Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | Sat Dec 29 23:13:15 UTC 201820181229231315 | Patrick J Volkerding | 2018-12-30 |
| | | | | | | | | | | | | | | | | | | | | | a/kernel-generic-4.19.13-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.13-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.13-x86_64-1.txz: Upgraded. d/doxygen-1.8.15-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.13-x86-1.txz: Upgraded. k/kernel-source-4.19.13-noarch-1.txz: Upgraded. FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER y -> n l/libsecret-0.18.7-x86_64-1.txz: Upgraded. n/wpa_supplicant-2.6-x86_64-6.txz: Upgraded. It seems we're not the only ones with broken WPA2-Enterprise support with wpa_supplicant-2.7, so we'll fix it the same way as everyone else - by reverting to wpa_supplicant-2.6 for now. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. testing/packages/wpa_supplicant-2.7-x86_64-2.txz: Upgraded. Applied a patch from Gentoo to allow building CONFIG_IEEE80211X=y without the experimental CONFIG_FILS=y option. usb-and-pxe-installers/usbboot.img: Rebuilt. | ||
* | Sat Dec 22 04:38:27 UTC 201820181222043827 | Patrick J Volkerding | 2018-12-22 |
a/coreutils-8.30-x86_64-3.txz: Rebuilt. Support tmux terms in DIR_COLORS. Thanks to qunying. a/grep-3.3-x86_64-1.txz: Upgraded. a/kernel-generic-4.19.12-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.12-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.12-x86_64-1.txz: Upgraded. a/sed-4.7-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.12-x86-1.txz: Upgraded. d/rust-1.31.1-x86_64-1.txz: Upgraded. k/kernel-source-4.19.12-noarch-1.txz: Upgraded. l/graphite2-1.3.13-x86_64-1.txz: Upgraded. l/harfbuzz-2.3.0-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_19-x86_64-1.txz: Upgraded. l/lmdb-0.9.23-x86_64-1.txz: Upgraded. l/v4l-utils-1.16.3-x86_64-1.txz: Upgraded. n/netatalk-3.1.12-x86_64-1.txz: Upgraded. Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160 (* Security fix *) n/openldap-client-2.4.47-x86_64-1.txz: Upgraded. n/samba-4.9.4-x86_64-1.txz: Upgraded. x/intel-vaapi-driver-2.3.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. |