Slackware 64-bit
Code: Select all
Sun Jan 1 03:25:48 UTC 2023
Happy New Year! :-)
a/dialog-1.3_20221229-x86_64-1.txz: Upgraded.
a/file-5.44-x86_64-1.txz: Upgraded.
n/ipset-7.17-x86_64-1.txz: Upgraded.
x/libva-2.17.0-x86_64-1.txz: Upgraded.
x/libva-utils-2.17.0-x86_64-1.txz: Upgraded.
x/mesa-22.3.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.2-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.2-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.2-noarch-1.txz: Upgraded.
+--------------------------+
Sun Dec 25 23:21:25 UTC 2022
Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to
get some kind of kernel activity going again, but it most definitely belongs
in /testing for now. I've been trying to shape this up for weeks, but there
are still issues, and maybe someone out there can help. The biggest problem
is that the 32-bit kernels crash on boot. Initially there's some sort of
Intel ME failure (this is on a Thinkpad X1E). If those modules are
blacklisted, then the kernel will go on to crash loading the snd_hda_intel
module. The other issue is that I've got a 4K panel in this machine, and
have always appended the kernel option video=1920x1080@60 to put the console
in HD instead, and then loaded a Terminus console font to make the text even
larger. With these kernels, that option is completely ignored. I've tried some
other syntax I've seen online to no avail. And when the Terminus font is
loaded the text gets *even smaller* for some reason.
So be careful of these kernels (especially the 32-bit ones), but I welcome
any hints about what's going on here or if there are config changes that
might get this working properly. Is anyone out there running a 6.x kernel on
bare metal 32-bit x86?
Cheers!
ap/vim-9.0.1091-x86_64-1.txz: Upgraded.
d/meson-1.0.0-x86_64-1.txz: Upgraded.
d/ruby-3.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/subversion-1.14.2-x86_64-3.txz: Rebuilt.
Recompiled against ruby-3.2.0.
l/glib2-2.74.4-x86_64-1.txz: Upgraded.
l/netpbm-11.00.03-x86_64-1.txz: Upgraded.
l/rubygem-asciidoctor-2.0.18-x86_64-1.txz: Upgraded.
Compiled against ruby-3.2.0.
n/epic5-2.1.12-x86_64-2.txz: Rebuilt.
Recompiled against ruby-3.2.0.
x/marisa-0.2.6-x86_64-6.txz: Rebuilt.
Recompiled against ruby-3.2.0.
xap/vim-gvim-9.0.1091-x86_64-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-headers-6.1.1-x86-1.txz: Added.
testing/packages/linux-6.1.x/kernel-huge-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-modules-6.1.1-x86_64-1.txz: Added.
testing/packages/linux-6.1.x/kernel-source-6.1.1-noarch-1.txz: Added.
+--------------------------+
Fri Dec 23 20:27:02 UTC 2022
a/btrfs-progs-6.1-x86_64-1.txz: Upgraded.
a/kernel-firmware-20221216_52261d0-noarch-1.txz: Upgraded.
ap/man-pages-6.02-noarch-1.txz: Upgraded.
l/gtk4-4.8.3-x86_64-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.10.1-x86_64-1.txz: Upgraded.
xfce/xfce4-settings-4.18.1-x86_64-1.txz: Upgraded.
+--------------------------+
Fri Dec 23 02:37:47 UTC 2022
a/tcsh-6.24.07-x86_64-1.txz: Upgraded.
d/nasm-2.16.01-x86_64-1.txz: Upgraded.
n/dovecot-2.3.20-x86_64-1.txz: Upgraded.
n/nftables-1.0.6-x86_64-1.txz: Upgraded.
xfce/thunar-4.18.1-x86_64-1.txz: Upgraded.
+--------------------------+
Thu Dec 22 03:40:55 UTC 2022
a/sysvinit-scripts-15.1-noarch-3.txz: Rebuilt.
rc.6: support an optional rc.firewall_shutdown script. Most firewall scripts
don't need a formal shutdown, but in some cases it can be useful. If your
rc.firewall script supports a stop parameter, the shutdown script should just
contain "/etc/rc.d/rc.firewall stop", or rc.firewall_shutdown could also be
a symlink to the rc.firewall script in that case. But how the script works
is (like the rc.firewall script support) completely up to the admin.
Thanks to metaed for the suggestion.
Please note that contrary to the request, I placed this *after* the network
is shut down to avoid removing firewall protection while the interfaces are
still active. Whether it'll work in this place for metaed's (or anyone
else's) needs, I'm not sure. It's a start. Feel free to weigh in on the LQ
thread if you have any ideas for improvement, but the goal here is to keep
this support as simple and flexible as possible.
d/nasm-2.16-x86_64-1.txz: Upgraded.
d/parallel-20221222-noarch-1.txz: Upgraded.
n/bind-9.18.10-x86_64-1.txz: Upgraded.
n/curl-7.87.0-x86_64-1.txz: Upgraded.
xap/mozilla-thunderbird-102.6.1-x86_64-1.txz: Upgraded.
This release contains a security fix and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.6.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-54/
https://www.cve.org/CVERecord?id=CVE-2022-46874
(* Security fix *)
xfce/xfce4-screenshooter-1.10.0-x86_64-1.txz: Upgraded.
+--------------------------+
Tue Dec 20 20:40:18 UTC 2022
d/p2c-2.02-x86_64-1.txz: Upgraded.
kde/dolphin-22.12.0-x86_64-2.txz: Rebuilt.
[PATCH] Revert "portalize drag urls"
Thanks to marav.
l/gst-plugins-bad-free-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-base-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-good-1.20.5-x86_64-1.txz: Upgraded.
l/gst-plugins-libav-1.20.5-x86_64-1.txz: Upgraded.
l/gstreamer-1.20.5-x86_64-1.txz: Upgraded.
l/libqalculate-4.5.0-x86_64-1.txz: Upgraded.
l/libvncserver-0.9.14-x86_64-1.txz: Upgraded.
l/sdl-1.2.15-x86_64-14.txz: Rebuilt.
This update fixes a heap overflow problem in video/SDL_pixels.c in SDL.
By crafting a malicious .BMP file, an attacker can cause the application
using this library to crash, denial of service, or code execution.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2021-33657
(* Security fix *)
n/gnupg2-2.2.41-x86_64-1.txz: Upgraded.
n/libksba-1.6.3-x86_64-1.txz: Upgraded.
Fix another integer overflow in the CRL's signature parser.
(* Security fix *)
x/libSM-1.2.4-x86_64-1.txz: Upgraded.
x/xcb-util-0.4.1-x86_64-1.txz: Upgraded.
x/xdriinfo-1.0.7-x86_64-1.txz: Upgraded.
+--------------------------+
Mon Dec 19 21:18:22 UTC 2022
a/logrotate-3.21.0-x86_64-1.txz: Upgraded.
kde/gwenview-22.12.0-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
kde/kstars-3.6.2-x86_64-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
l/cfitsio-4.2.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/gsettings-desktop-schemas-43.0-x86_64-1.txz: Upgraded.
l/gtk4-4.8.2-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.6-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
x/xorg-server-xephyr-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.6-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.7-x86_64-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
testing/packages/rust-1.66.0-x86_64-1.txz: Added.
+--------------------------+
Sun Dec 18 20:58:52 UTC 2022
l/imagemagick-7.1.0_55-x86_64-2.txz: Rebuilt.
Rebuilt to fix dng.so module that was mistakenly compiled against the new
LibRaw that we don't yet include.
+--------------------------+
Sun Dec 18 20:28:03 UTC 2022
a/sysvinit-3.06-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_55-x86_64-1.txz: Upgraded.
l/libarchive-3.6.2-x86_64-2.txz: Rebuilt.
This update fixes a regression causing a failure to compile against
libarchive: don't include iconv in libarchive.pc.
x/xdg-desktop-portal-1.16.0-x86_64-1.txz: Upgraded.
+--------------------------+
Sun Dec 18 02:54:27 UTC 2022
a/aaa_libraries-15.1-x86_64-15.txz: Rebuilt.
Upgraded: liblzma.so.5.4.0, libmpc.so.3.3.1.
Thanks to LuckyCyborg for the heads-up.
+--------------------------+
Sat Dec 17 21:14:11 UTC 2022
a/xz-5.4.0-x86_64-1.txz: Upgraded.
l/harfbuzz-6.0.0-x86_64-1.txz: Upgraded.
l/libmpc-1.3.1-x86_64-1.txz: Upgraded.
n/NetworkManager-1.40.8-x86_64-1.txz: Upgraded.
n/samba-4.17.4-x86_64-1.txz: Upgraded.
This update fixes security issues:
This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of
Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.
A Samba Active Directory DC will issue weak rc4-hmac session keys for
use between modern clients and servers despite all modern Kerberos
implementations supporting the aes256-cts-hmac-sha1-96 cipher.
On Samba Active Directory DCs and members
'kerberos encryption types = legacy'
would force rc4-hmac as a client even if the server supports
aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
This is the Samba CVE for the Windows Kerberos Elevation of Privilege
Vulnerability disclosed by Microsoft on Nov 8 2022.
A service account with the special constrained delegation permission
could forge a more powerful ticket than the one it was presented with.
The "RC4" protection of the NetLogon Secure channel uses the same
algorithms as rc4-hmac cryptography in Kerberos, and so must also be
assumed to be weak.
Note that there are several important behavior changes included in this
release, which may cause compatibility problems interacting with system
still expecting the former behavior.
Please read the advisories of CVE-2022-37966, CVE-2022-37967 and
CVE-2022-38023 carefully!
For more information, see:
https://www.samba.org/samba/security/CVE-2022-37966.html
https://www.samba.org/samba/security/CVE-2022-37967.html
https://www.samba.org/samba/security/CVE-2022-38023.html
https://www.cve.org/CVERecord?id=CVE-2022-37966
https://www.cve.org/CVERecord?id=CVE-2022-37967
https://www.cve.org/CVERecord?id=CVE-2022-38023
(* Security fix *)
xfce/exo-4.18.0-x86_64-1.txz: Upgraded.
xfce/garcon-4.18.0-x86_64-1.txz: Upgraded.
xfce/libxfce4ui-4.18.0-x86_64-1.txz: Upgraded.
xfce/libxfce4util-4.18.0-x86_64-1.txz: Upgraded.
xfce/thunar-4.18.0-x86_64-1.txz: Upgraded.
xfce/thunar-volman-4.18.0-x86_64-1.txz: Upgraded.
xfce/tumbler-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-appfinder-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-dev-tools-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-notifyd-0.6.5-x86_64-1.txz: Upgraded.
xfce/xfce4-panel-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-power-manager-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-session-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-settings-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfce4-weather-plugin-0.11.0-x86_64-1.txz: Upgraded.
xfce/xfconf-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfdesktop-4.18.0-x86_64-1.txz: Upgraded.
xfce/xfwm4-4.18.0-x86_64-1.txz: Upgraded.
+--------------------------+
Sat Dec 17 02:40:06 UTC 2022
a/aaa_libraries-15.1-x86_64-14.txz: Rebuilt.
Upgraded: liblzma.so.5.2.9, libpcre2-8.so.0.11.2, libglib-2.0.so.0.7400.3,
libgmodule-2.0.so.0.7400.3, libpng16.so.16.39.0.
Removed: libFLAC++.so.6.3.0, libFLAC.so.8.3.0, libicudata.so.71.1,
libicui18n.so.71.1, libicuio.so.71.1, libicutest.so.71.1, libicutu.so.71.1,
libicuuc.so.71.1, libjasper.so.6.0.0.
Added: libboost_atomic.so.1.80.0, libboost_chrono.so.1.80.0,
libboost_container.so.1.80.0, libboost_context.so.1.80.0,
libboost_contract.so.1.80.0, libboost_coroutine.so.1.80.0,
libboost_date_time.so.1.80.0, libboost_fiber.so.1.80.0,
libboost_filesystem.so.1.80.0, libboost_graph.so.1.80.0,
libboost_iostreams.so.1.80.0, libboost_json.so.1.80.0,
libboost_locale.so.1.80.0, libboost_log.so.1.80.0,
libboost_log_setup.so.1.80.0, libboost_math_c99.so.1.80.0,
libboost_math_c99f.so.1.80.0, libboost_math_c99l.so.1.80.0,
libboost_math_tr1.so.1.80.0, libboost_math_tr1f.so.1.80.0,
libboost_math_tr1l.so.1.80.0, libboost_nowide.so.1.80.0,
libboost_prg_exec_monitor.so.1.80.0, libboost_program_options.so.1.80.0,
libboost_python27.so.1.80.0, libboost_python39.so.1.80.0,
libboost_random.so.1.80.0, libboost_regex.so.1.80.0,
libboost_serialization.so.1.80.0, libboost_stacktrace_addr2line.so.1.80.0,
libboost_stacktrace_basic.so.1.80.0, libboost_stacktrace_noop.so.1.80.0,
libboost_system.so.1.80.0, libboost_thread.so.1.80.0,
libboost_timer.so.1.80.0, libboost_type_erasure.so.1.80.0,
libboost_unit_test_framework.so.1.80.0, libboost_wave.so.1.80.0,
libboost_wserialization.so.1.80.0.
ap/pamixer-1.5-x86_64-5.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/kig-22.12.0-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/kopeninghours-22.12.0-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/krita-5.1.4-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
l/boost-1.81.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/cryfs-0.10.3-x86_64-7.txz: Rebuilt.
Recompiled against boost-1.81.0.
x/fcitx5-chinese-addons-5.0.16-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
x/libime-1.0.16-x86_64-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
xap/mozilla-firefox-108.0.1-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0.1/releasenotes/
xfce/elementary-xfce-0.17-x86_64-1.txz: Upgraded.
+--------------------------+
Fri Dec 16 04:46:51 UTC 2022
d/help2man-1.49.3-x86_64-1.txz: Upgraded.
l/pipewire-0.3.63-x86_64-1.txz: Upgraded.
x/libX11-1.8.3-x86_64-1.txz: Upgraded.
x/mesa-22.3.1-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
https://www.cve.org/CVERecord?id=CVE-2022-46871
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46873
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46877
https://www.cve.org/CVERecord?id=CVE-2022-46878
https://www.cve.org/CVERecord?id=CVE-2022-46879
(* Security fix *)
+--------------------------+
Wed Dec 14 21:19:34 UTC 2022
a/bash-5.2.015-x86_64-1.txz: Upgraded.
a/tcsh-6.24.06-x86_64-1.txz: Upgraded.
ap/inxi-3.3.24_1-noarch-1.txz: Upgraded.
ap/nano-7.1-x86_64-1.txz: Upgraded.
d/git-2.39.0-x86_64-1.txz: Upgraded.
d/rust-1.65.0-x86_64-1.txz: Upgraded.
d/strace-6.1-x86_64-1.txz: Upgraded.
kde/krita-5.1.4-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_54-x86_64-1.txz: Upgraded.
l/nodejs-19.3.0-x86_64-1.txz: Upgraded.
l/pcre2-10.42-x86_64-1.txz: Upgraded.
n/iproute2-6.1.0-x86_64-1.txz: Upgraded.
x/makedepend-1.0.8-x86_64-1.txz: Upgraded.
x/xhost-1.0.9-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.5-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
x/xorg-server-xephyr-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.5-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.6-x86_64-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
xap/mozilla-thunderbird-102.6.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
xap/xscreensaver-6.06-x86_64-1.txz: Upgraded.
testing/packages/mozilla-firefox-108.0-x86_64-1.txz: Upgraded.
Starting this out in /testing for now, since I've been trying for 2 days to
get it to compile on 32-bit with no luck. It ends up failing with a bunch of
errors like this:
ld.lld: error: undefined hidden symbol: tabs_4d51_TabsStore_sync
Any help getting this to build on 32-bit would be greatly appreciated.
I've tried most of ponce's bag of tricks already. :-)
+--------------------------+
Slackware 32-bit
Code: Select all
Sun Jan 1 03:25:48 UTC 2023
Happy New Year! :-)
a/dialog-1.3_20221229-i586-1.txz: Upgraded.
a/file-5.44-i586-1.txz: Upgraded.
n/ipset-7.17-i586-1.txz: Upgraded.
x/libva-2.17.0-i586-1.txz: Upgraded.
x/libva-utils-2.17.0-i586-1.txz: Upgraded.
x/mesa-22.3.2-i586-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.2-i586-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-smp-6.1.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-headers-6.1.2_smp-x86-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-6.1.2-i586-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-huge-smp-6.1.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-6.1.2-i586-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-modules-smp-6.1.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-source-6.1.2_smp-noarch-1.txz: Upgraded.
+--------------------------+
Sun Dec 25 23:21:25 UTC 2022
Hey folks, Merry Christmas and Hanukkah Sameach! Figured it was about time to
get some kind of kernel activity going again, but it most definitely belongs
in /testing for now. I've been trying to shape this up for weeks, but there
are still issues, and maybe someone out there can help. The biggest problem
is that the 32-bit kernels crash on boot. Initially there's some sort of
Intel ME failure (this is on a Thinkpad X1E). If those modules are
blacklisted, then the kernel will go on to crash loading the snd_hda_intel
module. The other issue is that I've got a 4K panel in this machine, and
have always appended the kernel option video=1920x1080@60 to put the console
in HD instead, and then loaded a Terminus console font to make the text even
larger. With these kernels, that option is completely ignored. I've tried some
other syntax I've seen online to no avail. And when the Terminus font is
loaded the text gets *even smaller* for some reason.
So be careful of these kernels (especially the 32-bit ones), but I welcome
any hints about what's going on here or if there are config changes that
might get this working properly. Is anyone out there running a 6.x kernel on
bare metal 32-bit x86?
Cheers!
ap/vim-9.0.1091-i586-1.txz: Upgraded.
d/meson-1.0.0-i586-1.txz: Upgraded.
d/ruby-3.2.0-i586-1.txz: Upgraded.
Shared library .so-version bump.
d/subversion-1.14.2-i586-3.txz: Rebuilt.
Recompiled against ruby-3.2.0.
l/glib2-2.74.4-i586-1.txz: Upgraded.
l/netpbm-11.00.03-i586-1.txz: Upgraded.
l/rubygem-asciidoctor-2.0.18-i586-1.txz: Upgraded.
Compiled against ruby-3.2.0.
n/epic5-2.1.12-i586-2.txz: Rebuilt.
Recompiled against ruby-3.2.0.
x/marisa-0.2.6-i586-6.txz: Rebuilt.
Recompiled against ruby-3.2.0.
xap/vim-gvim-9.0.1091-i586-1.txz: Upgraded.
testing/packages/linux-6.1.x/kernel-generic-6.1.1-i586-1.txz: Added.
testing/packages/linux-6.1.x/kernel-generic-smp-6.1.1_smp-i686-1.txz: Added.
testing/packages/linux-6.1.x/kernel-headers-6.1.1_smp-x86-1.txz: Added.
testing/packages/linux-6.1.x/kernel-huge-6.1.1-i586-1.txz: Added.
testing/packages/linux-6.1.x/kernel-huge-smp-6.1.1_smp-i686-1.txz: Added.
testing/packages/linux-6.1.x/kernel-modules-6.1.1-i586-1.txz: Added.
testing/packages/linux-6.1.x/kernel-modules-smp-6.1.1_smp-i686-1.txz: Added.
testing/packages/linux-6.1.x/kernel-source-6.1.1_smp-noarch-1.txz: Added.
+--------------------------+
Fri Dec 23 20:27:02 UTC 2022
a/btrfs-progs-6.1-i586-1.txz: Upgraded.
a/kernel-firmware-20221216_52261d0-noarch-1.txz: Upgraded.
ap/man-pages-6.02-noarch-1.txz: Upgraded.
l/gtk4-4.8.3-i586-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.10.1-i586-1.txz: Upgraded.
xfce/xfce4-settings-4.18.1-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 23 02:37:47 UTC 2022
a/tcsh-6.24.07-i586-1.txz: Upgraded.
d/nasm-2.16.01-i586-1.txz: Upgraded.
n/dovecot-2.3.20-i586-1.txz: Upgraded.
n/nftables-1.0.6-i586-1.txz: Upgraded.
xfce/thunar-4.18.1-i586-1.txz: Upgraded.
+--------------------------+
Thu Dec 22 03:40:55 UTC 2022
a/sysvinit-scripts-15.1-noarch-3.txz: Rebuilt.
rc.6: support an optional rc.firewall_shutdown script. Most firewall scripts
don't need a formal shutdown, but in some cases it can be useful. If your
rc.firewall script supports a stop parameter, the shutdown script should just
contain "/etc/rc.d/rc.firewall stop", or rc.firewall_shutdown could also be
a symlink to the rc.firewall script in that case. But how the script works
is (like the rc.firewall script support) completely up to the admin.
Thanks to metaed for the suggestion.
Please note that contrary to the request, I placed this *after* the network
is shut down to avoid removing firewall protection while the interfaces are
still active. Whether it'll work in this place for metaed's (or anyone
else's) needs, I'm not sure. It's a start. Feel free to weigh in on the LQ
thread if you have any ideas for improvement, but the goal here is to keep
this support as simple and flexible as possible.
d/nasm-2.16-i586-1.txz: Upgraded.
d/parallel-20221222-noarch-1.txz: Upgraded.
n/bind-9.18.10-i586-1.txz: Upgraded.
n/curl-7.87.0-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-102.6.1-i686-1.txz: Upgraded.
This release contains a security fix and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.6.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-54/
https://www.cve.org/CVERecord?id=CVE-2022-46874
(* Security fix *)
xfce/xfce4-screenshooter-1.10.0-i586-1.txz: Upgraded.
+--------------------------+
Tue Dec 20 20:40:18 UTC 2022
d/p2c-2.02-i586-1.txz: Upgraded.
kde/dolphin-22.12.0-i586-2.txz: Rebuilt.
[PATCH] Revert "portalize drag urls"
Thanks to marav.
l/gst-plugins-bad-free-1.20.5-i586-1.txz: Upgraded.
l/gst-plugins-base-1.20.5-i586-1.txz: Upgraded.
l/gst-plugins-good-1.20.5-i586-1.txz: Upgraded.
l/gst-plugins-libav-1.20.5-i586-1.txz: Upgraded.
l/gstreamer-1.20.5-i586-1.txz: Upgraded.
l/libqalculate-4.5.0-i586-1.txz: Upgraded.
l/libvncserver-0.9.14-i586-1.txz: Upgraded.
l/sdl-1.2.15-i586-14.txz: Rebuilt.
This update fixes a heap overflow problem in video/SDL_pixels.c in SDL.
By crafting a malicious .BMP file, an attacker can cause the application
using this library to crash, denial of service, or code execution.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2021-33657
(* Security fix *)
n/gnupg2-2.2.41-i586-1.txz: Upgraded.
n/libksba-1.6.3-i586-1.txz: Upgraded.
Fix another integer overflow in the CRL's signature parser.
(* Security fix *)
x/libSM-1.2.4-i586-1.txz: Upgraded.
x/xcb-util-0.4.1-i586-1.txz: Upgraded.
x/xdriinfo-1.0.7-i586-1.txz: Upgraded.
+--------------------------+
Mon Dec 19 21:18:22 UTC 2022
a/logrotate-3.21.0-i586-1.txz: Upgraded.
kde/gwenview-22.12.0-i586-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
kde/kstars-3.6.2-i586-2.txz: Rebuilt.
Recompiled against cfitsio-4.2.0.
l/cfitsio-4.2.0-i586-1.txz: Upgraded.
Shared library .so-version bump.
l/gsettings-desktop-schemas-43.0-i586-1.txz: Upgraded.
l/gtk4-4.8.2-i586-1.txz: Upgraded.
x/xorg-server-21.1.6-i586-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
x/xorg-server-xephyr-21.1.6-i586-1.txz: Upgraded.
x/xorg-server-xnest-21.1.6-i586-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.6-i586-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.7-i586-1.txz: Upgraded.
This release fixes an invalid event type mask in XTestSwapFakeInput which
was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
for CVE-2022-46340.
testing/packages/rust-1.66.0-i686-1.txz: Added.
+--------------------------+
Sun Dec 18 20:58:52 UTC 2022
l/imagemagick-7.1.0_55-i586-2.txz: Rebuilt.
Rebuilt to fix dng.so module that was mistakenly compiled against the new
LibRaw that we don't yet include.
+--------------------------+
Sun Dec 18 20:28:03 UTC 2022
a/sysvinit-3.06-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_55-i586-1.txz: Upgraded.
l/libarchive-3.6.2-i586-2.txz: Rebuilt.
This update fixes a regression causing a failure to compile against
libarchive: don't include iconv in libarchive.pc.
x/xdg-desktop-portal-1.16.0-i586-1.txz: Upgraded.
+--------------------------+
Sun Dec 18 02:54:27 UTC 2022
a/aaa_libraries-15.1-i586-15.txz: Rebuilt.
Upgraded: liblzma.so.5.4.0, libmpc.so.3.3.1.
Thanks to LuckyCyborg for the heads-up.
+--------------------------+
Sat Dec 17 21:14:11 UTC 2022
a/xz-5.4.0-i586-1.txz: Upgraded.
l/harfbuzz-6.0.0-i586-1.txz: Upgraded.
l/libmpc-1.3.1-i586-1.txz: Upgraded.
n/NetworkManager-1.40.8-i586-1.txz: Upgraded.
n/samba-4.17.4-i586-1.txz: Upgraded.
This update fixes security issues:
This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of
Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.
A Samba Active Directory DC will issue weak rc4-hmac session keys for
use between modern clients and servers despite all modern Kerberos
implementations supporting the aes256-cts-hmac-sha1-96 cipher.
On Samba Active Directory DCs and members
'kerberos encryption types = legacy'
would force rc4-hmac as a client even if the server supports
aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
This is the Samba CVE for the Windows Kerberos Elevation of Privilege
Vulnerability disclosed by Microsoft on Nov 8 2022.
A service account with the special constrained delegation permission
could forge a more powerful ticket than the one it was presented with.
The "RC4" protection of the NetLogon Secure channel uses the same
algorithms as rc4-hmac cryptography in Kerberos, and so must also be
assumed to be weak.
Note that there are several important behavior changes included in this
release, which may cause compatibility problems interacting with system
still expecting the former behavior.
Please read the advisories of CVE-2022-37966, CVE-2022-37967 and
CVE-2022-38023 carefully!
For more information, see:
https://www.samba.org/samba/security/CVE-2022-37966.html
https://www.samba.org/samba/security/CVE-2022-37967.html
https://www.samba.org/samba/security/CVE-2022-38023.html
https://www.cve.org/CVERecord?id=CVE-2022-37966
https://www.cve.org/CVERecord?id=CVE-2022-37967
https://www.cve.org/CVERecord?id=CVE-2022-38023
(* Security fix *)
xfce/exo-4.18.0-i586-1.txz: Upgraded.
xfce/garcon-4.18.0-i586-1.txz: Upgraded.
xfce/libxfce4ui-4.18.0-i586-1.txz: Upgraded.
xfce/libxfce4util-4.18.0-i586-1.txz: Upgraded.
xfce/thunar-4.18.0-i586-1.txz: Upgraded.
xfce/thunar-volman-4.18.0-i586-1.txz: Upgraded.
xfce/tumbler-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-appfinder-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-dev-tools-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-notifyd-0.6.5-i586-1.txz: Upgraded.
xfce/xfce4-panel-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-power-manager-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-session-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-settings-4.18.0-i586-1.txz: Upgraded.
xfce/xfce4-weather-plugin-0.11.0-i586-1.txz: Upgraded.
xfce/xfconf-4.18.0-i586-1.txz: Upgraded.
xfce/xfdesktop-4.18.0-i586-1.txz: Upgraded.
xfce/xfwm4-4.18.0-i586-1.txz: Upgraded.
+--------------------------+
Sat Dec 17 02:40:06 UTC 2022
a/aaa_libraries-15.1-i586-14.txz: Rebuilt.
Upgraded: liblzma.so.5.2.9, libpcre2-8.so.0.11.2, libglib-2.0.so.0.7400.3,
libgmodule-2.0.so.0.7400.3, libpng16.so.16.39.0.
Removed: libFLAC++.so.6.3.0, libFLAC.so.8.3.0, libicudata.so.71.1,
libicui18n.so.71.1, libicuio.so.71.1, libicutest.so.71.1, libicutu.so.71.1,
libicuuc.so.71.1, libjasper.so.6.0.0.
Added: libboost_atomic.so.1.80.0, libboost_chrono.so.1.80.0,
libboost_container.so.1.80.0, libboost_context.so.1.80.0,
libboost_contract.so.1.80.0, libboost_coroutine.so.1.80.0,
libboost_date_time.so.1.80.0, libboost_fiber.so.1.80.0,
libboost_filesystem.so.1.80.0, libboost_graph.so.1.80.0,
libboost_iostreams.so.1.80.0, libboost_json.so.1.80.0,
libboost_locale.so.1.80.0, libboost_log.so.1.80.0,
libboost_log_setup.so.1.80.0, libboost_math_c99.so.1.80.0,
libboost_math_c99f.so.1.80.0, libboost_math_c99l.so.1.80.0,
libboost_math_tr1.so.1.80.0, libboost_math_tr1f.so.1.80.0,
libboost_math_tr1l.so.1.80.0, libboost_nowide.so.1.80.0,
libboost_prg_exec_monitor.so.1.80.0, libboost_program_options.so.1.80.0,
libboost_python27.so.1.80.0, libboost_python39.so.1.80.0,
libboost_random.so.1.80.0, libboost_regex.so.1.80.0,
libboost_serialization.so.1.80.0, libboost_stacktrace_addr2line.so.1.80.0,
libboost_stacktrace_basic.so.1.80.0, libboost_stacktrace_noop.so.1.80.0,
libboost_system.so.1.80.0, libboost_thread.so.1.80.0,
libboost_timer.so.1.80.0, libboost_type_erasure.so.1.80.0,
libboost_unit_test_framework.so.1.80.0, libboost_wave.so.1.80.0,
libboost_wserialization.so.1.80.0.
ap/pamixer-1.5-i586-5.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/kig-22.12.0-i586-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/kopeninghours-22.12.0-i586-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
kde/krita-5.1.4-i586-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
l/boost-1.81.0-i586-1.txz: Upgraded.
Shared library .so-version bump.
l/cryfs-0.10.3-i586-7.txz: Rebuilt.
Recompiled against boost-1.81.0.
x/fcitx5-chinese-addons-5.0.16-i586-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
x/libime-1.0.16-i586-2.txz: Rebuilt.
Recompiled against boost-1.81.0.
xap/mozilla-firefox-108.0.1-i686-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0.1/releasenotes/
xfce/elementary-xfce-0.17-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 16 04:46:51 UTC 2022
d/help2man-1.49.3-i586-1.txz: Upgraded.
l/pipewire-0.3.63-i586-1.txz: Upgraded.
x/libX11-1.8.3-i586-1.txz: Upgraded.
x/mesa-22.3.1-i586-1.txz: Upgraded.
xap/mozilla-firefox-108.0-i686-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/108.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-51/
https://www.cve.org/CVERecord?id=CVE-2022-46871
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46873
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46877
https://www.cve.org/CVERecord?id=CVE-2022-46878
https://www.cve.org/CVERecord?id=CVE-2022-46879
(* Security fix *)
+--------------------------+
Wed Dec 14 21:19:34 UTC 2022
a/bash-5.2.015-i586-1.txz: Upgraded.
a/tcsh-6.24.06-i586-1.txz: Upgraded.
ap/inxi-3.3.24_1-noarch-1.txz: Upgraded.
ap/nano-7.1-i586-1.txz: Upgraded.
d/git-2.39.0-i586-1.txz: Upgraded.
d/rust-1.65.0-i686-1.txz: Upgraded.
d/strace-6.1-i586-1.txz: Upgraded.
kde/krita-5.1.4-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_54-i586-1.txz: Upgraded.
l/nodejs-19.3.0-i586-1.txz: Upgraded.
l/pcre2-10.42-i586-1.txz: Upgraded.
n/iproute2-6.1.0-i586-1.txz: Upgraded.
x/makedepend-1.0.8-i586-1.txz: Upgraded.
x/xhost-1.0.9-i586-1.txz: Upgraded.
x/xorg-server-21.1.5-i586-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
x/xorg-server-xephyr-21.1.5-i586-1.txz: Upgraded.
x/xorg-server-xnest-21.1.5-i586-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.5-i586-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.6-i586-1.txz: Upgraded.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
xap/mozilla-thunderbird-102.6.0-i686-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
xap/xscreensaver-6.06-i586-1.txz: Upgraded.
+--------------------------+