| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
|
|
|
| |
Update to meson-0.63.0.
Update to kmod-30.
Update to inetutils-2.3.
Update to linux-5.18.9.
Update to OpenSSL-3.0.5.
|
|
|
|
|
|
|
|
|
|
| |
Update to vim-9.0.0006.
Update to iana-etc-20220610.
Update to OpenSSL-3.0.4.
Update to kbd-2.5.1.
Update to linux-5.18.8.
Update to bc-5.3.3.
+
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The c_rehash script, shipped by OpenSSL versions in current LFS trunk
and all previous LFS releases, is vulnerable to CVE-2022-2068. It's
fixed in 3.0.4, but OpenSSL 3.0.4 is completely broken on CPU models with
AVX-512 extension [1]. So we'd like to defer OpenSSL update and wait for
upstream consensus about "would 3.0.5 be released in urgency".
But, the upstream has announced that use of c_rehash is obsolete now [2].
So we can tell people not to use it.
[1]: https://github.com/openssl/openssl/issues/18625
[2]: https://www.openssl.org/news/secadv/20220621.txt
|
| |
|
| |
|
|
|
|
| |
and move it into package management section
|
| |
|
|
|
|
| |
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@12137 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|
|
|
|
| |
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@12068 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|
|
|
|
| |
git-svn-id: http://svn.linuxfromscratch.org/LFS/trunk/BOOK@12010 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|
|
|
|
|
|
|
|
| |
There are a couple of minor command changes.
git-svn-id: http://svn.linuxfromscratch.org/LFS/branches/cross2@11924 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|
|
|
|
| |
git-svn-id: http://svn.linuxfromscratch.org/LFS/branches/cross2@11921 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|
|
git-svn-id: http://svn.linuxfromscratch.org/LFS/branches/cross2@11897 4aa44e1e-78dd-0310-a6d2-fbcd4c07a689
|