glibc-i18n-2.37-x86_64-2.txz: Rebuilt. l/glibc-profile-2.37-x86_64-2.txz: Rebuilt. l/libcap-2.67-x86_64-1.txz: Upgraded. l/poppler-data-0.4.12-noarch-1.txz: Upgraded. extra/php81/php81-8.1.15-x86_64-1.txz: Upgraded. testing/packages/samba-4.17.5-x86_64-2.txz: Rebuilt. Build with the bundled Heimdal instead of the system MIT Kerberos, since MIT Kerberos has more issues when Samba is used as an AD DC. I'd appreciate any feedback on the "Samba on Slackware 15" thread on LQ about how well this works. Although it's not the sort of change I'd normally make in a -stable release such as Slackware 15.0, in this case I'm considering it if it can be done painlessly for any existing users... but I'll need to see some reports about this. I'd like to note that yes, of course we saw the "experimental" label in the configure flag we used to build Samba, but we also saw another prominent Linux distribution go ahead and use it anyway. :) And the Samba package built against MIT Kerberos cooked in the previous -current development cycle for a couple of years without any objections. Anyway, hopefully we'll get some testing from folks out there with networks that use AD and go from there. Thanks to Rowland Penny of the Samba team for clarifying this situation. 20230203200433 Patrick J Volkerding2023-02-039-0/+853
* Wed Jan 11 19:31:20 UTC 2023...d/patchelf-0.17.2-x86_64-1.txz: Upgraded. kde/kdevelop-pg-qt-2.2.2-x86_64-1.txz: Upgraded. n/NetworkManager-1.40.10-x86_64-1.txz: Upgraded. xfce/xfce4-panel-4.18.1-x86_64-1.txz: Upgraded. testing/packages/rust-1.66.1-x86_64-1.txz: Upgraded. 20230111193120 Patrick J Volkerding2023-01-112-2/+2
* Sat Jan 7 20:30:44 UTC 2023...We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact that a kernel bisect identified the patch that was preventing 32-bit from booting here on a Thinkpad X1E: ------ From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001 From: Michael Kelley <mikelley@microsoft.com> Date: Wed, 16 Nov 2022 10:41:24 -0800 Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in __ioremap_caller() commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream. Current code re-calculates the size after aligning the starting and ending physical addresses on a page boundary. But the re-calculation also embeds the masking of high order bits that exceed the size of the physical address space (via PHYSICAL_PAGE_MASK). If the masking removes any high order bits, the size calculation results in a huge value that is likely to immediately fail. Fix this by re-calculating the page-aligned size first. Then mask any high order bits using PHYSICAL_PAGE_MASK. Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in PAE mode") ------ The non-SMP non-PAE 32-bit kernel is fine even without the patch revert. The PAE kernel also works fine with this patch reverted without any need to revert ffa71f33a820 (the patch that this one is supposed to fix). The machine's excessive (for 32-bit) amount of physical RAM (64GB) might also be a factor here considering the PAE kernel works on all the other machines around here without reverting this patch. The patch is reverted only on 32-bit. Upstream report still pending. Enjoy! :-) a/kernel-generic-6.1.4-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.4-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.4-x86_64-1.txz: Upgraded. a/tree-2.1.0-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.4-x86-1.txz: Upgraded. k/kernel-source-6.1.4-noarch-1.txz: Upgraded. l/gvfs-1.50.3-x86_64-1.txz: Upgraded. l/hunspell-1.7.2-x86_64-1.txz: Upgraded. l/libnice-0.1.21-x86_64-1.txz: Upgraded. n/tin-2.6.2-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20230107203044 Patrick J Volkerding2023-01-0724-65457/+0
* Thu Jan 5 03:09:24 UTC 2023...a/btrfs-progs-6.1.1-x86_64-1.txz: Upgraded. a/hwdata-0.366-noarch-1.txz: Upgraded. a/kernel-firmware-20230104_4ee2014-noarch-1.txz: Upgraded. ap/vim-9.0.1146-x86_64-1.txz: Upgraded. Fixed security issues: Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143. Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0049 https://www.cve.org/CVERecord?id=CVE-2023-0051 (* Security fix *) d/mercurial-6.3.2-x86_64-1.txz: Upgraded. l/fluidsynth-2.3.1-x86_64-1.txz: Upgraded. l/libxkbcommon-1.5.0-x86_64-1.txz: Upgraded. n/fetchmail-6.4.35-x86_64-1.txz: Upgraded. xap/vim-gvim-9.0.1146-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-generic-6.1.3-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-headers-6.1.3-x86-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-huge-6.1.3-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-modules-6.1.3-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-source-6.1.3-noarch-1.txz: Upgraded. 20230105030924 Patrick J Volkerding2023-01-059-15/+115
* Sun Jan 1 03:25:48 UTC 2023...Happy New Year! :-) a/dialog-1.3_20221229-x86_64-1.txz: Upgraded. a/file-5.44-x86_64-1.txz: Upgraded. n/ipset-7.17-x86_64-1.txz: Upgraded. x/libva-2.17.0-x86_64-1.txz: Upgraded. x/libva-utils-2.17.0-x86_64-1.txz: Upgraded. x/mesa-22.3.2-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-generic-6.1.2-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-headers-6.1.2-x86-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-huge-6.1.2-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-modules-6.1.2-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-source-6.1.2-noarch-1.txz: Upgraded. 20230101032548 Patrick J Volkerding2023-01-016-6/+6
* Sun Dec 25 23:21:25 UTC 2022...Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to get some kind of kernel activity going again, but it most definitely belongs in /testing for now. I've been trying to shape this up for weeks, but there are still issues, and maybe someone out there can help. The biggest problem is that the 32-bit kernels crash on boot. Initially there's some sort of Intel ME failure (this is on a Thinkpad X1E). If those modules are blacklisted, then the kernel will go on to crash loading the snd_hda_intel module. The other issue is that I've got a 4K panel in this machine, and have always appended the kernel option video=1920x1080@60 to put the console in HD instead, and then loaded a Terminus console font to make the text even larger. With these kernels, that option is completely ignored. I've tried some other syntax I've seen online to no avail. And when the Terminus font is loaded the text gets *even smaller* for some reason. So be careful of these kernels (especially the 32-bit ones), but I welcome any hints about what's going on here or if there are config changes that might get this working properly. Is anyone out there running a 6.x kernel on bare metal 32-bit x86? Cheers! ap/vim-9.0.1091-x86_64-1.txz: Upgraded. d/meson-1.0.0-x86_64-1.txz: Upgraded. d/ruby-3.2.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/subversion-1.14.2-x86_64-3.txz: Rebuilt. Recompiled against ruby-3.2.0. l/glib2-2.74.4-x86_64-1.txz: Upgraded. l/netpbm-11.00.03-x86_64-1.txz: Upgraded. l/rubygem-asciidoctor-2.0.18-x86_64-1.txz: Upgraded. Compiled against ruby-3.2.0. n/epic5-2.1.12-x86_64-2.txz: Rebuilt. Recompiled against ruby-3.2.0. x/marisa-0.2.6-x86_64-6.txz: Rebuilt. Recompiled against ruby-3.2.0. xap/vim-gvim-9.0.1091-x86_64-1.txz: Upgraded. testing/packages/linux-6.1.x/kernel-generic-6.1.1-x86_64-1.txz: Added. testing/packages/linux-6.1.x/kernel-headers-6.1.1-x86-1.txz: Added. testing/packages/linux-6.1.x/kernel-huge-6.1.1-x86_64-1.txz: Added. testing/packages/linux-6.1.x/kernel-modules-6.1.1-x86_64-1.txz: Added. testing/packages/linux-6.1.x/kernel-source-6.1.1-noarch-1.txz: Added. 20221225232125 Patrick J Volkerding2022-12-2622-0/+65357
* Mon Dec 19 21:18:22 UTC 2022...a/logrotate-3.21.0-x86_64-1.txz: Upgraded. kde/gwenview-22.12.0-x86_64-2.txz: Rebuilt. Recompiled against cfitsio-4.2.0. kde/kstars-3.6.2-x86_64-2.txz: Rebuilt. Recompiled against cfitsio-4.2.0. l/cfitsio-4.2.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/gsettings-desktop-schemas-43.0-x86_64-1.txz: Upgraded. l/gtk4-4.8.2-x86_64-1.txz: Upgraded. x/xorg-server-21.1.6-x86_64-1.txz: Upgraded. This release fixes an invalid event type mask in XTestSwapFakeInput which was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix for CVE-2022-46340. x/xorg-server-xephyr-21.1.6-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.6-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.6-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-22.1.7-x86_64-1.txz: Upgraded. This release fixes an invalid event type mask in XTestSwapFakeInput which was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix for CVE-2022-46340. testing/packages/rust-1.66.0-x86_64-1.txz: Added. 20221219211822 Patrick J Volkerding2022-12-194-0/+360
* Fri Dec 16 04:46:51 UTC 2022...d/help2man-1.49.3-x86_64-1.txz: Upgraded. l/pipewire-0.3.63-x86_64-1.txz: Upgraded. x/libX11-1.8.3-x86_64-1.txz: Upgraded. x/mesa-22.3.1-x86_64-1.txz: Upgraded. xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Thanks to marav for the build help. For more information, see: https://www.mozilla.org/en-US/firefox/108.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/ https://www.cve.org/CVERecord?id=CVE-2022-46871 https://www.cve.org/CVERecord?id=CVE-2022-46872 https://www.cve.org/CVERecord?id=CVE-2022-46873 https://www.cve.org/CVERecord?id=CVE-2022-46874 https://www.cve.org/CVERecord?id=CVE-2022-46875 https://www.cve.org/CVERecord?id=CVE-2022-46877 https://www.cve.org/CVERecord?id=CVE-2022-46878 https://www.cve.org/CVERecord?id=CVE-2022-46879 (* Security fix *) 20221216044651 Patrick J Volkerding2022-12-1614-1360/+0
* Wed Dec 14 21:19:34 UTC 2022...a/bash-5.2.015-x86_64-1.txz: Upgraded. a/tcsh-6.24.06-x86_64-1.txz: Upgraded. ap/inxi-3.3.24_1-noarch-1.txz: Upgraded. ap/nano-7.1-x86_64-1.txz: Upgraded. d/git-2.39.0-x86_64-1.txz: Upgraded. d/rust-1.65.0-x86_64-1.txz: Upgraded. d/strace-6.1-x86_64-1.txz: Upgraded. kde/krita-5.1.4-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_54-x86_64-1.txz: Upgraded. l/nodejs-19.3.0-x86_64-1.txz: Upgraded. l/pcre2-10.42-x86_64-1.txz: Upgraded. n/iproute2-6.1.0-x86_64-1.txz: Upgraded. x/makedepend-1.0.8-x86_64-1.txz: Upgraded. x/xhost-1.0.9-x86_64-1.txz: Upgraded. x/xorg-server-21.1.5-x86_64-1.txz: Upgraded. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *) x/xorg-server-xephyr-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.5-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-22.1.6-x86_64-1.txz: Upgraded. This release fixes 6 recently reported security vulnerabilities in various extensions. For more information, see: https://lists.x.org/archives/xorg-announce/2022-December/003302.html https://www.cve.org/CVERecord?id=CVE-2022-46340 https://www.cve.org/CVERecord?id=CVE-2022-46341 https://www.cve.org/CVERecord?id=CVE-2022-46342 https://www.cve.org/CVERecord?id=CVE-2022-46343 https://www.cve.org/CVERecord?id=CVE-2022-46344 https://www.cve.org/CVERecord?id=CVE-2022-4283 (* Security fix *) xap/mozilla-thunderbird-102.6.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/ https://www.cve.org/CVERecord?id=CVE-2022-46880 https://www.cve.org/CVERecord?id=CVE-2022-46872 https://www.cve.org/CVERecord?id=CVE-2022-46881 https://www.cve.org/CVERecord?id=CVE-2022-46874 https://www.cve.org/CVERecord?id=CVE-2022-46875 https://www.cve.org/CVERecord?id=CVE-2022-46882 https://www.cve.org/CVERecord?id=CVE-2022-46878 (* Security fix *) xap/xscreensaver-6.06-x86_64-1.txz: Upgraded. testing/packages/mozilla-firefox-108.0-x86_64-1.txz: Upgraded. Starting this out in /testing for now, since I've been trying for 2 days to get it to compile on 32-bit with no luck. It ends up failing with a bunch of errors like this: ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync Any help getting this to build on 32-bit would be greatly appreciated. I've tried most of ponce's bag of tricks already. :-) 20221214211934 Patrick J Volkerding2022-12-1418-360/+1360
* Mon Nov 21 20:23:13 UTC 2022...a/libpwquality-1.4.5-x86_64-1.txz: Upgraded. a/pciutils-3.9.0-x86_64-1.txz: Upgraded. ap/qpdf-11.2.0-x86_64-1.txz: Upgraded. d/mercurial-6.3.1-x86_64-1.txz: Upgraded. kde/krusader-2.8.0-x86_64-1.txz: Upgraded. l/libpng-1.6.39-x86_64-1.txz: Upgraded. l/mlt-7.12.0-x86_64-1.txz: Upgraded. x/fcitx5-5.0.20-x86_64-1.txz: Upgraded. x/fcitx5-anthy-5.0.13-x86_64-1.txz: Upgraded. x/fcitx5-chinese-addons-5.0.16-x86_64-1.txz: Upgraded. x/fcitx5-gtk-5.0.20-x86_64-1.txz: Upgraded. x/fcitx5-kkc-5.0.11-x86_64-1.txz: Upgraded. x/fcitx5-m17n-5.0.11-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.0.16-x86_64-1.txz: Upgraded. x/fcitx5-table-extra-5.0.12-x86_64-1.txz: Upgraded. x/fcitx5-unikey-5.0.12-x86_64-1.txz: Upgraded. x/libXdmcp-1.1.4-x86_64-1.txz: Upgraded. x/libXpm-3.5.14-x86_64-1.txz: Upgraded. x/libXrandr-1.5.3-x86_64-1.txz: Upgraded. x/libime-1.0.15-x86_64-1.txz: Upgraded. x/libinput-1.22.0-x86_64-1.txz: Upgraded. x/xcb-imdkit-1.0.4-x86_64-1.txz: Upgraded. 20221121202313 Patrick J Volkerding2022-11-221-1/+1
* Tue Nov 15 01:28:38 UTC 2022...a/xz-5.2.8-x86_64-1.txz: Upgraded. d/mercurial-6.3.0-x86_64-1.txz: Upgraded. d/rust-1.64.0-x86_64-1.txz: Upgraded. kde/attica-5.100.0-x86_64-1.txz: Upgraded. kde/baloo-5.100.0-x86_64-1.txz: Upgraded. kde/bluez-qt-5.100.0-x86_64-1.txz: Upgraded. kde/breeze-icons-5.100.0-noarch-1.txz: Upgraded. kde/extra-cmake-modules-5.100.0-x86_64-1.txz: Upgraded. kde/frameworkintegration-5.100.0-x86_64-1.txz: Upgraded. kde/kactivities-5.100.0-x86_64-1.txz: Upgraded. kde/kactivities-stats-5.100.0-x86_64-1.txz: Upgraded. kde/kapidox-5.100.0-x86_64-1.txz: Upgraded. kde/karchive-5.100.0-x86_64-1.txz: Upgraded. kde/kauth-5.100.0-x86_64-1.txz: Upgraded. kde/kbookmarks-5.100.0-x86_64-1.txz: Upgraded. kde/kcalendarcore-5.100.0-x86_64-1.txz: Upgraded. kde/kcmutils-5.100.0-x86_64-1.txz: Upgraded. kde/kcodecs-5.100.0-x86_64-1.txz: Upgraded. kde/kcompletion-5.100.0-x86_64-1.txz: Upgraded. kde/kconfig-5.100.0-x86_64-1.txz: Upgraded. kde/kconfigwidgets-5.100.0-x86_64-1.txz: Upgraded. kde/kcontacts-5.100.0-x86_64-1.txz: Upgraded. kde/kcoreaddons-5.100.0-x86_64-1.txz: Upgraded. kde/kcrash-5.100.0-x86_64-1.txz: Upgraded. kde/kdav-5.100.0-x86_64-1.txz: Upgraded. kde/kdbusaddons-5.100.0-x86_64-1.txz: Upgraded. kde/kdeclarative-5.100.0-x86_64-1.txz: Upgraded. kde/kded-5.100.0-x86_64-1.txz: Upgraded. kde/kdelibs4support-5.100.0-x86_64-1.txz: Upgraded. kde/kdesignerplugin-5.100.0-x86_64-1.txz: Upgraded. kde/kdesu-5.100.0-x86_64-1.txz: Upgraded. kde/kdewebkit-5.100.0-x86_64-1.txz: Upgraded. kde/kdnssd-5.100.0-x86_64-1.txz: Upgraded. kde/kdoctools-5.100.0-x86_64-1.txz: Upgraded. kde/kemoticons-5.100.0-x86_64-1.txz: Upgraded. kde/kfilemetadata-5.100.0-x86_64-1.txz: Upgraded. kde/kglobalaccel-5.100.0-x86_64-1.txz: Upgraded. kde/kguiaddons-5.100.0-x86_64-1.txz: Upgraded. kde/kholidays-5.100.0-x86_64-1.txz: Upgraded. kde/khtml-5.100.0-x86_64-1.txz: Upgraded. kde/ki18n-5.100.0-x86_64-1.txz: Upgraded. kde/kiconthemes-5.100.0-x86_64-1.txz: Upgraded. kde/kidletime-5.100.0-x86_64-1.txz: Upgraded. kde/kimageformats-5.100.0-x86_64-1.txz: Upgraded. kde/kinit-5.100.0-x86_64-1.txz: Upgraded. kde/kio-5.100.0-x86_64-1.txz: Upgraded. kde/kirigami2-5.100.0-x86_64-1.txz: Upgraded. kde/kitemmodels-5.100.0-x86_64-1.txz: Upgraded. kde/kitemviews-5.100.0-x86_64-1.txz: Upgraded. kde/kjobwidgets-5.100.0-x86_64-1.txz: Upgraded. kde/kjs-5.100.0-x86_64-1.txz: Upgraded. kde/kjsembed-5.100.0-x86_64-1.txz: Upgraded. kde/kmediaplayer-5.100.0-x86_64-1.txz: Upgraded. kde/knewstuff-5.100.0-x86_64-1.txz: Upgraded. kde/knotifications-5.100.0-x86_64-1.txz: Upgraded. kde/knotifyconfig-5.100.0-x86_64-1.txz: Upgraded. kde/kpackage-5.100.0-x86_64-1.txz: Upgraded. kde/kparts-5.100.0-x86_64-1.txz: Upgraded. kde/kpeople-5.100.0-x86_64-1.txz: Upgraded. kde/kplotting-5.100.0-x86_64-1.txz: Upgraded. kde/kpty-5.100.0-x86_64-1.txz: Upgraded. kde/kquickcharts-5.100.0-x86_64-1.txz: Upgraded. kde/kross-5.100.0-x86_64-1.txz: Upgraded. kde/krunner-5.100.0-x86_64-1.txz: Upgraded. kde/kservice-5.100.0-x86_64-1.txz: Upgraded. kde/ktexteditor-5.100.0-x86_64-1.txz: Upgraded. kde/ktextwidgets-5.100.0-x86_64-1.txz: Upgraded. kde/kunitconversion-5.100.0-x86_64-1.txz: Upgraded. kde/kwallet-5.100.0-x86_64-1.txz: Upgraded. kde/kwayland-5.100.0-x86_64-1.txz: Upgraded. kde/kwidgetsaddons-5.100.0-x86_64-1.txz: Upgraded. kde/kwindowsystem-5.100.0-x86_64-1.txz: Upgraded. kde/kxmlgui-5.100.0-x86_64-1.txz: Upgraded. kde/kxmlrpcclient-5.100.0-x86_64-1.txz: Upgraded. kde/modemmanager-qt-5.100.0-x86_64-1.txz: Upgraded. kde/networkmanager-qt-5.100.0-x86_64-1.txz: Upgraded. kde/oxygen-icons5-5.100.0-noarch-1.txz: Upgraded. kde/plasma-framework-5.100.0-x86_64-1.txz: Upgraded. kde/prison-5.100.0-x86_64-1.txz: Upgraded. kde/purpose-5.100.0-x86_64-1.txz: Upgraded. kde/qqc2-desktop-style-5.100.0-x86_64-1.txz: Upgraded. kde/solid-5.100.0-x86_64-1.txz: Upgraded. kde/sonnet-5.100.0-x86_64-1.txz: Upgraded. kde/syndication-5.100.0-x86_64-1.txz: Upgraded. kde/syntax-highlighting-5.100.0-x86_64-1.txz: Upgraded. kde/threadweaver-5.100.0-x86_64-1.txz: Upgraded. l/babl-0.1.98-x86_64-1.txz: Upgraded. l/gegl-0.4.40-x86_64-1.txz: Upgraded. l/grantlee-5.3.1-x86_64-1.txz: Upgraded. l/nodejs-19.1.0-x86_64-1.txz: Upgraded. n/libqmi-1.32.2-x86_64-1.txz: Upgraded. n/mutt-2.2.9-x86_64-1.txz: Upgraded. n/nghttp2-1.51.0-x86_64-1.txz: Upgraded. x/xcompmgr-1.1.9-x86_64-1.txz: Upgraded. x/xkbevd-1.1.5-x86_64-1.txz: Upgraded. x/xkill-1.0.6-x86_64-1.txz: Upgraded. x/xlogo-1.0.6-x86_64-1.txz: Upgraded. x/xlsatoms-1.1.4-x86_64-1.txz: Upgraded. x/xlsclients-1.1.5-x86_64-1.txz: Upgraded. testing/packages/rust-1.65.0-x86_64-1.txz: Upgraded. 20221115012838 Patrick J Volkerding2022-11-153-37/+7
* Thu Sep 22 19:50:20 UTC 2022...a/quota-4.09-x86_64-1.txz: Upgraded. d/parallel-20220922-noarch-1.txz: Upgraded. l/jemalloc-5.3.0-x86_64-2.txz: Rebuilt. Fixed version numbers in jemalloc.h. Thanks to Markus Wiesner. n/ca-certificates-20220922-noarch-1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. testing/packages/rust-1.64.0-x86_64-1.txz: Added. We've found ourselves in a situation where Thunderbird requires the Rust compiler in /extra, and Firefox requires the one in the main tree (and can't use this one until Firefox 107 sometime in November), so we'll just park this here until we can use it. 20220922195020 Patrick J Volkerding2022-09-235-0/+390
* Wed Aug 17 20:41:53 UTC 2022...a/aaa_glibc-solibs-2.36-x86_64-2.txz: Rebuilt. a/kernel-generic-5.19.2-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.2-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.2-x86_64-1.txz: Upgraded. ap/vim-9.0.0223-x86_64-1.txz: Upgraded. Fix use after free, out-of-bounds read, and heap based buffer overflow. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819 (* Security fix *) d/kernel-headers-5.19.2-x86-1.txz: Upgraded. k/kernel-source-5.19.2-noarch-1.txz: Upgraded. l/glibc-2.36-x86_64-2.txz: Rebuilt. Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on board with this approach, but since DT_GNU_HASH remains and is still used, I guess I'll go along with it for now. Hopefully EAC will be patched and we can back this out. Thanks to Swaggajackin for the notice and for providing links to the glibc bug discussion as well as the patch. If anything else needs a rebuild after this, let me know in the LQ thread. l/glibc-i18n-2.36-x86_64-2.txz: Rebuilt. l/glibc-profile-2.36-x86_64-2.txz: Rebuilt. xap/vim-gvim-9.0.0223-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220817204153 Patrick J Volkerding2022-08-1822-64667/+0
* Fri Aug 12 01:47:02 UTC 2022...a/aaa_libraries-15.1-x86_64-9.txz: Rebuilt. Added: libboost_atomic.so.1.79.0, libboost_chrono.so.1.79.0, libboost_container.so.1.79.0, libboost_context.so.1.79.0, libboost_contract.so.1.79.0, libboost_coroutine.so.1.79.0, libboost_date_time.so.1.79.0, libboost_fiber.so.1.79.0, libboost_filesystem.so.1.79.0, libboost_graph.so.1.79.0, libboost_iostreams.so.1.79.0, libboost_json.so.1.79.0, libboost_locale.so.1.79.0, libboost_log.so.1.79.0, libboost_log_setup.so.1.79.0, libboost_math_c99.so.1.79.0, libboost_math_c99f.so.1.79.0, libboost_math_c99l.so.1.79.0, libboost_math_tr1.so.1.79.0, libboost_math_tr1f.so.1.79.0, libboost_math_tr1l.so.1.79.0, libboost_nowide.so.1.79.0, libboost_prg_exec_monitor.so.1.79.0, libboost_program_options.so.1.79.0, libboost_python27.so.1.79.0, libboost_python39.so.1.79.0, libboost_random.so.1.79.0, libboost_regex.so.1.79.0, libboost_serialization.so.1.79.0, libboost_stacktrace_addr2line.so.1.79.0, libboost_stacktrace_basic.so.1.79.0, libboost_stacktrace_noop.so.1.79.0, libboost_system.so.1.79.0, libboost_thread.so.1.79.0, libboost_timer.so.1.79.0, libboost_type_erasure.so.1.79.0, libboost_unit_test_framework.so.1.79.0, libboost_wave.so.1.79.0, libboost_wserialization.so.1.79.0. a/kernel-generic-5.18.17-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.17-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.17-x86_64-1.txz: Upgraded. ap/pamixer-1.5-x86_64-4.txz: Rebuilt. Recompiled against boost-1.80.0. d/git-2.37.2-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.17-x86-1.txz: Upgraded. d/rust-1.63.0-x86_64-1.txz: Upgraded. k/kernel-source-5.18.17-noarch-1.txz: Upgraded. kde/kig-22.04.3-x86_64-2.txz: Rebuilt. Recompiled against boost-1.80.0. kde/kopeninghours-22.04.3-x86_64-2.txz: Rebuilt. Recompiled against boost-1.80.0. kde/krita-5.0.8-x86_64-4.txz: Rebuilt. Recompiled against boost-1.80.0. l/boost-1.80.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/cryfs-0.10.3-x86_64-6.txz: Rebuilt. Recompiled against boost-1.80.0. l/openexr-3.1.5-x86_64-2.txz: Rebuilt. Recompiled against boost-1.80.0. l/pango-1.50.9-x86_64-1.txz: Upgraded. n/NetworkManager-1.38.4-x86_64-1.txz: Upgraded. x/mesa-22.1.6-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/linux-5.19.x/kernel-generic-5.19.1-x86_64-1.txz: Added. testing/packages/linux-5.19.x/kernel-headers-5.19.1-x86-1.txz: Added. testing/packages/linux-5.19.x/kernel-huge-5.19.1-x86_64-1.txz: Added. testing/packages/linux-5.19.x/kernel-modules-5.19.1-x86_64-1.txz: Added. testing/packages/linux-5.19.x/kernel-source-5.19.1-noarch-1.txz: Added. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220812014702 Patrick J Volkerding2022-08-1222-0/+64667
* Sat Jun 11 01:56:19 UTC 2022...a/kernel-firmware-20220610_7b71b75-noarch-1.txz: Upgraded. a/kernel-generic-5.18.3-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.3-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.3-x86_64-1.txz: Upgraded. d/gcc-12.1.0-x86_64-1.txz: Upgraded. d/gcc-brig-11.3.0-x86_64-1.txz: Removed. d/gcc-g++-12.1.0-x86_64-1.txz: Upgraded. d/gcc-gdc-12.1.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-12.1.0-x86_64-1.txz: Upgraded. d/gcc-gnat-12.1.0-x86_64-1.txz: Upgraded. d/gcc-go-12.1.0-x86_64-1.txz: Upgraded. d/gcc-objc-12.1.0-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.3-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-2.txz: Rebuilt. Recompiled to update embedded GCC version number. k/kernel-source-5.18.3-noarch-1.txz: Upgraded. x/libX11-1.8.1-x86_64-1.txz: Upgraded. xap/blueman-2.2.5-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220611015619 Patrick J Volkerding2022-06-1133-64991/+0
* Mon Jun 6 20:57:15 UTC 2022...a/btrfs-progs-5.18.1-x86_64-1.txz: Upgraded. a/kernel-generic-5.17.13-x86_64-1.txz: Upgraded. a/kernel-huge-5.17.13-x86_64-1.txz: Upgraded. a/kernel-modules-5.17.13-x86_64-1.txz: Upgraded. d/kernel-headers-5.17.13-x86-1.txz: Upgraded. d/pahole-1.23-x86_64-1.txz: Added. Thanks to xaizek and PiterPunk. k/kernel-source-5.17.13-noarch-1.txz: Upgraded. l/gmime-3.2.12-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_37-x86_64-1.txz: Upgraded. l/python-setuptools_scm-6.4.2-x86_64-1.txz: Upgraded. n/alpine-2.26-x86_64-1.txz: Upgraded. n/mutt-2.2.6-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/linux-5.18.x/kernel-generic-5.18.2-x86_64-1.txz: Added. testing/packages/linux-5.18.x/kernel-headers-5.18.2-x86-1.txz: Added. testing/packages/linux-5.18.x/kernel-huge-5.18.2-x86_64-1.txz: Added. testing/packages/linux-5.18.x/kernel-modules-5.18.2-x86_64-1.txz: Added. testing/packages/linux-5.18.x/kernel-source-5.18.2-noarch-1.txz: Added. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220606205715 Patrick J Volkerding2022-06-0722-0/+64187
* Sat May 7 18:53:48 UTC 2022...a/kernel-firmware-20220503_d4b7551-noarch-1.txz: Upgraded. ap/sqlite-3.38.5-x86_64-1.txz: Upgraded. d/git-2.36.1-x86_64-1.txz: Upgraded. n/stunnel-5.64-x86_64-1.txz: Upgraded. testing/packages/gcc-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-g++-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-gdc-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-gfortran-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-gnat-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-go-12.1.0-x86_64-1.txz: Added. testing/packages/gcc-objc-12.1.0-x86_64-1.txz: Added. 20220507185348 Patrick J Volkerding2022-05-0811-0/+804
* Wed Apr 27 21:43:51 UTC 2022...a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded. a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded. a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded. a/sysvinit-3.04-x86_64-1.txz: Upgraded. ap/sqlite-3.38.3-x86_64-1.txz: Upgraded. d/gcc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded. d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded. d/gcc-go-11.3.0-x86_64-1.txz: Upgraded. d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded. d/kernel-headers-5.17.5-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-1.txz: Upgraded. This also updates the embedded GCC version number. k/kernel-source-5.17.5-noarch-1.txz: Upgraded. CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0" GCC_VERSION 110200 -> 110300 +CC_HAS_SLS y +SLS y kde/krita-5.0.6-x86_64-1.txz: Upgraded. l/netpbm-10.98.02-x86_64-1.txz: Upgraded. l/nodejs-16.15.0-x86_64-1.txz: Upgraded. n/curl-7.83.0-x86_64-1.txz: Upgraded. This update fixes security issues: OAUTH2 bearer bypass in connection re-use. Credential leak on redirect. Bad local IPv6 connection reuse. Auth/cookie leak on redirect. For more information, see: https://curl.se/docs/CVE-2022-22576.html https://curl.se/docs/CVE-2022-27774.html https://curl.se/docs/CVE-2022-27775.html https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 (* Security fix *) n/fetchmail-6.4.30-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220427214351 Patrick J Volkerding2022-04-2814-955/+0
* Mon Apr 25 20:55:17 UTC 2022...a/kernel-firmware-20220425_ac21ab5-noarch-1.txz: Upgraded. d/meson-0.62.1-x86_64-1.txz: Upgraded. d/parallel-20220422-noarch-1.txz: Upgraded. l/harfbuzz-4.2.1-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_31-x86_64-1.txz: Upgraded. l/libseccomp-2.5.4-x86_64-1.txz: Upgraded. l/libusb-1.0.26-x86_64-1.txz: Upgraded. l/openal-soft-1.22.0-x86_64-1.txz: Upgraded. n/proftpd-1.3.7d-x86_64-1.txz: Upgraded. x/xdg-desktop-portal-1.14.3-x86_64-1.txz: Upgraded. xap/freerdp-2.7.0-x86_64-1.txz: Upgraded. This update is a security and maintenance release. For more information, see: https://github.com/FreeRDP/FreeRDP/blob/2.7.0/ChangeLog (* Security fix *) testing/packages/gcc-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-brig-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-g++-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-gdc-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-gfortran-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-gnat-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-go-11.3.0-x86_64-1.txz: Added. testing/packages/gcc-objc-11.3.0-x86_64-1.txz: Added. 20220425205517 Patrick J Volkerding2022-04-2621-61722/+955
* Wed Feb 2 08:21:48 UTC 2022...a/kernel-generic-5.15.19-x86_64-2.txz: Upgraded. a/kernel-huge-5.15.19-x86_64-2.txz: Upgraded. a/kernel-modules-5.15.19-x86_64-2.txz: Upgraded. d/kernel-headers-5.15.19-x86-2.txz: Upgraded. k/kernel-source-5.15.19-noarch-2.txz: Upgraded. -RTC_SYSTOHC_DEVICE "rtc0" RTC_SYSTOHC y -> n isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/source/linux-5.16.5-configs/*: Rebuilt. -RTC_SYSTOHC_DEVICE "rtc0" RTC_SYSTOHC y -> n usb-and-pxe-installers/usbboot.img: Rebuilt. 20220202082148 Patrick J Volkerding2022-02-026-12/+6
* Wed Feb 2 04:17:39 UTC 2022...fortune -m "I will be finished tomorrow" fortunes2 a/kernel-generic-5.15.19-x86_64-1.txz: Upgraded. a/kernel-huge-5.15.19-x86_64-1.txz: Upgraded. a/kernel-modules-5.15.19-x86_64-1.txz: Upgraded. ap/screen-4.9.0-x86_64-1.txz: Upgraded. Patched possible denial of service via a crafted UTF-8 character sequence. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937 (* Security fix *) d/kernel-headers-5.15.19-x86-1.txz: Upgraded. k/kernel-source-5.15.19-noarch-1.txz: Upgraded. RTC_INTF_DEV_UIE_EMUL y -> n RTC_SYSTOHC n -> y +RTC_SYSTOHC_DEVICE "rtc0" l/lcms2-2.13-x86_64-2.txz: Rebuilt. [PATCH] Fix for optimization error on grayscale. Thanks to Aaron Boxer for reporting this issue. Thanks to gmgf. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/source/linux-5.16.5-configs/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20220202041739 Patrick J Volkerding2022-02-027-18/+24
* Tue Feb 1 04:37:04 UTC 2022...The sepulchral voice intones, "The cave is now closed." kde/falkon-3.2.0-x86_64-1.txz: Upgraded. kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt. [PATCH] only start programs in user's path. [PATCH] only execute diff in path. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853 (* Security fix *) l/libcanberra-0.30-x86_64-9.txz: Rebuilt. Fix a bug crashing some applications in Wayland desktops. Thanks to 01micko. n/samba-4.15.5-x86_64-1.txz: Upgraded. This is a security release in order to address the following defects: UNIX extensions in SMB1 disclose whether the outside target of a symlink exists. Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit. Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity. For more information, see: https://www.samba.org/samba/security/CVE-2021-44141.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141 https://www.samba.org/samba/security/CVE-2021-44142.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://www.samba.org/samba/security/CVE-2022-0336.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 (* Security fix *) x/xterm-370-x86_64-7.txz: Rebuilt. Rebuilt with --disable-sixel-graphics to fix a buffer overflow. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130 (* Security fix *) testing/source/linux-5.16.4-configs/*: Added. Sample config files to build 5.16.4 Linux kernels. 20220201043704 Patrick J Volkerding2022-02-017-0/+61722
* Thu Oct 28 01:11:07 UTC 2021...a/kernel-generic-5.14.15-x86_64-1.txz: Upgraded. a/kernel-huge-5.14.15-x86_64-1.txz: Upgraded. a/kernel-modules-5.14.15-x86_64-1.txz: Upgraded. d/cmake-3.21.4-x86_64-1.txz: Upgraded. d/kernel-headers-5.14.15-x86-1.txz: Upgraded. k/kernel-source-5.14.15-noarch-1.txz: Upgraded. We're going to go ahead and take both of those changes that were considered in /testing. GazL almost had me talked out of the autogroup change, but it's easy to disable if traditional "nice" behavior is important to someone. -DRM_I810 n -INLINE_READ_UNLOCK y -INLINE_READ_UNLOCK_IRQ y -INLINE_SPIN_UNLOCK_IRQ y -INLINE_WRITE_UNLOCK y -INLINE_WRITE_UNLOCK_IRQ y PREEMPT n -> y PREEMPT_VOLUNTARY y -> n SCHED_AUTOGROUP n -> y +CEC_GPIO n +DEBUG_PREEMPT y +PREEMPTION y +PREEMPT_COUNT y +PREEMPT_DYNAMIC y +PREEMPT_RCU y +PREEMPT_TRACER n +RCU_BOOST n +TASKS_RCU y +UNINLINE_SPIN_UNLOCK y kde/plasma-desktop-5.23.2.1-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_12-x86_64-1.txz: Upgraded. l/librsvg-2.52.3-x86_64-1.txz: Upgraded. n/bind-9.16.22-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issue: The "lame-ttl" option is now forcibly set to 0. This effectively disables the lame server cache, as it could previously be abused by an attacker to significantly degrade resolver performance. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219 (* Security fix *) n/c-ares-1.18.1-x86_64-1.txz: Upgraded. n/samba-4.15.1-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20211028011107 Patrick J Volkerding2021-10-2822-61885/+0
* Mon Oct 25 19:30:42 UTC 2021...ap/slackpkg-15.0.8-noarch-1.txz: Upgraded. Author: piterpunk <piterpunk@slackware.com> To make it easier to do an unattended slackpkg update/upgrade process, this commit provides different exit codes for many situations: 0 Successful slackpkg execution. 1 Something wrong happened. 20 No package found to be downloaded, installed, reinstalled, upgraded, or removed. 50 Slackpkg itself was upgraded and you need to re-run it. 100 There are pending updates. Code and the main manpage are updated accordingly. In addition, this commit also: - removes the ChangeLog.txt in doinst.sh, so the needed 'slackpkg update' after Slackpkg upgrade won't say it's all OK and doesn't need to redo the package lists - removes AUTHORS from manpage. Nowadays there is code from many people in Slackpkg and it seems a bit unfair to have only my and Evaldo's name listed there. Signed-off-by: Robby Workman <rworkman@slackware.com> d/meson-0.60.0-x86_64-1.txz: Upgraded. l/ffmpeg-4.4.1-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_11-x86_64-1.txz: Upgraded. l/libcap-2.60-x86_64-1.txz: Upgraded. l/libsoup-2.74.1-x86_64-1.txz: Upgraded. l/sip-4.19.25-x86_64-3.txz: Rebuilt. Drop the Qt4 modules. Thanks to gmgf. n/dhcpcd-9.4.1-x86_64-1.txz: Upgraded. testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-3.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-3.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-3.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-3.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-3.txz: Rebuilt. Let's enable SCHED_AUTOGROUP, which should improve desktop latency under a heavy CPU load while being mostly inert on servers. It may be disabled at boot time with a "noautogroup" kernel parameter, or at runtime like this: echo 0 > /proc/sys/kernel/sched_autogroup_enabled Thanks to gbschenkel. SCHED_AUTOGROUP n -> y 20211025193042 Patrick J Volkerding2021-10-2612-62/+7
* Sat Oct 23 18:57:30 UTC 2021...a/aaa_terminfo-6.3-x86_64-1.txz: Upgraded. a/glibc-zoneinfo-2021e-noarch-1.txz: Upgraded. ap/itstool-2.0.7-x86_64-2.txz: Rebuilt. Rebuilt with PYTHON=/usr/bin/python3. Thanks to USUARIONUEVO. ap/mpg123-1.29.2-x86_64-1.txz: Upgraded. d/meson-0.59.3-x86_64-1.txz: Upgraded. d/parallel-20211022-noarch-1.txz: Upgraded. d/python-pip-21.3.1-x86_64-1.txz: Upgraded. d/python-setuptools-58.3.0-x86_64-1.txz: Upgraded. l/exiv2-0.27.5-x86_64-1.txz: Upgraded. l/ncurses-6.3-x86_64-1.txz: Upgraded. n/php-7.4.25-x86_64-1.txz: Upgraded. This update fixes bugs and a security issue: FPM: PHP-FPM oob R/W in root process leading to privilege escalation. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703 (* Security fix *) xap/mozilla-thunderbird-91.2.1-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/91.2.1/releasenotes/ testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-2.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-2.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-2.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-2.txz: Rebuilt. testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-2.txz: Rebuilt. These kernels enable CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y allowing the kernel preemption model to be specified on the kernel command line with one of these options: preempt=none, preempt=voluntary, and preempt=full. Since there is no .config option to set a default, and the default in the kernel sources is "full" (which is probably not a good default), the kernel-source.SlackBuild has been modified to add support for an environment variable CONFIG_PREEMPT_DEFAULT_MODE which can be set to none, voluntary, or full to set the default kernel preemption model when a command line option is not provided. These kernels have been built with a preemption model of "none" (presumably the safest choice which will behave like the kernels we have shipped before.) The runtime overhead on 64-bit should be negligible. On 32-bit we lack support for HAVE_STATIC_CALL_INLINE, so spinlocks and mutexes will have to be approached through a trampoline, adding a very small amount of overhead. I feel this is probably worth it in order to have the option to run a kernel with voluntary or full preemption, especially for gaming or desktop purposes. The reduction in input lag with these modes is actually quite noticable. To check the current preemption model, you may use debugfs: mount -t debugfs none /sys/kernel/debug cat /sys/kernel/debug/sched/preempt (none) voluntary full You may change to a different preemption model on the fly once debugfs is mounted: echo voluntary > /sys/kernel/debug/sched/preempt cat /sys/kernel/debug/sched/preempt none (voluntary) full Thanks to Daedra. -DRM_I810 n -INLINE_READ_UNLOCK y -INLINE_READ_UNLOCK_IRQ y -INLINE_SPIN_UNLOCK_IRQ y -INLINE_WRITE_UNLOCK y -INLINE_WRITE_UNLOCK_IRQ y PREEMPT n -> y PREEMPT_VOLUNTARY y -> n +CEC_GPIO n +DEBUG_PREEMPT y +PREEMPTION y +PREEMPT_COUNT y +PREEMPT_DYNAMIC y +PREEMPT_RCU y +PREEMPT_TRACER n +RCU_BOOST n +TASKS_RCU y +UNINLINE_SPIN_UNLOCK y 20211023185730 Patrick J Volkerding2021-10-2427-0/+61940
* Wed Jul 14 17:57:37 UTC 2021...a/kernel-generic-5.13.2-x86_64-1.txz: Upgraded. a/kernel-huge-5.13.2-x86_64-1.txz: Upgraded. a/kernel-modules-5.13.2-x86_64-1.txz: Upgraded. d/kernel-headers-5.13.2-x86-1.txz: Upgraded. k/kernel-source-5.13.2-noarch-1.txz: Upgraded. xap/gnuchess-6.2.9-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-78.12.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/78.12.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2021-30/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20210714175737 Patrick J Volkerding2021-07-1527-61374/+0
* Wed Jul 7 20:50:57 UTC 2021...a/kernel-generic-5.12.15-x86_64-1.txz: Upgraded. a/kernel-huge-5.12.15-x86_64-1.txz: Upgraded. a/kernel-modules-5.12.15-x86_64-1.txz: Upgraded. a/libbytesize-2.6-x86_64-1.txz: Upgraded. a/mcelog-177-x86_64-1.txz: Upgraded. d/kernel-headers-5.12.15-x86-1.txz: Upgraded. d/ruby-3.0.2-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Trusting FTP PASV responses vulnerability in Net::FTP. StartTLS stripping vulnerability in Net::IMAP. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066 (* Security fix *) k/kernel-source-5.12.15-noarch-1.txz: Upgraded. l/python-pillow-8.3.1-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/linux-5.13.x/kernel-generic-5.13.1-x86_64-1.txz: Upgraded. testing/packages/linux-5.13.x/kernel-headers-5.13.1-x86-1.txz: Upgraded. testing/packages/linux-5.13.x/kernel-huge-5.13.1-x86_64-1.txz: Upgraded. testing/packages/linux-5.13.x/kernel-modules-5.13.1-x86_64-1.txz: Upgraded. testing/packages/linux-5.13.x/kernel-source-5.13.1-noarch-1.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. 20210707205057 Patrick J Volkerding2021-07-0811-6/+6