summaryrefslogtreecommitdiff
path: root/source/a/etc/passwd.new
Commit message (Collapse)AuthorAge
* Thu Sep 16 02:52:54 UTC 202120210916025254Patrick J Volkerding2021-09-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | a/etc-15.0-x86_64-17.txz: Rebuilt. Added named:named (53:53) user and group. a/kernel-firmware-20210915_198ac65-noarch-1.txz: Upgraded. a/kernel-generic-5.14.4-x86_64-1.txz: Upgraded. a/kernel-huge-5.14.4-x86_64-1.txz: Upgraded. a/kernel-modules-5.14.4-x86_64-1.txz: Upgraded. ap/sudo-1.9.8-x86_64-1.txz: Upgraded. d/kernel-headers-5.14.4-x86-1.txz: Upgraded. k/kernel-source-5.14.4-noarch-1.txz: Upgraded. kde/breeze-icons-5.85.0-noarch-2.txz: Rebuilt. Patched with upstream commit to allow using this icon theme with Xfce. l/fluidsynth-2.2.3-x86_64-1.txz: Upgraded. l/python-charset-normalizer-2.0.5-x86_64-1.txz: Upgraded. l/qca-2.3.4-x86_64-1.txz: Upgraded. n/NetworkManager-1.32.10-x86_64-3.txz: Rebuilt. Switch to dhcp=internal to avoid problems swimming upstream. For those looking for a fix to continue using dhcpcd, a PRIVSEP build variable was added to the SlackBuild, and you may produce a fully NetworkManager compatible dhcpcd package with this command: PRIVSEP=no ./dhcpcd.SlackBuild Privilege separation remains the dhcpcd package default as we don't want to weaken security for those using rc.inet1 along with dhcpcd. Some additional comments about this were added to 00-dhcp-client.conf mentioning this and the workaround of killing dhcpcd manually when resuming with the stock dhcpcd package. n/bind-9.16.21-x86_64-1.txz: Upgraded. Fixed call to rndc-confgen in the install script. Make /etc/rndc.key owned by named:named. Run named as named:named by default (configurable in /etc/default/named). rc.bind: chown /run/named and /var/named to configured user:group. Thanks to Ressy for prompting this cleanup. :) n/curl-7.79.0-x86_64-1.txz: Upgraded. This update fixes security issues: clear the leftovers pointer when sending succeeds. do not ignore --ssl-reqd. reject STARTTLS server response pipelining. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 (* Security fix *) n/links-2.24-x86_64-1.txz: Upgraded. n/wireguard-tools-1.0.20210914-x86_64-1.txz: Upgraded. x/libinput-1.19.0-x86_64-1.txz: Upgraded. xap/gimp-2.10.28-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
* Tue Aug 31 20:58:13 UTC 202120210831205813Patrick J Volkerding2021-09-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | a/etc-15.0-x86_64-16.txz: Rebuilt. Added dhcpcd:dhcpcd (68:68) user and group. Thanks to Paul Blazejowski. a/kernel-firmware-20210830_2e271f2-noarch-1.txz: Upgraded. a/ntfs-3g-2021.8.22-x86_64-1.txz: Upgraded. Shared library .so-version bump. Fixed vulnerabilities that may allow an attacker using a maliciously crafted NTFS-formatted image file or external storage to potentially execute arbitrary privileged code. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263 (* Security fix *) d/mercurial-5.9.1-x86_64-1.txz: Upgraded. d/python3-3.9.7-x86_64-1.txz: Upgraded. kde/bluedevil-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-grub-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.22.5-x86_64-1.txz: Upgraded. kde/drkonqi-5.22.5-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.22.5-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.22.5-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.22.5-x86_64-1.txz: Upgraded. kde/kdecoration-5.22.5-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.22.5-x86_64-1.txz: Upgraded. kde/kgamma5-5.22.5-x86_64-1.txz: Upgraded. kde/khotkeys-5.22.5-x86_64-1.txz: Upgraded. kde/kinfocenter-5.22.5-x86_64-1.txz: Upgraded. kde/kmenuedit-5.22.5-x86_64-1.txz: Upgraded. kde/kscreen-5.22.5-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.22.5-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.22.5-x86_64-1.txz: Upgraded. kde/ksystemstats-5.22.5-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-server-5.22.5-x86_64-1.txz: Upgraded. kde/kwin-5.22.5-x86_64-1.txz: Upgraded. kde/kwrited-5.22.5-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.22.5-x86_64-1.txz: Upgraded. kde/libkscreen-5.22.5-x86_64-1.txz: Upgraded. kde/libksysguard-5.22.5-x86_64-1.txz: Upgraded. kde/milou-5.22.5-x86_64-1.txz: Upgraded. kde/oxygen-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-disks-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-nm-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-pa-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-vault-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.22.5-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.22.5-x86_64-1.txz: Upgraded. kde/powerdevil-5.22.5-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.22.5-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.22.5-x86_64-1.txz: Upgraded. kde/systemsettings-5.22.5-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.22.5-x86_64-1.txz: Upgraded. l/mozilla-nss-3.69.1-x86_64-1.txz: Upgraded. xap/xlockmore-5.67-x86_64-1.txz: Upgraded.
* Fri May 15 07:28:15 UTC 202020200515072815Patrick J Volkerding2020-05-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Hey folks, just a heads-up that PAM is about to be merged into the main tree. We can't have it blocking other upgrades any longer. The config files could be improved (adding support for pam_krb5 and pam_ldap, for example), but they'll do for now. Have a good weekend, and enjoy these updates! :-) a/aaa_elflibs-15.0-x86_64-23.txz: Rebuilt. Upgraded: libcap.so.2.34, libelf-0.179.so, liblzma.so.5.2.5, libglib-2.0.so.0.6400.2, libgmodule-2.0.so.0.6400.2, libgobject-2.0.so.0.6400.2, libgthread-2.0.so.0.6400.2, liblber-2.4.so.2.10.13, libldap-2.4.so.2.10.13, libpcre2-8.so.0.10.0. Added temporarily in preparation for upgrading icu4c: libicudata.so.65.1, libicui18n.so.65.1, libicuio.so.65.1, libicutest.so.65.1, libicutu.so.65.1, libicuuc.so.65.1. a/etc-15.0-x86_64-11.txz: Rebuilt. /etc/passwd: Added ldap (UID 330). /etc/group: Added ldap (GID 330). a/kernel-generic-5.4.41-x86_64-1.txz: Upgraded. a/kernel-huge-5.4.41-x86_64-1.txz: Upgraded. a/kernel-modules-5.4.41-x86_64-1.txz: Upgraded. a/pkgtools-15.0-noarch-33.txz: Rebuilt. setup.services: added support for rc.openldap and rc.openvpn. ap/hplip-3.20.5-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.41-x86-1.txz: Upgraded. d/python-setuptools-46.3.0-x86_64-1.txz: Upgraded. d/python3-3.8.3-x86_64-1.txz: Upgraded. k/kernel-source-5.4.41-noarch-1.txz: Upgraded. n/openldap-2.4.50-x86_64-1.txz: Added. This is a complete OpenLDAP package with both client and server support. Thanks to Giuseppe Di Terlizzi for help with the server parts. n/openldap-client-2.4.50-x86_64-1.txz: Removed. x/mesa-20.0.7-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/PAM/hplip-3.20.5-x86_64-1_pam.txz: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
* Tue Aug 14 00:10:54 UTC 201820180814001054Patrick J Volkerding2018-08-14
| | | | | | | | | | | | | | | a/etc-15.0-x86_64-8.txz: Rebuilt. /etc/passwd: Added icecc (UID 49). /etc/group: Added icecc (GID 49). a/pciutils-3.6.2-x86_64-1.txz: Upgraded. a/sysvinit-scripts-2.1-noarch-17.txz: Rebuilt. rc.M: start rc.icecc-scheduler and rc.iceccd. d/icecream-1.1-x86_64-1.txz: Added. Thanks to Heinz Wiesinger for the SBo reference build script. n/libmbim-1.16.2-x86_64-1.txz: Upgraded. n/libqmi-1.20.2-x86_64-1.txz: Upgraded. n/p11-kit-0.23.13-x86_64-1.txz: Upgraded. x/xterm-334-x86_64-1.txz: Upgraded.
* Wed Jun 13 21:55:19 UTC 201820180613215519Patrick J Volkerding2018-06-14
a/etc-15.0-x86_64-5.txz: Rebuilt. Don't hardcode passwd/shadow/group additions in doinst.sh - get them from the .new files. a/sysvinit-scripts-2.1-noarch-11.txz: Rebuilt. rc.S: don't start rc.haveged in this script - move it to rc.M. rc.M: start rc.haveged after seeding /dev/urandom in rc.S, and after starting syslogd, klogd, and udev in rc.M. rc.M: start rc.rndg (we don't ship it or rng-tools) after udev. H. Peter Anvin says that it's fine to run both haveged and rndg, and I trust his opinion on that. Thanks to GazL. ap/at-3.1.20-x86_64-4.txz: Rebuilt. Fixed wrong variable in rc.atd. Thanks to upnort. n/libgcrypt-1.8.3-x86_64-1.txz: Upgraded. Use blinding for ECDSA signing to mitigate a novel side-channel attack. For more information, see: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 (* Security fix *)