slackware-current/slackware64/k/maketag.ez
Patrick J Volkerding a55e318a86 Thu Mar 17 19:46:28 UTC 2022
Have a great day, everyone! Off to enjoy a couple Guinness. :-)
a/kernel-generic-5.16.15-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.16.15-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.16.15-x86_64-1.txz:  Upgraded.
a/openssl-solibs-1.1.1n-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.16.15-x86-1.txz:  Upgraded.
d/meson-0.61.3-x86_64-1.txz:  Upgraded.
k/kernel-source-5.16.15-noarch-1.txz:  Upgraded.
kde/kstars-3.5.8-x86_64-1.txz:  Upgraded.
l/nodejs-16.14.1-x86_64-1.txz:  Upgraded.
n/bind-9.18.1-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An assertion could occur in resume_dslookup() if the fetch had been shut
  down earlier.
  Lookups involving a DNAME could trigger an INSIST when "synth-from-dnssec"
  was enabled.
  A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
  to be called recursively, which in turn left TCP connections hanging in the
  CLOSE_WAIT state blocking indefinitely when out-of-order processing was
  disabled.
  The rules for acceptance of records into the cache have been tightened to
  prevent the possibility of poisoning if forwarders send records outside
  the configured bailiwick.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
  (* Security fix *)
n/bluez-5.64-x86_64-1.txz:  Upgraded.
n/mobile-broadband-provider-info-20220316-x86_64-1.txz:  Upgraded.
n/openssl-1.1.1n-x86_64-1.txz:  Upgraded.
  This update fixes a high severity security issue:
  The BN_mod_sqrt() function, which computes a modular square root, contains
  a bug that can cause it to loop forever for non-prime moduli.
  For more information, see:
    https://www.openssl.org/news/secadv/20220315.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
  (* Security fix *)
n/openvpn-2.5.6-x86_64-1.txz:  Upgraded.
x/ibus-1.5.26-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-03-18 06:59:44 +01:00

46 lines
1.1 KiB
Bash

#!/bin/sh
TMP=/var/log/setup/tmp
if [ ! -d $TMP ]; then
mkdir -p $TMP
fi
add() {
for package in $* ; do
echo "$package: ADD" >> $TMP/SeTnewtag
done
}
skip() {
for package in $* ; do
echo "$package: SKP" >> $TMP/SeTnewtag
done
}
#item ####description ###on off ###
cat /dev/null > $TMP/SeTnewtag
dialog --title "SELECTING SOFTWARE FROM SERIES K (Linux kernel source)" \
--checklist "Please confirm the packages you wish to install \
from series K. Use the UP/DOWN keys to scroll through the list, and \
the SPACE key to deselect any items you don't want to install. \
Press ENTER when you are \
done." 11 70 1 \
"kernel-source" "Linux 5.16.15 kernel source" "on" \
2> $TMP/SeTpkgs
if [ $? = 1 -o $? = 255 ]; then
rm -f $TMP/SeTpkgs
> $TMP/SeTnewtag
for pkg in \
kernel-source \
; do
echo "$pkg: SKP" >> $TMP/SeTnewtag
done
exit
fi
cat /dev/null > $TMP/SeTnewtag
for PACKAGE in \
kernel-source \
; do
if grep "\(^\| \)$PACKAGE\( \|$\)" $TMP/SeTpkgs 1> /dev/null 2> /dev/null ; then
echo "$PACKAGE: ADD" >> $TMP/SeTnewtag
else
echo "$PACKAGE: SKP" >> $TMP/SeTnewtag
fi
done
rm -f $TMP/SeTpkgs