Commit graph

15 commits

Author SHA1 Message Date
Patrick J Volkerding
054967ebe9 Mon Aug 5 21:58:24 UTC 2024
a/cracklib-2.10.2-x86_64-1.txz:  Upgraded.
ap/ksh93-1.0.10-x86_64-1.txz:  Upgraded.
ap/nvme-cli-2.10.2-x86_64-1.txz:  Upgraded.
d/Cython-3.0.11-x86_64-1.txz:  Upgraded.
d/binutils-2.43-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/cmake-3.30.2-x86_64-1.txz:  Upgraded.
  Recompiled against binutils-2.43.
d/oprofile-1.4.0-x86_64-14.txz:  Rebuilt.
kde/calligra-3.2.1-x86_64-43.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/cantor-23.08.5-x86_64-9.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/kfilemetadata-5.116.0-x86_64-5.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/kile-2.9.93-x86_64-36.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/kitinerary-23.08.5-x86_64-7.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/krita-5.2.3-x86_64-3.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/kstars-3.7.2-x86_64-1.txz:  Upgraded.
kde/labplot-2.11.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
kde/libindi-2.0.9-x86_64-1.txz:  Upgraded.
kde/okular-23.08.5-x86_64-7.txz:  Rebuilt.
  Recompiled against poppler-24.08.0.
l/SDL2-2.30.6-x86_64-1.txz:  Upgraded.
l/abseil-cpp-20240722.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/ffmpeg-6.1.2-x86_64-1.txz:  Upgraded.
  This is a temporary improvment. ;-)
l/fluidsynth-2.3.6-x86_64-1.txz:  Upgraded.
l/libdeflate-1.21-x86_64-1.txz:  Upgraded.
l/libnvme-1.10-x86_64-1.txz:  Upgraded.
l/mozilla-nss-3.103-x86_64-1.txz:  Upgraded.
l/mozjs115-115.14.0esr-x86_64-1.txz:  Upgraded.
l/poppler-24.08.0-x86_64-2.txz:  Rebuilt.
  Shared library .so-version bump.
l/protobuf-27.3-x86_64-2.txz:  Rebuilt.
  Recompiled against abseil-cpp-20240722.0.
l/python-wheel-0.44.0-x86_64-1.txz:  Upgraded.
l/readline-8.2.013-x86_64-1.txz:  Upgraded.
n/c-ares-1.33.0-x86_64-1.txz:  Upgraded.
n/mosh-1.4.0-x86_64-3.txz:  Rebuilt.
  Recompiled against abseil-cpp-20240722.0.
x/libFS-1.0.10-x86_64-1.txz:  Upgraded.
x/libXfont2-2.0.7-x86_64-1.txz:  Upgraded.
x/libXtst-1.2.5-x86_64-1.txz:  Upgraded.
x/x11perf-1.7.0-x86_64-1.txz:  Upgraded.
xap/pavucontrol-6.1-x86_64-1.txz:  Upgraded.
2024-08-06 01:03:55 +02:00
Patrick J Volkerding
7b9b973e94 Tue Jan 30 22:01:28 UTC 2024
a/lzip-1.24-x86_64-1.txz:  Upgraded.
a/openssl-solibs-3.2.1-x86_64-1.txz:  Upgraded.
ap/alsa-utils-1.2.11-x86_64-1.txz:  Upgraded.
ap/sqlite-3.45.1-x86_64-1.txz:  Upgraded.
d/binutils-2.42-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/cmake-3.28.2-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-13.txz:  Rebuilt.
  Recompiled against binutils-2.42.
d/strace-6.7-x86_64-1.txz:  Upgraded.
kde/digikam-8.2.0-x86_64-5.txz:  Rebuilt.
  Recompiled against libpng-1.6.42.
l/alsa-lib-1.2.11-x86_64-1.txz:  Upgraded.
l/libpng-1.6.42-x86_64-1.txz:  Upgraded.
  Fixed the implementation of the macro function png_check_sig().
  This was an API regression, introduced in libpng-1.6.41.
  Reported by Matthieu Darbois.
l/lmdb-0.9.32-x86_64-1.txz:  Upgraded.
l/neon-0.33.0-x86_64-1.txz:  Upgraded.
l/opencv-4.9.0-x86_64-3.txz:  Rebuilt.
  Recompiled against libpng-1.6.42.
l/qt5-5.15.12_20240103_b8fd1448-x86_64-4.txz:  Rebuilt.
  Recompiled against libpng-1.6.42.
l/talloc-2.4.2-x86_64-1.txz:  Upgraded.
l/tdb-1.4.10-x86_64-1.txz:  Upgraded.
l/tevent-0.16.1-x86_64-1.txz:  Upgraded.
n/openldap-2.6.7-x86_64-1.txz:  Upgraded.
n/openssl-3.2.1-x86_64-1.txz:  Upgraded.
  This update fixes possible denial-of-service security issues:
  A file in PKCS12 format can contain certificates and keys and may come from
  an untrusted source. The PKCS12 specification allows certain fields to be
  NULL, but OpenSSL did not correctly check for this case. A fix has been
  applied to prevent a NULL pointer dereference that results in OpenSSL
  crashing. If an application processes PKCS12 files from an untrusted source
  using the OpenSSL APIs then that application will be vulnerable to this
  issue prior to this fix.
  OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
  PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
  and PKCS12_newpass().
  When function EVP_PKEY_public_check() is called on RSA public keys,
  a computation is done to confirm that the RSA modulus, n, is composite.
  For valid RSA keys, n is a product of two or more large primes and this
  computation completes quickly. However, if n is an overly large prime,
  then this computation would take a long time.
  An application that calls EVP_PKEY_public_check() and supplies an RSA key
  obtained from an untrusted source could be vulnerable to a Denial of Service
  attack.
  The function EVP_PKEY_public_check() is not called from other OpenSSL
  functions however it is called from the OpenSSL pkey command line
  application. For that reason that application is also vulnerable if used
  with the "-pubin" and "-check" options on untrusted data.
  To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will
  now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.
  Fix excessive time spent in DH check / generation with large Q parameter
  value.
  Applications that use the functions DH_generate_key() to generate an
  X9.42 DH key may experience long delays. Likewise, applications that use
  DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
  to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
  Where the key or parameters that are being checked have been obtained from
  an untrusted source this may lead to a Denial of Service.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-0727
    https://www.cve.org/CVERecord?id=CVE-2023-6237
    https://www.cve.org/CVERecord?id=CVE-2023-5678
  (* Security fix *)
xap/MPlayer-20240130-x86_64-1.txz:  Upgraded.
  Fixed build script to exit on errors.
  Patched to build against gettext-0.22.4.
  Thanks to Matteo Bernardini.
xap/xine-lib-1.2.13-x86_64-7.txz:  Rebuilt.
  Recompiled against libpng-1.6.42.
2024-01-30 23:34:34 +01:00
Patrick J Volkerding
9cc1c3b360 Wed Jan 18 06:11:54 UTC 2023
ap/diffutils-3.9-x86_64-1.txz:  Upgraded.
ap/lsof-4.97.0-x86_64-1.txz:  Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz:  Upgraded.
d/binutils-2.40-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-11.txz:  Rebuilt.
  Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy allows a backend to trigger HTTP response splitting.
  mod_proxy_ajp possible request smuggling.
  mod_dav out of bounds read, or write of zero byte.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.55
    https://www.cve.org/CVERecord?id=CVE-2022-37436
    https://www.cve.org/CVERecord?id=CVE-2022-36760
    https://www.cve.org/CVERecord?id=CVE-2006-20001
  (* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz:  Upgraded.
  Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.15-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Infinite loop on unclosed comments.
  Runaway loop with width of 0 and enormous height.
  Compression commands depend on $PATH.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-46285
    https://www.cve.org/CVERecord?id=CVE-2022-44617
    https://www.cve.org/CVERecord?id=CVE-2022-4883
  (* Security fix *)
x/libinput-1.22.1-x86_64-1.txz:  Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  Thanks to marav for the build help.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
    https://www.cve.org/CVERecord?id=CVE-2023-23597
    https://www.cve.org/CVERecord?id=CVE-2023-23598
    https://www.cve.org/CVERecord?id=CVE-2023-23599
    https://www.cve.org/CVERecord?id=CVE-2023-23600
    https://www.cve.org/CVERecord?id=CVE-2023-23601
    https://www.cve.org/CVERecord?id=CVE-2023-23602
    https://www.cve.org/CVERecord?id=CVE-2023-23603
    https://www.cve.org/CVERecord?id=CVE-2023-23604
    https://www.cve.org/CVERecord?id=CVE-2023-23605
    https://www.cve.org/CVERecord?id=CVE-2023-23606
  (* Security fix *)
2023-01-18 08:41:55 +01:00
Patrick J Volkerding
26d50f2136 Wed Aug 10 18:50:54 UTC 2022
a/kernel-firmware-20220810_ad5ae82-noarch-1.txz:  Upgraded.
d/binutils-2.39-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-10.txz:  Rebuilt.
  Recompiled against binutils-2.39.
l/gdk-pixbuf2-2.42.9-x86_64-1.txz:  Upgraded.
l/nodejs-18.7.0-x86_64-1.txz:  Upgraded.
  Might as well go with the latest version of this since everyone else does.
  Fixed a sed substitution to get the correct lib${LIBDIRSUFFIX} in npm.js.
  Thanks to conraid and zerouno.
n/gpgme-1.18.0-x86_64-1.txz:  Upgraded.
n/libnftnl-1.2.3-x86_64-1.txz:  Upgraded.
n/nfs-utils-2.6.2-x86_64-1.txz:  Upgraded.
n/nftables-1.0.5-x86_64-1.txz:  Upgraded.
2022-08-11 07:00:16 +02:00
Patrick J Volkerding
d41c15fb24 Fri Feb 11 20:36:58 UTC 2022
a/kernel-firmware-20220209_6342082-noarch-1.txz:  Upgraded.
a/kernel-generic-5.16.9-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.16.9-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.16.9-x86_64-1.txz:  Upgraded.
ap/qpdf-10.6.1-x86_64-1.txz:  Upgraded.
d/binutils-2.38-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.16.9-x86-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-9.txz:  Rebuilt.
  Recompiled against binutils-2.38.
k/kernel-source-5.16.9-noarch-1.txz:  Upgraded.
l/glib2-2.70.4-x86_64-1.txz:  Upgraded.
n/ModemManager-1.18.6-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.34.0-x86_64-1.txz:  Upgraded.
n/libqmi-1.30.4-x86_64-1.txz:  Upgraded.
x/ibus-table-1.16.7-x86_64-1.txz:  Upgraded.
x/xorg-server-1.20.14-x86_64-3.txz:  Rebuilt.
  Rebuilt using --with-xkb-path=/usr/share/X11/xkb. Thanks to TheRealGrogan.
  Bump OS name: --with-os-name="Slackware 15.1".
x/xorg-server-xephyr-1.20.14-x86_64-3.txz:  Rebuilt.
x/xorg-server-xnest-1.20.14-x86_64-3.txz:  Rebuilt.
x/xorg-server-xvfb-1.20.14-x86_64-3.txz:  Rebuilt.
x/xorg-server-xwayland-21.1.4-x86_64-2.txz:  Rebuilt.
  Rebuilt using -Dxkb_dir=/usr/share/X11/xkb.
xap/libnma-1.8.34-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-02-12 00:39:50 +01:00
Patrick J Volkerding
34ba4d05d9 Sun Aug 29 18:23:50 UTC 2021
ap/man-pages-5.13-noarch-1.txz:  Upgraded.
d/binutils-2.37-x86_64-1.txz:  Upgraded.
  With a few upstream patches to fix some regressions in the release, we no
  longer get any new FTBFS with this, so we'll take it.
d/oprofile-1.4.0-x86_64-8.txz:  Rebuilt.
  Recompiled against binutils-2.37.
kde/sddm-0.19.0-x86_64-8.txz:  Rebuilt.
  Patched to fix build.
l/libcap-2.54-x86_64-1.txz:  Upgraded.
l/libssh-0.9.6-x86_64-1.txz:  Upgraded.
  Fix possible heap-buffer overflow when rekeying with different key exchange
  mechanism.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
  (* Security fix *)
l/qt5-5.15.3_20210826_21ea9c12-x86_64-1.txz:  Upgraded.
  Switched to the patched qt5 from https://invent.kde.org/qt/qt/qt5.git.
  Huge thanks to Heinz Wiesinger for the script to create a release tarball.
  Likely this fixes many security issues.
  (* Security fix *)
x/libglvnd-1.3.3-x86_64-1.txz:  Upgraded.
  Reverted to this version because changes to the header files won't allow the
  EGL portions of Qt to properly compile.
2021-08-30 08:59:55 +02:00
Patrick J Volkerding
b42f821834 Fri Feb 12 21:42:42 UTC 2021
a/inih-53-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20210211_f7915a0-noarch-1.txz:  Upgraded.
a/util-linux-2.36.2-x86_64-1.txz:  Upgraded.
d/binutils-2.36.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-6.txz:  Rebuilt.
  Recompiled against binutils-2.36.1.
kde/digikam-7.1.0-x86_64-4.txz:  Rebuilt.
  Recompiled against imagemagick-7.0.10_62.
l/glib2-2.66.7-x86_64-1.txz:  Upgraded.
l/openexr-2.5.5-x86_64-1.txz:  Upgraded.
2021-02-13 08:59:53 +01:00
Patrick J Volkerding
2c78f43e26 Sat Jan 30 21:55:04 UTC 2021
a/e2fsprogs-1.46.0-x86_64-1.txz:  Upgraded.
a/kernel-generic-5.10.12-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.10.12-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.10.12-x86_64-1.txz:  Upgraded.
a/sysklogd-2.2.1-x86_64-1.txz:  Upgraded.
d/binutils-2.35.2-x86_64-1.txz:  Upgraded.
  We're probably better off with this branch for now.
d/kernel-headers-5.10.12-x86-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-5.txz:  Rebuilt.
  Recompiled against binutils-2.35.2.
k/kernel-source-5.10.12-noarch-1.txz:  Upgraded.
l/gd-2.3.1-x86_64-1.txz:  Upgraded.
l/libwebp-1.2.0-x86_64-1.txz:  Upgraded.
l/python-packaging-20.9-x86_64-1.txz:  Upgraded.
x/fcitx-libpinyin-0.5.4-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2021-01-31 08:59:50 +01:00
Patrick J Volkerding
e833eebc98 Tue Jan 26 21:20:58 UTC 2021
ap/sudo-1.9.5p2-x86_64-1.txz:  Upgraded.
  When invoked as sudoedit, the same set of command line options
  are now accepted as for "sudo -e". The -H and -P options are
  now rejected for sudoedit and "sudo -e" which matches the sudo
  1.7 behavior. This is part of the fix for CVE-2021-3156.
  Fixed a potential buffer overflow when unescaping backslashes
  in the command's arguments. Normally, sudo escapes special
  characters when running a command via a shell (sudo -s or sudo
  -i). However, it was also possible to run sudoedit with the -s
  or -i flags in which case no escaping had actually been done,
  making a buffer overflow possible. This fixes CVE-2021-3156.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156
  (* Security fix *)
d/binutils-2.36-x86_64-2.txz:  Rebuilt.
  Revert commit d1bcae833b32f1408485ce69f844dcd7ded093a8:
  [PATCH] ELF: Don't generate unused section symbols
  This fixes building the kernel.
l/loudmouth-1.5.4-x86_64-1.txz:  Upgraded.
n/autofs-5.1.7-x86_64-1.txz:  Upgraded.
n/dnsmasq-2.84-x86_64-1.txz:  Upgraded.
n/tin-2.4.5-x86_64-1.txz:  Upgraded.
xap/gparted-1.2.0-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-78.7.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/78.7.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2021-05/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964
  (* Security fix *)
2021-01-27 14:59:56 +01:00
Patrick J Volkerding
3f5ef65db8 Thu Dec 3 23:52:38 UTC 2020
a/kernel-generic-5.4.81-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.4.81-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.4.81-x86_64-1.txz:  Upgraded.
ap/cups-filters-1.28.6-x86_64-1.txz:  Upgraded.
ap/nano-5.4-x86_64-1.txz:  Upgraded.
d/binutils-2.35.1-x86_64-1.txz:  Upgraded.
d/gcc-10.2.0-x86_64-2.txz:  Rebuilt.
  These are the same GCC packages that were previously in /testing.
d/gcc-brig-10.2.0-x86_64-2.txz:  Rebuilt.
d/gcc-g++-10.2.0-x86_64-2.txz:  Rebuilt.
d/gcc-gdc-10.2.0-x86_64-2.txz:  Rebuilt.
  Shared library .so-version bump.
d/gcc-gfortran-10.2.0-x86_64-2.txz:  Rebuilt.
d/gcc-gnat-10.2.0-x86_64-2.txz:  Rebuilt.
d/gcc-go-10.2.0-x86_64-2.txz:  Rebuilt.
  Shared library .so-version bump.
d/gcc-objc-10.2.0-x86_64-2.txz:  Rebuilt.
d/kernel-headers-5.4.81-x86-1.txz:  Upgraded.
d/libtool-2.4.6-x86_64-14.txz:  Rebuilt.
  Recompiled to update embedded GCC version number.
d/mercurial-5.6.1-x86_64-1.txz:  Upgraded.
d/oprofile-1.4.0-x86_64-2.txz:  Rebuilt.
d/python-pip-20.3.1-x86_64-1.txz:  Upgraded.
k/kernel-source-5.4.81-noarch-1.txz:  Upgraded.
 GCC_VERSION 90300 -> 100200
l/PyQt5-5.15.2-x86_64-1.txz:  Upgraded.
l/glibmm-2.64.5-x86_64-1.txz:  Upgraded.
x/mesa-20.3.0-x86_64-1.txz:  Upgraded.
xap/geeqie-1.6-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-78.5.1-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/78.5.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-53/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26970
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2020-12-04 08:59:50 +01:00
Patrick J Volkerding
1d9c56ff69 Sat Feb 2 22:09:17 UTC 2019
ap/qpdf-8.4.0-x86_64-1.txz:  Upgraded.
d/Cython-0.29.4-x86_64-1.txz:  Upgraded.
d/binutils-2.32-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Is it safe to use --enable-initfini-array yet? Guess we'll find out.
d/cmake-3.13.4-x86_64-1.txz:  Upgraded.
d/mercurial-4.9-x86_64-1.txz:  Upgraded.
d/oprofile-1.3.0-x86_64-2.txz:  Rebuilt.
  Recompiled against binutils-2.32.
n/iw-5.0-x86_64-1.txz:  Upgraded.
n/mutt-1.11.3-x86_64-1.txz:  Upgraded.
x/libva-utils-2.4.0-x86_64-1.txz:  Upgraded.
2019-02-03 08:59:45 +01:00
Patrick J Volkerding
ce9883adca Thu Sep 6 06:15:46 UTC 2018
a/acpid-2.0.30-x86_64-1.txz:  Upgraded.
a/etc-15.0-x86_64-9.txz:  Rebuilt.
  Added support for /etc/ld.so.conf.d/. Thanks to Qury.
a/kernel-firmware-20180904_85c5d90-noarch-1.txz:  Upgraded.
a/kernel-generic-4.14.68-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.14.68-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.14.68-x86_64-1.txz:  Upgraded.
a/pkgtools-15.0-noarch-22.txz:  Rebuilt.
  installpkg: prevent noise from the "stray cat" if tar hands it a broken
  pipe. Thanks to ivandi.
  Also (in the comments) provide a possibly better but untested solution.
  Thanks to SeB.
a/sysvinit-2.90-x86_64-2.txz:  Rebuilt.
  sysvinit-2.90 added an undocumented feature that tries to spawn agetty
  if it sees console= in the kernel command line. Avoiding the debate about
  whether this code belongs in init at all, at least such a change should
  be documented, and probably made opt-in. This patch disables the new
  behavior unless "sysvinit_agetty" is also seen in the kernel command line.
  It seems like this might have been something added for Hurd, and it might
  be wise to stick to what we've got rather than following upstream on this
  particular package. If anyone notices any other odd behavior, please let
  me know. Thanks to shastah.
a/sysvinit-scripts-2.1-noarch-19.txz:  Rebuilt.
  When checking for intel_pstate, direct the stderr to /dev/null in case
  the file doesn't exist in /sys. Thanks to ivandi.
  Allow forcing an option by editing /etc/default/cpufreq.
ap/cups-filters-1.21.2-x86_64-1.txz:  Upgraded.
ap/ghostscript-9.24-x86_64-1.txz:  Upgraded.
  Patched multiple -dSAFER sandbox bypass vulnerabilities.
  Thanks to Tavis Ormandy.
  For more information, see:
    https://www.ghostscript.com/doc/9.24/News.htm
    https://www.kb.cert.org/vuls/id/332928
  (* Security fix *)
ap/sudo-1.8.25-x86_64-1.txz:  Upgraded.
d/binutils-2.31.1-x86_64-2.txz:  Rebuilt.
  elf.c (_bfd_elf_get_symbol_version_string): Return _("<corrupt>") for
  corrupt symbol version info.
  elflink.c (bfd_elf_record_link_assignment): Always clear h->verinfo.verdef
  when overriding a dynamic definition.
  Thanks to Michael Short for pointing out the upstream patches.
d/ccache-3.4.3-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.14.68-x86-1.txz:  Upgraded.
d/llvm-6.0.1-x86_64-2.txz:  Rebuilt.
  Recompiled with -DCLANG_BUILD_SHARED_LIBS=ON to fix issues when multiple
  OpenCL drivers are installed. Thanks to Heinz Wiesinger.
d/mercurial-4.7.1-x86_64-1.txz:  Upgraded.
k/kernel-source-4.14.68-noarch-1.txz:  Upgraded.
l/mozilla-nss-3.39-x86_64-1.txz:  Upgraded.
n/curl-7.61.1-x86_64-1.txz:  Upgraded.
  This update fixes an NTLM password overflow via integer overflow.
  For more information, see:
    https://curl.haxx.se/docs/CVE-2018-14618.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
  (* Security fix *)
n/gnupg2-2.2.10-x86_64-1.txz:  Upgraded.
n/libtirpc-1.1.4-x86_64-1.txz:  Upgraded.
n/netatalk-3.1.11-x86_64-2.txz:  Rebuilt.
  rc.atalk: fixed errors in status output. Thanks to marav.
n/nghttp2-1.33.0-x86_64-1.txz:  Upgraded.
n/p11-kit-0.23.14-x86_64-1.txz:  Upgraded.
n/stunnel-5.49-x86_64-1.txz:  Upgraded.
x/libdrm-2.4.94-x86_64-1.txz:  Upgraded.
x/xf86-video-ati-20180824_de88ea27-x86_64-1.txz:  Upgraded.
xap/hexchat-2.14.2-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-60.2.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
  (* Security fix *)
xap/xlockmore-5.56-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2018-09-06 18:00:33 +02:00
Patrick J Volkerding
67886560b2 Sat Jul 14 21:49:31 UTC 2018
l/pulseaudio-12.1-x86_64-1.txz:  Upgraded.
l/utf8proc-2.1.1-x86_64-1.txz:  Upgraded.
2018-07-15 09:00:34 +02:00
Patrick J Volkerding
646a5c1cbf Mon May 28 19:12:29 UTC 2018
a/pkgtools-15.0-noarch-13.txz:  Rebuilt.
  installpkg: default line length for --terselength is the number of columns.
  removepkg: added --terse mode.
  upgradepkg: default line length for --terselength is the number of columns.
  upgradepkg: accept -option in addition to --option.
ap/vim-8.1.0026-x86_64-1.txz:  Upgraded.
d/bison-3.0.5-x86_64-1.txz:  Upgraded.
e/emacs-26.1-x86_64-1.txz:  Upgraded.
kde/kopete-4.14.3-x86_64-8.txz:  Rebuilt.
  Recompiled against libidn-1.35.
n/conntrack-tools-1.4.5-x86_64-1.txz:  Upgraded.
n/libnetfilter_conntrack-1.0.7-x86_64-1.txz:  Upgraded.
n/libnftnl-1.1.0-x86_64-1.txz:  Upgraded.
n/links-2.16-x86_64-2.txz:  Rebuilt.
  Rebuilt to enable X driver for -g mode.
n/lynx-2.8.9dev.19-x86_64-1.txz:  Upgraded.
n/nftables-0.8.5-x86_64-1.txz:  Upgraded.
n/p11-kit-0.23.11-x86_64-1.txz:  Upgraded.
n/ulogd-2.0.7-x86_64-1.txz:  Upgraded.
n/whois-5.3.1-x86_64-1.txz:  Upgraded.
xap/network-manager-applet-1.8.12-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.1.0026-x86_64-1.txz:  Upgraded.
2018-05-31 23:39:35 +02:00
Patrick J Volkerding
d31c50870d Slackware 14.2
Thu Jun 30 20:26:57 UTC 2016
Slackware 14.2 x86_64 stable is released!

The long development cycle (the Linux community has lately been living in
"interesting times", as they say) is finally behind us, and we're proud to
announce the release of Slackware 14.2.  The new release brings many updates
and modern tools, has switched from udev to eudev (no systemd), and adds
well over a hundred new packages to the system.  Thanks to the team, the
upstream developers, the dedicated Slackware community, and everyone else
who pitched in to help make this release a reality.

The ISOs are off to be replicated, a 6 CD-ROM 32-bit set and a dual-sided
32-bit/64-bit x86/x86_64 DVD.  Please consider supporting the Slackware
project by picking up a copy from store.slackware.com.  We're taking
pre-orders now, and offer a discount if you sign up for a subscription.

Have fun!  :-)
2018-05-31 23:31:18 +02:00