LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Latest changelog for slackware-current (https://www.linuxquestions.org/questions/slackware-14/latest-changelog-for-slackware-current-4175698890/)

rwwff 05-14-2024 04:10 PM

New kernel(6.9.0) and new gcc(14) seems to be all good. i915 integrated gpu; running some custom software that builds fine, along with Mariadb and mongo; firefox and LibreOffice work fine too.

Petri Kaukasoina 05-14-2024 04:22 PM

6.9.0 does not boot on my laptop. Kernel panic. 6.8.0 does boot. I'll try to bisect it.

0XBF 05-14-2024 10:03 PM

I updated my -current laptop to the latest changelog including the 6.9.0 kernel.

The laptop boots fine but I cant run a KDE plasma session. Launching plasma from 'startx' is a non-starter, reporting a startplasma-x11 crash. 'sddm' also fails to start.

'xdm' and the remaining window managers and xfce all start properly.

Rolling back to a 6.6.x kernel and everything works as expected (with the rest of the system still on the latest upgrades).

Not sure what's going on with that as I haven't found anything meaningful in logs yet.

Edit: Looks like the same problem as @sombragris reported here, given that sddm repeatedly crashes in the same style here too: https://www.linuxquestions.org/quest...ml#post6501708

I guess there's a few threads with 6.9.0 issues popping up. Sorry if this isnt the right place, but Im not running plasma 6, just stock plasma.

dr.s 05-14-2024 11:01 PM

Rolled back to 6.6.30 on one laptop, audio stopped working with 6.9 kernel
and worked again after rolling back to 6.6.x
On my -current desktop the xfce console crashes.
On another newer laptop (Vivobook) 6.9 worked flawlessly.

ZhaoLin1457 05-15-2024 03:41 AM

Quote:

Originally Posted by 0XBF (Post 6501755)
I updated my -current laptop to the latest changelog including the 6.9.0 kernel.

The laptop boots fine but I cant run a KDE plasma session. Launching plasma from 'startx' is a non-starter, reporting a startplasma-x11 crash. 'sddm' also fails to start.

'xdm' and the remaining window managers and xfce all start properly.

Rolling back to a 6.6.x kernel and everything works as expected (with the rest of the system still on the latest upgrades).

Not sure what's going on with that as I haven't found anything meaningful in logs yet.

Edit: Looks like the same problem as @sombragris reported here, given that sddm repeatedly crashes in the same style here too: https://www.linuxquestions.org/quest...ml#post6501708

I guess there's a few threads with 6.9.0 issues popping up. Sorry if this isnt the right place, but Im not running plasma 6, just stock plasma.

From what I understand, it is a bug in GCC, which emits VEX-prefixed instruction AES without AVX enabled.

In other words, all applications compiled by this GCC are with x86_64 v4 architecture. Including the kernel here.

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=114576

It has nothing to do with Plasma5 or Plasma6.

kgha 05-15-2024 06:10 AM

Everything seems to run just fine after uprading to the 6.9.0 kernel and homebuilt multilib gcc-14. This on a HP laptop, Intel Core i7-4510U, Intel Haswell-ULT Integrated Graphics, i915 and MATE DE.

marav 05-15-2024 06:24 AM

It's up to you guys, but this thread is supposed to show the latest changelog
And we don't even see it anymore ...

willysr 05-15-2024 09:57 PM

Quote:

Thu May 16 02:31:40 UTC 2024
a/bcachefs-tools-1.7.0-x86_64-1.txz: Added.
a/kernel-generic-6.9.0-x86_64-2.txz: Upgraded.
a/kernel-huge-6.9.0-x86_64-2.txz: Upgraded.
a/kernel-modules-6.9.0-x86_64-2.txz: Upgraded.
d/git-2.45.1-x86_64-1.txz: Upgraded.
This update fixes security issues:
Recursive clones on case-insensitive filesystems that support symbolic
links are susceptible to case confusion that can be exploited to
execute just-cloned code during the clone operation.
Repositories can be configured to execute arbitrary code during local
clones. To address this, the ownership checks introduced in v2.30.3
are now extended to cover cloning local repositories.
Local clones may end up hardlinking files into the target repository's
object database when source and target repository reside on the same
disk. If the source repository is owned by a different user, then
those hardlinked files may be rewritten at any point in time by the
untrusted user.
When cloning a local source repository that contains symlinks via the
filesystem, Git may create hardlinks to arbitrary user-readable files
on the same filesystem as the target repository in the objects/
directory.
It is supposed to be safe to clone untrusted repositories, even those
unpacked from zip archives or tarballs originating from untrusted
sources, but Git can be tricked to run arbitrary code as part of the
clone.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-32002
https://www.cve.org/CVERecord?id=CVE-2024-32004
https://www.cve.org/CVERecord?id=CVE-2024-32020
https://www.cve.org/CVERecord?id=CVE-2024-32021
https://www.cve.org/CVERecord?id=CVE-2024-32465
(* Security fix *)
d/kernel-headers-6.9.0-x86-2.txz: Upgraded.
d/strace-6.9-x86_64-1.txz: Upgraded.
k/kernel-source-6.9.0-noarch-2.txz: Upgraded.
BCACHEFS_FS m -> y
CRYPTO_CHACHA20 m -> y
CRYPTO_LIB_CHACHA_GENERIC m -> y
CRYPTO_LIB_POLY1305_GENERIC m -> y
CRYPTO_POLY1305 m -> y
MITIGATION_GDS_FORCE y -> n
kde/wcslib-8.3-x86_64-1.txz: Upgraded.
l/gdk-pixbuf2-2.42.12-x86_64-1.txz: Upgraded.
ani: Reject files with multiple INA or IART chunks.
ani: Reject files with multiple anih chunks.
ani: validate chunk size.
Thanks to 0xvhp, pedrib, and Benjamin Gilbert.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-48622
(* Security fix *)
l/gtk+3-3.24.42-x86_64-1.txz: Upgraded.
n/bind-9.18.27-x86_64-1.txz: Upgraded.
This is a bugfix release.
n/popa3d-1.0.3-x86_64-8.txz: Rebuilt.
This is a bugfix release:
Build with AUTH_PAM, not AUTH_SHADOW.
Thanks to jayjwa.
x/xorg-server-xwayland-23.2.7-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
there you have it

marav 05-16-2024 03:53 AM

Quote:

Originally Posted by willysr (Post 6502006)
there you have it

Can we have the one from my link?
Code:

http://matoda.pw/report/slack-current-x86_64.txt

marav 05-17-2024 02:45 AM

Ok, so I will take care of it

Just a reminder:
Quoting my first post
Quote:

Originally Posted by marav (Post 6273596)
This will at least give some visibility on the latest updates here on the forum

If your post is worse than the official changelog in terms of visibility, please let the people who know how to do it
with my link and a copy/paste, take care of this thread

Thanks in advance

marav 05-17-2024 02:45 AM

17 updates (x86_64). Including 2 (* Security fix *)! : 13 Upgraded, 3 Rebuilt, 1 Added
Code:

Thu May 16 02:31:40 UTC 2024
a/bcachefs-tools-1.7.0-x86_64-1.txz:  Added.
a/kernel-generic-6.9.0-x86_64-2.txz:  Upgraded.
a/kernel-huge-6.9.0-x86_64-2.txz:  Upgraded.
a/kernel-modules-6.9.0-x86_64-2.txz:  Upgraded.
d/git-2.45.1-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Recursive clones on case-insensitive filesystems that support symbolic
  links are susceptible to case confusion that can be exploited to
  execute just-cloned code during the clone operation.
  Repositories can be configured to execute arbitrary code during local
  clones. To address this, the ownership checks introduced in v2.30.3
  are now extended to cover cloning local repositories.
  Local clones may end up hardlinking files into the target repository's
  object database when source and target repository reside on the same
  disk. If the source repository is owned by a different user, then
  those hardlinked files may be rewritten at any point in time by the
  untrusted user.
  When cloning a local source repository that contains symlinks via the
  filesystem, Git may create hardlinks to arbitrary user-readable files
  on the same filesystem as the target repository in the objects/
  directory.
  It is supposed to be safe to clone untrusted repositories, even those
  unpacked from zip archives or tarballs originating from untrusted
  sources, but Git can be tricked to run arbitrary code as part of the
  clone.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-32002
    https://www.cve.org/CVERecord?id=CVE-2024-32004
    https://www.cve.org/CVERecord?id=CVE-2024-32020
    https://www.cve.org/CVERecord?id=CVE-2024-32021
    https://www.cve.org/CVERecord?id=CVE-2024-32465
  (* Security fix *)
d/kernel-headers-6.9.0-x86-2.txz:  Upgraded.
d/strace-6.9-x86_64-1.txz:  Upgraded.
k/kernel-source-6.9.0-noarch-2.txz:  Upgraded.
  BCACHEFS_FS m -> y
  CRYPTO_CHACHA20 m -> y
  CRYPTO_LIB_CHACHA_GENERIC m -> y
  CRYPTO_LIB_POLY1305_GENERIC m -> y
  CRYPTO_POLY1305 m -> y
  MITIGATION_GDS_FORCE y -> n
kde/wcslib-8.3-x86_64-1.txz:  Upgraded.
l/gdk-pixbuf2-2.42.12-x86_64-1.txz:  Upgraded.
  ani: Reject files with multiple INA or IART chunks.
  ani: Reject files with multiple anih chunks.
  ani: validate chunk size.
  Thanks to 0xvhp, pedrib, and Benjamin Gilbert.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-48622
  (* Security fix *)
l/gtk+3-3.24.42-x86_64-1.txz:  Upgraded.
n/bind-9.18.27-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
n/popa3d-1.0.3-x86_64-8.txz:  Rebuilt.
  This is a bugfix release:
  Build with AUTH_PAM, not AUTH_SHADOW.
  Thanks to jayjwa.
x/xorg-server-xwayland-23.2.7-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.

source/installer
Code:

Wed May 15 22:32:33 UTC 2024
  Force compress the hwdata files. Thanks to Stuart Winter.
  Include rescan_scsi_bus.sh, sg_inq, sg_turs, and libsgutils2 from the
  sg3_utils package. Thanks to ikocher.
  Include bcachefs-tools.
  Add libsodium for bcachefs-tools.
  No menu-driven installer support yet (nor immediately pending).

Provided by http://matoda.pw/report/slack-current-x86_64.txt

marav 05-17-2024 04:19 PM

16 updates (x86_64) : 14 Upgraded, 2 Rebuilt
Code:

Fri May 17 18:49:15 UTC 2024
a/iniparser-4.2.1-x86_64-1.txz:  Upgraded.
a/kernel-generic-6.9.1-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.9.1-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.9.1-x86_64-1.txz:  Upgraded.
a/lvm2-2.03.24-x86_64-1.txz:  Upgraded.
a/mcelog-199-x86_64-1.txz:  Upgraded.
a/xfsprogs-6.8.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.9.1-x86-1.txz:  Upgraded.
e/emacspeak-60.0-x86_64-1.txz:  Upgraded.
k/kernel-source-6.9.1-noarch-1.txz:  Upgraded.
l/python-trove-classifiers-2024.5.17-x86_64-1.txz:  Upgraded.
l/python-zipp-3.18.2-x86_64-1.txz:  Upgraded.
n/bluez-5.76-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.

Provided by http://matoda.pw/report/slack-current-x86_64.txt

marav 05-20-2024 02:18 PM

96 updates (x86_64). Including 1 (* Security fix *)! : 96 Upgraded
Code:

Mon May 20 18:42:49 UTC 2024
a/less-655-x86_64-1.txz:  Upgraded.
  Switch to lesspipe.sh from https://github.com/wofr06. Thanks to zsd.
ap/ghostscript-10.03.1-x86_64-1.txz:  Upgraded.
ap/man-pages-6.8-noarch-1.txz:  Upgraded.
ap/mariadb-10.11.8-x86_64-1.txz:  Upgraded.
  This update fixes bugs and a security issue:
  Difficult to exploit vulnerability allows unauthenticated attacker with
  logon to the infrastructure where MariaDB Server executes to compromise the
  server. This could result in unauthorized update, insert or delete access
  to some of the data as well as unauthorized read access to a subset of the
  data and unauthorized ability to cause a partial denial of service.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-21096
  (* Security fix *)
d/doxygen-1.11.0-x86_64-1.txz:  Upgraded.
d/llvm-18.1.6-x86_64-1.txz:  Upgraded.
kde/attica-5.116.0-x86_64-1.txz:  Upgraded.
kde/baloo-5.116.0-x86_64-1.txz:  Upgraded.
kde/bluez-qt-5.116.0-x86_64-1.txz:  Upgraded.
kde/breeze-icons-5.116.0-noarch-1.txz:  Upgraded.
kde/extra-cmake-modules-5.116.0-x86_64-1.txz:  Upgraded.
kde/frameworkintegration-5.116.0-x86_64-1.txz:  Upgraded.
kde/kactivities-5.116.0-x86_64-1.txz:  Upgraded.
kde/kactivities-stats-5.116.0-x86_64-1.txz:  Upgraded.
kde/kapidox-5.116.0-x86_64-1.txz:  Upgraded.
kde/karchive-5.116.0-x86_64-1.txz:  Upgraded.
kde/kauth-5.116.0-x86_64-1.txz:  Upgraded.
kde/kbookmarks-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcalendarcore-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcmutils-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcodecs-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcompletion-5.116.0-x86_64-1.txz:  Upgraded.
kde/kconfig-5.116.0-x86_64-1.txz:  Upgraded.
kde/kconfigwidgets-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcontacts-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcoreaddons-5.116.0-x86_64-1.txz:  Upgraded.
kde/kcrash-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdav-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdbusaddons-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdeclarative-5.116.0-x86_64-1.txz:  Upgraded.
kde/kded-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdelibs4support-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdesignerplugin-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdesu-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdewebkit-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdnssd-5.116.0-x86_64-1.txz:  Upgraded.
kde/kdoctools-5.116.0-x86_64-1.txz:  Upgraded.
kde/kemoticons-5.116.0-x86_64-1.txz:  Upgraded.
kde/kfilemetadata-5.116.0-x86_64-1.txz:  Upgraded.
kde/kglobalaccel-5.116.0-x86_64-1.txz:  Upgraded.
kde/kguiaddons-5.116.0-x86_64-1.txz:  Upgraded.
kde/kholidays-5.116.0-x86_64-1.txz:  Upgraded.
kde/khtml-5.116.0-x86_64-1.txz:  Upgraded.
kde/ki18n-5.116.0-x86_64-1.txz:  Upgraded.
kde/kiconthemes-5.116.0-x86_64-1.txz:  Upgraded.
kde/kidletime-5.116.0-x86_64-1.txz:  Upgraded.
kde/kimageformats-5.116.0-x86_64-1.txz:  Upgraded.
kde/kinit-5.116.0-x86_64-1.txz:  Upgraded.
kde/kio-5.116.0-x86_64-1.txz:  Upgraded.
kde/kirigami2-5.116.0-x86_64-1.txz:  Upgraded.
kde/kitemmodels-5.116.0-x86_64-1.txz:  Upgraded.
kde/kitemviews-5.116.0-x86_64-1.txz:  Upgraded.
kde/kjobwidgets-5.116.0-x86_64-1.txz:  Upgraded.
kde/kjs-5.116.0-x86_64-1.txz:  Upgraded.
kde/kjsembed-5.116.0-x86_64-1.txz:  Upgraded.
kde/kmediaplayer-5.116.0-x86_64-1.txz:  Upgraded.
kde/knewstuff-5.116.0-x86_64-1.txz:  Upgraded.
kde/knotifications-5.116.0-x86_64-1.txz:  Upgraded.
kde/knotifyconfig-5.116.0-x86_64-1.txz:  Upgraded.
kde/kpackage-5.116.0-x86_64-1.txz:  Upgraded.
kde/kparts-5.116.0-x86_64-1.txz:  Upgraded.
kde/kpeople-5.116.0-x86_64-1.txz:  Upgraded.
kde/kplotting-5.116.0-x86_64-1.txz:  Upgraded.
kde/kpty-5.116.0-x86_64-1.txz:  Upgraded.
kde/kquickcharts-5.116.0-x86_64-1.txz:  Upgraded.
kde/kross-5.116.0-x86_64-1.txz:  Upgraded.
kde/krunner-5.116.0-x86_64-1.txz:  Upgraded.
kde/kservice-5.116.0-x86_64-1.txz:  Upgraded.
kde/ktexteditor-5.116.0-x86_64-1.txz:  Upgraded.
kde/ktextwidgets-5.116.0-x86_64-1.txz:  Upgraded.
kde/kunitconversion-5.116.0-x86_64-1.txz:  Upgraded.
kde/kwallet-5.116.0-x86_64-1.txz:  Upgraded.
kde/kwayland-5.116.0-x86_64-1.txz:  Upgraded.
kde/kwidgetsaddons-5.116.0-x86_64-1.txz:  Upgraded.
kde/kwindowsystem-5.116.0-x86_64-1.txz:  Upgraded.
kde/kxmlgui-5.116.0-x86_64-1.txz:  Upgraded.
kde/kxmlrpcclient-5.116.0-x86_64-1.txz:  Upgraded.
kde/modemmanager-qt-5.116.0-x86_64-1.txz:  Upgraded.
kde/networkmanager-qt-5.116.0-x86_64-1.txz:  Upgraded.
kde/oxygen-icons-5.116.0-noarch-1.txz:  Upgraded.
kde/plasma-framework-5.116.0-x86_64-1.txz:  Upgraded.
kde/prison-5.116.0-x86_64-1.txz:  Upgraded.
kde/purpose-5.116.0-x86_64-1.txz:  Upgraded.
kde/qqc2-desktop-style-5.116.0-x86_64-1.txz:  Upgraded.
kde/solid-5.116.0-x86_64-1.txz:  Upgraded.
kde/sonnet-5.116.0-x86_64-1.txz:  Upgraded.
kde/syndication-5.116.0-x86_64-1.txz:  Upgraded.
kde/syntax-highlighting-5.116.0-x86_64-1.txz:  Upgraded.
kde/threadweaver-5.116.0-x86_64-1.txz:  Upgraded.
l/gi-docgen-2024.1-x86_64-1.txz:  Upgraded.
l/libass-0.17.2-x86_64-1.txz:  Upgraded.
l/libcap-2.70-x86_64-1.txz:  Upgraded.
l/libedit-20240517_3.1-x86_64-1.txz:  Upgraded.
l/qt5-5.15.13_20240519_56514bcd-x86_64-1.txz:  Upgraded.
n/iw-6.9-x86_64-1.txz:  Upgraded.
n/nghttp2-1.62.1-x86_64-1.txz:  Upgraded.

Provided by http://matoda.pw/report/slack-current-x86_64.txt

marav 05-22-2024 02:46 PM

21 updates (x86_64) : 12 Upgraded, 9 Rebuilt
Code:

Wed May 22 18:57:13 UTC 2024
a/e2fsprogs-1.47.1-x86_64-1.txz:  Upgraded.
a/iniparser-4.2.2-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
a/ndctl-79-x86_64-2.txz:  Rebuilt.
  Recompiled against iniparser-4.2.2.
d/python-setuptools-70.0.0-x86_64-1.txz:  Upgraded.
kde/calligra-3.2.1-x86_64-39.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/cantor-23.08.5-x86_64-6.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/kfilemetadata-5.116.0-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/kile-2.9.93-x86_64-33.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/kitinerary-23.08.5-x86_64-4.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/krita-5.2.2-x86_64-9.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/okular-23.08.5-x86_64-4.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
kde/qqc2-desktop-style-5.116.1-x86_64-1.txz:  Upgraded.
l/hicolor-icon-theme-0.18-noarch-1.txz:  Upgraded.
l/libcupsfilters-2.0.0-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-24.05.0.
l/lmdb-0.9.33-x86_64-1.txz:  Upgraded.
l/poppler-24.05.0-x86_64-1.txz:  Upgraded.
  This seems to require C++20 now...
  Shared library .so-version bump.
l/python-requests-2.32.1-x86_64-1.txz:  Upgraded.
l/qt6-6.7.1_20240516_6977d02f-x86_64-1.txz:  Upgraded.
n/curl-8.8.0-x86_64-1.txz:  Upgraded.
n/openldap-2.6.8-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-24.1.0-x86_64-1.txz:  Upgraded.
  Thanks to marav for the patch.

Provided by http://matoda.pw/report/slack-current-x86_64.txt

marav 05-23-2024 01:58 PM

8 updates (x86_64) : 6 Upgraded, 2 Rebuilt
Code:

Thu May 23 18:47:30 UTC 2024
a/etc-15.1-x86_64-12.txz:  Rebuilt.
  Remove less related profile variables from /etc/profile.
a/exfatprogs-1.2.3-x86_64-1.txz:  Upgraded.
a/less-655-x86_64-2.txz:  Rebuilt.
  Create /etc/profile.d/less.{csh,sh} for less related profile variables.
  By default, don't display the informational messages on the top line
  of the output (this can be configured in less.{csh,sh}.
  Don't attempt special handling of .log files as it breaks viewing a file
  such as foo.log.bz2.
d/parallel-20240522-noarch-1.txz:  Upgraded.
l/python-trove-classifiers-2024.5.22-x86_64-1.txz:  Upgraded.
x/mesa-24.1.0-x86_64-1.txz:  Upgraded.
x/xterm-392-x86_64-1.txz:  Upgraded.
xap/pavucontrol-6.0-x86_64-1.txz:  Upgraded.

Provided by http://matoda.pw/report/slack-current-x86_64.txt


All times are GMT -5. The time now is 11:49 PM.