summaryrefslogtreecommitdiffstats
path: root/source/l/hunspell/hunspell.url (follow)
Commit message (Expand)AuthorAgeFilesLines
* Tue Aug 23 19:27:56 UTC 2022...ap/inxi-3.3.21_1-noarch-1.txz: Upgraded. d/ccache-4.6.2-x86_64-1.txz: Upgraded. d/parallel-20220822-noarch-1.txz: Upgraded. kde/kleopatra-22.08.0-x86_64-2.txz: Rebuilt. Patched to build with gpgme-1.18.0. l/babl-0.1.94-x86_64-1.txz: Upgraded. l/hunspell-1.7.1-x86_64-1.txz: Upgraded. Fixed invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707 (* Security fix *) l/libqalculate-4.3.0-x86_64-1.txz: Upgraded. n/ethtool-5.19-x86_64-1.txz: Upgraded. n/gpgme-1.18.0-x86_64-1.txz: Upgraded. n/nghttp2-1.49.0-x86_64-1.txz: Upgraded. x/ibus-1.5.27-x86_64-1.txz: Upgraded. x/libglvnd-1.5.0-x86_64-1.txz: Upgraded. xap/mozilla-firefox-104.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/104.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-33/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478 (* Security fix *) xap/mozilla-thunderbird-102.2.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.2.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-36/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478 (* Security fix *) extra/sendmail/sendmail-8.17.1-x86_64-4.txz: Rebuilt. In recent versions of glibc, USE_INET6 has been removed which caused sendmail to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the site.config.m4 allows the reverse lookups to work again fixing this issue. Thanks to talo. extra/sendmail/sendmail-cf-8.17.1-noarch-4.txz: Rebuilt. 20220823192756 Patrick J Volkerding2022-08-241-0/+1