| Commit message (Expand) | Author | Age | Files | Lines |
* | Fri Aug 4 20:17:36 UTC 2023...a/hwdata-0.373-noarch-1.txz: Upgraded.
a/kernel-firmware-20230731_253cc17-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.43-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.43-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.43-x86_64-1.txz: Upgraded.
a/sysklogd-2.5.1-x86_64-1.txz: Upgraded.
a/xz-5.4.4-x86_64-1.txz: Upgraded.
ap/man-pages-6.05.01-noarch-1.txz: Upgraded.
d/kernel-headers-6.1.43-x86-1.txz: Upgraded.
k/kernel-source-6.1.43-noarch-1.txz: Upgraded.
kde/ktextaddons-1.4.0-x86_64-1.txz: Upgraded.
l/SDL2-2.28.2-x86_64-1.txz: Upgraded.
l/harfbuzz-8.1.1-x86_64-1.txz: Upgraded.
l/mozjs102-102.14.0esr-x86_64-1.txz: Upgraded.
l/netpbm-11.03.01-x86_64-1.txz: Upgraded.
l/openexr-3.1.10-x86_64-1.txz: Upgraded.
l/pipewire-0.3.77-x86_64-1.txz: Upgraded.
l/poppler-23.08.0-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-115.1.0esr-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.1.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/
https://www.cve.org/CVERecord?id=CVE-2023-4045
https://www.cve.org/CVERecord?id=CVE-2023-4046
https://www.cve.org/CVERecord?id=CVE-2023-4047
https://www.cve.org/CVERecord?id=CVE-2023-4048
https://www.cve.org/CVERecord?id=CVE-2023-4049
https://www.cve.org/CVERecord?id=CVE-2023-4050
https://www.cve.org/CVERecord?id=CVE-2023-4052
https://www.cve.org/CVERecord?id=CVE-2023-4054
https://www.cve.org/CVERecord?id=CVE-2023-4055
https://www.cve.org/CVERecord?id=CVE-2023-4056
https://www.cve.org/CVERecord?id=CVE-2023-4057
(* Security fix *)
xap/mozilla-thunderbird-115.1.0-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/115.1.0/releasenotes/
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.71.1-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230804201736 | Patrick J Volkerding | 2023-08-04 | 16 | -1810/+2 |
* | Fri Jul 14 17:53:34 UTC 2023...ap/vim-9.0.1677-x86_64-1.txz: Upgraded.
n/nftables-1.0.8-x86_64-1.txz: Upgraded.
x/xeyes-1.3.0-x86_64-1.txz: Upgraded.
xap/vim-gvim-9.0.1677-x86_64-1.txz: Upgraded.
testing/packages/rust-1.71.0-x86_64-1.txz: Added.
20230714175334 | Patrick J Volkerding | 2023-07-14 | 5 | -0/+407 |
* | Wed Jul 12 20:41:16 UTC 2023...ap/inxi-3.3.28_1-noarch-1.txz: Upgraded.
ap/sudo-1.9.14p1-x86_64-1.txz: Upgraded.
d/rust-1.70.0-x86_64-1.txz: Upgraded.
l/harfbuzz-8.0.1-x86_64-1.txz: Upgraded.
l/lmdb-0.9.31-x86_64-1.txz: Upgraded.
l/pipewire-0.3.74-x86_64-1.txz: Upgraded.
n/krb5-1.21.1-x86_64-1.txz: Upgraded.
Fix potential uninitialized pointer free in kadm5 XDR parsing.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-36054
(* Security fix *)
n/libnftnl-1.2.6-x86_64-1.txz: Upgraded.
n/nghttp2-1.55.0-x86_64-1.txz: Upgraded.
n/openldap-2.6.5-x86_64-1.txz: Upgraded.
x/ibus-table-1.17.1-x86_64-1.txz: Upgraded.
x/xterm-384-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-115.0.2esr-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.0.2esr/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-26/
https://www.cve.org/CVERecord?id=CVE-2023-3600
(* Security fix *)
testing/packages/mozilla-thunderbird-115.0-x86_64-1.txz: Added.
20230712204116 | Patrick J Volkerding | 2023-07-12 | 17 | -359/+1761 |
* | Mon Jun 12 20:37:03 UTC 2023...ap/xorriso-1.5.6.pl01-x86_64-1.txz: Upgraded.
d/rust-1.69.0-x86_64-1.txz: Upgraded.
n/ntp-4.2.8p17-x86_64-2.txz: Rebuilt.
Fixed typo in ntp.conf comments.
Fixed logic in ntp.logrotate to allow proper rotation on systems where ntpd
is not automatically started at boot.
Thanks to allend.
x/xkeyboard-config-2.39-noarch-1.txz: Upgraded.
testing/packages/rust-1.70.0-x86_64-1.txz: Upgraded.
20230612203703 | Patrick J Volkerding | 2023-06-13 | 2 | -8/+7 |
* | Tue Jun 6 20:26:59 UTC 2023...a/kernel-firmware-20230531_fc90c59-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.32-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.32-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.32-x86_64-1.txz: Upgraded.
d/gcc-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gm2-13.1.0-x86_64-2.txz: Added.
d/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-go-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt.
d/kernel-headers-6.1.32-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-5.txz: Rebuilt.
Recompiled to update embedded GCC version number.
k/kernel-source-6.1.32-noarch-1.txz: Upgraded.
kde/calligra-3.2.1-x86_64-30.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/cantor-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kfilemetadata-5.106.0-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kile-2.9.93-x86_64-25.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kitinerary-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/krita-5.1.5-x86_64-10.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/okteta-0.26.11-x86_64-1.txz: Upgraded.
kde/okular-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
l/enchant-2.5.0-x86_64-1.txz: Upgraded.
l/gtk4-4.10.4-x86_64-1.txz: Upgraded.
l/mozilla-nss-3.90-x86_64-1.txz: Upgraded.
l/openexr-3.1.8-x86_64-1.txz: Upgraded.
l/poppler-23.06.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/qtkeychain-0.14.1-x86_64-1.txz: Upgraded.
n/krb5-1.21-x86_64-1.txz: Upgraded.
n/ntp-4.2.8p17-x86_64-1.txz: Upgraded.
This is a bugfix release.
n/postfix-3.8.1-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-23.1.2-x86_64-1.txz: Upgraded.
x/xorgproto-2023.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-114.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/114.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-20/
https://www.cve.org/CVERecord?id=CVE-2023-34414
https://www.cve.org/CVERecord?id=CVE-2023-34415
https://www.cve.org/CVERecord?id=CVE-2023-34416
https://www.cve.org/CVERecord?id=CVE-2023-34417
(* Security fix *)
xfce/xfce4-panel-profiles-1.0.14-x86_64-1.txz: Upgraded.
extra/sendmail/sendmail-8.17.2-x86_64-2.txz: Rebuilt.
Recompiled without -DUSE_EAI or ICU libraries as this experimental option
is still leading to regressions.
extra/sendmail/sendmail-cf-8.17.2-noarch-2.txz: Rebuilt.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230606202659 | Patrick J Volkerding | 2023-06-07 | 12 | -862/+0 |
* | Mon May 8 23:42:23 UTC 2023...a/less-633-x86_64-1.txz: Upgraded.
ap/inxi-3.3.27_1-noarch-1.txz: Upgraded.
d/rust-1.68.2-x86_64-2.txz: Upgraded.
l/mlt-7.16.0-x86_64-1.txz: Upgraded.
x/m17n-lib-1.8.1-x86_64-1.txz: Upgraded.
x/xf86-video-dummy-0.4.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.69.0-x86_64-1.txz: Upgraded.
20230508234223 | Patrick J Volkerding | 2023-05-09 | 2 | -8/+8 |
* | Fri May 5 22:49:16 UTC 2023...ap/at-3.2.5-x86_64-1.txz: Upgraded.
l/babl-0.1.106-x86_64-1.txz: Upgraded.
l/libdiscid-0.6.4-x86_64-2.txz: Rebuilt.
Patched to fix pkgconfig file. Thanks to ponce.
tcl/tclx-8.6.1-x86_64-1.txz: Upgraded.
x/libevdev-1.13.1-x86_64-1.txz: Upgraded.
x/xcalc-1.1.2-x86_64-1.txz: Upgraded.
testing/packages/gcc-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gm2-13.1.0-x86_64-2.txz: Added.
testing/packages/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-go-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt.
20230505224916 | Patrick J Volkerding | 2023-05-06 | 2 | -6/+60 |
* | Thu Apr 27 04:40:20 UTC 2023...a/kernel-generic-6.1.26-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.26-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.26-x86_64-1.txz: Upgraded.
ap/dc3dd-7.3.1-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.26-x86-1.txz: Upgraded.
k/kernel-source-6.1.26-noarch-1.txz: Upgraded.
l/harfbuzz-7.2.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/gcc-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-go-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-13.1.0-x86_64-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230427044020 | Patrick J Volkerding | 2023-04-27 | 11 | -0/+808 |
* | Fri Mar 31 18:01:09 UTC 2023...a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded.
a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt.
Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha.
d/cmake-3.26.2-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.22-x86-1.txz: Upgraded.
d/llvm-16.0.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
Thanks to Heinz Wiesinger for the assistance.
Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON
-DCLANG_LINK_CLANG_DYLIB=ON.
I think we'll get 16.0.1 next week if we need to make any adjustments.
d/ruby-3.2.2-x86_64-1.txz: Upgraded.
This update fixes security issues:
ReDoS vulnerability in URI.
ReDoS vulnerability in Time.
For more information, see:
https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/
https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
https://www.cve.org/CVERecord?id=CVE-2023-28755
https://www.cve.org/CVERecord?id=CVE-2023-28756
(* Security fix *)
k/kernel-source-6.1.22-noarch-1.txz: Upgraded.
kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against llvm-16.0.0.
l/openexr-3.1.7-x86_64-1.txz: Upgraded.
l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded.
Compiled against llvm-16.0.0.
l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded.
Compiled against llvm-16.0.0.
Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON.
n/pssh-2.3.5-x86_64-1.txz: Upgraded.
n/samba-4.18.1-x86_64-1.txz: Upgraded.
This update fixes security issues:
An incomplete access check on dnsHostName allows authenticated but otherwise
unprivileged users to delete this attribute from any object in the directory.
The Samba AD DC administration tool, when operating against a remote LDAP
server, will by default send new or reset passwords over a signed-only
connection.
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential
attribute disclosure via LDAP filters was insufficient and an attacker may
be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
Installations with such secrets in their Samba AD should assume they have
been obtained and need replacing.
For more information, see:
https://www.samba.org/samba/security/CVE-2023-0225.html
https://www.samba.org/samba/security/CVE-2023-0922.html
https://www.samba.org/samba/security/CVE-2023-0614.html
https://www.cve.org/CVERecord?id=CVE-2023-0225
https://www.cve.org/CVERecord?id=CVE-2023-0922
https://www.cve.org/CVERecord?id=CVE-2023-0614
(* Security fix *)
x/mesa-23.0.1-x86_64-2.txz: Rebuilt.
Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0.
xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.16
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt.
Use the bundled LLVM rather than the system LLVM.
This version of Rust actually does compile with llvm-16.0.0, but since it
bundles LLVM 15 let's let it use that for now.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230331180109 | Patrick J Volkerding | 2023-03-31 | 1 | -2/+2 |
* | Tue Mar 28 19:36:46 UTC 2023...a/grub-2.06-x86_64-5.txz: Rebuilt.
[PATCH] fs/ext2: Ignore checksum seed incompat feature.
Fixes using ext4 with the default options in e2fsprogs-1.47.0.
Thanks to USUARIONUEVO.
a/shadow-4.13-x86_64-1.txz: Upgraded.
ap/squashfs-tools-4.6.1-x86_64-1.txz: Upgraded.
l/gsettings-desktop-schemas-44.0-x86_64-1.txz: Upgraded.
l/gvfs-1.50.4-x86_64-1.txz: Upgraded.
l/libcap-2.68-x86_64-1.txz: Upgraded.
x/libva-utils-2.18.1-x86_64-1.txz: Upgraded.
xfce/xfce4-screensaver-4.18.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.68.2-x86_64-1.txz: Upgraded.
20230328193646 | Patrick J Volkerding | 2023-03-28 | 2 | -2/+2 |
* | Thu Mar 23 20:36:39 UTC 2023...a/grep-3.10-x86_64-1.txz: Upgraded.
d/cmake-3.26.1-x86_64-1.txz: Upgraded.
d/parallel-20230322-noarch-1.txz: Upgraded.
l/netpbm-11.01.03-x86_64-1.txz: Upgraded.
testing/packages/rust-1.68.1-x86_64-1.txz: Upgraded.
20230323203639 | Patrick J Volkerding | 2023-03-23 | 2 | -2/+2 |
* | Mon Mar 13 23:15:32 UTC 2023...a/kernel-firmware-20230313_c761dbe-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.19-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.19-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.19-x86_64-1.txz: Upgraded.
a/mcelog-192-x86_64-1.txz: Upgraded.
d/ccache-4.8-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.19-x86-1.txz: Upgraded.
d/rust-1.67.1-x86_64-2.txz: Rebuilt.
Moved here from /testing (not actually rebuilt).
k/kernel-source-6.1.19-noarch-1.txz: Upgraded.
l/imagemagick-7.1.1_3-x86_64-1.txz: Upgraded.
n/vsftpd-3.0.5-x86_64-3.txz: Rebuilt.
Patched to compile against openssl-3.0.8. Thanks to Stuart Winter.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.68.0-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230313231532 | Patrick J Volkerding | 2023-03-14 | 2 | -8/+8 |
* | Wed Mar 8 20:26:54 UTC 2023...Hey folks, just some more updates on the road to an eventual beta. :-)
At this point nothing remains linked with openssl-1.1.1 except for python2 and
modules, and vsftpd. I think nobody cares about trying to force python2 to use
openssl3... it's EOL but still a zombie, unfortunately. I have seen some
patches for vsftpd and intend to take a look at them. We've bumped PHP to 8.2
and just gone ahead and killed 8.0 and 8.1. Like 7.4, 8.0 is not compatible
with openssl3 and it doesn't seem worthwhile to try to patch it. And with 8.2
already out for several revisions, 8.1 does not seem particularly valuable.
If you make use of PHP you should be used to it being a moving target by now.
Enjoy, and let me know if anything isn't working right. Cheers!
a/aaa_libraries-15.1-x86_64-19.txz: Rebuilt.
Recompiled against openssl-3.0.8: libcups.so.2, libcurl.so.4.8.0,
libldap.so.2.0.200, libssh2.so.1.0.1.
a/cryptsetup-2.6.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
a/kmod-30-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
a/openssl-solibs-3.0.8-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
a/openssl11-solibs-1.1.1t-x86_64-1.txz: Added.
ap/cups-2.4.2-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/hplip-3.20.5-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/lxc-4.0.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/mariadb-10.6.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/qpdf-11.3.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/sudo-1.9.13p3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/cargo-vendor-filterer-0.5.7-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/cvs-1.11.23-x86_64-9.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/git-2.39.2-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/perl-5.36.0-x86_64-5.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/python3-3.9.16-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/ruby-3.2.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/rust-1.66.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/scons-4.5.1-x86_64-1.txz: Upgraded.
kde/falkon-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
kde/kitinerary-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/M2Crypto-0.38.0-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/SDL2-2.26.4-x86_64-1.txz: Upgraded.
l/gst-plugins-bad-free-1.22.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libarchive-3.6.2-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libevent-2.1.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libimobiledevice-20211124_2c6121d-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libssh2-1.10.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libvncserver-0.9.14-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/mlt-7.14.0-x86_64-1.txz: Upgraded.
l/neon-0.32.5-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/nodejs-19.7.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/opusfile-0.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pipewire-0.3.66-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pulseaudio-16.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pycurl-7.44.1-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/qca-2.3.5-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/qt5-5.15.8_20230304_d8b881f0-x86_64-1.txz: Upgraded.
Compiled against openssl-3.0.8.
l/serf-1.3.9-x86_64-8.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/alpine-2.26-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/bind-9.18.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/curl-7.88.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/cyrus-sasl-2.1.28-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/dovecot-2.3.20-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/epic5-2.1.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/fetchmail-6.4.37-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/htdig-3.2.0b6-x86_64-9.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/httpd-2.4.56-x86_64-1.txz: Upgraded.
This update fixes two security issues:
HTTP Response Smuggling vulnerability via mod_proxy_uwsgi.
HTTP Request Smuggling attack via mod_rewrite and mod_proxy.
For more information, see:
https://downloads.apache.org/httpd/CHANGES_2.4.56
https://www.cve.org/CVERecord?id=CVE-2023-27522
https://www.cve.org/CVERecord?id=CVE-2023-25690
(* Security fix *)
NOTE: This package is compiled against openssl-3.0.8.
n/irssi-1.4.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/krb5-1.20.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/lftp-4.9.2-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/links-2.28-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/lynx-2.9.0dev.10-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/mutt-2.2.9-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/net-snmp-5.9.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/netatalk-3.1.14-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/nmap-7.93-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/ntp-4.2.8p15-x86_64-12.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openldap-2.6.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openssh-9.2p1-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openssl-3.0.8-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
n/openssl11-1.1.1t-x86_64-1.txz: Added.
n/openvpn-2.6.0-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/php-8.2.3-x86_64-1.txz: Upgraded.
Compiled against openssl-3.0.8.
n/pidentd-3.0.19-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/popa3d-1.0.3-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/postfix-3.7.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/ppp-2.4.9-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/proftpd-1.3.8-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/rsync-3.2.7-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/s-nail-14.9.24-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/samba-4.18.0-x86_64-1.txz: Upgraded.
Build with the bundled Heimdal instead of the system MIT Kerberos.
Thanks again to rpenny.
n/slrn-1.0.3a-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/snownews-1.9-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/socat-1.7.4.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/stunnel-5.69-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/tcpdump-4.99.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/wget-1.21.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/wpa_supplicant-2.10-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/freerdp-2.10.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/gftp-2.9.1b-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/gkrellm-2.3.11-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/hexchat-2.16.1-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/sane-1.0.32-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/x3270-4.0ga14-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/xine-lib-1.2.13-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
y/bsd-games-2.17-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/php80/php80-8.0.28-x86_64-1.txz: Removed.
extra/php81/php81-8.1.16-x86_64-1.txz: Removed.
extra/rust-for-mozilla/rust-1.60.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-8.17.1-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-cf-8.17.1-noarch-7.txz: Rebuilt.
testing/packages/rust-1.67.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
testing/packages/samba-4.17.5-x86_64-2.txz: Removed.
20230308202654 | Patrick J Volkerding | 2023-03-08 | 10 | -854/+1 |
* | Wed Feb 15 03:05:40 UTC 2023...a/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.12-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.12-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.12-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.12-x86-1.txz: Upgraded.
d/rust-1.66.1-x86_64-1.txz: Upgraded.
k/kernel-source-6.1.12-noarch-1.txz: Upgraded.
kde/bluedevil-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-grub-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-gtk-5.27.0-x86_64-1.txz: Upgraded.
kde/drkonqi-5.27.0-x86_64-1.txz: Upgraded.
kde/kactivitymanagerd-5.27.0-x86_64-1.txz: Upgraded.
kde/kde-cli-tools-5.27.0-x86_64-1.txz: Upgraded.
kde/kde-gtk-config-5.27.0-x86_64-1.txz: Upgraded.
kde/kdecoration-5.27.0-x86_64-1.txz: Upgraded.
kde/kdeplasma-addons-5.27.0-x86_64-1.txz: Upgraded.
kde/kgamma5-5.27.0-x86_64-1.txz: Upgraded.
kde/khotkeys-5.27.0-x86_64-1.txz: Upgraded.
kde/kinfocenter-5.27.0-x86_64-1.txz: Upgraded.
kde/kmenuedit-5.27.0-x86_64-1.txz: Upgraded.
kde/kpipewire-5.27.0-x86_64-1.txz: Upgraded.
kde/kscreen-5.27.0-x86_64-1.txz: Upgraded.
kde/kscreenlocker-5.27.0-x86_64-1.txz: Upgraded.
kde/ksshaskpass-5.27.0-x86_64-1.txz: Upgraded.
kde/ksystemstats-5.27.0-x86_64-1.txz: Upgraded.
kde/kwallet-pam-5.27.0-x86_64-1.txz: Upgraded.
kde/kwayland-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/kwin-5.27.0-x86_64-1.txz: Upgraded.
kde/kwrited-5.27.0-x86_64-1.txz: Upgraded.
kde/layer-shell-qt-5.27.0-x86_64-1.txz: Upgraded.
kde/libkscreen-5.27.0-x86_64-1.txz: Upgraded.
kde/libksysguard-5.27.0-x86_64-1.txz: Upgraded.
kde/milou-5.27.0-x86_64-1.txz: Upgraded.
kde/oxygen-5.27.0-x86_64-1.txz: Upgraded.
kde/oxygen-sounds-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-browser-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-desktop-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-disks-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-firewall-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-nm-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-pa-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-sdk-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-systemmonitor-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-vault-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-workspace-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.27.0-x86_64-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.27.0-x86_64-1.txz: Upgraded.
kde/powerdevil-5.27.0-x86_64-1.txz: Upgraded.
kde/qqc2-breeze-style-5.27.0-x86_64-1.txz: Upgraded.
kde/sddm-kcm-5.27.0-x86_64-1.txz: Upgraded.
kde/systemsettings-5.27.0-x86_64-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.27.0-x86_64-1.txz: Upgraded.
l/mozjs102-102.8.0esr-x86_64-1.txz: Upgraded.
n/php-7.4.33-x86_64-3.txz: Rebuilt.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
xap/mozilla-firefox-110.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/110.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-05/
https://www.cve.org/CVERecord?id=CVE-2023-25728
https://www.cve.org/CVERecord?id=CVE-2023-25730
https://www.cve.org/CVERecord?id=CVE-2023-25743
https://www.cve.org/CVERecord?id=CVE-2023-0767
https://www.cve.org/CVERecord?id=CVE-2023-25735
https://www.cve.org/CVERecord?id=CVE-2023-25737
https://www.cve.org/CVERecord?id=CVE-2023-25738
https://www.cve.org/CVERecord?id=CVE-2023-25739
https://www.cve.org/CVERecord?id=CVE-2023-25729
https://www.cve.org/CVERecord?id=CVE-2023-25732
https://www.cve.org/CVERecord?id=CVE-2023-25734
https://www.cve.org/CVERecord?id=CVE-2023-25740
https://www.cve.org/CVERecord?id=CVE-2023-25731
https://www.cve.org/CVERecord?id=CVE-2023-25733
https://www.cve.org/CVERecord?id=CVE-2023-25736
https://www.cve.org/CVERecord?id=CVE-2023-25741
https://www.cve.org/CVERecord?id=CVE-2023-25742
https://www.cve.org/CVERecord?id=CVE-2023-25744
https://www.cve.org/CVERecord?id=CVE-2023-25745
(* Security fix *)
extra/php80/php80-8.0.28-x86_64-1.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
extra/php81/php81-8.1.16-x86_64-1.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.67.1-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230215030540 | Patrick J Volkerding | 2023-02-15 | 2 | -7/+7 |
* | Fri Feb 3 20:04:33 UTC 2023...a/aaa_glibc-solibs-2.37-x86_64-2.txz: Rebuilt.
a/e2fsprogs-1.46.6-x86_64-1.txz: Upgraded.
a/hwdata-0.367-noarch-1.txz: Upgraded.
l/glibc-2.37-x86_64-2.txz: Rebuilt.
[PATCH] Account for grouping in printf width (bug 23432).
This issue could cause a overflow with sprintf in the corner case where an
application computes the size of buffer to be exactly enough to fit the
digits in question, but sprintf ends up writing a couple of extra bytes.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-25139
(* Security fix *)
l/glibc-i18n-2.37-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.37-x86_64-2.txz: Rebuilt.
l/libcap-2.67-x86_64-1.txz: Upgraded.
l/poppler-data-0.4.12-noarch-1.txz: Upgraded.
extra/php81/php81-8.1.15-x86_64-1.txz: Upgraded.
testing/packages/samba-4.17.5-x86_64-2.txz: Rebuilt.
Build with the bundled Heimdal instead of the system MIT Kerberos, since MIT
Kerberos has more issues when Samba is used as an AD DC. I'd appreciate any
feedback on the "Samba on Slackware 15" thread on LQ about how well this
works. Although it's not the sort of change I'd normally make in a -stable
release such as Slackware 15.0, in this case I'm considering it if it can
be done painlessly for any existing users... but I'll need to see some
reports about this. I'd like to note that yes, of course we saw the
"experimental" label in the configure flag we used to build Samba, but we
also saw another prominent Linux distribution go ahead and use it anyway. :)
And the Samba package built against MIT Kerberos cooked in the previous
-current development cycle for a couple of years without any objections.
Anyway, hopefully we'll get some testing from folks out there with networks
that use AD and go from there.
Thanks to Rowland Penny of the Samba team for clarifying this situation.
20230203200433 | Patrick J Volkerding | 2023-02-03 | 9 | -0/+853 |
* | Wed Jan 11 19:31:20 UTC 2023...d/patchelf-0.17.2-x86_64-1.txz: Upgraded.
kde/kdevelop-pg-qt-2.2.2-x86_64-1.txz: Upgraded.
n/NetworkManager-1.40.10-x86_64-1.txz: Upgraded.
xfce/xfce4-panel-4.18.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.66.1-x86_64-1.txz: Upgraded.
20230111193120 | Patrick J Volkerding | 2023-01-11 | 2 | -2/+2 |
* | Sat Jan 7 20:30:44 UTC 2023...We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact
that a kernel bisect identified the patch that was preventing 32-bit from
booting here on a Thinkpad X1E:
------
From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001
From: Michael Kelley <mikelley@microsoft.com>
Date: Wed, 16 Nov 2022 10:41:24 -0800
Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in
__ioremap_caller()
commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream.
Current code re-calculates the size after aligning the starting and
ending physical addresses on a page boundary. But the re-calculation
also embeds the masking of high order bits that exceed the size of
the physical address space (via PHYSICAL_PAGE_MASK). If the masking
removes any high order bits, the size calculation results in a huge
value that is likely to immediately fail.
Fix this by re-calculating the page-aligned size first. Then mask any
high order bits using PHYSICAL_PAGE_MASK.
Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in
PAE mode")
------
The non-SMP non-PAE 32-bit kernel is fine even without the patch revert.
The PAE kernel also works fine with this patch reverted without any need
to revert ffa71f33a820 (the patch that this one is supposed to fix). The
machine's excessive (for 32-bit) amount of physical RAM (64GB) might also
be a factor here considering the PAE kernel works on all the other machines
around here without reverting this patch.
The patch is reverted only on 32-bit. Upstream report still pending.
Enjoy! :-)
a/kernel-generic-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.4-x86_64-1.txz: Upgraded.
a/tree-2.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.4-x86-1.txz: Upgraded.
k/kernel-source-6.1.4-noarch-1.txz: Upgraded.
l/gvfs-1.50.3-x86_64-1.txz: Upgraded.
l/hunspell-1.7.2-x86_64-1.txz: Upgraded.
l/libnice-0.1.21-x86_64-1.txz: Upgraded.
n/tin-2.6.2-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230107203044 | Patrick J Volkerding | 2023-01-07 | 24 | -65457/+0 |
* | Thu Jan 5 03:09:24 UTC 2023...a/btrfs-progs-6.1.1-x86_64-1.txz: Upgraded.
a/hwdata-0.366-noarch-1.txz: Upgraded.
a/kernel-firmware-20230104_4ee2014-noarch-1.txz: Upgraded.
ap/vim-9.0.1146-x86_64-1.txz: Upgraded.
Fixed security issues:
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0049
https://www.cve.org/CVERecord?id=CVE-2023-0051
(* Security fix *)
d/mercurial-6.3.2-x86_64-1.txz: Upgraded.
l/fluidsynth-2.3.1-x86_64-1.txz: Upgraded.
l/libxkbcommon-1.5.0-x86_64-1.txz: Upgraded.
n/fetchmail-6.4.35-x86_64-1.txz: Upgraded.
xap/vim-gvim-9.0.1146-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.3-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.3-noarch-1.txz: Upgraded.
20230105030924 | Patrick J Volkerding | 2023-01-05 | 9 | -15/+115 |
* | Sun Jan 1 03:25:48 UTC 2023...Happy New Year! :-)
a/dialog-1.3_20221229-x86_64-1.txz: Upgraded.
a/file-5.44-x86_64-1.txz: Upgraded.
n/ipset-7.17-x86_64-1.txz: Upgraded.
x/libva-2.17.0-x86_64-1.txz: Upgraded.
x/libva-utils-2.17.0-x86_64-1.txz: Upgraded.
x/mesa-22.3.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.2-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.2-noarch-1.txz: Upgraded.
20230101032548 | Patrick J Volkerding | 2023-01-01 | 6 | -6/+6 |
* | Sun Dec 25 23:21:25 UTC 2022...Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to
get some kind of kernel activity going again, but it most definitely belongs
in /testing for now. I've been trying to shape this up for weeks, but there
are still issues, and maybe someone out there can help. The biggest problem
is that the 32-bit kernels crash on boot. Initially there's some sort of
Intel ME failure (this is on a Thinkpad X1E). If those modules are
blacklisted, then the kernel will go on to crash loading the snd_hda_intel
module. The other issue is that I've got a 4K panel in this machine, and
have always appended the kernel option video=1920x1080@60 to put the console
in HD instead, and then loaded a Terminus console font to make the text even
larger. With these kernels, that option is completely ignored. I've tried some
other syntax I've seen online to no avail. And when the Terminus font is
loaded the text gets *even smaller* for some reason.
So be careful of these kernels (especially the 32-bit ones), but I welcome
any hints about what's going on here or if there are config changes that
might get this working properly. Is anyone out there running a 6.x kernel on
bare metal 32-bit x86?
Cheers!
ap/vim-9.0.1091-x86_64-1.txz: Upgraded.
d/meson-1.0.0-x86_64-1.txz: Upgraded.
d/ruby-3.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/subversion-1.14.2-x86_64-3.txz: Rebuilt.
Recompiled against ruby-3.2.0.
l/glib2-2.74.4-x86_64-1.txz: Upgraded.
l/netpbm-11.00.03-x86_64-1.txz: Upgraded.
l/rubygem-asciidoctor-2.0.18-x86_64-1.txz: Upgraded.
Compiled against ruby-3.2.0.
n/epic5-2.1.12-x86_64-2.txz: Rebuilt.
Recompiled against ruby-3.2.0.
x/marisa-0.2.6-x86_64-6.txz: Rebuilt.
Recompiled against ruby-3.2.0.
xap/vim-gvim-9.0.1091-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-headers-6.1.1-x86-1.txz: Added.
testing/packages/linux-6.1.x/kernel-huge-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-modules-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-source-6.1.1-noarch-1.txz: Added.
20221225232125 | Patrick J Volkerding | 2022-12-26 | 22 | -0/+65357 |
* | Mon Dec 19 21:18:22 UTC 2022...a/logrotate-3.21.0-x86_64-1.txz: Upgraded.
kde/gwenview-22.12.0-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
kde/kstars-3.6.2-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
l/cfitsio-4.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/gsettings-desktop-schemas-43.0-x86_64-1.txz: Upgraded.
l/gtk4-4.8.2-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.6-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
x/xorg-server-xephyr-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.7-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
testing/packages/rust-1.66.0-x86_64-1.txz: Added.
20221219211822 | Patrick J Volkerding | 2022-12-19 | 4 | -0/+360 |
* | Fri Dec 16 04:46:51 UTC 2022...d/help2man-1.49.3-x86_64-1.txz: Upgraded.
l/pipewire-0.3.63-x86_64-1.txz: Upgraded.
x/libX11-1.8.3-x86_64-1.txz: Upgraded.
x/mesa-22.3.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
https://www.cve.org/CVERecord?id=CVE-2022-46871
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46873
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46877
https://www.cve.org/CVERecord?id=CVE-2022-46878
https://www.cve.org/CVERecord?id=CVE-2022-46879
(* Security fix *)
20221216044651 | Patrick J Volkerding | 2022-12-16 | 14 | -1360/+0 |
* | Wed Dec 14 21:19:34 UTC 2022...a/bash-5.2.015-x86_64-1.txz: Upgraded.
a/tcsh-6.24.06-x86_64-1.txz: Upgraded.
ap/inxi-3.3.24_1-noarch-1.txz: Upgraded.
ap/nano-7.1-x86_64-1.txz: Upgraded.
d/git-2.39.0-x86_64-1.txz: Upgraded.
d/rust-1.65.0-x86_64-1.txz: Upgraded.
d/strace-6.1-x86_64-1.txz: Upgraded.
kde/krita-5.1.4-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_54-x86_64-1.txz: Upgraded.
l/nodejs-19.3.0-x86_64-1.txz: Upgraded.
l/pcre2-10.42-x86_64-1.txz: Upgraded.
n/iproute2-6.1.0-x86_64-1.txz: Upgraded.
x/makedepend-1.0.8-x86_64-1.txz: Upgraded.
x/xhost-1.0.9-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.5-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
x/xorg-server-xephyr-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.6-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
xap/mozilla-thunderbird-102.6.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
xap/xscreensaver-6.06-x86_64-1.txz: Upgraded.
testing/packages/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
Starting this out in /testing for now, since I've been trying for 2 days to
get it to compile on 32-bit with no luck. It ends up failing with a bunch of
errors like this:
ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync
Any help getting this to build on 32-bit would be greatly appreciated.
I've tried most of ponce's bag of tricks already. :-)
20221214211934 | Patrick J Volkerding | 2022-12-14 | 18 | -360/+1360 |
* | Mon Nov 21 20:23:13 UTC 2022...a/libpwquality-1.4.5-x86_64-1.txz: Upgraded.
a/pciutils-3.9.0-x86_64-1.txz: Upgraded.
ap/qpdf-11.2.0-x86_64-1.txz: Upgraded.
d/mercurial-6.3.1-x86_64-1.txz: Upgraded.
kde/krusader-2.8.0-x86_64-1.txz: Upgraded.
l/libpng-1.6.39-x86_64-1.txz: Upgraded.
l/mlt-7.12.0-x86_64-1.txz: Upgraded.
x/fcitx5-5.0.20-x86_64-1.txz: Upgraded.
x/fcitx5-anthy-5.0.13-x86_64-1.txz: Upgraded.
x/fcitx5-chinese-addons-5.0.16-x86_64-1.txz: Upgraded.
x/fcitx5-gtk-5.0.20-x86_64-1.txz: Upgraded.
x/fcitx5-kkc-5.0.11-x86_64-1.txz: Upgraded.
x/fcitx5-m17n-5.0.11-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.0.16-x86_64-1.txz: Upgraded.
x/fcitx5-table-extra-5.0.12-x86_64-1.txz: Upgraded.
x/fcitx5-unikey-5.0.12-x86_64-1.txz: Upgraded.
x/libXdmcp-1.1.4-x86_64-1.txz: Upgraded.
x/libXpm-3.5.14-x86_64-1.txz: Upgraded.
x/libXrandr-1.5.3-x86_64-1.txz: Upgraded.
x/libime-1.0.15-x86_64-1.txz: Upgraded.
x/libinput-1.22.0-x86_64-1.txz: Upgraded.
x/xcb-imdkit-1.0.4-x86_64-1.txz: Upgraded.
20221121202313 | Patrick J Volkerding | 2022-11-22 | 1 | -1/+1 |
* | Tue Nov 15 01:28:38 UTC 2022...a/xz-5.2.8-x86_64-1.txz: Upgraded.
d/mercurial-6.3.0-x86_64-1.txz: Upgraded.
d/rust-1.64.0-x86_64-1.txz: Upgraded.
kde/attica-5.100.0-x86_64-1.txz: Upgraded.
kde/baloo-5.100.0-x86_64-1.txz: Upgraded.
kde/bluez-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/breeze-icons-5.100.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.100.0-x86_64-1.txz: Upgraded.
kde/frameworkintegration-5.100.0-x86_64-1.txz: Upgraded.
kde/kactivities-5.100.0-x86_64-1.txz: Upgraded.
kde/kactivities-stats-5.100.0-x86_64-1.txz: Upgraded.
kde/kapidox-5.100.0-x86_64-1.txz: Upgraded.
kde/karchive-5.100.0-x86_64-1.txz: Upgraded.
kde/kauth-5.100.0-x86_64-1.txz: Upgraded.
kde/kbookmarks-5.100.0-x86_64-1.txz: Upgraded.
kde/kcalendarcore-5.100.0-x86_64-1.txz: Upgraded.
kde/kcmutils-5.100.0-x86_64-1.txz: Upgraded.
kde/kcodecs-5.100.0-x86_64-1.txz: Upgraded.
kde/kcompletion-5.100.0-x86_64-1.txz: Upgraded.
kde/kconfig-5.100.0-x86_64-1.txz: Upgraded.
kde/kconfigwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kcontacts-5.100.0-x86_64-1.txz: Upgraded.
kde/kcoreaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kcrash-5.100.0-x86_64-1.txz: Upgraded.
kde/kdav-5.100.0-x86_64-1.txz: Upgraded.
kde/kdbusaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kdeclarative-5.100.0-x86_64-1.txz: Upgraded.
kde/kded-5.100.0-x86_64-1.txz: Upgraded.
kde/kdelibs4support-5.100.0-x86_64-1.txz: Upgraded.
kde/kdesignerplugin-5.100.0-x86_64-1.txz: Upgraded.
kde/kdesu-5.100.0-x86_64-1.txz: Upgraded.
kde/kdewebkit-5.100.0-x86_64-1.txz: Upgraded.
kde/kdnssd-5.100.0-x86_64-1.txz: Upgraded.
kde/kdoctools-5.100.0-x86_64-1.txz: Upgraded.
kde/kemoticons-5.100.0-x86_64-1.txz: Upgraded.
kde/kfilemetadata-5.100.0-x86_64-1.txz: Upgraded.
kde/kglobalaccel-5.100.0-x86_64-1.txz: Upgraded.
kde/kguiaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kholidays-5.100.0-x86_64-1.txz: Upgraded.
kde/khtml-5.100.0-x86_64-1.txz: Upgraded.
kde/ki18n-5.100.0-x86_64-1.txz: Upgraded.
kde/kiconthemes-5.100.0-x86_64-1.txz: Upgraded.
kde/kidletime-5.100.0-x86_64-1.txz: Upgraded.
kde/kimageformats-5.100.0-x86_64-1.txz: Upgraded.
kde/kinit-5.100.0-x86_64-1.txz: Upgraded.
kde/kio-5.100.0-x86_64-1.txz: Upgraded.
kde/kirigami2-5.100.0-x86_64-1.txz: Upgraded.
kde/kitemmodels-5.100.0-x86_64-1.txz: Upgraded.
kde/kitemviews-5.100.0-x86_64-1.txz: Upgraded.
kde/kjobwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kjs-5.100.0-x86_64-1.txz: Upgraded.
kde/kjsembed-5.100.0-x86_64-1.txz: Upgraded.
kde/kmediaplayer-5.100.0-x86_64-1.txz: Upgraded.
kde/knewstuff-5.100.0-x86_64-1.txz: Upgraded.
kde/knotifications-5.100.0-x86_64-1.txz: Upgraded.
kde/knotifyconfig-5.100.0-x86_64-1.txz: Upgraded.
kde/kpackage-5.100.0-x86_64-1.txz: Upgraded.
kde/kparts-5.100.0-x86_64-1.txz: Upgraded.
kde/kpeople-5.100.0-x86_64-1.txz: Upgraded.
kde/kplotting-5.100.0-x86_64-1.txz: Upgraded.
kde/kpty-5.100.0-x86_64-1.txz: Upgraded.
kde/kquickcharts-5.100.0-x86_64-1.txz: Upgraded.
kde/kross-5.100.0-x86_64-1.txz: Upgraded.
kde/krunner-5.100.0-x86_64-1.txz: Upgraded.
kde/kservice-5.100.0-x86_64-1.txz: Upgraded.
kde/ktexteditor-5.100.0-x86_64-1.txz: Upgraded.
kde/ktextwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kunitconversion-5.100.0-x86_64-1.txz: Upgraded.
kde/kwallet-5.100.0-x86_64-1.txz: Upgraded.
kde/kwayland-5.100.0-x86_64-1.txz: Upgraded.
kde/kwidgetsaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kwindowsystem-5.100.0-x86_64-1.txz: Upgraded.
kde/kxmlgui-5.100.0-x86_64-1.txz: Upgraded.
kde/kxmlrpcclient-5.100.0-x86_64-1.txz: Upgraded.
kde/modemmanager-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/networkmanager-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/oxygen-icons5-5.100.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.100.0-x86_64-1.txz: Upgraded.
kde/prison-5.100.0-x86_64-1.txz: Upgraded.
kde/purpose-5.100.0-x86_64-1.txz: Upgraded.
kde/qqc2-desktop-style-5.100.0-x86_64-1.txz: Upgraded.
kde/solid-5.100.0-x86_64-1.txz: Upgraded.
kde/sonnet-5.100.0-x86_64-1.txz: Upgraded.
kde/syndication-5.100.0-x86_64-1.txz: Upgraded.
kde/syntax-highlighting-5.100.0-x86_64-1.txz: Upgraded.
kde/threadweaver-5.100.0-x86_64-1.txz: Upgraded.
l/babl-0.1.98-x86_64-1.txz: Upgraded.
l/gegl-0.4.40-x86_64-1.txz: Upgraded.
l/grantlee-5.3.1-x86_64-1.txz: Upgraded.
l/nodejs-19.1.0-x86_64-1.txz: Upgraded.
n/libqmi-1.32.2-x86_64-1.txz: Upgraded.
n/mutt-2.2.9-x86_64-1.txz: Upgraded.
n/nghttp2-1.51.0-x86_64-1.txz: Upgraded.
x/xcompmgr-1.1.9-x86_64-1.txz: Upgraded.
x/xkbevd-1.1.5-x86_64-1.txz: Upgraded.
x/xkill-1.0.6-x86_64-1.txz: Upgraded.
x/xlogo-1.0.6-x86_64-1.txz: Upgraded.
x/xlsatoms-1.1.4-x86_64-1.txz: Upgraded.
x/xlsclients-1.1.5-x86_64-1.txz: Upgraded.
testing/packages/rust-1.65.0-x86_64-1.txz: Upgraded.
20221115012838 | Patrick J Volkerding | 2022-11-15 | 3 | -37/+7 |
* | Thu Sep 22 19:50:20 UTC 2022...a/quota-4.09-x86_64-1.txz: Upgraded.
d/parallel-20220922-noarch-1.txz: Upgraded.
l/jemalloc-5.3.0-x86_64-2.txz: Rebuilt.
Fixed version numbers in jemalloc.h. Thanks to Markus Wiesner.
n/ca-certificates-20220922-noarch-1.txz: Upgraded.
This update provides the latest CA certificates to check for the
authenticity of SSL connections.
testing/packages/rust-1.64.0-x86_64-1.txz: Added.
We've found ourselves in a situation where Thunderbird requires the Rust
compiler in /extra, and Firefox requires the one in the main tree (and
can't use this one until Firefox 107 sometime in November), so we'll just
park this here until we can use it.
20220922195020 | Patrick J Volkerding | 2022-09-23 | 5 | -0/+390 |
* | Wed Aug 17 20:41:53 UTC 2022...a/aaa_glibc-solibs-2.36-x86_64-2.txz: Rebuilt.
a/kernel-generic-5.19.2-x86_64-1.txz: Upgraded.
a/kernel-huge-5.19.2-x86_64-1.txz: Upgraded.
a/kernel-modules-5.19.2-x86_64-1.txz: Upgraded.
ap/vim-9.0.0223-x86_64-1.txz: Upgraded.
Fix use after free, out-of-bounds read, and heap based buffer overflow.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
(* Security fix *)
d/kernel-headers-5.19.2-x86-1.txz: Upgraded.
k/kernel-source-5.19.2-noarch-1.txz: Upgraded.
l/glibc-2.36-x86_64-2.txz: Rebuilt.
Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since
the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on
board with this approach, but since DT_GNU_HASH remains and is still used,
I guess I'll go along with it for now. Hopefully EAC will be patched and we
can back this out.
Thanks to Swaggajackin for the notice and for providing links to the glibc
bug discussion as well as the patch.
If anything else needs a rebuild after this, let me know in the LQ thread.
l/glibc-i18n-2.36-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.36-x86_64-2.txz: Rebuilt.
xap/vim-gvim-9.0.0223-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220817204153 | Patrick J Volkerding | 2022-08-18 | 22 | -64667/+0 |
* | Fri Aug 12 01:47:02 UTC 2022...a/aaa_libraries-15.1-x86_64-9.txz: Rebuilt.
Added: libboost_atomic.so.1.79.0, libboost_chrono.so.1.79.0,
libboost_container.so.1.79.0, libboost_context.so.1.79.0,
libboost_contract.so.1.79.0, libboost_coroutine.so.1.79.0,
libboost_date_time.so.1.79.0, libboost_fiber.so.1.79.0,
libboost_filesystem.so.1.79.0, libboost_graph.so.1.79.0,
libboost_iostreams.so.1.79.0, libboost_json.so.1.79.0,
libboost_locale.so.1.79.0, libboost_log.so.1.79.0,
libboost_log_setup.so.1.79.0, libboost_math_c99.so.1.79.0,
libboost_math_c99f.so.1.79.0, libboost_math_c99l.so.1.79.0,
libboost_math_tr1.so.1.79.0, libboost_math_tr1f.so.1.79.0,
libboost_math_tr1l.so.1.79.0, libboost_nowide.so.1.79.0,
libboost_prg_exec_monitor.so.1.79.0, libboost_program_options.so.1.79.0,
libboost_python27.so.1.79.0, libboost_python39.so.1.79.0,
libboost_random.so.1.79.0, libboost_regex.so.1.79.0,
libboost_serialization.so.1.79.0, libboost_stacktrace_addr2line.so.1.79.0,
libboost_stacktrace_basic.so.1.79.0, libboost_stacktrace_noop.so.1.79.0,
libboost_system.so.1.79.0, libboost_thread.so.1.79.0,
libboost_timer.so.1.79.0, libboost_type_erasure.so.1.79.0,
libboost_unit_test_framework.so.1.79.0, libboost_wave.so.1.79.0,
libboost_wserialization.so.1.79.0.
a/kernel-generic-5.18.17-x86_64-1.txz: Upgraded.
a/kernel-huge-5.18.17-x86_64-1.txz: Upgraded.
a/kernel-modules-5.18.17-x86_64-1.txz: Upgraded.
ap/pamixer-1.5-x86_64-4.txz: Rebuilt.
Recompiled against boost-1.80.0.
d/git-2.37.2-x86_64-1.txz: Upgraded.
d/kernel-headers-5.18.17-x86-1.txz: Upgraded.
d/rust-1.63.0-x86_64-1.txz: Upgraded.
k/kernel-source-5.18.17-noarch-1.txz: Upgraded.
kde/kig-22.04.3-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
kde/kopeninghours-22.04.3-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
kde/krita-5.0.8-x86_64-4.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/boost-1.80.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/cryfs-0.10.3-x86_64-6.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/openexr-3.1.5-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/pango-1.50.9-x86_64-1.txz: Upgraded.
n/NetworkManager-1.38.4-x86_64-1.txz: Upgraded.
x/mesa-22.1.6-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.19.x/kernel-generic-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-headers-5.19.1-x86-1.txz: Added.
testing/packages/linux-5.19.x/kernel-huge-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-modules-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-source-5.19.1-noarch-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220812014702 | Patrick J Volkerding | 2022-08-12 | 22 | -0/+64667 |
* | Sat Jun 11 01:56:19 UTC 2022...a/kernel-firmware-20220610_7b71b75-noarch-1.txz: Upgraded.
a/kernel-generic-5.18.3-x86_64-1.txz: Upgraded.
a/kernel-huge-5.18.3-x86_64-1.txz: Upgraded.
a/kernel-modules-5.18.3-x86_64-1.txz: Upgraded.
d/gcc-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Removed.
d/gcc-g++-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-go-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-objc-12.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.18.3-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-2.txz: Rebuilt.
Recompiled to update embedded GCC version number.
k/kernel-source-5.18.3-noarch-1.txz: Upgraded.
x/libX11-1.8.1-x86_64-1.txz: Upgraded.
xap/blueman-2.2.5-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220611015619 | Patrick J Volkerding | 2022-06-11 | 33 | -64991/+0 |
* | Mon Jun 6 20:57:15 UTC 2022...a/btrfs-progs-5.18.1-x86_64-1.txz: Upgraded.
a/kernel-generic-5.17.13-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.13-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.13-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.13-x86-1.txz: Upgraded.
d/pahole-1.23-x86_64-1.txz: Added.
Thanks to xaizek and PiterPunk.
k/kernel-source-5.17.13-noarch-1.txz: Upgraded.
l/gmime-3.2.12-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_37-x86_64-1.txz: Upgraded.
l/python-setuptools_scm-6.4.2-x86_64-1.txz: Upgraded.
n/alpine-2.26-x86_64-1.txz: Upgraded.
n/mutt-2.2.6-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.18.x/kernel-generic-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-headers-5.18.2-x86-1.txz: Added.
testing/packages/linux-5.18.x/kernel-huge-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-modules-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-source-5.18.2-noarch-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220606205715 | Patrick J Volkerding | 2022-06-07 | 22 | -0/+64187 |
* | Sat May 7 18:53:48 UTC 2022...a/kernel-firmware-20220503_d4b7551-noarch-1.txz: Upgraded.
ap/sqlite-3.38.5-x86_64-1.txz: Upgraded.
d/git-2.36.1-x86_64-1.txz: Upgraded.
n/stunnel-5.64-x86_64-1.txz: Upgraded.
testing/packages/gcc-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-go-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-12.1.0-x86_64-1.txz: Added.
20220507185348 | Patrick J Volkerding | 2022-05-08 | 11 | -0/+804 |
* | Wed Apr 27 21:43:51 UTC 2022...a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded.
a/sysvinit-3.04-x86_64-1.txz: Upgraded.
ap/sqlite-3.38.3-x86_64-1.txz: Upgraded.
d/gcc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-go-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.5-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-1.txz: Upgraded.
This also updates the embedded GCC version number.
k/kernel-source-5.17.5-noarch-1.txz: Upgraded.
CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0"
GCC_VERSION 110200 -> 110300
+CC_HAS_SLS y
+SLS y
kde/krita-5.0.6-x86_64-1.txz: Upgraded.
l/netpbm-10.98.02-x86_64-1.txz: Upgraded.
l/nodejs-16.15.0-x86_64-1.txz: Upgraded.
n/curl-7.83.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
OAUTH2 bearer bypass in connection re-use.
Credential leak on redirect.
Bad local IPv6 connection reuse.
Auth/cookie leak on redirect.
For more information, see:
https://curl.se/docs/CVE-2022-22576.html
https://curl.se/docs/CVE-2022-27774.html
https://curl.se/docs/CVE-2022-27775.html
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
(* Security fix *)
n/fetchmail-6.4.30-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220427214351 | Patrick J Volkerding | 2022-04-28 | 14 | -955/+0 |
* | Mon Apr 25 20:55:17 UTC 2022...a/kernel-firmware-20220425_ac21ab5-noarch-1.txz: Upgraded.
d/meson-0.62.1-x86_64-1.txz: Upgraded.
d/parallel-20220422-noarch-1.txz: Upgraded.
l/harfbuzz-4.2.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_31-x86_64-1.txz: Upgraded.
l/libseccomp-2.5.4-x86_64-1.txz: Upgraded.
l/libusb-1.0.26-x86_64-1.txz: Upgraded.
l/openal-soft-1.22.0-x86_64-1.txz: Upgraded.
n/proftpd-1.3.7d-x86_64-1.txz: Upgraded.
x/xdg-desktop-portal-1.14.3-x86_64-1.txz: Upgraded.
xap/freerdp-2.7.0-x86_64-1.txz: Upgraded.
This update is a security and maintenance release.
For more information, see:
https://github.com/FreeRDP/FreeRDP/blob/2.7.0/ChangeLog
(* Security fix *)
testing/packages/gcc-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-brig-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-go-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-11.3.0-x86_64-1.txz: Added.
20220425205517 | Patrick J Volkerding | 2022-04-26 | 21 | -61722/+955 |
* | Wed Feb 2 08:21:48 UTC 2022...a/kernel-generic-5.15.19-x86_64-2.txz: Upgraded.
a/kernel-huge-5.15.19-x86_64-2.txz: Upgraded.
a/kernel-modules-5.15.19-x86_64-2.txz: Upgraded.
d/kernel-headers-5.15.19-x86-2.txz: Upgraded.
k/kernel-source-5.15.19-noarch-2.txz: Upgraded.
-RTC_SYSTOHC_DEVICE "rtc0"
RTC_SYSTOHC y -> n
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Rebuilt.
-RTC_SYSTOHC_DEVICE "rtc0"
RTC_SYSTOHC y -> n
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220202082148 | Patrick J Volkerding | 2022-02-02 | 6 | -12/+6 |
* | Wed Feb 2 04:17:39 UTC 2022...fortune -m "I will be finished tomorrow" fortunes2
a/kernel-generic-5.15.19-x86_64-1.txz: Upgraded.
a/kernel-huge-5.15.19-x86_64-1.txz: Upgraded.
a/kernel-modules-5.15.19-x86_64-1.txz: Upgraded.
ap/screen-4.9.0-x86_64-1.txz: Upgraded.
Patched possible denial of service via a crafted UTF-8 character sequence.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937
(* Security fix *)
d/kernel-headers-5.15.19-x86-1.txz: Upgraded.
k/kernel-source-5.15.19-noarch-1.txz: Upgraded.
RTC_INTF_DEV_UIE_EMUL y -> n
RTC_SYSTOHC n -> y
+RTC_SYSTOHC_DEVICE "rtc0"
l/lcms2-2.13-x86_64-2.txz: Rebuilt.
[PATCH] Fix for optimization error on grayscale.
Thanks to Aaron Boxer for reporting this issue.
Thanks to gmgf.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220202041739 | Patrick J Volkerding | 2022-02-02 | 7 | -18/+24 |
* | Tue Feb 1 04:37:04 UTC 2022...The sepulchral voice intones, "The cave is now closed."
kde/falkon-3.2.0-x86_64-1.txz: Upgraded.
kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt.
[PATCH] only start programs in user's path.
[PATCH] only execute diff in path.
Thanks to gmgf.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
(* Security fix *)
l/libcanberra-0.30-x86_64-9.txz: Rebuilt.
Fix a bug crashing some applications in Wayland desktops.
Thanks to 01micko.
n/samba-4.15.5-x86_64-1.txz: Upgraded.
This is a security release in order to address the following defects:
UNIX extensions in SMB1 disclose whether the outside target of a symlink
exists.
Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
allows remote attackers to execute arbitrary code as root on affected Samba
installations that use the VFS module vfs_fruit.
Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
the ability to write to an account can exploit this to perform a
denial-of-service attack by adding an SPN that matches an existing service.
Additionally, an attacker who can intercept traffic can impersonate existing
services, resulting in a loss of confidentiality and integrity.
For more information, see:
https://www.samba.org/samba/security/CVE-2021-44141.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
https://www.samba.org/samba/security/CVE-2021-44142.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://www.samba.org/samba/security/CVE-2022-0336.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
(* Security fix *)
x/xterm-370-x86_64-7.txz: Rebuilt.
Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
Thanks to gmgf.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
(* Security fix *)
testing/source/linux-5.16.4-configs/*: Added.
Sample config files to build 5.16.4 Linux kernels.
20220201043704 | Patrick J Volkerding | 2022-02-01 | 7 | -0/+61722 |
* | Thu Oct 28 01:11:07 UTC 2021...a/kernel-generic-5.14.15-x86_64-1.txz: Upgraded.
a/kernel-huge-5.14.15-x86_64-1.txz: Upgraded.
a/kernel-modules-5.14.15-x86_64-1.txz: Upgraded.
d/cmake-3.21.4-x86_64-1.txz: Upgraded.
d/kernel-headers-5.14.15-x86-1.txz: Upgraded.
k/kernel-source-5.14.15-noarch-1.txz: Upgraded.
We're going to go ahead and take both of those changes that were considered
in /testing. GazL almost had me talked out of the autogroup change, but it's
easy to disable if traditional "nice" behavior is important to someone.
-DRM_I810 n
-INLINE_READ_UNLOCK y
-INLINE_READ_UNLOCK_IRQ y
-INLINE_SPIN_UNLOCK_IRQ y
-INLINE_WRITE_UNLOCK y
-INLINE_WRITE_UNLOCK_IRQ y
PREEMPT n -> y
PREEMPT_VOLUNTARY y -> n
SCHED_AUTOGROUP n -> y
+CEC_GPIO n
+DEBUG_PREEMPT y
+PREEMPTION y
+PREEMPT_COUNT y
+PREEMPT_DYNAMIC y
+PREEMPT_RCU y
+PREEMPT_TRACER n
+RCU_BOOST n
+TASKS_RCU y
+UNINLINE_SPIN_UNLOCK y
kde/plasma-desktop-5.23.2.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_12-x86_64-1.txz: Upgraded.
l/librsvg-2.52.3-x86_64-1.txz: Upgraded.
n/bind-9.16.22-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issue:
The "lame-ttl" option is now forcibly set to 0. This effectively disables
the lame server cache, as it could previously be abused by an attacker to
significantly degrade resolver performance.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
(* Security fix *)
n/c-ares-1.18.1-x86_64-1.txz: Upgraded.
n/samba-4.15.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20211028011107 | Patrick J Volkerding | 2021-10-28 | 22 | -61885/+0 |
* | Mon Oct 25 19:30:42 UTC 2021...ap/slackpkg-15.0.8-noarch-1.txz: Upgraded.
Author: piterpunk <piterpunk@slackware.com>
To make it easier to do an unattended slackpkg update/upgrade process,
this commit provides different exit codes for many situations:
0 Successful slackpkg execution.
1 Something wrong happened.
20 No package found to be downloaded, installed, reinstalled,
upgraded, or removed.
50 Slackpkg itself was upgraded and you need to re-run it.
100 There are pending updates.
Code and the main manpage are updated accordingly.
In addition, this commit also:
- removes the ChangeLog.txt in doinst.sh, so the needed
'slackpkg update' after Slackpkg upgrade won't say it's all OK
and doesn't need to redo the package lists
- removes AUTHORS from manpage. Nowadays there is code from many
people in Slackpkg and it seems a bit unfair to have only my and
Evaldo's name listed there.
Signed-off-by: Robby Workman <rworkman@slackware.com>
d/meson-0.60.0-x86_64-1.txz: Upgraded.
l/ffmpeg-4.4.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_11-x86_64-1.txz: Upgraded.
l/libcap-2.60-x86_64-1.txz: Upgraded.
l/libsoup-2.74.1-x86_64-1.txz: Upgraded.
l/sip-4.19.25-x86_64-3.txz: Rebuilt.
Drop the Qt4 modules. Thanks to gmgf.
n/dhcpcd-9.4.1-x86_64-1.txz: Upgraded.
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-3.txz: Rebuilt.
Let's enable SCHED_AUTOGROUP, which should improve desktop latency under a
heavy CPU load while being mostly inert on servers. It may be disabled at
boot time with a "noautogroup" kernel parameter, or at runtime like this:
echo 0 > /proc/sys/kernel/sched_autogroup_enabled
Thanks to gbschenkel.
SCHED_AUTOGROUP n -> y
20211025193042 | Patrick J Volkerding | 2021-10-26 | 12 | -62/+7 |
* | Sat Oct 23 18:57:30 UTC 2021...a/aaa_terminfo-6.3-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2021e-noarch-1.txz: Upgraded.
ap/itstool-2.0.7-x86_64-2.txz: Rebuilt.
Rebuilt with PYTHON=/usr/bin/python3. Thanks to USUARIONUEVO.
ap/mpg123-1.29.2-x86_64-1.txz: Upgraded.
d/meson-0.59.3-x86_64-1.txz: Upgraded.
d/parallel-20211022-noarch-1.txz: Upgraded.
d/python-pip-21.3.1-x86_64-1.txz: Upgraded.
d/python-setuptools-58.3.0-x86_64-1.txz: Upgraded.
l/exiv2-0.27.5-x86_64-1.txz: Upgraded.
l/ncurses-6.3-x86_64-1.txz: Upgraded.
n/php-7.4.25-x86_64-1.txz: Upgraded.
This update fixes bugs and a security issue:
FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
(* Security fix *)
xap/mozilla-thunderbird-91.2.1-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/91.2.1/releasenotes/
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-2.txz: Rebuilt.
These kernels enable CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y allowing
the kernel preemption model to be specified on the kernel command line
with one of these options: preempt=none, preempt=voluntary, and preempt=full.
Since there is no .config option to set a default, and the default in the
kernel sources is "full" (which is probably not a good default), the
kernel-source.SlackBuild has been modified to add support for an environment
variable CONFIG_PREEMPT_DEFAULT_MODE which can be set to none, voluntary, or
full to set the default kernel preemption model when a command line option
is not provided. These kernels have been built with a preemption model of
"none" (presumably the safest choice which will behave like the kernels we
have shipped before.) The runtime overhead on 64-bit should be negligible.
On 32-bit we lack support for HAVE_STATIC_CALL_INLINE, so spinlocks and
mutexes will have to be approached through a trampoline, adding a very small
amount of overhead. I feel this is probably worth it in order to have the
option to run a kernel with voluntary or full preemption, especially for
gaming or desktop purposes. The reduction in input lag with these modes is
actually quite noticable.
To check the current preemption model, you may use debugfs:
mount -t debugfs none /sys/kernel/debug
cat /sys/kernel/debug/sched/preempt
(none) voluntary full
You may change to a different preemption model on the fly once debugfs is
mounted:
echo voluntary > /sys/kernel/debug/sched/preempt
cat /sys/kernel/debug/sched/preempt
none (voluntary) full
Thanks to Daedra.
-DRM_I810 n
-INLINE_READ_UNLOCK y
-INLINE_READ_UNLOCK_IRQ y
-INLINE_SPIN_UNLOCK_IRQ y
-INLINE_WRITE_UNLOCK y
-INLINE_WRITE_UNLOCK_IRQ y
PREEMPT n -> y
PREEMPT_VOLUNTARY y -> n
+CEC_GPIO n
+DEBUG_PREEMPT y
+PREEMPTION y
+PREEMPT_COUNT y
+PREEMPT_DYNAMIC y
+PREEMPT_RCU y
+PREEMPT_TRACER n
+RCU_BOOST n
+TASKS_RCU y
+UNINLINE_SPIN_UNLOCK y
20211023185730 | Patrick J Volkerding | 2021-10-24 | 27 | -0/+61940 |
* | Wed Jul 14 17:57:37 UTC 2021...a/kernel-generic-5.13.2-x86_64-1.txz: Upgraded.
a/kernel-huge-5.13.2-x86_64-1.txz: Upgraded.
a/kernel-modules-5.13.2-x86_64-1.txz: Upgraded.
d/kernel-headers-5.13.2-x86-1.txz: Upgraded.
k/kernel-source-5.13.2-noarch-1.txz: Upgraded.
xap/gnuchess-6.2.9-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-78.12.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/78.12.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-30/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210714175737 | Patrick J Volkerding | 2021-07-15 | 27 | -61374/+0 |
* | Wed Jul 7 20:50:57 UTC 2021...a/kernel-generic-5.12.15-x86_64-1.txz: Upgraded.
a/kernel-huge-5.12.15-x86_64-1.txz: Upgraded.
a/kernel-modules-5.12.15-x86_64-1.txz: Upgraded.
a/libbytesize-2.6-x86_64-1.txz: Upgraded.
a/mcelog-177-x86_64-1.txz: Upgraded.
d/kernel-headers-5.12.15-x86-1.txz: Upgraded.
d/ruby-3.0.2-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues:
Trusting FTP PASV responses vulnerability in Net::FTP.
StartTLS stripping vulnerability in Net::IMAP.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
(* Security fix *)
k/kernel-source-5.12.15-noarch-1.txz: Upgraded.
l/python-pillow-8.3.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.13.x/kernel-generic-5.13.1-x86_64-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-headers-5.13.1-x86-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-huge-5.13.1-x86_64-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-modules-5.13.1-x86_64-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-source-5.13.1-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210707205057 | Patrick J Volkerding | 2021-07-08 | 11 | -6/+6 |
* | Mon Jun 28 18:40:09 UTC 2021...d/python-pip-21.1.3-x86_64-1.txz: Upgraded.
d/python3-3.9.6-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_2-x86_64-1.txz: Upgraded.
l/python-urllib3-1.26.6-x86_64-1.txz: Upgraded.
n/gpgme-1.16.0-x86_64-1.txz: Upgraded.
x/glu-9.0.2-x86_64-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-generic-5.13.0-x86_64-1.txz: Added.
testing/packages/linux-5.13.x/kernel-headers-5.13.0-x86-1.txz: Added.
testing/packages/linux-5.13.x/kernel-huge-5.13.0-x86_64-1.txz: Added.
testing/packages/linux-5.13.x/kernel-modules-5.13.0-x86_64-1.txz: Added.
testing/packages/linux-5.13.x/kernel-source-5.13.0-noarch-1.txz: Added.
20210628184009 | Patrick J Volkerding | 2021-06-29 | 27 | -0/+61374 |
* | Mon Jun 7 18:53:49 UTC 2021...Hey folks! Sorry about the delay in getting this batch out but I had other
distractions going on here last week that prevented getting this one wrapped
up. Anyway, probably the highlight of this update set is that we've decided
to abandon the 5.10 LTS kernel in favor of following the latest one. We've
never really had a policy that required LTS in a stable release although that
is how it has been done for years, but based on comments from the Slackware
community it seems like 5.10 LTS isn't getting a lot of love and lacks
hardware support that people need now. Conversely, the reports on 5.12 have
been almost entirely positive, so we're going to provide what we think is the
best available kernel. It's unlikely that we'll see another LTS prior to
release, so the plan for maintenance is to keep following the latest kernels
as needed for security purposes. If that means we have to jump to a new branch
while supporting the stable release, we'll start the kernel out in testing
first until we've had some feedback that it's safe to move it to the patches
directory. Sooner or later we will end up on an LTS kernel again, and at that
point we'll just roll with that one. Feel free to comment (or complain) about
this plan on LQ... I'll be curious to see what people think. Anyway, enjoy!
a/hwdata-0.348-noarch-1.txz: Upgraded.
a/kernel-generic-5.12.9-x86_64-1.txz: Upgraded.
a/kernel-huge-5.12.9-x86_64-1.txz: Upgraded.
a/kernel-modules-5.12.9-x86_64-1.txz: Upgraded.
ap/ispell-3.4.04-x86_64-1.txz: Upgraded.
ap/mpg123-1.28.0-x86_64-1.txz: Upgraded.
ap/slackpkg-15.0.5-noarch-1.txz: Upgraded.
Add "--" option to "command cd" in bash completion file. (akinomyoga)
shell-completions/slackpkg.bash: add "show-changelog".
Import bash-completion file from upstream project.
Added the new-config actions for specific files. (Piter PUNK)
Harden slackpkg with respect to obtaining GPG key. (CRTS)
d/clisp-2.50_20191103_c26de7873-x86_64-5.txz: Rebuilt.
Upgraded to libffcall-2.3.
d/git-2.32.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.12.9-x86-1.txz: Upgraded.
d/poke-1.3-x86_64-1.txz: Upgraded.
d/vala-0.52.4-x86_64-1.txz: Upgraded.
k/kernel-source-5.12.9-noarch-1.txz: Upgraded.
kde/calligra-3.2.1-x86_64-9.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/cantor-21.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/digikam-7.2.0-x86_64-3.txz: Rebuilt.
Recompiled against imagemagick-7.0.11_14.
kde/kfilemetadata-5.82.0-x86_64-2.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/kile-2.9.93-x86_64-9.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/kitinerary-21.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/krita-4.4.3-x86_64-5.txz: Rebuilt.
Recompiled against poppler-21.06.1.
kde/okular-21.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-21.06.1.
l/alsa-lib-1.2.5-x86_64-2.txz: Rebuilt.
Account for unexpected packing of the conf file tarballs. We'll see if this
is enough to make things work well again.
l/at-spi2-core-2.40.2-x86_64-1.txz: Upgraded.
l/dvdauthor-0.7.2-x86_64-5.txz: Rebuilt.
Recompiled against imagemagick-7.0.11_14.
l/libogg-1.3.5-x86_64-1.txz: Upgraded.
l/librsvg-2.50.7-x86_64-1.txz: Upgraded.
l/pipewire-0.3.29-x86_64-1.txz: Upgraded.
l/polkit-0.119-x86_64-1.txz: Upgraded.
This update includes a mitigation for local privilege escalation using
polkit_system_bus_name_get_creds_sync().
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560
(* Security fix *)
l/poppler-21.06.1-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/pycairo-1.20.1-x86_64-1.txz: Upgraded.
l/qca-2.3.3-x86_64-1.txz: Upgraded.
l/vte-0.64.2-x86_64-1.txz: Upgraded.
n/epic5-2.1.5-x86_64-1.txz: Upgraded.
n/httpd-2.4.48-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
mod_http2: Fix a potential NULL pointer dereference.
Unexpected <Location> section matching with 'MergeSlashes OFF'.
mod_auth_digest: possible stack overflow by one nul byte while validating
the Digest nonce.
mod_session: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service with a malicious backend
server and SessionHeader.
mod_session: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service.
mod_proxy_http: Fix possible crash due to NULL pointer dereference, which
could be used to cause a Denial of Service.
mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end
negotiation.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
(* Security fix *)
n/libmbim-1.24.8-x86_64-1.txz: Upgraded.
n/libqmi-1.28.6-x86_64-1.txz: Upgraded.
n/nettle-3.7.3-x86_64-1.txz: Upgraded.
n/openldap-2.4.59-x86_64-1.txz: Upgraded.
n/p11-kit-0.24.0-x86_64-1.txz: Upgraded.
n/php-7.4.20-x86_64-1.txz: Upgraded.
n/vsftpd-3.0.4-x86_64-1.txz: Upgraded.
n/whois-5.5.10-x86_64-1.txz: Upgraded.
x/libX11-1.7.2-x86_64-1.txz: Upgraded.
This is a bug fix release, correcting a regression introduced by and
improving the checks from the fix for CVE-2021-31535.
x/libinput-1.18.0-x86_64-1.txz: Upgraded.
x/mesa-21.1.2-x86_64-1.txz: Upgraded.
xap/blueman-2.2.1-x86_64-1.txz: Upgraded.
xap/gnuplot-5.4.2-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-78.11.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/78.11.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-26/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967
(* Security fix *)
xap/pidgin-2.14.5-x86_64-1.txz: Upgraded.
xap/xine-lib-1.2.11-x86_64-6.txz: Rebuilt.
Recompiled against poppler-21.06.1.
extra/bash-completion/bash-completion-2.11-noarch-2.txz: Rebuilt.
Removed the slackpkg completion file.
extra/php8/php8-8.0.7-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210607185349 | Patrick J Volkerding | 2021-06-07 | 27 | -60936/+0 |
* | Fri May 28 19:26:15 UTC 2021...a/cryptsetup-2.3.6-x86_64-1.txz: Upgraded.
a/kernel-generic-5.10.41-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.41-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.41-x86_64-1.txz: Upgraded.
d/cmake-3.20.3-x86_64-1.txz: Upgraded.
d/kernel-headers-5.10.41-x86-1.txz: Upgraded.
k/kernel-source-5.10.41-noarch-1.txz: Upgraded.
l/mozilla-nss-3.66-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.8-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.8-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.8-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.8-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.8-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210528192615 | Patrick J Volkerding | 2021-05-29 | 11 | -6/+6 |
* | Wed May 26 20:00:32 UTC 2021...a/kernel-generic-5.10.40-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.40-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.40-x86_64-1.txz: Upgraded.
d/kernel-headers-5.10.40-x86-1.txz: Upgraded.
k/kernel-source-5.10.40-noarch-1.txz: Upgraded.
l/librsvg-2.50.6-x86_64-1.txz: Upgraded.
l/python-urllib3-1.26.5-x86_64-1.txz: Upgraded.
n/ca-certificates-20210526-noarch-1.txz: Upgraded.
This update provides the latest CA certificates to check for the
authenticity of SSL connections.
n/curl-7.77.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
schannel cipher selection surprise
TELNET stack contents disclosure
TLS session caching disaster
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22901
(* Security fix *)
n/net-snmp-5.9.1-x86_64-1.txz: Upgraded.
n/nftables-0.9.9-x86_64-1.txz: Upgraded.
x/libinput-1.17.3-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.7-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.7-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.7-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.7-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.7-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210526200032 | Patrick J Volkerding | 2021-05-27 | 11 | -6/+6 |
* | Sat May 22 19:25:09 UTC 2021...a/kernel-generic-5.10.39-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.39-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.39-x86_64-1.txz: Upgraded.
ap/slackpkg-15.0.3-noarch-1.txz: Upgraded.
Fixed 'continue' error message. Thanks to dive.
d/kernel-headers-5.10.39-x86-1.txz: Upgraded.
k/kernel-source-5.10.39-noarch-1.txz: Upgraded.
l/libsigc++-2.10.7-x86_64-1.txz: Upgraded.
x/libepoxy-1.5.8-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.6-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.6-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.6-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.6-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.6-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210522192509 | Patrick J Volkerding | 2021-05-23 | 11 | -6/+6 |
* | Wed May 19 21:05:00 UTC 2021...a/kernel-firmware-20210518_f846292-noarch-1.txz: Upgraded.
a/kernel-generic-5.10.38-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.38-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.38-x86_64-1.txz: Upgraded.
d/kernel-headers-5.10.38-x86-1.txz: Upgraded.
k/kernel-source-5.10.38-noarch-1.txz: Upgraded.
l/imagemagick-7.0.11_13-x86_64-1.txz: Upgraded.
l/pango-1.48.5-x86_64-1.txz: Upgraded.
l/pipewire-0.3.28-x86_64-1.txz: Upgraded.
Config files are now installed in the data dir, system overrides
in /etc/pipewire and $HOME are checked first.
x/libX11-1.7.1-x86_64-1.txz: Upgraded.
This update fixes missing request length checks in libX11 that can lead to
the emission of extra X protocol requests to the X server.
For more information, see:
https://lists.x.org/archives/xorg-announce/2021-May/003088.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
(* Security fix *)
x/libdrm-2.4.106-x86_64-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.9.9-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.5-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.5-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.5-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.5-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.5-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210519210500 | Patrick J Volkerding | 2021-05-20 | 18 | -442/+6 |
* | Fri May 14 19:59:26 UTC 2021...a/btrfs-progs-5.12.1-x86_64-1.txz: Upgraded.
a/kernel-generic-5.10.37-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.37-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.37-x86_64-1.txz: Upgraded.
ap/lxc-2.0.11_fad08f383-x86_64-8.txz: Rebuilt.
Add some additional required packages, run ldconfig inside the rootfs,
update the slackpkg.conf, and account for changed hostname handling.
Thanks to PiterPunk.
d/kernel-headers-5.10.37-x86-1.txz: Upgraded.
k/kernel-source-5.10.37-noarch-1.txz: Upgraded.
n/getmail-6.16-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.4-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.4-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.4-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.4-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.4-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210514195926 | Patrick J Volkerding | 2021-05-15 | 11 | -12/+6 |
* | Wed May 12 19:02:20 UTC 2021...a/kernel-firmware-20210512_55d9649-noarch-1.txz: Upgraded.
a/sysklogd-2.2.3-x86_64-1.txz: Upgraded.
ap/sudo-1.9.7-x86_64-1.txz: Upgraded.
d/distcc-3.4-x86_64-1.txz: Upgraded.
n/rpcbind-1.2.6-x86_64-1.txz: Upgraded.
x/libXfixes-6.0.0-x86_64-1.txz: Upgraded.
x/mesa-21.1.0-x86_64-1.txz: Upgraded.
xfce/mousepad-0.5.5-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.3-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.3-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.3-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.3-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.3-noarch-1.txz: Upgraded.
20210512190220 | Patrick J Volkerding | 2021-05-13 | 11 | -6/+6 |
* | Sat May 8 00:24:32 UTC 2021...a/kernel-generic-5.10.35-x86_64-1.txz: Upgraded.
a/kernel-huge-5.10.35-x86_64-1.txz: Upgraded.
a/kernel-modules-5.10.35-x86_64-1.txz: Upgraded.
a/lvm2-2.03.12-x86_64-1.txz: Upgraded.
ap/mariadb-10.5.10-x86_64-1.txz: Upgraded.
ap/mpg123-1.27.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.10.35-x86-1.txz: Upgraded.
k/kernel-source-5.10.35-noarch-1.txz: Upgraded.
n/httpd-2.4.46-x86_64-3.txz: Rebuilt.
Reverted to httpd-2.4.46. Apparently 2.4.47 isn't actually released yet.
Sorry for any problems this caused.
xfce/thunar-4.16.8-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.2-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.2-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.2-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.2-x86_64-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.2-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20210508002432 | Patrick J Volkerding | 2021-05-08 | 11 | -6/+6 |