summaryrefslogtreecommitdiffstats
path: root/source/x
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-02-01 04:37:04 +0000
committer Eric Hameleers <alien@slackware.com>2022-02-01 08:59:52 +0100
commitbd42aca52dc7532946a93fb3354a8454c4adfe94 (patch)
tree2314fe66b3c943fab158a4a4d9d55f1d012cee39 /source/x
parent84f05e024aee5a7b537c367e56755b48d34f629b (diff)
downloadcurrent-bd42aca52dc7532946a93fb3354a8454c4adfe94.tar.gz
current-bd42aca52dc7532946a93fb3354a8454c4adfe94.tar.xz
Tue Feb 1 04:37:04 UTC 202220220201043704
The sepulchral voice intones, "The cave is now closed." kde/falkon-3.2.0-x86_64-1.txz: Upgraded. kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt. [PATCH] only start programs in user's path. [PATCH] only execute diff in path. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853 (* Security fix *) l/libcanberra-0.30-x86_64-9.txz: Rebuilt. Fix a bug crashing some applications in Wayland desktops. Thanks to 01micko. n/samba-4.15.5-x86_64-1.txz: Upgraded. This is a security release in order to address the following defects: UNIX extensions in SMB1 disclose whether the outside target of a symlink exists. Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit. Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity. For more information, see: https://www.samba.org/samba/security/CVE-2021-44141.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141 https://www.samba.org/samba/security/CVE-2021-44142.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://www.samba.org/samba/security/CVE-2022-0336.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 (* Security fix *) x/xterm-370-x86_64-7.txz: Rebuilt. Rebuilt with --disable-sixel-graphics to fix a buffer overflow. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130 (* Security fix *) testing/source/linux-5.16.4-configs/*: Added. Sample config files to build 5.16.4 Linux kernels.
Diffstat (limited to 'source/x')
-rwxr-xr-xsource/x/xterm/xterm.SlackBuild8
1 files changed, 6 insertions, 2 deletions
diff --git a/source/x/xterm/xterm.SlackBuild b/source/x/xterm/xterm.SlackBuild
index 0fb93661f..36f2bb3f9 100755
--- a/source/x/xterm/xterm.SlackBuild
+++ b/source/x/xterm/xterm.SlackBuild
@@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=xterm
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-6}
+BUILD=${BUILD:-7}
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
@@ -97,12 +97,16 @@ CFLAGS="$SLKCFLAGS" \
--enable-88-color \
--enable-256-color \
--enable-regis-graphics \
- --enable-sixel-graphics \
+ --disable-sixel-graphics \
--with-icon-theme=hicolor \
--with-icondir=/usr/share/icons \
--with-pixmapdir=/usr/share/pixmaps \
--build=$ARCH-slackware-linux || exit 1
+# Disabled due to currently unpatched buffer overflow. Besides, I'm not sure
+# how useful this really is in the first place.
+# --enable-sixel-graphics
+
# Build and install:
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1