slackware-current/source/d/llvm/llvm.SlackBuild

327 lines
12 KiB
Text
Raw Normal View History

#!/bin/bash
# Slackware build script for llvm
# Copyright 2008-2016 Heinz Wiesinger, Amsterdam, The Netherlands
Thu Mar 7 20:40:08 UTC 2024 ap/ghostscript-10.03.0-x86_64-1.txz: Upgraded. This update addresses a security issue: A vulnerability was identified in the way Ghostscript/GhostPDL called tesseract for the OCR devices, which could allow arbitrary code execution. Thanks to J_W for the heads-up. (* Security fix *) ap/lxc-4.0.12-x86_64-3.txz: Rebuilt. lxc-slackware.in: include gnupg2 (not gnupg) for slackpkg. ap/slackpkg-15.0.10-noarch-3.txz: Rebuilt. core-functions.sh: use gpg2, not gpg. d/Cython-3.0.9-x86_64-1.txz: Upgraded. d/git-2.44.0-x86_64-2.txz: Rebuilt. Include git-subtree. Thanks to gwhl. d/llvm-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. kde/kdevelop-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0. l/openexr-3.2.3-x86_64-1.txz: Upgraded. l/python-importlib_metadata-7.0.2-x86_64-1.txz: Upgraded. l/python-trove-classifiers-2024.3.3-x86_64-1.txz: Upgraded. l/qt5-5.15.12_20240228_6609503f-x86_64-1.txz: Upgraded. Compiled against llvm-18.1.0. l/qt6-6.6.2_20240210_15b7e743-x86_64-3.txz: Rebuilt. Recompiled against llvm-18.1.0. l/spirv-llvm-translator-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/gnupg2-2.4.5-x86_64-1.txz: Upgraded. n/libassuan-2.5.7-x86_64-1.txz: Upgraded. n/postfix-3.9.0-x86_64-1.txz: Upgraded. x/mesa-24.0.2-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0 and spirv-llvm-translator-18.1.0. isolinux/initrd.img: Rebuilt. Fixed kernel version. Thanks to chrisVV. usb-and-pxe-installers/usbboot.img: Rebuilt. Fixed kernel version. Thanks to chrisVV.
2024-03-07 21:40:08 +01:00
# Copyright 2012, 2013, 2014, 2015, 2016, 2018, 2019, 2020, 2021, 2022, 2023, 2024 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=llvm
VERSION=${VERSION:-$(echo llvm-*.tar.xz | rev | cut -f 4- -d . | cut -f 1 -d - | rev)}
Thu Apr 4 20:49:23 UTC 2024 a/hwdata-0.381-noarch-1.txz: Upgraded. a/kernel-generic-6.6.25-x86_64-1.txz: Upgraded. a/kernel-huge-6.6.25-x86_64-1.txz: Upgraded. a/kernel-modules-6.6.25-x86_64-1.txz: Upgraded. d/cmake-3.29.1-x86_64-1.txz: Upgraded. d/kernel-headers-6.6.25-x86-1.txz: Upgraded. d/llvm-18.1.3-x86_64-1.txz: Upgraded. k/kernel-source-6.6.25-noarch-1.txz: Upgraded. kde/kstars-3.7.0-x86_64-1.txz: Upgraded. l/enchant-2.6.9-x86_64-1.txz: Upgraded. l/libclc-18.1.3-x86_64-1.txz: Upgraded. l/sof-firmware-2024.03-noarch-1.txz: Upgraded. n/gnutls-3.8.5-x86_64-1.txz: Upgraded. n/httpd-2.4.59-x86_64-1.txz: Upgraded. This update fixes security issues: HTTP/2 DoS by memory exhaustion on endless continuation frames. HTTP Response Splitting in multiple modules. HTTP response splitting. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.59 https://www.cve.org/CVERecord?id=CVE-2024-27316 https://www.cve.org/CVERecord?id=CVE-2024-24795 https://www.cve.org/CVERecord?id=CVE-2023-38709 (* Security fix *) n/nghttp2-1.61.0-x86_64-1.txz: Upgraded. This update fixes security issues: nghttp2 library keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it can accept after a HEADERS frame. For more information, see: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q https://www.kb.cert.org/vuls/id/421644 https://www.cve.org/CVERecord?id=CVE-2024-28182 (* Security fix *) x/xdg-desktop-portal-1.18.3-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2024-04-04 22:49:23 +02:00
BUILD=${BUILD:-1}
Tue Jul 5 20:33:18 UTC 2022 a/hwdata-0.361-noarch-1.txz: Upgraded. a/kernel-firmware-20220705_f5f02da-noarch-1.txz: Upgraded. a/kmod-30-x86_64-1.txz: Upgraded. a/mcelog-184-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1q-x86_64-1.txz: Upgraded. ap/vim-9.0.0041-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-2.txz: Rebuilt. Shared library .so-version bump. We gave the DYLIB options a try and the resulting compilers are unable to compile Firefox or Thunderbird, so we're back to using BUILD_SHARED_LIBS (which works fine). I'm in no real hurry to revisit this, but I'll look at any hints you might have for me if you post them on LQ. d/meson-0.63.0-x86_64-1.txz: Upgraded. d/rust-1.62.0-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_40-x86_64-1.txz: Upgraded. l/isl-0.25-x86_64-1.txz: Upgraded. l/libdmtx-0.7.7-x86_64-1.txz: Upgraded. l/libgphoto2-2.5.30-x86_64-1.txz: Upgraded. l/libmtp-1.1.20-x86_64-1.txz: Upgraded. l/libvpx-1.12.0-x86_64-1.txz: Upgraded. l/pipewire-0.3.53-x86_64-1.txz: Upgraded. l/poppler-22.07.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6-2. n/openssl-1.1.1q-x86_64-1.txz: Upgraded. This update fixes security issues: Heap memory corruption with RSA private key operation. AES OCB fails to encrypt some bytes. For more information, see: https://www.openssl.org/news/secadv/20220705.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097 (* Security fix *) n/wget2-2.0.1-x86_64-1.txz: Upgraded. x/libva-2.15.0-x86_64-1.txz: Upgraded. x/libva-utils-2.15.0-x86_64-1.txz: Upgraded. x/mesa-21.3.8-x86_64-3.txz: Rebuilt. Recompiled against llvm-14.0.6-2. xap/mozilla-firefox-102.0.1-x86_64-1.txz: Upgraded. This update contains security fixes (possibly) and improvements. At this time, the link below only says "We're still preparing the notes for this release, and will post them here when they are ready. Please check back later." For more information, see: https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/ (* Security fix *) xap/vim-gvim-9.0.0041-x86_64-1.txz: Upgraded. extra/rust-for-mozilla/rust-1.60.0-x86_64-1.txz: Upgraded.
2022-07-05 22:33:18 +02:00
# For the two options below, either set both to OFF or *only one* to ON:
# Build using -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON:
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
# This is the upstream recommended way to build LLVM with shared libraries and
# seems to be the way to go these days.
LLVM_BUILD_LLVM_DYLIB=${LLVM_BUILD_LLVM_DYLIB:=ON}
# Build using -DBUILD_SHARED_LIBS=ON.
# We used this for years here to get a smaller LLVM package, but it no longer
# works. Feel free to try it, but expect breakage.
BUILD_SHARED_LIBS=${BUILD_SHARED_LIBS:=OFF}
Fri Sep 21 18:51:07 UTC 2018 a/eudev-3.2.6-x86_64-1.txz: Upgraded. a/glibc-solibs-2.28-x86_64-2.txz: Upgraded. a/grub-2.02-x86_64-3.txz: Rebuilt. Patched to fix compatibility with recent xfsprogs. Thanks to Markus Wiesner. a/kernel-generic-4.14.71-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.71-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.71-x86_64-1.txz: Upgraded. ap/opus-tools-0.2-x86_64-1.txz: Upgraded. ap/sqlite-3.25.1-x86_64-1.txz: Upgraded. d/icecream-20180905_cdc6ff8-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.71-x86-1.txz: Upgraded. d/llvm-7.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.14.71-noarch-1.txz: Upgraded. l/ffmpeg-3.4.4-x86_64-2.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. l/glibc-2.28-x86_64-2.txz: Upgraded. All packages have been patched where needed for glibc-2.28 and compile tested here. Thanks to nobodino for the help. l/glibc-i18n-2.28-x86_64-2.txz: Upgraded. l/glibc-profile-2.28-x86_64-2.txz: Upgraded. l/gst-plugins-base-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.14.3-x86_64-1.txz: Upgraded. l/gstreamer-1.14.3-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_11-x86_64-1.txz: Upgraded. l/libopusenc-0.2-x86_64-1.txz: Added. l/librsvg-2.44.3-x86_64-1.txz: Upgraded. l/opus-1.3_rc2-x86_64-1.txz: Upgraded. l/opusfile-0.11-x86_64-1.txz: Upgraded. l/soprano-2.9.4-x86_64-3.txz: Rebuilt. Recompiled to drop virtuoso dependency. l/virtuoso-ose-6.1.8-x86_64-9.txz: Removed. Even KDE4 has migrated away from actually using this for anything. The last thing in Slackware that was dependent on it was Soprano, which has been recompiled to no longer use it. n/postfix-3.3.1-x86_64-2.txz: Rebuilt. Recompiled so that it quits whining about OpenSSL. Thanks to shastah. x/mesa-18.2.1-x86_64-1.txz: Upgraded. Compiled against llvm-7.0.0. x/xf86-video-vmware-13.3.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-7.0.0. x/xterm-336-x86_64-1.txz: Upgraded. extra/pure-alsa-system/ffmpeg-3.4.4-x86_64-2_alsa.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. extra/pure-alsa-system/gst-plugins-good-1.14.3-x86_64-1_alsa.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-21 20:51:07 +02:00
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) ARCH=i586 ;;
arm*) ARCH=arm ;;
*) ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PKGNAM
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
BUILDDIR=${TMP}/llvm-build-${VERSION}
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
# Ignore that which should be ignored to avoid long build times and
# massive warning spew:
IGNORE_GNU_EXTENSIONS=${IGNORE_GNU_EXTENSIONS:--Wno-unknown-warning-option -Wno-gnu-line-marker -Wno-gnu-anonymous-struct -Wno-gnu-include-next}
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
if [ "$ARCH" = "i586" ]; then
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
SLKCFLAGS="-O2 -march=i586 -mtune=i686 $IGNORE_GNU_EXTENSIONS"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "i686" ]; then
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
SLKCFLAGS="-O2 -march=i686 -mtune=i686 $IGNORE_GNU_EXTENSIONS"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
SLKCFLAGS="-O2 -fPIC $IGNORE_GNU_EXTENSIONS"
LIBDIRSUFFIX="64"
else
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
SLKCFLAGS="-O2 $IGNORE_GNU_EXTENSIONS"
LIBDIRSUFFIX=""
fi
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
# Building clangd will be determined automatically unless BUILD_CLANG is
# preset to YES or NO:
if [ -z $BUILD_CLANGD ]; then
if [ "$ARCH" = "i586" -o "$ARCH" = "i686" ]; then
BUILD_CLANGD=NO
else
BUILD_CLANGD=YES
fi
fi
if [ "$BUILD_CLANGD" = "NO" ]; then
CLANGD="-DCLANG_ENABLE_CLANGD=OFF"
fi
Wed Feb 20 23:59:17 UTC 2019 a/kernel-generic-4.19.24-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.24-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.24-x86_64-1.txz: Upgraded. a/kmod-26-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. a/util-linux-2.33.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/hplip-3.19.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/linuxdoc-tools-0.9.73-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/lxc-2.0.9_d3a03247-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/rpm-4.14.2.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/Cython-0.29.5-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/distcc-3.3.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/gdb-8.2.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/kernel-headers-4.19.24-x86-1.txz: Upgraded. d/llvm-7.0.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/meson-0.49.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python-pip-19.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python-setuptools-40.8.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python3-3.7.2-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.19.24-noarch-1.txz: Upgraded. kde/pykde4-4.14.3-x86_64-8.txz: Rebuilt. Recompiled against python3-3.7.2. l/Mako-1.0.7-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/PyQt-4.12.1-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/QScintilla-2.10.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/alsa-lib-1.1.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/dbus-python-1.2.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/gexiv2-0.10.10-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libcaca-0.99.beta19-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/libcap-ng-0.7.9-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libjpeg-turbo-2.0.2-x86_64-1.txz: Upgraded. l/libproxy-0.4.15-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/libwebp-1.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libxml2-2.9.9-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/newt-0.52.20-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycairo-1.18.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycups-1.9.74-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycurl-7.43.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pygobject-2.28.7-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/pygobject3-3.30.4-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pyparsing-2.3.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-appdirs-1.4.3-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-certifi-2018.11.29-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-chardet-3.0.4-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-docutils-0.14-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-idna-2.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-notify2-0.3.1-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-packaging-19.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-pillow-5.4.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-requests-2.21.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-sane-2.8.3-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-six-1.12.0-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-urllib3-1.24.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/sip-4.19.8-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/system-config-printer-1.5.11-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/talloc-2.1.15-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/tdb-1.3.17-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/tevent-0.9.38-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/urwid-1.0.3-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. n/gpgme-1.12.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. n/obexftp-0.24.2-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. n/openvpn-2.4.7-x86_64-1.txz: Upgraded. n/pssh-2.3.1-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. x/libfontenc-1.1.4-x86_64-1.txz: Upgraded. x/xcalc-1.0.7-x86_64-1.txz: Upgraded. x/xcb-proto-1.13-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. x/xclock-1.0.8-x86_64-1.txz: Upgraded. x/xev-1.2.3-x86_64-1.txz: Upgraded. x/xfsinfo-1.0.6-x86_64-1.txz: Upgraded. x/xhost-1.0.8-x86_64-1.txz: Upgraded. x/xlsatoms-1.1.3-x86_64-1.txz: Upgraded. x/xmodmap-1.0.10-x86_64-1.txz: Upgraded. x/xrdb-1.2.0-x86_64-1.txz: Upgraded. x/xstdcmap-1.0.4-x86_64-1.txz: Upgraded. x/xvinfo-1.1.4-x86_64-1.txz: Upgraded. xap/blueman-2.0.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. xap/hexchat-2.14.2-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. extra/pure-alsa-system/alsa-lib-1.1.8-x86_64-2_alsa.txz: Rebuilt. Recompiled against python3-3.7.2. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2019-02-21 00:59:17 +01:00
# Python3 short version:
PY3=$(python3 -c 'from distutils.sysconfig import get_python_lib; print(get_python_lib())' | cut -f 2 -d n | cut -f 1 -d /)
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
rm -rf $PKG $BUILDDIR
mkdir -p $TMP $PKG $BUILDDIR
cd $BUILDDIR
# Add a fake configure script so the cleanup script used here at Slackware
# knows to delete this stuff later. Other folks can just ignore this... it
# doesn't have any other purpose.
touch configure
chmod 755 configure
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
# Extract and rename some support files:
echo "Extracting $CWD/cmake-$VERSION.src.tar.xz..."
tar xf $CWD/cmake-$VERSION.src.tar.xz || exit 1
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
mv cmake-$VERSION.src cmake
echo "Extracting $CWD/third-party-$VERSION.src.tar.xz..."
tar xf $CWD/third-party-$VERSION.src.tar.xz || exit 1
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
mv third-party-$VERSION.src third-party
Thu Mar 7 20:40:08 UTC 2024 ap/ghostscript-10.03.0-x86_64-1.txz: Upgraded. This update addresses a security issue: A vulnerability was identified in the way Ghostscript/GhostPDL called tesseract for the OCR devices, which could allow arbitrary code execution. Thanks to J_W for the heads-up. (* Security fix *) ap/lxc-4.0.12-x86_64-3.txz: Rebuilt. lxc-slackware.in: include gnupg2 (not gnupg) for slackpkg. ap/slackpkg-15.0.10-noarch-3.txz: Rebuilt. core-functions.sh: use gpg2, not gpg. d/Cython-3.0.9-x86_64-1.txz: Upgraded. d/git-2.44.0-x86_64-2.txz: Rebuilt. Include git-subtree. Thanks to gwhl. d/llvm-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. kde/kdevelop-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0. l/openexr-3.2.3-x86_64-1.txz: Upgraded. l/python-importlib_metadata-7.0.2-x86_64-1.txz: Upgraded. l/python-trove-classifiers-2024.3.3-x86_64-1.txz: Upgraded. l/qt5-5.15.12_20240228_6609503f-x86_64-1.txz: Upgraded. Compiled against llvm-18.1.0. l/qt6-6.6.2_20240210_15b7e743-x86_64-3.txz: Rebuilt. Recompiled against llvm-18.1.0. l/spirv-llvm-translator-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/gnupg2-2.4.5-x86_64-1.txz: Upgraded. n/libassuan-2.5.7-x86_64-1.txz: Upgraded. n/postfix-3.9.0-x86_64-1.txz: Upgraded. x/mesa-24.0.2-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0 and spirv-llvm-translator-18.1.0. isolinux/initrd.img: Rebuilt. Fixed kernel version. Thanks to chrisVV. usb-and-pxe-installers/usbboot.img: Rebuilt. Fixed kernel version. Thanks to chrisVV.
2024-03-07 21:40:08 +01:00
echo "Extracting $CWD/runtimes-$VERSION.src.tar.xz..."
tar xf $CWD/runtimes-$VERSION.src.tar.xz || exit 1
mv runtimes-${VERSION}.src/cmake/Modules/* cmake/Modules || exit 1
rm -r runtimes-${VERSION}.src
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
rm -rf $PKGNAM-${VERSION}.src $PKGNAM-${VERSION}
echo "Extracting $CWD/$PKGNAM-$VERSION.src.tar.xz..."
tar xf $CWD/$PKGNAM-$VERSION.src.tar.xz || exit 1
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
cd $PKGNAM-${VERSION}.src/tools || cd $PKGNAM-${VERSION}/tools || exit 1
echo "Extracting $CWD/clang-$VERSION.src.tar.xz..."
tar xf $CWD/clang-$VERSION.src.tar.xz || exit 1
Sat Dec 21 01:04:26 UTC 2019 a/aaa_elflibs-15.0-x86_64-17.txz: Rebuilt. Upgraded: libcap.so.2.28, libelf-0.178.so, libglib-2.0.so.0.6200.4, libgmodule-2.0.so.0.6200.4, libgobject-2.0.so.0.6200.4, libgthread-2.0.so.0.6200.4, libidn2.so.0.3.7, libpcre2-8.so.0.9.0, libtdb.so.1.4.3. Added: libffi.so.6.0.4, libffi.so.7.1.0. a/file-5.38-x86_64-2.txz: Rebuilt. Patched to fix ELF shared libraries misidentified as "statically linked." a/kernel-firmware-20191220_6871bff-noarch-1.txz: Upgraded. a/openssl10-solibs-1.0.2u-x86_64-1.txz: Upgraded. (* Security fix *) d/guile-2.2.6-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. d/llvm-9.0.1-x86_64-1.txz: Upgraded. Compiled against libffi-3.3. d/python-2.7.17-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. d/python3-3.7.6-x86_64-1.txz: Upgraded. Compiled against libffi-3.3. d/ruby-2.6.5-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. l/glib2-2.62.4-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. l/libffi-3.3-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/libvpx-1.8.2-x86_64-1.txz: Upgraded. l/pygobject-2.28.7-x86_64-4.txz: Rebuilt. Recompiled against libffi-3.3. l/pygobject3-3.34.0-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. l/sip-4.19.20-x86_64-1.txz: Upgraded. n/cifs-utils-6.10-x86_64-1.txz: Upgraded. n/dhcpcd-8.1.3-x86_64-1.txz: Upgraded. n/openssl10-1.0.2u-x86_64-1.txz: Upgraded. This update fixes a low severity security issue: Fixed an an overflow bug in the x86_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. For more information, see: https://www.openssl.org/news/secadv/20191206.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551 (* Security fix *) n/p11-kit-0.23.18.1-x86_64-2.txz: Rebuilt. Recompiled against libffi-3.3. extra/tigervnc/tigervnc-1.10.1-x86_64-1.txz: Upgraded. From tigervnc.org: "This is a security release to fix a number of issues that were found by Kaspersky Lab. These issues affect both the client and server and could theoretically allow a malicious peer to take control over the software on the other side. No working exploit is known at this time, and the issues require the peer to first be authenticated. We still urge users to upgrade when possible." (* Security fix *)
2019-12-21 02:04:26 +01:00
mv clang-${VERSION} clang 2>/dev/null || mv clang-${VERSION}.src clang || exit 1
#echo "Extracting $CWD/flang-$VERSION.src.tar.xz..."
#tar xf $CWD/flang-$VERSION.src.tar.xz || exit 1
#mv flang-${VERSION} flang 2>/dev/null || mv flang-${VERSION}.src flang || exit 1
echo "Extracting $CWD/lldb-$VERSION.src.tar.xz..."
tar xf $CWD/lldb-$VERSION.src.tar.xz || exit 1
mv lldb-${VERSION} lldb 2>/dev/null || mv lldb-${VERSION}.src lldb || exit 1
echo "Extracting $CWD/lld-$VERSION.src.tar.xz..."
tar xf $CWD/lld-$VERSION.src.tar.xz || exit 1
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
mv lld-${VERSION} lld 2>/dev/null || mv lld-${VERSION}.src lld || exit 1
cd ../
cd tools/clang/tools || exit 1
echo "Extracting $CWD/clang-tools-extra-$VERSION.src.tar.xz..."
tar xf $CWD/clang-tools-extra-$VERSION.src.tar.xz || exit 1
mv clang-tools-extra-${VERSION} extra 2>/dev/null \
|| mv clang-tools-extra-${VERSION}.src extra || exit 1
cd ../../../
cd projects || exit 1
echo "Extracting $CWD/compiler-rt-$VERSION.src.tar.xz..."
tar xf $CWD/compiler-rt-$VERSION.src.tar.xz || exit 1
mv compiler-rt-${VERSION} compiler-rt 2>/dev/null || mv compiler-rt-${VERSION}.src compiler-rt || exit 1
echo "Extracting $CWD/openmp-$VERSION.src.tar.xz..."
tar xf $CWD/openmp-$VERSION.src.tar.xz || exit 1
mv openmp-${VERSION} openmp 2>/dev/null || mv openmp-${VERSION}.src openmp || exit 1
echo "Extracting $CWD/libcxx-${VERSION}.src.tar.xz..."
tar xf $CWD/libcxx-${VERSION}.src.tar.xz || exit 1
mv libcxx-${VERSION} libcxx 2>/dev/null || mv libcxx-${VERSION}.src libcxx || exit 1
echo "Extracting $CWD/libcxxabi-${VERSION}.src.tar.xz..."
tar xf $CWD/libcxxabi-${VERSION}.src.tar.xz || exit 1
mv libcxxabi-${VERSION} libcxxabi 2>/dev/null || mv libcxxabi-${VERSION}.src libcxxabi || exit 1
echo "Extracting $CWD/polly-$VERSION.src.tar.xz..."
tar xf $CWD/polly-$VERSION.src.tar.xz || exit 1
mv polly-${VERSION} polly 2>/dev/null || mv polly-${VERSION}.src polly || exit 1
Fri May 14 02:38:35 UTC 2021 ap/vim-8.2.2850-x86_64-1.txz: Upgraded. d/llvm-12.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.52.1-x86_64-1.txz: Upgraded. kde/akonadi-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-calendar-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-calendar-tools-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-contacts-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-import-wizard-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-mime-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-notes-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-search-21.04.1-x86_64-1.txz: Upgraded. kde/akonadiconsole-21.04.1-x86_64-1.txz: Upgraded. kde/akregator-21.04.1-x86_64-1.txz: Upgraded. kde/analitza-21.04.1-x86_64-1.txz: Upgraded. kde/ark-21.04.1-x86_64-1.txz: Upgraded. kde/artikulate-21.04.1-x86_64-1.txz: Upgraded. kde/audiocd-kio-21.04.1-x86_64-1.txz: Upgraded. kde/baloo-widgets-21.04.1-x86_64-1.txz: Upgraded. kde/blinken-21.04.1-x86_64-1.txz: Upgraded. kde/bomber-21.04.1-x86_64-1.txz: Upgraded. kde/bovo-21.04.1-x86_64-1.txz: Upgraded. kde/calendarsupport-21.04.1-x86_64-1.txz: Upgraded. kde/cantor-21.04.1-x86_64-1.txz: Upgraded. kde/cervisia-21.04.1-x86_64-1.txz: Upgraded. kde/dolphin-21.04.1-x86_64-1.txz: Upgraded. kde/dolphin-plugins-21.04.1-x86_64-1.txz: Upgraded. kde/dragon-21.04.1-x86_64-1.txz: Upgraded. kde/elisa-21.04.1-x86_64-1.txz: Upgraded. kde/eventviews-21.04.1-x86_64-1.txz: Upgraded. kde/ffmpegthumbs-21.04.1-x86_64-1.txz: Upgraded. kde/filelight-21.04.1-x86_64-1.txz: Upgraded. kde/granatier-21.04.1-x86_64-1.txz: Upgraded. kde/grantlee-editor-21.04.1-x86_64-1.txz: Upgraded. kde/grantleetheme-21.04.1-x86_64-1.txz: Upgraded. kde/gwenview-21.04.1-x86_64-1.txz: Upgraded. kde/incidenceeditor-21.04.1-x86_64-1.txz: Upgraded. kde/itinerary-21.04.1-x86_64-1.txz: Upgraded. kde/juk-21.04.1-x86_64-1.txz: Upgraded. kde/k3b-21.04.1-x86_64-1.txz: Upgraded. kde/kaddressbook-21.04.1-x86_64-1.txz: Upgraded. kde/kalarm-21.04.1-x86_64-1.txz: Upgraded. kde/kalarmcal-21.04.1-x86_64-1.txz: Upgraded. kde/kalgebra-21.04.1-x86_64-1.txz: Upgraded. kde/kalzium-21.04.1-x86_64-1.txz: Upgraded. kde/kamera-21.04.1-x86_64-1.txz: Upgraded. kde/kamoso-21.04.1-x86_64-1.txz: Upgraded. kde/kanagram-21.04.1-x86_64-1.txz: Upgraded. kde/kapman-21.04.1-x86_64-1.txz: Upgraded. kde/kapptemplate-21.04.1-x86_64-1.txz: Upgraded. kde/kate-21.04.1-x86_64-1.txz: Upgraded. kde/katomic-21.04.1-x86_64-1.txz: Upgraded. kde/kbackup-21.04.1-x86_64-1.txz: Upgraded. kde/kblackbox-21.04.1-x86_64-1.txz: Upgraded. kde/kblocks-21.04.1-x86_64-1.txz: Upgraded. kde/kbounce-21.04.1-x86_64-1.txz: Upgraded. kde/kbreakout-21.04.1-x86_64-1.txz: Upgraded. kde/kbruch-21.04.1-x86_64-1.txz: Upgraded. kde/kcachegrind-21.04.1-x86_64-1.txz: Upgraded. kde/kcalc-21.04.1-x86_64-1.txz: Upgraded. kde/kcalutils-21.04.1-x86_64-1.txz: Upgraded. kde/kcharselect-21.04.1-x86_64-1.txz: Upgraded. kde/kcolorchooser-21.04.1-x86_64-1.txz: Upgraded. kde/kcron-21.04.1-x86_64-1.txz: Upgraded. kde/kde-dev-scripts-21.04.1-x86_64-1.txz: Upgraded. kde/kde-dev-utils-21.04.1-x86_64-1.txz: Upgraded. kde/kdebugsettings-21.04.1-x86_64-1.txz: Upgraded. kde/kdeconnect-kde-21.04.1-x86_64-1.txz: Upgraded. kde/kdeedu-data-21.04.1-x86_64-1.txz: Upgraded. kde/kdegraphics-mobipocket-21.04.1-x86_64-1.txz: Upgraded. kde/kdegraphics-thumbnailers-21.04.1-x86_64-1.txz: Upgraded. kde/kdenetwork-filesharing-21.04.1-x86_64-1.txz: Upgraded. kde/kdenlive-21.04.1-x86_64-1.txz: Upgraded. kde/kdepim-addons-21.04.1-x86_64-1.txz: Upgraded. kde/kdepim-runtime-21.04.1-x86_64-1.txz: Upgraded. kde/kdesdk-kioslaves-21.04.1-x86_64-1.txz: Upgraded. kde/kdesdk-thumbnailers-21.04.1-x86_64-1.txz: Upgraded. kde/kdevelop-5.6.2-x86_64-4.txz: Rebuilt. Recompiled against llvm-12.0.0. kde/kdf-21.04.1-x86_64-1.txz: Upgraded. kde/kdialog-21.04.1-x86_64-1.txz: Upgraded. kde/kdiamond-21.04.1-x86_64-1.txz: Upgraded. kde/keditbookmarks-21.04.1-x86_64-1.txz: Upgraded. kde/kfind-21.04.1-x86_64-1.txz: Upgraded. kde/kfloppy-21.04.1-x86_64-1.txz: Upgraded. kde/kfourinline-21.04.1-x86_64-1.txz: Upgraded. kde/kgeography-21.04.1-x86_64-1.txz: Upgraded. kde/kget-21.04.1-x86_64-1.txz: Upgraded. kde/kgoldrunner-21.04.1-x86_64-1.txz: Upgraded. kde/kgpg-21.04.1-x86_64-1.txz: Upgraded. kde/khangman-21.04.1-x86_64-1.txz: Upgraded. kde/khelpcenter-21.04.1-x86_64-1.txz: Upgraded. kde/kidentitymanagement-21.04.1-x86_64-1.txz: Upgraded. kde/kig-21.04.1-x86_64-1.txz: Upgraded. kde/kigo-21.04.1-x86_64-1.txz: Upgraded. kde/killbots-21.04.1-x86_64-1.txz: Upgraded. kde/kimagemapeditor-21.04.1-x86_64-1.txz: Upgraded. kde/kimap-21.04.1-x86_64-1.txz: Upgraded. kde/kio-extras-21.04.1-x86_64-1.txz: Upgraded. kde/kio-gdrive-21.04.1-x86_64-1.txz: Upgraded. kde/kipi-plugins-21.04.1-x86_64-1.txz: Upgraded. kde/kirigami-gallery-21.04.1-x86_64-1.txz: Upgraded. kde/kiriki-21.04.1-x86_64-1.txz: Upgraded. kde/kiten-21.04.1-x86_64-1.txz: Upgraded. kde/kitinerary-21.04.1-x86_64-1.txz: Upgraded. kde/kjumpingcube-21.04.1-x86_64-1.txz: Upgraded. kde/kldap-21.04.1-x86_64-1.txz: Upgraded. kde/kleopatra-21.04.1-x86_64-1.txz: Upgraded. kde/klickety-21.04.1-x86_64-1.txz: Upgraded. kde/klines-21.04.1-x86_64-1.txz: Upgraded. kde/kmag-21.04.1-x86_64-1.txz: Upgraded. kde/kmahjongg-21.04.1-x86_64-1.txz: Upgraded. kde/kmail-21.04.1-x86_64-1.txz: Upgraded. kde/kmail-account-wizard-21.04.1-x86_64-1.txz: Upgraded. kde/kmailtransport-21.04.1-x86_64-1.txz: Upgraded. kde/kmbox-21.04.1-x86_64-1.txz: Upgraded. kde/kmime-21.04.1-x86_64-1.txz: Upgraded. kde/kmines-21.04.1-x86_64-1.txz: Upgraded. kde/kmix-21.04.1-x86_64-1.txz: Upgraded. kde/kmousetool-21.04.1-x86_64-1.txz: Upgraded. kde/kmouth-21.04.1-x86_64-1.txz: Upgraded. kde/kmplot-21.04.1-x86_64-1.txz: Upgraded. kde/knavalbattle-21.04.1-x86_64-1.txz: Upgraded. kde/knetwalk-21.04.1-x86_64-1.txz: Upgraded. kde/knights-21.04.1-x86_64-1.txz: Upgraded. kde/knotes-21.04.1-x86_64-1.txz: Upgraded. kde/kolf-21.04.1-x86_64-1.txz: Upgraded. kde/kollision-21.04.1-x86_64-1.txz: Upgraded. kde/kolourpaint-21.04.1-x86_64-1.txz: Upgraded. kde/kompare-21.04.1-x86_64-1.txz: Upgraded. kde/konqueror-21.04.1-x86_64-1.txz: Upgraded. kde/konquest-21.04.1-x86_64-1.txz: Upgraded. kde/konsole-21.04.1-x86_64-1.txz: Upgraded. kde/kontact-21.04.1-x86_64-1.txz: Upgraded. kde/kontactinterface-21.04.1-x86_64-1.txz: Upgraded. kde/kontrast-21.04.1-x86_64-1.txz: Upgraded. kde/konversation-21.04.1-x86_64-1.txz: Upgraded. kde/kopeninghours-21.04.1-x86_64-1.txz: Upgraded. kde/kopete-21.04.1-x86_64-1.txz: Upgraded. kde/korganizer-21.04.1-x86_64-1.txz: Upgraded. kde/kosmindoormap-21.04.1-x86_64-1.txz: Upgraded. kde/kpat-21.04.1-x86_64-1.txz: Upgraded. kde/kpimtextedit-21.04.1-x86_64-1.txz: Upgraded. kde/kpkpass-21.04.1-x86_64-1.txz: Upgraded. kde/kpmcore-21.04.1-x86_64-1.txz: Upgraded. kde/kpublictransport-21.04.1-x86_64-1.txz: Upgraded. kde/kqtquickcharts-21.04.1-x86_64-1.txz: Upgraded. kde/krdc-21.04.1-x86_64-1.txz: Upgraded. kde/kreversi-21.04.1-x86_64-1.txz: Upgraded. kde/krfb-21.04.1-x86_64-1.txz: Upgraded. kde/kross-interpreters-21.04.1-x86_64-1.txz: Upgraded. kde/kruler-21.04.1-x86_64-1.txz: Upgraded. kde/kshisen-21.04.1-x86_64-1.txz: Upgraded. kde/ksirk-21.04.1-x86_64-1.txz: Upgraded. kde/ksmtp-21.04.1-x86_64-1.txz: Upgraded. kde/ksnakeduel-21.04.1-x86_64-1.txz: Upgraded. kde/kspaceduel-21.04.1-x86_64-1.txz: Upgraded. kde/ksquares-21.04.1-x86_64-1.txz: Upgraded. kde/ksudoku-21.04.1-x86_64-1.txz: Upgraded. kde/ksystemlog-21.04.1-x86_64-1.txz: Upgraded. kde/kteatime-21.04.1-x86_64-1.txz: Upgraded. kde/ktimer-21.04.1-x86_64-1.txz: Upgraded. kde/ktnef-21.04.1-x86_64-1.txz: Upgraded. kde/ktorrent-21.04.1-x86_64-1.txz: Upgraded. kde/ktouch-21.04.1-x86_64-1.txz: Upgraded. kde/kturtle-21.04.1-x86_64-1.txz: Upgraded. kde/kubrick-21.04.1-x86_64-1.txz: Upgraded. kde/kwalletmanager-21.04.1-x86_64-1.txz: Upgraded. kde/kwave-21.04.1-x86_64-1.txz: Upgraded. kde/kwordquiz-21.04.1-x86_64-1.txz: Upgraded. kde/libgravatar-21.04.1-x86_64-1.txz: Upgraded. kde/libkcddb-21.04.1-x86_64-1.txz: Upgraded. kde/libkcompactdisc-21.04.1-x86_64-1.txz: Upgraded. kde/libkdcraw-21.04.1-x86_64-1.txz: Upgraded. kde/libkdegames-21.04.1-x86_64-1.txz: Upgraded. kde/libkdepim-21.04.1-x86_64-1.txz: Upgraded. kde/libkeduvocdocument-21.04.1-x86_64-1.txz: Upgraded. kde/libkexiv2-21.04.1-x86_64-1.txz: Upgraded. kde/libkgapi-21.04.1-x86_64-1.txz: Upgraded. kde/libkipi-21.04.1-x86_64-1.txz: Upgraded. kde/libkleo-21.04.1-x86_64-1.txz: Upgraded. kde/libkmahjongg-21.04.1-x86_64-1.txz: Upgraded. kde/libkomparediff2-21.04.1-x86_64-1.txz: Upgraded. kde/libksane-21.04.1-x86_64-1.txz: Upgraded. kde/libksieve-21.04.1-x86_64-1.txz: Upgraded. kde/libktorrent-21.04.1-x86_64-1.txz: Upgraded. kde/lokalize-21.04.1-x86_64-1.txz: Upgraded. kde/lskat-21.04.1-x86_64-1.txz: Upgraded. kde/mailcommon-21.04.1-x86_64-1.txz: Upgraded. kde/mailimporter-21.04.1-x86_64-1.txz: Upgraded. kde/marble-21.04.1-x86_64-1.txz: Upgraded. kde/markdownpart-21.04.1-x86_64-1.txz: Upgraded. kde/mbox-importer-21.04.1-x86_64-1.txz: Upgraded. kde/messagelib-21.04.1-x86_64-1.txz: Upgraded. kde/minuet-21.04.1-x86_64-1.txz: Upgraded. kde/okular-21.04.1-x86_64-1.txz: Upgraded. kde/palapeli-21.04.1-x86_64-1.txz: Upgraded. kde/parley-21.04.1-x86_64-1.txz: Upgraded. kde/partitionmanager-21.04.1-x86_64-1.txz: Upgraded. kde/picmi-21.04.1-x86_64-1.txz: Upgraded. kde/pim-data-exporter-21.04.1-x86_64-1.txz: Upgraded. kde/pim-sieve-editor-21.04.1-x86_64-1.txz: Upgraded. kde/pimcommon-21.04.1-x86_64-1.txz: Upgraded. kde/poxml-21.04.1-x86_64-1.txz: Upgraded. kde/print-manager-21.04.1-x86_64-1.txz: Upgraded. kde/rocs-21.04.1-x86_64-1.txz: Upgraded. kde/spectacle-21.04.1-x86_64-1.txz: Upgraded. kde/step-21.04.1-x86_64-1.txz: Upgraded. kde/svgpart-21.04.1-x86_64-1.txz: Upgraded. kde/sweeper-21.04.1-x86_64-1.txz: Upgraded. kde/umbrello-21.04.1-x86_64-1.txz: Upgraded. kde/yakuake-21.04.1-x86_64-1.txz: Upgraded. kde/zeroconf-ioslave-21.04.1-x86_64-1.txz: Upgraded. l/libidn2-2.3.1-x86_64-1.txz: Upgraded. l/libtasn1-4.17.0-x86_64-1.txz: Upgraded. l/qt5-5.15.2-x86_64-9.txz: Rebuilt. Recompiled against llvm-12.0.0. x/egl-wayland-1.1.7-x86_64-1.txz: Upgraded. x/mesa-21.1.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-12.0.0. xap/vim-gvim-8.2.2850-x86_64-1.txz: Upgraded.
2021-05-14 04:38:35 +02:00
# We just need a header file from this...
echo "Extracting $CWD/libunwind-${VERSION}.src.tar.xz..."
tar xf $CWD/libunwind-${VERSION}.src.tar.xz || exit 1
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
mv libunwind-${VERSION}.src libunwind || mv libunwind-${VERSION} libunwind || exit 1
cd ../
# Support GCC built for i586-slackware-linux:
zcat $CWD/clang.toolchains.i586.triple.diff.gz | patch -p1 --verbose || exit 1
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
# We require libatomic on 32-bit platforms:
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
if [ -f ./tools/lldb/source/Utility/CMakeLists.txt ]; then
if [ "$ARCH" = "i586" -o "$ARCH" = "i686" ]; then
zcat $CWD/lldb.32-bit.link.libatomic.diff.gz | patch -p1 --verbose || exit 1
fi
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
fi
# These hackish links seem to be required...
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
cd ..
ln -sf */runtimes .
cd -
cd projects
ln -sf ../../cmake .
cd -
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
Tue Jul 5 20:33:18 UTC 2022 a/hwdata-0.361-noarch-1.txz: Upgraded. a/kernel-firmware-20220705_f5f02da-noarch-1.txz: Upgraded. a/kmod-30-x86_64-1.txz: Upgraded. a/mcelog-184-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1q-x86_64-1.txz: Upgraded. ap/vim-9.0.0041-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-2.txz: Rebuilt. Shared library .so-version bump. We gave the DYLIB options a try and the resulting compilers are unable to compile Firefox or Thunderbird, so we're back to using BUILD_SHARED_LIBS (which works fine). I'm in no real hurry to revisit this, but I'll look at any hints you might have for me if you post them on LQ. d/meson-0.63.0-x86_64-1.txz: Upgraded. d/rust-1.62.0-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_40-x86_64-1.txz: Upgraded. l/isl-0.25-x86_64-1.txz: Upgraded. l/libdmtx-0.7.7-x86_64-1.txz: Upgraded. l/libgphoto2-2.5.30-x86_64-1.txz: Upgraded. l/libmtp-1.1.20-x86_64-1.txz: Upgraded. l/libvpx-1.12.0-x86_64-1.txz: Upgraded. l/pipewire-0.3.53-x86_64-1.txz: Upgraded. l/poppler-22.07.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6-2. n/openssl-1.1.1q-x86_64-1.txz: Upgraded. This update fixes security issues: Heap memory corruption with RSA private key operation. AES OCB fails to encrypt some bytes. For more information, see: https://www.openssl.org/news/secadv/20220705.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097 (* Security fix *) n/wget2-2.0.1-x86_64-1.txz: Upgraded. x/libva-2.15.0-x86_64-1.txz: Upgraded. x/libva-utils-2.15.0-x86_64-1.txz: Upgraded. x/mesa-21.3.8-x86_64-3.txz: Rebuilt. Recompiled against llvm-14.0.6-2. xap/mozilla-firefox-102.0.1-x86_64-1.txz: Upgraded. This update contains security fixes (possibly) and improvements. At this time, the link below only says "We're still preparing the notes for this release, and will post them here when they are ready. Please check back later." For more information, see: https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/ (* Security fix *) xap/vim-gvim-9.0.0041-x86_64-1.txz: Upgraded. extra/rust-for-mozilla/rust-1.60.0-x86_64-1.txz: Upgraded.
2022-07-05 22:33:18 +02:00
# Collect shared library options. If both of the configurable options are set
# to ON, the last one we check will be the one we use.
if [ "$BUILD_SHARED_LIBS" = "ON" ]; then
SHARED_LIBRARY_OPTIONS="-DBUILD_SHARED_LIBS=ON"
fi
if [ "$LLVM_BUILD_LLVM_DYLIB" = "ON" ]; then
SHARED_LIBRARY_OPTIONS="-DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON"
fi
mkdir build
cd build
Fri May 14 02:38:35 UTC 2021 ap/vim-8.2.2850-x86_64-1.txz: Upgraded. d/llvm-12.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.52.1-x86_64-1.txz: Upgraded. kde/akonadi-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-calendar-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-calendar-tools-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-contacts-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-import-wizard-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-mime-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-notes-21.04.1-x86_64-1.txz: Upgraded. kde/akonadi-search-21.04.1-x86_64-1.txz: Upgraded. kde/akonadiconsole-21.04.1-x86_64-1.txz: Upgraded. kde/akregator-21.04.1-x86_64-1.txz: Upgraded. kde/analitza-21.04.1-x86_64-1.txz: Upgraded. kde/ark-21.04.1-x86_64-1.txz: Upgraded. kde/artikulate-21.04.1-x86_64-1.txz: Upgraded. kde/audiocd-kio-21.04.1-x86_64-1.txz: Upgraded. kde/baloo-widgets-21.04.1-x86_64-1.txz: Upgraded. kde/blinken-21.04.1-x86_64-1.txz: Upgraded. kde/bomber-21.04.1-x86_64-1.txz: Upgraded. kde/bovo-21.04.1-x86_64-1.txz: Upgraded. kde/calendarsupport-21.04.1-x86_64-1.txz: Upgraded. kde/cantor-21.04.1-x86_64-1.txz: Upgraded. kde/cervisia-21.04.1-x86_64-1.txz: Upgraded. kde/dolphin-21.04.1-x86_64-1.txz: Upgraded. kde/dolphin-plugins-21.04.1-x86_64-1.txz: Upgraded. kde/dragon-21.04.1-x86_64-1.txz: Upgraded. kde/elisa-21.04.1-x86_64-1.txz: Upgraded. kde/eventviews-21.04.1-x86_64-1.txz: Upgraded. kde/ffmpegthumbs-21.04.1-x86_64-1.txz: Upgraded. kde/filelight-21.04.1-x86_64-1.txz: Upgraded. kde/granatier-21.04.1-x86_64-1.txz: Upgraded. kde/grantlee-editor-21.04.1-x86_64-1.txz: Upgraded. kde/grantleetheme-21.04.1-x86_64-1.txz: Upgraded. kde/gwenview-21.04.1-x86_64-1.txz: Upgraded. kde/incidenceeditor-21.04.1-x86_64-1.txz: Upgraded. kde/itinerary-21.04.1-x86_64-1.txz: Upgraded. kde/juk-21.04.1-x86_64-1.txz: Upgraded. kde/k3b-21.04.1-x86_64-1.txz: Upgraded. kde/kaddressbook-21.04.1-x86_64-1.txz: Upgraded. kde/kalarm-21.04.1-x86_64-1.txz: Upgraded. kde/kalarmcal-21.04.1-x86_64-1.txz: Upgraded. kde/kalgebra-21.04.1-x86_64-1.txz: Upgraded. kde/kalzium-21.04.1-x86_64-1.txz: Upgraded. kde/kamera-21.04.1-x86_64-1.txz: Upgraded. kde/kamoso-21.04.1-x86_64-1.txz: Upgraded. kde/kanagram-21.04.1-x86_64-1.txz: Upgraded. kde/kapman-21.04.1-x86_64-1.txz: Upgraded. kde/kapptemplate-21.04.1-x86_64-1.txz: Upgraded. kde/kate-21.04.1-x86_64-1.txz: Upgraded. kde/katomic-21.04.1-x86_64-1.txz: Upgraded. kde/kbackup-21.04.1-x86_64-1.txz: Upgraded. kde/kblackbox-21.04.1-x86_64-1.txz: Upgraded. kde/kblocks-21.04.1-x86_64-1.txz: Upgraded. kde/kbounce-21.04.1-x86_64-1.txz: Upgraded. kde/kbreakout-21.04.1-x86_64-1.txz: Upgraded. kde/kbruch-21.04.1-x86_64-1.txz: Upgraded. kde/kcachegrind-21.04.1-x86_64-1.txz: Upgraded. kde/kcalc-21.04.1-x86_64-1.txz: Upgraded. kde/kcalutils-21.04.1-x86_64-1.txz: Upgraded. kde/kcharselect-21.04.1-x86_64-1.txz: Upgraded. kde/kcolorchooser-21.04.1-x86_64-1.txz: Upgraded. kde/kcron-21.04.1-x86_64-1.txz: Upgraded. kde/kde-dev-scripts-21.04.1-x86_64-1.txz: Upgraded. kde/kde-dev-utils-21.04.1-x86_64-1.txz: Upgraded. kde/kdebugsettings-21.04.1-x86_64-1.txz: Upgraded. kde/kdeconnect-kde-21.04.1-x86_64-1.txz: Upgraded. kde/kdeedu-data-21.04.1-x86_64-1.txz: Upgraded. kde/kdegraphics-mobipocket-21.04.1-x86_64-1.txz: Upgraded. kde/kdegraphics-thumbnailers-21.04.1-x86_64-1.txz: Upgraded. kde/kdenetwork-filesharing-21.04.1-x86_64-1.txz: Upgraded. kde/kdenlive-21.04.1-x86_64-1.txz: Upgraded. kde/kdepim-addons-21.04.1-x86_64-1.txz: Upgraded. kde/kdepim-runtime-21.04.1-x86_64-1.txz: Upgraded. kde/kdesdk-kioslaves-21.04.1-x86_64-1.txz: Upgraded. kde/kdesdk-thumbnailers-21.04.1-x86_64-1.txz: Upgraded. kde/kdevelop-5.6.2-x86_64-4.txz: Rebuilt. Recompiled against llvm-12.0.0. kde/kdf-21.04.1-x86_64-1.txz: Upgraded. kde/kdialog-21.04.1-x86_64-1.txz: Upgraded. kde/kdiamond-21.04.1-x86_64-1.txz: Upgraded. kde/keditbookmarks-21.04.1-x86_64-1.txz: Upgraded. kde/kfind-21.04.1-x86_64-1.txz: Upgraded. kde/kfloppy-21.04.1-x86_64-1.txz: Upgraded. kde/kfourinline-21.04.1-x86_64-1.txz: Upgraded. kde/kgeography-21.04.1-x86_64-1.txz: Upgraded. kde/kget-21.04.1-x86_64-1.txz: Upgraded. kde/kgoldrunner-21.04.1-x86_64-1.txz: Upgraded. kde/kgpg-21.04.1-x86_64-1.txz: Upgraded. kde/khangman-21.04.1-x86_64-1.txz: Upgraded. kde/khelpcenter-21.04.1-x86_64-1.txz: Upgraded. kde/kidentitymanagement-21.04.1-x86_64-1.txz: Upgraded. kde/kig-21.04.1-x86_64-1.txz: Upgraded. kde/kigo-21.04.1-x86_64-1.txz: Upgraded. kde/killbots-21.04.1-x86_64-1.txz: Upgraded. kde/kimagemapeditor-21.04.1-x86_64-1.txz: Upgraded. kde/kimap-21.04.1-x86_64-1.txz: Upgraded. kde/kio-extras-21.04.1-x86_64-1.txz: Upgraded. kde/kio-gdrive-21.04.1-x86_64-1.txz: Upgraded. kde/kipi-plugins-21.04.1-x86_64-1.txz: Upgraded. kde/kirigami-gallery-21.04.1-x86_64-1.txz: Upgraded. kde/kiriki-21.04.1-x86_64-1.txz: Upgraded. kde/kiten-21.04.1-x86_64-1.txz: Upgraded. kde/kitinerary-21.04.1-x86_64-1.txz: Upgraded. kde/kjumpingcube-21.04.1-x86_64-1.txz: Upgraded. kde/kldap-21.04.1-x86_64-1.txz: Upgraded. kde/kleopatra-21.04.1-x86_64-1.txz: Upgraded. kde/klickety-21.04.1-x86_64-1.txz: Upgraded. kde/klines-21.04.1-x86_64-1.txz: Upgraded. kde/kmag-21.04.1-x86_64-1.txz: Upgraded. kde/kmahjongg-21.04.1-x86_64-1.txz: Upgraded. kde/kmail-21.04.1-x86_64-1.txz: Upgraded. kde/kmail-account-wizard-21.04.1-x86_64-1.txz: Upgraded. kde/kmailtransport-21.04.1-x86_64-1.txz: Upgraded. kde/kmbox-21.04.1-x86_64-1.txz: Upgraded. kde/kmime-21.04.1-x86_64-1.txz: Upgraded. kde/kmines-21.04.1-x86_64-1.txz: Upgraded. kde/kmix-21.04.1-x86_64-1.txz: Upgraded. kde/kmousetool-21.04.1-x86_64-1.txz: Upgraded. kde/kmouth-21.04.1-x86_64-1.txz: Upgraded. kde/kmplot-21.04.1-x86_64-1.txz: Upgraded. kde/knavalbattle-21.04.1-x86_64-1.txz: Upgraded. kde/knetwalk-21.04.1-x86_64-1.txz: Upgraded. kde/knights-21.04.1-x86_64-1.txz: Upgraded. kde/knotes-21.04.1-x86_64-1.txz: Upgraded. kde/kolf-21.04.1-x86_64-1.txz: Upgraded. kde/kollision-21.04.1-x86_64-1.txz: Upgraded. kde/kolourpaint-21.04.1-x86_64-1.txz: Upgraded. kde/kompare-21.04.1-x86_64-1.txz: Upgraded. kde/konqueror-21.04.1-x86_64-1.txz: Upgraded. kde/konquest-21.04.1-x86_64-1.txz: Upgraded. kde/konsole-21.04.1-x86_64-1.txz: Upgraded. kde/kontact-21.04.1-x86_64-1.txz: Upgraded. kde/kontactinterface-21.04.1-x86_64-1.txz: Upgraded. kde/kontrast-21.04.1-x86_64-1.txz: Upgraded. kde/konversation-21.04.1-x86_64-1.txz: Upgraded. kde/kopeninghours-21.04.1-x86_64-1.txz: Upgraded. kde/kopete-21.04.1-x86_64-1.txz: Upgraded. kde/korganizer-21.04.1-x86_64-1.txz: Upgraded. kde/kosmindoormap-21.04.1-x86_64-1.txz: Upgraded. kde/kpat-21.04.1-x86_64-1.txz: Upgraded. kde/kpimtextedit-21.04.1-x86_64-1.txz: Upgraded. kde/kpkpass-21.04.1-x86_64-1.txz: Upgraded. kde/kpmcore-21.04.1-x86_64-1.txz: Upgraded. kde/kpublictransport-21.04.1-x86_64-1.txz: Upgraded. kde/kqtquickcharts-21.04.1-x86_64-1.txz: Upgraded. kde/krdc-21.04.1-x86_64-1.txz: Upgraded. kde/kreversi-21.04.1-x86_64-1.txz: Upgraded. kde/krfb-21.04.1-x86_64-1.txz: Upgraded. kde/kross-interpreters-21.04.1-x86_64-1.txz: Upgraded. kde/kruler-21.04.1-x86_64-1.txz: Upgraded. kde/kshisen-21.04.1-x86_64-1.txz: Upgraded. kde/ksirk-21.04.1-x86_64-1.txz: Upgraded. kde/ksmtp-21.04.1-x86_64-1.txz: Upgraded. kde/ksnakeduel-21.04.1-x86_64-1.txz: Upgraded. kde/kspaceduel-21.04.1-x86_64-1.txz: Upgraded. kde/ksquares-21.04.1-x86_64-1.txz: Upgraded. kde/ksudoku-21.04.1-x86_64-1.txz: Upgraded. kde/ksystemlog-21.04.1-x86_64-1.txz: Upgraded. kde/kteatime-21.04.1-x86_64-1.txz: Upgraded. kde/ktimer-21.04.1-x86_64-1.txz: Upgraded. kde/ktnef-21.04.1-x86_64-1.txz: Upgraded. kde/ktorrent-21.04.1-x86_64-1.txz: Upgraded. kde/ktouch-21.04.1-x86_64-1.txz: Upgraded. kde/kturtle-21.04.1-x86_64-1.txz: Upgraded. kde/kubrick-21.04.1-x86_64-1.txz: Upgraded. kde/kwalletmanager-21.04.1-x86_64-1.txz: Upgraded. kde/kwave-21.04.1-x86_64-1.txz: Upgraded. kde/kwordquiz-21.04.1-x86_64-1.txz: Upgraded. kde/libgravatar-21.04.1-x86_64-1.txz: Upgraded. kde/libkcddb-21.04.1-x86_64-1.txz: Upgraded. kde/libkcompactdisc-21.04.1-x86_64-1.txz: Upgraded. kde/libkdcraw-21.04.1-x86_64-1.txz: Upgraded. kde/libkdegames-21.04.1-x86_64-1.txz: Upgraded. kde/libkdepim-21.04.1-x86_64-1.txz: Upgraded. kde/libkeduvocdocument-21.04.1-x86_64-1.txz: Upgraded. kde/libkexiv2-21.04.1-x86_64-1.txz: Upgraded. kde/libkgapi-21.04.1-x86_64-1.txz: Upgraded. kde/libkipi-21.04.1-x86_64-1.txz: Upgraded. kde/libkleo-21.04.1-x86_64-1.txz: Upgraded. kde/libkmahjongg-21.04.1-x86_64-1.txz: Upgraded. kde/libkomparediff2-21.04.1-x86_64-1.txz: Upgraded. kde/libksane-21.04.1-x86_64-1.txz: Upgraded. kde/libksieve-21.04.1-x86_64-1.txz: Upgraded. kde/libktorrent-21.04.1-x86_64-1.txz: Upgraded. kde/lokalize-21.04.1-x86_64-1.txz: Upgraded. kde/lskat-21.04.1-x86_64-1.txz: Upgraded. kde/mailcommon-21.04.1-x86_64-1.txz: Upgraded. kde/mailimporter-21.04.1-x86_64-1.txz: Upgraded. kde/marble-21.04.1-x86_64-1.txz: Upgraded. kde/markdownpart-21.04.1-x86_64-1.txz: Upgraded. kde/mbox-importer-21.04.1-x86_64-1.txz: Upgraded. kde/messagelib-21.04.1-x86_64-1.txz: Upgraded. kde/minuet-21.04.1-x86_64-1.txz: Upgraded. kde/okular-21.04.1-x86_64-1.txz: Upgraded. kde/palapeli-21.04.1-x86_64-1.txz: Upgraded. kde/parley-21.04.1-x86_64-1.txz: Upgraded. kde/partitionmanager-21.04.1-x86_64-1.txz: Upgraded. kde/picmi-21.04.1-x86_64-1.txz: Upgraded. kde/pim-data-exporter-21.04.1-x86_64-1.txz: Upgraded. kde/pim-sieve-editor-21.04.1-x86_64-1.txz: Upgraded. kde/pimcommon-21.04.1-x86_64-1.txz: Upgraded. kde/poxml-21.04.1-x86_64-1.txz: Upgraded. kde/print-manager-21.04.1-x86_64-1.txz: Upgraded. kde/rocs-21.04.1-x86_64-1.txz: Upgraded. kde/spectacle-21.04.1-x86_64-1.txz: Upgraded. kde/step-21.04.1-x86_64-1.txz: Upgraded. kde/svgpart-21.04.1-x86_64-1.txz: Upgraded. kde/sweeper-21.04.1-x86_64-1.txz: Upgraded. kde/umbrello-21.04.1-x86_64-1.txz: Upgraded. kde/yakuake-21.04.1-x86_64-1.txz: Upgraded. kde/zeroconf-ioslave-21.04.1-x86_64-1.txz: Upgraded. l/libidn2-2.3.1-x86_64-1.txz: Upgraded. l/libtasn1-4.17.0-x86_64-1.txz: Upgraded. l/qt5-5.15.2-x86_64-9.txz: Rebuilt. Recompiled against llvm-12.0.0. x/egl-wayland-1.1.7-x86_64-1.txz: Upgraded. x/mesa-21.1.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-12.0.0. xap/vim-gvim-8.2.2850-x86_64-1.txz: Upgraded.
2021-05-14 04:38:35 +02:00
mkdir include
# Copy this LLVM libunwind header or it won't be found:
cp -a ../projects/libunwind/include/mach-o include
# Nuke LLVM libunwind as it conflicts with the one already on the system:
rm -r ../projects/libunwind
cmake -GNinja \
-DCMAKE_C_COMPILER="clang" \
-DCMAKE_CXX_COMPILER="clang++" \
-DCMAKE_C_FLAGS:STRING="$SLKCFLAGS" \
-DCMAKE_CXX_FLAGS:STRING="$SLKCFLAGS" \
-DCMAKE_INSTALL_PREFIX=/usr \
-DLLVM_LIBDIR_SUFFIX=${LIBDIRSUFFIX} \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DLIBCXX_LIBDIR_SUFFIX=${LIBDIRSUFFIX} \
-DLIBCXXABI_LIBDIR_SUFFIX=${LIBDIRSUFFIX} \
-DCMAKE_BUILD_TYPE=Release \
Tue Jul 5 20:33:18 UTC 2022 a/hwdata-0.361-noarch-1.txz: Upgraded. a/kernel-firmware-20220705_f5f02da-noarch-1.txz: Upgraded. a/kmod-30-x86_64-1.txz: Upgraded. a/mcelog-184-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1q-x86_64-1.txz: Upgraded. ap/vim-9.0.0041-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-2.txz: Rebuilt. Shared library .so-version bump. We gave the DYLIB options a try and the resulting compilers are unable to compile Firefox or Thunderbird, so we're back to using BUILD_SHARED_LIBS (which works fine). I'm in no real hurry to revisit this, but I'll look at any hints you might have for me if you post them on LQ. d/meson-0.63.0-x86_64-1.txz: Upgraded. d/rust-1.62.0-x86_64-1.txz: Upgraded. l/imagemagick-7.1.0_40-x86_64-1.txz: Upgraded. l/isl-0.25-x86_64-1.txz: Upgraded. l/libdmtx-0.7.7-x86_64-1.txz: Upgraded. l/libgphoto2-2.5.30-x86_64-1.txz: Upgraded. l/libmtp-1.1.20-x86_64-1.txz: Upgraded. l/libvpx-1.12.0-x86_64-1.txz: Upgraded. l/pipewire-0.3.53-x86_64-1.txz: Upgraded. l/poppler-22.07.0-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6-2. n/openssl-1.1.1q-x86_64-1.txz: Upgraded. This update fixes security issues: Heap memory corruption with RSA private key operation. AES OCB fails to encrypt some bytes. For more information, see: https://www.openssl.org/news/secadv/20220705.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097 (* Security fix *) n/wget2-2.0.1-x86_64-1.txz: Upgraded. x/libva-2.15.0-x86_64-1.txz: Upgraded. x/libva-utils-2.15.0-x86_64-1.txz: Upgraded. x/mesa-21.3.8-x86_64-3.txz: Rebuilt. Recompiled against llvm-14.0.6-2. xap/mozilla-firefox-102.0.1-x86_64-1.txz: Upgraded. This update contains security fixes (possibly) and improvements. At this time, the link below only says "We're still preparing the notes for this release, and will post them here when they are ready. Please check back later." For more information, see: https://www.mozilla.org/en-US/firefox/102.0.1/releasenotes/ (* Security fix *) xap/vim-gvim-9.0.0041-x86_64-1.txz: Upgraded. extra/rust-for-mozilla/rust-1.60.0-x86_64-1.txz: Upgraded.
2022-07-05 22:33:18 +02:00
$SHARED_LIBRARY_OPTIONS \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DLLVM_USE_LINKER=lld \
-DLLVM_ENABLE_RTTI=ON \
-DLLVM_ENABLE_FFI=ON \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DLLVM_ENABLE_ZLIB=ON \
-DLLVM_ENABLE_ASSERTIONS=OFF \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DLLVM_ENABLE_PER_TARGET_RUNTIME_DIR=NO \
-DLLVM_INSTALL_UTILS=ON \
-DLLVM_BINUTILS_INCDIR=/usr/include \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DCLANG_RESOURCE_DIR="../lib${LIBDIRSUFFIX}/clang/$(echo $VERSION | cut -f 1 -d .)" \
-DLLVM_TARGETS_TO_BUILD="host;AMDGPU;BPF" \
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
-DLLVM_INCLUDE_BENCHMARKS=OFF \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DLIBCXX_INCLUDE_BENCHMARKS=OFF \
Tue Jun 28 19:16:08 UTC 2022 ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *)
2022-06-28 21:16:08 +02:00
-DCOMPILER_RT_BUILD_LIBFUZZER=OFF \
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
-DCLANG_DEFAULT_PIE_ON_LINUX=ON \
-DLIBCXX_ENABLE_ABI_LINKER_SCRIPT=ON \
Thu Mar 7 20:40:08 UTC 2024 ap/ghostscript-10.03.0-x86_64-1.txz: Upgraded. This update addresses a security issue: A vulnerability was identified in the way Ghostscript/GhostPDL called tesseract for the OCR devices, which could allow arbitrary code execution. Thanks to J_W for the heads-up. (* Security fix *) ap/lxc-4.0.12-x86_64-3.txz: Rebuilt. lxc-slackware.in: include gnupg2 (not gnupg) for slackpkg. ap/slackpkg-15.0.10-noarch-3.txz: Rebuilt. core-functions.sh: use gpg2, not gpg. d/Cython-3.0.9-x86_64-1.txz: Upgraded. d/git-2.44.0-x86_64-2.txz: Rebuilt. Include git-subtree. Thanks to gwhl. d/llvm-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. kde/kdevelop-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0. l/openexr-3.2.3-x86_64-1.txz: Upgraded. l/python-importlib_metadata-7.0.2-x86_64-1.txz: Upgraded. l/python-trove-classifiers-2024.3.3-x86_64-1.txz: Upgraded. l/qt5-5.15.12_20240228_6609503f-x86_64-1.txz: Upgraded. Compiled against llvm-18.1.0. l/qt6-6.6.2_20240210_15b7e743-x86_64-3.txz: Rebuilt. Recompiled against llvm-18.1.0. l/spirv-llvm-translator-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/gnupg2-2.4.5-x86_64-1.txz: Upgraded. n/libassuan-2.5.7-x86_64-1.txz: Upgraded. n/postfix-3.9.0-x86_64-1.txz: Upgraded. x/mesa-24.0.2-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0 and spirv-llvm-translator-18.1.0. isolinux/initrd.img: Rebuilt. Fixed kernel version. Thanks to chrisVV. usb-and-pxe-installers/usbboot.img: Rebuilt. Fixed kernel version. Thanks to chrisVV.
2024-03-07 21:40:08 +01:00
-DLIBCXXABI_USE_LLVM_UNWINDER=OFF \
$CLANGD \
.. || exit 1
"${NINJA:=ninja}" $NUMJOBS || exit 1
DESTDIR=$PKG "$NINJA" install || exit 1
cd ..
# Add symlinks for $ARCH-slackware-linux-{clang,clang++}:
( cd $PKG/usr/bin
ln -sf clang $ARCH-slackware-linux-clang
ln -sf clang++ $ARCH-slackware-linux-clang++
)
# Install clang-static-analyzer:
for i in ccc c++; do
ln -s /usr/libexec/$i-analyzer \
$PKG/usr/bin/$i-analyzer || exit 1
done
# Ensure lit-cpuid is installed:
if [ ! -r $PKG/usr/bin/lit-cpuid ]; then
cp -a build/bin/lit-cpuid $PKG/usr/bin/lit-cpuid
chown root:root $PKG/usr/bin/lit-cpuid
chmod 755 $PKG/usr/bin/lit-cpuid
fi
Fri Mar 31 18:01:09 UTC 2023 a/kernel-generic-6.1.22-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.22-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.22-x86_64-1.txz: Upgraded. a/mkinitrd-1.4.11-x86_64-32.txz: Rebuilt. Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha. d/cmake-3.26.2-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.22-x86-1.txz: Upgraded. d/llvm-16.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to Heinz Wiesinger for the assistance. Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON -DCLANG_LINK_CLANG_DYLIB=ON. I think we'll get 16.0.1 next week if we need to make any adjustments. d/ruby-3.2.2-x86_64-1.txz: Upgraded. This update fixes security issues: ReDoS vulnerability in URI. ReDoS vulnerability in Time. For more information, see: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/ https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/ https://www.cve.org/CVERecord?id=CVE-2023-28755 https://www.cve.org/CVERecord?id=CVE-2023-28756 (* Security fix *) k/kernel-source-6.1.22-noarch-1.txz: Upgraded. kde/kdevelop-22.12.3-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0. l/openexr-3.1.7-x86_64-1.txz: Upgraded. l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. l/spirv-llvm-translator-16.0.0-x86_64-1.txz: Upgraded. Compiled against llvm-16.0.0. Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON. n/pssh-2.3.5-x86_64-1.txz: Upgraded. n/samba-4.18.1-x86_64-1.txz: Upgraded. This update fixes security issues: An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Installations with such secrets in their Samba AD should assume they have been obtained and need replacing. For more information, see: https://www.samba.org/samba/security/CVE-2023-0225.html https://www.samba.org/samba/security/CVE-2023-0922.html https://www.samba.org/samba/security/CVE-2023-0614.html https://www.cve.org/CVERecord?id=CVE-2023-0225 https://www.cve.org/CVERecord?id=CVE-2023-0922 https://www.cve.org/CVERecord?id=CVE-2023-0614 (* Security fix *) x/mesa-23.0.1-x86_64-2.txz: Rebuilt. Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0. xap/seamonkey-2.53.16-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.16 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/rust-1.68.2-x86_64-2.txz: Rebuilt. Use the bundled LLVM rather than the system LLVM. This version of Rust actually does compile with llvm-16.0.0, but since it bundles LLVM 15 let's let it use that for now. usb-and-pxe-installers/usbboot.img: Rebuilt.
2023-03-31 20:01:09 +02:00
# Remove symlink to libgomp, which is already provided by gcc:
rm -f $PKG/usr/lib$LIBDIRSUFFIX/libgomp.so
# Install Python bindings:
Wed Mar 20 21:10:30 UTC 2024 a/libblockdev-2.28-x86_64-2.txz: Rebuilt. Drop python2 support. a/sysvinit-scripts-15.1-noarch-15.txz: Rebuilt. rc.M: start rc.iceccd and rc.icecc-scheduler earlier. a/util-linux-2.39.3-x86_64-2.txz: Rebuilt. Drop python2 support. a/volume_key-0.3.12-x86_64-6.txz: Rebuilt. Drop python2 support. ap/man-pages-6.7-noarch-1.txz: Upgraded. d/cmake-3.28.4-x86_64-1.txz: Upgraded. d/llvm-18.1.2-x86_64-1.txz: Upgraded. d/python2-2.7.18-x86_64-7.txz: Rebuilt. Bundle the final python2 versions of pip and setuptools. Drop the /usr/bin/python symlink. d/python3-3.9.19-x86_64-1.txz: Upgraded. Point the /usr/bin/python symlink at python3.9. PEP 394 says we can do this, and in a world of ambigious shebangs, this is probably the best of the available options. This update also fixes security issues: bundled libexpat was updated to 2.6.0. zipfile is now protected from the "quoted-overlap" zipbomb. tempfile.TemporaryDirectory cleanup no longer dereferences symlinks when working around file system permission errors. For more information, see: https://pythoninsider.blogspot.com/2024/03/python-31014-3919-and-3819-is-now.html https://www.cve.org/CVERecord?id=CVE-2023-52425 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://www.cve.org/CVERecord?id=CVE-2023-6597 (* Security fix *) d/strace-6.8-x86_64-1.txz: Upgraded. kde/kross-interpreters-23.08.5-x86_64-2.txz: Rebuilt. Drop python2 support. l/libxml2-2.12.6-x86_64-2.txz: Rebuilt. Drop python2 support. l/mozjs115-115.9.0esr-x86_64-2.txz: Rebuilt. Fixed installed library name. Thanks to reddog83. Fixed slack-desc. Thanks to r1w1s1. l/phonon-4.12.0-x86_64-1.txz: Upgraded. l/pilot-link-0.12.5-x86_64-17.txz: Rebuilt. Drop python2 support. l/python2-module-collection-2.7.18-x86_64-6.txz: Removed. Good bye! l/python2-pycairo-1.18.2-x86_64-1.txz: Added. We'll need this (along with pygtk and pygobject) until we get gimp3. Well, we could build gimp without python support, but I really don't think that's the route we want to take. n/bind-9.18.25-x86_64-1.txz: Upgraded. n/crda-4.15-x86_64-1.txz: Removed. The kernel is able to load from wireless-regdb directly. Obsolete. n/getmail-6.18.14-x86_64-1.txz: Upgraded. n/gpgme-1.23.2-x86_64-2.txz: Rebuilt. Drop python2 support. n/obexftp-0.24.2-x86_64-11.txz: Rebuilt. Drop python2 support. n/wireless-regdb-2024.01.23-x86_64-1.txz: Added. Wireless regulatory database, previously bundled with crda. x/ibus-1.5.29-x86_64-2.txz: Rebuilt. Drop python2 support. x/libkkc-0.3.5-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/libkkc-data-0.2.7-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/xcb-proto-1.16.0-x86_64-2.txz: Rebuilt. Drop python2 support. x/xpyb-1.3.1-x86_64-7.txz: Removed. Nothing uses it, and it was never updated for python3. Removed as obsolete.
2024-03-20 22:10:30 +01:00
for pyver in ${PY3}; do
Thu Sep 6 06:15:46 UTC 2018 a/acpid-2.0.30-x86_64-1.txz: Upgraded. a/etc-15.0-x86_64-9.txz: Rebuilt. Added support for /etc/ld.so.conf.d/. Thanks to Qury. a/kernel-firmware-20180904_85c5d90-noarch-1.txz: Upgraded. a/kernel-generic-4.14.68-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.68-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.68-x86_64-1.txz: Upgraded. a/pkgtools-15.0-noarch-22.txz: Rebuilt. installpkg: prevent noise from the "stray cat" if tar hands it a broken pipe. Thanks to ivandi. Also (in the comments) provide a possibly better but untested solution. Thanks to SeB. a/sysvinit-2.90-x86_64-2.txz: Rebuilt. sysvinit-2.90 added an undocumented feature that tries to spawn agetty if it sees console= in the kernel command line. Avoiding the debate about whether this code belongs in init at all, at least such a change should be documented, and probably made opt-in. This patch disables the new behavior unless "sysvinit_agetty" is also seen in the kernel command line. It seems like this might have been something added for Hurd, and it might be wise to stick to what we've got rather than following upstream on this particular package. If anyone notices any other odd behavior, please let me know. Thanks to shastah. a/sysvinit-scripts-2.1-noarch-19.txz: Rebuilt. When checking for intel_pstate, direct the stderr to /dev/null in case the file doesn't exist in /sys. Thanks to ivandi. Allow forcing an option by editing /etc/default/cpufreq. ap/cups-filters-1.21.2-x86_64-1.txz: Upgraded. ap/ghostscript-9.24-x86_64-1.txz: Upgraded. Patched multiple -dSAFER sandbox bypass vulnerabilities. Thanks to Tavis Ormandy. For more information, see: https://www.ghostscript.com/doc/9.24/News.htm https://www.kb.cert.org/vuls/id/332928 (* Security fix *) ap/sudo-1.8.25-x86_64-1.txz: Upgraded. d/binutils-2.31.1-x86_64-2.txz: Rebuilt. elf.c (_bfd_elf_get_symbol_version_string): Return _("<corrupt>") for corrupt symbol version info. elflink.c (bfd_elf_record_link_assignment): Always clear h->verinfo.verdef when overriding a dynamic definition. Thanks to Michael Short for pointing out the upstream patches. d/ccache-3.4.3-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.68-x86-1.txz: Upgraded. d/llvm-6.0.1-x86_64-2.txz: Rebuilt. Recompiled with -DCLANG_BUILD_SHARED_LIBS=ON to fix issues when multiple OpenCL drivers are installed. Thanks to Heinz Wiesinger. d/mercurial-4.7.1-x86_64-1.txz: Upgraded. k/kernel-source-4.14.68-noarch-1.txz: Upgraded. l/mozilla-nss-3.39-x86_64-1.txz: Upgraded. n/curl-7.61.1-x86_64-1.txz: Upgraded. This update fixes an NTLM password overflow via integer overflow. For more information, see: https://curl.haxx.se/docs/CVE-2018-14618.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618 (* Security fix *) n/gnupg2-2.2.10-x86_64-1.txz: Upgraded. n/libtirpc-1.1.4-x86_64-1.txz: Upgraded. n/netatalk-3.1.11-x86_64-2.txz: Rebuilt. rc.atalk: fixed errors in status output. Thanks to marav. n/nghttp2-1.33.0-x86_64-1.txz: Upgraded. n/p11-kit-0.23.14-x86_64-1.txz: Upgraded. n/stunnel-5.49-x86_64-1.txz: Upgraded. x/libdrm-2.4.94-x86_64-1.txz: Upgraded. x/xf86-video-ati-20180824_de88ea27-x86_64-1.txz: Upgraded. xap/hexchat-2.14.2-x86_64-1.txz: Upgraded. xap/mozilla-firefox-60.2.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html (* Security fix *) xap/xlockmore-5.56-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-06 08:15:46 +02:00
mkdir -p "$PKG/usr/lib$LIBDIRSUFFIX/python$pyver/site-packages"
cp -a tools/clang/bindings/python/clang "$PKG/usr/lib$LIBDIRSUFFIX/python$pyver/site-packages/"
done
# Remove bundled python-six:
Wed Mar 20 21:10:30 UTC 2024 a/libblockdev-2.28-x86_64-2.txz: Rebuilt. Drop python2 support. a/sysvinit-scripts-15.1-noarch-15.txz: Rebuilt. rc.M: start rc.iceccd and rc.icecc-scheduler earlier. a/util-linux-2.39.3-x86_64-2.txz: Rebuilt. Drop python2 support. a/volume_key-0.3.12-x86_64-6.txz: Rebuilt. Drop python2 support. ap/man-pages-6.7-noarch-1.txz: Upgraded. d/cmake-3.28.4-x86_64-1.txz: Upgraded. d/llvm-18.1.2-x86_64-1.txz: Upgraded. d/python2-2.7.18-x86_64-7.txz: Rebuilt. Bundle the final python2 versions of pip and setuptools. Drop the /usr/bin/python symlink. d/python3-3.9.19-x86_64-1.txz: Upgraded. Point the /usr/bin/python symlink at python3.9. PEP 394 says we can do this, and in a world of ambigious shebangs, this is probably the best of the available options. This update also fixes security issues: bundled libexpat was updated to 2.6.0. zipfile is now protected from the "quoted-overlap" zipbomb. tempfile.TemporaryDirectory cleanup no longer dereferences symlinks when working around file system permission errors. For more information, see: https://pythoninsider.blogspot.com/2024/03/python-31014-3919-and-3819-is-now.html https://www.cve.org/CVERecord?id=CVE-2023-52425 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://www.cve.org/CVERecord?id=CVE-2023-6597 (* Security fix *) d/strace-6.8-x86_64-1.txz: Upgraded. kde/kross-interpreters-23.08.5-x86_64-2.txz: Rebuilt. Drop python2 support. l/libxml2-2.12.6-x86_64-2.txz: Rebuilt. Drop python2 support. l/mozjs115-115.9.0esr-x86_64-2.txz: Rebuilt. Fixed installed library name. Thanks to reddog83. Fixed slack-desc. Thanks to r1w1s1. l/phonon-4.12.0-x86_64-1.txz: Upgraded. l/pilot-link-0.12.5-x86_64-17.txz: Rebuilt. Drop python2 support. l/python2-module-collection-2.7.18-x86_64-6.txz: Removed. Good bye! l/python2-pycairo-1.18.2-x86_64-1.txz: Added. We'll need this (along with pygtk and pygobject) until we get gimp3. Well, we could build gimp without python support, but I really don't think that's the route we want to take. n/bind-9.18.25-x86_64-1.txz: Upgraded. n/crda-4.15-x86_64-1.txz: Removed. The kernel is able to load from wireless-regdb directly. Obsolete. n/getmail-6.18.14-x86_64-1.txz: Upgraded. n/gpgme-1.23.2-x86_64-2.txz: Rebuilt. Drop python2 support. n/obexftp-0.24.2-x86_64-11.txz: Rebuilt. Drop python2 support. n/wireless-regdb-2024.01.23-x86_64-1.txz: Added. Wireless regulatory database, previously bundled with crda. x/ibus-1.5.29-x86_64-2.txz: Rebuilt. Drop python2 support. x/libkkc-0.3.5-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/libkkc-data-0.2.7-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/xcb-proto-1.16.0-x86_64-2.txz: Rebuilt. Drop python2 support. x/xpyb-1.3.1-x86_64-7.txz: Removed. Nothing uses it, and it was never updated for python3. Removed as obsolete.
2024-03-20 22:10:30 +01:00
rm -f "$PKG/usr/lib$LIBDIRSUFFIX/python2*/site-packages/six.py"
# Compile Python scripts:
Wed Feb 20 23:59:17 UTC 2019 a/kernel-generic-4.19.24-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.24-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.24-x86_64-1.txz: Upgraded. a/kmod-26-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. a/util-linux-2.33.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/hplip-3.19.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/linuxdoc-tools-0.9.73-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/lxc-2.0.9_d3a03247-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. ap/rpm-4.14.2.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/Cython-0.29.5-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/distcc-3.3.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/gdb-8.2.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/kernel-headers-4.19.24-x86-1.txz: Upgraded. d/llvm-7.0.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/meson-0.49.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python-pip-19.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python-setuptools-40.8.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. d/python3-3.7.2-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.19.24-noarch-1.txz: Upgraded. kde/pykde4-4.14.3-x86_64-8.txz: Rebuilt. Recompiled against python3-3.7.2. l/Mako-1.0.7-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/PyQt-4.12.1-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/QScintilla-2.10.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/alsa-lib-1.1.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/dbus-python-1.2.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/gexiv2-0.10.10-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libcaca-0.99.beta19-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/libcap-ng-0.7.9-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libjpeg-turbo-2.0.2-x86_64-1.txz: Upgraded. l/libproxy-0.4.15-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/libwebp-1.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/libxml2-2.9.9-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/newt-0.52.20-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycairo-1.18.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycups-1.9.74-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pycurl-7.43.0.2-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pygobject-2.28.7-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/pygobject3-3.30.4-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/pyparsing-2.3.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-appdirs-1.4.3-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-certifi-2018.11.29-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-chardet-3.0.4-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-docutils-0.14-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-idna-2.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-notify2-0.3.1-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-packaging-19.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-pillow-5.4.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-requests-2.21.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-sane-2.8.3-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-six-1.12.0-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/python-urllib3-1.24.1-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/sip-4.19.8-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. l/system-config-printer-1.5.11-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. l/talloc-2.1.15-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/tdb-1.3.17-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/tevent-0.9.38-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. l/urwid-1.0.3-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. n/gpgme-1.12.0-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. n/obexftp-0.24.2-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. n/openvpn-2.4.7-x86_64-1.txz: Upgraded. n/pssh-2.3.1-x86_64-4.txz: Rebuilt. Recompiled against python3-3.7.2. x/libfontenc-1.1.4-x86_64-1.txz: Upgraded. x/xcalc-1.0.7-x86_64-1.txz: Upgraded. x/xcb-proto-1.13-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. x/xclock-1.0.8-x86_64-1.txz: Upgraded. x/xev-1.2.3-x86_64-1.txz: Upgraded. x/xfsinfo-1.0.6-x86_64-1.txz: Upgraded. x/xhost-1.0.8-x86_64-1.txz: Upgraded. x/xlsatoms-1.1.3-x86_64-1.txz: Upgraded. x/xmodmap-1.0.10-x86_64-1.txz: Upgraded. x/xrdb-1.2.0-x86_64-1.txz: Upgraded. x/xstdcmap-1.0.4-x86_64-1.txz: Upgraded. x/xvinfo-1.1.4-x86_64-1.txz: Upgraded. xap/blueman-2.0.8-x86_64-2.txz: Rebuilt. Recompiled against python3-3.7.2. xap/hexchat-2.14.2-x86_64-3.txz: Rebuilt. Recompiled against python3-3.7.2. extra/pure-alsa-system/alsa-lib-1.1.8-x86_64-2_alsa.txz: Rebuilt. Recompiled against python3-3.7.2. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2019-02-21 00:59:17 +01:00
python3 -m compileall "$PKG/usr/lib$LIBDIRSUFFIX/python${PY3}/site-packages/clang"
python3 -O -m compileall "$PKG/usr/lib$LIBDIRSUFFIX/python${PY3}/site-packages/clang"
Thu Mar 7 20:40:08 UTC 2024 ap/ghostscript-10.03.0-x86_64-1.txz: Upgraded. This update addresses a security issue: A vulnerability was identified in the way Ghostscript/GhostPDL called tesseract for the OCR devices, which could allow arbitrary code execution. Thanks to J_W for the heads-up. (* Security fix *) ap/lxc-4.0.12-x86_64-3.txz: Rebuilt. lxc-slackware.in: include gnupg2 (not gnupg) for slackpkg. ap/slackpkg-15.0.10-noarch-3.txz: Rebuilt. core-functions.sh: use gpg2, not gpg. d/Cython-3.0.9-x86_64-1.txz: Upgraded. d/git-2.44.0-x86_64-2.txz: Rebuilt. Include git-subtree. Thanks to gwhl. d/llvm-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. kde/kdevelop-23.08.5-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0. l/openexr-3.2.3-x86_64-1.txz: Upgraded. l/python-importlib_metadata-7.0.2-x86_64-1.txz: Upgraded. l/python-trove-classifiers-2024.3.3-x86_64-1.txz: Upgraded. l/qt5-5.15.12_20240228_6609503f-x86_64-1.txz: Upgraded. Compiled against llvm-18.1.0. l/qt6-6.6.2_20240210_15b7e743-x86_64-3.txz: Rebuilt. Recompiled against llvm-18.1.0. l/spirv-llvm-translator-18.1.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/gnupg2-2.4.5-x86_64-1.txz: Upgraded. n/libassuan-2.5.7-x86_64-1.txz: Upgraded. n/postfix-3.9.0-x86_64-1.txz: Upgraded. x/mesa-24.0.2-x86_64-2.txz: Rebuilt. Recompiled against llvm-18.1.0 and spirv-llvm-translator-18.1.0. isolinux/initrd.img: Rebuilt. Fixed kernel version. Thanks to chrisVV. usb-and-pxe-installers/usbboot.img: Rebuilt. Fixed kernel version. Thanks to chrisVV.
2024-03-07 21:40:08 +01:00
python3 -m compileall "$PKG/usr/share/scan-view"
python3 -O -m compileall "$PKG/usr/share/scan-view"
python3 -m compileall "$PKG/usr/share/clang"
python3 -O -m compileall "$PKG/usr/share/clang"
python3 -m compileall "$PKG/usr/share/opt-viewer"
python3 -O -m compileall "$PKG/usr/share/opt-viewer"
# Nevermind, we're not shipping this python2 crap:
Wed Mar 20 21:10:30 UTC 2024 a/libblockdev-2.28-x86_64-2.txz: Rebuilt. Drop python2 support. a/sysvinit-scripts-15.1-noarch-15.txz: Rebuilt. rc.M: start rc.iceccd and rc.icecc-scheduler earlier. a/util-linux-2.39.3-x86_64-2.txz: Rebuilt. Drop python2 support. a/volume_key-0.3.12-x86_64-6.txz: Rebuilt. Drop python2 support. ap/man-pages-6.7-noarch-1.txz: Upgraded. d/cmake-3.28.4-x86_64-1.txz: Upgraded. d/llvm-18.1.2-x86_64-1.txz: Upgraded. d/python2-2.7.18-x86_64-7.txz: Rebuilt. Bundle the final python2 versions of pip and setuptools. Drop the /usr/bin/python symlink. d/python3-3.9.19-x86_64-1.txz: Upgraded. Point the /usr/bin/python symlink at python3.9. PEP 394 says we can do this, and in a world of ambigious shebangs, this is probably the best of the available options. This update also fixes security issues: bundled libexpat was updated to 2.6.0. zipfile is now protected from the "quoted-overlap" zipbomb. tempfile.TemporaryDirectory cleanup no longer dereferences symlinks when working around file system permission errors. For more information, see: https://pythoninsider.blogspot.com/2024/03/python-31014-3919-and-3819-is-now.html https://www.cve.org/CVERecord?id=CVE-2023-52425 https://www.cve.org/CVERecord?id=CVE-2024-0450 https://www.cve.org/CVERecord?id=CVE-2023-6597 (* Security fix *) d/strace-6.8-x86_64-1.txz: Upgraded. kde/kross-interpreters-23.08.5-x86_64-2.txz: Rebuilt. Drop python2 support. l/libxml2-2.12.6-x86_64-2.txz: Rebuilt. Drop python2 support. l/mozjs115-115.9.0esr-x86_64-2.txz: Rebuilt. Fixed installed library name. Thanks to reddog83. Fixed slack-desc. Thanks to r1w1s1. l/phonon-4.12.0-x86_64-1.txz: Upgraded. l/pilot-link-0.12.5-x86_64-17.txz: Rebuilt. Drop python2 support. l/python2-module-collection-2.7.18-x86_64-6.txz: Removed. Good bye! l/python2-pycairo-1.18.2-x86_64-1.txz: Added. We'll need this (along with pygtk and pygobject) until we get gimp3. Well, we could build gimp without python support, but I really don't think that's the route we want to take. n/bind-9.18.25-x86_64-1.txz: Upgraded. n/crda-4.15-x86_64-1.txz: Removed. The kernel is able to load from wireless-regdb directly. Obsolete. n/getmail-6.18.14-x86_64-1.txz: Upgraded. n/gpgme-1.23.2-x86_64-2.txz: Rebuilt. Drop python2 support. n/obexftp-0.24.2-x86_64-11.txz: Rebuilt. Drop python2 support. n/wireless-regdb-2024.01.23-x86_64-1.txz: Added. Wireless regulatory database, previously bundled with crda. x/ibus-1.5.29-x86_64-2.txz: Rebuilt. Drop python2 support. x/libkkc-0.3.5-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/libkkc-data-0.2.7-x86_64-4.txz: Rebuilt. Still forcing python2 with this one, but perhaps a python3 marisa module could work around this. x/xcb-proto-1.16.0-x86_64-2.txz: Rebuilt. Drop python2 support. x/xpyb-1.3.1-x86_64-7.txz: Removed. Nothing uses it, and it was never updated for python3. Removed as obsolete.
2024-03-20 22:10:30 +01:00
rm -rf $PKG/usr/lib$LIBDIRSUFFIX/python2*
# Move man page directory:
mv $PKG/usr/share/man $PKG/usr/
# Strip binaries:
( cd $PKG
find . | xargs file | grep "executable" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
find . | xargs file | grep "shared object" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
)
# Compress manual pages:
find $PKG/usr/man -type f -exec gzip -9 {} \+
for i in $( find $PKG/usr/man -type l ) ; do
ln -s $( readlink $i ).gz $i.gz
rm $i
done
mkdir -p $PKG/usr/doc/$PKGNAM-$VERSION/{clang,lldb,clang-tools-extra,compiler-rt,openmp,polly}
cp -a CREDITS* LICENSE* README* $PKG/usr/doc/$PKGNAM-$VERSION
cp -a tools/clang/{INSTALL,LICENSE,NOTES,README}* \
$PKG/usr/doc/$PKGNAM-$VERSION/clang
cp -a tools/lldb/{CODE_OWNERS,INSTALL,LICENSE}* \
$PKG/usr/doc/$PKGNAM-$VERSION/lldb
cp -a tools/clang/tools/extra/{CODE_OWNERS,LICENSE,README}* \
$PKG/usr/doc/$PKGNAM-$VERSION/clang-tools-extra
cp -a projects/compiler-rt/{CODE_OWNERS,CREDITS,LICENSE,README}* \
$PKG/usr/doc/$PKGNAM-$VERSION/compiler-rt
cp -a projects/openmp/{CREDITS,LICENSE}* \
$PKG/usr/doc/$PKGNAM-$VERSION/openmp
cp -a projects/polly/{CREDITS,LICENSE,README}* \
$PKG/usr/doc/$PKGNAM-$VERSION/polly
mv $PKG/usr/docs/llvm/* $PKG/usr/doc/$PKGNAM-$VERSION
rm -rf $PKG/usr/docs
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/$PKGNAM-$VERSION-$ARCH-$BUILD.txz