diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-04-13 01:10:11 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-04-13 04:37:52 +0200 |
commit | 701cf3165a2eaae89658ea8ba070e344d8f24385 (patch) | |
tree | b1768c92eb1c3445b5ade6bb5a62a482d3b98d1c /source/n | |
parent | 59f80800c2ed60cbc51060bdfc90eb56292d41d0 (diff) | |
download | current-701cf3165a2eaae89658ea8ba070e344d8f24385.tar.gz current-701cf3165a2eaae89658ea8ba070e344d8f24385.tar.xz |
Thu Apr 13 01:10:11 UTC 202320230413011011
a/f2fs-tools-1.16.0-x86_64-1.txz: Upgraded.
a/upower-1.90.0-x86_64-1.txz: Upgraded.
kde/breeze-gtk-5.27.4-x86_64-3.txz: Rebuilt.
[PATCH] gtk3: restore old icon size for titlebutton
Thanks to marav.
kde/kwin-5.27.4.1-x86_64-1.txz: Upgraded.
l/at-spi2-core-2.48.0-x86_64-1.txz: Upgraded.
l/gjs-1.76.0-x86_64-1.txz: Upgraded.
l/glib-networking-2.76.0-x86_64-1.txz: Upgraded.
l/glib2-2.76.1-x86_64-1.txz: Upgraded.
l/gst-plugins-bad-free-1.22.2-x86_64-1.txz: Upgraded.
l/gst-plugins-base-1.22.2-x86_64-1.txz: Upgraded.
l/gst-plugins-good-1.22.2-x86_64-1.txz: Upgraded.
l/gst-plugins-libav-1.22.2-x86_64-1.txz: Upgraded.
l/gstreamer-1.22.2-x86_64-1.txz: Upgraded.
l/librsvg-2.56.0-x86_64-1.txz: Upgraded.
l/libsoup3-3.4.0-x86_64-1.txz: Upgraded.
l/libwnck3-43.0-x86_64-1.txz: Upgraded.
l/openal-soft-1.23.1-x86_64-1.txz: Upgraded.
l/pygobject3-3.44.1-x86_64-1.txz: Upgraded.
l/vte-0.72.0-x86_64-1.txz: Upgraded.
n/dhcpcd-9.5.0-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-102.10.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.10.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#MFSA-TMP-2023-0001
https://www.cve.org/CVERecord?id=CVE-2023-29531
https://www.cve.org/CVERecord?id=CVE-2023-29532
https://www.cve.org/CVERecord?id=CVE-2023-29533
https://www.cve.org/CVERecord?id=CVE-2023-29535
https://www.cve.org/CVERecord?id=CVE-2023-29536
https://www.cve.org/CVERecord?id=CVE-2023-0547
https://www.cve.org/CVERecord?id=CVE-2023-29479
https://www.cve.org/CVERecord?id=CVE-2023-29539
https://www.cve.org/CVERecord?id=CVE-2023-29541
https://www.cve.org/CVERecord?id=CVE-2023-29542
https://www.cve.org/CVERecord?id=CVE-2023-29545
https://www.cve.org/CVERecord?id=CVE-2023-1945
https://www.cve.org/CVERecord?id=CVE-2023-29548
https://www.cve.org/CVERecord?id=CVE-2023-29550
(* Security fix *)
Diffstat (limited to 'source/n')
-rw-r--r-- | source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo | 1 | ||||
-rwxr-xr-x | source/n/dhcpcd/dhcpcd.SlackBuild | 4 | ||||
-rw-r--r-- | source/n/dhcpcd/dhcpcd.url | 3 | ||||
-rw-r--r-- | source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch | 25 | ||||
-rw-r--r-- | source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch | 24 |
5 files changed, 3 insertions, 54 deletions
diff --git a/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo b/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo deleted file mode 100644 index 40b2f7bff..000000000 --- a/source/n/dhcpcd/dhcpcd-9.4.1.tar.xz.distinfo +++ /dev/null @@ -1 +0,0 @@ -SHA256 (dhcpcd-9.4.1.tar.xz) = 819357634efed1ea5cf44ec01b24d3d3f8852fec8b4249925dcc5667c54e376c diff --git a/source/n/dhcpcd/dhcpcd.SlackBuild b/source/n/dhcpcd/dhcpcd.SlackBuild index 3baf677d0..82a9b44fb 100755 --- a/source/n/dhcpcd/dhcpcd.SlackBuild +++ b/source/n/dhcpcd/dhcpcd.SlackBuild @@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=dhcpcd VERSION=${VERSION:-$(echo dhcpcd-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} -BUILD=${BUILD:-2} +BUILD=${BUILD:-1} # By default, Slackware builds dhcpcd with privilege separation, which improves # security by ensuring that any security vulnerabilies such as buffer overflows @@ -85,8 +85,6 @@ find . \ patch -p1 --verbose < $CWD/patches/dhcpcd.conf-Don-t-invoke-wpa_supplicant-by-default.patch || exit 1 patch -p1 --verbose < $CWD/patches/use-hostname_short-in-dhcpcd.conf.patch || exit 1 patch -p1 --verbose < $CWD/patches/dhcpcd.conf-request_ntp_server_by_default.patch || exit 1 -patch -p1 --verbose < $CWD/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch || exit 1 -patch -p1 --verbose < $CWD/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch || exit 1 # At this point, it should be safe to assume that /var will be mounted by the # time dhcpcd is called, as all non-root local filesystems are mounted from diff --git a/source/n/dhcpcd/dhcpcd.url b/source/n/dhcpcd/dhcpcd.url index e4372dd4d..62618708f 100644 --- a/source/n/dhcpcd/dhcpcd.url +++ b/source/n/dhcpcd/dhcpcd.url @@ -1 +1,2 @@ -https://roy.marples.name/downloads/dhcpcd +https://github.com/NetworkConfiguration/dhcpcd +#https://roy.marples.name/downloads/dhcpcd diff --git a/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch b/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch deleted file mode 100644 index 93f6d1b86..000000000 --- a/source/n/dhcpcd/patches/38befd4e867583002b96ec39df733585d74c4ff5.patch +++ /dev/null @@ -1,25 +0,0 @@ -From 38befd4e867583002b96ec39df733585d74c4ff5 Mon Sep 17 00:00:00 2001 -From: Roy Marples <roy@marples.name> -Date: Fri, 26 Aug 2022 09:24:50 +0100 -Subject: [PATCH] privsep: Allow newfstatat syscall as well - -Allows newer glibc variants to work apparently. -As reported in #84 and #89. ---- - src/privsep-linux.c | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/src/privsep-linux.c b/src/privsep-linux.c -index 4d5c195d..66aeb490 100644 ---- a/src/privsep-linux.c -+++ b/src/privsep-linux.c -@@ -353,6 +353,9 @@ static struct sock_filter ps_seccomp_filter[] = { - #ifdef __NR_nanosleep - SECCOMP_ALLOW(__NR_nanosleep), /* XXX should use ppoll instead */ - #endif -+#ifdef __NR_newfstatat -+ SECCOMP_ALLOW(__NR_newfstatat), -+#endif - #ifdef __NR_ppoll - SECCOMP_ALLOW(__NR_ppoll), - #endif diff --git a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch deleted file mode 100644 index c61920309..000000000 --- a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch +++ /dev/null @@ -1,24 +0,0 @@ -From 645c32dd1a511527b7eb88443a28dfe7704d5f52 Mon Sep 17 00:00:00 2001 -From: Roy Marples <roy@marples.name> -Date: Fri, 26 Aug 2022 09:08:36 +0100 -Subject: [PATCH] privsep: Allow getrandom sysctl for newer glibc - -Fixes #120 ---- - src/privsep-linux.c | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/src/privsep-linux.c b/src/privsep-linux.c -index c2de54ba..4d5c195d 100644 ---- a/src/privsep-linux.c -+++ b/src/privsep-linux.c -@@ -325,6 +325,9 @@ static struct sock_filter ps_seccomp_filter[] = { - #ifdef __NR_getpid - SECCOMP_ALLOW(__NR_getpid), - #endif -+#ifdef __NR_getrandom -+ SECCOMP_ALLOW(__NR_getrandom), -+#endif - #ifdef __NR_getsockopt - /* For route socket overflow */ - SECCOMP_ALLOW_ARG(__NR_getsockopt, 1, SOL_SOCKET), |