diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2024-01-16 20:49:28 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2024-01-16 22:29:44 +0100 |
commit | a41e02d36ff6f3e23eecc08bae2205f3eca33e95 (patch) | |
tree | 22faa1b0d195ba50d4c2770339fb8a71fccc7cb7 /source/a/zoo | |
parent | 715f1e2e38983e25a4108fdf7ef0f12449617670 (diff) | |
download | current-a41e02d36ff6f3e23eecc08bae2205f3eca33e95.tar.gz current-a41e02d36ff6f3e23eecc08bae2205f3eca33e95.tar.xz |
Tue Jan 16 20:49:28 UTC 202420240116204928
a/attr-2.5.2-x86_64-1.txz: Upgraded.
a/shadow-4.14.3-x86_64-1.txz: Upgraded.
a/zoo-2.10_28-x86_64-1.txz: Upgraded.
Merge final patches from Debian to fix various bugs. Thanks to jayjwa.
ap/sqlite-3.45.0-x86_64-1.txz: Upgraded.
l/iso-codes-4.16.0-noarch-1.txz: Upgraded.
n/gnutls-3.8.3-x86_64-1.txz: Upgraded.
This update fixes two medium severity security issues:
Fix more timing side-channel inside RSA-PSK key exchange.
Fix assertion failure when verifying a certificate chain with a cycle of
cross signatures.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2024-0553
https://www.cve.org/CVERecord?id=CVE-2024-0567
(* Security fix *)
x/xorg-server-21.1.11-x86_64-1.txz: Upgraded.
This update fixes security issues:
Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer.
Reattaching to different master device may lead to out-of-bounds memory access.
Heap buffer overflow in XISendDeviceHierarchyEvent.
Heap buffer overflow in DisableDevice.
SELinux context corruption.
SELinux unlabeled GLX PBuffer.
For more information, see:
https://lists.x.org/archives/xorg/2024-January/061525.html
https://www.cve.org/CVERecord?id=CVE-2023-6816
https://www.cve.org/CVERecord?id=CVE-2024-0229
https://www.cve.org/CVERecord?id=CVE-2024-21885
https://www.cve.org/CVERecord?id=CVE-2024-21886
https://www.cve.org/CVERecord?id=CVE-2024-0408
https://www.cve.org/CVERecord?id=CVE-2024-0409
(* Security fix *)
x/xorg-server-xephyr-21.1.11-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.11-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.11-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-23.2.4-x86_64-1.txz: Upgraded.
This update fixes security issues:
Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer.
Reattaching to different master device may lead to out-of-bounds memory access.
Heap buffer overflow in XISendDeviceHierarchyEvent.
Heap buffer overflow in DisableDevice.
SELinux context corruption.
SELinux unlabeled GLX PBuffer.
For more information, see:
https://lists.x.org/archives/xorg/2024-January/061525.html
https://www.cve.org/CVERecord?id=CVE-2023-6816
https://www.cve.org/CVERecord?id=CVE-2024-0229
https://www.cve.org/CVERecord?id=CVE-2024-21885
https://www.cve.org/CVERecord?id=CVE-2024-21886
https://www.cve.org/CVERecord?id=CVE-2024-0408
https://www.cve.org/CVERecord?id=CVE-2024-0409
(* Security fix *)
xfce/xfce4-whiskermenu-plugin-2.8.3-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/zoo')
-rwxr-xr-x | source/a/zoo/zoo.SlackBuild | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/source/a/zoo/zoo.SlackBuild b/source/a/zoo/zoo.SlackBuild index a94a53fbc..cf3576065 100755 --- a/source/a/zoo/zoo.SlackBuild +++ b/source/a/zoo/zoo.SlackBuild @@ -1,6 +1,6 @@ #!/bin/bash -# Copyright 2008, 2009, 2010, 2018 Patrick J. Volkerding, Sebeka, Minnesota, USA +# Copyright 2008, 2009, 2010, 2018, 2024 Patrick J. Volkerding, Sebeka, Minnesota, USA # All rights reserved. # # Redistribution and use of this script, with or without modification, is @@ -24,8 +24,8 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=zoo VERSION=2.10 -DEBPATCH=22 -BUILD=${BUILD:-4} +DEBPATCH=28 +BUILD=${BUILD:-1} # Automatically determine the architecture we're building on: if [ -z "$ARCH" ]; then @@ -53,7 +53,7 @@ mkdir -p $TMP $PKG cd $TMP rm -rf zoo-$VERSION -tar xzvf $CWD/zoo-$VERSION.tar.gz +tar xvf $CWD/zoo-$VERSION.tar.?z cd zoo-$VERSION chown -R root:root . @@ -63,7 +63,7 @@ find . \ \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ -exec chmod 644 {} \+ -tar xf $CWD/zoo_${VERSION}-${DEBPATCH}.debian.tar.gz +tar xf $CWD/zoo_${VERSION}-${DEBPATCH}.debian.tar.?z for diff in debian/patches/*patch ; do cat $diff | patch -p1 --verbose --backup --suffix=.orig || exit 1 done |