summaryrefslogtreecommitdiffstats
path: root/source/n/procmail/procmail_3.22-5.diff (follow)
Commit message (Expand)AuthorAgeFilesLines
* Tue Apr 5 19:16:30 UTC 2022...a/hwdata-0.358-noarch-1.txz: Upgraded. ap/cups-filters-1.28.14-x86_64-1.txz: Upgraded. ap/ghostscript-9.56.1-x86_64-1.txz: Upgraded. d/mercurial-6.1.1-x86_64-1.txz: Upgraded. e/emacs-28.1-x86_64-1.txz: Upgraded. l/libqalculate-4.1.1-x86_64-1.txz: Upgraded. l/netpbm-10.98.00-x86_64-1.txz: Upgraded. n/ethtool-5.17-x86_64-1.txz: Upgraded. n/procmail-3.24-x86_64-1.txz: Upgraded. x/appres-1.0.6-x86_64-1.txz: Upgraded. x/editres-1.0.8-x86_64-1.txz: Upgraded. x/iceauth-1.0.9-x86_64-1.txz: Upgraded. x/listres-1.0.5-x86_64-1.txz: Upgraded. x/mkcomposecache-1.2.2-x86_64-1.txz: Upgraded. x/mkfontscale-1.2.2-x86_64-1.txz: Upgraded. x/setxkbmap-1.3.3-x86_64-1.txz: Upgraded. x/twm-1.0.12-x86_64-1.txz: Upgraded. x/xcalc-1.1.1-x86_64-1.txz: Upgraded. x/xclock-1.1.0-x86_64-1.txz: Upgraded. x/xedit-1.2.3-x86_64-1.txz: Upgraded. x/xload-1.1.4-x86_64-1.txz: Upgraded. x/xlsfonts-1.0.7-x86_64-1.txz: Upgraded. x/xorg-docs-1.7.2-noarch-1.txz: Upgraded. x/xorg-sgml-doctools-1.12-x86_64-1.txz: Upgraded. x/xsm-1.0.5-x86_64-1.txz: Upgraded. xap/mozilla-firefox-99.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/99.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-13/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28288 (* Security fix *) 20220405191630 Patrick J Volkerding2022-04-061-1026/+0
* Slackware 13.0...Wed Aug 26 10:00:38 CDT 2009 Slackware 13.0 x86_64 is released as stable! Thanks to everyone who helped make this release possible -- see the RELEASE_NOTES for the credits. The ISOs are off to the replicator. This time it will be a 6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD. We're taking pre-orders now at store.slackware.com. Please consider picking up a copy to help support the project. Once again, thanks to the entire Slackware community for all the help testing and fixing things and offering suggestions during this development cycle. As always, have fun and enjoy! -P. slackware-13.0 Patrick J Volkerding2018-05-311-0/+1026