Commit graph

20 commits

Author SHA1 Message Date
Patrick J Volkerding
8d25718f1e Thu Nov 28 21:47:57 UTC 2024
Happy Thanksgiving to everyone celebrating, and happy Thursday to everyone
else. I've been looking at this new fontconfig (and have run into some of the
terrible looking pages I remembered from previous attempts to upgrade). The
solution is certainly *not* to disable bitmap fonts. I need those in my
terminal emulator, and have never seen a vector font that looks correct. What
I've done this time is make the defaults for fontconfig sane and user
configurable, and then converted the two bitmap fonts that are causing the
problems to OTB format and changing the family name from "name" to "name (OTB)"
which prevents them from being picked up by default.
Hope this looks better! Cheers! :-)
a/file-5.46-x86_64-1.txz:  Upgraded.
a/mkinitrd-1.4.11-x86_64-52.txz:  Rebuilt.
  geninitrd: since we're sourcing /etc/default/geninitrd, we might as well test
  the AUTO_REMOVE_ORPHANED_INITRDS variable directly instead of grepping for it
  in the defaults file. Thanks to Mechanikx.
a/pkgtools-15.1-noarch-18.txz:  Rebuilt.
  make-kernel-backup: account for "file" changing 80386 to i386.
l/libqalculate-5.4.0.1-x86_64-1.txz:  Upgraded.
l/openal-soft-1.24.1-x86_64-1.txz:  Upgraded.
l/pipewire-1.2.7-x86_64-1.txz:  Upgraded.
x/font-adobe-100dpi-1.0.4-noarch-2.txz:  Rebuilt.
  Install these fonts as OTB rather than PCF.
x/font-adobe-75dpi-1.0.4-noarch-2.txz:  Rebuilt.
  Install these fonts as OTB rather than PCF.
x/fontconfig-2.15.0-x86_64-3.txz:  Rebuilt.
  Let's not link any hinting, subpixel, or lcdfilter conf files by default.
  That way the user can choose what to link (if anything) without future
  fontconfig updates stomping on those choices.
x/mesa-24.2.8-x86_64-1.txz:  Upgraded.
2024-11-28 23:35:14 +01:00
Patrick J Volkerding
4147fdd758 Mon Jul 29 18:32:35 UTC 2024
a/sysklogd-2.6.1-x86_64-1.txz:  Upgraded.
d/python-pip-24.2-x86_64-1.txz:  Upgraded.
d/python-setuptools-72.1.0-x86_64-1.txz:  Upgraded.
n/links-2.30-x86_64-1.txz:  Upgraded.
x/libX11-1.8.10-x86_64-1.txz:  Upgraded.
x/xinput_calibrator-0.8.0-x86_64-1.txz:  Added.
2024-07-29 20:58:51 +02:00
Patrick J Volkerding
362e0f90f1 Sun Feb 4 19:20:00 UTC 2024
ap/pamixer-1.6-x86_64-1.txz:  Upgraded.
d/rust-bindgen-0.69.4-x86_64-1.txz:  Upgraded.
l/cxxopts-3.1.1-x86_64-1.txz:  Added.
  Needed by pamixer-1.6.
l/gc-8.2.6-x86_64-1.txz:  Upgraded.
l/libxml2-2.12.5-x86_64-1.txz:  Upgraded.
  Fix the following security issue:
  xmlreader: Don't expand XIncludes when backtracking.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-25062
  (* Security fix *)
x/bitmap-1.1.1-x86_64-1.txz:  Upgraded.
x/xditview-1.0.7-x86_64-1.txz:  Upgraded.
x/xkbcomp-1.4.7-x86_64-1.txz:  Upgraded.
x/xkbutils-1.0.6-x86_64-1.txz:  Upgraded.
x/xmore-1.0.4-x86_64-1.txz:  Upgraded.
x/xprop-1.2.7-x86_64-1.txz:  Upgraded.
2024-02-04 20:59:45 +01:00
Patrick J Volkerding
8db980621c Wed Jul 13 19:56:59 UTC 2022
a/inih-56-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20220710_dfa2931-noarch-1.txz:  Upgraded.
a/kernel-generic-5.18.11-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.18.11-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.18.11-x86_64-1.txz:  Upgraded.
ap/mpg123-1.30.1-x86_64-1.txz:  Upgraded.
d/git-2.37.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.18.11-x86-1.txz:  Upgraded.
d/mercurial-6.2-x86_64-1.txz:  Upgraded.
k/kernel-source-5.18.11-noarch-1.txz:  Upgraded.
kde/bluedevil-5.25.3-x86_64-1.txz:  Upgraded.
kde/breeze-5.25.3-x86_64-1.txz:  Upgraded.
kde/breeze-grub-5.25.3-x86_64-1.txz:  Upgraded.
kde/breeze-gtk-5.25.3-x86_64-1.txz:  Upgraded.
kde/drkonqi-5.25.3-x86_64-1.txz:  Upgraded.
kde/kactivitymanagerd-5.25.3-x86_64-1.txz:  Upgraded.
kde/kde-cli-tools-5.25.3-x86_64-1.txz:  Upgraded.
kde/kde-gtk-config-5.25.3-x86_64-1.txz:  Upgraded.
kde/kdecoration-5.25.3-x86_64-1.txz:  Upgraded.
kde/kdeplasma-addons-5.25.3-x86_64-1.txz:  Upgraded.
kde/kgamma5-5.25.3-x86_64-1.txz:  Upgraded.
kde/khotkeys-5.25.3-x86_64-1.txz:  Upgraded.
kde/kinfocenter-5.25.3-x86_64-1.txz:  Upgraded.
kde/kmenuedit-5.25.3-x86_64-1.txz:  Upgraded.
kde/kscreen-5.25.3-x86_64-1.txz:  Upgraded.
kde/kscreenlocker-5.25.3-x86_64-1.txz:  Upgraded.
kde/ksshaskpass-5.25.3-x86_64-1.txz:  Upgraded.
kde/ksystemstats-5.25.3-x86_64-1.txz:  Upgraded.
kde/kwallet-pam-5.25.3-x86_64-1.txz:  Upgraded.
kde/kwayland-integration-5.25.3-x86_64-1.txz:  Upgraded.
kde/kwin-5.25.3-x86_64-1.txz:  Upgraded.
kde/kwrited-5.25.3-x86_64-1.txz:  Upgraded.
kde/layer-shell-qt-5.25.3-x86_64-1.txz:  Upgraded.
kde/libkscreen-5.25.3-x86_64-1.txz:  Upgraded.
kde/libksysguard-5.25.3-x86_64-1.txz:  Upgraded.
kde/milou-5.25.3-x86_64-1.txz:  Upgraded.
kde/oxygen-5.25.3-x86_64-1.txz:  Upgraded.
kde/oxygen-sounds-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-browser-integration-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-desktop-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-disks-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-firewall-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-integration-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-nm-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-pa-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-sdk-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-systemmonitor-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-vault-5.25.3-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-5.25.3.1-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-wallpapers-5.25.3-x86_64-1.txz:  Upgraded.
kde/polkit-kde-agent-1-5.25.3-x86_64-1.txz:  Upgraded.
kde/powerdevil-5.25.3-x86_64-1.txz:  Upgraded.
kde/qqc2-breeze-style-5.25.3-x86_64-1.txz:  Upgraded.
kde/sddm-kcm-5.25.3-x86_64-1.txz:  Upgraded.
kde/systemsettings-5.25.3-x86_64-1.txz:  Upgraded.
kde/xdg-desktop-portal-kde-5.25.3-x86_64-1.txz:  Upgraded.
l/SDL2_mixer-2.6.1-x86_64-1.txz:  Upgraded.
l/gtk4-4.6.6-x86_64-2.txz:  Rebuilt.
  Drop embedded pango library and use "unshare -n" to prevent the issue from
  happening again.
l/libuv-1.44.2-x86_64-1.txz:  Upgraded.
l/pango-1.50.8-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.55-x86_64-1.txz:  Upgraded.
x/font-util-1.3.3-x86_64-1.txz:  Upgraded.
x/xorg-server-1.20.14-x86_64-4.txz:  Rebuilt.
  xkb: switch to array index loops to moving pointers.
  xkb: add request length validation for XkbSetGeometry.
  xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
  (* Security fix *)
x/xorg-server-xephyr-1.20.14-x86_64-4.txz:  Rebuilt.
x/xorg-server-xnest-1.20.14-x86_64-4.txz:  Rebuilt.
x/xorg-server-xvfb-1.20.14-x86_64-4.txz:  Rebuilt.
xap/mozilla-thunderbird-102.0.2-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.0.2/releasenotes/
xfce/xfce4-settings-4.16.3-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-07-14 09:00:16 +02:00
Patrick J Volkerding
fc55ead5b0 Sat May 21 19:30:02 UTC 2022
ap/inxi-3.3.16_1-noarch-1.txz:  Upgraded.
ap/mariadb-10.6.8-x86_64-1.txz:  Upgraded.
  This update fixes bugs and several security issues.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458
  (* Security fix *)
l/harfbuzz-4.3.0-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_35-x86_64-1.txz:  Upgraded.
x/libxcvt-0.1.1-x86_64-1.txz:  Added.
2022-05-22 06:59:50 +02:00
Patrick J Volkerding
ffef56590d Mon May 18 19:17:21 UTC 2020
Greetings! After three months in /testing, the PAM merge into the main tree
is now complete. When updating, be sure to install the new pam, cracklib, and
libpwquality packages or you may find yourself locked out of your machine.
Otherwise, these changes should be completely transparent and you shouldn't
notice any obvious operational differences. Be careful if you make any changes
in /etc/pam.d/ - leaving an extra console logged in while testing PAM config
changes is a recommended standard procedure. Thanks again to Robby Workman,
Vincent Batts, Phantom X, and ivandi for help implementing this. It's not
done yet and there will be more fine-tuning of the config files, but now we
can move on to build some other updates. Enjoy!
a/cracklib-2.9.7-x86_64-1.txz:  Added.
a/kernel-firmware-20200517_f8d32e4-noarch-1.txz:  Upgraded.
a/libcgroup-0.41-x86_64-7.txz:  Rebuilt.
  Rebuilt to add PAM support.
a/libpwquality-1.4.2-x86_64-1.txz:  Added.
a/lilo-24.2-x86_64-9.txz:  Rebuilt.
  Enable the "compact" option by default.
  liloconfig: correctly set the root partition.
a/pam-1.3.1-x86_64-1.txz:  Added.
a/shadow-4.8.1-x86_64-7.txz:  Rebuilt.
  Rebuilt to add PAM support.
a/utempter-1.2.0-x86_64-1.txz:  Upgraded.
a/util-linux-2.35.1-x86_64-6.txz:  Rebuilt.
  Rebuilt to add PAM support.
a/xfsprogs-5.6.0-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
ap/at-3.2.1-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/cups-2.3.3-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/hplip-3.20.5-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/mariadb-10.4.13-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/screen-4.8.0-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/soma-3.3.0-noarch-1.txz:  Upgraded.
  Thanks to David Woodfall.
ap/sqlite-3.31.1-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
ap/sudo-1.9.0-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
ap/vim-8.2.0788-x86_64-1.txz:  Upgraded.
d/bison-3.6.2-x86_64-1.txz:  Upgraded.
d/meson-0.54.2-x86_64-1.txz:  Upgraded.
d/python-setuptools-46.4.0-x86_64-1.txz:  Upgraded.
d/vala-0.48.6-x86_64-1.txz:  Upgraded.
kde/calligra-2.9.11-x86_64-36.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
kde/kde-workspace-4.11.22-x86_64-7.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/ConsoleKit2-1.2.1-x86_64-4.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/boost-1.73.0-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/gnome-keyring-3.36.0-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/harfbuzz-2.6.6-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/icu4c-67.1-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/imagemagick-7.0.10_13-x86_64-1.txz:  Upgraded.
l/libcap-2.34-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/libical-3.0.8-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/libuv-1.38.0-x86_64-1.txz:  Upgraded.
l/libvisio-0.1.7-x86_64-3.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/polkit-0.116-x86_64-3.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/qt-4.8.7-x86_64-16.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/qt5-5.13.2-x86_64-4.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/qt5-webkit-5.212.0_alpha4-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/raptor2-2.0.15-x86_64-9.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
l/system-config-printer-1.5.12-x86_64-4.txz:  Rebuilt.
  Rebuilt to add PAM support.
l/vte-0.60.2-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
n/cifs-utils-6.10-x86_64-4.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/cyrus-sasl-2.1.27-x86_64-4.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/dovecot-2.3.10.1-x86_64-1.txz:  Upgraded.
  Rebuilt to add PAM support.
  Compiled against icu4c-67.1.
  This update fixes several denial-of-service vulnerabilities.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10957
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10958
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10967
  (* Security fix *)
n/mutt-1.14.1-x86_64-1.txz:  Upgraded.
n/netatalk-3.1.12-x86_64-3.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/netkit-rsh-0.17-x86_64-3.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/nss-pam-ldapd-0.9.11-x86_64-1.txz:  Added.
n/openssh-8.2p1-x86_64-3.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/openvpn-2.4.9-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/pam-krb5-4.9-x86_64-1.txz:  Added.
n/php-7.4.6-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
n/popa3d-1.0.3-x86_64-4.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/postfix-3.5.2-x86_64-1.txz:  Upgraded.
  Compiled against icu4c-67.1.
n/ppp-2.4.8-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/proftpd-1.3.6c-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
n/samba-4.12.2-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
  Recompiled against icu4c-67.1.
n/tin-2.4.4-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
n/vsftpd-3.0.3-x86_64-6.txz:  Rebuilt.
  Rebuilt to add PAM support.
t/texlive-2019.190626-x86_64-4.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
x/vulkan-sdk-1.2.135.0-x86_64-1.txz:  Upgraded.
x/xdm-1.1.11-x86_64-10.txz:  Rebuilt.
  Rebuilt to add PAM support.
x/xisxwayland-1-x86_64-1.txz:  Added.
xap/sane-1.0.30-x86_64-1.txz:  Upgraded.
  This update fixes several security issues.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12867
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12862
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12863
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12865
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12866
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12861
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12864
  (* Security fix *)
xap/vim-gvim-8.2.0788-x86_64-1.txz:  Upgraded.
xap/xlockmore-5.63-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
xap/xscreensaver-5.44-x86_64-2.txz:  Rebuilt.
  Rebuilt to add PAM support.
extra/brltty/brltty-6.1-x86_64-2.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
extra/pure-alsa-system/qt5-5.13.2-x86_64-4_alsa.txz:  Rebuilt.
  Recompiled against icu4c-67.1.
isolinux/initrd.img:  Rebuilt.
  Added PAM libraries, security modules, and config files.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
  Added PAM libraries, security modules, and config files.
2020-05-18 23:25:14 +02:00
Patrick J Volkerding
2ae63821dd Thu Feb 20 04:50:54 UTC 2020
a/gptfdisk-1.0.5-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20200219_2277987-noarch-1.txz:  Upgraded.
a/kernel-generic-5.4.21-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.4.21-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.4.21-x86_64-1.txz:  Upgraded.
a/shadow-4.8.1-x86_64-5.txz:  Rebuilt.
a/util-linux-2.35.1-x86_64-4.txz:  Rebuilt.
ap/cdparanoia-III_10.2-x86_64-3.txz:  Rebuilt.
  Moved man page from /usr/man/jp/man1/ to /usr/man/ja/man1/. Thanks to Xsane.
  Don't ship the static libraries.
d/kernel-headers-5.4.21-x86-1.txz:  Upgraded.
k/kernel-source-5.4.21-noarch-1.txz:  Upgraded.
   SND_SOC n -> m
   SPI n -> y
   VFIO_PCI_VGA n -> y
  +ADE7854_SPI m
  +ADT7316_SPI m
  +BMC150_ACCEL_SPI m
  +BMG160_SPI m
  +BMP280_SPI m
  +FXAS21002C_SPI m
  +HTS221_SPI m
  +IIO_ST_ACCEL_SPI_3AXIS m
  +IIO_ST_GYRO_SPI_3AXIS m
  +IIO_ST_MAGN_SPI_3AXIS m
  +IIO_ST_PRESS_SPI m
  +IIO_ST_SENSORS_SPI m
  +INPUT_AD714X_SPI m
  +INPUT_ADXL34X_SPI m
  +KXSD9_SPI m
  +REGMAP_SPI m
  +SND_COMPRESS_OFFLOAD m
  +SND_DESIGNWARE_I2S m
  +SND_DESIGNWARE_PCM y
  +SND_DMAENGINE_PCM m
  +SND_HDA_EXT_CORE m
  +SND_I2S_HI6210_I2S m
  +SND_PCM_ELD y
  +SND_PCM_IEC958 y
  +SND_SIMPLE_CARD m
  +SND_SIMPLE_CARD_UTILS m
  +SND_SOC_AC97_BUS y
  +SND_SOC_AC97_CODEC m
  +SND_SOC_ACPI m
  +SND_SOC_ACPI_INTEL_MATCH m
  +SND_SOC_ADAU1761 m
  +SND_SOC_ADAU1761_I2C m
  +SND_SOC_ADAU1761_SPI m
  +SND_SOC_ADAU17X1 m
  +SND_SOC_ADAU7002 m
  +SND_SOC_ADAU_UTILS m
  +SND_SOC_AMD_ACP m
  +SND_SOC_AMD_ACP3x m
  +SND_SOC_AMD_CZ_DA7219MX98357_MACH m
  +SND_SOC_AMD_CZ_RT5645_MACH m
  +SND_SOC_BD28623 m
  +SND_SOC_COMPRESS y
  +SND_SOC_CROS_EC_CODEC m
  +SND_SOC_CS35L34 m
  +SND_SOC_CS35L35 m
  +SND_SOC_CS35L36 m
  +SND_SOC_CS42L42 m
  +SND_SOC_CS43130 m
  +SND_SOC_CX2072X m
  +SND_SOC_DA7213 m
  +SND_SOC_DA7219 m
  +SND_SOC_DMIC m
  +SND_SOC_ES7134 m
  +SND_SOC_ES7241 m
  +SND_SOC_ES8316 m
  +SND_SOC_ES8328 m
  +SND_SOC_ES8328_I2C m
  +SND_SOC_ES8328_SPI m
  +SND_SOC_GENERIC_DMAENGINE_PCM y
  +SND_SOC_HDAC_HDA m
  +SND_SOC_HDAC_HDMI m
  +SND_SOC_HDMI_CODEC m
  +SND_SOC_I2C_AND_SPI m
  +SND_SOC_INTEL_APL m
  +SND_SOC_INTEL_BDW_RT5677_MACH m
  +SND_SOC_INTEL_BROADWELL_MACH m
  +SND_SOC_INTEL_BXT_DA7219_MAX98357A_MACH m
  +SND_SOC_INTEL_BXT_RT298_MACH m
  +SND_SOC_INTEL_BYTCR_RT5640_MACH m
  +SND_SOC_INTEL_BYTCR_RT5651_MACH m
  +SND_SOC_INTEL_BYT_CHT_CX2072X_MACH m
  +SND_SOC_INTEL_BYT_CHT_DA7213_MACH m
  +SND_SOC_INTEL_BYT_CHT_ES8316_MACH m
  +SND_SOC_INTEL_BYT_CHT_NOCODEC_MACH m
  +SND_SOC_INTEL_CFL m
  +SND_SOC_INTEL_CHT_BSW_MAX98090_TI_MACH m
  +SND_SOC_INTEL_CHT_BSW_NAU8824_MACH m
  +SND_SOC_INTEL_CHT_BSW_RT5645_MACH m
  +SND_SOC_INTEL_CHT_BSW_RT5672_MACH m
  +SND_SOC_INTEL_CML_H m
  +SND_SOC_INTEL_CML_LP m
  +SND_SOC_INTEL_CNL m
  +SND_SOC_INTEL_DA7219_MAX98357A_GENERIC m
  +SND_SOC_INTEL_GLK m
  +SND_SOC_INTEL_GLK_RT5682_MAX98357A_MACH m
  +SND_SOC_INTEL_HASWELL m
  +SND_SOC_INTEL_HASWELL_MACH m
  +SND_SOC_INTEL_KBL m
  +SND_SOC_INTEL_KBL_DA7219_MAX98357A_MACH m
  +SND_SOC_INTEL_KBL_DA7219_MAX98927_MACH m
  +SND_SOC_INTEL_KBL_RT5660_MACH m
  +SND_SOC_INTEL_KBL_RT5663_MAX98927_MACH m
  +SND_SOC_INTEL_MACH y
  +SND_SOC_INTEL_SKL m
  +SND_SOC_INTEL_SKL_NAU88L25_MAX98357A_MACH m
  +SND_SOC_INTEL_SKL_NAU88L25_SSM4567_MACH m
  +SND_SOC_INTEL_SKL_RT286_MACH m
  +SND_SOC_INTEL_SKYLAKE m
  +SND_SOC_INTEL_SKYLAKE_COMMON m
  +SND_SOC_INTEL_SKYLAKE_FAMILY m
  +SND_SOC_INTEL_SKYLAKE_HDAUDIO_CODEC y
  +SND_SOC_INTEL_SKYLAKE_SSP_CLK m
  +SND_SOC_INTEL_SST m
  +SND_SOC_INTEL_SST_ACPI m
  +SND_SOC_INTEL_SST_FIRMWARE m
  +SND_SOC_INTEL_SST_TOPLEVEL y
  +SND_SOC_MAX9759 m
  +SND_SOC_MAX98088 m
  +SND_SOC_MAX98090 m
  +SND_SOC_MAX98357A m
  +SND_SOC_MAX98373 m
  +SND_SOC_MAX9867 m
  +SND_SOC_MAX98927 m
  +SND_SOC_NAU8540 m
  +SND_SOC_NAU8824 m
  +SND_SOC_NAU8825 m
  +SND_SOC_PCM1789 m
  +SND_SOC_PCM1789_I2C m
  +SND_SOC_PCM186X m
  +SND_SOC_PCM186X_I2C m
  +SND_SOC_PCM186X_SPI m
  +SND_SOC_PCM3060 m
  +SND_SOC_PCM3060_I2C m
  +SND_SOC_PCM3060_SPI m
  +SND_SOC_RL6231 m
  +SND_SOC_RL6347A m
  +SND_SOC_RT286 m
  +SND_SOC_RT298 m
  +SND_SOC_RT5640 m
  +SND_SOC_RT5645 m
  +SND_SOC_RT5651 m
  +SND_SOC_RT5660 m
  +SND_SOC_RT5663 m
  +SND_SOC_RT5670 m
  +SND_SOC_RT5677 m
  +SND_SOC_RT5677_SPI m
  +SND_SOC_RT5682 m
  +SND_SOC_SIGMADSP m
  +SND_SOC_SIGMADSP_REGMAP m
  +SND_SOC_SIMPLE_AMPLIFIER m
  +SND_SOC_SOF m
  +SND_SOC_SOF_ACPI m
  +SND_SOC_SOF_APOLLOLAKE m
  +SND_SOC_SOF_APOLLOLAKE_SUPPORT y
  +SND_SOC_SOF_BAYTRAIL m
  +SND_SOC_SOF_BAYTRAIL_SUPPORT y
  +SND_SOC_SOF_CANNONLAKE m
  +SND_SOC_SOF_CANNONLAKE_SUPPORT y
  +SND_SOC_SOF_COFFEELAKE m
  +SND_SOC_SOF_COFFEELAKE_SUPPORT y
  +SND_SOC_SOF_COMETLAKE_H m
  +SND_SOC_SOF_COMETLAKE_H_SUPPORT y
  +SND_SOC_SOF_COMETLAKE_LP m
  +SND_SOC_SOF_COMETLAKE_LP_SUPPORT y
  +SND_SOC_SOF_ELKHARTLAKE m
  +SND_SOC_SOF_ELKHARTLAKE_SUPPORT y
  +SND_SOC_SOF_GEMINILAKE m
  +SND_SOC_SOF_GEMINILAKE_SUPPORT y
  +SND_SOC_SOF_HDA m
  +SND_SOC_SOF_HDA_AUDIO_CODEC y
  +SND_SOC_SOF_HDA_COMMON m
  +SND_SOC_SOF_HDA_LINK y
  +SND_SOC_SOF_HDA_LINK_BASELINE m
  +SND_SOC_SOF_ICELAKE m
  +SND_SOC_SOF_ICELAKE_SUPPORT y
  +SND_SOC_SOF_INTEL_ACPI m
  +SND_SOC_SOF_INTEL_ATOM_HIFI_EP m
  +SND_SOC_SOF_INTEL_COMMON m
  +SND_SOC_SOF_INTEL_HIFI_EP_IPC m
  +SND_SOC_SOF_INTEL_PCI m
  +SND_SOC_SOF_INTEL_TOPLEVEL y
  +SND_SOC_SOF_MERRIFIELD m
  +SND_SOC_SOF_MERRIFIELD_SUPPORT y
  +SND_SOC_SOF_OPTIONS m
  +SND_SOC_SOF_PCI m
  +SND_SOC_SOF_PROBE_WORK_QUEUE y
  +SND_SOC_SOF_TIGERLAKE m
  +SND_SOC_SOF_TIGERLAKE_SUPPORT y
  +SND_SOC_SOF_TOPLEVEL y
  +SND_SOC_SOF_XTENSA m
  +SND_SOC_SPDIF m
  +SND_SOC_SSM4567 m
  +SND_SOC_TAS6424 m
  +SND_SOC_TDA7419 m
  +SND_SOC_TLV320AIC32X4 m
  +SND_SOC_TLV320AIC32X4_I2C m
  +SND_SOC_TLV320AIC32X4_SPI m
  +SND_SOC_TOPOLOGY y
  +SND_SOC_TS3A227E m
  +SND_SOC_TSCS42XX m
  +SND_SOC_WM8524 m
  +SND_SPI y
  +SND_SST_ATOM_HIFI2_PLATFORM m
  +SND_SST_ATOM_HIFI2_PLATFORM_ACPI m
  +SND_SST_ATOM_HIFI2_PLATFORM_PCI m
  +SND_SST_IPC m
  +SND_SST_IPC_ACPI m
  +SND_SST_IPC_PCI m
  +SPI_MASTER y
  +ST_UVIS25_SPI m
l/gegl-0.4.22-x86_64-1.txz:  Upgraded.
l/glib2-2.62.5-x86_64-1.txz:  Upgraded.
l/python-requests-2.23.0-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.22.8-x86_64-1.txz:  Upgraded.
n/openssh-8.2p1-x86_64-2.txz:  Rebuilt.
n/php-7.4.3-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues:
  Phar: Files added to tar with Phar::buildFromIterator have
  all-access permissions.
  Phar: heap-buffer-overflow in phar_extract_file.
  Session: Null Pointer Dereference in PHP Session Upload Progress.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7063
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7061
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7062
  (* Security fix *)
x/mesa-20.0.0-x86_64-1.txz:  Upgraded.
  Added Wayland platform support.
x/wayland-1.18.0-x86_64-1.txz:  Added.
x/wayland-protocols-1.18-noarch-1.txz:  Added.
x/xorg-server-1.20.7-x86_64-2.txz:  Rebuilt.
x/xorg-server-xephyr-1.20.7-x86_64-2.txz:  Rebuilt.
x/xorg-server-xnest-1.20.7-x86_64-2.txz:  Rebuilt.
x/xorg-server-xvfb-1.20.7-x86_64-2.txz:  Rebuilt.
x/xorg-server-xwayland-1.20.7-x86_64-2.txz:  Added.
xap/gimp-2.10.16-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/PAM/openssh-8.2p1-x86_64-2_pam.txz:  Rebuilt.
  /etc/pam.d/sshd: add commented out pam_tally2 example.
testing/packages/PAM/shadow-4.8.1-x86_64-5_pam.txz:  Rebuilt.
  /etc/pam.d/system-auth: add support for pam_group, remove pam_tally2.
  Thanks to ivandi.
  /etc/pam.d/*: Don't use tabs.
testing/packages/PAM/util-linux-2.35.1-x86_64-4_pam.txz:  Rebuilt.
  /etc/pam.d/login: add commented out pam_tally2 example.
  /etc/pam.d/*: Don't use tabs.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2020-02-20 17:59:49 +01:00
Patrick J Volkerding
7c3a378a75 Thu Dec 12 20:40:15 UTC 2019
ap/hplip-3.19.12-x86_64-1.txz:  Upgraded.
ap/pamixer-1.4-x86_64-4.txz:  Rebuilt.
  Recompiled against boost-1.72.0.
ap/vim-8.2.0000-x86_64-1.txz:  Upgraded.
d/bison-3.5-x86_64-1.txz:  Upgraded.
kde/calligra-2.9.11-x86_64-33.txz:  Rebuilt.
  Recompiled against boost-1.72.0.
l/akonadi-1.13.0-x86_64-14.txz:  Rebuilt.
  Recompiled against boost-1.72.0.
l/boost-1.72.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/libssh-0.9.3-x86_64-1.txz:  Upgraded.
  This fixes a security issue (low impact according to upstream):
  Unsanitized location in scp could lead to unwanted command execution.
  In addition, the 0.9.3 release benefited from a security audit sponsored
  by the Mozilla Open Source Support program. The audit results were used
  to improve the overall security and code quality of libssh.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14889
  (* Security fix *)
n/libqmi-1.24.2-x86_64-1.txz:  Upgraded.
x/compiz-0.8.16.1-x86_64-1.txz:  Upgraded.
x/mesa-19.3.0-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.2.0000-x86_64-1.txz:  Upgraded.
2019-12-13 08:59:49 +01:00
Patrick J Volkerding
c42086b90c Tue Dec 10 18:52:42 UTC 2019
l/dconf-0.34.0-x86_64-2.txz:  Rebuilt.
  Rebuilt using the sed replacements suggested by LFS. This fixes a
  subsequent build of dconf-editor.
l/glib-networking-2.62.2-x86_64-1.txz:  Upgraded.
n/samba-4.11.3-x86_64-1.txz:  Upgraded.
  This update fixes the following security issues:
  Samba AD DC zone-named record Denial of Service in DNS management server.
  DelegationNotAllowed was not enforced in protocol transition on Samba AD DC.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14861
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870
  (* Security fix *)
x/vulkan-sdk-1.1.126.0-x86_64-1.txz:  Upgraded.
2019-12-11 08:59:49 +01:00
Patrick J Volkerding
6cccecfe05 Sun Dec 8 18:53:58 UTC 2019
a/procps-ng-3.3.16-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Upgraded to procps-ng-3.3.16 and psmisc-23.3.
l/libcap-2.28-x86_64-1.txz:  Upgraded.
x/igt-gpu-tools-1.24-x86_64-4.txz:  Rebuilt.
  Recompiled against procps-ng-3.3.16.
2019-12-09 08:59:50 +01:00
Patrick J Volkerding
02056549bf Mon Oct 28 20:22:51 UTC 2019
l/imagemagick-6.9.10_70-x86_64-1.txz:  Upgraded.
x/libinput-1.14.3-x86_64-1.txz:  Upgraded.
x/mkfontdir-1.0.7-noarch-2.txz:  Removed.
  The mkfontdir wrapper script and man page are provided by recent versions
  of the mkfontscale package, making the mkfontdir package redundant.
  Thanks to DarkVision.
x/mkfontscale-1.2.1-x86_64-2.txz:  Rebuilt.
  Moved the mkfontdir install script to this package since it includes the
  mkfontdir wrapper script now.
xap/gimp-2.10.14-x86_64-1.txz:  Upgraded.
2019-10-29 08:59:50 +01:00
Patrick J Volkerding
cb1323a95c Mon Nov 12 02:29:48 UTC 2018
a/quota-4.04-x86_64-2.txz:  Rebuilt.
  Fixed high CPU usage. Thanks to allend.
ap/nano-3.2-x86_64-1.txz:  Upgraded.
x/libXcm-0.5.4-x86_64-1.txz:  Upgraded.
x/xcm-0.5.4-x86_64-1.txz:  Upgraded.
2018-11-12 08:59:45 +01:00
Patrick J Volkerding
522c806a26 Fri Jul 20 02:05:55 UTC 2018
a/util-linux-2.32.1-x86_64-1.txz:  Upgraded.
l/pango-1.42.2-x86_64-1.txz:  Upgraded.
n/whois-5.3.2-x86_64-1.txz:  Upgraded.
x/igt-gpu-tools-1.23-x86_64-1.txz:  Added.
x/intel-gpu-tools-1.22-x86_64-3.txz:  Removed.
x/xf86-video-ati-20180719_64bd009d-x86_64-1.txz:  Upgraded.
2018-07-20 09:00:40 +02:00
Patrick J Volkerding
646a5c1cbf Mon May 28 19:12:29 UTC 2018
a/pkgtools-15.0-noarch-13.txz:  Rebuilt.
  installpkg: default line length for --terselength is the number of columns.
  removepkg: added --terse mode.
  upgradepkg: default line length for --terselength is the number of columns.
  upgradepkg: accept -option in addition to --option.
ap/vim-8.1.0026-x86_64-1.txz:  Upgraded.
d/bison-3.0.5-x86_64-1.txz:  Upgraded.
e/emacs-26.1-x86_64-1.txz:  Upgraded.
kde/kopete-4.14.3-x86_64-8.txz:  Rebuilt.
  Recompiled against libidn-1.35.
n/conntrack-tools-1.4.5-x86_64-1.txz:  Upgraded.
n/libnetfilter_conntrack-1.0.7-x86_64-1.txz:  Upgraded.
n/libnftnl-1.1.0-x86_64-1.txz:  Upgraded.
n/links-2.16-x86_64-2.txz:  Rebuilt.
  Rebuilt to enable X driver for -g mode.
n/lynx-2.8.9dev.19-x86_64-1.txz:  Upgraded.
n/nftables-0.8.5-x86_64-1.txz:  Upgraded.
n/p11-kit-0.23.11-x86_64-1.txz:  Upgraded.
n/ulogd-2.0.7-x86_64-1.txz:  Upgraded.
n/whois-5.3.1-x86_64-1.txz:  Upgraded.
xap/network-manager-applet-1.8.12-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.1.0026-x86_64-1.txz:  Upgraded.
2018-05-31 23:39:35 +02:00
Patrick J Volkerding
d31c50870d Slackware 14.2
Thu Jun 30 20:26:57 UTC 2016
Slackware 14.2 x86_64 stable is released!

The long development cycle (the Linux community has lately been living in
"interesting times", as they say) is finally behind us, and we're proud to
announce the release of Slackware 14.2.  The new release brings many updates
and modern tools, has switched from udev to eudev (no systemd), and adds
well over a hundred new packages to the system.  Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
32-bit/64-bit x86/x86_64 DVD.  Please consider supporting the Slackware
project by picking up a copy from store.slackware.com.  We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Have fun!  :-)
2018-05-31 23:31:18 +02:00
Patrick J Volkerding
76fc4757ac Slackware 14.1
Mon Nov  4 17:08:47 UTC 2013
Slackware 14.1 x86_64 stable is released!

It's been another interesting release cycle here at Slackware bringing
new features like support for UEFI machines, updated compilers and
development tools, the switch from MySQL to MariaDB, and many more
improvements throughout the system.  Thanks to the team, the upstream
developers, the dedicated Slackware community, and everyone else who
pitched in to help make this release a reality.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a
dual-sided
32-bit/64-bit x86/x86_64 DVD.  Please consider supporting the Slackware
project by picking up a copy from store.slackware.com.  We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Have fun!  :-)
2018-05-31 22:57:36 +02:00
Patrick J Volkerding
9664bee729 Slackware 14.0
Wed Sep 26 01:10:42 UTC 2012
Slackware 14.0 x86_64 stable is released!

We're perfectionists here at Slackware, so this release has been a long
time a-brewing.  But we think you'll agree that it was worth the wait.
Slackware 14.0 combines modern components, ease of use, and flexible
configuration... our "KISS" philosophy demands it.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a
dual-sided
32-bit/64-bit x86/x86_64 DVD.  Please consider supporting the Slackware
project by picking up a copy from store.slackware.com.  We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Thanks to everyone who helped make this happen.  The Slackware team, the
upstream developers, and (of course) the awesome Slackware user
community.

Have fun!  :-)
2018-05-31 22:51:55 +02:00
Patrick J Volkerding
75a4a592e5 Slackware 13.37
Mon Apr 25 13:37:00 UTC 2011
Slackware 13.37 x86_64 stable is released!

Thanks to everyone who pitched in on this release: the Slackware team,
the folks producing upstream code, and linuxquestions.org for providing
a great forum for collaboration and testing.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a
dual-sided
32-bit/64-bit x86/x86_64 DVD.  Please consider supporting the Slackware
project by picking up a copy from store.slackware.com.  We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

As always, thanks to the Slackware community for testing, suggestions,
and feedback.  :-)

Have fun!
2018-05-31 22:45:18 +02:00
Patrick J Volkerding
b76270bf9e Slackware 13.1
Wed May 19 08:58:23 UTC 2010
Slackware 13.1 x86_64 stable is released!
Lots of thanks are due -- see the RELEASE_NOTES and the rest of the
ChangeLog for credits.  The ISOs are on their way to replication,
a 6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD.
We are taking pre-orders now at store.slackware.com, and offering
a discount if you sign up for a subscription.  Consider picking up
a copy to help support the project.  Thanks again to the Slackware
community for testing, contributing, and generally holding us to a
high level of quality.  :-)
Enjoy!
2018-05-31 22:43:05 +02:00
Patrick J Volkerding
5a12e7c134 Slackware 13.0
Wed Aug 26 10:00:38 CDT 2009
Slackware 13.0 x86_64 is released as stable!  Thanks to everyone who
helped make this release possible -- see the RELEASE_NOTES for the
credits.  The ISOs are off to the replicator.  This time it will be a
6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD.
We're taking pre-orders now at store.slackware.com.  Please consider
picking up a copy to help support the project.  Once again, thanks to
the entire Slackware community for all the help testing and fixing
things and offering suggestions during this development cycle.
As always, have fun and enjoy!  -P.
2018-05-31 22:41:17 +02:00