diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-04-06 20:23:46 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-04-07 06:59:44 +0200 |
commit | bfece22130a1673e30695d7c5e563b9eace2b915 (patch) | |
tree | 41979314035e2fd0ac8460dbb7bf4ed505ad7d51 /source/a/haveged | |
parent | dc48df8960b47406124ff6c59af6d6bd54c60eb7 (diff) | |
download | current-bfece22130a1673e30695d7c5e563b9eace2b915.tar.gz current-bfece22130a1673e30695d7c5e563b9eace2b915.tar.xz |
Wed Apr 6 20:23:46 UTC 202220220406202346
a/haveged-1.9.17-x86_64-2.txz: Rebuilt.
Install /etc/rc.d/rc.haveged as non-executable. For existing installations
running a recent kernel, it is safe to turn this off.
Back when we added the haveged package we were using the 4.4 kernel, but
since Linux 5.4 this same entropy generating algorithm has been built into
the kernel, so there's no reason to also run it in userspace. We'll keep
the package around (for now, anyway) in case someone might be running an
old kernel. Thanks to Jason A. Donenfeld.
a/sysvinit-scripts-15.0-noarch-10.txz: Rebuilt.
rc.S, rc.6: use the seedrng utility to seed and initialize the kernel
random number generator and generate a new seed.
If seedrng is missing, we'll attempt to do these things with scripting.
Thanks to Jason A. Donenfeld for hints about how to make a modest
improvement in that regard (blame me for any problems with my own changes),
but because you can't force the kernel RNG to initialize with a script
(it needs an ioctl), you won't get the same guarantees that you do when
using the new seedrng utility.
a/util-linux-2.38-x86_64-2.txz: Rebuilt.
Added seedrng utility, used to seed and initialize the kernel random number
generator and to generate new seeds for carrying entropy across reboots.
Thanks to Jason A. Donenfeld.
n/libmnl-1.0.5-x86_64-1.txz: Upgraded.
n/libnfnetlink-1.0.2-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-91.8.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
(* Security fix *)
Diffstat (limited to 'source/a/haveged')
-rwxr-xr-x | source/a/haveged/haveged.SlackBuild | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/source/a/haveged/haveged.SlackBuild b/source/a/haveged/haveged.SlackBuild index 4d7967153..163a271c1 100755 --- a/source/a/haveged/haveged.SlackBuild +++ b/source/a/haveged/haveged.SlackBuild @@ -1,7 +1,7 @@ #!/bin/sh # # Copyright 2014 Erik Falor, West Valley City, Utah, USA -# Copyright 2018, 2020, 2021 Patrick J. Volkerding, Sebeka, Minnesota, USA +# Copyright 2018, 2020, 2021, 2022 Patrick J. Volkerding, Sebeka, Minnesota, USA # All rights reserved. # # Redistribution and use of this script, with or without modification, is @@ -25,7 +25,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=haveged VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-1} +BUILD=${BUILD:-2} if [ -z "$ARCH" ]; then case "$( uname -m )" in @@ -102,7 +102,7 @@ find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | gr mkdir -p $PKG/etc/rc.d cat $CWD/rc.haveged > $PKG/etc/rc.d/rc.haveged.new -chmod 755 $PKG/etc/rc.d/rc.haveged.new +chmod 644 $PKG/etc/rc.d/rc.haveged.new find $PKG/usr/man -type f -exec gzip -9 {} \+ for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done |