slackware-current/source/x
Patrick J Volkerding 32ccce4a53 Wed Oct 30 21:03:27 UTC 2024
ap/vim-9.1.0821-x86_64-1.txz:  Upgraded.
d/llvm-19.1.3-x86_64-1.txz:  Upgraded.
d/python-setuptools-75.3.0-x86_64-1.txz:  Upgraded.
l/PyQt5-5.15.11-x86_64-2.txz:  Rebuilt.
  Recompiled to drop the QtWebKit and QtWebKitWidgets bindings.
  Thanks to jloco.
l/libclc-19.1.3-x86_64-1.txz:  Upgraded.
l/libnl3-3.11.0-x86_64-1.txz:  Upgraded.
l/lz4-1.10.0-x86_64-2.txz:  Rebuilt.
  Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567.
l/mozjs128-128.4.0esr-x86_64-1.txz:  Upgraded.
n/dovecot-2.3.21.1-x86_64-3.txz:  Rebuilt.
  Recompiled using --with-lua. Thanks to Luigi Trovato.
n/fetchmail-6.5.0-x86_64-1.txz:  Upgraded.
n/gnupg2-2.4.6-x86_64-1.txz:  Upgraded.
x/xf86-input-wacom-1.2.3-x86_64-1.txz:  Upgraded.
x/xorg-server-21.1.14-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
x/xorg-server-xephyr-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-24.1.4-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
xap/mozilla-firefox-128.4.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-56/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/vim-gvim-9.1.0821-x86_64-1.txz:  Upgraded.
xap/xaos-4.3.3-x86_64-1.txz:  Upgraded.
extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz:  Rebuilt.
  Rebuilt against xorg-server-21.1.14.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
2024-10-30 23:24:55 +01:00
..
anthy-unicode Tue May 7 20:06:35 UTC 2024 2024-05-07 22:28:37 +02:00
cldr-emoji-annotation Mon Oct 4 19:28:39 UTC 2021 2021-10-05 09:00:04 +02:00
compiz Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
dejavu-fonts-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
egl-wayland Sun Aug 11 19:00:08 UTC 2024 2024-08-11 22:16:54 +02:00
eglexternalplatform Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
fcitx5 Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-anthy Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-chinese-addons Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-gtk Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
fcitx5-hangul Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-kkc Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-m17n Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fcitx5-qt Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
fcitx5-sayura Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
fcitx5-table-extra Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
fcitx5-table-other Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
fcitx5-unikey Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
fontconfig Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
freeglut Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
glew Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
glu Mon Jul 24 00:17:18 UTC 2023 2023-07-24 04:33:52 +02:00
hack-fonts-ttf Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
ibus Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
ibus-anthy Fri Mar 29 20:39:11 UTC 2024 2024-03-29 22:36:12 +01:00
ibus-hangul Fri Mar 29 20:39:11 UTC 2024 2024-03-29 22:36:12 +01:00
ibus-kkc Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
ibus-libpinyin Fri Jul 26 18:26:05 UTC 2024 2024-07-26 21:06:15 +02:00
ibus-m17n Mon Sep 9 17:27:00 UTC 2024 2024-09-09 19:59:46 +02:00
ibus-table Wed Aug 28 17:31:38 UTC 2024 2024-08-28 20:02:06 +02:00
ibus-unikey Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
intel-vaapi-driver Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
libdrm Tue Aug 27 19:24:48 UTC 2024 2024-08-27 21:59:36 +02:00
libepoxy Sat Mar 19 20:28:16 UTC 2022 2022-03-20 06:59:46 +01:00
liberation-fonts-ttf Fri Oct 1 05:38:04 UTC 2021 2021-10-01 17:59:54 +02:00
libevdev Tue Sep 3 21:07:09 UTC 2024 2024-09-04 00:33:23 +02:00
libgee Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
libglvnd Fri Aug 16 19:58:10 UTC 2024 2024-08-16 22:28:37 +02:00
libhangul Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
libime Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
libinput Mon Aug 19 18:50:19 UTC 2024 2024-08-19 21:49:36 +02:00
libkkc Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
libkkc-data Thu Mar 21 19:53:15 UTC 2024 2024-03-21 21:35:32 +01:00
libmypaint Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
libpinyin Fri Sep 17 04:17:57 UTC 2021 2021-09-17 17:59:52 +02:00
libva Mon Feb 21 20:21:38 UTC 2022 2022-02-22 06:59:43 +01:00
libva-utils Fri Jun 21 00:44:39 UTC 2024 2024-06-21 04:38:16 +02:00
libvdpau Tue Mar 8 04:39:53 UTC 2022 2022-03-08 06:59:43 +01:00
libwacom Mon Sep 2 19:56:17 UTC 2024 2024-09-02 22:40:20 +02:00
libXaw3dXft Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
libXcm Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
m17n-lib Mon Aug 28 00:38:01 UTC 2023 2023-08-28 03:00:22 +02:00
marisa Tue Oct 1 18:01:38 UTC 2024 2024-10-01 22:04:37 +02:00
mesa Wed Sep 18 21:23:19 UTC 2024 2024-09-19 00:41:24 +02:00
motif Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
mtdev Sat Apr 6 17:19:58 UTC 2024 2024-04-06 19:59:46 +02:00
mypaint-brushes Wed Dec 27 20:43:42 UTC 2023 2023-12-27 21:59:13 +01:00
noto-cjk-fonts-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
noto-emoji Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
noto-fonts-ttf Fri Oct 1 05:38:04 UTC 2021 2021-10-01 17:59:54 +02:00
OpenCC Fri Aug 9 21:22:03 UTC 2024 2024-08-10 00:09:19 +02:00
pyxdg Fri Mar 29 20:39:11 UTC 2024 2024-03-29 22:36:12 +01:00
sazanami-fonts-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
sddm Mon Feb 26 20:09:43 UTC 2024 2024-02-26 22:05:23 +01:00
sinhala_lklug-font-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
skkdic Mon Aug 15 20:23:47 UTC 2022 2022-08-16 07:00:14 +02:00
tibmachuni-font-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
ttf-indic-fonts Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
ttf-tlwg Tue Oct 19 18:10:12 UTC 2021 2021-10-20 08:59:56 +02:00
urw-core35-fonts-otf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
vulkan-sdk Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
wayland Sun Aug 25 17:38:49 UTC 2024 2024-08-25 19:59:05 +02:00
wayland-protocols Sat Oct 12 19:16:04 UTC 2024 2024-10-12 22:05:21 +02:00
wqy-zenhei-font-ttf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
x11 Wed Oct 30 21:03:27 UTC 2024 2024-10-30 23:24:55 +01:00
x11-skel Mon Aug 15 20:23:47 UTC 2022 2022-08-16 07:00:14 +02:00
xcb-imdkit Sat Jun 1 19:52:37 UTC 2024 2024-06-01 22:44:21 +02:00
xcm Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
xdg-desktop-portal Sat Nov 25 19:44:38 UTC 2023 2023-11-25 20:59:35 +01:00
xdg-user-dirs Wed Aug 3 19:33:34 UTC 2022 2022-08-04 07:00:11 +02:00
xdg-utils Tue Feb 6 21:45:37 UTC 2024 2024-02-06 23:44:07 +01:00
xorg-server-xwayland Wed Aug 7 18:19:56 UTC 2024 2024-08-07 20:58:43 +02:00
xterm Tue Sep 3 21:07:09 UTC 2024 2024-09-04 00:33:23 +02:00
FTBFSlog Mon May 22 19:05:02 UTC 2023 2023-05-22 21:32:45 +02:00