This website requires JavaScript.
Explore
Help
Sign in
Miroirs
/
slackware-current
Watch
1
Star
0
Fork
You've already forked slackware-current
0
mirror of
git://slackware.nl/current.git
synced
2024-12-30 10:24:23 +01:00
Code
Issues
Projects
Releases
Packages
Wiki
Activity
Actions
ddf1c99d25
slackware-current
/
source
/
x
/
x11
/
build
/
iceauth
2 lines
2 B
Text
Raw
Normal View
History
Unescape
Escape
Sat Mar 23 19:34:02 UTC 2024 ap/vim-9.1.0199-x86_64-1.txz: Upgraded. Dropped python2 support. Thanks to Audrius Kažukauskas. l/duktape-2.7.0-x86_64-1.txz: Added. Needed by polkit. l/gjs-1.80.1-x86_64-1.txz: Upgraded. l/libdeflate-1.20-x86_64-1.txz: Upgraded. l/mozjs102-102.15.1esr-x86_64-2.txz: Removed. l/mozjs115-115.9.1esr-x86_64-1.txz: Upgraded. l/polkit-123-x86_64-2.txz: Rebuilt. Use duktape instead of mozjs102 as the JavaScript engine. x/iceauth-1.0.10-x86_64-2.txz: Rebuilt. It's never too early to build with --enable-year2038. Thanks to bigbadaboum. xap/geeqie-2.4-x86_64-1.txz: Upgraded. xap/mozilla-firefox-115.9.1esr-x86_64-1.txz: Upgraded. This update fixes a critical security issue: An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. For more information, see: https://www.mozilla.org/en-US/firefox/115.9.1esr/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-16/ https://www.cve.org/CVERecord?id=CVE-2024-29944 (* Security fix *) xap/vim-gvim-9.1.0199-x86_64-1.txz: Upgraded. Dropped python2 support. Thanks to Audrius Kažukauskas.
2024-03-23 20:34:02 +01:00
2
Reference in a new issue
Copy permalink