summaryrefslogtreecommitdiffstats
path: root/source/n
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-04-13 01:10:11 +0000
committer Eric Hameleers <alien@slackware.com>2023-04-13 04:37:52 +0200
commit701cf3165a2eaae89658ea8ba070e344d8f24385 (patch)
treeb1768c92eb1c3445b5ade6bb5a62a482d3b98d1c /source/n
parent59f80800c2ed60cbc51060bdfc90eb56292d41d0 (diff)
downloadcurrent-701cf3165a2eaae89658ea8ba070e344d8f24385.tar.gz
current-701cf3165a2eaae89658ea8ba070e344d8f24385.tar.xz
Thu Apr 13 01:10:11 UTC 202320230413011011
a/f2fs-tools-1.16.0-x86_64-1.txz: Upgraded. a/upower-1.90.0-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.27.4-x86_64-3.txz: Rebuilt. [PATCH] gtk3: restore old icon size for titlebutton Thanks to marav. kde/kwin-5.27.4.1-x86_64-1.txz: Upgraded. l/at-spi2-core-2.48.0-x86_64-1.txz: Upgraded. l/gjs-1.76.0-x86_64-1.txz: Upgraded. l/glib-networking-2.76.0-x86_64-1.txz: Upgraded. l/glib2-2.76.1-x86_64-1.txz: Upgraded. l/gst-plugins-bad-free-1.22.2-x86_64-1.txz: Upgraded. l/gst-plugins-base-1.22.2-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.22.2-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.22.2-x86_64-1.txz: Upgraded. l/gstreamer-1.22.2-x86_64-1.txz: Upgraded. l/librsvg-2.56.0-x86_64-1.txz: Upgraded. l/libsoup3-3.4.0-x86_64-1.txz: Upgraded. l/libwnck3-43.0-x86_64-1.txz: Upgraded. l/openal-soft-1.23.1-x86_64-1.txz: Upgraded. l/pygobject3-3.44.1-x86_64-1.txz: Upgraded. l/vte-0.72.0-x86_64-1.txz: Upgraded. n/dhcpcd-9.5.0-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-102.10.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.10.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#MFSA-TMP-2023-0001 https://www.cve.org/CVERecord?id=CVE-2023-29531 https://www.cve.org/CVERecord?id=CVE-2023-29532 https://www.cve.org/CVERecord?id=CVE-2023-29533 https://www.cve.org/CVERecord?id=CVE-2023-29535 https://www.cve.org/CVERecord?id=CVE-2023-29536 https://www.cve.org/CVERecord?id=CVE-2023-0547 https://www.cve.org/CVERecord?id=CVE-2023-29479 https://www.cve.org/CVERecord?id=CVE-2023-29539 https://www.cve.org/CVERecord?id=CVE-2023-29541 https://www.cve.org/CVERecord?id=CVE-2023-29542 https://www.cve.org/CVERecord?id=CVE-2023-29545 https://www.cve.org/CVERecord?id=CVE-2023-1945 https://www.cve.org/CVERecord?id=CVE-2023-29548 https://www.cve.org/CVERecord?id=CVE-2023-29550 (* Security fix *)
Diffstat (limited to '')
-rw-r--r--source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo1
-rwxr-xr-xsource/n/dhcpcd/dhcpcd.SlackBuild4
-rw-r--r--source/n/dhcpcd/dhcpcd.url3
-rw-r--r--source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch25
-rw-r--r--source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch24
5 files changed, 3 insertions, 54 deletions
diff --git a/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo b/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo
deleted file mode 100644
index 40b2f7bff..000000000
--- a/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo
+++ /dev/null
@@ -1 +0,0 @@
-SHA256 (dhcpcd-9.4.1.tar.xz) = 819357634efed1ea5cf44ec01b24d3d3f8852fec8b4249925dcc5667c54e376c
diff --git a/source/n/dhcpcd/dhcpcd.SlackBuild b/source/n/dhcpcd/dhcpcd.SlackBuild
index 3baf677d0..82a9b44fb 100755
--- a/source/n/dhcpcd/dhcpcd.SlackBuild
+++ b/source/n/dhcpcd/dhcpcd.SlackBuild
@@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=dhcpcd
VERSION=${VERSION:-$(echo dhcpcd-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-2}
+BUILD=${BUILD:-1}
# By default, Slackware builds dhcpcd with privilege separation, which improves
# security by ensuring that any security vulnerabilies such as buffer overflows
@@ -85,8 +85,6 @@ find . \
patch -p1 --verbose < $CWD/patches/dhcpcd.conf-Don-t-invoke-wpa_supplicant-by-default.patch || exit 1
patch -p1 --verbose < $CWD/patches/use-hostname_short-in-dhcpcd.conf.patch || exit 1
patch -p1 --verbose < $CWD/patches/dhcpcd.conf-request_ntp_server_by_default.patch || exit 1
-patch -p1 --verbose < $CWD/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch || exit 1
-patch -p1 --verbose < $CWD/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch || exit 1
# At this point, it should be safe to assume that /var will be mounted by the
# time dhcpcd is called, as all non-root local filesystems are mounted from
diff --git a/source/n/dhcpcd/dhcpcd.url b/source/n/dhcpcd/dhcpcd.url
index e4372dd4d..62618708f 100644
--- a/source/n/dhcpcd/dhcpcd.url
+++ b/source/n/dhcpcd/dhcpcd.url
@@ -1 +1,2 @@
-https://roy.marples.name/downloads/dhcpcd
+https://github.com/NetworkConfiguration/dhcpcd
+#https://roy.marples.name/downloads/dhcpcd
diff --git a/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch b/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch
deleted file mode 100644
index 93f6d1b86..000000000
--- a/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From 38befd4e867583002b96ec39df733585d74c4ff5 Mon Sep 17 00:00:00 2001
-From: Roy Marples <roy@marples.name>
-Date: Fri, 26 Aug 2022 09:24:50 +0100
-Subject: [PATCH] privsep: Allow newfstatat syscall as well
-
-Allows newer glibc variants to work apparently.
-As reported in #84 and #89.
----
- src/privsep-linux.c | 3 +++
- 1 file changed, 3 insertions(+)
-
-diff --git a/src/privsep-linux.c b/src/privsep-linux.c
-index 4d5c195d..66aeb490 100644
---- a/src/privsep-linux.c
-+++ b/src/privsep-linux.c
-@@ -353,6 +353,9 @@ static struct sock_filter ps_seccomp_filter[] = {
- #ifdef __NR_nanosleep
- SECCOMP_ALLOW(__NR_nanosleep), /* XXX should use ppoll instead */
- #endif
-+#ifdef __NR_newfstatat
-+ SECCOMP_ALLOW(__NR_newfstatat),
-+#endif
- #ifdef __NR_ppoll
- SECCOMP_ALLOW(__NR_ppoll),
- #endif
diff --git a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch
deleted file mode 100644
index c61920309..000000000
--- a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From 645c32dd1a511527b7eb88443a28dfe7704d5f52 Mon Sep 17 00:00:00 2001
-From: Roy Marples <roy@marples.name>
-Date: Fri, 26 Aug 2022 09:08:36 +0100
-Subject: [PATCH] privsep: Allow getrandom sysctl for newer glibc
-
-Fixes #120
----
- src/privsep-linux.c | 3 +++
- 1 file changed, 3 insertions(+)
-
-diff --git a/src/privsep-linux.c b/src/privsep-linux.c
-index c2de54ba..4d5c195d 100644
---- a/src/privsep-linux.c
-+++ b/src/privsep-linux.c
-@@ -325,6 +325,9 @@ static struct sock_filter ps_seccomp_filter[] = {
- #ifdef __NR_getpid
- SECCOMP_ALLOW(__NR_getpid),
- #endif
-+#ifdef __NR_getrandom
-+ SECCOMP_ALLOW(__NR_getrandom),
-+#endif
- #ifdef __NR_getsockopt
- /* For route socket overflow */
- SECCOMP_ALLOW_ARG(__NR_getsockopt, 1, SOL_SOCKET),