| Commit message (Expand) | Author | Age | Files | Lines |
* | Tue Nov 21 21:15:30 UTC 2023...We have fresh 6.6 kernels in /testing! You may notice that on the 32-bit side
we have done away with the -smp labeled kernel packages, but it's actually the
other kernels that were retired -- the non-SMP, non-PAE ones. If you were
previously using kernel-generic-smp or kernel-huge-smp, you'll need to make
some adjustments to your bootloader setup to load kernel-generic or kernel-huge
instead. About the only non-obsolete CPUs that may have an issue with this are
the first generation Pentium M chips, which supported PAE but unfortunately did
not advertise this in the CPU flags. But these will support PAE if the kernel
option "forcepae" is appended at boot time. Enjoy! :-)
a/gettext-0.22.4-x86_64-1.txz: Upgraded.
a/kbd-2.6.3-x86_64-3.txz: Rebuilt.
Installed extra console fonts.
a/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.63-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.63-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.63-x86_64-1.txz: Upgraded.
a/mkinitrd-1.4.11-x86_64-34.txz: Rebuilt.
Fix tests for including jfs/xfs repair tools. Thanks to regdub.
a/pkgtools-15.1-noarch-8.txz: Rebuilt.
Make vim the default vi choice.
ap/vim-9.0.2116-x86_64-1.txz: Upgraded.
d/gettext-tools-0.22.4-x86_64-1.txz: Upgraded.
d/git-2.43.0-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.63-x86-1.txz: Upgraded.
d/mercurial-6.6-x86_64-1.txz: Upgraded.
d/meson-1.3.0-x86_64-1.txz: Upgraded.
d/scons-4.6.0-x86_64-1.txz: Upgraded.
k/kernel-source-6.1.63-noarch-1.txz: Upgraded.
l/readline-8.2.007-x86_64-1.txz: Upgraded.
n/c-ares-1.22.1-x86_64-1.txz: Upgraded.
n/nfs-utils-2.6.4-x86_64-1.txz: Upgraded.
x/libdrm-2.4.118-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-115.5.0esr-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to zuriel for the taskbar icon fix on Wayland. :-)
For more information, see:
https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-50/
https://www.cve.org/CVERecord?id=CVE-2023-6204
https://www.cve.org/CVERecord?id=CVE-2023-6205
https://www.cve.org/CVERecord?id=CVE-2023-6206
https://www.cve.org/CVERecord?id=CVE-2023-6207
https://www.cve.org/CVERecord?id=CVE-2023-6208
https://www.cve.org/CVERecord?id=CVE-2023-6209
https://www.cve.org/CVERecord?id=CVE-2023-6212
(* Security fix *)
xap/vim-gvim-9.0.2116-x86_64-1.txz: Upgraded.
xap/xsnow-3.7.6-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/kernel-generic-6.6.2-x86_64-1.txz: Added.
testing/packages/kernel-headers-6.6.2-x86-1.txz: Added.
testing/packages/kernel-huge-6.6.2-x86_64-1.txz: Added.
testing/packages/kernel-modules-6.6.2-x86_64-1.txz: Added.
testing/packages/kernel-source-6.6.2-noarch-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20231121211530 | Patrick J Volkerding | 2023-11-21 | 20 | -0/+45053 |
* | Thu Nov 16 20:51:47 UTC 2023...l/jasper-4.1.0-x86_64-1.txz: Upgraded.
l/pipewire-0.3.85-x86_64-1.txz: Upgraded.
l/sof-firmware-2023.09.2-noarch-1.txz: Upgraded.
n/gnutls-3.8.2-x86_64-1.txz: Upgraded.
n/libksba-1.6.5-x86_64-1.txz: Upgraded.
xap/pan-0.155-x86_64-1.txz: Upgraded.
testing/packages/rust-1.74.0-x86_64-1.txz: Upgraded.
20231116205147 | Patrick J Volkerding | 2023-11-16 | 2 | -8/+8 |
* | Sat Oct 28 22:03:51 UTC 2023...d/rust-1.70.0-x86_64-3.txz: Rebuilt.
Fixed the installation of rls and added rust-analyzer (the successor to rls)
and rust-demangler. Thanks to Heinz Wiesinger.
l/enchant-2.6.2-x86_64-1.txz: Upgraded.
l/gexiv2-0.14.2-x86_64-2.txz: Rebuilt.
Recompiled against exiv2-0.28.0.
l/libsigc++3-3.6.0-x86_64-1.txz: Upgraded.
l/vid.stab-1.1.1-x86_64-1.txz: Upgraded.
x/ibus-m17n-1.4.23-x86_64-1.txz: Upgraded.
testing/packages/rust-1.73.0-x86_64-2.txz: Rebuilt.
Fixed the installation of rls and added rust-analyzer (the successor to rls)
and rust-demangler. Thanks to Heinz Wiesinger.
20231028220351 | Patrick J Volkerding | 2023-10-29 | 1 | -2/+7 |
* | Wed Oct 11 22:22:40 UTC 2023...l/libcaca-0.99.beta20-x86_64-1.txz: Upgraded.
Fixed a crash bug (a crafted file defining width of zero leads to divide by
zero and a crash). Seems to be merely a bug rather than a security issue, but
I'd been meaning to get beta20 building so this was a good excuse.
Thanks to marav.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-0856
(* Security fix *)
l/libcue-2.3.0-x86_64-1.txz: Upgraded.
xap/xscreensaver-6.08-x86_64-1.txz: Upgraded.
testing/packages/rust-1.73.0-x86_64-1.txz: Upgraded.
20231011222240 | Patrick J Volkerding | 2023-10-12 | 2 | -7/+7 |
* | Mon Oct 9 18:10:01 UTC 2023...a/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt.
ap/qpdf-11.6.2-x86_64-1.txz: Upgraded.
ap/vim-9.0.2009-x86_64-1.txz: Upgraded.
l/desktop-file-utils-0.27-x86_64-1.txz: Upgraded.
l/glibc-2.38-x86_64-2.txz: Rebuilt.
These glibc packages are the exact ones that were previously in /testing.
A test mass rebuild was done here finding no new FTBFS, so I think these
are good to go. :)
l/glibc-i18n-2.38-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.38-x86_64-2.txz: Rebuilt.
l/imagemagick-7.1.1_20-x86_64-1.txz: Upgraded.
l/libxkbcommon-1.6.0-x86_64-1.txz: Upgraded.
l/shared-mime-info-2.3-x86_64-1.txz: Upgraded.
n/c-ares-1.20.0-x86_64-1.txz: Upgraded.
n/libtirpc-1.3.4-x86_64-1.txz: Upgraded.
n/proftpd-1.3.8a-x86_64-1.txz: Upgraded.
n/whois-5.5.19-x86_64-1.txz: Upgraded.
Fixed english support for Japanese queries to not add again the /e argument
if it had already been provided by the user. (Closes: #1050171)
Added the .ye and .*************** (.xn--54b7fta0cc, Bangladesh) TLD servers.
Updated the .ba, .bb, .dk, .es, .gt, .jo, .ml, .mo, .pa, .pn, .sv, .uy,
.a+-la-r+-d+.n+, (.xn--mgbayh7gpa, Jordan) and .****** (.xn--mix891f, Macao)
TLD servers.
Upgraded the TLD URLs to HTTPS whenever possible.
Updated the charset for whois.jprs.jp.
Removed 3 new gTLDs which are no longer active.
Removed support for the obsolete as32 dot notation.
x/xterm-386-x86_64-1.txz: Upgraded.
xap/vim-gvim-9.0.2009-x86_64-1.txz: Upgraded.
20231009181001 | Patrick J Volkerding | 2023-10-09 | 19 | -2081/+0 |
* | Tue Oct 3 22:19:10 UTC 2023...a/aaa_glibc-solibs-2.37-x86_64-3.txz: Rebuilt.
a/dialog-1.3_20231002-x86_64-1.txz: Upgraded.
ap/mpg123-1.32.3-x86_64-1.txz: Upgraded.
d/llvm-17.0.2-x86_64-1.txz: Upgraded.
d/meson-1.2.2-x86_64-2.txz: Rebuilt.
[PATCH] Revert rust: apply global, project, and environment C args to bindgen.
This fixes building Mesa.
Thanks to lucabon and marav.
kde/calligra-3.2.1-x86_64-34.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/cantor-23.08.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/kfilemetadata-5.110.0-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/kile-2.9.93-x86_64-28.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/kitinerary-23.08.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/krita-5.1.5-x86_64-15.txz: Rebuilt.
Recompiled against poppler-23.10.0.
kde/okular-23.08.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.10.0.
l/glibc-2.37-x86_64-3.txz: Rebuilt.
l/glibc-i18n-2.37-x86_64-3.txz: Rebuilt.
Patched to fix the "Looney Tunables" vulnerability, a local privilege
escalation in ld.so. This vulnerability was introduced in April 2021
(glibc 2.34) by commit 2ed18c.
Thanks to Qualys Research Labs for reporting this issue.
For more information, see:
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.cve.org/CVERecord?id=CVE-2023-4911
(* Security fix *)
l/glibc-profile-2.37-x86_64-3.txz: Rebuilt.
l/mozilla-nss-3.94-x86_64-1.txz: Upgraded.
l/poppler-23.10.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
n/NetworkManager-1.44.2-x86_64-1.txz: Upgraded.
n/irssi-1.4.5-x86_64-1.txz: Upgraded.
x/fcitx5-5.1.1-x86_64-1.txz: Upgraded.
x/fcitx5-anthy-5.1.1-x86_64-1.txz: Upgraded.
x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz: Upgraded.
x/fcitx5-gtk-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-hangul-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-kkc-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-m17n-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.1.1-x86_64-1.txz: Upgraded.
x/fcitx5-sayura-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-table-extra-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-table-other-5.1.0-x86_64-1.txz: Upgraded.
x/fcitx5-unikey-5.1.1-x86_64-1.txz: Upgraded.
x/libX11-1.8.7-x86_64-1.txz: Upgraded.
This update fixes security issues:
libX11: out-of-bounds memory access in _XkbReadKeySyms().
libX11: stack exhaustion from infinite recursion in PutSubImage().
libX11: integer overflow in XCreateImage() leading to a heap overflow.
For more information, see:
https://lists.x.org/archives/xorg-announce/2023-October/003424.html
https://www.cve.org/CVERecord?id=CVE-2023-43785
https://www.cve.org/CVERecord?id=CVE-2023-43786
https://www.cve.org/CVERecord?id=CVE-2023-43787
(* Security fix *)
x/libXpm-3.5.17-x86_64-1.txz: Upgraded.
This update fixes security issues:
libXpm: out of bounds read in XpmCreateXpmImageFromBuffer().
libXpm: out of bounds read on XPM with corrupted colormap.
For more information, see:
https://lists.x.org/archives/xorg-announce/2023-October/003424.html
https://www.cve.org/CVERecord?id=CVE-2023-43788
https://www.cve.org/CVERecord?id=CVE-2023-43789
(* Security fix *)
testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz: Rebuilt.
testing/packages/glibc-2.38-x86_64-2.txz: Rebuilt.
Patched to fix the "Looney Tunables" vulnerability, a local privilege
escalation in ld.so. This vulnerability was introduced in April 2021
(glibc 2.34) by commit 2ed18c.
Thanks to Qualys Research Labs for reporting this issue.
For more information, see:
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.cve.org/CVERecord?id=CVE-2023-4911
(* Security fix *)
testing/packages/glibc-i18n-2.38-x86_64-2.txz: Rebuilt.
testing/packages/glibc-profile-2.38-x86_64-2.txz: Rebuilt.
20231003221910 | Patrick J Volkerding | 2023-10-04 | 2 | -1/+174 |
* | Fri Sep 29 19:45:18 UTC 2023...d/meson-1.2.2-x86_64-1.txz: Upgraded.
l/nodejs-20.8.0-x86_64-1.txz: Upgraded.
l/sof-firmware-2023.09-noarch-1.txz: Upgraded.
n/bluez-5.70-x86_64-1.txz: Upgraded.
n/php-8.2.11-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.php.net/ChangeLog-8.php#8.2.11
x/mesa-23.2.1-x86_64-1.txz: Upgraded.
x/xman-1.1.6-x86_64-1.txz: Upgraded.
xfce/xfce4-clipman-plugin-1.6.5-x86_64-1.txz: Upgraded.
20230929194518 | Patrick J Volkerding | 2023-09-29 | 1 | -3/+14 |
* | Thu Sep 28 21:37:06 UTC 2023...ap/mpg123-1.32.2-x86_64-1.txz: Upgraded.
l/cairo-1.18.0-x86_64-1.txz: Upgraded.
l/gtk4-4.12.3-x86_64-1.txz: Upgraded.
x/fonttosfnt-1.2.3-x86_64-1.txz: Upgraded.
xap/geeqie-2.1-x86_64-2.txz: Rebuilt.
Patched and recompiled against lua-5.4.6.
xap/mozilla-firefox-115.3.1esr-x86_64-1.txz: Upgraded.
This update contains a security fix.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.3.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
https://www.cve.org/CVERecord?id=CVE-2023-5217
(* Security fix *)
xfce/xfce4-panel-4.18.5-x86_64-1.txz: Upgraded.
testing/packages/aaa_glibc-solibs-2.38-x86_64-1.txz: Added.
testing/packages/glibc-2.38-x86_64-1.txz: Added.
Instead of building the deprecated glibc crypt library, bundle
libxcrypt-4.4.36 (both .so.1 compat version and .so.2 new API version).
testing/packages/glibc-i18n-2.38-x86_64-1.txz: Added.
testing/packages/glibc-profile-2.38-x86_64-1.txz: Added.
20230928213706 | Patrick J Volkerding | 2023-09-29 | 18 | -0/+1897 |
* | Wed Sep 20 00:08:45 UTC 2023...a/gettext-0.22.1-x86_64-1.txz: Upgraded.
a/kernel-firmware-20230918_3672cca-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.54-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.54-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.54-x86_64-1.txz: Upgraded.
a/openssl-solibs-3.1.3-x86_64-1.txz: Upgraded.
ap/ghostscript-10.02.0-x86_64-2.txz: Rebuilt.
[PATCH] PDF interpreter - fix PageList processing.
Thanks to denydias.
d/gettext-tools-0.22.1-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.54-x86-1.txz: Upgraded.
k/kernel-source-6.1.54-noarch-1.txz: Upgraded.
l/dconf-editor-45.0-x86_64-1.txz: Upgraded.
l/harfbuzz-8.2.1-x86_64-1.txz: Upgraded.
l/nodejs-20.7.0-x86_64-1.txz: Upgraded.
n/openssl-3.1.3-x86_64-1.txz: Upgraded.
This update fixes bugs and a security issue that does not affect Linux:
Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-4807
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.72.1-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230920000845 | Patrick J Volkerding | 2023-09-20 | 2 | -3/+3 |
* | Sat Sep 9 18:05:16 UTC 2023...a/mcelog-195-x86_64-1.txz: Upgraded.
d/rust-1.70.0-x86_64-2.txz: Rebuilt.
Fixed path in rust-lldb. Thanks to gildbg.
l/glib2-2.78.0-x86_64-1.txz: Upgraded.
l/gobject-introspection-1.78.0-x86_64-1.txz: Upgraded.
l/harfbuzz-8.2.0-x86_64-1.txz: Upgraded.
l/nodejs-20.6.1-x86_64-1.txz: Upgraded.
n/mutt-2.2.12-x86_64-1.txz: Upgraded.
x/font-util-1.4.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.72.0-x86_64-2.txz: Rebuilt.
Fixed path in rust-lldb. Thanks to gildbg.
20230909180516 | Patrick J Volkerding | 2023-09-09 | 1 | -1/+8 |
* | Sat Aug 26 05:08:30 UTC 2023...kde/calligra-3.2.1-x86_64-32.txz: Rebuilt.
Recompiled against okular-23.08.0.
l/freetype-2.13.2-x86_64-1.txz: Upgraded.
n/bluez-5.69-x86_64-1.txz: Upgraded.
t/fig2dev-3.2.9-x86_64-1.txz: Upgraded.
t/xfig-3.2.9-x86_64-1.txz: Upgraded.
x/libinput-1.24.0-x86_64-1.txz: Upgraded.
x/xf86-input-libinput-1.4.0-x86_64-1.txz: Upgraded.
testing/packages/rust-1.72.0-x86_64-1.txz: Upgraded.
20230826050830 | Patrick J Volkerding | 2023-08-26 | 2 | -7/+7 |
* | Fri Aug 4 20:17:36 UTC 2023...a/hwdata-0.373-noarch-1.txz: Upgraded.
a/kernel-firmware-20230731_253cc17-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.43-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.43-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.43-x86_64-1.txz: Upgraded.
a/sysklogd-2.5.1-x86_64-1.txz: Upgraded.
a/xz-5.4.4-x86_64-1.txz: Upgraded.
ap/man-pages-6.05.01-noarch-1.txz: Upgraded.
d/kernel-headers-6.1.43-x86-1.txz: Upgraded.
k/kernel-source-6.1.43-noarch-1.txz: Upgraded.
kde/ktextaddons-1.4.0-x86_64-1.txz: Upgraded.
l/SDL2-2.28.2-x86_64-1.txz: Upgraded.
l/harfbuzz-8.1.1-x86_64-1.txz: Upgraded.
l/mozjs102-102.14.0esr-x86_64-1.txz: Upgraded.
l/netpbm-11.03.01-x86_64-1.txz: Upgraded.
l/openexr-3.1.10-x86_64-1.txz: Upgraded.
l/pipewire-0.3.77-x86_64-1.txz: Upgraded.
l/poppler-23.08.0-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-115.1.0esr-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.1.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/
https://www.cve.org/CVERecord?id=CVE-2023-4045
https://www.cve.org/CVERecord?id=CVE-2023-4046
https://www.cve.org/CVERecord?id=CVE-2023-4047
https://www.cve.org/CVERecord?id=CVE-2023-4048
https://www.cve.org/CVERecord?id=CVE-2023-4049
https://www.cve.org/CVERecord?id=CVE-2023-4050
https://www.cve.org/CVERecord?id=CVE-2023-4052
https://www.cve.org/CVERecord?id=CVE-2023-4054
https://www.cve.org/CVERecord?id=CVE-2023-4055
https://www.cve.org/CVERecord?id=CVE-2023-4056
https://www.cve.org/CVERecord?id=CVE-2023-4057
(* Security fix *)
xap/mozilla-thunderbird-115.1.0-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/115.1.0/releasenotes/
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.71.1-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230804201736 | Patrick J Volkerding | 2023-08-04 | 16 | -1810/+2 |
* | Fri Jul 14 17:53:34 UTC 2023...ap/vim-9.0.1677-x86_64-1.txz: Upgraded.
n/nftables-1.0.8-x86_64-1.txz: Upgraded.
x/xeyes-1.3.0-x86_64-1.txz: Upgraded.
xap/vim-gvim-9.0.1677-x86_64-1.txz: Upgraded.
testing/packages/rust-1.71.0-x86_64-1.txz: Added.
20230714175334 | Patrick J Volkerding | 2023-07-14 | 5 | -0/+407 |
* | Wed Jul 12 20:41:16 UTC 2023...ap/inxi-3.3.28_1-noarch-1.txz: Upgraded.
ap/sudo-1.9.14p1-x86_64-1.txz: Upgraded.
d/rust-1.70.0-x86_64-1.txz: Upgraded.
l/harfbuzz-8.0.1-x86_64-1.txz: Upgraded.
l/lmdb-0.9.31-x86_64-1.txz: Upgraded.
l/pipewire-0.3.74-x86_64-1.txz: Upgraded.
n/krb5-1.21.1-x86_64-1.txz: Upgraded.
Fix potential uninitialized pointer free in kadm5 XDR parsing.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-36054
(* Security fix *)
n/libnftnl-1.2.6-x86_64-1.txz: Upgraded.
n/nghttp2-1.55.0-x86_64-1.txz: Upgraded.
n/openldap-2.6.5-x86_64-1.txz: Upgraded.
x/ibus-table-1.17.1-x86_64-1.txz: Upgraded.
x/xterm-384-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-115.0.2esr-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.0.2esr/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-26/
https://www.cve.org/CVERecord?id=CVE-2023-3600
(* Security fix *)
testing/packages/mozilla-thunderbird-115.0-x86_64-1.txz: Added.
20230712204116 | Patrick J Volkerding | 2023-07-12 | 17 | -359/+1761 |
* | Mon Jun 12 20:37:03 UTC 2023...ap/xorriso-1.5.6.pl01-x86_64-1.txz: Upgraded.
d/rust-1.69.0-x86_64-1.txz: Upgraded.
n/ntp-4.2.8p17-x86_64-2.txz: Rebuilt.
Fixed typo in ntp.conf comments.
Fixed logic in ntp.logrotate to allow proper rotation on systems where ntpd
is not automatically started at boot.
Thanks to allend.
x/xkeyboard-config-2.39-noarch-1.txz: Upgraded.
testing/packages/rust-1.70.0-x86_64-1.txz: Upgraded.
20230612203703 | Patrick J Volkerding | 2023-06-13 | 2 | -8/+7 |
* | Tue Jun 6 20:26:59 UTC 2023...a/kernel-firmware-20230531_fc90c59-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.32-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.32-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.32-x86_64-1.txz: Upgraded.
d/gcc-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-gm2-13.1.0-x86_64-2.txz: Added.
d/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-go-13.1.0-x86_64-2.txz: Rebuilt.
d/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt.
d/kernel-headers-6.1.32-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-5.txz: Rebuilt.
Recompiled to update embedded GCC version number.
k/kernel-source-6.1.32-noarch-1.txz: Upgraded.
kde/calligra-3.2.1-x86_64-30.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/cantor-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kfilemetadata-5.106.0-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kile-2.9.93-x86_64-25.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/kitinerary-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/krita-5.1.5-x86_64-10.txz: Rebuilt.
Recompiled against poppler-23.06.0.
kde/okteta-0.26.11-x86_64-1.txz: Upgraded.
kde/okular-23.04.1-x86_64-2.txz: Rebuilt.
Recompiled against poppler-23.06.0.
l/enchant-2.5.0-x86_64-1.txz: Upgraded.
l/gtk4-4.10.4-x86_64-1.txz: Upgraded.
l/mozilla-nss-3.90-x86_64-1.txz: Upgraded.
l/openexr-3.1.8-x86_64-1.txz: Upgraded.
l/poppler-23.06.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/qtkeychain-0.14.1-x86_64-1.txz: Upgraded.
n/krb5-1.21-x86_64-1.txz: Upgraded.
n/ntp-4.2.8p17-x86_64-1.txz: Upgraded.
This is a bugfix release.
n/postfix-3.8.1-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-23.1.2-x86_64-1.txz: Upgraded.
x/xorgproto-2023.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-114.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/114.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-20/
https://www.cve.org/CVERecord?id=CVE-2023-34414
https://www.cve.org/CVERecord?id=CVE-2023-34415
https://www.cve.org/CVERecord?id=CVE-2023-34416
https://www.cve.org/CVERecord?id=CVE-2023-34417
(* Security fix *)
xfce/xfce4-panel-profiles-1.0.14-x86_64-1.txz: Upgraded.
extra/sendmail/sendmail-8.17.2-x86_64-2.txz: Rebuilt.
Recompiled without -DUSE_EAI or ICU libraries as this experimental option
is still leading to regressions.
extra/sendmail/sendmail-cf-8.17.2-noarch-2.txz: Rebuilt.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230606202659 | Patrick J Volkerding | 2023-06-07 | 12 | -862/+0 |
* | Mon May 8 23:42:23 UTC 2023...a/less-633-x86_64-1.txz: Upgraded.
ap/inxi-3.3.27_1-noarch-1.txz: Upgraded.
d/rust-1.68.2-x86_64-2.txz: Upgraded.
l/mlt-7.16.0-x86_64-1.txz: Upgraded.
x/m17n-lib-1.8.1-x86_64-1.txz: Upgraded.
x/xf86-video-dummy-0.4.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.69.0-x86_64-1.txz: Upgraded.
20230508234223 | Patrick J Volkerding | 2023-05-09 | 2 | -8/+8 |
* | Fri May 5 22:49:16 UTC 2023...ap/at-3.2.5-x86_64-1.txz: Upgraded.
l/babl-0.1.106-x86_64-1.txz: Upgraded.
l/libdiscid-0.6.4-x86_64-2.txz: Rebuilt.
Patched to fix pkgconfig file. Thanks to ponce.
tcl/tclx-8.6.1-x86_64-1.txz: Upgraded.
x/libevdev-1.13.1-x86_64-1.txz: Upgraded.
x/xcalc-1.1.2-x86_64-1.txz: Upgraded.
testing/packages/gcc-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-g++-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gdc-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gfortran-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-gm2-13.1.0-x86_64-2.txz: Added.
testing/packages/gcc-gnat-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-go-13.1.0-x86_64-2.txz: Rebuilt.
testing/packages/gcc-objc-13.1.0-x86_64-2.txz: Rebuilt.
20230505224916 | Patrick J Volkerding | 2023-05-06 | 2 | -6/+60 |
* | Thu Apr 27 04:40:20 UTC 2023...a/kernel-generic-6.1.26-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.26-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.26-x86_64-1.txz: Upgraded.
ap/dc3dd-7.3.1-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.26-x86-1.txz: Upgraded.
k/kernel-source-6.1.26-noarch-1.txz: Upgraded.
l/harfbuzz-7.2.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/gcc-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-go-13.1.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-13.1.0-x86_64-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230427044020 | Patrick J Volkerding | 2023-04-27 | 11 | -0/+808 |
* | Fri Mar 31 18:01:09 UTC 2023...a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded.
a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt.
Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha.
d/cmake-3.26.2-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.22-x86-1.txz: Upgraded.
d/llvm-16.0.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
Thanks to Heinz Wiesinger for the assistance.
Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON
-DCLANG_LINK_CLANG_DYLIB=ON.
I think we'll get 16.0.1 next week if we need to make any adjustments.
d/ruby-3.2.2-x86_64-1.txz: Upgraded.
This update fixes security issues:
ReDoS vulnerability in URI.
ReDoS vulnerability in Time.
For more information, see:
https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/
https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
https://www.cve.org/CVERecord?id=CVE-2023-28755
https://www.cve.org/CVERecord?id=CVE-2023-28756
(* Security fix *)
k/kernel-source-6.1.22-noarch-1.txz: Upgraded.
kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against llvm-16.0.0.
l/openexr-3.1.7-x86_64-1.txz: Upgraded.
l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded.
Compiled against llvm-16.0.0.
l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded.
Compiled against llvm-16.0.0.
Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON.
n/pssh-2.3.5-x86_64-1.txz: Upgraded.
n/samba-4.18.1-x86_64-1.txz: Upgraded.
This update fixes security issues:
An incomplete access check on dnsHostName allows authenticated but otherwise
unprivileged users to delete this attribute from any object in the directory.
The Samba AD DC administration tool, when operating against a remote LDAP
server, will by default send new or reset passwords over a signed-only
connection.
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential
attribute disclosure via LDAP filters was insufficient and an attacker may
be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
Installations with such secrets in their Samba AD should assume they have
been obtained and need replacing.
For more information, see:
https://www.samba.org/samba/security/CVE-2023-0225.html
https://www.samba.org/samba/security/CVE-2023-0922.html
https://www.samba.org/samba/security/CVE-2023-0614.html
https://www.cve.org/CVERecord?id=CVE-2023-0225
https://www.cve.org/CVERecord?id=CVE-2023-0922
https://www.cve.org/CVERecord?id=CVE-2023-0614
(* Security fix *)
x/mesa-23.0.1-x86_64-2.txz: Rebuilt.
Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0.
xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.16
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt.
Use the bundled LLVM rather than the system LLVM.
This version of Rust actually does compile with llvm-16.0.0, but since it
bundles LLVM 15 let's let it use that for now.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230331180109 | Patrick J Volkerding | 2023-03-31 | 1 | -2/+2 |
* | Tue Mar 28 19:36:46 UTC 2023...a/grub-2.06-x86_64-5.txz: Rebuilt.
[PATCH] fs/ext2: Ignore checksum seed incompat feature.
Fixes using ext4 with the default options in e2fsprogs-1.47.0.
Thanks to USUARIONUEVO.
a/shadow-4.13-x86_64-1.txz: Upgraded.
ap/squashfs-tools-4.6.1-x86_64-1.txz: Upgraded.
l/gsettings-desktop-schemas-44.0-x86_64-1.txz: Upgraded.
l/gvfs-1.50.4-x86_64-1.txz: Upgraded.
l/libcap-2.68-x86_64-1.txz: Upgraded.
x/libva-utils-2.18.1-x86_64-1.txz: Upgraded.
xfce/xfce4-screensaver-4.18.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.68.2-x86_64-1.txz: Upgraded.
20230328193646 | Patrick J Volkerding | 2023-03-28 | 2 | -2/+2 |
* | Thu Mar 23 20:36:39 UTC 2023...a/grep-3.10-x86_64-1.txz: Upgraded.
d/cmake-3.26.1-x86_64-1.txz: Upgraded.
d/parallel-20230322-noarch-1.txz: Upgraded.
l/netpbm-11.01.03-x86_64-1.txz: Upgraded.
testing/packages/rust-1.68.1-x86_64-1.txz: Upgraded.
20230323203639 | Patrick J Volkerding | 2023-03-23 | 2 | -2/+2 |
* | Mon Mar 13 23:15:32 UTC 2023...a/kernel-firmware-20230313_c761dbe-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.19-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.19-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.19-x86_64-1.txz: Upgraded.
a/mcelog-192-x86_64-1.txz: Upgraded.
d/ccache-4.8-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.19-x86-1.txz: Upgraded.
d/rust-1.67.1-x86_64-2.txz: Rebuilt.
Moved here from /testing (not actually rebuilt).
k/kernel-source-6.1.19-noarch-1.txz: Upgraded.
l/imagemagick-7.1.1_3-x86_64-1.txz: Upgraded.
n/vsftpd-3.0.5-x86_64-3.txz: Rebuilt.
Patched to compile against openssl-3.0.8. Thanks to Stuart Winter.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.68.0-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230313231532 | Patrick J Volkerding | 2023-03-14 | 2 | -8/+8 |
* | Wed Mar 8 20:26:54 UTC 2023...Hey folks, just some more updates on the road to an eventual beta. :-)
At this point nothing remains linked with openssl-1.1.1 except for python2 and
modules, and vsftpd. I think nobody cares about trying to force python2 to use
openssl3... it's EOL but still a zombie, unfortunately. I have seen some
patches for vsftpd and intend to take a look at them. We've bumped PHP to 8.2
and just gone ahead and killed 8.0 and 8.1. Like 7.4, 8.0 is not compatible
with openssl3 and it doesn't seem worthwhile to try to patch it. And with 8.2
already out for several revisions, 8.1 does not seem particularly valuable.
If you make use of PHP you should be used to it being a moving target by now.
Enjoy, and let me know if anything isn't working right. Cheers!
a/aaa_libraries-15.1-x86_64-19.txz: Rebuilt.
Recompiled against openssl-3.0.8: libcups.so.2, libcurl.so.4.8.0,
libldap.so.2.0.200, libssh2.so.1.0.1.
a/cryptsetup-2.6.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
a/kmod-30-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
a/openssl-solibs-3.0.8-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
a/openssl11-solibs-1.1.1t-x86_64-1.txz: Added.
ap/cups-2.4.2-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/hplip-3.20.5-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/lxc-4.0.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/mariadb-10.6.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/qpdf-11.3.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
ap/sudo-1.9.13p3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/cargo-vendor-filterer-0.5.7-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/cvs-1.11.23-x86_64-9.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/git-2.39.2-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/perl-5.36.0-x86_64-5.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/python3-3.9.16-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/ruby-3.2.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/rust-1.66.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
d/scons-4.5.1-x86_64-1.txz: Upgraded.
kde/falkon-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
kde/kitinerary-22.12.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/M2Crypto-0.38.0-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/SDL2-2.26.4-x86_64-1.txz: Upgraded.
l/gst-plugins-bad-free-1.22.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libarchive-3.6.2-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libevent-2.1.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libimobiledevice-20211124_2c6121d-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libssh2-1.10.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/libvncserver-0.9.14-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/mlt-7.14.0-x86_64-1.txz: Upgraded.
l/neon-0.32.5-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/nodejs-19.7.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/opusfile-0.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pipewire-0.3.66-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pulseaudio-16.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/pycurl-7.44.1-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/qca-2.3.5-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
l/qt5-5.15.8_20230304_d8b881f0-x86_64-1.txz: Upgraded.
Compiled against openssl-3.0.8.
l/serf-1.3.9-x86_64-8.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/alpine-2.26-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/bind-9.18.12-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/curl-7.88.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/cyrus-sasl-2.1.28-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/dovecot-2.3.20-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/epic5-2.1.12-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/fetchmail-6.4.37-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/htdig-3.2.0b6-x86_64-9.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/httpd-2.4.56-x86_64-1.txz: Upgraded.
This update fixes two security issues:
HTTP Response Smuggling vulnerability via mod_proxy_uwsgi.
HTTP Request Smuggling attack via mod_rewrite and mod_proxy.
For more information, see:
https://downloads.apache.org/httpd/CHANGES_2.4.56
https://www.cve.org/CVERecord?id=CVE-2023-27522
https://www.cve.org/CVERecord?id=CVE-2023-25690
(* Security fix *)
NOTE: This package is compiled against openssl-3.0.8.
n/irssi-1.4.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/krb5-1.20.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/lftp-4.9.2-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/links-2.28-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/lynx-2.9.0dev.10-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/mutt-2.2.9-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/net-snmp-5.9.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/netatalk-3.1.14-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/nmap-7.93-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/ntp-4.2.8p15-x86_64-12.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openldap-2.6.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openssh-9.2p1-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/openssl-3.0.8-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
n/openssl11-1.1.1t-x86_64-1.txz: Added.
n/openvpn-2.6.0-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/php-8.2.3-x86_64-1.txz: Upgraded.
Compiled against openssl-3.0.8.
n/pidentd-3.0.19-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/popa3d-1.0.3-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/postfix-3.7.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/ppp-2.4.9-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/proftpd-1.3.8-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/rsync-3.2.7-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/s-nail-14.9.24-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/samba-4.18.0-x86_64-1.txz: Upgraded.
Build with the bundled Heimdal instead of the system MIT Kerberos.
Thanks again to rpenny.
n/slrn-1.0.3a-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/snownews-1.9-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/socat-1.7.4.4-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/stunnel-5.69-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/tcpdump-4.99.3-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/wget-1.21.3-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
n/wpa_supplicant-2.10-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/freerdp-2.10.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/gftp-2.9.1b-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/gkrellm-2.3.11-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/hexchat-2.16.1-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/sane-1.0.32-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/x3270-4.0ga14-x86_64-3.txz: Rebuilt.
Recompiled against openssl-3.0.8.
xap/xine-lib-1.2.13-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
y/bsd-games-2.17-x86_64-4.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/php80/php80-8.0.28-x86_64-1.txz: Removed.
extra/php81/php81-8.1.16-x86_64-1.txz: Removed.
extra/rust-for-mozilla/rust-1.60.0-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-8.17.1-x86_64-7.txz: Rebuilt.
Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-cf-8.17.1-noarch-7.txz: Rebuilt.
testing/packages/rust-1.67.1-x86_64-2.txz: Rebuilt.
Recompiled against openssl-3.0.8.
testing/packages/samba-4.17.5-x86_64-2.txz: Removed.
20230308202654 | Patrick J Volkerding | 2023-03-08 | 10 | -854/+1 |
* | Wed Feb 15 03:05:40 UTC 2023...a/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.12-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.12-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.12-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.12-x86-1.txz: Upgraded.
d/rust-1.66.1-x86_64-1.txz: Upgraded.
k/kernel-source-6.1.12-noarch-1.txz: Upgraded.
kde/bluedevil-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-grub-5.27.0-x86_64-1.txz: Upgraded.
kde/breeze-gtk-5.27.0-x86_64-1.txz: Upgraded.
kde/drkonqi-5.27.0-x86_64-1.txz: Upgraded.
kde/kactivitymanagerd-5.27.0-x86_64-1.txz: Upgraded.
kde/kde-cli-tools-5.27.0-x86_64-1.txz: Upgraded.
kde/kde-gtk-config-5.27.0-x86_64-1.txz: Upgraded.
kde/kdecoration-5.27.0-x86_64-1.txz: Upgraded.
kde/kdeplasma-addons-5.27.0-x86_64-1.txz: Upgraded.
kde/kgamma5-5.27.0-x86_64-1.txz: Upgraded.
kde/khotkeys-5.27.0-x86_64-1.txz: Upgraded.
kde/kinfocenter-5.27.0-x86_64-1.txz: Upgraded.
kde/kmenuedit-5.27.0-x86_64-1.txz: Upgraded.
kde/kpipewire-5.27.0-x86_64-1.txz: Upgraded.
kde/kscreen-5.27.0-x86_64-1.txz: Upgraded.
kde/kscreenlocker-5.27.0-x86_64-1.txz: Upgraded.
kde/ksshaskpass-5.27.0-x86_64-1.txz: Upgraded.
kde/ksystemstats-5.27.0-x86_64-1.txz: Upgraded.
kde/kwallet-pam-5.27.0-x86_64-1.txz: Upgraded.
kde/kwayland-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/kwin-5.27.0-x86_64-1.txz: Upgraded.
kde/kwrited-5.27.0-x86_64-1.txz: Upgraded.
kde/layer-shell-qt-5.27.0-x86_64-1.txz: Upgraded.
kde/libkscreen-5.27.0-x86_64-1.txz: Upgraded.
kde/libksysguard-5.27.0-x86_64-1.txz: Upgraded.
kde/milou-5.27.0-x86_64-1.txz: Upgraded.
kde/oxygen-5.27.0-x86_64-1.txz: Upgraded.
kde/oxygen-sounds-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-browser-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-desktop-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-disks-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-firewall-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-integration-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-nm-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-pa-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-sdk-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-systemmonitor-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-vault-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-workspace-5.27.0-x86_64-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.27.0-x86_64-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.27.0-x86_64-1.txz: Upgraded.
kde/powerdevil-5.27.0-x86_64-1.txz: Upgraded.
kde/qqc2-breeze-style-5.27.0-x86_64-1.txz: Upgraded.
kde/sddm-kcm-5.27.0-x86_64-1.txz: Upgraded.
kde/systemsettings-5.27.0-x86_64-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.27.0-x86_64-1.txz: Upgraded.
l/mozjs102-102.8.0esr-x86_64-1.txz: Upgraded.
n/php-7.4.33-x86_64-3.txz: Rebuilt.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
xap/mozilla-firefox-110.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/110.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-05/
https://www.cve.org/CVERecord?id=CVE-2023-25728
https://www.cve.org/CVERecord?id=CVE-2023-25730
https://www.cve.org/CVERecord?id=CVE-2023-25743
https://www.cve.org/CVERecord?id=CVE-2023-0767
https://www.cve.org/CVERecord?id=CVE-2023-25735
https://www.cve.org/CVERecord?id=CVE-2023-25737
https://www.cve.org/CVERecord?id=CVE-2023-25738
https://www.cve.org/CVERecord?id=CVE-2023-25739
https://www.cve.org/CVERecord?id=CVE-2023-25729
https://www.cve.org/CVERecord?id=CVE-2023-25732
https://www.cve.org/CVERecord?id=CVE-2023-25734
https://www.cve.org/CVERecord?id=CVE-2023-25740
https://www.cve.org/CVERecord?id=CVE-2023-25731
https://www.cve.org/CVERecord?id=CVE-2023-25733
https://www.cve.org/CVERecord?id=CVE-2023-25736
https://www.cve.org/CVERecord?id=CVE-2023-25741
https://www.cve.org/CVERecord?id=CVE-2023-25742
https://www.cve.org/CVERecord?id=CVE-2023-25744
https://www.cve.org/CVERecord?id=CVE-2023-25745
(* Security fix *)
extra/php80/php80-8.0.28-x86_64-1.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
extra/php81/php81-8.1.16-x86_64-1.txz: Upgraded.
This update fixes security issues:
Core: Password_verify() always return true with some hash.
Core: 1-byte array overrun in common path resolve code.
SAPI: DOS vulnerability when parsing multipart request body.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0567
https://www.cve.org/CVERecord?id=CVE-2023-0568
https://www.cve.org/CVERecord?id=CVE-2023-0662
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/rust-1.67.1-x86_64-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230215030540 | Patrick J Volkerding | 2023-02-15 | 2 | -7/+7 |
* | Fri Feb 3 20:04:33 UTC 2023...a/aaa_glibc-solibs-2.37-x86_64-2.txz: Rebuilt.
a/e2fsprogs-1.46.6-x86_64-1.txz: Upgraded.
a/hwdata-0.367-noarch-1.txz: Upgraded.
l/glibc-2.37-x86_64-2.txz: Rebuilt.
[PATCH] Account for grouping in printf width (bug 23432).
This issue could cause a overflow with sprintf in the corner case where an
application computes the size of buffer to be exactly enough to fit the
digits in question, but sprintf ends up writing a couple of extra bytes.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-25139
(* Security fix *)
l/glibc-i18n-2.37-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.37-x86_64-2.txz: Rebuilt.
l/libcap-2.67-x86_64-1.txz: Upgraded.
l/poppler-data-0.4.12-noarch-1.txz: Upgraded.
extra/php81/php81-8.1.15-x86_64-1.txz: Upgraded.
testing/packages/samba-4.17.5-x86_64-2.txz: Rebuilt.
Build with the bundled Heimdal instead of the system MIT Kerberos, since MIT
Kerberos has more issues when Samba is used as an AD DC. I'd appreciate any
feedback on the "Samba on Slackware 15" thread on LQ about how well this
works. Although it's not the sort of change I'd normally make in a -stable
release such as Slackware 15.0, in this case I'm considering it if it can
be done painlessly for any existing users... but I'll need to see some
reports about this. I'd like to note that yes, of course we saw the
"experimental" label in the configure flag we used to build Samba, but we
also saw another prominent Linux distribution go ahead and use it anyway. :)
And the Samba package built against MIT Kerberos cooked in the previous
-current development cycle for a couple of years without any objections.
Anyway, hopefully we'll get some testing from folks out there with networks
that use AD and go from there.
Thanks to Rowland Penny of the Samba team for clarifying this situation.
20230203200433 | Patrick J Volkerding | 2023-02-03 | 9 | -0/+853 |
* | Wed Jan 11 19:31:20 UTC 2023...d/patchelf-0.17.2-x86_64-1.txz: Upgraded.
kde/kdevelop-pg-qt-2.2.2-x86_64-1.txz: Upgraded.
n/NetworkManager-1.40.10-x86_64-1.txz: Upgraded.
xfce/xfce4-panel-4.18.1-x86_64-1.txz: Upgraded.
testing/packages/rust-1.66.1-x86_64-1.txz: Upgraded.
20230111193120 | Patrick J Volkerding | 2023-01-11 | 2 | -2/+2 |
* | Sat Jan 7 20:30:44 UTC 2023...We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact
that a kernel bisect identified the patch that was preventing 32-bit from
booting here on a Thinkpad X1E:
------
From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001
From: Michael Kelley <mikelley@microsoft.com>
Date: Wed, 16 Nov 2022 10:41:24 -0800
Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in
__ioremap_caller()
commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream.
Current code re-calculates the size after aligning the starting and
ending physical addresses on a page boundary. But the re-calculation
also embeds the masking of high order bits that exceed the size of
the physical address space (via PHYSICAL_PAGE_MASK). If the masking
removes any high order bits, the size calculation results in a huge
value that is likely to immediately fail.
Fix this by re-calculating the page-aligned size first. Then mask any
high order bits using PHYSICAL_PAGE_MASK.
Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in
PAE mode")
------
The non-SMP non-PAE 32-bit kernel is fine even without the patch revert.
The PAE kernel also works fine with this patch reverted without any need
to revert ffa71f33a820 (the patch that this one is supposed to fix). The
machine's excessive (for 32-bit) amount of physical RAM (64GB) might also
be a factor here considering the PAE kernel works on all the other machines
around here without reverting this patch.
The patch is reverted only on 32-bit. Upstream report still pending.
Enjoy! :-)
a/kernel-generic-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.4-x86_64-1.txz: Upgraded.
a/tree-2.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.4-x86-1.txz: Upgraded.
k/kernel-source-6.1.4-noarch-1.txz: Upgraded.
l/gvfs-1.50.3-x86_64-1.txz: Upgraded.
l/hunspell-1.7.2-x86_64-1.txz: Upgraded.
l/libnice-0.1.21-x86_64-1.txz: Upgraded.
n/tin-2.6.2-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20230107203044 | Patrick J Volkerding | 2023-01-07 | 24 | -65457/+0 |
* | Thu Jan 5 03:09:24 UTC 2023...a/btrfs-progs-6.1.1-x86_64-1.txz: Upgraded.
a/hwdata-0.366-noarch-1.txz: Upgraded.
a/kernel-firmware-20230104_4ee2014-noarch-1.txz: Upgraded.
ap/vim-9.0.1146-x86_64-1.txz: Upgraded.
Fixed security issues:
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0049
https://www.cve.org/CVERecord?id=CVE-2023-0051
(* Security fix *)
d/mercurial-6.3.2-x86_64-1.txz: Upgraded.
l/fluidsynth-2.3.1-x86_64-1.txz: Upgraded.
l/libxkbcommon-1.5.0-x86_64-1.txz: Upgraded.
n/fetchmail-6.4.35-x86_64-1.txz: Upgraded.
xap/vim-gvim-9.0.1146-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.3-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.3-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.3-noarch-1.txz: Upgraded.
20230105030924 | Patrick J Volkerding | 2023-01-05 | 9 | -15/+115 |
* | Sun Jan 1 03:25:48 UTC 2023...Happy New Year! :-)
a/dialog-1.3_20221229-x86_64-1.txz: Upgraded.
a/file-5.44-x86_64-1.txz: Upgraded.
n/ipset-7.17-x86_64-1.txz: Upgraded.
x/libva-2.17.0-x86_64-1.txz: Upgraded.
x/libva-utils-2.17.0-x86_64-1.txz: Upgraded.
x/mesa-22.3.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.2-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.2-noarch-1.txz: Upgraded.
20230101032548 | Patrick J Volkerding | 2023-01-01 | 6 | -6/+6 |
* | Sun Dec 25 23:21:25 UTC 2022...Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to
get some kind of kernel activity going again, but it most definitely belongs
in /testing for now. I've been trying to shape this up for weeks, but there
are still issues, and maybe someone out there can help. The biggest problem
is that the 32-bit kernels crash on boot. Initially there's some sort of
Intel ME failure (this is on a Thinkpad X1E). If those modules are
blacklisted, then the kernel will go on to crash loading the snd_hda_intel
module. The other issue is that I've got a 4K panel in this machine, and
have always appended the kernel option video=1920x1080@60 to put the console
in HD instead, and then loaded a Terminus console font to make the text even
larger. With these kernels, that option is completely ignored. I've tried some
other syntax I've seen online to no avail. And when the Terminus font is
loaded the text gets *even smaller* for some reason.
So be careful of these kernels (especially the 32-bit ones), but I welcome
any hints about what's going on here or if there are config changes that
might get this working properly. Is anyone out there running a 6.x kernel on
bare metal 32-bit x86?
Cheers!
ap/vim-9.0.1091-x86_64-1.txz: Upgraded.
d/meson-1.0.0-x86_64-1.txz: Upgraded.
d/ruby-3.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/subversion-1.14.2-x86_64-3.txz: Rebuilt.
Recompiled against ruby-3.2.0.
l/glib2-2.74.4-x86_64-1.txz: Upgraded.
l/netpbm-11.00.03-x86_64-1.txz: Upgraded.
l/rubygem-asciidoctor-2.0.18-x86_64-1.txz: Upgraded.
Compiled against ruby-3.2.0.
n/epic5-2.1.12-x86_64-2.txz: Rebuilt.
Recompiled against ruby-3.2.0.
x/marisa-0.2.6-x86_64-6.txz: Rebuilt.
Recompiled against ruby-3.2.0.
xap/vim-gvim-9.0.1091-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-headers-6.1.1-x86-1.txz: Added.
testing/packages/linux-6.1.x/kernel-huge-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-modules-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-source-6.1.1-noarch-1.txz: Added.
20221225232125 | Patrick J Volkerding | 2022-12-26 | 22 | -0/+65357 |
* | Mon Dec 19 21:18:22 UTC 2022...a/logrotate-3.21.0-x86_64-1.txz: Upgraded.
kde/gwenview-22.12.0-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
kde/kstars-3.6.2-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
l/cfitsio-4.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/gsettings-desktop-schemas-43.0-x86_64-1.txz: Upgraded.
l/gtk4-4.8.2-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.6-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
x/xorg-server-xephyr-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.7-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
testing/packages/rust-1.66.0-x86_64-1.txz: Added.
20221219211822 | Patrick J Volkerding | 2022-12-19 | 4 | -0/+360 |
* | Fri Dec 16 04:46:51 UTC 2022...d/help2man-1.49.3-x86_64-1.txz: Upgraded.
l/pipewire-0.3.63-x86_64-1.txz: Upgraded.
x/libX11-1.8.3-x86_64-1.txz: Upgraded.
x/mesa-22.3.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
https://www.cve.org/CVERecord?id=CVE-2022-46871
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46873
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46877
https://www.cve.org/CVERecord?id=CVE-2022-46878
https://www.cve.org/CVERecord?id=CVE-2022-46879
(* Security fix *)
20221216044651 | Patrick J Volkerding | 2022-12-16 | 14 | -1360/+0 |
* | Wed Dec 14 21:19:34 UTC 2022...a/bash-5.2.015-x86_64-1.txz: Upgraded.
a/tcsh-6.24.06-x86_64-1.txz: Upgraded.
ap/inxi-3.3.24_1-noarch-1.txz: Upgraded.
ap/nano-7.1-x86_64-1.txz: Upgraded.
d/git-2.39.0-x86_64-1.txz: Upgraded.
d/rust-1.65.0-x86_64-1.txz: Upgraded.
d/strace-6.1-x86_64-1.txz: Upgraded.
kde/krita-5.1.4-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_54-x86_64-1.txz: Upgraded.
l/nodejs-19.3.0-x86_64-1.txz: Upgraded.
l/pcre2-10.42-x86_64-1.txz: Upgraded.
n/iproute2-6.1.0-x86_64-1.txz: Upgraded.
x/makedepend-1.0.8-x86_64-1.txz: Upgraded.
x/xhost-1.0.9-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.5-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
x/xorg-server-xephyr-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.6-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
xap/mozilla-thunderbird-102.6.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
xap/xscreensaver-6.06-x86_64-1.txz: Upgraded.
testing/packages/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
Starting this out in /testing for now, since I've been trying for 2 days to
get it to compile on 32-bit with no luck. It ends up failing with a bunch of
errors like this:
ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync
Any help getting this to build on 32-bit would be greatly appreciated.
I've tried most of ponce's bag of tricks already. :-)
20221214211934 | Patrick J Volkerding | 2022-12-14 | 18 | -360/+1360 |
* | Mon Nov 21 20:23:13 UTC 2022...a/libpwquality-1.4.5-x86_64-1.txz: Upgraded.
a/pciutils-3.9.0-x86_64-1.txz: Upgraded.
ap/qpdf-11.2.0-x86_64-1.txz: Upgraded.
d/mercurial-6.3.1-x86_64-1.txz: Upgraded.
kde/krusader-2.8.0-x86_64-1.txz: Upgraded.
l/libpng-1.6.39-x86_64-1.txz: Upgraded.
l/mlt-7.12.0-x86_64-1.txz: Upgraded.
x/fcitx5-5.0.20-x86_64-1.txz: Upgraded.
x/fcitx5-anthy-5.0.13-x86_64-1.txz: Upgraded.
x/fcitx5-chinese-addons-5.0.16-x86_64-1.txz: Upgraded.
x/fcitx5-gtk-5.0.20-x86_64-1.txz: Upgraded.
x/fcitx5-kkc-5.0.11-x86_64-1.txz: Upgraded.
x/fcitx5-m17n-5.0.11-x86_64-1.txz: Upgraded.
x/fcitx5-qt-5.0.16-x86_64-1.txz: Upgraded.
x/fcitx5-table-extra-5.0.12-x86_64-1.txz: Upgraded.
x/fcitx5-unikey-5.0.12-x86_64-1.txz: Upgraded.
x/libXdmcp-1.1.4-x86_64-1.txz: Upgraded.
x/libXpm-3.5.14-x86_64-1.txz: Upgraded.
x/libXrandr-1.5.3-x86_64-1.txz: Upgraded.
x/libime-1.0.15-x86_64-1.txz: Upgraded.
x/libinput-1.22.0-x86_64-1.txz: Upgraded.
x/xcb-imdkit-1.0.4-x86_64-1.txz: Upgraded.
20221121202313 | Patrick J Volkerding | 2022-11-22 | 1 | -1/+1 |
* | Tue Nov 15 01:28:38 UTC 2022...a/xz-5.2.8-x86_64-1.txz: Upgraded.
d/mercurial-6.3.0-x86_64-1.txz: Upgraded.
d/rust-1.64.0-x86_64-1.txz: Upgraded.
kde/attica-5.100.0-x86_64-1.txz: Upgraded.
kde/baloo-5.100.0-x86_64-1.txz: Upgraded.
kde/bluez-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/breeze-icons-5.100.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.100.0-x86_64-1.txz: Upgraded.
kde/frameworkintegration-5.100.0-x86_64-1.txz: Upgraded.
kde/kactivities-5.100.0-x86_64-1.txz: Upgraded.
kde/kactivities-stats-5.100.0-x86_64-1.txz: Upgraded.
kde/kapidox-5.100.0-x86_64-1.txz: Upgraded.
kde/karchive-5.100.0-x86_64-1.txz: Upgraded.
kde/kauth-5.100.0-x86_64-1.txz: Upgraded.
kde/kbookmarks-5.100.0-x86_64-1.txz: Upgraded.
kde/kcalendarcore-5.100.0-x86_64-1.txz: Upgraded.
kde/kcmutils-5.100.0-x86_64-1.txz: Upgraded.
kde/kcodecs-5.100.0-x86_64-1.txz: Upgraded.
kde/kcompletion-5.100.0-x86_64-1.txz: Upgraded.
kde/kconfig-5.100.0-x86_64-1.txz: Upgraded.
kde/kconfigwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kcontacts-5.100.0-x86_64-1.txz: Upgraded.
kde/kcoreaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kcrash-5.100.0-x86_64-1.txz: Upgraded.
kde/kdav-5.100.0-x86_64-1.txz: Upgraded.
kde/kdbusaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kdeclarative-5.100.0-x86_64-1.txz: Upgraded.
kde/kded-5.100.0-x86_64-1.txz: Upgraded.
kde/kdelibs4support-5.100.0-x86_64-1.txz: Upgraded.
kde/kdesignerplugin-5.100.0-x86_64-1.txz: Upgraded.
kde/kdesu-5.100.0-x86_64-1.txz: Upgraded.
kde/kdewebkit-5.100.0-x86_64-1.txz: Upgraded.
kde/kdnssd-5.100.0-x86_64-1.txz: Upgraded.
kde/kdoctools-5.100.0-x86_64-1.txz: Upgraded.
kde/kemoticons-5.100.0-x86_64-1.txz: Upgraded.
kde/kfilemetadata-5.100.0-x86_64-1.txz: Upgraded.
kde/kglobalaccel-5.100.0-x86_64-1.txz: Upgraded.
kde/kguiaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kholidays-5.100.0-x86_64-1.txz: Upgraded.
kde/khtml-5.100.0-x86_64-1.txz: Upgraded.
kde/ki18n-5.100.0-x86_64-1.txz: Upgraded.
kde/kiconthemes-5.100.0-x86_64-1.txz: Upgraded.
kde/kidletime-5.100.0-x86_64-1.txz: Upgraded.
kde/kimageformats-5.100.0-x86_64-1.txz: Upgraded.
kde/kinit-5.100.0-x86_64-1.txz: Upgraded.
kde/kio-5.100.0-x86_64-1.txz: Upgraded.
kde/kirigami2-5.100.0-x86_64-1.txz: Upgraded.
kde/kitemmodels-5.100.0-x86_64-1.txz: Upgraded.
kde/kitemviews-5.100.0-x86_64-1.txz: Upgraded.
kde/kjobwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kjs-5.100.0-x86_64-1.txz: Upgraded.
kde/kjsembed-5.100.0-x86_64-1.txz: Upgraded.
kde/kmediaplayer-5.100.0-x86_64-1.txz: Upgraded.
kde/knewstuff-5.100.0-x86_64-1.txz: Upgraded.
kde/knotifications-5.100.0-x86_64-1.txz: Upgraded.
kde/knotifyconfig-5.100.0-x86_64-1.txz: Upgraded.
kde/kpackage-5.100.0-x86_64-1.txz: Upgraded.
kde/kparts-5.100.0-x86_64-1.txz: Upgraded.
kde/kpeople-5.100.0-x86_64-1.txz: Upgraded.
kde/kplotting-5.100.0-x86_64-1.txz: Upgraded.
kde/kpty-5.100.0-x86_64-1.txz: Upgraded.
kde/kquickcharts-5.100.0-x86_64-1.txz: Upgraded.
kde/kross-5.100.0-x86_64-1.txz: Upgraded.
kde/krunner-5.100.0-x86_64-1.txz: Upgraded.
kde/kservice-5.100.0-x86_64-1.txz: Upgraded.
kde/ktexteditor-5.100.0-x86_64-1.txz: Upgraded.
kde/ktextwidgets-5.100.0-x86_64-1.txz: Upgraded.
kde/kunitconversion-5.100.0-x86_64-1.txz: Upgraded.
kde/kwallet-5.100.0-x86_64-1.txz: Upgraded.
kde/kwayland-5.100.0-x86_64-1.txz: Upgraded.
kde/kwidgetsaddons-5.100.0-x86_64-1.txz: Upgraded.
kde/kwindowsystem-5.100.0-x86_64-1.txz: Upgraded.
kde/kxmlgui-5.100.0-x86_64-1.txz: Upgraded.
kde/kxmlrpcclient-5.100.0-x86_64-1.txz: Upgraded.
kde/modemmanager-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/networkmanager-qt-5.100.0-x86_64-1.txz: Upgraded.
kde/oxygen-icons5-5.100.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.100.0-x86_64-1.txz: Upgraded.
kde/prison-5.100.0-x86_64-1.txz: Upgraded.
kde/purpose-5.100.0-x86_64-1.txz: Upgraded.
kde/qqc2-desktop-style-5.100.0-x86_64-1.txz: Upgraded.
kde/solid-5.100.0-x86_64-1.txz: Upgraded.
kde/sonnet-5.100.0-x86_64-1.txz: Upgraded.
kde/syndication-5.100.0-x86_64-1.txz: Upgraded.
kde/syntax-highlighting-5.100.0-x86_64-1.txz: Upgraded.
kde/threadweaver-5.100.0-x86_64-1.txz: Upgraded.
l/babl-0.1.98-x86_64-1.txz: Upgraded.
l/gegl-0.4.40-x86_64-1.txz: Upgraded.
l/grantlee-5.3.1-x86_64-1.txz: Upgraded.
l/nodejs-19.1.0-x86_64-1.txz: Upgraded.
n/libqmi-1.32.2-x86_64-1.txz: Upgraded.
n/mutt-2.2.9-x86_64-1.txz: Upgraded.
n/nghttp2-1.51.0-x86_64-1.txz: Upgraded.
x/xcompmgr-1.1.9-x86_64-1.txz: Upgraded.
x/xkbevd-1.1.5-x86_64-1.txz: Upgraded.
x/xkill-1.0.6-x86_64-1.txz: Upgraded.
x/xlogo-1.0.6-x86_64-1.txz: Upgraded.
x/xlsatoms-1.1.4-x86_64-1.txz: Upgraded.
x/xlsclients-1.1.5-x86_64-1.txz: Upgraded.
testing/packages/rust-1.65.0-x86_64-1.txz: Upgraded.
20221115012838 | Patrick J Volkerding | 2022-11-15 | 3 | -37/+7 |
* | Thu Sep 22 19:50:20 UTC 2022...a/quota-4.09-x86_64-1.txz: Upgraded.
d/parallel-20220922-noarch-1.txz: Upgraded.
l/jemalloc-5.3.0-x86_64-2.txz: Rebuilt.
Fixed version numbers in jemalloc.h. Thanks to Markus Wiesner.
n/ca-certificates-20220922-noarch-1.txz: Upgraded.
This update provides the latest CA certificates to check for the
authenticity of SSL connections.
testing/packages/rust-1.64.0-x86_64-1.txz: Added.
We've found ourselves in a situation where Thunderbird requires the Rust
compiler in /extra, and Firefox requires the one in the main tree (and
can't use this one until Firefox 107 sometime in November), so we'll just
park this here until we can use it.
20220922195020 | Patrick J Volkerding | 2022-09-23 | 5 | -0/+390 |
* | Wed Aug 17 20:41:53 UTC 2022...a/aaa_glibc-solibs-2.36-x86_64-2.txz: Rebuilt.
a/kernel-generic-5.19.2-x86_64-1.txz: Upgraded.
a/kernel-huge-5.19.2-x86_64-1.txz: Upgraded.
a/kernel-modules-5.19.2-x86_64-1.txz: Upgraded.
ap/vim-9.0.0223-x86_64-1.txz: Upgraded.
Fix use after free, out-of-bounds read, and heap based buffer overflow.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
(* Security fix *)
d/kernel-headers-5.19.2-x86-1.txz: Upgraded.
k/kernel-source-5.19.2-noarch-1.txz: Upgraded.
l/glibc-2.36-x86_64-2.txz: Rebuilt.
Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since
the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on
board with this approach, but since DT_GNU_HASH remains and is still used,
I guess I'll go along with it for now. Hopefully EAC will be patched and we
can back this out.
Thanks to Swaggajackin for the notice and for providing links to the glibc
bug discussion as well as the patch.
If anything else needs a rebuild after this, let me know in the LQ thread.
l/glibc-i18n-2.36-x86_64-2.txz: Rebuilt.
l/glibc-profile-2.36-x86_64-2.txz: Rebuilt.
xap/vim-gvim-9.0.0223-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220817204153 | Patrick J Volkerding | 2022-08-18 | 22 | -64667/+0 |
* | Fri Aug 12 01:47:02 UTC 2022...a/aaa_libraries-15.1-x86_64-9.txz: Rebuilt.
Added: libboost_atomic.so.1.79.0, libboost_chrono.so.1.79.0,
libboost_container.so.1.79.0, libboost_context.so.1.79.0,
libboost_contract.so.1.79.0, libboost_coroutine.so.1.79.0,
libboost_date_time.so.1.79.0, libboost_fiber.so.1.79.0,
libboost_filesystem.so.1.79.0, libboost_graph.so.1.79.0,
libboost_iostreams.so.1.79.0, libboost_json.so.1.79.0,
libboost_locale.so.1.79.0, libboost_log.so.1.79.0,
libboost_log_setup.so.1.79.0, libboost_math_c99.so.1.79.0,
libboost_math_c99f.so.1.79.0, libboost_math_c99l.so.1.79.0,
libboost_math_tr1.so.1.79.0, libboost_math_tr1f.so.1.79.0,
libboost_math_tr1l.so.1.79.0, libboost_nowide.so.1.79.0,
libboost_prg_exec_monitor.so.1.79.0, libboost_program_options.so.1.79.0,
libboost_python27.so.1.79.0, libboost_python39.so.1.79.0,
libboost_random.so.1.79.0, libboost_regex.so.1.79.0,
libboost_serialization.so.1.79.0, libboost_stacktrace_addr2line.so.1.79.0,
libboost_stacktrace_basic.so.1.79.0, libboost_stacktrace_noop.so.1.79.0,
libboost_system.so.1.79.0, libboost_thread.so.1.79.0,
libboost_timer.so.1.79.0, libboost_type_erasure.so.1.79.0,
libboost_unit_test_framework.so.1.79.0, libboost_wave.so.1.79.0,
libboost_wserialization.so.1.79.0.
a/kernel-generic-5.18.17-x86_64-1.txz: Upgraded.
a/kernel-huge-5.18.17-x86_64-1.txz: Upgraded.
a/kernel-modules-5.18.17-x86_64-1.txz: Upgraded.
ap/pamixer-1.5-x86_64-4.txz: Rebuilt.
Recompiled against boost-1.80.0.
d/git-2.37.2-x86_64-1.txz: Upgraded.
d/kernel-headers-5.18.17-x86-1.txz: Upgraded.
d/rust-1.63.0-x86_64-1.txz: Upgraded.
k/kernel-source-5.18.17-noarch-1.txz: Upgraded.
kde/kig-22.04.3-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
kde/kopeninghours-22.04.3-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
kde/krita-5.0.8-x86_64-4.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/boost-1.80.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/cryfs-0.10.3-x86_64-6.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/openexr-3.1.5-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.80.0.
l/pango-1.50.9-x86_64-1.txz: Upgraded.
n/NetworkManager-1.38.4-x86_64-1.txz: Upgraded.
x/mesa-22.1.6-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.19.x/kernel-generic-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-headers-5.19.1-x86-1.txz: Added.
testing/packages/linux-5.19.x/kernel-huge-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-modules-5.19.1-x86_64-1.txz: Added.
testing/packages/linux-5.19.x/kernel-source-5.19.1-noarch-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220812014702 | Patrick J Volkerding | 2022-08-12 | 22 | -0/+64667 |
* | Sat Jun 11 01:56:19 UTC 2022...a/kernel-firmware-20220610_7b71b75-noarch-1.txz: Upgraded.
a/kernel-generic-5.18.3-x86_64-1.txz: Upgraded.
a/kernel-huge-5.18.3-x86_64-1.txz: Upgraded.
a/kernel-modules-5.18.3-x86_64-1.txz: Upgraded.
d/gcc-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Removed.
d/gcc-g++-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-go-12.1.0-x86_64-1.txz: Upgraded.
d/gcc-objc-12.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.18.3-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-2.txz: Rebuilt.
Recompiled to update embedded GCC version number.
k/kernel-source-5.18.3-noarch-1.txz: Upgraded.
x/libX11-1.8.1-x86_64-1.txz: Upgraded.
xap/blueman-2.2.5-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220611015619 | Patrick J Volkerding | 2022-06-11 | 33 | -64991/+0 |
* | Mon Jun 6 20:57:15 UTC 2022...a/btrfs-progs-5.18.1-x86_64-1.txz: Upgraded.
a/kernel-generic-5.17.13-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.13-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.13-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.13-x86-1.txz: Upgraded.
d/pahole-1.23-x86_64-1.txz: Added.
Thanks to xaizek and PiterPunk.
k/kernel-source-5.17.13-noarch-1.txz: Upgraded.
l/gmime-3.2.12-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_37-x86_64-1.txz: Upgraded.
l/python-setuptools_scm-6.4.2-x86_64-1.txz: Upgraded.
n/alpine-2.26-x86_64-1.txz: Upgraded.
n/mutt-2.2.6-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.18.x/kernel-generic-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-headers-5.18.2-x86-1.txz: Added.
testing/packages/linux-5.18.x/kernel-huge-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-modules-5.18.2-x86_64-1.txz: Added.
testing/packages/linux-5.18.x/kernel-source-5.18.2-noarch-1.txz: Added.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220606205715 | Patrick J Volkerding | 2022-06-07 | 22 | -0/+64187 |
* | Sat May 7 18:53:48 UTC 2022...a/kernel-firmware-20220503_d4b7551-noarch-1.txz: Upgraded.
ap/sqlite-3.38.5-x86_64-1.txz: Upgraded.
d/git-2.36.1-x86_64-1.txz: Upgraded.
n/stunnel-5.64-x86_64-1.txz: Upgraded.
testing/packages/gcc-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-go-12.1.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-12.1.0-x86_64-1.txz: Added.
20220507185348 | Patrick J Volkerding | 2022-05-08 | 11 | -0/+804 |
* | Wed Apr 27 21:43:51 UTC 2022...a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded.
a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded.
a/sysvinit-3.04-x86_64-1.txz: Upgraded.
ap/sqlite-3.38.3-x86_64-1.txz: Upgraded.
d/gcc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-go-11.3.0-x86_64-1.txz: Upgraded.
d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded.
d/kernel-headers-5.17.5-x86-1.txz: Upgraded.
d/libtool-2.4.7-x86_64-1.txz: Upgraded.
This also updates the embedded GCC version number.
k/kernel-source-5.17.5-noarch-1.txz: Upgraded.
CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0"
GCC_VERSION 110200 -> 110300
+CC_HAS_SLS y
+SLS y
kde/krita-5.0.6-x86_64-1.txz: Upgraded.
l/netpbm-10.98.02-x86_64-1.txz: Upgraded.
l/nodejs-16.15.0-x86_64-1.txz: Upgraded.
n/curl-7.83.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
OAUTH2 bearer bypass in connection re-use.
Credential leak on redirect.
Bad local IPv6 connection reuse.
Auth/cookie leak on redirect.
For more information, see:
https://curl.se/docs/CVE-2022-22576.html
https://curl.se/docs/CVE-2022-27774.html
https://curl.se/docs/CVE-2022-27775.html
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
(* Security fix *)
n/fetchmail-6.4.30-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220427214351 | Patrick J Volkerding | 2022-04-28 | 14 | -955/+0 |
* | Mon Apr 25 20:55:17 UTC 2022...a/kernel-firmware-20220425_ac21ab5-noarch-1.txz: Upgraded.
d/meson-0.62.1-x86_64-1.txz: Upgraded.
d/parallel-20220422-noarch-1.txz: Upgraded.
l/harfbuzz-4.2.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_31-x86_64-1.txz: Upgraded.
l/libseccomp-2.5.4-x86_64-1.txz: Upgraded.
l/libusb-1.0.26-x86_64-1.txz: Upgraded.
l/openal-soft-1.22.0-x86_64-1.txz: Upgraded.
n/proftpd-1.3.7d-x86_64-1.txz: Upgraded.
x/xdg-desktop-portal-1.14.3-x86_64-1.txz: Upgraded.
xap/freerdp-2.7.0-x86_64-1.txz: Upgraded.
This update is a security and maintenance release.
For more information, see:
https://github.com/FreeRDP/FreeRDP/blob/2.7.0/ChangeLog
(* Security fix *)
testing/packages/gcc-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-brig-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-g++-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gdc-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gfortran-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-gnat-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-go-11.3.0-x86_64-1.txz: Added.
testing/packages/gcc-objc-11.3.0-x86_64-1.txz: Added.
20220425205517 | Patrick J Volkerding | 2022-04-26 | 21 | -61722/+955 |
* | Wed Feb 2 08:21:48 UTC 2022...a/kernel-generic-5.15.19-x86_64-2.txz: Upgraded.
a/kernel-huge-5.15.19-x86_64-2.txz: Upgraded.
a/kernel-modules-5.15.19-x86_64-2.txz: Upgraded.
d/kernel-headers-5.15.19-x86-2.txz: Upgraded.
k/kernel-source-5.15.19-noarch-2.txz: Upgraded.
-RTC_SYSTOHC_DEVICE "rtc0"
RTC_SYSTOHC y -> n
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Rebuilt.
-RTC_SYSTOHC_DEVICE "rtc0"
RTC_SYSTOHC y -> n
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220202082148 | Patrick J Volkerding | 2022-02-02 | 6 | -12/+6 |
* | Wed Feb 2 04:17:39 UTC 2022...fortune -m "I will be finished tomorrow" fortunes2
a/kernel-generic-5.15.19-x86_64-1.txz: Upgraded.
a/kernel-huge-5.15.19-x86_64-1.txz: Upgraded.
a/kernel-modules-5.15.19-x86_64-1.txz: Upgraded.
ap/screen-4.9.0-x86_64-1.txz: Upgraded.
Patched possible denial of service via a crafted UTF-8 character sequence.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937
(* Security fix *)
d/kernel-headers-5.15.19-x86-1.txz: Upgraded.
k/kernel-source-5.15.19-noarch-1.txz: Upgraded.
RTC_INTF_DEV_UIE_EMUL y -> n
RTC_SYSTOHC n -> y
+RTC_SYSTOHC_DEVICE "rtc0"
l/lcms2-2.13-x86_64-2.txz: Rebuilt.
[PATCH] Fix for optimization error on grayscale.
Thanks to Aaron Boxer for reporting this issue.
Thanks to gmgf.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20220202041739 | Patrick J Volkerding | 2022-02-02 | 7 | -18/+24 |
* | Tue Feb 1 04:37:04 UTC 2022...The sepulchral voice intones, "The cave is now closed."
kde/falkon-3.2.0-x86_64-1.txz: Upgraded.
kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt.
[PATCH] only start programs in user's path.
[PATCH] only execute diff in path.
Thanks to gmgf.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
(* Security fix *)
l/libcanberra-0.30-x86_64-9.txz: Rebuilt.
Fix a bug crashing some applications in Wayland desktops.
Thanks to 01micko.
n/samba-4.15.5-x86_64-1.txz: Upgraded.
This is a security release in order to address the following defects:
UNIX extensions in SMB1 disclose whether the outside target of a symlink
exists.
Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
allows remote attackers to execute arbitrary code as root on affected Samba
installations that use the VFS module vfs_fruit.
Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
the ability to write to an account can exploit this to perform a
denial-of-service attack by adding an SPN that matches an existing service.
Additionally, an attacker who can intercept traffic can impersonate existing
services, resulting in a loss of confidentiality and integrity.
For more information, see:
https://www.samba.org/samba/security/CVE-2021-44141.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
https://www.samba.org/samba/security/CVE-2021-44142.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://www.samba.org/samba/security/CVE-2022-0336.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
(* Security fix *)
x/xterm-370-x86_64-7.txz: Rebuilt.
Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
Thanks to gmgf.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
(* Security fix *)
testing/source/linux-5.16.4-configs/*: Added.
Sample config files to build 5.16.4 Linux kernels.
20220201043704 | Patrick J Volkerding | 2022-02-01 | 7 | -0/+61722 |
* | Thu Oct 28 01:11:07 UTC 2021...a/kernel-generic-5.14.15-x86_64-1.txz: Upgraded.
a/kernel-huge-5.14.15-x86_64-1.txz: Upgraded.
a/kernel-modules-5.14.15-x86_64-1.txz: Upgraded.
d/cmake-3.21.4-x86_64-1.txz: Upgraded.
d/kernel-headers-5.14.15-x86-1.txz: Upgraded.
k/kernel-source-5.14.15-noarch-1.txz: Upgraded.
We're going to go ahead and take both of those changes that were considered
in /testing. GazL almost had me talked out of the autogroup change, but it's
easy to disable if traditional "nice" behavior is important to someone.
-DRM_I810 n
-INLINE_READ_UNLOCK y
-INLINE_READ_UNLOCK_IRQ y
-INLINE_SPIN_UNLOCK_IRQ y
-INLINE_WRITE_UNLOCK y
-INLINE_WRITE_UNLOCK_IRQ y
PREEMPT n -> y
PREEMPT_VOLUNTARY y -> n
SCHED_AUTOGROUP n -> y
+CEC_GPIO n
+DEBUG_PREEMPT y
+PREEMPTION y
+PREEMPT_COUNT y
+PREEMPT_DYNAMIC y
+PREEMPT_RCU y
+PREEMPT_TRACER n
+RCU_BOOST n
+TASKS_RCU y
+UNINLINE_SPIN_UNLOCK y
kde/plasma-desktop-5.23.2.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_12-x86_64-1.txz: Upgraded.
l/librsvg-2.52.3-x86_64-1.txz: Upgraded.
n/bind-9.16.22-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issue:
The "lame-ttl" option is now forcibly set to 0. This effectively disables
the lame server cache, as it could previously be abused by an attacker to
significantly degrade resolver performance.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
(* Security fix *)
n/c-ares-1.18.1-x86_64-1.txz: Upgraded.
n/samba-4.15.1-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
20211028011107 | Patrick J Volkerding | 2021-10-28 | 22 | -61885/+0 |
* | Mon Oct 25 19:30:42 UTC 2021...ap/slackpkg-15.0.8-noarch-1.txz: Upgraded.
Author: piterpunk <piterpunk@slackware.com>
To make it easier to do an unattended slackpkg update/upgrade process,
this commit provides different exit codes for many situations:
0 Successful slackpkg execution.
1 Something wrong happened.
20 No package found to be downloaded, installed, reinstalled,
upgraded, or removed.
50 Slackpkg itself was upgraded and you need to re-run it.
100 There are pending updates.
Code and the main manpage are updated accordingly.
In addition, this commit also:
- removes the ChangeLog.txt in doinst.sh, so the needed
'slackpkg update' after Slackpkg upgrade won't say it's all OK
and doesn't need to redo the package lists
- removes AUTHORS from manpage. Nowadays there is code from many
people in Slackpkg and it seems a bit unfair to have only my and
Evaldo's name listed there.
Signed-off-by: Robby Workman <rworkman@slackware.com>
d/meson-0.60.0-x86_64-1.txz: Upgraded.
l/ffmpeg-4.4.1-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_11-x86_64-1.txz: Upgraded.
l/libcap-2.60-x86_64-1.txz: Upgraded.
l/libsoup-2.74.1-x86_64-1.txz: Upgraded.
l/sip-4.19.25-x86_64-3.txz: Rebuilt.
Drop the Qt4 modules. Thanks to gmgf.
n/dhcpcd-9.4.1-x86_64-1.txz: Upgraded.
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-3.txz: Rebuilt.
Let's enable SCHED_AUTOGROUP, which should improve desktop latency under a
heavy CPU load while being mostly inert on servers. It may be disabled at
boot time with a "noautogroup" kernel parameter, or at runtime like this:
echo 0 > /proc/sys/kernel/sched_autogroup_enabled
Thanks to gbschenkel.
SCHED_AUTOGROUP n -> y
20211025193042 | Patrick J Volkerding | 2021-10-26 | 12 | -62/+7 |
* | Sat Oct 23 18:57:30 UTC 2021...a/aaa_terminfo-6.3-x86_64-1.txz: Upgraded.
a/glibc-zoneinfo-2021e-noarch-1.txz: Upgraded.
ap/itstool-2.0.7-x86_64-2.txz: Rebuilt.
Rebuilt with PYTHON=/usr/bin/python3. Thanks to USUARIONUEVO.
ap/mpg123-1.29.2-x86_64-1.txz: Upgraded.
d/meson-0.59.3-x86_64-1.txz: Upgraded.
d/parallel-20211022-noarch-1.txz: Upgraded.
d/python-pip-21.3.1-x86_64-1.txz: Upgraded.
d/python-setuptools-58.3.0-x86_64-1.txz: Upgraded.
l/exiv2-0.27.5-x86_64-1.txz: Upgraded.
l/ncurses-6.3-x86_64-1.txz: Upgraded.
n/php-7.4.25-x86_64-1.txz: Upgraded.
This update fixes bugs and a security issue:
FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
(* Security fix *)
xap/mozilla-thunderbird-91.2.1-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/91.2.1/releasenotes/
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-2.txz: Rebuilt.
These kernels enable CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y allowing
the kernel preemption model to be specified on the kernel command line
with one of these options: preempt=none, preempt=voluntary, and preempt=full.
Since there is no .config option to set a default, and the default in the
kernel sources is "full" (which is probably not a good default), the
kernel-source.SlackBuild has been modified to add support for an environment
variable CONFIG_PREEMPT_DEFAULT_MODE which can be set to none, voluntary, or
full to set the default kernel preemption model when a command line option
is not provided. These kernels have been built with a preemption model of
"none" (presumably the safest choice which will behave like the kernels we
have shipped before.) The runtime overhead on 64-bit should be negligible.
On 32-bit we lack support for HAVE_STATIC_CALL_INLINE, so spinlocks and
mutexes will have to be approached through a trampoline, adding a very small
amount of overhead. I feel this is probably worth it in order to have the
option to run a kernel with voluntary or full preemption, especially for
gaming or desktop purposes. The reduction in input lag with these modes is
actually quite noticable.
To check the current preemption model, you may use debugfs:
mount -t debugfs none /sys/kernel/debug
cat /sys/kernel/debug/sched/preempt
(none) voluntary full
You may change to a different preemption model on the fly once debugfs is
mounted:
echo voluntary > /sys/kernel/debug/sched/preempt
cat /sys/kernel/debug/sched/preempt
none (voluntary) full
Thanks to Daedra.
-DRM_I810 n
-INLINE_READ_UNLOCK y
-INLINE_READ_UNLOCK_IRQ y
-INLINE_SPIN_UNLOCK_IRQ y
-INLINE_WRITE_UNLOCK y
-INLINE_WRITE_UNLOCK_IRQ y
PREEMPT n -> y
PREEMPT_VOLUNTARY y -> n
+CEC_GPIO n
+DEBUG_PREEMPT y
+PREEMPTION y
+PREEMPT_COUNT y
+PREEMPT_DYNAMIC y
+PREEMPT_RCU y
+PREEMPT_TRACER n
+RCU_BOOST n
+TASKS_RCU y
+UNINLINE_SPIN_UNLOCK y
20211023185730 | Patrick J Volkerding | 2021-10-24 | 27 | -0/+61940 |