nvidia kernel modules and drivers for F20
by Roderick Johnstone
Hi
The nvidia drives are not working for me with the latest kernel on
Fedora 20.
There are no kmods (or akmods) for the latest kernel
(kernel-3.18.7-100.fc20.x86_64) for the 340xx driver which yum has
installed for me.
This is what my nightly yum updates gave me:
yum list installed "*nvidia*"
Loaded plugins: langpacks, xray
Installed Packages
akmod-nvidia.x86_64 1:331.113-1.fc20
@rpmfusion-nonfree-updates
kmod-nvidia-3.18.6-100.fc20.x86_64.x86_64 1:331.113-1.fc20.4
@rpmfusion-nonfree-updates
kmod-nvidia-3.18.7-100.fc20.x86_64.x86_64 1:331.113-1.fc20.5
@rpmfusion-nonfree-updates
kmod-nvidia-340xx-3.17.8-200.fc20.x86_64.x86_64 1:340.65-4.fc20
@rpmfusion-nonfree-updates
xorg-x11-drv-nvidia-340xx.x86_64 1:340.65-4.fc20
@rpmfusion-nonfree-updates
xorg-x11-drv-nvidia-340xx-libs.x86_64 1:340.65-4.fc20
@rpmfusion-nonfree-updates
There don't seem to be any
kmod-nvidia-340xx*
or
akmod-nvidia-340xx.x86_64
packages in the nonfree x86_64 updates repo and the package
xorg-x11-drv-nvidia-340xx conflicts with the available
kmod-nvidia-3.18.7-100.fc20.x86_64.x86_64 1:331.113-1.fc20.5
for the latest kernel.
If I
yum --enablerepo=rpmfusion-nonfree-updates-testing update
Then there are errors as follows:
--> Finished Dependency Resolution
Error: xorg-x11-drv-nvidia-340xx conflicts with
1:xorg-x11-drv-nvidia-331.113-2.fc20.x86_64
Error: xorg-x11-drv-nvidia conflicts with
1:xorg-x11-drv-nvidia-340xx-340.76-1.fc20.x86_64
I notice that the F21 repos do have the
kmod-nvidia-340xx*
and
akmod-nvidia-340xx.x86_64
Is this an oversight for the F20 repo, or am I missing something?
Thanks
Roderick Johnstone
9 years, 9 months
Fedora rawhide?
by Chuck Forsberg WA7KGX
Is there a 64 bit rawhide rpmfusion yet?
--
Chuck Forsberg WA7KGX caf(a)omen.com www.omen.com
Developer of Industrial ZMODEM(Tm) for Embedded Applications
Omen Technology Inc "The High Reliability Software"
10255 NW Old Cornelius Pass Portland OR 97231 503-614-0430
9 years, 9 months
freeworld packages: unacceptable delay of security updates
by Reindl Harald
what about maintainers of "freeworld" packages (in that case
freetype-freeworld) watching Fedora build of the package they override?
it's a joke that there is no update in "updates-testing" repos
users having the "freeworld" package installed don#t benefit in *any*
way from the Fedora security update because it never get loaded
________________________________________________
Feb 17 17:23:15 Updated: freetype-2.5.0-9.fc20.x86_64
* Di Feb 17 2015 Marek Kasik <mkasik(a)redhat.com> - 2.5.0-9
- Fixes CVE-2014-9656
- Check `p' before `num_glyphs'.
- Fixes CVE-2014-9657
- Check minimum size of `record_size'.
- Fixes CVE-2014-9658
- Use correct value for minimum table length test.
- Fixes CVE-2014-9675
- New macro that checks one character more than `strncmp'.
- Fixes CVE-2014-9660
- Check `_BDF_GLYPH_BITS'.
- Fixes CVE-2014-9661
- Initialize `face->ttf_size'.
- Always set `face->ttf_size' directly.
- Exclusively use the `truetype' font driver for loading
the font contained in the `sfnts' array.
- Fixes CVE-2014-9662
- Handle return values of point allocation routines.
- Fixes CVE-2014-9663
- Fix order of validity tests.
- Fixes CVE-2014-9664
- Add another boundary testing.
- Fix boundary testing.
- Fixes CVE-2014-9666
- Protect against addition and multiplication overflow.
- Fixes CVE-2014-9667
- Protect against addition overflow.
- Fixes CVE-2014-9669
- Protect against overflow in additions and multiplications.
- Fixes CVE-2014-9670
- Add sanity checks for row and column values.
- Fixes CVE-2014-9671
- Check `size' and `offset' values.
- Fixes CVE-2014-9672
- Prevent a buffer overrun caused by a font including too many (> 63)
strings to store names[] table.
- Fixes CVE-2014-9673
- Fix integer overflow by a broken POST table in resource-fork.
- Fixes CVE-2014-9674
- Fix integer overflow by a broken POST table in resource-fork.
- Additional overflow check in the summation of POST fragment lengths.
- Resolves: #1191099, #1191191, #1191193
9 years, 9 months
mpd package features for Fedora 21
by Jonathan M. Polom
Hello --
I recently migrated my home server to Fedora 21 (Fedora Server 1.0 to be
specific) and encountered serious shortcomings with the mpd package
available from rpmfusion.
The first and most important shortcoming I noticed was the inflexibility of
the SELinux policy for mpd.
By default mpd can only read music located in `/var/lib/mpd/music` as that
is the only directory given the proper `mpd_t` context. A boolean is
available to allow mpd to read music located in user home directories, but
nowhere can I find an option to allow mpd to read from arbitrary
directories. My music library is stored outside of those two locations.
To overcome this problem was, I changed the default file/directory label
for my music library to `mpd_t` using `semanage fcontext`. While this
allows mpd to access the music, it conflicts with SELinux context
requirements for Samba shares.
Samba requires directories/files it shares to have the `samba_share_t`
context. I share my music library on my LAN via Samba, so having it labeled
with the `mpd_t` context means I have to set the boolean allowing Samba
global read/write access to the system. Ideally I'd like to keep Samba's
read/write access confined to only the files in directories being shared.
Could an option be added to the SELinux policy for mpd that would allow it
global read-only access to the system? This'd allow tight control over what
files Samba can access yet still allow mpd to play music located in a
directory of my choosing.
The second shortcoming concerns firewalld. No firewalld service description
file is included with the package. While it isn't a great challenge to
create one, it's an annoying extra step.
I saw some traffic on the Fedora bugzilla about this:
https://bugzilla.redhat.com/show_bug.cgi?id=1121448 but didn't end up
finding an mpd service file installed with the package. Is there still a
plan to incorporate this?
--
Jon Polom
9 years, 9 months