slackware-current/source/xap
Patrick J Volkerding 32ccce4a53 Wed Oct 30 21:03:27 UTC 2024
ap/vim-9.1.0821-x86_64-1.txz:  Upgraded.
d/llvm-19.1.3-x86_64-1.txz:  Upgraded.
d/python-setuptools-75.3.0-x86_64-1.txz:  Upgraded.
l/PyQt5-5.15.11-x86_64-2.txz:  Rebuilt.
  Recompiled to drop the QtWebKit and QtWebKitWidgets bindings.
  Thanks to jloco.
l/libclc-19.1.3-x86_64-1.txz:  Upgraded.
l/libnl3-3.11.0-x86_64-1.txz:  Upgraded.
l/lz4-1.10.0-x86_64-2.txz:  Rebuilt.
  Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567.
l/mozjs128-128.4.0esr-x86_64-1.txz:  Upgraded.
n/dovecot-2.3.21.1-x86_64-3.txz:  Rebuilt.
  Recompiled using --with-lua. Thanks to Luigi Trovato.
n/fetchmail-6.5.0-x86_64-1.txz:  Upgraded.
n/gnupg2-2.4.6-x86_64-1.txz:  Upgraded.
x/xf86-input-wacom-1.2.3-x86_64-1.txz:  Upgraded.
x/xorg-server-21.1.14-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
x/xorg-server-xephyr-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-24.1.4-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
xap/mozilla-firefox-128.4.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-56/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/vim-gvim-9.1.0821-x86_64-1.txz:  Upgraded.
xap/xaos-4.3.3-x86_64-1.txz:  Upgraded.
extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz:  Rebuilt.
  Rebuilt against xorg-server-21.1.14.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
2024-10-30 23:24:55 +01:00
..
audacious Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
audacious-plugins Fri Sep 27 21:10:23 UTC 2024 2024-09-28 00:02:43 +02:00
blackbox Mon Oct 10 18:45:33 UTC 2022 2022-10-11 07:00:35 +02:00
blueman Fri Jul 26 18:26:05 UTC 2024 2024-07-26 21:06:15 +02:00
ddd Mon Aug 12 18:41:11 UTC 2024 2024-08-12 21:02:23 +02:00
easytag Sun Nov 20 00:54:24 UTC 2022 2022-11-20 07:00:14 +01:00
electricsheep Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
ffmpegthumbnailer Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
fluxbox Mon Jan 17 22:44:42 UTC 2022 2022-01-18 08:59:56 +01:00
freerdp Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
fvwm Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
geeqie Mon Sep 23 20:01:35 UTC 2024 2024-09-23 22:28:56 +02:00
gftp Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
gimp Tue Oct 1 18:01:38 UTC 2024 2024-10-01 22:04:37 +02:00
gkrellm Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
gnuchess Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
gnuplot Sat Dec 30 19:53:07 UTC 2023 2023-12-30 21:30:31 +01:00
gparted Wed Feb 28 18:36:48 UTC 2024 2024-02-28 20:34:19 +01:00
gucharmap Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
gv Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
hexchat Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
libnma Mon Jan 9 20:10:55 UTC 2023 2023-01-09 21:34:48 +01:00
mozilla-firefox Wed Aug 7 04:03:09 UTC 2024 2024-08-07 07:22:03 +02:00
mozilla-thunderbird Wed Aug 7 04:03:09 UTC 2024 2024-08-07 07:22:03 +02:00
MPlayer Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
mpv Tue Sep 24 18:42:58 UTC 2024 2024-09-24 21:36:52 +02:00
network-manager-applet Thu Oct 5 21:44:34 UTC 2023 2023-10-06 00:40:57 +02:00
NetworkManager-openvpn Mon Jun 24 21:17:14 UTC 2024 2024-06-24 23:59:55 +02:00
pan Mon Oct 21 19:11:58 UTC 2024 2024-10-21 21:30:18 +02:00
pavucontrol Mon Aug 5 21:58:24 UTC 2024 2024-08-06 01:03:55 +02:00
pidgin Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
rdesktop Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
rxvt-unicode Mon Jun 10 19:23:44 UTC 2024 2024-06-10 22:00:40 +02:00
sane Sun May 26 00:07:39 UTC 2024 2024-05-26 02:44:46 +02:00
seamonkey Tue Sep 3 21:07:09 UTC 2024 2024-09-04 00:33:23 +02:00
seyon Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
ssr Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
windowmaker Wed Dec 6 05:03:11 UTC 2023 2023-12-06 07:07:29 +01:00
x11-ssh-askpass Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
x3270 Mon Feb 26 20:09:43 UTC 2024 2024-02-26 22:05:23 +01:00
xaos Wed Oct 30 21:03:27 UTC 2024 2024-10-30 23:24:55 +01:00
xgames Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
xine-lib Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
xine-ui Sat May 4 17:37:11 UTC 2024 2024-05-04 20:01:05 +02:00
xlockmore Sat Sep 14 18:15:34 UTC 2024 2024-09-14 20:58:45 +02:00
xmms Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
xpaint Wed Dec 6 05:03:11 UTC 2023 2023-12-06 07:07:29 +01:00
xpdf Fri Feb 9 21:48:09 UTC 2024 2024-02-09 23:28:55 +01:00
xsane Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
xscreensaver Tue Aug 13 20:33:27 UTC 2024 2024-08-13 23:09:21 +02:00
xsnow Sun May 26 00:07:39 UTC 2024 2024-05-26 02:44:46 +02:00
FTBFSlog Mon Oct 10 18:45:33 UTC 2022 2022-10-11 07:00:35 +02:00
vim-gvim Slackware 13.0 2018-05-31 22:41:17 +02:00