1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-31 19:57:23 +01:00
slackware-current/slackware64/k/maketag
Patrick J Volkerding bf29f9a870 Wed Apr 22 02:19:37 UTC 2020
a/kernel-firmware-20200421_78c0348-noarch-1.txz:  Upgraded.
a/kernel-generic-5.4.34-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.4.34-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.4.34-x86_64-1.txz:  Upgraded.
a/openssl-solibs-1.1.1g-x86_64-1.txz:  Upgraded.
d/git-2.26.2-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  With a crafted URL that contains a newline or empty host, or lacks
  a scheme, the credential helper machinery can be fooled into
  providing credential information that is not appropriate for the
  protocol in use and host being contacted.
  Unlike the vulnerability CVE-2020-5260 fixed in v2.17.4, the
  credentials are not for a host of the attacker's choosing; instead,
  they are for some unspecified host (based on how the configured
  credential helper handles an absent "host" parameter).
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008
  (* Security fix *)
d/kernel-headers-5.4.34-x86-1.txz:  Upgraded.
d/vala-0.48.4-x86_64-1.txz:  Upgraded.
k/kernel-source-5.4.34-noarch-1.txz:  Upgraded.
  INFINIBAND_CXGB3 n -> m
  INFINIBAND_IPOIB_CM n -> y
  INFINIBAND_IPOIB_DEBUG_DATA n -> y
  Thanks to Karl Magnus Kolstø.
l/M2Crypto-0.35.2-x86_64-4.txz:  Rebuilt.
  Don't package typing-3.7.4.1 for python3.
l/netpbm-10.90.01-x86_64-1.txz:  Upgraded.
n/openssl-1.1.1g-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  Fixed segmentation fault in SSL_check_chain() that could be exploited by a
  malicious peer in a Denial of Service attack.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967
  (* Security fix *)
x/libva-2.7.1-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/PAM/openvpn-2.4.9-x86_64-1_pam.txz:  Upgraded.
  This update fixes a security issue:
  Fix illegal client float. Thanks to Lev Stipakov.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810
  (* Security fix *)
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2020-04-22 08:59:52 +02:00

46 lines
1.1 KiB
Bash

#!/bin/sh
TMP=/var/log/setup/tmp
if [ ! -d $TMP ]; then
mkdir -p $TMP
fi
add() {
for package in $* ; do
echo "$package: ADD" >> $TMP/SeTnewtag
done
}
skip() {
for package in $* ; do
echo "$package: SKP" >> $TMP/SeTnewtag
done
}
#item ####description ###on off ###
cat /dev/null > $TMP/SeTnewtag
dialog --title "SELECTING SOFTWARE FROM SERIES K (Linux kernel source)" \
--checklist "Please confirm the packages you wish to install \
from series K. Use the UP/DOWN keys to scroll through the list, and \
the SPACE key to deselect any items you don't want to install. \
Press ENTER when you are \
done." 11 70 1 \
"kernel-source" "Linux 5.4.34 kernel source" "on" \
2> $TMP/SeTpkgs
if [ $? = 1 -o $? = 255 ]; then
rm -f $TMP/SeTpkgs
> $TMP/SeTnewtag
for pkg in \
kernel-source \
; do
echo "$pkg: SKP" >> $TMP/SeTnewtag
done
exit
fi
cat /dev/null > $TMP/SeTnewtag
for PACKAGE in \
kernel-source \
; do
if grep "\(^\| \)$PACKAGE\( \|$\)" $TMP/SeTpkgs 1> /dev/null 2> /dev/null ; then
echo "$PACKAGE: ADD" >> $TMP/SeTnewtag
else
echo "$PACKAGE: SKP" >> $TMP/SeTnewtag
fi
done
rm -f $TMP/SeTpkgs