Patrick J Volkerding
32ccce4a53
Wed Oct 30 21:03:27 UTC 2024
...
ap/vim-9.1.0821-x86_64-1.txz: Upgraded.
d/llvm-19.1.3-x86_64-1.txz: Upgraded.
d/python-setuptools-75.3.0-x86_64-1.txz: Upgraded.
l/PyQt5-5.15.11-x86_64-2.txz: Rebuilt.
Recompiled to drop the QtWebKit and QtWebKitWidgets bindings.
Thanks to jloco.
l/libclc-19.1.3-x86_64-1.txz: Upgraded.
l/libnl3-3.11.0-x86_64-1.txz: Upgraded.
l/lz4-1.10.0-x86_64-2.txz: Rebuilt.
Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567.
l/mozjs128-128.4.0esr-x86_64-1.txz: Upgraded.
n/dovecot-2.3.21.1-x86_64-3.txz: Rebuilt.
Recompiled using --with-lua. Thanks to Luigi Trovato.
n/fetchmail-6.5.0-x86_64-1.txz: Upgraded.
n/gnupg2-2.4.6-x86_64-1.txz: Upgraded.
x/xf86-input-wacom-1.2.3-x86_64-1.txz: Upgraded.
x/xorg-server-21.1.14-x86_64-1.txz: Upgraded.
This update fixes a security issue:
By providing a modified bitmap, a heap-based buffer overflow may occur.
This may lead to local privilege escalation if the server is run as root
or remote code execution (e.g. x11 over ssh).
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
For more information, see:
https://lists.x.org/archives/xorg-announce/2024-October/003545.html
https://www.cve.org/CVERecord?id=CVE-2024-9632
(* Security fix *)
x/xorg-server-xephyr-21.1.14-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.14-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.14-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-24.1.4-x86_64-1.txz: Upgraded.
This update fixes a security issue:
By providing a modified bitmap, a heap-based buffer overflow may occur.
This may lead to local privilege escalation if the server is run as root
or remote code execution (e.g. x11 over ssh).
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
For more information, see:
https://lists.x.org/archives/xorg-announce/2024-October/003545.html
https://www.cve.org/CVERecord?id=CVE-2024-9632
(* Security fix *)
xap/mozilla-firefox-128.4.0esr-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2024-56/
https://www.cve.org/CVERecord?id=CVE-2024-10458
https://www.cve.org/CVERecord?id=CVE-2024-10459
https://www.cve.org/CVERecord?id=CVE-2024-10460
https://www.cve.org/CVERecord?id=CVE-2024-10461
https://www.cve.org/CVERecord?id=CVE-2024-10462
https://www.cve.org/CVERecord?id=CVE-2024-10463
https://www.cve.org/CVERecord?id=CVE-2024-10464
https://www.cve.org/CVERecord?id=CVE-2024-10465
https://www.cve.org/CVERecord?id=CVE-2024-10466
https://www.cve.org/CVERecord?id=CVE-2024-10467
(* Security fix *)
xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
https://www.cve.org/CVERecord?id=CVE-2024-10458
https://www.cve.org/CVERecord?id=CVE-2024-10459
https://www.cve.org/CVERecord?id=CVE-2024-10460
https://www.cve.org/CVERecord?id=CVE-2024-10461
https://www.cve.org/CVERecord?id=CVE-2024-10462
https://www.cve.org/CVERecord?id=CVE-2024-10463
https://www.cve.org/CVERecord?id=CVE-2024-10464
https://www.cve.org/CVERecord?id=CVE-2024-10465
https://www.cve.org/CVERecord?id=CVE-2024-10466
https://www.cve.org/CVERecord?id=CVE-2024-10467
(* Security fix *)
xap/vim-gvim-9.1.0821-x86_64-1.txz: Upgraded.
xap/xaos-4.3.3-x86_64-1.txz: Upgraded.
extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz: Rebuilt.
Rebuilt against xorg-server-21.1.14.
This update fixes a security issue:
By providing a modified bitmap, a heap-based buffer overflow may occur.
This may lead to local privilege escalation if the server is run as root
or remote code execution (e.g. x11 over ssh).
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
For more information, see:
https://lists.x.org/archives/xorg-announce/2024-October/003545.html
https://www.cve.org/CVERecord?id=CVE-2024-9632
(* Security fix *)
2024-10-30 23:24:55 +01:00
Patrick J Volkerding
f32788a2ae
Fri Jul 19 20:08:29 UTC 2024
...
a/aaa_libraries-15.1-x86_64-32.txz: Rebuilt.
Added: libgpg-error.so.0.37.0.
Upgraded: libcap.so.2.70, liblzma.so.5.6.2, libpcre2-8.so.0.13.0,
libglib-2.0.so.0.8000.4, libgmodule-2.0.so.0.8000.4,
libgobject-2.0.so.0.8000.4, libgthread-2.0.so.0.8000.4,
libstdc++.so.6.0.33, libunwind.so.8.1.0.
Removed: libboost_*.so.1.84.0
The addition of libgpg-error to this package should work around the issue
upgrading from 15.0 to -current using slackpkg. Thanks to Stuart Winter.
d/llvm-18.1.8-x86_64-2.txz: Rebuilt.
Add WebAssembly target. Thanks to Heinz Wiesinger.
Adjust compiler flags to what will likely be our new standard.
Qt6 requires newer opcodes than -march=i586, and enough things have begun
to include SSE2 instructions (without providing configure flags to opt-out)
that trying to retain compatibility with CPUs from the 1990s just isn't
going to work any more. My apologies if this causes your antique computer
to get illegal instruction errors, but the solution will have to be sourcing
an antique operating system for it.
On 64-bit we will make the compiler flags for -march and -mtune explicit.
l/libnl3-3.10.0-x86_64-1.txz: Upgraded.
l/orc-0.4.39-x86_64-1.txz: Upgraded.
x/egl-wayland-1.1.14-x86_64-1.txz: Upgraded.
2024-07-19 22:42:11 +02:00