LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Latest changelog for slackware-current (https://www.linuxquestions.org/questions/slackware-14/latest-changelog-for-slackware-current-4175698890/)

marav 11-07-2021 03:36 PM

We would be smart to end the mirror discussion and wait wisely for the next changelog :)
Thx

marav 11-09-2021 01:32 AM

6 updates : 5 upgraded, 1 rebuilt
Code:

Tue Nov  9 03:20:45 UTC 2021
ap/texinfo-6.8-x86_64-3.txz:  Rebuilt.
  Patched to fix issues with pt_BR locale. Thanks to Luiz Ramos.
l/harfbuzz-3.1.1-x86_64-1.txz:  Upgraded.
l/netpbm-10.96.03-x86_64-1.txz:  Upgraded.
l/qtkeychain-0.13.1-x86_64-1.txz:  Upgraded.
n/iw-5.16-x86_64-1.txz:  Upgraded.
n/postfix-3.6.3-x86_64-1.txz:  Upgraded.

source/installer
Code:

Sun Nov  7 06:11:40 UTC 2021
  usr/lib/setup/setup:  Added 'power off' to the list of available options
  ('reboot' and 'shell'), when the installer completes successfully.


marav 11-09-2021 01:56 AM

Quote:

Originally Posted by marav (Post 6299658)
source/installer
Code:

Sun Nov  7 06:11:40 UTC 2021
  usr/lib/setup/setup:  Added 'power off' to the list of available options
  ('reboot' and 'shell'), when the installer completes successfully.


I'm curious to know how many people won't be excited to reboot on their fresh new install of Slackware and just shut it down :scratch:

chrisretusn 11-09-2021 02:05 AM

Quote:

Originally Posted by marav (Post 6299665)
I'm curious to know how many people won't be excited to reboot on their fresh new install of Slackware and just shut it down :scratch:

Yeah, kind of wondering the same. Even when I install a fresh new virtual machine, I usually reboot just to make sure it does that successfully, then shut it down.

LuckyCyborg 11-09-2021 02:16 AM

Quote:

Originally Posted by marav (Post 6299665)
I'm curious to know how many people won't be excited to reboot on their fresh new install of Slackware and just shut it down :scratch:

Mass deploying of Slackware powered computers on a business?

Maybe the testing stage is on another room and the particular employee has just to install the system?

TheRealGrogan 11-09-2021 02:43 AM

Quote:

Originally Posted by marav (Post 6299665)
I'm curious to know how many people won't be excited to reboot on their fresh new install of Slackware and just shut it down :scratch:

The humour is not lost on me, but perhaps in some cases to shut down and connect the disk to another controller, once the install has completed?

It doesn't really matter that much, you can unmount filesystems and just kill the power at that point, but it's good to have the option for when someone wants to shut down to mess with hardware before booting the installed kernel proper.

marav 11-09-2021 02:46 PM

53 updates. Including a (* Security fix *)! : 51 upgraded, 1 rebuilt, 1 added
Code:

Tue Nov  9 20:22:27 UTC 2021
a/dialog-1.3_20211107-x86_64-1.txz:  Upgraded.
ap/mariadb-10.5.13-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  Easily exploitable vulnerability allows high privileged attacker with network
  access via multiple protocols to compromise MariaDB Server. Successful
  attacks of this vulnerability can result in unauthorized ability to cause a
  hang or frequently repeatable crash (complete DOS) of MariaDB Server as well
  as unauthorized update, insert or delete access to some of MariaDB Server
  accessible data.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
  (* Security fix *)
kde/bluedevil-5.23.3-x86_64-1.txz:  Upgraded.
kde/breeze-5.23.3-x86_64-1.txz:  Upgraded.
kde/breeze-grub-5.23.3-x86_64-1.txz:  Upgraded.
kde/breeze-gtk-5.23.3-x86_64-1.txz:  Upgraded.
kde/drkonqi-5.23.3-x86_64-1.txz:  Upgraded.
kde/kactivitymanagerd-5.23.3-x86_64-1.txz:  Upgraded.
kde/kde-cli-tools-5.23.3-x86_64-1.txz:  Upgraded.
kde/kde-gtk-config-5.23.3-x86_64-1.txz:  Upgraded.
kde/kdecoration-5.23.3-x86_64-1.txz:  Upgraded.
kde/kdeplasma-addons-5.23.3-x86_64-1.txz:  Upgraded.
kde/kdev-python-5.6.2-x86_64-4.txz:  Added.
kde/kgamma5-5.23.3-x86_64-1.txz:  Upgraded.
kde/khotkeys-5.23.3-x86_64-1.txz:  Upgraded.
kde/kinfocenter-5.23.3-x86_64-1.txz:  Upgraded.
kde/kmenuedit-5.23.3-x86_64-1.txz:  Upgraded.
kde/kscreen-5.23.3-x86_64-1.txz:  Upgraded.
kde/kscreenlocker-5.23.3-x86_64-1.txz:  Upgraded.
kde/ksshaskpass-5.23.3-x86_64-1.txz:  Upgraded.
kde/ksystemstats-5.23.3-x86_64-1.txz:  Upgraded.
kde/kwallet-pam-5.23.3-x86_64-1.txz:  Upgraded.
kde/kwayland-integration-5.23.3-x86_64-1.txz:  Upgraded.
kde/kwayland-server-5.23.3-x86_64-1.txz:  Upgraded.
kde/kwin-5.23.3-x86_64-1.txz:  Upgraded.
kde/kwrited-5.23.3-x86_64-1.txz:  Upgraded.
kde/layer-shell-qt-5.23.3-x86_64-1.txz:  Upgraded.
kde/libkscreen-5.23.3-x86_64-1.txz:  Upgraded.
kde/libksysguard-5.23.3-x86_64-1.txz:  Upgraded.
kde/milou-5.23.3-x86_64-1.txz:  Upgraded.
kde/oxygen-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-browser-integration-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-desktop-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-disks-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-firewall-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-integration-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-nm-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-pa-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-sdk-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-systemmonitor-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-vault-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-5.23.3-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-wallpapers-5.23.3-x86_64-1.txz:  Upgraded.
kde/polkit-kde-agent-1-5.23.3-x86_64-1.txz:  Upgraded.
kde/powerdevil-5.23.3-x86_64-1.txz:  Upgraded.
kde/qqc2-breeze-style-5.23.3-x86_64-1.txz:  Upgraded.
kde/sddm-kcm-5.23.3-x86_64-1.txz:  Upgraded.
kde/systemsettings-5.23.3-x86_64-1.txz:  Upgraded.
kde/xdg-desktop-portal-kde-5.23.3-x86_64-1.txz:  Upgraded.
l/libxml2-2.9.12-x86_64-5.txz:  Rebuilt.
  Applied upstream patch:
  [PATCH] Work around lxml API abuse.
  Thanks to brobr.
x/libdrm-2.4.108-x86_64-1.txz:  Upgraded.
x/libevdev-1.12.0-x86_64-1.txz:  Upgraded.
xap/xsnow-3.3.2-x86_64-1.txz:  Upgraded.
  Just in time for tomorrow night here in Minnesota. :-)


Didier Spaier 11-09-2021 03:55 PM

Like a hamster in a mill... The mill is -current. Finding the hamster's name is left to the reader as an exercise. The real question is "when will the mill stop"?

LuckyCyborg 11-09-2021 04:22 PM

Quote:

Originally Posted by Didier Spaier (Post 6299816)
Like a hamster in a mill... The mill is -current. Finding the hamster's name is left to the reader as an exercise. The real question is "when will the mill stop"?

Probably, soon...

Our BDFL said that the kernel 5.15.x will be one shipped by release, the Plasma5 and XFCE looks being on a excellent shape, all looks being set - at least for me, what we run is basically RC2 as stability.

I believe that on the end of December or January we will have the release. :D

hitest 11-09-2021 04:37 PM

Quote:

Originally Posted by LuckyCyborg (Post 6299820)
Our BDFL said that the kernel 5.15.x will be one shipped by release, the Plasma5 and XFCE looks being on a excellent shape, all looks being set - at least for me, what we run is basically RC2 as stability.

I believe that on the end of December or January we will have the release. :D

Agreed. I enjoy the speculation too. Christmas for 15.0 looks good to me. Back on topic. Thanks for the updates today, Mr. Volkerding. Current is looking polished to me. :cool:

MadMaverick9 11-09-2021 09:15 PM

Quote:

Originally Posted by Didier Spaier
Like a hamster in a mill... The mill is -current. Finding the hamster's name is left to the reader as an exercise. The real question is "when will the mill stop"?

Stop blaming the distro maintainers.

In my personal opinion the problem is with the upstream projects who are continuously "releasing" stuff (quotes are intentional).

In a distant past we had two, three maybe four proper high quality releases per year.

Now we get low quality "releases" every two weeks. And the "version" numbers that come with it are completely meaningless.

I very much appreciate the effort by Pat Volkerding trying to release a stable high quality Slackware 15.0.

alnun 11-10-2021 06:29 AM

Quote:

Originally Posted by MadMaverick9 (Post 6299892)
Stop blaming the distro maintainers.

In my personal opinion the problem is with the upstream projects who are continuously "releasing" stuff (quotes are intentional).

In a distant past we had two, three maybe four proper high quality releases per year.

Now we get low quality "releases" every two weeks. And the "version" numbers that come with it are completely meaningless.

I very much appreciate the effort by Pat Volkerding trying to release a stable high quality Slackware 15.0.

I wouldn't even blame it fully on the upstream projects. Both proprietary software and open source software is guilty of this and it's a byproduct of the general public demanding more software releases at quicker intervals. It's just the current times we live in to where people want their shiny new stuff now and not later.

Pithium 11-10-2021 08:08 AM

Quote:

Originally Posted by alnun (Post 6299991)
I wouldn't even blame it fully on the upstream projects. Both proprietary software and open source software is guilty of this and it's a byproduct of the general public demanding more software releases at quicker intervals. It's just the current times we live in to where people want their shiny new stuff now and not later.

Yes, the end-user definitely has unreasonable expectations.

However, as a developer you have a choice. Sometimes you need to look the user in the eye and tell them that what they want isn't going to make their life better. This is common practice in the tech support world but most developers consider themselves to be above such menial labor and treat support techs like the school janitor.

User: My computer is broken, USB devices aren't showing up properly
Me: Looks like you have Fast Start enabled, let's turn that off
User: Fast Start? Doesn't that make my computer boot faster? I want that enabled...
Me: Well let's disable it for now and see if that solves problems with your USB devices. We can always turn it back on later.
- 3 reboots later -
User: WTF it fixed the problem?? How does that even happen? Doesn't Microsoft have developers who can fix this?
Me: .... welcome to my world.....


I also have stories about MacOS destroying partition tables and the Ubuntu Wifi scanner crashing when too many SSID's are in the area. Devs had a choice and I think they chose wrong. But ultimately this is all off-topic flame war bait.

marav 11-10-2021 08:58 AM

As in other threads, including this one:
Quote:

Originally Posted by Jan K. (Post 6300017)
The rules clearly invites anyone to open new threads...

"When posting in an existing thread, ensure that what you're posting is on-topic and relevant to the thread. If the content of your post will interfere with the current discussion, you should start a new thread."

Surely we don't need moderators or management... :rolleyes:

Hmmm... okay. Right. Sometimes we *really* do! :D

Thank you all for trying to remember this for the next few times

marav 11-10-2021 02:50 PM

6 updates. Including a (* Security fix *)! : 6 upgraded
Code:

Wed Nov 10 20:32:37 UTC 2021
d/python3-3.9.8-x86_64-1.txz:  Upgraded.
l/libtasn1-4.18.0-x86_64-1.txz:  Upgraded.
n/curl-7.80.0-x86_64-1.txz:  Upgraded.
n/ethtool-5.15-x86_64-1.txz:  Upgraded.
n/samba-4.15.2-x86_64-1.txz:  Upgraded.
  This is a security release in order to address the following defects:
  SMB1 client connections can be downgraded to plaintext authentication.
  A user on the domain can become root on domain members.
  Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC.
  Samba AD DC did not always rely on the SID and PAC in Kerberos tickets.
  Kerberos acceptors need easy access to stable AD identifiers (eg objectSid).
  Samba AD DC did not do suffienct access and conformance checking of data
  stored.
  Use after free in Samba AD DC RPC server.
  Subsequent DCE/RPC fragment injection vulnerability.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2016-2124.html
    https://www.samba.org/samba/security/CVE-2020-25717.html
    ^^ (PLEASE READ! There are important behaviour changes described)
    https://www.samba.org/samba/security/CVE-2020-25718.html
    https://www.samba.org/samba/security/CVE-2020-25719.html
    https://www.samba.org/samba/security/CVE-2020-25721.html
    https://www.samba.org/samba/security/CVE-2020-25722.html
    https://www.samba.org/samba/security/CVE-2021-3738.html
    https://www.samba.org/samba/security/CVE-2021-23192.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
  (* Security fix *)
x/xorg-server-xwayland-21.1.3-x86_64-1.txz:  Upgraded.



All times are GMT -5. The time now is 01:27 PM.