mirror of
git://slackware.nl/current.git
synced 2024-12-27 09:59:16 +01:00
c9ced48b11
Hey folks, we got a new glibc and are beginning the process of baking the new default compile flags into the toolchain, the graphics stack, and whatever else happens along. Enjoy! :-) a/aaa_glibc-solibs-2.40-x86_64-1.txz: Upgraded. a/libblockdev-3.1.1_1-x86_64-2.txz: Rebuilt. Fix build against recent ext2fs.h. Thanks to shipujin. a/xfsprogs-6.9.0-x86_64-1.txz: Upgraded. ap/rpm-4.19.1.1-x86_64-3.txz: Rebuilt. ap/slackpkg-15.0.10-noarch-4.txz: Rebuilt. Prefer gpg1 again. Going with the modern gpg with more dependencies was a mistake in this case. (now we know why gnupg-1 is still around :-) Thanks to Petri Kaukasoina. d/binutils-2.42-x86_64-3.txz: Rebuilt. d/cargo-vendor-filterer-0.5.14-x86_64-2.txz: Rebuilt. d/cbindgen-0.26.0-x86_64-2.txz: Rebuilt. d/ccache-4.10.2-x86_64-1.txz: Upgraded. d/cmake-3.30.1-x86_64-2.txz: Rebuilt. d/gcc-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-g++-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gdc-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gfortran-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gm2-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gnat-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-go-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-objc-14.1.0-x86_64-2.txz: Rebuilt. d/libgccjit-14.1.0-x86_64-2.txz: Rebuilt. d/libtool-2.4.7-x86_64-8.txz: Rebuilt. d/parallel-20240722-noarch-1.txz: Upgraded. d/pkg-config-0.29.2-x86_64-5.txz: Rebuilt. d/python-setuptools-71.1.0-x86_64-1.txz: Upgraded. d/ruby-3.3.4-x86_64-2.txz: Rebuilt. d/rust-bindgen-0.69.4-x86_64-2.txz: Rebuilt. d/strace-6.10-x86_64-1.txz: Upgraded. d/subversion-1.14.3-x86_64-3.txz: Rebuilt. e/emacs-29.4-x86_64-2.txz: Rebuilt. l/PyQt-builder-1.16.4-x86_64-2.txz: Rebuilt. l/PyQt5-5.15.11-x86_64-1.txz: Upgraded. l/PyQt5_sip-12.15.0-x86_64-2.txz: Rebuilt. l/argon2-20190702-x86_64-6.txz: Rebuilt. l/ffmpeg-6.1.1-x86_64-5.txz: Rebuilt. l/glibc-2.40-x86_64-1.txz: Upgraded. This update fixes security issues: nscd: Stack-based buffer overflow in netgroup cache. nscd: Null pointer crash after notfound response. nscd: netgroup cache may terminate daemon on memory allocation failure. nscd: netgroup cache assumes NSS callback uses in-buffer strings. These vulnerabilities were only present in the nscd binary. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-33599 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://www.cve.org/CVERecord?id=CVE-2024-33602 (* Security fix *) l/glibc-i18n-2.40-x86_64-1.txz: Upgraded. l/glibc-profile-2.40-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.24.5-x86_64-2.txz: Rebuilt. l/libcdio-paranoia-10.2+2.0.2-x86_64-1.txz: Upgraded. l/libclc-18.1.8-x86_64-3.txz: Rebuilt. l/libproxy-0.5.8-x86_64-1.txz: Upgraded. l/lz4-1.10.0-x86_64-1.txz: Upgraded. l/poppler-24.07.0-x86_64-2.txz: Rebuilt. l/python-importlib_metadata-8.1.0-x86_64-1.txz: Upgraded. l/python-sphinx-7.4.7-x86_64-1.txz: Upgraded. l/qt5-5.15.14_20240716_ae0c8451-x86_64-1.txz: Upgraded. l/qt5-webkit-5.212.0_alpha4-x86_64-13.txz: Rebuilt. l/qt6-6.7.2_20240610_3f005f1e-x86_64-3.txz: Rebuilt. l/sip-6.8.6-x86_64-2.txz: Rebuilt. l/spirv-llvm-translator-18.1.2-x86_64-2.txz: Rebuilt. l/v4l-utils-1.28.0-x86_64-1.txz: Upgraded. n/bind-9.18.28-x86_64-1.txz: Upgraded. This update fixes security issues: Remove SIG(0) support from named as a countermeasure for CVE-2024-1975. qctx-zversion was not being cleared when it should have been leading to an assertion failure if it needed to be reused. An excessively large number of rrtypes per owner can slow down database query processing, so a limit has been placed on the number of rrtypes that can be stored per owner (node) in a cache or zone database. This is configured with the new "max-rrtypes-per-name" option, and defaults to 100. Excessively large rdatasets can slow down database query processing, so a limit has been placed on the number of records that can be stored per rdataset in a cache or zone database. This is configured with the new "max-records-per-type" option, and defaults to 100. Malicious DNS client that sends many queries over TCP but never reads responses can cause server to respond slowly or not respond at all for other clients. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-1975 https://www.cve.org/CVERecord?id=CVE-2024-4076 https://www.cve.org/CVERecord?id=CVE-2024-1737 https://www.cve.org/CVERecord?id=CVE-2024-0760 (* Security fix *) n/fetchmail-6.4.39-x86_64-1.txz: Upgraded. n/obexftp-0.24.2-x86_64-13.txz: Rebuilt. n/pinentry-1.3.1-x86_64-2.txz: Rebuilt. n/wpa_supplicant-2.11-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.6-x86_64-3.txz: Rebuilt. x/ibus-m17n-1.4.30-x86_64-1.txz: Upgraded. x/libdrm-2.4.122-x86_64-2.txz: Rebuilt. x/marisa-0.2.6-x86_64-10.txz: Rebuilt. x/mesa-24.1.4-x86_64-2.txz: Rebuilt. x/vulkan-sdk-1.3.275.0-x86_64-3.txz: Rebuilt. xap/audacious-4.4-x86_64-2.txz: Rebuilt. xap/audacious-plugins-4.4-x86_64-2.txz: Rebuilt. xap/mozilla-thunderbird-128.0.1esr-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.0.1esr/releasenotes/ xap/xaos-4.3.2-x86_64-2.txz: Rebuilt. extra/emacs-regular-build/emacs-29.4-x86_64-2_regular.txz: Rebuilt. |
||
---|---|---|
.. | ||
config | ||
patches | ||
doinst.sh | ||
README.slackware | ||
slack-desc | ||
wpa_supplicant.SlackBuild | ||
wpa_supplicant.url |
================================================= How do I get my card to use WPA-PSK in Slackware? ================================================= First off: wpa_supplicant REQUIRES the AP to broadcast the SSID. When the AP hides its SSID, all you will get out of wpa_supplicant is the message: "No suitable AP found" Also, read the MADwifi FAQ (http://madwifi.sourceforge.net/dokuwiki/doku.php) since it contains a wealth of information. This being said, you'll have to do the following (as root): Edit the file named /etc/wpa_supplicant.conf and add these lines: network={ scan_ssid=0 proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 } Then execute: /usr/sbin/wpa_passphrase YOURSSID passphrase with the SSID of your AP and the passphrase you've entered in its WPA-PSK configuration. You'll receive an output, which looks like this: network={ ssid="YOURSSID" #psk="passphrase" psk=66a4bfb03de5656cf26cfa03a116097546046f4aea11ee044b841171207d8308 } Copy the three lines within the network-tag into your own entry in wpa_supplicant.conf and change the permissions after you've finished editing: chmod 640 /etc/wpa_supplicant.conf To get your network device up and running, execute: ### /usr/sbin/wpa_supplicant -Bw -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi ### ### you don't have to run the above command by hand, because it will ### ### be executed by the rc.inet1 command that you run: ### /etc/rc.d/rc.inet1 ath0_start In case you want to see the wpa_supplicant in action, start it on the command line before enabling the wireless device, by running: /usr/sbin/wpa_supplicant -dw -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi The terminal where you've started the wpa_supplicant should now show the communication between your wlan card and the AP. If you got everything up and running you can let Slackware's init script take over by killing wpa_supplicant and running: /etc/rc.d/rc.inet1 ath0_restart Studying the wpa_supplicant README is also highly recommended for further insight!