slackware-current/extra/source
Patrick J Volkerding 2d770ad859 Wed Oct 30 21:03:27 UTC 2024
extra/llvm-19.1.3-x86_64-1_slack15.0.txz:  Upgraded.
  Shared library .so-version bump.
  If you are upgrading from a previous LLVM, you might also need llvm13-compat
  and/or llvm17-compat. We'll be using this for newer Mozilla things.
extra/llvm17-compat-17.0.6-x86_64-1_slack15.0.txz:  Added.
  This is to support any locally compiled software that was linked against
  libLLVM-17.so from the llvm-17.0.6 that was previously in /extra.
extra/rust-bindgen-0.69.4-x86_64-1_slack15.0.txz:  Added.
extra/rust-for-mozilla/rust-1.82.0-x86_64-1_slack15.0.txz:  Upgraded.
extra/tigervnc/tigervnc-1.12.0-x86_64-7_slack15.0.txz:  Rebuilt.
  Recompiled against xorg-server-1.20.14, including a patch for a
  security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
patches/packages/mozilla-firefox-128.4.0esr-x86_64-1_slack15.0.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-56/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
patches/packages/mozilla-thunderbird-128.4.0esr-x86_64-1_slack15.0.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
    https://www.cve.org/CVERecord?id=CVE-2024-10458
    https://www.cve.org/CVERecord?id=CVE-2024-10459
    https://www.cve.org/CVERecord?id=CVE-2024-10460
    https://www.cve.org/CVERecord?id=CVE-2024-10461
    https://www.cve.org/CVERecord?id=CVE-2024-10462
    https://www.cve.org/CVERecord?id=CVE-2024-10463
    https://www.cve.org/CVERecord?id=CVE-2024-10464
    https://www.cve.org/CVERecord?id=CVE-2024-10465
    https://www.cve.org/CVERecord?id=CVE-2024-10466
    https://www.cve.org/CVERecord?id=CVE-2024-10467
  (* Security fix *)
patches/packages/xorg-server-1.20.14-x86_64-14_slack15.0.txz:  Rebuilt.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-14_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-14_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-14_slack15.0.txz:  Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-12_slack15.0.txz:  Rebuilt.
  This update fixes a security issue:
  By providing a modified bitmap, a heap-based buffer overflow may occur.
  This may lead to local privilege escalation if the server is run as root
  or remote code execution (e.g. x11 over ssh).
  This vulnerability was discovered by:
  Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
  For more information, see:
    https://lists.x.org/archives/xorg-announce/2024-October/003545.html
    https://www.cve.org/CVERecord?id=CVE-2024-9632
  (* Security fix *)
2024-10-31 13:30:38 +01:00
..
aspell-word-lists Tue May 26 20:35:03 UTC 2020 2020-05-26 23:59:47 +02:00
bash-completion Mon Jun 7 18:53:49 UTC 2021 2021-06-07 23:59:59 +02:00
bittornado Mon Sep 30 21:08:32 UTC 2019 2019-10-01 08:59:50 +02:00
brltty Tue Nov 16 19:04:47 UTC 2021 2021-11-17 08:59:57 +01:00
fltk Sun Nov 21 20:16:54 UTC 2021 2021-11-22 08:59:57 +01:00
getty-ps Fri Oct 18 21:00:50 UTC 2019 2019-10-19 08:59:48 +02:00
java Mon Sep 30 21:08:32 UTC 2019 2019-10-01 08:59:50 +02:00
llvm Wed Oct 30 21:03:27 UTC 2024 2024-10-31 13:30:38 +01:00
llvm13-compat Sun Feb 18 21:03:57 UTC 2024 2024-02-19 13:30:46 +01:00
llvm17-compat Wed Oct 30 21:03:27 UTC 2024 2024-10-31 13:30:38 +01:00
php80 Mon Aug 7 19:22:02 UTC 2023 2023-08-08 13:30:34 +02:00
php81 Wed Oct 23 19:39:39 UTC 2024 2024-10-24 13:30:41 +02:00
rust-bindgen Wed Oct 30 21:03:27 UTC 2024 2024-10-31 13:30:38 +01:00
rust-for-mozilla Wed Oct 30 21:03:27 UTC 2024 2024-10-31 13:30:38 +01:00
sendmail Wed Jan 31 21:19:19 UTC 2024 2024-02-01 13:30:49 +01:00
tigervnc Wed Oct 30 21:03:27 UTC 2024 2024-10-31 13:30:38 +01:00
xf86-video-fbdev Mon Sep 30 21:08:32 UTC 2019 2019-10-01 08:59:50 +02:00
xfractint Sun Aug 2 18:20:30 UTC 2020 2020-08-03 08:59:53 +02:00
xv Fri Oct 18 21:00:50 UTC 2019 2019-10-19 08:59:48 +02:00
alpine Thu Apr 29 18:49:00 UTC 2021 2021-04-30 08:59:55 +02:00