slackware-current/source/d
Patrick J Volkerding 32ccce4a53 Wed Oct 30 21:03:27 UTC 2024
ap/vim-9.1.0821-x86_64-1.txz:  Upgraded.
d/llvm-19.1.3-x86_64-1.txz:  Upgraded.
d/python-setuptools-75.3.0-x86_64-1.txz:  Upgraded.
l/PyQt5-5.15.11-x86_64-2.txz:  Rebuilt.
  Recompiled to drop the QtWebKit and QtWebKitWidgets bindings.
  Thanks to jloco.
l/libclc-19.1.3-x86_64-1.txz:  Upgraded.
l/libnl3-3.11.0-x86_64-1.txz:  Upgraded.
l/lz4-1.10.0-x86_64-2.txz:  Rebuilt.
  Make sure liblz4.pc uses lib${LIBDIRSUFFIX}. Thanks to af7567.
l/mozjs128-128.4.0esr-x86_64-1.txz:  Upgraded.
n/dovecot-2.3.21.1-x86_64-3.txz:  Rebuilt.
  Recompiled using --with-lua. Thanks to Luigi Trovato.
n/fetchmail-6.5.0-x86_64-1.txz:  Upgraded.
n/gnupg2-2.4.6-x86_64-1.txz:  Upgraded.
x/xf86-input-wacom-1.2.3-x86_64-1.txz:  Upgraded.
x/xorg-server-21.1.14-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
x/xorg-server-xephyr-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xnest-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xvfb-21.1.14-x86_64-1.txz:  Upgraded.
x/xorg-server-xwayland-24.1.4-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
xap/mozilla-firefox-128.4.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-56/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/mozilla-thunderbird-128.4.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
xap/vim-gvim-9.1.0821-x86_64-1.txz:  Upgraded.
xap/xaos-4.3.3-x86_64-1.txz:  Upgraded.
extra/tigervnc/tigervnc-1.14.1-x86_64-2.txz:  Rebuilt.
  Rebuilt against xorg-server-21.1.14.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
2024-10-30 23:24:55 +01:00
..
autoconf Tue Dec 26 00:20:26 UTC 2023 2023-12-26 01:59:25 +01:00
autoconf-archive Thu Oct 17 23:18:46 UTC 2024 2024-10-18 02:31:04 +02:00
automake Fri Jul 12 20:35:35 UTC 2024 2024-07-12 23:00:33 +02:00
binutils Fri Sep 13 01:32:33 UTC 2024 2024-09-13 04:11:07 +02:00
bison Wed Mar 10 01:30:34 UTC 2021 2021-03-10 08:59:55 +01:00
cargo-vendor-filterer Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
cbindgen Mon Aug 12 18:41:11 UTC 2024 2024-08-12 21:02:23 +02:00
ccache Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
check Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
clinfo Wed Aug 30 21:58:04 UTC 2023 2023-08-31 01:11:11 +02:00
clisp Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
cmake Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
cscope Sat May 4 17:37:11 UTC 2024 2024-05-04 20:01:05 +02:00
cvs Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
Cython Mon Aug 5 21:58:24 UTC 2024 2024-08-06 01:03:55 +02:00
dev86 Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
distcc Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
doxygen Fri Aug 9 03:39:11 UTC 2024 2024-08-09 06:05:42 +02:00
flex Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
gcc Fri Aug 30 17:52:19 UTC 2024 2024-08-30 20:49:55 +02:00
gdb Wed Oct 2 20:08:38 UTC 2024 2024-10-02 23:03:35 +02:00
git Wed Sep 25 18:40:09 UTC 2024 2024-09-25 20:58:18 +02:00
gnucobol Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
gperf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
guile Sat May 4 17:37:11 UTC 2024 2024-05-04 20:01:05 +02:00
gyp Fri Mar 29 20:39:11 UTC 2024 2024-03-29 22:36:12 +01:00
help2man Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
icecream Mon Nov 21 20:23:13 UTC 2022 2022-11-22 07:00:14 +01:00
indent Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
intltool Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
libtool Wed Sep 25 18:40:09 UTC 2024 2024-09-25 20:58:18 +02:00
llvm Wed Oct 30 21:03:27 UTC 2024 2024-10-30 23:24:55 +01:00
lua Mon Jul 1 20:12:46 UTC 2024 2024-07-01 23:13:24 +02:00
luajit Sat Aug 17 18:14:54 UTC 2024 2024-08-17 20:30:46 +02:00
m4 Mon May 31 23:21:18 UTC 2021 2021-06-01 09:00:03 +02:00
make Mon Feb 27 20:41:05 UTC 2023 2023-02-27 22:41:55 +01:00
mercurial Thu Aug 1 23:47:15 UTC 2024 2024-08-02 02:30:06 +02:00
meson Sun Jul 28 12:39:59 UTC 2024 2024-07-28 20:03:36 +02:00
nasm Fri Apr 5 20:11:23 UTC 2024 2024-04-05 22:28:59 +02:00
ninja Sat Oct 12 19:16:04 UTC 2024 2024-10-12 22:05:21 +02:00
nv-codec-headers Mon Apr 1 19:02:42 UTC 2024 2024-04-02 21:29:20 +02:00
opencl-headers Wed Jun 16 01:06:18 UTC 2021 2021-06-16 08:59:50 +02:00
oprofile Sun Aug 18 18:11:20 UTC 2024 2024-08-18 20:35:31 +02:00
p2c Tue Dec 20 20:40:18 UTC 2022 2022-12-20 22:34:22 +01:00
pahole Mon Jun 6 20:57:15 UTC 2022 2022-06-07 07:00:10 +02:00
parallel Thu Aug 22 19:10:18 UTC 2024 2024-08-22 22:16:26 +02:00
patchelf Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
perl Sat Oct 12 19:16:04 UTC 2024 2024-10-12 22:05:21 +02:00
pkg-config Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
pmake Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
poke Sat Jun 1 19:52:37 UTC 2024 2024-06-01 22:44:21 +02:00
python-pip Mon Jul 29 18:32:35 UTC 2024 2024-07-29 20:58:51 +02:00
python-setuptools Mon Jul 29 18:32:35 UTC 2024 2024-07-29 20:58:51 +02:00
python2 Sun Mar 31 22:44:32 UTC 2024 2024-04-01 00:57:33 +02:00
python3 Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
rcs Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
re2c Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
rinutils Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
ruby Tue Oct 1 18:01:38 UTC 2024 2024-10-01 22:04:37 +02:00
rust Mon Oct 21 19:11:58 UTC 2024 2024-10-21 21:30:18 +02:00
rust-bindgen Wed Aug 21 18:08:47 UTC 2024 2024-08-21 20:30:25 +02:00
sassc Sat Apr 8 19:01:35 UTC 2023 2023-04-08 21:35:38 +02:00
scons Wed Sep 4 23:37:27 UTC 2024 2024-09-05 02:15:14 +02:00
slacktrack Thu Sep 8 01:33:19 UTC 2022 2022-09-08 07:00:15 +02:00
strace Mon Sep 16 19:58:49 UTC 2024 2024-09-16 23:01:19 +02:00
subversion Wed Oct 9 21:09:16 UTC 2024 2024-10-10 00:58:09 +02:00
swig Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
tree-sitter Thu Oct 3 18:32:43 UTC 2024 2024-10-03 21:04:59 +02:00
vala Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
valgrind Fri Apr 12 19:08:59 UTC 2024 2024-04-12 22:01:31 +02:00
yasm Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
cargo-cbindgen-0.25.0.tar Tue Aug 29 00:06:09 UTC 2023 2023-08-29 02:29:59 +02:00
FTBFSlog Thu Mar 21 22:36:42 UTC 2024 2024-03-21 23:57:20 +01:00
gettext-tools Slackware 13.37 2018-05-31 22:45:18 +02:00
libgccjit Mon Feb 12 20:58:46 UTC 2024 2024-02-12 22:59:33 +01:00