Flyspray:: https://crux.nu/bugs/ Flyspray:: CRUX: Recently opened tasks 2018-05-25T02:36:50Z FS#1660: opt/wireshark 2.4.4 ->2.6.1 https://crux.nu/bugs/index.php?do=details&task_id=1660 2018-05-25T02:36:50Z Ryan Mullen Wireshark needs an update. Also, FYI, I think the project is deprecating gtk support - maybe switch the gtk3 dep for a qt4 dep and erase the graphics-related selections from the ./configure script. FS#1659: change repo on portdb to version 3.4 https://crux.nu/bugs/index.php?do=details&task_id=1659 2018-05-23T03:29:33Z John doe please, change repo on crux.nu to version 3.4 Example: in portdb core 101 rsync core-ports at crux dot nu crux.nu::ports/crux-3.3/core/ search result dont show packages on 3.4 release
Example: in portdb
core 101 rsync core-ports at crux dot nu crux.nu::ports/crux-3.3/core/

search result dont show packages on 3.4 release]]>
FS#1658: core/lilo fails to download https://crux.nu/bugs/index.php?do=details&task_id=1658 2018-05-23T09:04:42Z Vladislav Ivanishin Hi! Yesterday I started getting 404 errors while downloading lilo from [1]. (I build the core ports occasionally, never had this problem before.) I tried to navigate to the file in a browser and found [2], where clicking brings to a login page which says > You've been redirected to this login page because you have > tried accessing a page that was not available to you as an > anonymous user. So I figured either alioth.debian.org started requiring password or they are having problems with their web server. For the time being I switched to downloading from fossies.org. (I really should have cached my downloads but that's another story). Please find a patch attached to this report. Probably the best way is to contact alioth.debian.org maintainers but I am leaving it up to you ;) [1]: http://lilo.alioth.debian.org/ftp/sources/lilo-24.2.tar.gz [2]: https://alioth.debian.org/frs/?group_id=100507&release_id=2017#lilo-_24.2-title-content
Yesterday I started getting 404 errors while downloading lilo
from [1]. (I build the core ports occasionally, never had this
problem before.)

I tried to navigate to the file in a browser and found [2],
where clicking brings to a login page which says

> You've been redirected to this login page because you have
> tried accessing a page that was not available to you as an
> anonymous user.

So I figured either alioth.debian.org started requiring
password or they are having problems with their web server.

For the time being I switched to downloading from
fossies.org. (I really should have cached my downloads but
that's another story). Please find a patch attached to this
report.

Probably the best way is to contact alioth.debian.org maintainers
but I am leaving it up to you ;)

[1]: http://lilo.alioth.debian.org/ftp/sources/lilo-24.2.tar.gz
[2]: https://alioth.debian.org/frs/?group_id=100507&release_id=2017#lilo-_24.2-title-content
]]>
FS#1657: shell script example in Hadbook https://crux.nu/bugs/index.php?do=details&task_id=1657 2018-05-23T07:07:43Z Alex Texov In https://crux.nu/Main/Handbook3-4#ntoc53 Please, fix: -if [ "${TYPE}" = "DHCP" ]; then +if [ "${TYPE}" == "DHCP" ]; then In https://crux.nu/Main/Handbook3-4#ntoc53

Please, fix:

-if [ "${TYPE}" = "DHCP" ]; then
+if [ "${TYPE}" == "DHCP" ]; then]]>
FS#1656: opt/gimp is outdated https://crux.nu/bugs/index.php?do=details&task_id=1656 2018-05-06T19:27:05Z Jan-Michael Franz The opt/gimp port is outdated. "The current stable release of GIMP is 2.10.0 (2018-04-27)."~ https://www.gimp.org/downloads/ "The current stable release of GIMP is 2.10.0 (2018-04-27)."~ https://www.gimp.org/downloads/]]> FS#1655: python 2.7.14 -> 2.7.15 to resolve multiple security fixes https://crux.nu/bugs/index.php?do=details&task_id=1655 2018-05-05T13:15:57Z Lee Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061 Fixes: update to 2.7.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061
Fixes: update to 2.7.15]]>
FS#1654: freetype 2.9 -> 2.9.1 to fix CVE-2018-6942 https://crux.nu/bugs/index.php?do=details&task_id=1654 2018-05-03T22:02:40Z Lee Details: https://nvd.nist.gov/vuln/detail/CVE-2018-6942 Fix: Update to 2.9.1 https://nvd.nist.gov/vuln/detail/CVE-2018-6942

Fix: Update to 2.9.1]]>
FS#1651: gegl: fail to build if ffmpeg4 is installed https://crux.nu/bugs/index.php?do=details&task_id=1651 2018-05-07T12:00:26Z Fun http://irclogs.shortcircuit.net.au/%23crux/2018-04-26.log.html http://irclogs.shortcircuit.net.au/%23crux/2018-04-26.log.html
]]>
FS#1650: libconfig: 1.6 -> 1.7.2 https://crux.nu/bugs/index.php?do=details&task_id=1650 2018-04-23T08:33:39Z Lee Once it's updated, I'll drop it from 6c37/crux-ports. FS#1649: [hexchat] Update to 2.14.1, switch to meson https://crux.nu/bugs/index.php?do=details&task_id=1649 2018-04-20T13:02:08Z Predrag Ivanovic Hexchat switched to using meson as a build system recently, afaik. Differences to current hexhcat build are - using python3 - meson autodetectes lua, instead of explicitly setting it Works for me[tm] Differences to current hexhcat build are
- using python3
- meson autodetectes lua, instead of explicitly setting it
Works for me[tm]]]>