Commit graph

168 commits

Author SHA1 Message Date
Patrick J Volkerding
ad19829da8 Thu Nov 16 20:51:47 UTC 2023
l/jasper-4.1.0-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.85-x86_64-1.txz:  Upgraded.
l/sof-firmware-2023.09.2-noarch-1.txz:  Upgraded.
n/gnutls-3.8.2-x86_64-1.txz:  Upgraded.
n/libksba-1.6.5-x86_64-1.txz:  Upgraded.
xap/pan-0.155-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.74.0-x86_64-1.txz:  Upgraded.
2023-11-16 22:35:27 +01:00
Patrick J Volkerding
6057bc3cac Sat Oct 28 22:03:51 UTC 2023
d/rust-1.70.0-x86_64-3.txz:  Rebuilt.
  Fixed the installation of rls and added rust-analyzer (the successor to rls)
  and rust-demangler. Thanks to Heinz Wiesinger.
l/enchant-2.6.2-x86_64-1.txz:  Upgraded.
l/gexiv2-0.14.2-x86_64-2.txz:  Rebuilt.
  Recompiled against exiv2-0.28.0.
l/libsigc++3-3.6.0-x86_64-1.txz:  Upgraded.
l/vid.stab-1.1.1-x86_64-1.txz:  Upgraded.
x/ibus-m17n-1.4.23-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.73.0-x86_64-2.txz:  Rebuilt.
  Fixed the installation of rls and added rust-analyzer (the successor to rls)
  and rust-demangler. Thanks to Heinz Wiesinger.
2023-10-29 00:33:21 +02:00
Patrick J Volkerding
ce35a4d47a Wed Oct 11 22:22:40 UTC 2023
l/libcaca-0.99.beta20-x86_64-1.txz:  Upgraded.
  Fixed a crash bug (a crafted file defining width of zero leads to divide by
  zero and a crash). Seems to be merely a bug rather than a security issue, but
  I'd been meaning to get beta20 building so this was a good excuse.
  Thanks to marav.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-0856
  (* Security fix *)
l/libcue-2.3.0-x86_64-1.txz:  Upgraded.
xap/xscreensaver-6.08-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.73.0-x86_64-1.txz:  Upgraded.
2023-10-12 01:04:01 +02:00
Patrick J Volkerding
b29a454a1a Mon Oct 9 18:10:01 UTC 2023
a/aaa_glibc-solibs-2.38-x86_64-2.txz:  Rebuilt.
ap/qpdf-11.6.2-x86_64-1.txz:  Upgraded.
ap/vim-9.0.2009-x86_64-1.txz:  Upgraded.
l/desktop-file-utils-0.27-x86_64-1.txz:  Upgraded.
l/glibc-2.38-x86_64-2.txz:  Rebuilt.
  These glibc packages are the exact ones that were previously in /testing.
  A test mass rebuild was done here finding no new FTBFS, so I think these
  are good to go. :)
l/glibc-i18n-2.38-x86_64-2.txz:  Rebuilt.
l/glibc-profile-2.38-x86_64-2.txz:  Rebuilt.
l/imagemagick-7.1.1_20-x86_64-1.txz:  Upgraded.
l/libxkbcommon-1.6.0-x86_64-1.txz:  Upgraded.
l/shared-mime-info-2.3-x86_64-1.txz:  Upgraded.
n/c-ares-1.20.0-x86_64-1.txz:  Upgraded.
n/libtirpc-1.3.4-x86_64-1.txz:  Upgraded.
n/proftpd-1.3.8a-x86_64-1.txz:  Upgraded.
n/whois-5.5.19-x86_64-1.txz:  Upgraded.
  Fixed english support for Japanese queries to not add again the /e argument
  if it had already been provided by the user. (Closes: #1050171)
  Added the .ye and .*************** (.xn--54b7fta0cc, Bangladesh) TLD servers.
  Updated the .ba, .bb, .dk, .es, .gt, .jo, .ml, .mo, .pa, .pn, .sv, .uy,
  .a+-la-r+-d+.n+, (.xn--mgbayh7gpa, Jordan) and .****** (.xn--mix891f, Macao)
  TLD servers.
  Upgraded the TLD URLs to HTTPS whenever possible.
  Updated the charset for whois.jprs.jp.
  Removed 3 new gTLDs which are no longer active.
  Removed support for the obsolete as32 dot notation.
x/xterm-386-x86_64-1.txz:  Upgraded.
xap/vim-gvim-9.0.2009-x86_64-1.txz:  Upgraded.
2023-10-09 20:34:39 +02:00
Patrick J Volkerding
7a2ee07f95 Tue Oct 3 22:19:10 UTC 2023
a/aaa_glibc-solibs-2.37-x86_64-3.txz:  Rebuilt.
a/dialog-1.3_20231002-x86_64-1.txz:  Upgraded.
ap/mpg123-1.32.3-x86_64-1.txz:  Upgraded.
d/llvm-17.0.2-x86_64-1.txz:  Upgraded.
d/meson-1.2.2-x86_64-2.txz:  Rebuilt.
  [PATCH] Revert rust: apply global, project, and environment C args to bindgen.
  This fixes building Mesa.
  Thanks to lucabon and marav.
kde/calligra-3.2.1-x86_64-34.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/cantor-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kfilemetadata-5.110.0-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kile-2.9.93-x86_64-28.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kitinerary-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/krita-5.1.5-x86_64-15.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/okular-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
l/glibc-2.37-x86_64-3.txz:  Rebuilt.
l/glibc-i18n-2.37-x86_64-3.txz:  Rebuilt.
  Patched to fix the "Looney Tunables" vulnerability, a local privilege
  escalation in ld.so. This vulnerability was introduced in April 2021
  (glibc 2.34) by commit 2ed18c.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
    https://www.cve.org/CVERecord?id=CVE-2023-4911
  (* Security fix *)
l/glibc-profile-2.37-x86_64-3.txz:  Rebuilt.
l/mozilla-nss-3.94-x86_64-1.txz:  Upgraded.
l/poppler-23.10.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/NetworkManager-1.44.2-x86_64-1.txz:  Upgraded.
n/irssi-1.4.5-x86_64-1.txz:  Upgraded.
x/fcitx5-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-anthy-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-gtk-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-hangul-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-kkc-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-m17n-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-sayura-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-table-extra-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-table-other-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-unikey-5.1.1-x86_64-1.txz:  Upgraded.
x/libX11-1.8.7-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  libX11: out-of-bounds memory access in _XkbReadKeySyms().
  libX11: stack exhaustion from infinite recursion in PutSubImage().
  libX11: integer overflow in XCreateImage() leading to a heap overflow.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-October/003424.html
    https://www.cve.org/CVERecord?id=CVE-2023-43785
    https://www.cve.org/CVERecord?id=CVE-2023-43786
    https://www.cve.org/CVERecord?id=CVE-2023-43787
  (* Security fix *)
x/libXpm-3.5.17-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  libXpm: out of bounds read in XpmCreateXpmImageFromBuffer().
  libXpm: out of bounds read on XPM with corrupted colormap.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-October/003424.html
    https://www.cve.org/CVERecord?id=CVE-2023-43788
    https://www.cve.org/CVERecord?id=CVE-2023-43789
  (* Security fix *)
testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz:  Rebuilt.
testing/packages/glibc-2.38-x86_64-2.txz:  Rebuilt.
  Patched to fix the "Looney Tunables" vulnerability, a local privilege
  escalation in ld.so. This vulnerability was introduced in April 2021
  (glibc 2.34) by commit 2ed18c.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
    https://www.cve.org/CVERecord?id=CVE-2023-4911
  (* Security fix *)
testing/packages/glibc-i18n-2.38-x86_64-2.txz:  Rebuilt.
testing/packages/glibc-profile-2.38-x86_64-2.txz:  Rebuilt.
2023-10-04 01:08:21 +02:00
Patrick J Volkerding
83bf1d11ee Fri Sep 29 19:45:18 UTC 2023
d/meson-1.2.2-x86_64-1.txz:  Upgraded.
l/nodejs-20.8.0-x86_64-1.txz:  Upgraded.
l/sof-firmware-2023.09-noarch-1.txz:  Upgraded.
n/bluez-5.70-x86_64-1.txz:  Upgraded.
n/php-8.2.11-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.php.net/ChangeLog-8.php#8.2.11
x/mesa-23.2.1-x86_64-1.txz:  Upgraded.
x/xman-1.1.6-x86_64-1.txz:  Upgraded.
xfce/xfce4-clipman-plugin-1.6.5-x86_64-1.txz:  Upgraded.
2023-09-29 22:31:51 +02:00
Patrick J Volkerding
e9c0b54c5c Thu Sep 28 21:37:06 UTC 2023
ap/mpg123-1.32.2-x86_64-1.txz:  Upgraded.
l/cairo-1.18.0-x86_64-1.txz:  Upgraded.
l/gtk4-4.12.3-x86_64-1.txz:  Upgraded.
x/fonttosfnt-1.2.3-x86_64-1.txz:  Upgraded.
xap/geeqie-2.1-x86_64-2.txz:  Rebuilt.
  Patched and recompiled against lua-5.4.6.
xap/mozilla-firefox-115.3.1esr-x86_64-1.txz:  Upgraded.
  This update contains a security fix.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/115.3.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
    https://www.cve.org/CVERecord?id=CVE-2023-5217
  (* Security fix *)
xfce/xfce4-panel-4.18.5-x86_64-1.txz:  Upgraded.
testing/packages/aaa_glibc-solibs-2.38-x86_64-1.txz:  Added.
testing/packages/glibc-2.38-x86_64-1.txz:  Added.
  Instead of building the deprecated glibc crypt library, bundle
  libxcrypt-4.4.36 (both .so.1 compat version and .so.2 new API version).
testing/packages/glibc-i18n-2.38-x86_64-1.txz:  Added.
testing/packages/glibc-profile-2.38-x86_64-1.txz:  Added.
2023-09-29 00:41:46 +02:00
Patrick J Volkerding
16d0eba8e3 Wed Sep 20 00:08:45 UTC 2023
a/gettext-0.22.1-x86_64-1.txz:  Upgraded.
a/kernel-firmware-20230918_3672cca-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.54-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.54-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.54-x86_64-1.txz:  Upgraded.
a/openssl-solibs-3.1.3-x86_64-1.txz:  Upgraded.
ap/ghostscript-10.02.0-x86_64-2.txz:  Rebuilt.
  [PATCH] PDF interpreter - fix PageList processing.
  Thanks to denydias.
d/gettext-tools-0.22.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.54-x86-1.txz:  Upgraded.
k/kernel-source-6.1.54-noarch-1.txz:  Upgraded.
l/dconf-editor-45.0-x86_64-1.txz:  Upgraded.
l/harfbuzz-8.2.1-x86_64-1.txz:  Upgraded.
l/nodejs-20.7.0-x86_64-1.txz:  Upgraded.
n/openssl-3.1.3-x86_64-1.txz:  Upgraded.
  This update fixes bugs and a security issue that does not affect Linux:
  Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-4807
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.72.1-x86_64-1.txz:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-09-20 03:08:36 +02:00
Patrick J Volkerding
69e2de1890 Sat Sep 9 18:05:16 UTC 2023
a/mcelog-195-x86_64-1.txz:  Upgraded.
d/rust-1.70.0-x86_64-2.txz:  Rebuilt.
  Fixed path in rust-lldb. Thanks to gildbg.
l/glib2-2.78.0-x86_64-1.txz:  Upgraded.
l/gobject-introspection-1.78.0-x86_64-1.txz:  Upgraded.
l/harfbuzz-8.2.0-x86_64-1.txz:  Upgraded.
l/nodejs-20.6.1-x86_64-1.txz:  Upgraded.
n/mutt-2.2.12-x86_64-1.txz:  Upgraded.
x/font-util-1.4.1-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.72.0-x86_64-2.txz:  Rebuilt.
  Fixed path in rust-lldb. Thanks to gildbg.
2023-09-09 20:30:33 +02:00
Patrick J Volkerding
d4b1ae07fb Sat Aug 26 05:08:30 UTC 2023
kde/calligra-3.2.1-x86_64-32.txz:  Rebuilt.
  Recompiled against okular-23.08.0.
l/freetype-2.13.2-x86_64-1.txz:  Upgraded.
n/bluez-5.69-x86_64-1.txz:  Upgraded.
t/fig2dev-3.2.9-x86_64-1.txz:  Upgraded.
t/xfig-3.2.9-x86_64-1.txz:  Upgraded.
x/libinput-1.24.0-x86_64-1.txz:  Upgraded.
x/xf86-input-libinput-1.4.0-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.72.0-x86_64-1.txz:  Upgraded.
2023-08-26 07:30:35 +02:00
Patrick J Volkerding
31c55fc733 Fri Aug 4 20:17:36 UTC 2023
a/hwdata-0.373-noarch-1.txz:  Upgraded.
a/kernel-firmware-20230731_253cc17-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.43-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.43-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.43-x86_64-1.txz:  Upgraded.
a/sysklogd-2.5.1-x86_64-1.txz:  Upgraded.
a/xz-5.4.4-x86_64-1.txz:  Upgraded.
ap/man-pages-6.05.01-noarch-1.txz:  Upgraded.
d/kernel-headers-6.1.43-x86-1.txz:  Upgraded.
k/kernel-source-6.1.43-noarch-1.txz:  Upgraded.
kde/ktextaddons-1.4.0-x86_64-1.txz:  Upgraded.
l/SDL2-2.28.2-x86_64-1.txz:  Upgraded.
l/harfbuzz-8.1.1-x86_64-1.txz:  Upgraded.
l/mozjs102-102.14.0esr-x86_64-1.txz:  Upgraded.
l/netpbm-11.03.01-x86_64-1.txz:  Upgraded.
l/openexr-3.1.10-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.77-x86_64-1.txz:  Upgraded.
l/poppler-23.08.0-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-115.1.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/115.1.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/
    https://www.cve.org/CVERecord?id=CVE-2023-4045
    https://www.cve.org/CVERecord?id=CVE-2023-4046
    https://www.cve.org/CVERecord?id=CVE-2023-4047
    https://www.cve.org/CVERecord?id=CVE-2023-4048
    https://www.cve.org/CVERecord?id=CVE-2023-4049
    https://www.cve.org/CVERecord?id=CVE-2023-4050
    https://www.cve.org/CVERecord?id=CVE-2023-4052
    https://www.cve.org/CVERecord?id=CVE-2023-4054
    https://www.cve.org/CVERecord?id=CVE-2023-4055
    https://www.cve.org/CVERecord?id=CVE-2023-4056
    https://www.cve.org/CVERecord?id=CVE-2023-4057
  (* Security fix *)
xap/mozilla-thunderbird-115.1.0-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.1.0/releasenotes/
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.71.1-x86_64-1.txz:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-08-04 23:53:29 +02:00
Patrick J Volkerding
b3d88c8ae0 Fri Jul 14 17:53:34 UTC 2023
ap/vim-9.0.1677-x86_64-1.txz:  Upgraded.
n/nftables-1.0.8-x86_64-1.txz:  Upgraded.
x/xeyes-1.3.0-x86_64-1.txz:  Upgraded.
xap/vim-gvim-9.0.1677-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.71.0-x86_64-1.txz:  Added.
2023-07-14 20:31:56 +02:00
Patrick J Volkerding
600ffa097b Wed Jul 12 20:41:16 UTC 2023
ap/inxi-3.3.28_1-noarch-1.txz:  Upgraded.
ap/sudo-1.9.14p1-x86_64-1.txz:  Upgraded.
d/rust-1.70.0-x86_64-1.txz:  Upgraded.
l/harfbuzz-8.0.1-x86_64-1.txz:  Upgraded.
l/lmdb-0.9.31-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.74-x86_64-1.txz:  Upgraded.
n/krb5-1.21.1-x86_64-1.txz:  Upgraded.
  Fix potential uninitialized pointer free in kadm5 XDR parsing.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-36054
  (* Security fix *)
n/libnftnl-1.2.6-x86_64-1.txz:  Upgraded.
n/nghttp2-1.55.0-x86_64-1.txz:  Upgraded.
n/openldap-2.6.5-x86_64-1.txz:  Upgraded.
x/ibus-table-1.17.1-x86_64-1.txz:  Upgraded.
x/xterm-384-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-115.0.2esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/115.0.2esr/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2023-26/
    https://www.cve.org/CVERecord?id=CVE-2023-3600
  (* Security fix *)
testing/packages/mozilla-thunderbird-115.0-x86_64-1.txz:  Added.
2023-07-12 23:32:20 +02:00
Patrick J Volkerding
7da4809348 Mon Jun 12 20:37:03 UTC 2023
ap/xorriso-1.5.6.pl01-x86_64-1.txz:  Upgraded.
d/rust-1.69.0-x86_64-1.txz:  Upgraded.
n/ntp-4.2.8p17-x86_64-2.txz:  Rebuilt.
  Fixed typo in ntp.conf comments.
  Fixed logic in ntp.logrotate to allow proper rotation on systems where ntpd
  is not automatically started at boot.
  Thanks to allend.
x/xkeyboard-config-2.39-noarch-1.txz:  Upgraded.
testing/packages/rust-1.70.0-x86_64-1.txz:  Upgraded.
2023-06-13 00:02:22 +02:00
Patrick J Volkerding
e4cf5f582a Tue Jun 6 20:26:59 UTC 2023
a/kernel-firmware-20230531_fc90c59-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.32-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.32-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.32-x86_64-1.txz:  Upgraded.
d/gcc-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-g++-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-gdc-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-gfortran-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-gm2-13.1.0-x86_64-2.txz:  Added.
d/gcc-gnat-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-go-13.1.0-x86_64-2.txz:  Rebuilt.
d/gcc-objc-13.1.0-x86_64-2.txz:  Rebuilt.
d/kernel-headers-6.1.32-x86-1.txz:  Upgraded.
d/libtool-2.4.7-x86_64-5.txz:  Rebuilt.
  Recompiled to update embedded GCC version number.
k/kernel-source-6.1.32-noarch-1.txz:  Upgraded.
kde/calligra-3.2.1-x86_64-30.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/cantor-23.04.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/kfilemetadata-5.106.0-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/kile-2.9.93-x86_64-25.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/kitinerary-23.04.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/krita-5.1.5-x86_64-10.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
kde/okteta-0.26.11-x86_64-1.txz:  Upgraded.
kde/okular-23.04.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.06.0.
l/enchant-2.5.0-x86_64-1.txz:  Upgraded.
l/gtk4-4.10.4-x86_64-1.txz:  Upgraded.
l/mozilla-nss-3.90-x86_64-1.txz:  Upgraded.
l/openexr-3.1.8-x86_64-1.txz:  Upgraded.
l/poppler-23.06.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/qtkeychain-0.14.1-x86_64-1.txz:  Upgraded.
n/krb5-1.21-x86_64-1.txz:  Upgraded.
n/ntp-4.2.8p17-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
n/postfix-3.8.1-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-23.1.2-x86_64-1.txz:  Upgraded.
x/xorgproto-2023.1-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-114.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/114.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2023-20/
    https://www.cve.org/CVERecord?id=CVE-2023-34414
    https://www.cve.org/CVERecord?id=CVE-2023-34415
    https://www.cve.org/CVERecord?id=CVE-2023-34416
    https://www.cve.org/CVERecord?id=CVE-2023-34417
  (* Security fix *)
xfce/xfce4-panel-profiles-1.0.14-x86_64-1.txz:  Upgraded.
extra/sendmail/sendmail-8.17.2-x86_64-2.txz:  Rebuilt.
  Recompiled without -DUSE_EAI or ICU libraries as this experimental option
  is still leading to regressions.
extra/sendmail/sendmail-cf-8.17.2-noarch-2.txz:  Rebuilt.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-06-07 00:59:33 +02:00
Patrick J Volkerding
d06ae62d99 Mon May 8 23:42:23 UTC 2023
a/less-633-x86_64-1.txz:  Upgraded.
ap/inxi-3.3.27_1-noarch-1.txz:  Upgraded.
d/rust-1.68.2-x86_64-2.txz:  Upgraded.
l/mlt-7.16.0-x86_64-1.txz:  Upgraded.
x/m17n-lib-1.8.1-x86_64-1.txz:  Upgraded.
x/xf86-video-dummy-0.4.1-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.69.0-x86_64-1.txz:  Upgraded.
2023-05-09 02:37:30 +02:00
Patrick J Volkerding
72f681b771 Fri May 5 22:49:16 UTC 2023
ap/at-3.2.5-x86_64-1.txz:  Upgraded.
l/babl-0.1.106-x86_64-1.txz:  Upgraded.
l/libdiscid-0.6.4-x86_64-2.txz:  Rebuilt.
  Patched to fix pkgconfig file. Thanks to ponce.
tcl/tclx-8.6.1-x86_64-1.txz:  Upgraded.
x/libevdev-1.13.1-x86_64-1.txz:  Upgraded.
x/xcalc-1.1.2-x86_64-1.txz:  Upgraded.
testing/packages/gcc-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-g++-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-gdc-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-gfortran-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-gm2-13.1.0-x86_64-2.txz:  Added.
testing/packages/gcc-gnat-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-go-13.1.0-x86_64-2.txz:  Rebuilt.
testing/packages/gcc-objc-13.1.0-x86_64-2.txz:  Rebuilt.
2023-05-06 01:34:25 +02:00
Patrick J Volkerding
4447b104f3 Thu Apr 27 04:40:20 UTC 2023
a/kernel-generic-6.1.26-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.26-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.26-x86_64-1.txz:  Upgraded.
ap/dc3dd-7.3.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.26-x86-1.txz:  Upgraded.
k/kernel-source-6.1.26-noarch-1.txz:  Upgraded.
l/harfbuzz-7.2.0-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/gcc-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-g++-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gdc-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gfortran-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gnat-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-go-13.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-objc-13.1.0-x86_64-1.txz:  Added.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-04-27 07:41:14 +02:00
Patrick J Volkerding
b689ecb882 Fri Mar 31 18:01:09 UTC 2023
a/kernel-generic-6.1.22-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.22-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.22-x86_64-1.txz:  Upgraded.
a/mkinitrd-1.4.11-x86_64-32.txz:  Rebuilt.
  Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha.
d/cmake-3.26.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.22-x86-1.txz:  Upgraded.
d/llvm-16.0.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Thanks to Heinz Wiesinger for the assistance.
  Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON
  -DCLANG_LINK_CLANG_DYLIB=ON.
  I think we'll get 16.0.1 next week if we need to make any adjustments.
d/ruby-3.2.2-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  ReDoS vulnerability in URI.
  ReDoS vulnerability in Time.
  For more information, see:
    https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/
    https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
    https://www.cve.org/CVERecord?id=CVE-2023-28755
    https://www.cve.org/CVERecord?id=CVE-2023-28756
  (* Security fix *)
k/kernel-source-6.1.22-noarch-1.txz:  Upgraded.
kde/kdevelop-22.12.3-x86_64-2.txz:  Rebuilt.
  Recompiled against llvm-16.0.0.
l/openexr-3.1.7-x86_64-1.txz:  Upgraded.
l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz:  Upgraded.
  Compiled against llvm-16.0.0.
l/spirv-llvm-translator-16.0.0-x86_64-1.txz:  Upgraded.
  Compiled against llvm-16.0.0.
  Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON.
n/pssh-2.3.5-x86_64-1.txz:  Upgraded.
n/samba-4.18.1-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  An incomplete access check on dnsHostName allows authenticated but otherwise
  unprivileged users to delete this attribute from any object in the directory.
  The Samba AD DC administration tool, when operating against a remote LDAP
  server, will by default send new or reset passwords over a signed-only
  connection.
  The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential
  attribute disclosure via LDAP filters was insufficient and an attacker may
  be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
  Installations with such secrets in their Samba AD should assume they have
  been obtained and need replacing.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2023-0225.html
    https://www.samba.org/samba/security/CVE-2023-0922.html
    https://www.samba.org/samba/security/CVE-2023-0614.html
    https://www.cve.org/CVERecord?id=CVE-2023-0225
    https://www.cve.org/CVERecord?id=CVE-2023-0922
    https://www.cve.org/CVERecord?id=CVE-2023-0614
  (* Security fix *)
x/mesa-23.0.1-x86_64-2.txz:  Rebuilt.
  Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0.
xap/seamonkey-2.53.16-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.16
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.68.2-x86_64-2.txz:  Rebuilt.
  Use the bundled LLVM rather than the system LLVM.
  This version of Rust actually does compile with llvm-16.0.0, but since it
  bundles LLVM 15 let's let it use that for now.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-03-31 21:43:36 +02:00
Patrick J Volkerding
70654f4ef8 Tue Mar 28 19:36:46 UTC 2023
a/grub-2.06-x86_64-5.txz:  Rebuilt.
  [PATCH] fs/ext2: Ignore checksum seed incompat feature.
  Fixes using ext4 with the default options in e2fsprogs-1.47.0.
  Thanks to USUARIONUEVO.
a/shadow-4.13-x86_64-1.txz:  Upgraded.
ap/squashfs-tools-4.6.1-x86_64-1.txz:  Upgraded.
l/gsettings-desktop-schemas-44.0-x86_64-1.txz:  Upgraded.
l/gvfs-1.50.4-x86_64-1.txz:  Upgraded.
l/libcap-2.68-x86_64-1.txz:  Upgraded.
x/libva-utils-2.18.1-x86_64-1.txz:  Upgraded.
xfce/xfce4-screensaver-4.18.1-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.68.2-x86_64-1.txz:  Upgraded.
2023-03-28 22:33:03 +02:00
Patrick J Volkerding
2c5eed9d76 Thu Mar 23 20:36:39 UTC 2023
a/grep-3.10-x86_64-1.txz:  Upgraded.
d/cmake-3.26.1-x86_64-1.txz:  Upgraded.
d/parallel-20230322-noarch-1.txz:  Upgraded.
l/netpbm-11.01.03-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.68.1-x86_64-1.txz:  Upgraded.
2023-03-23 22:35:00 +01:00
Patrick J Volkerding
335ab38e49 Mon Mar 13 23:15:32 UTC 2023
a/kernel-firmware-20230313_c761dbe-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.19-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.19-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.19-x86_64-1.txz:  Upgraded.
a/mcelog-192-x86_64-1.txz:  Upgraded.
d/ccache-4.8-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.19-x86-1.txz:  Upgraded.
d/rust-1.67.1-x86_64-2.txz:  Rebuilt.
  Moved here from /testing (not actually rebuilt).
k/kernel-source-6.1.19-noarch-1.txz:  Upgraded.
l/imagemagick-7.1.1_3-x86_64-1.txz:  Upgraded.
n/vsftpd-3.0.5-x86_64-3.txz:  Rebuilt.
  Patched to compile against openssl-3.0.8. Thanks to Stuart Winter.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.68.0-x86_64-1.txz:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-03-14 02:41:42 +01:00
Patrick J Volkerding
a240312484 Wed Mar 8 20:26:54 UTC 2023
Hey folks, just some more updates on the road to an eventual beta. :-)
At this point nothing remains linked with openssl-1.1.1 except for python2 and
modules, and vsftpd. I think nobody cares about trying to force python2 to use
openssl3... it's EOL but still a zombie, unfortunately. I have seen some
patches for vsftpd and intend to take a look at them. We've bumped PHP to 8.2
and just gone ahead and killed 8.0 and 8.1. Like 7.4, 8.0 is not compatible
with openssl3 and it doesn't seem worthwhile to try to patch it. And with 8.2
already out for several revisions, 8.1 does not seem particularly valuable.
If you make use of PHP you should be used to it being a moving target by now.
Enjoy, and let me know if anything isn't working right. Cheers!
a/aaa_libraries-15.1-x86_64-19.txz:  Rebuilt.
  Recompiled against openssl-3.0.8: libcups.so.2, libcurl.so.4.8.0,
  libldap.so.2.0.200, libssh2.so.1.0.1.
a/cryptsetup-2.6.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
a/kmod-30-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
a/openssl-solibs-3.0.8-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
a/openssl11-solibs-1.1.1t-x86_64-1.txz:  Added.
ap/cups-2.4.2-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
ap/hplip-3.20.5-x86_64-7.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
ap/lxc-4.0.12-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
ap/mariadb-10.6.12-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
ap/qpdf-11.3.0-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
ap/sudo-1.9.13p3-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/cargo-vendor-filterer-0.5.7-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/cvs-1.11.23-x86_64-9.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/git-2.39.2-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/perl-5.36.0-x86_64-5.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/python3-3.9.16-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/ruby-3.2.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/rust-1.66.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
d/scons-4.5.1-x86_64-1.txz:  Upgraded.
kde/falkon-22.12.3-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
kde/kitinerary-22.12.3-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/M2Crypto-0.38.0-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/SDL2-2.26.4-x86_64-1.txz:  Upgraded.
l/gst-plugins-bad-free-1.22.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/libarchive-3.6.2-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/libevent-2.1.12-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/libimobiledevice-20211124_2c6121d-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/libssh2-1.10.0-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/libvncserver-0.9.14-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/mlt-7.14.0-x86_64-1.txz:  Upgraded.
l/neon-0.32.5-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/nodejs-19.7.0-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/opusfile-0.12-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/pipewire-0.3.66-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/pulseaudio-16.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/pycurl-7.44.1-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/qca-2.3.5-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
l/qt5-5.15.8_20230304_d8b881f0-x86_64-1.txz:  Upgraded.
  Compiled against openssl-3.0.8.
l/serf-1.3.9-x86_64-8.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/alpine-2.26-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/bind-9.18.12-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/curl-7.88.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/cyrus-sasl-2.1.28-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/dovecot-2.3.20-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/epic5-2.1.12-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/fetchmail-6.4.37-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/htdig-3.2.0b6-x86_64-9.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/httpd-2.4.56-x86_64-1.txz:  Upgraded.
  This update fixes two security issues:
  HTTP Response Smuggling vulnerability via mod_proxy_uwsgi.
  HTTP Request Smuggling attack via mod_rewrite and mod_proxy.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.56
    https://www.cve.org/CVERecord?id=CVE-2023-27522
    https://www.cve.org/CVERecord?id=CVE-2023-25690
  (* Security fix *)
  NOTE: This package is compiled against openssl-3.0.8.
n/irssi-1.4.3-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/krb5-1.20.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/lftp-4.9.2-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/links-2.28-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/lynx-2.9.0dev.10-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/mutt-2.2.9-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/net-snmp-5.9.3-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/netatalk-3.1.14-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/nmap-7.93-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/ntp-4.2.8p15-x86_64-12.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/openldap-2.6.4-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/openssh-9.2p1-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/openssl-3.0.8-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/openssl11-1.1.1t-x86_64-1.txz:  Added.
n/openvpn-2.6.0-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/php-8.2.3-x86_64-1.txz:  Upgraded.
  Compiled against openssl-3.0.8.
n/pidentd-3.0.19-x86_64-7.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/popa3d-1.0.3-x86_64-7.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/postfix-3.7.4-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/ppp-2.4.9-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/proftpd-1.3.8-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/rsync-3.2.7-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/s-nail-14.9.24-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/samba-4.18.0-x86_64-1.txz:  Upgraded.
  Build with the bundled Heimdal instead of the system MIT Kerberos.
  Thanks again to rpenny.
n/slrn-1.0.3a-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/snownews-1.9-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/socat-1.7.4.4-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/stunnel-5.69-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/tcpdump-4.99.3-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/wget-1.21.3-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
n/wpa_supplicant-2.10-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/freerdp-2.10.0-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/gftp-2.9.1b-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/gkrellm-2.3.11-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/hexchat-2.16.1-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/sane-1.0.32-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/x3270-4.0ga14-x86_64-3.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
xap/xine-lib-1.2.13-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
y/bsd-games-2.17-x86_64-4.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
extra/php80/php80-8.0.28-x86_64-1.txz:  Removed.
extra/php81/php81-8.1.16-x86_64-1.txz:  Removed.
extra/rust-for-mozilla/rust-1.60.0-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-8.17.1-x86_64-7.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
extra/sendmail/sendmail-cf-8.17.1-noarch-7.txz:  Rebuilt.
testing/packages/rust-1.67.1-x86_64-2.txz:  Rebuilt.
  Recompiled against openssl-3.0.8.
testing/packages/samba-4.17.5-x86_64-2.txz:  Removed.
2023-03-08 22:40:50 +01:00
Patrick J Volkerding
88d937fb4e Wed Feb 15 03:05:40 UTC 2023
a/kernel-firmware-20230214_a253a37-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.12-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.12-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.12-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.12-x86-1.txz:  Upgraded.
d/rust-1.66.1-x86_64-1.txz:  Upgraded.
k/kernel-source-6.1.12-noarch-1.txz:  Upgraded.
kde/bluedevil-5.27.0-x86_64-1.txz:  Upgraded.
kde/breeze-5.27.0-x86_64-1.txz:  Upgraded.
kde/breeze-grub-5.27.0-x86_64-1.txz:  Upgraded.
kde/breeze-gtk-5.27.0-x86_64-1.txz:  Upgraded.
kde/drkonqi-5.27.0-x86_64-1.txz:  Upgraded.
kde/kactivitymanagerd-5.27.0-x86_64-1.txz:  Upgraded.
kde/kde-cli-tools-5.27.0-x86_64-1.txz:  Upgraded.
kde/kde-gtk-config-5.27.0-x86_64-1.txz:  Upgraded.
kde/kdecoration-5.27.0-x86_64-1.txz:  Upgraded.
kde/kdeplasma-addons-5.27.0-x86_64-1.txz:  Upgraded.
kde/kgamma5-5.27.0-x86_64-1.txz:  Upgraded.
kde/khotkeys-5.27.0-x86_64-1.txz:  Upgraded.
kde/kinfocenter-5.27.0-x86_64-1.txz:  Upgraded.
kde/kmenuedit-5.27.0-x86_64-1.txz:  Upgraded.
kde/kpipewire-5.27.0-x86_64-1.txz:  Upgraded.
kde/kscreen-5.27.0-x86_64-1.txz:  Upgraded.
kde/kscreenlocker-5.27.0-x86_64-1.txz:  Upgraded.
kde/ksshaskpass-5.27.0-x86_64-1.txz:  Upgraded.
kde/ksystemstats-5.27.0-x86_64-1.txz:  Upgraded.
kde/kwallet-pam-5.27.0-x86_64-1.txz:  Upgraded.
kde/kwayland-integration-5.27.0-x86_64-1.txz:  Upgraded.
kde/kwin-5.27.0-x86_64-1.txz:  Upgraded.
kde/kwrited-5.27.0-x86_64-1.txz:  Upgraded.
kde/layer-shell-qt-5.27.0-x86_64-1.txz:  Upgraded.
kde/libkscreen-5.27.0-x86_64-1.txz:  Upgraded.
kde/libksysguard-5.27.0-x86_64-1.txz:  Upgraded.
kde/milou-5.27.0-x86_64-1.txz:  Upgraded.
kde/oxygen-5.27.0-x86_64-1.txz:  Upgraded.
kde/oxygen-sounds-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-browser-integration-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-desktop-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-disks-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-firewall-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-integration-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-nm-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-pa-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-sdk-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-systemmonitor-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-vault-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-5.27.0-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-wallpapers-5.27.0-x86_64-1.txz:  Upgraded.
kde/polkit-kde-agent-1-5.27.0-x86_64-1.txz:  Upgraded.
kde/powerdevil-5.27.0-x86_64-1.txz:  Upgraded.
kde/qqc2-breeze-style-5.27.0-x86_64-1.txz:  Upgraded.
kde/sddm-kcm-5.27.0-x86_64-1.txz:  Upgraded.
kde/systemsettings-5.27.0-x86_64-1.txz:  Upgraded.
kde/xdg-desktop-portal-kde-5.27.0-x86_64-1.txz:  Upgraded.
l/mozjs102-102.8.0esr-x86_64-1.txz:  Upgraded.
n/php-7.4.33-x86_64-3.txz:  Rebuilt.
  This update fixes security issues:
  Core: Password_verify() always return true with some hash.
  Core: 1-byte array overrun in common path resolve code.
  SAPI: DOS vulnerability when parsing multipart request body.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0567
    https://www.cve.org/CVERecord?id=CVE-2023-0568
    https://www.cve.org/CVERecord?id=CVE-2023-0662
  (* Security fix *)
xap/mozilla-firefox-110.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/110.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-05/
    https://www.cve.org/CVERecord?id=CVE-2023-25728
    https://www.cve.org/CVERecord?id=CVE-2023-25730
    https://www.cve.org/CVERecord?id=CVE-2023-25743
    https://www.cve.org/CVERecord?id=CVE-2023-0767
    https://www.cve.org/CVERecord?id=CVE-2023-25735
    https://www.cve.org/CVERecord?id=CVE-2023-25737
    https://www.cve.org/CVERecord?id=CVE-2023-25738
    https://www.cve.org/CVERecord?id=CVE-2023-25739
    https://www.cve.org/CVERecord?id=CVE-2023-25729
    https://www.cve.org/CVERecord?id=CVE-2023-25732
    https://www.cve.org/CVERecord?id=CVE-2023-25734
    https://www.cve.org/CVERecord?id=CVE-2023-25740
    https://www.cve.org/CVERecord?id=CVE-2023-25731
    https://www.cve.org/CVERecord?id=CVE-2023-25733
    https://www.cve.org/CVERecord?id=CVE-2023-25736
    https://www.cve.org/CVERecord?id=CVE-2023-25741
    https://www.cve.org/CVERecord?id=CVE-2023-25742
    https://www.cve.org/CVERecord?id=CVE-2023-25744
    https://www.cve.org/CVERecord?id=CVE-2023-25745
  (* Security fix *)
extra/php80/php80-8.0.28-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Core: Password_verify() always return true with some hash.
  Core: 1-byte array overrun in common path resolve code.
  SAPI: DOS vulnerability when parsing multipart request body.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0567
    https://www.cve.org/CVERecord?id=CVE-2023-0568
    https://www.cve.org/CVERecord?id=CVE-2023-0662
  (* Security fix *)
extra/php81/php81-8.1.16-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Core: Password_verify() always return true with some hash.
  Core: 1-byte array overrun in common path resolve code.
  SAPI: DOS vulnerability when parsing multipart request body.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0567
    https://www.cve.org/CVERecord?id=CVE-2023-0568
    https://www.cve.org/CVERecord?id=CVE-2023-0662
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.67.1-x86_64-1.txz:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-02-15 06:50:13 +01:00
Patrick J Volkerding
201ae578a4 Fri Feb 3 20:04:33 UTC 2023
a/aaa_glibc-solibs-2.37-x86_64-2.txz:  Rebuilt.
a/e2fsprogs-1.46.6-x86_64-1.txz:  Upgraded.
a/hwdata-0.367-noarch-1.txz:  Upgraded.
l/glibc-2.37-x86_64-2.txz:  Rebuilt.
  [PATCH] Account for grouping in printf width (bug 23432).
  This issue could cause a overflow with sprintf in the corner case where an
  application computes the size of buffer to be exactly enough to fit the
  digits in question, but sprintf ends up writing a couple of extra bytes.
  Thanks to marav for the heads-up.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-25139
  (* Security fix *)
l/glibc-i18n-2.37-x86_64-2.txz:  Rebuilt.
l/glibc-profile-2.37-x86_64-2.txz:  Rebuilt.
l/libcap-2.67-x86_64-1.txz:  Upgraded.
l/poppler-data-0.4.12-noarch-1.txz:  Upgraded.
extra/php81/php81-8.1.15-x86_64-1.txz:  Upgraded.
testing/packages/samba-4.17.5-x86_64-2.txz:  Rebuilt.
  Build with the bundled Heimdal instead of the system MIT Kerberos, since MIT
  Kerberos has more issues when Samba is used as an AD DC. I'd appreciate any
  feedback on the "Samba on Slackware 15" thread on LQ about how well this
  works. Although it's not the sort of change I'd normally make in a -stable
  release such as Slackware 15.0, in this case I'm considering it if it can
  be done painlessly for any existing users... but I'll need to see some
  reports about this. I'd like to note that yes, of course we saw the
  "experimental" label in the configure flag we used to build Samba, but we
  also saw another prominent Linux distribution go ahead and use it anyway. :)
  And the Samba package built against MIT Kerberos cooked in the previous
  -current development cycle for a couple of years without any objections.
  Anyway, hopefully we'll get some testing from folks out there with networks
  that use AD and go from there.
  Thanks to Rowland Penny of the Samba team for clarifying this situation.
2023-02-03 21:35:10 +01:00
Patrick J Volkerding
e96d8dad37 Wed Jan 11 19:31:20 UTC 2023
d/patchelf-0.17.2-x86_64-1.txz:  Upgraded.
kde/kdevelop-pg-qt-2.2.2-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.40.10-x86_64-1.txz:  Upgraded.
xfce/xfce4-panel-4.18.1-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.66.1-x86_64-1.txz:  Upgraded.
2023-01-11 21:34:23 +01:00
Patrick J Volkerding
e0eaf6e451 Sat Jan 7 20:30:44 UTC 2023
We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact
that a kernel bisect identified the patch that was preventing 32-bit from
booting here on a Thinkpad X1E:

------
From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001
From: Michael Kelley <mikelley@microsoft.com>
Date: Wed, 16 Nov 2022 10:41:24 -0800
Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in
 __ioremap_caller()

commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream.

Current code re-calculates the size after aligning the starting and
ending physical addresses on a page boundary. But the re-calculation
also embeds the masking of high order bits that exceed the size of
the physical address space (via PHYSICAL_PAGE_MASK). If the masking
removes any high order bits, the size calculation results in a huge
value that is likely to immediately fail.

Fix this by re-calculating the page-aligned size first. Then mask any
high order bits using PHYSICAL_PAGE_MASK.

Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in
PAE mode")
------

The non-SMP non-PAE 32-bit kernel is fine even without the patch revert.
The PAE kernel also works fine with this patch reverted without any need
to revert ffa71f33a820 (the patch that this one is supposed to fix). The
machine's excessive (for 32-bit) amount of physical RAM (64GB) might also
be a factor here considering the PAE kernel works on all the other machines
around here without reverting this patch.
The patch is reverted only on 32-bit. Upstream report still pending.
Enjoy! :-)

a/kernel-generic-6.1.4-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.4-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.4-x86_64-1.txz:  Upgraded.
a/tree-2.1.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.4-x86-1.txz:  Upgraded.
k/kernel-source-6.1.4-noarch-1.txz:  Upgraded.
l/gvfs-1.50.3-x86_64-1.txz:  Upgraded.
l/hunspell-1.7.2-x86_64-1.txz:  Upgraded.
l/libnice-0.1.21-x86_64-1.txz:  Upgraded.
n/tin-2.6.2-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-01-07 22:37:31 +01:00
Patrick J Volkerding
fd95b91e1e Thu Jan 5 03:09:24 UTC 2023
a/btrfs-progs-6.1.1-x86_64-1.txz:  Upgraded.
a/hwdata-0.366-noarch-1.txz:  Upgraded.
a/kernel-firmware-20230104_4ee2014-noarch-1.txz:  Upgraded.
ap/vim-9.0.1146-x86_64-1.txz:  Upgraded.
  Fixed security issues:
  Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0049
    https://www.cve.org/CVERecord?id=CVE-2023-0051
  (* Security fix *)
d/mercurial-6.3.2-x86_64-1.txz:  Upgraded.
l/fluidsynth-2.3.1-x86_64-1.txz:  Upgraded.
l/libxkbcommon-1.5.0-x86_64-1.txz:  Upgraded.
n/fetchmail-6.4.35-x86_64-1.txz:  Upgraded.
xap/vim-gvim-9.0.1146-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.3-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.3-x86-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.3-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.3-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.3-noarch-1.txz:  Upgraded.
2023-01-05 06:46:55 +01:00
Patrick J Volkerding
356066ad01 Sun Jan 1 03:25:48 UTC 2023
Happy New Year! :-)
a/dialog-1.3_20221229-x86_64-1.txz:  Upgraded.
a/file-5.44-x86_64-1.txz:  Upgraded.
n/ipset-7.17-x86_64-1.txz:  Upgraded.
x/libva-2.17.0-x86_64-1.txz:  Upgraded.
x/libva-utils-2.17.0-x86_64-1.txz:  Upgraded.
x/mesa-22.3.2-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.2-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.2-x86-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.2-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.2-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.2-noarch-1.txz:  Upgraded.
2023-01-01 06:39:38 +01:00
Patrick J Volkerding
5d902bcdde Sun Dec 25 23:21:25 UTC 2022
Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to
get some kind of kernel activity going again, but it most definitely belongs
in /testing for now. I've been trying to shape this up for weeks, but there
are still issues, and maybe someone out there can help. The biggest problem
is that the 32-bit kernels crash on boot. Initially there's some sort of
Intel ME failure (this is on a Thinkpad X1E). If those modules are
blacklisted, then the kernel will go on to crash loading the snd_hda_intel
module. The other issue is that I've got a 4K panel in this machine, and
have always appended the kernel option video=1920x1080@60 to put the console
in HD instead, and then loaded a Terminus console font to make the text even
larger. With these kernels, that option is completely ignored. I've tried some
other syntax I've seen online to no avail. And when the Terminus font is
loaded the text gets *even smaller* for some reason.
So be careful of these kernels (especially the 32-bit ones), but I welcome
any hints about what's going on here or if there are config changes that
might get this working properly. Is anyone out there running a 6.x kernel on
bare metal 32-bit x86?
Cheers!
ap/vim-9.0.1091-x86_64-1.txz:  Upgraded.
d/meson-1.0.0-x86_64-1.txz:  Upgraded.
d/ruby-3.2.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
d/subversion-1.14.2-x86_64-3.txz:  Rebuilt.
  Recompiled against ruby-3.2.0.
l/glib2-2.74.4-x86_64-1.txz:  Upgraded.
l/netpbm-11.00.03-x86_64-1.txz:  Upgraded.
l/rubygem-asciidoctor-2.0.18-x86_64-1.txz:  Upgraded.
  Compiled against ruby-3.2.0.
n/epic5-2.1.12-x86_64-2.txz:  Rebuilt.
  Recompiled against ruby-3.2.0.
x/marisa-0.2.6-x86_64-6.txz:  Rebuilt.
  Recompiled against ruby-3.2.0.
xap/vim-gvim-9.0.1091-x86_64-1.txz:  Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.1-x86_64-1.txz:  Added.
testing/packages/linux-6.1.x/kernel-headers-6.1.1-x86-1.txz:  Added.
testing/packages/linux-6.1.x/kernel-huge-6.1.1-x86_64-1.txz:  Added.
testing/packages/linux-6.1.x/kernel-modules-6.1.1-x86_64-1.txz:  Added.
testing/packages/linux-6.1.x/kernel-source-6.1.1-noarch-1.txz:  Added.
2022-12-26 01:38:31 +01:00
Patrick J Volkerding
4f53dfead2 Mon Dec 19 21:18:22 UTC 2022
a/logrotate-3.21.0-x86_64-1.txz:  Upgraded.
kde/gwenview-22.12.0-x86_64-2.txz:  Rebuilt.
  Recompiled against cfitsio-4.2.0.
kde/kstars-3.6.2-x86_64-2.txz:  Rebuilt.
  Recompiled against cfitsio-4.2.0.
l/cfitsio-4.2.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/gsettings-desktop-schemas-43.0-x86_64-1.txz:  Upgraded.
l/gtk4-4.8.2-x86_64-1.txz:  Upgraded.
x/xorg-server-21.1.6-x86_64-1.txz:  Upgraded.
  This release fixes an invalid event type mask in XTestSwapFakeInput which
  was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
  for CVE-2022-46340.
x/xorg-server-xephyr-21.1.6-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-21.1.6-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-21.1.6-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-22.1.7-x86_64-1.txz:  Upgraded.
  This release fixes an invalid event type mask in XTestSwapFakeInput which
  was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
  for CVE-2022-46340.
testing/packages/rust-1.66.0-x86_64-1.txz:  Added.
2022-12-19 23:42:51 +01:00
Patrick J Volkerding
7852409378 Fri Dec 16 04:46:51 UTC 2022
d/help2man-1.49.3-x86_64-1.txz:  Upgraded.
l/pipewire-0.3.63-x86_64-1.txz:  Upgraded.
x/libX11-1.8.3-x86_64-1.txz:  Upgraded.
x/mesa-22.3.1-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-108.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  Thanks to marav for the build help.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
    https://www.cve.org/CVERecord?id=CVE-2022-46871
    https://www.cve.org/CVERecord?id=CVE-2022-46872
    https://www.cve.org/CVERecord?id=CVE-2022-46873
    https://www.cve.org/CVERecord?id=CVE-2022-46874
    https://www.cve.org/CVERecord?id=CVE-2022-46875
    https://www.cve.org/CVERecord?id=CVE-2022-46877
    https://www.cve.org/CVERecord?id=CVE-2022-46878
    https://www.cve.org/CVERecord?id=CVE-2022-46879
  (* Security fix *)
2022-12-16 06:38:01 +01:00
Patrick J Volkerding
fc0ff5a5d7 Wed Dec 14 21:19:34 UTC 2022
a/bash-5.2.015-x86_64-1.txz:  Upgraded.
a/tcsh-6.24.06-x86_64-1.txz:  Upgraded.
ap/inxi-3.3.24_1-noarch-1.txz:  Upgraded.
ap/nano-7.1-x86_64-1.txz:  Upgraded.
d/git-2.39.0-x86_64-1.txz:  Upgraded.
d/rust-1.65.0-x86_64-1.txz:  Upgraded.
d/strace-6.1-x86_64-1.txz:  Upgraded.
kde/krita-5.1.4-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_54-x86_64-1.txz:  Upgraded.
l/nodejs-19.3.0-x86_64-1.txz:  Upgraded.
l/pcre2-10.42-x86_64-1.txz:  Upgraded.
n/iproute2-6.1.0-x86_64-1.txz:  Upgraded.
x/makedepend-1.0.8-x86_64-1.txz:  Upgraded.
x/xhost-1.0.9-x86_64-1.txz:  Upgraded.
x/xorg-server-21.1.5-x86_64-1.txz:  Upgraded.
  This release fixes 6 recently reported security vulnerabilities in
  various extensions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2022-December/003302.html
    https://www.cve.org/CVERecord?id=CVE-2022-46340
    https://www.cve.org/CVERecord?id=CVE-2022-46341
    https://www.cve.org/CVERecord?id=CVE-2022-46342
    https://www.cve.org/CVERecord?id=CVE-2022-46343
    https://www.cve.org/CVERecord?id=CVE-2022-46344
    https://www.cve.org/CVERecord?id=CVE-2022-4283
  (* Security fix *)
x/xorg-server-xephyr-21.1.5-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-21.1.5-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-21.1.5-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-22.1.6-x86_64-1.txz:  Upgraded.
  This release fixes 6 recently reported security vulnerabilities in
  various extensions.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2022-December/003302.html
    https://www.cve.org/CVERecord?id=CVE-2022-46340
    https://www.cve.org/CVERecord?id=CVE-2022-46341
    https://www.cve.org/CVERecord?id=CVE-2022-46342
    https://www.cve.org/CVERecord?id=CVE-2022-46343
    https://www.cve.org/CVERecord?id=CVE-2022-46344
    https://www.cve.org/CVERecord?id=CVE-2022-4283
  (* Security fix *)
xap/mozilla-thunderbird-102.6.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
    https://www.cve.org/CVERecord?id=CVE-2022-46880
    https://www.cve.org/CVERecord?id=CVE-2022-46872
    https://www.cve.org/CVERecord?id=CVE-2022-46881
    https://www.cve.org/CVERecord?id=CVE-2022-46874
    https://www.cve.org/CVERecord?id=CVE-2022-46875
    https://www.cve.org/CVERecord?id=CVE-2022-46882
    https://www.cve.org/CVERecord?id=CVE-2022-46878
  (* Security fix *)
xap/xscreensaver-6.06-x86_64-1.txz:  Upgraded.
testing/packages/mozilla-firefox-108.0-x86_64-1.txz:  Upgraded.
  Starting this out in /testing for now, since I've been trying for 2 days to
  get it to compile on 32-bit with no luck. It ends up failing with a bunch of
  errors like this:
  ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync
  Any help getting this to build on 32-bit would be greatly appreciated.
  I've tried most of ponce's bag of tricks already. :-)
2022-12-14 23:46:49 +01:00
Patrick J Volkerding
7354944bf0 Mon Nov 21 20:23:13 UTC 2022
a/libpwquality-1.4.5-x86_64-1.txz:  Upgraded.
a/pciutils-3.9.0-x86_64-1.txz:  Upgraded.
ap/qpdf-11.2.0-x86_64-1.txz:  Upgraded.
d/mercurial-6.3.1-x86_64-1.txz:  Upgraded.
kde/krusader-2.8.0-x86_64-1.txz:  Upgraded.
l/libpng-1.6.39-x86_64-1.txz:  Upgraded.
l/mlt-7.12.0-x86_64-1.txz:  Upgraded.
x/fcitx5-5.0.20-x86_64-1.txz:  Upgraded.
x/fcitx5-anthy-5.0.13-x86_64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.0.16-x86_64-1.txz:  Upgraded.
x/fcitx5-gtk-5.0.20-x86_64-1.txz:  Upgraded.
x/fcitx5-kkc-5.0.11-x86_64-1.txz:  Upgraded.
x/fcitx5-m17n-5.0.11-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.0.16-x86_64-1.txz:  Upgraded.
x/fcitx5-table-extra-5.0.12-x86_64-1.txz:  Upgraded.
x/fcitx5-unikey-5.0.12-x86_64-1.txz:  Upgraded.
x/libXdmcp-1.1.4-x86_64-1.txz:  Upgraded.
x/libXpm-3.5.14-x86_64-1.txz:  Upgraded.
x/libXrandr-1.5.3-x86_64-1.txz:  Upgraded.
x/libime-1.0.15-x86_64-1.txz:  Upgraded.
x/libinput-1.22.0-x86_64-1.txz:  Upgraded.
x/xcb-imdkit-1.0.4-x86_64-1.txz:  Upgraded.
2022-11-22 07:00:14 +01:00
Patrick J Volkerding
7925f7cd17 Tue Nov 15 01:28:38 UTC 2022
a/xz-5.2.8-x86_64-1.txz:  Upgraded.
d/mercurial-6.3.0-x86_64-1.txz:  Upgraded.
d/rust-1.64.0-x86_64-1.txz:  Upgraded.
kde/attica-5.100.0-x86_64-1.txz:  Upgraded.
kde/baloo-5.100.0-x86_64-1.txz:  Upgraded.
kde/bluez-qt-5.100.0-x86_64-1.txz:  Upgraded.
kde/breeze-icons-5.100.0-noarch-1.txz:  Upgraded.
kde/extra-cmake-modules-5.100.0-x86_64-1.txz:  Upgraded.
kde/frameworkintegration-5.100.0-x86_64-1.txz:  Upgraded.
kde/kactivities-5.100.0-x86_64-1.txz:  Upgraded.
kde/kactivities-stats-5.100.0-x86_64-1.txz:  Upgraded.
kde/kapidox-5.100.0-x86_64-1.txz:  Upgraded.
kde/karchive-5.100.0-x86_64-1.txz:  Upgraded.
kde/kauth-5.100.0-x86_64-1.txz:  Upgraded.
kde/kbookmarks-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcalendarcore-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcmutils-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcodecs-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcompletion-5.100.0-x86_64-1.txz:  Upgraded.
kde/kconfig-5.100.0-x86_64-1.txz:  Upgraded.
kde/kconfigwidgets-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcontacts-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcoreaddons-5.100.0-x86_64-1.txz:  Upgraded.
kde/kcrash-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdav-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdbusaddons-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdeclarative-5.100.0-x86_64-1.txz:  Upgraded.
kde/kded-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdelibs4support-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdesignerplugin-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdesu-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdewebkit-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdnssd-5.100.0-x86_64-1.txz:  Upgraded.
kde/kdoctools-5.100.0-x86_64-1.txz:  Upgraded.
kde/kemoticons-5.100.0-x86_64-1.txz:  Upgraded.
kde/kfilemetadata-5.100.0-x86_64-1.txz:  Upgraded.
kde/kglobalaccel-5.100.0-x86_64-1.txz:  Upgraded.
kde/kguiaddons-5.100.0-x86_64-1.txz:  Upgraded.
kde/kholidays-5.100.0-x86_64-1.txz:  Upgraded.
kde/khtml-5.100.0-x86_64-1.txz:  Upgraded.
kde/ki18n-5.100.0-x86_64-1.txz:  Upgraded.
kde/kiconthemes-5.100.0-x86_64-1.txz:  Upgraded.
kde/kidletime-5.100.0-x86_64-1.txz:  Upgraded.
kde/kimageformats-5.100.0-x86_64-1.txz:  Upgraded.
kde/kinit-5.100.0-x86_64-1.txz:  Upgraded.
kde/kio-5.100.0-x86_64-1.txz:  Upgraded.
kde/kirigami2-5.100.0-x86_64-1.txz:  Upgraded.
kde/kitemmodels-5.100.0-x86_64-1.txz:  Upgraded.
kde/kitemviews-5.100.0-x86_64-1.txz:  Upgraded.
kde/kjobwidgets-5.100.0-x86_64-1.txz:  Upgraded.
kde/kjs-5.100.0-x86_64-1.txz:  Upgraded.
kde/kjsembed-5.100.0-x86_64-1.txz:  Upgraded.
kde/kmediaplayer-5.100.0-x86_64-1.txz:  Upgraded.
kde/knewstuff-5.100.0-x86_64-1.txz:  Upgraded.
kde/knotifications-5.100.0-x86_64-1.txz:  Upgraded.
kde/knotifyconfig-5.100.0-x86_64-1.txz:  Upgraded.
kde/kpackage-5.100.0-x86_64-1.txz:  Upgraded.
kde/kparts-5.100.0-x86_64-1.txz:  Upgraded.
kde/kpeople-5.100.0-x86_64-1.txz:  Upgraded.
kde/kplotting-5.100.0-x86_64-1.txz:  Upgraded.
kde/kpty-5.100.0-x86_64-1.txz:  Upgraded.
kde/kquickcharts-5.100.0-x86_64-1.txz:  Upgraded.
kde/kross-5.100.0-x86_64-1.txz:  Upgraded.
kde/krunner-5.100.0-x86_64-1.txz:  Upgraded.
kde/kservice-5.100.0-x86_64-1.txz:  Upgraded.
kde/ktexteditor-5.100.0-x86_64-1.txz:  Upgraded.
kde/ktextwidgets-5.100.0-x86_64-1.txz:  Upgraded.
kde/kunitconversion-5.100.0-x86_64-1.txz:  Upgraded.
kde/kwallet-5.100.0-x86_64-1.txz:  Upgraded.
kde/kwayland-5.100.0-x86_64-1.txz:  Upgraded.
kde/kwidgetsaddons-5.100.0-x86_64-1.txz:  Upgraded.
kde/kwindowsystem-5.100.0-x86_64-1.txz:  Upgraded.
kde/kxmlgui-5.100.0-x86_64-1.txz:  Upgraded.
kde/kxmlrpcclient-5.100.0-x86_64-1.txz:  Upgraded.
kde/modemmanager-qt-5.100.0-x86_64-1.txz:  Upgraded.
kde/networkmanager-qt-5.100.0-x86_64-1.txz:  Upgraded.
kde/oxygen-icons5-5.100.0-noarch-1.txz:  Upgraded.
kde/plasma-framework-5.100.0-x86_64-1.txz:  Upgraded.
kde/prison-5.100.0-x86_64-1.txz:  Upgraded.
kde/purpose-5.100.0-x86_64-1.txz:  Upgraded.
kde/qqc2-desktop-style-5.100.0-x86_64-1.txz:  Upgraded.
kde/solid-5.100.0-x86_64-1.txz:  Upgraded.
kde/sonnet-5.100.0-x86_64-1.txz:  Upgraded.
kde/syndication-5.100.0-x86_64-1.txz:  Upgraded.
kde/syntax-highlighting-5.100.0-x86_64-1.txz:  Upgraded.
kde/threadweaver-5.100.0-x86_64-1.txz:  Upgraded.
l/babl-0.1.98-x86_64-1.txz:  Upgraded.
l/gegl-0.4.40-x86_64-1.txz:  Upgraded.
l/grantlee-5.3.1-x86_64-1.txz:  Upgraded.
l/nodejs-19.1.0-x86_64-1.txz:  Upgraded.
n/libqmi-1.32.2-x86_64-1.txz:  Upgraded.
n/mutt-2.2.9-x86_64-1.txz:  Upgraded.
n/nghttp2-1.51.0-x86_64-1.txz:  Upgraded.
x/xcompmgr-1.1.9-x86_64-1.txz:  Upgraded.
x/xkbevd-1.1.5-x86_64-1.txz:  Upgraded.
x/xkill-1.0.6-x86_64-1.txz:  Upgraded.
x/xlogo-1.0.6-x86_64-1.txz:  Upgraded.
x/xlsatoms-1.1.4-x86_64-1.txz:  Upgraded.
x/xlsclients-1.1.5-x86_64-1.txz:  Upgraded.
testing/packages/rust-1.65.0-x86_64-1.txz:  Upgraded.
2022-11-15 07:00:12 +01:00
Patrick J Volkerding
a510225d2f Thu Sep 22 19:50:20 UTC 2022
a/quota-4.09-x86_64-1.txz:  Upgraded.
d/parallel-20220922-noarch-1.txz:  Upgraded.
l/jemalloc-5.3.0-x86_64-2.txz:  Rebuilt.
  Fixed version numbers in jemalloc.h. Thanks to Markus Wiesner.
n/ca-certificates-20220922-noarch-1.txz:  Upgraded.
  This update provides the latest CA certificates to check for the
  authenticity of SSL connections.
testing/packages/rust-1.64.0-x86_64-1.txz:  Added.
  We've found ourselves in a situation where Thunderbird requires the Rust
  compiler in /extra, and Firefox requires the one in the main tree (and
  can't use this one until Firefox 107 sometime in November), so we'll just
  park this here until we can use it.
2022-09-23 07:00:16 +02:00
Patrick J Volkerding
353496a7b2 Wed Aug 17 20:41:53 UTC 2022
a/aaa_glibc-solibs-2.36-x86_64-2.txz:  Rebuilt.
a/kernel-generic-5.19.2-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.19.2-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.19.2-x86_64-1.txz:  Upgraded.
ap/vim-9.0.0223-x86_64-1.txz:  Upgraded.
  Fix use after free, out-of-bounds read, and heap based buffer overflow.
  Thanks to marav for the heads-up.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
  (* Security fix *)
d/kernel-headers-5.19.2-x86-1.txz:  Upgraded.
k/kernel-source-5.19.2-noarch-1.txz:  Upgraded.
l/glibc-2.36-x86_64-2.txz:  Rebuilt.
  Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since
  the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on
  board with this approach, but since DT_GNU_HASH remains and is still used,
  I guess I'll go along with it for now. Hopefully EAC will be patched and we
  can back this out.
  Thanks to Swaggajackin for the notice and for providing links to the glibc
  bug discussion as well as the patch.
  If anything else needs a rebuild after this, let me know in the LQ thread.
l/glibc-i18n-2.36-x86_64-2.txz:  Rebuilt.
l/glibc-profile-2.36-x86_64-2.txz:  Rebuilt.
xap/vim-gvim-9.0.0223-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-08-18 07:00:13 +02:00
Patrick J Volkerding
8937087493 Fri Aug 12 01:47:02 UTC 2022
a/aaa_libraries-15.1-x86_64-9.txz:  Rebuilt.
  Added: libboost_atomic.so.1.79.0, libboost_chrono.so.1.79.0,
  libboost_container.so.1.79.0, libboost_context.so.1.79.0,
  libboost_contract.so.1.79.0, libboost_coroutine.so.1.79.0,
  libboost_date_time.so.1.79.0, libboost_fiber.so.1.79.0,
  libboost_filesystem.so.1.79.0, libboost_graph.so.1.79.0,
  libboost_iostreams.so.1.79.0, libboost_json.so.1.79.0,
  libboost_locale.so.1.79.0, libboost_log.so.1.79.0,
  libboost_log_setup.so.1.79.0, libboost_math_c99.so.1.79.0,
  libboost_math_c99f.so.1.79.0, libboost_math_c99l.so.1.79.0,
  libboost_math_tr1.so.1.79.0, libboost_math_tr1f.so.1.79.0,
  libboost_math_tr1l.so.1.79.0, libboost_nowide.so.1.79.0,
  libboost_prg_exec_monitor.so.1.79.0, libboost_program_options.so.1.79.0,
  libboost_python27.so.1.79.0, libboost_python39.so.1.79.0,
  libboost_random.so.1.79.0, libboost_regex.so.1.79.0,
  libboost_serialization.so.1.79.0, libboost_stacktrace_addr2line.so.1.79.0,
  libboost_stacktrace_basic.so.1.79.0, libboost_stacktrace_noop.so.1.79.0,
  libboost_system.so.1.79.0, libboost_thread.so.1.79.0,
  libboost_timer.so.1.79.0, libboost_type_erasure.so.1.79.0,
  libboost_unit_test_framework.so.1.79.0, libboost_wave.so.1.79.0,
  libboost_wserialization.so.1.79.0.
a/kernel-generic-5.18.17-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.18.17-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.18.17-x86_64-1.txz:  Upgraded.
ap/pamixer-1.5-x86_64-4.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
d/git-2.37.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.18.17-x86-1.txz:  Upgraded.
d/rust-1.63.0-x86_64-1.txz:  Upgraded.
k/kernel-source-5.18.17-noarch-1.txz:  Upgraded.
kde/kig-22.04.3-x86_64-2.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
kde/kopeninghours-22.04.3-x86_64-2.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
kde/krita-5.0.8-x86_64-4.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
l/boost-1.80.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
l/cryfs-0.10.3-x86_64-6.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
l/openexr-3.1.5-x86_64-2.txz:  Rebuilt.
  Recompiled against boost-1.80.0.
l/pango-1.50.9-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.38.4-x86_64-1.txz:  Upgraded.
x/mesa-22.1.6-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/linux-5.19.x/kernel-generic-5.19.1-x86_64-1.txz:  Added.
testing/packages/linux-5.19.x/kernel-headers-5.19.1-x86-1.txz:  Added.
testing/packages/linux-5.19.x/kernel-huge-5.19.1-x86_64-1.txz:  Added.
testing/packages/linux-5.19.x/kernel-modules-5.19.1-x86_64-1.txz:  Added.
testing/packages/linux-5.19.x/kernel-source-5.19.1-noarch-1.txz:  Added.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-08-12 09:00:17 +02:00
Patrick J Volkerding
fc0c0fd79b Sat Jun 11 01:56:19 UTC 2022
a/kernel-firmware-20220610_7b71b75-noarch-1.txz:  Upgraded.
a/kernel-generic-5.18.3-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.18.3-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.18.3-x86_64-1.txz:  Upgraded.
d/gcc-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz:  Removed.
d/gcc-g++-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-gdc-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-gfortran-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-gnat-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-go-12.1.0-x86_64-1.txz:  Upgraded.
d/gcc-objc-12.1.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.18.3-x86-1.txz:  Upgraded.
d/libtool-2.4.7-x86_64-2.txz:  Rebuilt.
  Recompiled to update embedded GCC version number.
k/kernel-source-5.18.3-noarch-1.txz:  Upgraded.
x/libX11-1.8.1-x86_64-1.txz:  Upgraded.
xap/blueman-2.2.5-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-06-11 07:00:11 +02:00
Patrick J Volkerding
0c63f7504d Mon Jun 6 20:57:15 UTC 2022
a/btrfs-progs-5.18.1-x86_64-1.txz:  Upgraded.
a/kernel-generic-5.17.13-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.17.13-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.17.13-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.17.13-x86-1.txz:  Upgraded.
d/pahole-1.23-x86_64-1.txz:  Added.
  Thanks to xaizek and PiterPunk.
k/kernel-source-5.17.13-noarch-1.txz:  Upgraded.
l/gmime-3.2.12-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_37-x86_64-1.txz:  Upgraded.
l/python-setuptools_scm-6.4.2-x86_64-1.txz:  Upgraded.
n/alpine-2.26-x86_64-1.txz:  Upgraded.
n/mutt-2.2.6-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/linux-5.18.x/kernel-generic-5.18.2-x86_64-1.txz:  Added.
testing/packages/linux-5.18.x/kernel-headers-5.18.2-x86-1.txz:  Added.
testing/packages/linux-5.18.x/kernel-huge-5.18.2-x86_64-1.txz:  Added.
testing/packages/linux-5.18.x/kernel-modules-5.18.2-x86_64-1.txz:  Added.
testing/packages/linux-5.18.x/kernel-source-5.18.2-noarch-1.txz:  Added.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-06-07 07:00:10 +02:00
Patrick J Volkerding
900499bb8d Sat May 7 18:53:48 UTC 2022
a/kernel-firmware-20220503_d4b7551-noarch-1.txz:  Upgraded.
ap/sqlite-3.38.5-x86_64-1.txz:  Upgraded.
d/git-2.36.1-x86_64-1.txz:  Upgraded.
n/stunnel-5.64-x86_64-1.txz:  Upgraded.
testing/packages/gcc-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-g++-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gdc-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gfortran-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-gnat-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-go-12.1.0-x86_64-1.txz:  Added.
testing/packages/gcc-objc-12.1.0-x86_64-1.txz:  Added.
2022-05-08 06:59:48 +02:00
Patrick J Volkerding
2ab30d1fd9 Wed Apr 27 21:43:51 UTC 2022
a/kernel-generic-5.17.5-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.17.5-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.17.5-x86_64-1.txz:  Upgraded.
a/sysvinit-3.04-x86_64-1.txz:  Upgraded.
ap/sqlite-3.38.3-x86_64-1.txz:  Upgraded.
d/gcc-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-brig-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-g++-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-gdc-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-gfortran-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-gnat-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-go-11.3.0-x86_64-1.txz:  Upgraded.
d/gcc-objc-11.3.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.17.5-x86-1.txz:  Upgraded.
d/libtool-2.4.7-x86_64-1.txz:  Upgraded.
  This also updates the embedded GCC version number.
k/kernel-source-5.17.5-noarch-1.txz:  Upgraded.
   CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0"
   GCC_VERSION 110200 -> 110300
  +CC_HAS_SLS y
  +SLS y
kde/krita-5.0.6-x86_64-1.txz:  Upgraded.
l/netpbm-10.98.02-x86_64-1.txz:  Upgraded.
l/nodejs-16.15.0-x86_64-1.txz:  Upgraded.
n/curl-7.83.0-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  OAUTH2 bearer bypass in connection re-use.
  Credential leak on redirect.
  Bad local IPv6 connection reuse.
  Auth/cookie leak on redirect.
  For more information, see:
    https://curl.se/docs/CVE-2022-22576.html
    https://curl.se/docs/CVE-2022-27774.html
    https://curl.se/docs/CVE-2022-27775.html
    https://curl.se/docs/CVE-2022-27776.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
  (* Security fix *)
n/fetchmail-6.4.30-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-04-28 08:59:37 +02:00
Patrick J Volkerding
f0048b9986 Mon Apr 25 20:55:17 UTC 2022
a/kernel-firmware-20220425_ac21ab5-noarch-1.txz:  Upgraded.
d/meson-0.62.1-x86_64-1.txz:  Upgraded.
d/parallel-20220422-noarch-1.txz:  Upgraded.
l/harfbuzz-4.2.1-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_31-x86_64-1.txz:  Upgraded.
l/libseccomp-2.5.4-x86_64-1.txz:  Upgraded.
l/libusb-1.0.26-x86_64-1.txz:  Upgraded.
l/openal-soft-1.22.0-x86_64-1.txz:  Upgraded.
n/proftpd-1.3.7d-x86_64-1.txz:  Upgraded.
x/xdg-desktop-portal-1.14.3-x86_64-1.txz:  Upgraded.
xap/freerdp-2.7.0-x86_64-1.txz:  Upgraded.
  This update is a security and maintenance release.
  For more information, see:
    https://github.com/FreeRDP/FreeRDP/blob/2.7.0/ChangeLog
  (* Security fix *)
testing/packages/gcc-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-brig-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-g++-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-gdc-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-gfortran-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-gnat-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-go-11.3.0-x86_64-1.txz:  Added.
testing/packages/gcc-objc-11.3.0-x86_64-1.txz:  Added.
2022-04-26 06:59:45 +02:00
Patrick J Volkerding
7e275bc3ae Wed Feb 2 08:21:48 UTC 2022
a/kernel-generic-5.15.19-x86_64-2.txz:  Upgraded.
a/kernel-huge-5.15.19-x86_64-2.txz:  Upgraded.
a/kernel-modules-5.15.19-x86_64-2.txz:  Upgraded.
d/kernel-headers-5.15.19-x86-2.txz:  Upgraded.
k/kernel-source-5.15.19-noarch-2.txz:  Upgraded.
  -RTC_SYSTOHC_DEVICE "rtc0"
   RTC_SYSTOHC y -> n
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/source/linux-5.16.5-configs/*:  Rebuilt.
  -RTC_SYSTOHC_DEVICE "rtc0"
   RTC_SYSTOHC y -> n
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-02-02 11:59:53 +01:00
Patrick J Volkerding
8b3ff193a8 Wed Feb 2 04:17:39 UTC 2022
fortune -m "I will be finished tomorrow" fortunes2
a/kernel-generic-5.15.19-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.15.19-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.15.19-x86_64-1.txz:  Upgraded.
ap/screen-4.9.0-x86_64-1.txz:  Upgraded.
  Patched possible denial of service via a crafted UTF-8 character sequence.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937
  (* Security fix *)
d/kernel-headers-5.15.19-x86-1.txz:  Upgraded.
k/kernel-source-5.15.19-noarch-1.txz:  Upgraded.
   RTC_INTF_DEV_UIE_EMUL y -> n
   RTC_SYSTOHC n -> y
  +RTC_SYSTOHC_DEVICE "rtc0"
l/lcms2-2.13-x86_64-2.txz:  Rebuilt.
  [PATCH] Fix for optimization error on grayscale.
  Thanks to Aaron Boxer for reporting this issue.
  Thanks to gmgf.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/source/linux-5.16.5-configs/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-02-02 08:59:53 +01:00
Patrick J Volkerding
bd42aca52d Tue Feb 1 04:37:04 UTC 2022
The sepulchral voice intones, "The cave is now closed."
kde/falkon-3.2.0-x86_64-1.txz:  Upgraded.
kde/ktexteditor-5.90.0-x86_64-2.txz:  Rebuilt.
  [PATCH] only start programs in user's path.
  [PATCH] only execute diff in path.
  Thanks to gmgf.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
  (* Security fix *)
l/libcanberra-0.30-x86_64-9.txz:  Rebuilt.
  Fix a bug crashing some applications in Wayland desktops.
  Thanks to 01micko.
n/samba-4.15.5-x86_64-1.txz:  Upgraded.
  This is a security release in order to address the following defects:
  UNIX extensions in SMB1 disclose whether the outside target of a symlink
  exists.
  Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
  allows remote attackers to execute arbitrary code as root on affected Samba
  installations that use the VFS module vfs_fruit.
  Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
  the ability to write to an account can exploit this to perform a
  denial-of-service attack by adding an SPN that matches an existing service.
  Additionally, an attacker who can intercept traffic can impersonate existing
  services, resulting in a loss of confidentiality and integrity.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2021-44141.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
    https://www.samba.org/samba/security/CVE-2021-44142.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
    https://www.samba.org/samba/security/CVE-2022-0336.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
  (* Security fix *)
x/xterm-370-x86_64-7.txz:  Rebuilt.
  Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
  Thanks to gmgf.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
  (* Security fix *)
testing/source/linux-5.16.4-configs/*:  Added.
  Sample config files to build 5.16.4 Linux kernels.
2022-02-01 08:59:52 +01:00
Patrick J Volkerding
e2c76f9da8 Thu Oct 28 01:11:07 UTC 2021
a/kernel-generic-5.14.15-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.14.15-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.14.15-x86_64-1.txz:  Upgraded.
d/cmake-3.21.4-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.14.15-x86-1.txz:  Upgraded.
k/kernel-source-5.14.15-noarch-1.txz:  Upgraded.
  We're going to go ahead and take both of those changes that were considered
  in /testing. GazL almost had me talked out of the autogroup change, but it's
  easy to disable if traditional "nice" behavior is important to someone.
  -DRM_I810 n
  -INLINE_READ_UNLOCK y
  -INLINE_READ_UNLOCK_IRQ y
  -INLINE_SPIN_UNLOCK_IRQ y
  -INLINE_WRITE_UNLOCK y
  -INLINE_WRITE_UNLOCK_IRQ y
   PREEMPT n -> y
   PREEMPT_VOLUNTARY y -> n
   SCHED_AUTOGROUP n -> y
  +CEC_GPIO n
  +DEBUG_PREEMPT y
  +PREEMPTION y
  +PREEMPT_COUNT y
  +PREEMPT_DYNAMIC y
  +PREEMPT_RCU y
  +PREEMPT_TRACER n
  +RCU_BOOST n
  +TASKS_RCU y
  +UNINLINE_SPIN_UNLOCK y
kde/plasma-desktop-5.23.2.1-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_12-x86_64-1.txz:  Upgraded.
l/librsvg-2.52.3-x86_64-1.txz:  Upgraded.
n/bind-9.16.22-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issue:
  The "lame-ttl" option is now forcibly set to 0. This effectively disables
  the lame server cache, as it could previously be abused by an attacker to
  significantly degrade resolver performance.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
  (* Security fix *)
n/c-ares-1.18.1-x86_64-1.txz:  Upgraded.
n/samba-4.15.1-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2021-10-28 15:00:27 +02:00
Patrick J Volkerding
b38f92681d Mon Oct 25 19:30:42 UTC 2021
ap/slackpkg-15.0.8-noarch-1.txz:  Upgraded.
  Author: piterpunk <piterpunk@slackware.com>
  To make it easier to do an unattended slackpkg update/upgrade process,
  this commit provides different exit codes for many situations:
    0    Successful slackpkg execution.
    1    Something wrong happened.
    20   No package found to be downloaded, installed, reinstalled,
         upgraded, or removed.
    50   Slackpkg itself was upgraded and you need to re-run it.
    100  There are pending updates.
  Code and the main manpage are updated accordingly.
  In addition, this commit also:
  - removes the ChangeLog.txt in doinst.sh, so the needed
    'slackpkg update' after Slackpkg upgrade won't say it's all OK
    and doesn't need to redo the package lists
  - removes AUTHORS from manpage. Nowadays there is code from many
    people in Slackpkg and it seems a bit unfair to have only my and
    Evaldo's name listed there.
  Signed-off-by: Robby Workman <rworkman@slackware.com>
d/meson-0.60.0-x86_64-1.txz:  Upgraded.
l/ffmpeg-4.4.1-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_11-x86_64-1.txz:  Upgraded.
l/libcap-2.60-x86_64-1.txz:  Upgraded.
l/libsoup-2.74.1-x86_64-1.txz:  Upgraded.
l/sip-4.19.25-x86_64-3.txz:  Rebuilt.
  Drop the Qt4 modules. Thanks to gmgf.
n/dhcpcd-9.4.1-x86_64-1.txz:  Upgraded.
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-3.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-3.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-3.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-3.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-3.txz:  Rebuilt.
  Let's enable SCHED_AUTOGROUP, which should improve desktop latency under a
  heavy CPU load while being mostly inert on servers. It may be disabled at
  boot time with a "noautogroup" kernel parameter, or at runtime like this:
  echo 0 > /proc/sys/kernel/sched_autogroup_enabled
  Thanks to gbschenkel.
  SCHED_AUTOGROUP n -> y
2021-10-26 08:59:55 +02:00
Patrick J Volkerding
9d31c53bf5 Sat Oct 23 18:57:30 UTC 2021
a/aaa_terminfo-6.3-x86_64-1.txz:  Upgraded.
a/glibc-zoneinfo-2021e-noarch-1.txz:  Upgraded.
ap/itstool-2.0.7-x86_64-2.txz:  Rebuilt.
  Rebuilt with PYTHON=/usr/bin/python3. Thanks to USUARIONUEVO.
ap/mpg123-1.29.2-x86_64-1.txz:  Upgraded.
d/meson-0.59.3-x86_64-1.txz:  Upgraded.
d/parallel-20211022-noarch-1.txz:  Upgraded.
d/python-pip-21.3.1-x86_64-1.txz:  Upgraded.
d/python-setuptools-58.3.0-x86_64-1.txz:  Upgraded.
l/exiv2-0.27.5-x86_64-1.txz:  Upgraded.
l/ncurses-6.3-x86_64-1.txz:  Upgraded.
n/php-7.4.25-x86_64-1.txz:  Upgraded.
  This update fixes bugs and a security issue:
  FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
  (* Security fix *)
xap/mozilla-thunderbird-91.2.1-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/91.2.1/releasenotes/
testing/packages/linux-5.14.x/kernel-generic-5.14.14-x86_64-2.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14-x86-2.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-x86_64-2.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-x86_64-2.txz:  Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14-noarch-2.txz:  Rebuilt.
  These kernels enable CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y allowing
  the kernel preemption model to be specified on the kernel command line
  with one of these options: preempt=none, preempt=voluntary, and preempt=full.
  Since there is no .config option to set a default, and the default in the
  kernel sources is "full" (which is probably not a good default), the
  kernel-source.SlackBuild has been modified to add support for an environment
  variable CONFIG_PREEMPT_DEFAULT_MODE which can be set to none, voluntary, or
  full to set the default kernel preemption model when a command line option
  is not provided. These kernels have been built with a preemption model of
  "none" (presumably the safest choice which will behave like the kernels we
  have shipped before.) The runtime overhead on 64-bit should be negligible.
  On 32-bit we lack support for HAVE_STATIC_CALL_INLINE, so spinlocks and
  mutexes will have to be approached through a trampoline, adding a very small
  amount of overhead. I feel this is probably worth it in order to have the
  option to run a kernel with voluntary or full preemption, especially for
  gaming or desktop purposes. The reduction in input lag with these modes is
  actually quite noticable.
  To check the current preemption model, you may use debugfs:
  mount -t debugfs none /sys/kernel/debug
  cat /sys/kernel/debug/sched/preempt
  (none) voluntary full
  You may change to a different preemption model on the fly once debugfs is
  mounted:
  echo voluntary > /sys/kernel/debug/sched/preempt
  cat /sys/kernel/debug/sched/preempt
  none (voluntary) full
  Thanks to Daedra.
  -DRM_I810 n
  -INLINE_READ_UNLOCK y
  -INLINE_READ_UNLOCK_IRQ y
  -INLINE_SPIN_UNLOCK_IRQ y
  -INLINE_WRITE_UNLOCK y
  -INLINE_WRITE_UNLOCK_IRQ y
   PREEMPT n -> y
   PREEMPT_VOLUNTARY y -> n
  +CEC_GPIO n
  +DEBUG_PREEMPT y
  +PREEMPTION y
  +PREEMPT_COUNT y
  +PREEMPT_DYNAMIC y
  +PREEMPT_RCU y
  +PREEMPT_TRACER n
  +RCU_BOOST n
  +TASKS_RCU y
  +UNINLINE_SPIN_UNLOCK y
2021-10-24 08:59:56 +02:00
Patrick J Volkerding
a5c7f74c57 Wed Jul 14 17:57:37 UTC 2021
a/kernel-generic-5.13.2-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.13.2-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.13.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.13.2-x86-1.txz:  Upgraded.
k/kernel-source-5.13.2-noarch-1.txz:  Upgraded.
xap/gnuchess-6.2.9-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-78.12.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/78.12.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2021-30/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2021-07-15 00:00:46 +02:00