SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Has anyone else had a peculiar problem with video since applying the Jan 1st updates? VLC still plays OK, but both mpv and avidemux go through the motions, whilst displaying an empty (and transparent) window! I've tried re-compiling the latest version of mpv, but the problem persists.
Basically, the window opens, sound is running, but inside the window all I can see is the area of my desktop where the video should be!
I'm running slackware64-current, up to date, on Intel hardware with the Intel on-board graphics. I'm not into gaming, and the Intel graphics are pretty good for video processing and hardware acceleration.
UPDATE: the problem seems to be in libva! If I force mpv to use libmpv (and avidemux to use opengl) rather than the defaults or auto, the problems go away! Not seen this before!
66 updates (x86_64). Including a (* Security fix *)! : 62 upgraded, 4 rebuilt
Code:
Wed Jan 4 02:18:08 UTC 2023
ap/lsof-4.96.5-x86_64-1.txz: Upgraded.
ap/sqlite-3.40.1-x86_64-1.txz: Upgraded.
kde/bluedevil-5.26.5-x86_64-1.txz: Upgraded.
kde/breeze-5.26.5-x86_64-1.txz: Upgraded.
kde/breeze-grub-5.26.5-x86_64-1.txz: Upgraded.
kde/breeze-gtk-5.26.5-x86_64-1.txz: Upgraded.
kde/digikam-7.9.0-x86_64-2.txz: Rebuilt.
Recompiled against opencv-4.7.0.
kde/drkonqi-5.26.5-x86_64-1.txz: Upgraded.
kde/kactivitymanagerd-5.26.5-x86_64-1.txz: Upgraded.
kde/kde-cli-tools-5.26.5-x86_64-1.txz: Upgraded.
kde/kde-gtk-config-5.26.5-x86_64-1.txz: Upgraded.
kde/kdecoration-5.26.5-x86_64-1.txz: Upgraded.
kde/kdeplasma-addons-5.26.5-x86_64-1.txz: Upgraded.
kde/kgamma5-5.26.5-x86_64-1.txz: Upgraded.
kde/khotkeys-5.26.5-x86_64-1.txz: Upgraded.
kde/kinfocenter-5.26.5-x86_64-1.txz: Upgraded.
kde/kmenuedit-5.26.5-x86_64-1.txz: Upgraded.
kde/kpipewire-5.26.5-x86_64-1.txz: Upgraded.
kde/kscreen-5.26.5-x86_64-1.txz: Upgraded.
kde/kscreenlocker-5.26.5-x86_64-1.txz: Upgraded.
kde/ksshaskpass-5.26.5-x86_64-1.txz: Upgraded.
kde/ksystemstats-5.26.5-x86_64-1.txz: Upgraded.
kde/kwallet-pam-5.26.5-x86_64-1.txz: Upgraded.
kde/kwayland-integration-5.26.5-x86_64-1.txz: Upgraded.
kde/kwin-5.26.5-x86_64-1.txz: Upgraded.
kde/kwrited-5.26.5-x86_64-1.txz: Upgraded.
kde/layer-shell-qt-5.26.5-x86_64-1.txz: Upgraded.
kde/libkscreen-5.26.5-x86_64-1.txz: Upgraded.
kde/libksysguard-5.26.5-x86_64-1.txz: Upgraded.
kde/milou-5.26.5-x86_64-1.txz: Upgraded.
kde/oxygen-5.26.5-x86_64-1.txz: Upgraded.
kde/oxygen-sounds-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-browser-integration-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-desktop-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-disks-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-firewall-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-integration-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-nm-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-pa-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-sdk-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-systemmonitor-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-vault-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-workspace-5.26.5-x86_64-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.26.5-x86_64-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.26.5-x86_64-1.txz: Upgraded.
kde/powerdevil-5.26.5-x86_64-1.txz: Upgraded.
kde/qqc2-breeze-style-5.26.5-x86_64-1.txz: Upgraded.
kde/sddm-kcm-5.26.5-x86_64-1.txz: Upgraded.
kde/systemsettings-5.26.5-x86_64-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.26.5-x86_64-1.txz: Upgraded.
l/SDL2-2.26.2-x86_64-1.txz: Upgraded.
l/gst-plugins-bad-free-1.20.5-x86_64-2.txz: Rebuilt.
Recompiled against opencv-4.7.0.
l/imagemagick-7.1.0_57-x86_64-1.txz: Upgraded.
l/libpcap-1.10.2-x86_64-1.txz: Upgraded.
l/libpsl-0.21.2-x86_64-1.txz: Upgraded.
l/librevenge-0.0.5-x86_64-1.txz: Upgraded.
l/libsndfile-1.2.0-x86_64-1.txz: Upgraded.
l/libtiff-4.4.0-x86_64-2.txz: Rebuilt.
Patched various security bugs.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-2056
https://www.cve.org/CVERecord?id=CVE-2022-2057
https://www.cve.org/CVERecord?id=CVE-2022-2058
https://www.cve.org/CVERecord?id=CVE-2022-3970
https://www.cve.org/CVERecord?id=CVE-2022-34526
(* Security fix *)
l/netpbm-11.01.00-x86_64-1.txz: Upgraded.
l/opencv-4.7.0-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
l/poppler-23.01.0-x86_64-1.txz: Upgraded.
n/getmail-6.18.11-x86_64-1.txz: Upgraded.
n/tcpdump-4.99.2-x86_64-1.txz: Upgraded.
n/whois-5.5.15-x86_64-1.txz: Upgraded.
Updated the .bd, .nz and .tv TLD servers.
Added the .llyw.cymru, .gov.scot and .gov.wales SLD servers.
Updated the .ac.uk and .gov.uk SLD servers.
Recursion has been enabled for whois.nic.tv.
Updated the list of new gTLDs with four generic TLDs assigned in October 2013
which were missing due to a bug.
Removed 4 new gTLDs which are no longer active.
Added the Georgian translation, contributed by Temuri Doghonadze.
Updated the Finnish translation, contributed by Lauri Nurmi.
xap/pidgin-2.14.12-x86_64-1.txz: Upgraded.
xap/rxvt-unicode-9.26-x86_64-4.txz: Rebuilt.
When the "background" extension was loaded, an attacker able to control the
data written to the terminal would be able to execute arbitrary code as the
terminal's user. Thanks to David Leadbeater and Ben Collver.
For more information, see:
https://www.openwall.com/lists/oss-security/2022/12/05/1
https://www.cve.org/CVERecord?id=CVE-2022-4170
(* Security fix *)
6 updates (x86_64). Including a (* Security fix *)! : 5 upgraded, 1 rebuilt
Code:
Sat Jan 7 01:50:00 UTC 2023
a/btrfs-progs-6.1.2-x86_64-1.txz: Upgraded.
l/mozilla-nss-3.87-x86_64-1.txz: Upgraded.
Fixed memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures.
For more information, see:
https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
https://www.cve.org/CVERecord?id=CVE-2021-43527
(* Security fix *)
l/nodejs-19.4.0-x86_64-1.txz: Upgraded.
n/php-7.4.33-x86_64-2.txz: Rebuilt.
This update fixes a security issue:
PDO::quote() may return unquoted string.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-31631
(* Security fix *)
extra/php80/php80-8.0.27-x86_64-1.txz: Upgraded.
This update fixes a security issue:
PDO::quote() may return unquoted string.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-31631
(* Security fix *)
extra/php81/php81-8.1.14-x86_64-1.txz: Upgraded.
This update fixes bugs and a security issue:
PDO::quote() may return unquoted string.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-31631
(* Security fix *)
Sat Jan 7 20:30:44 UTC 2023
We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact
that a kernel bisect identified the patch that was preventing 32-bit from
booting here on a Thinkpad X1E:
------
From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001
From: Michael Kelley <mikelley@microsoft.com>
Date: Wed, 16 Nov 2022 10:41:24 -0800
Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in
__ioremap_caller()
commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream.
Current code re-calculates the size after aligning the starting and
ending physical addresses on a page boundary. But the re-calculation
also embeds the masking of high order bits that exceed the size of
the physical address space (via PHYSICAL_PAGE_MASK). If the masking
removes any high order bits, the size calculation results in a huge
value that is likely to immediately fail.
Fix this by re-calculating the page-aligned size first. Then mask any
high order bits using PHYSICAL_PAGE_MASK.
Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in
PAE mode")
------
The non-SMP non-PAE 32-bit kernel is fine even without the patch revert.
The PAE kernel also works fine with this patch reverted without any need
to revert ffa71f33a820 (the patch that this one is supposed to fix). The
machine's excessive (for 32-bit) amount of physical RAM (64GB) might also
be a factor here considering the PAE kernel works on all the other machines
around here without reverting this patch.
The patch is reverted only on 32-bit. Upstream report still pending.
Enjoy! :-)
a/kernel-generic-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.4-x86_64-1.txz: Upgraded.
a/tree-2.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.4-x86-1.txz: Upgraded.
k/kernel-source-6.1.4-noarch-1.txz: Upgraded.
l/gvfs-1.50.3-x86_64-1.txz: Upgraded.
l/hunspell-1.7.2-x86_64-1.txz: Upgraded.
l/libnice-0.1.21-x86_64-1.txz: Upgraded.
n/tin-2.6.2-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Sat Jan 7 20:30:44 UTC 2023
We're going to go ahead and jump to the 6.1.4 kernel, in spite of the fact
that a kernel bisect identified the patch that was preventing 32-bit from
booting here on a Thinkpad X1E:
------
From 2e479b3b82c49bfb9422274c0a9c155a41caecb7 Mon Sep 17 00:00:00 2001
From: Michael Kelley <mikelley@microsoft.com>
Date: Wed, 16 Nov 2022 10:41:24 -0800
Subject: [PATCH] x86/ioremap: Fix page aligned size calculation in
__ioremap_caller()
commit 4dbd6a3e90e03130973688fd79e19425f720d999 upstream.
Current code re-calculates the size after aligning the starting and
ending physical addresses on a page boundary. But the re-calculation
also embeds the masking of high order bits that exceed the size of
the physical address space (via PHYSICAL_PAGE_MASK). If the masking
removes any high order bits, the size calculation results in a huge
value that is likely to immediately fail.
Fix this by re-calculating the page-aligned size first. Then mask any
high order bits using PHYSICAL_PAGE_MASK.
Fixes: ffa71f33a820 ("x86, ioremap: Fix incorrect physical address handling in
PAE mode")
------
The non-SMP non-PAE 32-bit kernel is fine even without the patch revert.
The PAE kernel also works fine with this patch reverted without any need
to revert ffa71f33a820 (the patch that this one is supposed to fix). The
machine's excessive (for 32-bit) amount of physical RAM (64GB) might also
be a factor here considering the PAE kernel works on all the other machines
around here without reverting this patch.
The patch is reverted only on 32-bit. Upstream report still pending.
Enjoy! :-)
a/kernel-generic-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.4-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.4-x86_64-1.txz: Upgraded.
a/tree-2.1.0-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.4-x86-1.txz: Upgraded.
k/kernel-source-6.1.4-noarch-1.txz: Upgraded.
l/gvfs-1.50.3-x86_64-1.txz: Upgraded.
l/hunspell-1.7.2-x86_64-1.txz: Upgraded.
l/libnice-0.1.21-x86_64-1.txz: Upgraded.
n/tin-2.6.2-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Its happening! I don't have much of a fight in this, since I don't have such hardware - but hopefully by biting the bullet and moving forward - things will work out.
Mon Jan 9 20:10:55 UTC 2023
a/aaa_libraries-15.1-x86_64-16.txz: Rebuilt.
Upgraded: libncurses.so.6.4, libncursesw.so.6.4, libtinfo.so.6.4,
libform.so.6.4, libformw.so.6.4, libmenu.so.6.4, libmenuw.so.6.4,
libpanel.so.6.4, libglib-2.0.so.0.7400.4, libgmodule-2.0.so.0.7400.4,
libgobject-2.0.so.0.7400.4, libgthread-2.0.so.0.7400.4, libmpfr.so.6.2.0.
a/aaa_terminfo-6.4-x86_64-1.txz: Upgraded.
ap/man-db-2.11.2-x86_64-1.txz: Upgraded.
kde/kio-5.101.0-x86_64-2.txz: Rebuilt.
[PATCH] Restore old behavior for KFileFilterCombo::setFilter
Thanks to marav.
kde/okteta-0.26.10-x86_64-1.txz: Upgraded.
l/libspectre-0.2.12-x86_64-1.txz: Upgraded.
l/mpfr-4.2.0-x86_64-1.txz: Upgraded.
l/ncurses-6.4-x86_64-1.txz: Upgraded.
x/xterm-378-x86_64-1.txz: Upgraded.
xap/libnma-1.10.6-x86_64-1.txz: Upgraded.
source/installer
Code:
Mon Jan 9 09:37:40 UTC 2023
/sbin/probe: Removed old mmc discovery code.
Filter devices that contain reserved file system labels for Slackware
ARM/AArch64 and the A-i-O (All in One Offline) Installer.
This prevents the installation media and Slackware ARM system partitions from
appearing as candidates for formatting/mounting during setup.
Reserved labels:
SLKins = Media (usually a USB stick) containing the Slackware install media.
SLKboot = Slackware OS /boot partition; only reserved only on ARM/AArch64.
SLKhwm_bw = Hardware Model Bootware - native Bootware firmware/assets.
SLKins_aio-pkgs = A-i-O Installer's partition containing Slackware packages.
Thanks to Stuart Winter.
Tue Jan 10 21:32:00 UTC 2023
a/kernel-firmware-20230110_a1ad1d5-noarch-1.txz: Upgraded.
n/ca-certificates-20221205-noarch-2.txz: Rebuilt.
Make sure that if we're installing this package on another partition (such as
when using installpkg with a --root parameter) that the updates are done on
that partition. Thanks to fulalas.
x/libva-utils-2.17.1-x86_64-1.txz: Upgraded.
xfce/libxfce4util-4.18.1-x86_64-1.txz: Upgraded.
xfce/thunar-4.18.2-x86_64-1.txz: Upgraded.
8 updates (x86_64). Including a (* Security fix *)! : 8 upgraded
Code:
Fri Jan 13 20:29:55 UTC 2023
a/mcelog-191-x86_64-1.txz: Upgraded.
kde/kid3-3.9.3-x86_64-1.txz: Upgraded.
l/fuse3-3.13.0-x86_64-1.txz: Upgraded.
l/libpcap-1.10.3-x86_64-1.txz: Upgraded.
l/libwebp-1.3.0-x86_64-1.txz: Upgraded.
n/netatalk-3.1.14-x86_64-1.txz: Upgraded.
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow
resulting in code execution via a crafted .appl file.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-45188
(* Security fix *)
n/tcpdump-4.99.3-x86_64-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.10.3-x86_64-1.txz: Upgraded.
13 updates (x86_64). Including a (* Security fix *)! : 12 upgraded, 1 rebuilt
Code:
Wed Jan 18 06:11:54 UTC 2023
ap/diffutils-3.9-x86_64-1.txz: Upgraded.
ap/lsof-4.97.0-x86_64-1.txz: Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz: Upgraded.
d/binutils-2.40-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz: Upgraded.
d/oprofile-1.4.0-x86_64-11.txz: Rebuilt.
Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issues:
mod_proxy allows a backend to trigger HTTP response splitting.
mod_proxy_ajp possible request smuggling.
mod_dav out of bounds read, or write of zero byte.
For more information, see:
https://downloads.apache.org/httpd/CHANGES_2.4.55
https://www.cve.org/CVERecord?id=CVE-2022-37436
https://www.cve.org/CVERecord?id=CVE-2022-36760
https://www.cve.org/CVERecord?id=CVE-2006-20001
(* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded.
Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded.
x/libXpm-3.5.15-x86_64-1.txz: Upgraded.
This update fixes security issues:
Infinite loop on unclosed comments.
Runaway loop with width of 0 and enormous height.
Compression commands depend on $PATH.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-46285
https://www.cve.org/CVERecord?id=CVE-2022-44617
https://www.cve.org/CVERecord?id=CVE-2022-4883
(* Security fix *)
x/libinput-1.22.1-x86_64-1.txz: Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
https://www.cve.org/CVERecord?id=CVE-2023-23597
https://www.cve.org/CVERecord?id=CVE-2023-23598
https://www.cve.org/CVERecord?id=CVE-2023-23599
https://www.cve.org/CVERecord?id=CVE-2023-23600
https://www.cve.org/CVERecord?id=CVE-2023-23601
https://www.cve.org/CVERecord?id=CVE-2023-23602
https://www.cve.org/CVERecord?id=CVE-2023-23603
https://www.cve.org/CVERecord?id=CVE-2023-23604
https://www.cve.org/CVERecord?id=CVE-2023-23605
https://www.cve.org/CVERecord?id=CVE-2023-23606
(* Security fix *)
source/installer
Code:
Tue Jan 17 20:55:17 UTC 2023
pxesetup: after sorting the partition list, run it through 'uniq' to ensure
no duplicates are listed. Thanks to 'opty' in Libera.Chat ##slackware.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.