mirror of
git://slackware.nl/current.git
synced 2025-01-15 15:41:54 +01:00
9cc1c3b360
ap/diffutils-3.9-x86_64-1.txz: Upgraded. ap/lsof-4.97.0-x86_64-1.txz: Upgraded. ap/mpg123-1.31.2-x86_64-1.txz: Upgraded. d/binutils-2.40-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/git-2.39.1-x86_64-1.txz: Upgraded. d/oprofile-1.4.0-x86_64-11.txz: Rebuilt. Recompiled against binutils-2.40. n/httpd-2.4.55-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: mod_proxy allows a backend to trigger HTTP response splitting. mod_proxy_ajp possible request smuggling. mod_dav out of bounds read, or write of zero byte. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.55 https://www.cve.org/CVERecord?id=CVE-2022-37436 https://www.cve.org/CVERecord?id=CVE-2022-36760 https://www.cve.org/CVERecord?id=CVE-2006-20001 (* Security fix *) x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded. Compiled against libpinyin-2.8.1. x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded. x/libXpm-3.5.15-x86_64-1.txz: Upgraded. This update fixes security issues: Infinite loop on unclosed comments. Runaway loop with width of 0 and enormous height. Compression commands depend on $PATH. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-46285 https://www.cve.org/CVERecord?id=CVE-2022-44617 https://www.cve.org/CVERecord?id=CVE-2022-4883 (* Security fix *) x/libinput-1.22.1-x86_64-1.txz: Upgraded. x/libpinyin-2.8.1-x86_64-1.txz: Upgraded. Shared library .so-version bump. xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Thanks to marav for the build help. For more information, see: https://www.mozilla.org/en-US/firefox/109.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/ https://www.cve.org/CVERecord?id=CVE-2023-23597 https://www.cve.org/CVERecord?id=CVE-2023-23598 https://www.cve.org/CVERecord?id=CVE-2023-23599 https://www.cve.org/CVERecord?id=CVE-2023-23600 https://www.cve.org/CVERecord?id=CVE-2023-23601 https://www.cve.org/CVERecord?id=CVE-2023-23602 https://www.cve.org/CVERecord?id=CVE-2023-23603 https://www.cve.org/CVERecord?id=CVE-2023-23604 https://www.cve.org/CVERecord?id=CVE-2023-23605 https://www.cve.org/CVERecord?id=CVE-2023-23606 (* Security fix *)
120 lines
3.6 KiB
Bash
Executable file
120 lines
3.6 KiB
Bash
Executable file
#!/bin/sh
|
|
#
|
|
# Copyright 2011 Eric Hameleers, Eindhoven, NL
|
|
# Copyright 2011 Patrick Volkerding, Sebeka, Minnesota USA
|
|
# All rights reserved.
|
|
#
|
|
# Redistribution and use of this script, with or without modification, is
|
|
# permitted provided that the following conditions are met:
|
|
#
|
|
# 1. Redistributions of this script must retain the above copyright
|
|
# notice, this list of conditions and the following disclaimer.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
|
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
#
|
|
# Bug reports, suggestions, etc for pxesetup: alien@slackware.com
|
|
#
|
|
TMP=/var/log/setup/tmp
|
|
if [ ! -d $TMP ]; then
|
|
mkdir -p $TMP
|
|
fi
|
|
rm -f $TMP/SeT*
|
|
# If a keymap was set up, restore that data:
|
|
if [ -r $TMP/Pkeymap ]; then
|
|
cp $TMP/Pkeymap $TMP/SeTkeymap
|
|
fi
|
|
echo "on" > $TMP/SeTcolor # turn on color menus
|
|
PATH="$PATH:/usr/lib/setup"
|
|
export PATH;
|
|
export COLOR=on
|
|
# Before probing, activate any LVM partitions that may exist from
|
|
# before the boot - perhaps the Slackware tree is on a local partition:
|
|
vgchange -ay 1> /dev/null 2> /dev/null
|
|
if probe -l 2> /dev/null | grep -E 'Linux$' 1> /dev/null 2> /dev/null ; then
|
|
probe -l 2> /dev/null | grep -E 'Linux$' | sort | uniq 1> $TMP/SeTplist 2> /dev/null
|
|
fi
|
|
|
|
while [ 0 ]; do
|
|
|
|
dialog --title "Slackware PXE Setup (version 15.1)" \
|
|
--menu \
|
|
"Welcome to Slackware PXE Setup.\n\
|
|
Select an option below using the UP/DOWN keys and SPACE or ENTER.\n\
|
|
Alternate keys may also be used: '+', '-', and TAB." 18 72 9 \
|
|
"HELP" "Read the Slackware PXE Setup HELP file" \
|
|
"NETWORK" "Configure your network parameters" \
|
|
"SOURCE" "Select source media" \
|
|
"ACTIVATE" "Activate the Slackware PXE Server" \
|
|
"EXIT" "Exit Slackware PXE Setup" 2> $TMP/hdset
|
|
if [ ! $? = 0 ]; then
|
|
rm -f $TMP/hdset $TMP/SeT*
|
|
exit
|
|
fi
|
|
MAINSELECT="`cat $TMP/hdset`"
|
|
rm $TMP/hdset
|
|
|
|
# Start checking what to do. Some modules may reset MAINSELECT to run the
|
|
# next item in line.
|
|
|
|
if [ "$MAINSELECT" = "HELP" ]; then
|
|
SeTPXEHELP
|
|
fi
|
|
|
|
if [ "$MAINSELECT" = "NETWORK" ]; then
|
|
SeTnet
|
|
SeTpxe
|
|
if [ -r $TMP/SeTpxe ]; then
|
|
MAINSELECT="SOURCE"
|
|
fi
|
|
fi
|
|
|
|
if [ "$MAINSELECT" = "SOURCE" ]; then
|
|
SeTpxemedia
|
|
if [ -r $TMP/SeTsource ]; then
|
|
MAINSELECT="ACTIVATE"
|
|
fi
|
|
fi
|
|
|
|
if [ "$MAINSELECT" = "ACTIVATE" ]; then
|
|
if [ ! -r $TMP/SeTpxe -o ! -r $TMP/SeTsource ]; then
|
|
dialog --title "CANNOT START PXE SERVER YET" --msgbox "\
|
|
\n\
|
|
Before you can start the PXE Server, complete the following tasks:\n\
|
|
\n\
|
|
1. Set up your computer's network parameters.\n\
|
|
2. Select your source media.\n\
|
|
\n\
|
|
Press ENTER to return to the main menu." 14 68
|
|
continue
|
|
fi
|
|
# Time to start the BOOTP/TFTP/HTTP servers:
|
|
dnsmasq -C /etc/dnsmasq.conf
|
|
httpd -h /var/log/mount
|
|
|
|
dialog --backtitle "Slackware PXE Server." \
|
|
--title "PXE Client activity log" \
|
|
--ok-label "EXIT" \
|
|
--tailbox /var/log/dnsmasq.log 18 68
|
|
|
|
# Time to kill the BOOTP/TFTP/HTTP servers:
|
|
kill -TERM $(cat /var/run/dnsmasq.pid)
|
|
killall -TERM httpd
|
|
fi
|
|
|
|
if [ "$MAINSELECT" = "EXIT" ]; then
|
|
break
|
|
fi
|
|
|
|
done # end of main loop
|
|
|
|
# end slackware PXE setup script
|
|
|