summaryrefslogtreecommitdiff
path: root/source/xap
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2021-08-31 20:58:13 +0000
committerEric Hameleers <alien@slackware.com>2021-09-01 08:59:56 +0200
commit3136d6fa091697dc59f2dac8c5f7b98420264aee (patch)
tree476cfbfa48b473c746459e8df72cf5241581a63c /source/xap
parent85819314a0b98b13fa4ab4e39cceb098a1121b0f (diff)
downloadcurrent-3136d6fa091697dc59f2dac8c5f7b98420264aee.tar.gz
Tue Aug 31 20:58:13 UTC 202120210831205813
a/etc-15.0-x86_64-16.txz: Rebuilt. Added dhcpcd:dhcpcd (68:68) user and group. Thanks to Paul Blazejowski. a/kernel-firmware-20210830_2e271f2-noarch-1.txz: Upgraded. a/ntfs-3g-2021.8.22-x86_64-1.txz: Upgraded. Shared library .so-version bump. Fixed vulnerabilities that may allow an attacker using a maliciously crafted NTFS-formatted image file or external storage to potentially execute arbitrary privileged code. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263 (* Security fix *) d/mercurial-5.9.1-x86_64-1.txz: Upgraded. d/python3-3.9.7-x86_64-1.txz: Upgraded. kde/bluedevil-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-grub-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.22.5-x86_64-1.txz: Upgraded. kde/drkonqi-5.22.5-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.22.5-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.22.5-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.22.5-x86_64-1.txz: Upgraded. kde/kdecoration-5.22.5-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.22.5-x86_64-1.txz: Upgraded. kde/kgamma5-5.22.5-x86_64-1.txz: Upgraded. kde/khotkeys-5.22.5-x86_64-1.txz: Upgraded. kde/kinfocenter-5.22.5-x86_64-1.txz: Upgraded. kde/kmenuedit-5.22.5-x86_64-1.txz: Upgraded. kde/kscreen-5.22.5-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.22.5-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.22.5-x86_64-1.txz: Upgraded. kde/ksystemstats-5.22.5-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-server-5.22.5-x86_64-1.txz: Upgraded. kde/kwin-5.22.5-x86_64-1.txz: Upgraded. kde/kwrited-5.22.5-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.22.5-x86_64-1.txz: Upgraded. kde/libkscreen-5.22.5-x86_64-1.txz: Upgraded. kde/libksysguard-5.22.5-x86_64-1.txz: Upgraded. kde/milou-5.22.5-x86_64-1.txz: Upgraded. kde/oxygen-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-disks-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-nm-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-pa-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-vault-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.22.5-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.22.5-x86_64-1.txz: Upgraded. kde/powerdevil-5.22.5-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.22.5-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.22.5-x86_64-1.txz: Upgraded. kde/systemsettings-5.22.5-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.22.5-x86_64-1.txz: Upgraded. l/mozilla-nss-3.69.1-x86_64-1.txz: Upgraded. xap/xlockmore-5.67-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/xap')
-rwxr-xr-xsource/xap/xlockmore/xlockmore.SlackBuild2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/xap/xlockmore/xlockmore.SlackBuild b/source/xap/xlockmore/xlockmore.SlackBuild
index 55fe47a4..25322d6c 100755
--- a/source/xap/xlockmore/xlockmore.SlackBuild
+++ b/source/xap/xlockmore/xlockmore.SlackBuild
@@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=xlockmore
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.xz | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-3}
+BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then