Commit graph

5 commits

Author SHA1 Message Date
Patrick J Volkerding
194d2d2fc5 Wed Oct 9 21:09:16 UTC 2024
a/dracut-104-x86_64-1.txz:  Upgraded.
d/cmake-3.30.5-x86_64-1.txz:  Upgraded.
d/subversion-1.14.4-x86_64-1.txz:  Upgraded.
l/mozjs128-128.3.1esr-x86_64-1.txz:  Upgraded.
l/openexr-3.3.1-x86_64-1.txz:  Upgraded.
l/python-charset-normalizer-3.4.0-x86_64-1.txz:  Upgraded.
x/fcitx5-5.1.11-x86_64-1.txz:  Upgraded.
x/fcitx5-anthy-5.1.5-x86_64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.1.7-x86_64-1.txz:  Upgraded.
x/fcitx5-hangul-5.1.5-x86_64-1.txz:  Upgraded.
x/fcitx5-kkc-5.1.5-x86_64-1.txz:  Upgraded.
x/fcitx5-m17n-5.1.2-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.7-x86_64-1.txz:  Upgraded.
x/fcitx5-unikey-5.1.5-x86_64-1.txz:  Upgraded.
x/libime-1.1.9-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-128.3.1esr-x86_64-1.txz:  Upgraded.
  This update contains a critical security fix:
  Use-after-free in Animation timeline.
  "An attacker was able to achieve code execution in the content process by
  exploiting a use-after-free in Animation timelines. We have had reports of
  this vulnerability being exploited in the wild."
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.3.1/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-51/
    https://www.cve.org/CVERecord?id=CVE-2024-9680
  (* Security fix *)
2024-10-10 00:58:09 +02:00
Patrick J Volkerding
388220eab9 Tue Apr 23 19:48:05 UTC 2024
a/ed-1.20.2-x86_64-1.txz:  Upgraded.
d/parallel-20240422-noarch-1.txz:  Upgraded.
kde/krusader-2.8.1-x86_64-1.txz:  Upgraded.
kde/ktextaddons-1.5.4-x86_64-1.txz:  Upgraded.
l/libgusb-0.4.9-x86_64-1.txz:  Upgraded.
n/nmap-7.95-x86_64-1.txz:  Upgraded.
x/fcitx5-5.1.9-x86_64-1.txz:  Upgraded.
x/fcitx5-anthy-5.1.4-x86_64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.1.5-x86_64-1.txz:  Upgraded.
x/fcitx5-gtk-5.1.3-x86_64-1.txz:  Upgraded.
x/fcitx5-hangul-5.1.3-x86_64-1.txz:  Upgraded.
x/fcitx5-kkc-5.1.3-x86_64-1.txz:  Upgraded.
x/fcitx5-m17n-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.6-x86_64-1.txz:  Upgraded.
x/fcitx5-sayura-5.1.2-x86_64-1.txz:  Upgraded.
x/fcitx5-table-extra-5.1.5-x86_64-1.txz:  Upgraded.
x/fcitx5-table-other-5.1.2-x86_64-1.txz:  Upgraded.
x/fcitx5-unikey-5.1.4-x86_64-1.txz:  Upgraded.
x/libime-1.1.7-x86_64-1.txz:  Upgraded.
extra/emacs-regular-build/emacs-29.3-x86_64-2_regular.txz:  Rebuilt.
  This is a bugfix release.
  Only build the X11/GTK+3 version. Use "emacs -nw" if you want to start it
  in a terminal emulator in text mode, or rebuild if you really need to get
  rid of the X11 dependency for some reason.
  Build using --with-pdumper=auto. It seems that --with-dumping=unexec produces
  a buggy Emacs here in the modern era, with symptoms such as "child signal FD:
  Invalid argument". It's possible this had something to do with the reported
  memory leaks as well.
  Thanks to 3Tom for the bug report.
2024-04-23 22:34:04 +02:00
Patrick J Volkerding
7a2ee07f95 Tue Oct 3 22:19:10 UTC 2023
a/aaa_glibc-solibs-2.37-x86_64-3.txz:  Rebuilt.
a/dialog-1.3_20231002-x86_64-1.txz:  Upgraded.
ap/mpg123-1.32.3-x86_64-1.txz:  Upgraded.
d/llvm-17.0.2-x86_64-1.txz:  Upgraded.
d/meson-1.2.2-x86_64-2.txz:  Rebuilt.
  [PATCH] Revert rust: apply global, project, and environment C args to bindgen.
  This fixes building Mesa.
  Thanks to lucabon and marav.
kde/calligra-3.2.1-x86_64-34.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/cantor-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kfilemetadata-5.110.0-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kile-2.9.93-x86_64-28.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/kitinerary-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/krita-5.1.5-x86_64-15.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
kde/okular-23.08.1-x86_64-2.txz:  Rebuilt.
  Recompiled against poppler-23.10.0.
l/glibc-2.37-x86_64-3.txz:  Rebuilt.
l/glibc-i18n-2.37-x86_64-3.txz:  Rebuilt.
  Patched to fix the "Looney Tunables" vulnerability, a local privilege
  escalation in ld.so. This vulnerability was introduced in April 2021
  (glibc 2.34) by commit 2ed18c.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
    https://www.cve.org/CVERecord?id=CVE-2023-4911
  (* Security fix *)
l/glibc-profile-2.37-x86_64-3.txz:  Rebuilt.
l/mozilla-nss-3.94-x86_64-1.txz:  Upgraded.
l/poppler-23.10.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/NetworkManager-1.44.2-x86_64-1.txz:  Upgraded.
n/irssi-1.4.5-x86_64-1.txz:  Upgraded.
x/fcitx5-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-anthy-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-chinese-addons-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-gtk-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-hangul-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-kkc-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-m17n-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.1-x86_64-1.txz:  Upgraded.
x/fcitx5-sayura-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-table-extra-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-table-other-5.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-unikey-5.1.1-x86_64-1.txz:  Upgraded.
x/libX11-1.8.7-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  libX11: out-of-bounds memory access in _XkbReadKeySyms().
  libX11: stack exhaustion from infinite recursion in PutSubImage().
  libX11: integer overflow in XCreateImage() leading to a heap overflow.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-October/003424.html
    https://www.cve.org/CVERecord?id=CVE-2023-43785
    https://www.cve.org/CVERecord?id=CVE-2023-43786
    https://www.cve.org/CVERecord?id=CVE-2023-43787
  (* Security fix *)
x/libXpm-3.5.17-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  libXpm: out of bounds read in XpmCreateXpmImageFromBuffer().
  libXpm: out of bounds read on XPM with corrupted colormap.
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2023-October/003424.html
    https://www.cve.org/CVERecord?id=CVE-2023-43788
    https://www.cve.org/CVERecord?id=CVE-2023-43789
  (* Security fix *)
testing/packages/aaa_glibc-solibs-2.38-x86_64-2.txz:  Rebuilt.
testing/packages/glibc-2.38-x86_64-2.txz:  Rebuilt.
  Patched to fix the "Looney Tunables" vulnerability, a local privilege
  escalation in ld.so. This vulnerability was introduced in April 2021
  (glibc 2.34) by commit 2ed18c.
  Thanks to Qualys Research Labs for reporting this issue.
  For more information, see:
    https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
    https://www.cve.org/CVERecord?id=CVE-2023-4911
  (* Security fix *)
testing/packages/glibc-i18n-2.38-x86_64-2.txz:  Rebuilt.
testing/packages/glibc-profile-2.38-x86_64-2.txz:  Rebuilt.
2023-10-04 01:08:21 +02:00
Patrick J Volkerding
b2fa3fdbd7 Mon May 22 19:05:02 UTC 2023
ap/qpdf-11.4.0-x86_64-1.txz:  Upgraded.
l/exiv2-0.27.7-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.1_10-x86_64-1.txz:  Upgraded.
n/c-ares-1.19.1-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues:
  0-byte UDP payload causes Denial of Service.
  Insufficient randomness in generation of DNS query IDs.
  Buffer Underwrite in ares_inet_net_pton().
  AutoTools does not set CARES_RANDOM_FILE during cross compilation.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-32067
    https://www.cve.org/CVERecord?id=CVE-2023-31147
    https://www.cve.org/CVERecord?id=CVE-2023-31130
    https://www.cve.org/CVERecord?id=CVE-2023-31124
  (* Security fix *)
n/wget-1.21.4-x86_64-1.txz:  Upgraded.
xap/gnuplot-5.4.7-x86_64-1.txz:  Upgraded.
2023-05-22 21:32:45 +02:00
Patrick J Volkerding
522fb53c22 Mon Aug 15 20:23:47 UTC 2022
a/etc-15.1-x86_64-2.txz:  Rebuilt.
  Added support for $HOME/.profile.d/*.{csh,sh} scripts.
  Thanks to Heinz Wiesinger.
a/mcelog-188-x86_64-1.txz:  Upgraded.
kde/fcitx5-configtool-5.0.14-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
kde/fcitx5-theme-breeze-2.0.0-noarch-1.txz:  Added.
  Thanks to Heinz Wiesinger.
kde/kcm-fcitx-0.5.6-x86_64-4.txz:  Removed.
l/fmt-9.0.0-x86_64-1.txz:  Added.
  Thanks to Steven Voges.
l/librsvg-2.54.4-x86_64-2.txz:  Rebuilt.
  Removed dangling symlink. Thanks to marav.
n/rsync-3.2.5-x86_64-1.txz:  Upgraded.
  Added some file-list safety checking that helps to ensure that a rogue
  sending rsync can't add unrequested top-level names and/or include recursive
  names that should have been excluded by the sender. These extra safety
  checks only require the receiver rsync to be updated. When dealing with an
  untrusted sending host, it is safest to copy into a dedicated destination
  directory for the remote content (i.e. don't copy into a destination
  directory that contains files that aren't from the remote host unless you
  trust the remote host).
  For more information, see:
   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154
  (* Security fix *)
x/anthy-9100h-x86_64-4.txz:  Removed.
x/anthy-unicode-1.0.0.20211224-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx-4.2.9.8-x86_64-3.txz:  Removed.
x/fcitx-anthy-0.2.4-x86_64-1.txz:  Removed.
x/fcitx-configtool-0.4.10-x86_64-3.txz:  Removed.
x/fcitx-hangul-0.3.1-x86_64-3.txz:  Removed.
x/fcitx-kkc-0.1.4-x86_64-3.txz:  Removed.
x/fcitx-libpinyin-0.5.4-x86_64-2.txz:  Removed.
x/fcitx-m17n-0.2.4-x86_64-3.txz:  Removed.
x/fcitx-qt5-1.2.7-x86_64-1.txz:  Removed.
x/fcitx-sayura-0.1.2-x86_64-3.txz:  Removed.
x/fcitx-table-extra-0.3.8-x86_64-3.txz:  Removed.
x/fcitx-table-other-0.2.4-x86_64-3.txz:  Removed.
x/fcitx-unikey-0.2.7-x86_64-3.txz:  Removed.
x/fcitx5-5.0.18-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-anthy-5.0.12-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-chinese-addons-5.0.14-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-gtk-5.0.17-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-hangul-5.0.10-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-kkc-5.0.10-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-m17n-5.0.10-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-qt-5.0.14-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-sayura-5.0.8-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-table-extra-5.0.11-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-table-other-5.0.10-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/fcitx5-unikey-5.0.11-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/ibus-1.5.26-x86_64-2.txz:  Rebuilt.
  Use correct path to kimpanel in ibus-autostart.
  Thanks to Lockywolf.
x/ibus-anthy-1.5.14-x86_64-2.txz:  Rebuilt.
  Recompiled against anthy-unicode-1.0.0.20211224.
  Thanks to Heinz Wiesinger.
x/libime-1.0.13-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
x/m17n-lib-1.8.0-x86_64-5.txz:  Rebuilt.
  Rebuilt to drop the dependency on anthy-9100h.
  Thanks to Heinz Wiesinger.
x/skkdic-20210919-noarch-1.txz:  Upgraded.
  Thanks to Heinz Wiesinger.
x/x11-skel-7.7-x86_64-9.txz:  Rebuilt.
  Added imconfig script for selecting the input method.
  Thanks to Heinz Wiesinger.
x/xcb-imdkit-1.0.3-x86_64-1.txz:  Added.
  Thanks to Heinz Wiesinger.
2022-08-16 07:00:14 +02:00
Renamed from source/x/fcitx/fcitx.SlackBuild (Browse further)