This website requires JavaScript.
Explore
Help
Sign in
Miroirs
/
slackware-current
Watch
1
Star
0
Fork
You've already forked slackware-current
0
mirror of
git://slackware.nl/current.git
synced
2025-01-02 06:19:52 +01:00
Code
Issues
Projects
Releases
Packages
Wiki
Activity
Actions
73b28184f0
slackware-current
/
source
/
x
/
x11
/
build
/
xdm
2 lines
2 B
Text
Raw
Normal View
History
Unescape
Escape
Wed Jul 10 17:48:01 UTC 2024 a/grub-2.12-x86_64-11.txz: Rebuilt. Build using --with-dejavufont=/usr/share/fonts/TTF/DejaVuSans.ttf so that the starfield theme is included. Thanks to opty. d/mercurial-6.8-x86_64-1.txz: Upgraded. d/python-setuptools-70.3.0-x86_64-1.txz: Upgraded. d/rinutils-0.10.3-x86_64-1.txz: Upgraded. d/ruby-3.3.4-x86_64-1.txz: Upgraded. l/glib2-2.80.4-x86_64-1.txz: Upgraded. l/mozjs115-115.13.0esr-x86_64-1.txz: Upgraded. l/nodejs-20.15.1-x86_64-1.txz: Upgraded. l/qt6-6.7.2_20240610_3f005f1e-x86_64-2.txz: Rebuilt. [PATCH] Client: Ensure that guessed popup parent has a shell surface. Thanks to ctrlaltca. Add another patch to fix race conditions building with ninja. n/bluez-5.77-x86_64-1.txz: Upgraded. n/getmail-6.19.03-x86_64-1.txz: Upgraded. x/xdm-1.1.16-x86_64-2.txz: Rebuilt. Patched to fix an issue drawing/erasing text in the login dialog. Thanks to GazL. x/xorg-server-xwayland-24.1.1-x86_64-1.txz: Upgraded. xap/mozilla-firefox-128.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.0esr/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-29/ https://www.cve.org/CVERecord?id=CVE-2024-6606 https://www.cve.org/CVERecord?id=CVE-2024-6607 https://www.cve.org/CVERecord?id=CVE-2024-6608 https://www.cve.org/CVERecord?id=CVE-2024-6609 https://www.cve.org/CVERecord?id=CVE-2024-6610 https://www.cve.org/CVERecord?id=CVE-2024-6600 https://www.cve.org/CVERecord?id=CVE-2024-6601 https://www.cve.org/CVERecord?id=CVE-2024-6602 https://www.cve.org/CVERecord?id=CVE-2024-6603 https://www.cve.org/CVERecord?id=CVE-2024-6611 https://www.cve.org/CVERecord?id=CVE-2024-6612 https://www.cve.org/CVERecord?id=CVE-2024-6613 https://www.cve.org/CVERecord?id=CVE-2024-6614 https://www.cve.org/CVERecord?id=CVE-2024-6604 https://www.cve.org/CVERecord?id=CVE-2024-6615 (* Security fix *)
2024-07-10 19:48:01 +02:00
2
Reference in a new issue
Copy permalink