summaryrefslogtreecommitdiffstats
path: root/source/l/libcap-ng/libcap-ng.SlackBuild
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-03-30 22:37:05 +0000
committer Eric Hameleers <alien@slackware.com>2022-03-31 06:59:46 +0200
commit20f8c8e77495af3d80549ad1387c560581bc0b31 (patch)
treebbd95a42311104542b512fdfd2f019c34418a47d /source/l/libcap-ng/libcap-ng.SlackBuild
parentf1c0c4aac5baeb5f422f8668a863d8f2eeb2edde (diff)
downloadcurrent-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.gz
current-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.xz
Wed Mar 30 22:37:05 UTC 202220220330223705
ap/vim-8.2.4649-x86_64-1.txz: Upgraded. Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646. This vulnerability is capable of crashing software, bypassing protection mechanisms, modifying memory, and possibly execution of arbitrary code. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 (* Security fix *) d/cmake-3.23.0-x86_64-1.txz: Upgraded. d/meson-0.61.4-x86_64-1.txz: Upgraded. l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded. l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded. l/mlt-7.6.0-x86_64-1.txz: Upgraded. x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded. xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded.
Diffstat (limited to '')
-rwxr-xr-xsource/l/libcap-ng/libcap-ng.SlackBuild2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/l/libcap-ng/libcap-ng.SlackBuild b/source/l/libcap-ng/libcap-ng.SlackBuild
index 6e5e75c60..7d58ec18b 100755
--- a/source/l/libcap-ng/libcap-ng.SlackBuild
+++ b/source/l/libcap-ng/libcap-ng.SlackBuild
@@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=libcap-ng
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-5}
+BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then