mirror of
git://slackware.nl/current.git
synced 2024-12-27 09:59:16 +01:00
4967f0e2be
a/elilo-3.16-x86_64-18.txz: Rebuilt. eliloconfig: if we don't find initrd-generic.img, try to fall back on /boot/initrd.gz. Thanks to rworkman. a/kernel-firmware-20241022_e1d9577-noarch-1.txz: Upgraded. a/kernel-generic-6.11.5-x86_64-1.txz: Upgraded. a/less-668-x86_64-1.txz: Upgraded. a/openssl11-solibs-1.1.1zb-x86_64-1.txz: Upgraded. a/sysvinit-3.11-x86_64-1.txz: Upgraded. a/usbutils-018-x86_64-1.txz: Upgraded. d/kernel-headers-6.11.5-x86-1.txz: Upgraded. d/parallel-20241022-noarch-1.txz: Upgraded. d/swig-4.3.0-x86_64-1.txz: Upgraded. k/kernel-source-6.11.5-noarch-1.txz: Upgraded. l/libvisio-0.1.8-x86_64-1.txz: Upgraded. l/python-trove-classifiers-2024.10.21.16-x86_64-1.txz: Upgraded. n/openssl11-1.1.1zb-x86_64-1.txz: Upgraded. Apply patch to fix a security issue: Harden BN_GF2m_poly2arr against misuse. This CVE was fixed by the 1.1.1zb release that is only available to subscribers to OpenSSL's premium extended support. The patch was prepared by backporting from the OpenSSL-3.0 repo. The reported version number has been updated so that vulnerability scanners calm down. Thanks to Ken Zalewski for the patch! For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-9143 (* Security fix *) xap/gucharmap-16.0.2-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-128.3.3esr-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.3.3esr/releasenotes/ isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
46 lines
1.1 KiB
Bash
46 lines
1.1 KiB
Bash
#!/bin/sh
|
|
TMP=/var/log/setup/tmp
|
|
if [ ! -d $TMP ]; then
|
|
mkdir -p $TMP
|
|
fi
|
|
add() {
|
|
for package in $* ; do
|
|
echo "$package: ADD" >> $TMP/SeTnewtag
|
|
done
|
|
}
|
|
skip() {
|
|
for package in $* ; do
|
|
echo "$package: SKP" >> $TMP/SeTnewtag
|
|
done
|
|
}
|
|
#item ####description ###on off ###
|
|
cat /dev/null > $TMP/SeTnewtag
|
|
dialog --title "SELECTING SOFTWARE FROM SERIES K (Linux kernel source)" \
|
|
--checklist "Please confirm the packages you wish to install \
|
|
from series K. Use the UP/DOWN keys to scroll through the list, and \
|
|
the SPACE key to deselect any items you don't want to install. \
|
|
Press ENTER when you are \
|
|
done." 11 70 1 \
|
|
"kernel-source" "Linux 6.11.5 kernel source" "on" \
|
|
2> $TMP/SeTpkgs
|
|
if [ $? = 1 -o $? = 255 ]; then
|
|
rm -f $TMP/SeTpkgs
|
|
> $TMP/SeTnewtag
|
|
for pkg in \
|
|
kernel-source \
|
|
; do
|
|
echo "$pkg: SKP" >> $TMP/SeTnewtag
|
|
done
|
|
exit
|
|
fi
|
|
cat /dev/null > $TMP/SeTnewtag
|
|
for PACKAGE in \
|
|
kernel-source \
|
|
; do
|
|
if grep "\(^\| \)$PACKAGE\( \|$\)" $TMP/SeTpkgs 1> /dev/null 2> /dev/null ; then
|
|
echo "$PACKAGE: ADD" >> $TMP/SeTnewtag
|
|
else
|
|
echo "$PACKAGE: SKP" >> $TMP/SeTnewtag
|
|
fi
|
|
done
|
|
rm -f $TMP/SeTpkgs
|