Re: [opensuse-arm] Which repo for rasperry pi

2014-12-17 Thread Michael Ströder
Freek de Kruijf wrote:
 Op maandag 15 december 2014 22:07:41 schreef Michael Ströder:
 Dirk Müller wrote:
 Hi Michael,

 http://download.opensuse.org/ports/armv6hl/factory/repo/oss/

 Does this repo receive all the openSUSE updates?

 It is following Factory (aka nowadays called openSUSE Tumbleweed), so
 yes. but its a rolling release, so you will frequently get new
 versions of packages and the overall result might not be perfectly
 stable. its our development tree.

 It seems there are not updates in this repo.

 All the security-related fixes in the last time (e.g. openvpn) do not appear
 there.
 
 See http://lists.opensuse.org/opensuse-arm/2014-12/msg00027.html for an 
 answer. I don't know how to change that policy or have an alternative.

Has there been change to that?

Since yesterday many updated packages are offered. Which is nice of course.
But I wonder whether this a one-shot update or whether someone enabled
continous building of armv6hl packages.

Ciao, Michael.



smime.p7s
Description: S/MIME Cryptographic Signature


Re: [opensuse-arm] Which repo for rasperry pi

2014-12-15 Thread Freek de Kruijf
Op maandag 15 december 2014 22:07:41 schreef Michael Ströder:
 Dirk Müller wrote:
  Hi Michael,
  
  http://download.opensuse.org/ports/armv6hl/factory/repo/oss/
  
  Does this repo receive all the openSUSE updates?
  
  It is following Factory (aka nowadays called openSUSE Tumbleweed), so
  yes. but its a rolling release, so you will frequently get new
  versions of packages and the overall result might not be perfectly
  stable. its our development tree.
 
 It seems there are not updates in this repo.
 
 All the security-related fixes in the last time (e.g. openvpn) do not appear
 there.
 
 Ciao, Michael.

See http://lists.opensuse.org/opensuse-arm/2014-12/msg00027.html for an 
answer. I don't know how to change that policy or have an alternative.

-- 
fr.gr.

member openSUSE
Freek de Kruijf

--
To unsubscribe, e-mail: opensuse-arm+unsubscr...@opensuse.org
To contact the owner, e-mail: opensuse-arm+ow...@opensuse.org



Re: [opensuse-arm] Which repo for rasperry pi

2014-11-26 Thread Dirk Müller
Hi Michael,

 http://download.opensuse.org/ports/armv6hl/factory/repo/oss/

 Does this repo receive all the openSUSE updates?

It is following Factory (aka nowadays called openSUSE Tumbleweed), so
yes. but its a rolling release, so you will frequently get new
versions of packages and the overall result might not be perfectly
stable. its our development tree.



 Or is there an openSUSE 13.2 repo available for rasperry pi?

Yes, as well, simple use
http://download.opensuse.org/ports/armv6hl/distribution/13.2/repo/oss/

Greetings,
Dirk
-- 
To unsubscribe, e-mail: opensuse-arm+unsubscr...@opensuse.org
To contact the owner, e-mail: opensuse-arm+ow...@opensuse.org



Re: [opensuse-arm] Which repo for rasperry pi

2014-11-24 Thread Michael Ströder
Alexander Graf wrote:
 On 20.11.14 18:14, Michael Ströder wrote:
 HI!

 Frankly I'm lost in all the ARM-related repo URLs...

 Currently I'm using on my rasperry pi:

 http://download.opensuse.org/ports/armv6hl/factory/repo/oss/

 Does this repo receive all the openSUSE updates?
 
 That's the latest and greatest Factory repository, so yes, it should
 receive updates.

On the Rasperry Pi:

# rpm -q openssl
openssl-1.0.1i-1.1.armv6hl

on my openSUSE 13.2 x86_64:

# rpm -q openssl
openssl-1.0.1j-2.10.1.x86_64

AFAICS the latter is newer. So the latest OpenSSL updates are not available in
armv6hl/factory.

These changes are missing in armv6hl/factory (see rpm -q --changelog openssl):

* Thu Nov 13 2014 kai.koe...@theqtcompany.com
- openssl-1.0.1i-noec2m-fix.patch: Fix handshake failures when connecting
  to some openssl servers.  With no-ec2m, openssl advertises EC curves
  it doesn't support, leading to handshake errors with some servers
  (bnc#905037).

* Fri Nov 07 2014 br...@aljex.com
- openSUSE  11.2 doesn't have accept4()

* Tue Oct 21 2014 crrodrig...@opensuse.org
- openSSL 1.0.1j
  * Fix SRTP Memory Leak (CVE-2014-3513)
  * Session Ticket Memory Leak (CVE-2014-3567)
  * Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV)
  * Build option no-ssl3 is incomplete (CVE-2014-3568)

Ciao, Michael.



smime.p7s
Description: S/MIME Cryptographic Signature