summaryrefslogtreecommitdiffstats
path: root/source/l/librsvg
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2021-04-13 19:35:40 +0000
committer Eric Hameleers <alien@slackware.com>2021-04-14 08:59:53 +0200
commit0f26a90fcf3a69c04ddf31b6fe4868242d5679fc (patch)
tree4ff7bf8c60a17a32070d853bc7de99ab7d7a0f4f /source/l/librsvg
parent749d9833893fd9563593f4da69895ee19a13eb62 (diff)
downloadcurrent-0f26a90fcf3a69c04ddf31b6fe4868242d5679fc.tar.gz
current-0f26a90fcf3a69c04ddf31b6fe4868242d5679fc.tar.xz
Tue Apr 13 19:35:40 UTC 202120210413193540
ap/tmux-3.2-x86_64-1.txz: Upgraded. l/imagemagick-7.0.11_7-x86_64-1.txz: Upgraded. l/librsvg-2.50.4-x86_64-1.txz: Upgraded. n/cifs-utils-6.13-x86_64-1.txz: Upgraded. n/snownews-1.7-x86_64-1.txz: Upgraded. x/xorg-server-1.20.11-x86_64-1.txz: Upgraded. Insufficient checks on the lengths of the XInput extension ChangeFeedbackControl request can lead to out of bounds memory accesses in the X server. These issues can lead to privilege escalation for authorized clients on systems where the X server is running privileged. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472 (* Security fix *) x/xorg-server-xephyr-1.20.11-x86_64-1.txz: Upgraded. x/xorg-server-xnest-1.20.11-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-1.20.11-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-1.20.11-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/l/librsvg')
-rwxr-xr-xsource/l/librsvg/librsvg.SlackBuild2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/l/librsvg/librsvg.SlackBuild b/source/l/librsvg/librsvg.SlackBuild
index 8047c49f9..ab9ab4fb6 100755
--- a/source/l/librsvg/librsvg.SlackBuild
+++ b/source/l/librsvg/librsvg.SlackBuild
@@ -23,7 +23,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=librsvg
VERSION=${VERSION:-$(echo librsvg-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-2}
+BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then