summaryrefslogtreecommitdiffstats
path: root/source/a/elogind/11-prefer-deep-suspend.patch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Mon Apr 22 19:36:38 UTC 2024...a/elogind-255.4_r2-x86_64-2.txz: Rebuilt. OK, this is looking good enough to return to the main tree now. Thanks to hamkg, ctrlaltca, and rizitis for helping to debug the sleep issues with upstream, and to Sven Eden for the upstream fixes. I've changed the default sleep mode from s2idle to deep as s2idle still locks up most of the systems I've tried it on. Eventually we'll probably have to swallow this pill though (more notes on that in the SlackBuild). It didn't seem like recompiling polkit again was necessary, but correct me if I'm wrong about that. l/imagemagick-7.1.1_31-x86_64-1.txz: Upgraded. l/python-hatchling-1.24.2-x86_64-1.txz: Upgraded. l/vte-0.76.1-x86_64-1.txz: Upgraded. l/wireplumber-0.5.2-x86_64-1.txz: Upgraded. xap/freerdp-2.11.7-x86_64-1.txz: Upgraded. This release eliminates a bunch of issues detected during oss-fuzz runs. (* Security fix *) 20240422193638 Patrick J Volkerding2024-04-221-0/+8
* Fri Apr 19 19:36:17 UTC 2024...a/elogind-252.23-x86_64-3.txz: Rebuilt. All right, it's time to stop the bleeding (edge). This has been verified as the last working version of elogind, so we'll revert for now while moving the newer sources into /testing. We didn't actually *need* the 255 branch for libgudev (I was mistakenly under that impression), so this will be fine for now. We'll keep an eye on upstream and move forward when things settle down. d/vala-0.56.17-x86_64-1.txz: Upgraded. l/gdk-pixbuf2-2.42.11-x86_64-1.txz: Upgraded. l/gtk4-4.14.3-x86_64-1.txz: Upgraded. l/polkit-124-x86_64-2.txz: Rebuilt. Recompiled against elogind-252.23. l/python-sphinx-7.3.7-x86_64-1.txz: Upgraded. n/NetworkManager-1.46.0-x86_64-2.txz: Rebuilt. Build with meson instead of autotools, since setting session_tracking to elogind is ignored with autotools, and is set to consolekit instead. While this didn't seem to make a difference in practice, better to get this right now and rule it out as part of the issue. Thanks to marav and LuckyCyborg for the options hints. x/xdg-desktop-portal-1.18.4-x86_64-1.txz: Upgraded. xap/freerdp-2.11.6-x86_64-1.txz: Upgraded. This release is a security release and addresses multiple issues: [Low] OutOfBound Read in zgfx_decompress_segment. [Moderate] Integer overflow & OutOfBound Write in clear_decompress_residual_data. [Low] integer underflow in nsc_rle_decode. [Low] OutOfBound Read in planar_skip_plane_rle. [Low] OutOfBound Read in ncrush_decompress. [Low] OutOfBound Read in interleaved_decompress. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-32041 https://www.cve.org/CVERecord?id=CVE-2024-32039 https://www.cve.org/CVERecord?id=CVE-2024-32040 https://www.cve.org/CVERecord?id=CVE-2024-32458 https://www.cve.org/CVERecord?id=CVE-2024-32459 https://www.cve.org/CVERecord?id=CVE-2024-32460 (* Security fix *) 20240419193617 Patrick J Volkerding2024-04-191-8/+0
* Tue Apr 16 18:50:13 UTC 2024...a/elogind-255.4_r2-x86_64-1.txz: Upgraded. Prefer SuspendMode=deep. Thanks to LuckyCyborg. Make 10-elogind.conf .new (but it will still be forced in this time). Fix reading login.conf. Thanks to af7567. This branch is feeling a bit alpha to me, but we'll stick with it for now. ap/groff-1.23.0-x86_64-2.txz: Rebuilt. [PATCH] Revert upstream change of mapping special characters for UTF-8. Thanks to Stuart Winter. l/mozjs115-115.10.0esr-x86_64-1.txz: Upgraded. l/python-hatchling-1.24.0-x86_64-1.txz: Upgraded. n/bluez-5.75-x86_64-1.txz: Upgraded. x/libxcb-1.17.0-x86_64-1.txz: Upgraded. xap/mozilla-firefox-115.10.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/115.10.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-19/ https://www.cve.org/CVERecord?id=CVE-2024-3852 https://www.cve.org/CVERecord?id=CVE-2024-3854 https://www.cve.org/CVERecord?id=CVE-2024-3857 https://www.cve.org/CVERecord?id=CVE-2024-2609 https://www.cve.org/CVERecord?id=CVE-2024-3859 https://www.cve.org/CVERecord?id=CVE-2024-3861 https://www.cve.org/CVERecord?id=CVE-2024-3863 https://www.cve.org/CVERecord?id=CVE-2024-3302 https://www.cve.org/CVERecord?id=CVE-2024-3864 (* Security fix *) 20240416185013 Patrick J Volkerding2024-04-161-0/+8