Slackware ChangeLogs
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
Stable ChangeLog for x86 (32-bit)
Wed Dec 4 22:24:22 UTC 2024
patches/packages/python3-3.9.21-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       gh-126623: Upgraded libexpat to 2.6.4 to fix CVE-2024-50602.
       gh-122792: Changed IPv4-mapped ipaddress.IPv6Address to consistently use the
       mapped IPv4 address value for deciding properties. Properties which have
       their behavior fixed are is_multicast, is_reserved, is_link_local, is_global,
       and is_unspecified.
       gh-124651: Properly quote template strings in venv activation scripts.
       gh-103848: Added checks to ensure that [ bracketed ] hosts found by
       urllib.parse.urlsplit() are of IPv6 or IPvFuture format.
       gh-95588: Clarified the conflicting advice given in the ast documentation
       about ast.literal_eval() being safe for use on untrusted input while at the
       same time warning that it can crash the process. The latter statement is true
       and is deemed unfixable without a large amount of work unsuitable for a
       bugfix. So we keep the warning and no longer claim that literal_eval is safe.
       For more information, see:
       https://pythoninsider.blogspot.com/2024/12/python-3131-3128-31111-31016-and-3921.html
       https://www.cve.org/CVERecord?id=CVE-2024-50602
       (* Security fix *)
+--------------------------+
Tue Dec 3 22:37:55 UTC 2024
extra/llvm-19.1.5-i686-1_slack15.0.txz: Upgraded.
patches/packages/mozilla-thunderbird-128.5.1esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.5.1esr/releasenotes/
+--------------------------+
Sat Nov 30 20:51:05 UTC 2024
patches/packages/mozilla-firefox-128.5.1esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/128.5.1/releasenotes/
+--------------------------+
Tue Nov 26 22:05:37 UTC 2024
patches/packages/mozilla-firefox-128.5.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/128.5.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-64
       https://www.cve.org/CVERecord?id=CVE-2024-11691
       https://www.cve.org/CVERecord?id=CVE-2024-11692
       https://www.cve.org/CVERecord?id=CVE-2024-11693
       https://www.cve.org/CVERecord?id=CVE-2024-11694
       https://www.cve.org/CVERecord?id=CVE-2024-11695
       https://www.cve.org/CVERecord?id=CVE-2024-11696
       https://www.cve.org/CVERecord?id=CVE-2024-11697
       https://www.cve.org/CVERecord?id=CVE-2024-11698
       https://www.cve.org/CVERecord?id=CVE-2024-11699
       (* Security fix *)
patches/packages/mozilla-thunderbird-128.5.0esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.5.0esr/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/
       https://www.cve.org/CVERecord?id=CVE-2024-11691
       https://www.cve.org/CVERecord?id=CVE-2024-11692
       https://www.cve.org/CVERecord?id=CVE-2024-11693
       https://www.cve.org/CVERecord?id=CVE-2024-11694
       https://www.cve.org/CVERecord?id=CVE-2024-11695
       https://www.cve.org/CVERecord?id=CVE-2024-11696
       https://www.cve.org/CVERecord?id=CVE-2024-11697
       https://www.cve.org/CVERecord?id=CVE-2024-11698
       https://www.cve.org/CVERecord?id=CVE-2024-11699
       (* Security fix *)
+--------------------------+
Fri Nov 22 22:08:18 UTC 2024
extra/php81/php81-8.1.31-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       LDAP: Fixed bug GHSA-g665-fm4p-vhff (OOB access in ldap_escape).
       (CVE-2024-8932)
       MySQLnd: Fixed bug GHSA-h35g-vwh6-m678 (Leak partial content of the heap
       through heap buffer over-read). (CVE-2024-8929)
       PDO DBLIB: Fixed bug GHSA-5hqh-c84r-qjcv (Integer overflow in the dblib
       quoter causing OOB writes). (CVE-2024-11236)
       PDO Firebird: Fixed bug GHSA-5hqh-c84r-qjcv (Integer overflow in the
       firebird quoter causing OOB writes). (CVE-2024-11236)
       Streams: Fixed bug GHSA-c5f2-jwm7-mmq2 (Configuring a proxy in a stream
       context might allow for CRLF injection in URIs). (CVE-2024-11234)
       Fixed bug GHSA-r977-prxv-hc43 (Single byte overread with
       convert.quoted-printable-decode filter). (CVE-2024-11233)
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.31
       https://www.cve.org/CVERecord?id=CVE-2024-8932
       https://www.cve.org/CVERecord?id=CVE-2024-8929
       https://www.cve.org/CVERecord?id=CVE-2024-11236
       https://www.cve.org/CVERecord?id=CVE-2024-11234
       https://www.cve.org/CVERecord?id=CVE-2024-11233
       (* Security fix *)
+--------------------------+
Wed Nov 20 22:05:15 UTC 2024
patches/packages/ca-certificates-20241120-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/mozilla-thunderbird-128.4.4esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.4.4esr/releasenotes/
+--------------------------+
Tue Nov 19 22:26:05 UTC 2024
extra/llvm-19.1.4-i686-1_slack15.0.txz: Upgraded.
patches/packages/pam-1.6.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes a regression in pam-1.6.0. When password aging is disabled,
       this warning would occur at login:
       "Warning: your password will expire in 0 days."
       Thanks to Jonathan Woithe for the bug report.
+--------------------------+
Mon Nov 18 22:26:36 UTC 2024
patches/packages/dovecot-2.3.21.1-i586-2_slack15.0.txz: Rebuilt.
       This update adds support for tcp_wrappers:
       Build with option --with-libwrap. Patch configure to add -lnsl to -lwrap.
       Thanks to Jonathan Woithe.
+--------------------------+
Wed Nov 13 20:22:00 UTC 2024
patches/packages/sudo-1.9.16p1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Nov 12 20:26:19 UTC 2024
patches/packages/mozilla-thunderbird-128.4.3esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.4.3esr/releasenotes/
       (* Security fix *)
+--------------------------+
Mon Nov 11 20:56:27 UTC 2024
patches/packages/wget-1.25.0-i586-1_slack15.0.txz: Upgraded.
       [Breaking change] Drop support for shorthand FTP URLs (CVE-2024-10524)
       [Breaking change] Switch to continuous reading from stdin pipes
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-10524
       (* Security fix *)
+--------------------------+
Thu Nov 7 21:46:13 UTC 2024
patches/packages/curl-8.11.0-i586-2_slack15.0.txz: Rebuilt.
       Adjust libcurl.pc to remove ldap from Requires.private.
       This fixes building PHP. Thanks to Thom1b.
patches/packages/expat-2.6.4-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Fix crash within function XML_ResumeParser from a NULL pointer dereference
       by disallowing function XML_StopParser to (stop or) suspend an unstarted
       parser. A new error code XML_ERROR_NOT_STARTED was introduced to properly
       communicate this situation.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-50602
       (* Security fix *)
patches/packages/mozilla-thunderbird-128.4.2esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.4.2esr/releasenotes/
+--------------------------+
Wed Nov 6 20:54:05 UTC 2024
patches/packages/curl-8.11.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Nov 5 19:22:31 UTC 2024
patches/packages/mozilla-thunderbird-128.4.1esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.4.1/releasenotes/
+--------------------------+
Mon Nov 4 19:08:43 UTC 2024
patches/packages/dhcpcd-9.5.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release, primarily to address the broken --dumplease option.
       Thanks to slackwhere.
patches/packages/mariadb-10.5.27-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://mariadb.com/kb/en/mariadb-10-5-27-release-notes/
+--------------------------+
Wed Oct 30 21:03:27 UTC 2024
extra/llvm-19.1.3-i686-1_slack15.0.txz: Upgraded.
       Shared library .so-version bump.
       If you are upgrading from a previous LLVM, you might also need llvm13-compat
       and/or llvm17-compat. We'll be using this for newer Mozilla things.
extra/llvm17-compat-17.0.6-i586-1_slack15.0.txz: Added.
       This is to support any locally compiled software that was linked against
       libLLVM-17.so from the llvm-17.0.6 that was previously in /extra.
extra/rust-bindgen-0.69.4-i686-1_slack15.0.txz: Added.
extra/rust-for-mozilla/rust-1.82.0-i686-1_slack15.0.txz: Upgraded.
extra/tigervnc/tigervnc-1.12.0-i586-7_slack15.0.txz: Rebuilt.
       Recompiled against xorg-server-1.20.14, including a patch for a
       security issue:
       By providing a modified bitmap, a heap-based buffer overflow may occur.
       This may lead to local privilege escalation if the server is run as root
       or remote code execution (e.g. x11 over ssh).
       This vulnerability was discovered by:
       Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-October/003545.html
       https://www.cve.org/CVERecord?id=CVE-2024-9632
       (* Security fix *)
patches/packages/mozilla-firefox-128.4.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/128.4.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-56/
       https://www.cve.org/CVERecord?id=CVE-2024-10458
       https://www.cve.org/CVERecord?id=CVE-2024-10459
       https://www.cve.org/CVERecord?id=CVE-2024-10460
       https://www.cve.org/CVERecord?id=CVE-2024-10461
       https://www.cve.org/CVERecord?id=CVE-2024-10462
       https://www.cve.org/CVERecord?id=CVE-2024-10463
       https://www.cve.org/CVERecord?id=CVE-2024-10464
       https://www.cve.org/CVERecord?id=CVE-2024-10465
       https://www.cve.org/CVERecord?id=CVE-2024-10466
       https://www.cve.org/CVERecord?id=CVE-2024-10467
       (* Security fix *)
patches/packages/mozilla-thunderbird-128.4.0esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/128.4.0esr/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/
       https://www.cve.org/CVERecord?id=CVE-2024-10458
       https://www.cve.org/CVERecord?id=CVE-2024-10459
       https://www.cve.org/CVERecord?id=CVE-2024-10460
       https://www.cve.org/CVERecord?id=CVE-2024-10461
       https://www.cve.org/CVERecord?id=CVE-2024-10462
       https://www.cve.org/CVERecord?id=CVE-2024-10463
       https://www.cve.org/CVERecord?id=CVE-2024-10464
       https://www.cve.org/CVERecord?id=CVE-2024-10465
       https://www.cve.org/CVERecord?id=CVE-2024-10466
       https://www.cve.org/CVERecord?id=CVE-2024-10467
       (* Security fix *)
patches/packages/xorg-server-1.20.14-i586-14_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       By providing a modified bitmap, a heap-based buffer overflow may occur.
       This may lead to local privilege escalation if the server is run as root
       or remote code execution (e.g. x11 over ssh).
       This vulnerability was discovered by:
       Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-October/003545.html
       https://www.cve.org/CVERecord?id=CVE-2024-9632
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-14_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-14_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-14_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-12_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       By providing a modified bitmap, a heap-based buffer overflow may occur.
       This may lead to local privilege escalation if the server is run as root
       or remote code execution (e.g. x11 over ssh).
       This vulnerability was discovered by:
       Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-October/003545.html
       https://www.cve.org/CVERecord?id=CVE-2024-9632
       (* Security fix *)
+--------------------------+
Wed Oct 23 19:39:39 UTC 2024
extra/php81/php81-8.1.30-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Bypass of CVE-2024-4577, Parameter Injection Vulnerability.
       cgi.force_redirect configuration is bypassable due to the environment
       variable collision.
       Logs from childrens may be altered.
       Erroneous parsing of multipart form data.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.30
       https://www.cve.org/CVERecord?id=CVE-2024-8926
       https://www.cve.org/CVERecord?id=CVE-2024-8927
       https://www.cve.org/CVERecord?id=CVE-2024-9026
       https://www.cve.org/CVERecord?id=CVE-2024-8925
       (* Security fix *)
+--------------------------+
Mon Oct 21 21:23:46 UTC 2024
patches/packages/openssl-1.1.1zb-i586-1_slack15.0.txz: Upgraded.
       Apply patch to fix a security issue:
       Harden BN_GF2m_poly2arr against misuse.
       This CVE was fixed by the 1.1.1zb release that is only available to
       subscribers to OpenSSL's premium extended support. The patch was prepared
       by backporting from the OpenSSL-3.0 repo. The reported version number has
       been updated so that vulnerability scanners calm down.
       Thanks to Ken Zalewski for the patch!
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-9143
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1zb-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Sun Oct 20 23:42:23 UTC 2024
testing/packages/rust-1.82.0-i686-1_slack15.0.txz: Upgraded.
+--------------------------+
Fri Oct 18 22:51:09 UTC 2024
testing/packages/llvm-19.1.2-i686-1_slack15.0.txz: Upgraded.
       Shared library .so-version bump.
       Chromium requires either a patched LLVM18, or LLVM19, so we're upgrading.
       Thanks to alienBOB.
+--------------------------+
Wed Oct 16 19:11:30 UTC 2024
patches/packages/libssh2-1.11.1-i586-1_slack15.0.txz: Upgraded.
       src: add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack."
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-48795
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.16.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.16.1esr/releasenotes/
       (* Security fix *)
+--------------------------+
Sun Oct 13 19:49:05 UTC 2024
patches/packages/libarchive-3.7.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes bug and the following security issues:
       gzip: prevent a hang when processing a malformed gzip inside a gzip.
       tar: don't crash on truncated tar archives.
       tar: fix two leaks in tar header parsing.
       (* Security fix *)
patches/packages/openssh-9.9p1-i586-1_slack15.0.txz: Upgraded.
       This update is primarily to address a regression that prevents using
       inetd or xinetd with sshd. Thanks to a_biardi for the bug report.
       Future deprecation notice: OpenSSH plans to remove support for the DSA
       signature algorithm in early 2025. For now, this package retains DSA
       support, but plan accordingly.
+--------------------------+
Sat Oct 12 19:16:04 UTC 2024
testing/packages/mozilla-firefox-128.3.1esr-i686-1_slack15.0.txz: Added.
testing/packages/mozilla-thunderbird-128.3.1esr-i686-1_slack15.0.txz: Added.
patches/packages/perl-5.34.0-i586-3_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       Upgraded: DBI-1.645, URI-5.30, XML-Parser-2.47, Authen-SASL-2.1700,
       IO-Socket-SSL-2.089, Net-SSLeay-1.94, libnet-3.15, Path-Tiny-0.146,
       Template-Toolkit-3.102, Moo-2.005005, Sub-Quote-2.006008.
       Added: Role-Tiny-2.002004. (Needed by Moo, thanks to Andypoo)
+--------------------------+
Thu Oct 10 22:42:17 UTC 2024
patches/packages/mozilla-thunderbird-115.16.0esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.16.0esr/releasenotes/
       (* Security fix *)
+--------------------------+
Wed Oct 9 21:09:16 UTC 2024
patches/packages/mozilla-firefox-115.16.1esr-i686-1_slack15.0.txz: Upgraded.
       This update contains a critical security fix:
       Use-after-free in Animation timeline.
       "An attacker was able to achieve code execution in the content process by
       exploiting a use-after-free in Animation timelines. We have had reports of
       this vulnerability being exploited in the wild."
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.16.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-51/
       https://www.cve.org/CVERecord?id=CVE-2024-9680
       (* Security fix *)
+--------------------------+
Tue Oct 1 18:01:38 UTC 2024
Several ELF objects were found to have rpaths pointing into /tmp, a world
writable directory. This could have allowed a local attacker to launch denial
of service attacks or execute arbitrary code when the affected binaries are
run by placing crafted ELF objects in the /tmp rpath location. All rpaths with
an embedded /tmp path have been scrubbed from the binaries, and makepkg has
gained a lint feature to detect these so that they won't creep back in.
extra/llvm-17.0.6-i586-2_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/cryfs-0.10.3-i586-5_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/cups-filters-1.28.17-i586-2_slack15.0.txz: Rebuilt.
       Mitigate security issue that could lead to a denial of service or
       the execution of arbitrary code.
       Rebuilt with --with-browseremoteprotocols=none to disable incoming
       connections, since this daemon has been shown to be insecure. If you
       actually use cups-browsed, be sure to install the new
       /etc/cups/cups-browsed.conf.new containing this line:
       BrowseRemoteProtocols none
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-47176
       (* Security fix *)
patches/packages/espeak-ng-1.50-i586-4_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/libvncserver-0.9.13-i586-4_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/marisa-0.2.6-i586-5_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/mlt-7.4.0-i586-2_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/mozilla-firefox-115.16.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.16.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-48
       https://www.cve.org/CVERecord?id=CVE-2024-9392
       https://www.cve.org/CVERecord?id=CVE-2024-9393
       https://www.cve.org/CVERecord?id=CVE-2024-9394
       https://www.cve.org/CVERecord?id=CVE-2024-9401
       (* Security fix *)
patches/packages/openobex-1.7.2-i586-6_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
patches/packages/pkgtools-15.0-noarch-44_slack15.0.txz: Rebuilt.
       makepkg: when looking for ELF objects with --remove-rpaths or
       --remove-tmp-rpaths, avoid false hits on files containing 'ELF' as part
       of the directory or filename.
       Also warn about /tmp rpaths after the package is built.
patches/packages/spirv-llvm-translator-13.0.0-i586-2_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
testing/packages/llvm-18.1.8-i686-2_slack15.0.txz: Rebuilt.
       Remove rpaths from binaries.
       (* Security fix *)
+--------------------------+
Fri Sep 27 21:10:23 UTC 2024
patches/packages/pkgtools-15.0-noarch-43_slack15.0.txz: Rebuilt.
       This update adds new makepkg options and fixes a bug:
       makepkg: added options --remove-rpaths, --remove-tmp-rpaths.
       Thanks to Petri Kaukasoina for code examples.
       makepkg: chown root:root, not root.root.
+--------------------------+
Thu Sep 26 18:28:55 UTC 2024
patches/packages/boost-1.78.0-i586-3_slack15.0.txz: Rebuilt.
       Get rid of hardcoded temporary paths in the cmake files.
       Since these paths point to a location that an unprivileged user could
       create and populate with files that could be picked up during a build,
       it's possible this bug could be used for malicious purposes.
       Thanks to jmacloue.
       (* Security fix *)
+--------------------------+
Wed Sep 25 18:40:09 UTC 2024
patches/packages/git-2.46.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       Some projects are requiring newer git features than git-2.39.4 provides,
       so have an upgrade. Thanks to lancsuk for the suggestion.
+--------------------------+
Tue Sep 24 18:42:58 UTC 2024
patches/packages/netatalk-3.2.10-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Sep 23 20:01:35 UTC 2024
patches/packages/libarchive-3.7.6-i586-1_slack15.0.txz: Upgraded.
       This release fixes a tar regression introduced in libarchive 3.7.5.
+--------------------------+
Fri Sep 20 19:25:40 UTC 2024
patches/packages/bind-9.18.30-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Sep 18 21:23:19 UTC 2024
patches/packages/curl-8.10.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Sep 16 19:58:49 UTC 2024
patches/packages/netatalk-3.2.9-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sat Sep 14 18:15:34 UTC 2024
patches/packages/libarchive-3.7.5-i586-1_slack15.0.txz: Upgraded.
       This update fixes the following security issues:
       fix multiple vulnerabilities identified by SAST (#2251, #2256)
       cpio: ignore out-of-range gid/uid/size/ino and harden AFIO parsing (#2258)
       lzop: prevent integer overflow (#2174)
       rar4: protect copy_from_lzss_window_to_unp() (#2172, CVE-2024-20696)
       rar4: fix CVE-2024-26256 (#2269)
       rar4: fix OOB in delta and audio filter (#2148, #2149)
       rar4: fix out of boundary access with large files (#2179)
       rar4: add boundary checks to rgb filter (#2210)
       rar4: fix OOB access with unicode filenames (#2203)
       rar5: clear 'data ready' cache on window buffer reallocs (#2265)
       rpm: calculate huge header sizes correctly (#2158)
       unzip: unify EOF handling (#2175)
       util: fix out of boundary access in mktemp functions (#2160)
       uu: stop processing if lines are too long (#2168)
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-20696
       https://www.cve.org/CVERecord?id=CVE-2024-26256
       (* Security fix *)
+--------------------------+
Fri Sep 13 01:32:33 UTC 2024
patches/packages/libssh2-1.11.0-i586-1_slack15.0.txz: Upgraded.
       This update adds support for rsa-sha2-512 and rsa-sha2-256, which are needed
       to connect to servers that use a recent version of OpenSSH.
       Thanks to Jonathan Woithe.
+--------------------------+
Wed Sep 11 17:47:14 UTC 2024
patches/packages/curl-8.10.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Sep 9 17:27:00 UTC 2024
patches/packages/netatalk-3.2.8-i586-1_slack15.0.txz: Upgraded.
       Bump bundled WolfSSL library to stable version 5.7.2, GitHub #1433.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-1544
       https://www.cve.org/CVERecord?id=CVE-2024-5288
       https://www.cve.org/CVERecord?id=CVE-2024-5991
       https://www.cve.org/CVERecord?id=CVE-2024-5814
       (* Security fix *)
+--------------------------+
Mon Sep 9 00:53:17 UTC 2024
patches/packages/python3-3.9.20-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Bundled libexpat was updated to 2.6.3.
       Fix quadratic complexity in parsing "-quoted cookie values with backslashes
       by http.cookies.
       Fixed various false positives and false negatives in IPv4Address.is_private,
       IPv4Address.is_global, IPv6Address.is_private, IPv6Address.is_global.
       Fix urllib.parse.urlunparse() and urllib.parse.urlunsplit() for URIs with
       path starting with multiple slashes and no authority.
       Remove backtracking from tarfile header parsing for hdrcharset, PAX, and
       GNU sparse headers.
       email.utils.getaddresses() and email.utils.parseaddr() now return ('', '')
       2-tuples in more situations where invalid email addresses are encountered
       instead of potentially inaccurate values. Add optional strict parameter to
       these two functions: use strict=False to get the old behavior, accept
       malformed inputs. getattr(email.utils, 'supports_strict_parsing', False) can
       be used to check if the strict paramater is available.
       Sanitize names in zipfile.Path to avoid infinite loops (gh-122905) without
       breaking contents using legitimate characters.
       Email headers with embedded newlines are now quoted on output. The generator
       will now refuse to serialize (write) headers that are unsafely folded or
       delimited; see verify_generated_headers.
       For more information, see:
       https://pythoninsider.blogspot.com/2024/09/python-3130rc2-3126-31110-31015-3920.html
       https://www.cve.org/CVERecord?id=CVE-2024-28757
       https://www.cve.org/CVERecord?id=CVE-2024-45490
       https://www.cve.org/CVERecord?id=CVE-2024-45491
       https://www.cve.org/CVERecord?id=CVE-2024-45492
       https://www.cve.org/CVERecord?id=CVE-2024-7592
       https://www.cve.org/CVERecord?id=CVE-2024-4032
       https://www.cve.org/CVERecord?id=CVE-2015-2104
       https://www.cve.org/CVERecord?id=CVE-2024-6232
       https://www.cve.org/CVERecord?id=CVE-2023-27043
       https://www.cve.org/CVERecord?id=CVE-2024-8088
       https://www.cve.org/CVERecord?id=CVE-2024-6923
       (* Security fix *)
+--------------------------+
Sat Sep 7 18:16:12 UTC 2024
patches/packages/glibc-zoneinfo-2024b-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Fri Sep 6 19:22:57 UTC 2024
testing/packages/rust-1.81.0-i686-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Sep 5 22:14:23 UTC 2024
patches/packages/mozilla-thunderbird-115.15.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.15.0esr/releasenotes/
       (* Security fix *)
+--------------------------+
Wed Sep 4 23:37:27 UTC 2024
patches/packages/expat-2.6.3-i586-1_slack15.0.txz: Upgraded.
       This update addresses security issues with impact ranging from denial of
       service to potentially artitrary code execution.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-45490
       https://www.cve.org/CVERecord?id=CVE-2024-45491
       https://www.cve.org/CVERecord?id=CVE-2024-45492
       (* Security fix *)
+--------------------------+
Tue Sep 3 21:07:09 UTC 2024
patches/packages/mozilla-firefox-115.15.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.15.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-41/
       https://www.cve.org/CVERecord?id=CVE-2024-8381
       https://www.cve.org/CVERecord?id=CVE-2024-8382
       https://www.cve.org/CVERecord?id=CVE-2024-8383
       https://www.cve.org/CVERecord?id=CVE-2024-8384
       (* Security fix *)
patches/packages/seamonkey-2.53.19-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.19
       (* Security fix *)
+--------------------------+
Sat Aug 31 18:26:20 UTC 2024
patches/packages/libpcap-1.10.5-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Clean up sock_initaddress() and its callers to avoid double frees
       in some cases.
       Fix pcap_findalldevs_ex() not to crash if passed a file:// URL with a
       path to a directory that cannot be opened.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-7256
       https://www.cve.org/CVERecord?id=CVE-2024-8006
       (* Security fix *)
+--------------------------+
Fri Aug 30 17:52:19 UTC 2024
patches/packages/ca-certificates-20240830-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Tue Aug 27 19:24:48 UTC 2024
patches/packages/kcron-21.12.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       kcron: Invalid temporary file handling.
       Thanks to pbslxw for the heads-up.
       For more information, see:
       https://kde.org/info/security/advisory-20220216-1.txt
       https://www.cve.org/CVERecord?id=CVE-2022-24986
       (* Security fix *)
patches/packages/plasma-workspace-5.23.5-i586-4_slack15.0.txz: Rebuilt.
       This update patches a security issue:
       ksmserver: Unauthorized users can access session manager.
       Thanks to pbslxw for the heads-up.
       For more information, see:
       https://kde.org/info/security/advisory-20240531-1.txt
       https://www.cve.org/CVERecord?id=CVE-2024-36041
       (* Security fix *)
+--------------------------+
Thu Aug 22 19:10:18 UTC 2024
patches/packages/bind-9.18.29-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/ffmpeg-4.4.5-i586-1_slack15.0.txz: Upgraded.
       This update addresses several vulnerabilities in FFmpeg which could result
       in denial of service, or potentially the execution of arbitrary code if
       malformed files/streams are processed.
       Thanks to pbslxw for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-1475
       https://www.cve.org/CVERecord?id=CVE-2022-48434
       https://www.cve.org/CVERecord?id=CVE-2022-3109
       https://www.cve.org/CVERecord?id=CVE-2022-3341
       https://www.cve.org/CVERecord?id=CVE-2022-3964
       https://www.cve.org/CVERecord?id=CVE-2024-7055
       https://www.cve.org/CVERecord?id=CVE-2023-47342
       (* Security fix *)
+--------------------------+
Thu Aug 15 20:07:37 UTC 2024
patches/packages/libX11-1.8.10-i586-1_slack15.0.txz: Upgraded.
       This is a bug fix release, correcting an empty XKeysymDB file.
       Thanks to Jonathan Woithe for the bug report.
+--------------------------+
Wed Aug 14 19:36:01 UTC 2024
patches/packages/dovecot-2.3.21.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       A large number of address headers in email resulted in excessive CPU usage.
       Abnormally large email headers are now truncated or discarded, with a limit
       of 10MB on a single header and 50MB for all the headers of all the parts of
       an email.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-23184
       https://www.cve.org/CVERecord?id=CVE-2024-23185
       (* Security fix *)
+--------------------------+
Sun Aug 11 19:00:08 UTC 2024
These are needed to build Chromium. Thanks to alienBOB.
We'll probably move them to /extra once the Mozilla stuff needs it.
Please note that if upgrading to the new llvm, you'll need the llvm13-compat
package from /extra.
testing/packages/llvm-18.1.8-i686-1_slack15.0.txz: Added.
testing/packages/rust-1.80.1-i686-1_slack15.0.txz: Added.
testing/packages/rust-bindgen-0.69.4-i686-1_slack15.0.txz: Added.
+--------------------------+
Fri Aug 9 21:22:03 UTC 2024
patches/packages/mariadb-10.5.26-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://mariadb.com/kb/en/mariadb-10-5-26-release-notes/
+--------------------------+
Wed Aug 7 04:03:09 UTC 2024
patches/packages/curl-8.9.1-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       [PATCH] sigpipe: init the struct so that first apply ignores.
       Thanks to ponce.
patches/packages/mozilla-firefox-115.14.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.14.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-34/
       https://www.cve.org/CVERecord?id=CVE-2024-7519
       https://www.cve.org/CVERecord?id=CVE-2024-7521
       https://www.cve.org/CVERecord?id=CVE-2024-7522
       https://www.cve.org/CVERecord?id=CVE-2024-7524
       https://www.cve.org/CVERecord?id=CVE-2024-7525
       https://www.cve.org/CVERecord?id=CVE-2024-7526
       https://www.cve.org/CVERecord?id=CVE-2024-7527
       https://www.cve.org/CVERecord?id=CVE-2024-7529
       https://www.cve.org/CVERecord?id=CVE-2024-7531
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.14.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.14.0esr/releasenotes/
+--------------------------+
Mon Aug 5 21:58:24 UTC 2024
patches/packages/ksh93-1.0.10-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Jul 31 18:35:06 UTC 2024
patches/packages/curl-8.9.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       ASN.1 date parser overread.
       For more information, see:
       https://curl.se/docs/CVE-2024-7264.html
       https://www.cve.org/CVERecord?id=CVE-2024-7264
       (* Security fix *)
+--------------------------+
Thu Jul 25 02:39:18 UTC 2024
patches/packages/curl-8.9.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/htdig-3.2.0b6-i586-10_slack15.0.txz: Rebuilt.
       Patch XSS vulnerability. Thanks to jayjwa.
       Get this out of cgi-bin. Thanks to LuckyCyborg.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2007-6110
       (* Security fix *)
patches/packages/libxml2-2.11.9-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Fix XXE protection in downstream code.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-40896
       (* Security fix *)
+--------------------------+
Tue Jul 23 18:54:25 UTC 2024
patches/packages/bind-9.18.28-i586-1_slack15.0.txz: Upgraded.
       Please note that we have moved to the 9.18 branch, as 9.16 is EOL.
       This update fixes security issues:
       Remove SIG(0) support from named as a countermeasure for CVE-2024-1975.
       qctx-zversion was not being cleared when it should have been leading to
       an assertion failure if it needed to be reused.
       An excessively large number of rrtypes per owner can slow down database query
       processing, so a limit has been placed on the number of rrtypes that can be
       stored per owner (node) in a cache or zone database. This is configured with
       the new "max-rrtypes-per-name" option, and defaults to 100.
       Excessively large rdatasets can slow down database query processing, so a
       limit has been placed on the number of records that can be stored per
       rdataset in a cache or zone database. This is configured with the new
       "max-records-per-type" option, and defaults to 100.
       Malicious DNS client that sends many queries over TCP but never reads
       responses can cause server to respond slowly or not respond at all for other
       clients.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-1975
       https://www.cve.org/CVERecord?id=CVE-2024-4076
       https://www.cve.org/CVERecord?id=CVE-2024-1737
       https://www.cve.org/CVERecord?id=CVE-2024-0760
       (* Security fix *)
patches/packages/aaa_glibc-solibs-2.33-i586-7_slack15.0.txz: Rebuilt.
patches/packages/glibc-2.33-i586-7_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       nscd: Stack-based buffer overflow in netgroup cache.
       nscd: Null pointer crash after notfound response.
       nscd: netgroup cache may terminate daemon on memory allocation failure.
       nscd: netgroup cache assumes NSS callback uses in-buffer strings.
       These vulnerabilities were only present in the nscd binary.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-33599
       https://www.cve.org/CVERecord?id=CVE-2024-33600
       https://www.cve.org/CVERecord?id=CVE-2024-33601
       https://www.cve.org/CVERecord?id=CVE-2024-33602
       (* Security fix *)
patches/packages/glibc-i18n-2.33-i586-7_slack15.0.txz: Rebuilt.
patches/packages/glibc-profile-2.33-i586-7_slack15.0.txz: Rebuilt.
patches/packages/mozilla-thunderbird-115.13.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.13.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/
       https://www.cve.org/CVERecord?id=CVE-2024-6600
       https://www.cve.org/CVERecord?id=CVE-2024-6601
       https://www.cve.org/CVERecord?id=CVE-2024-6602
       https://www.cve.org/CVERecord?id=CVE-2024-6603
       https://www.cve.org/CVERecord?id=CVE-2024-6604
       (* Security fix *)
+--------------------------+
Thu Jul 18 20:01:18 UTC 2024
patches/packages/httpd-2.4.62-i586-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       The first CVE is for Windows, but the second one is an additional fix for
       the source code disclosure regression when using AddType.
       Users are recommended to upgrade to version 2.4.62 which fixes this issue.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.62
       https://www.cve.org/CVERecord?id=CVE-2024-40898
       https://www.cve.org/CVERecord?id=CVE-2024-40725
       (* Security fix *)
+--------------------------+
Wed Jul 17 19:29:24 UTC 2024
patches/packages/openssl-1.1.1za-i586-1_slack15.0.txz: Upgraded.
       Apply patches to fix CVEs that were fixed by the 1.1.1{x,y,za} releases that
       were only available to subscribers to OpenSSL's premium extended support.
       These patches were prepared by backporting commits from the OpenSSL-3.0 repo.
       The reported version number has been updated so that vulnerability scanners
       calm down. All of these issues were considered to be of low severity.
       Thanks to Ken Zalewski for the patches!
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-5678
       https://www.cve.org/CVERecord?id=CVE-2024-0727
       https://www.cve.org/CVERecord?id=CVE-2024-2511
       https://www.cve.org/CVERecord?id=CVE-2024-4741
       https://www.cve.org/CVERecord?id=CVE-2024-5535
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1za-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Tue Jul 16 18:30:34 UTC 2024
patches/packages/ntp-4.2.8p18-i586-3_slack15.0.txz: Rebuilt.
       This is a bugfix release to fix a regression in ntp-4.2.8p18:
       If the IPv6 link-local interface was not ready for binding on the first
       attempt, ntpd would segfault in update_interfaces().
       Thanks to Jonathan Woithe for the bug report and fix.
+--------------------------+
Sun Jul 14 18:22:30 UTC 2024
patches/packages/netatalk-3.2.3-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sat Jul 13 20:26:06 UTC 2024
patches/packages/mozilla-thunderbird-115.12.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.12.2/releasenotes/
+--------------------------+
Wed Jul 10 21:02:41 UTC 2024
patches/packages/xorg-server-1.20.14-i586-13_slack15.0.txz: Rebuilt.
       This is a bugfix update to fix X server crashes:
       [PATCH] render: Avoid possible double-free in ProcRenderAddGlyphs()
       Thanks to typbigoh and Petri Kaukasoina.
patches/packages/xorg-server-xephyr-1.20.14-i586-13_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-13_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-13_slack15.0.txz: Rebuilt.
+--------------------------+
Wed Jul 10 17:48:01 UTC 2024
patches/packages/mozilla-firefox-115.13.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.13.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-30/
       https://www.cve.org/CVERecord?id=CVE-2024-6600
       https://www.cve.org/CVERecord?id=CVE-2024-6601
       https://www.cve.org/CVERecord?id=CVE-2024-6602
       https://www.cve.org/CVERecord?id=CVE-2024-6603
       https://www.cve.org/CVERecord?id=CVE-2024-6604
       (* Security fix *)
+--------------------------+
Mon Jul 8 18:00:35 UTC 2024
patches/packages/netatalk-3.2.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/openssh-9.8p1-i586-3_slack15.0.txz: Rebuilt.
       As upstream refactors this into smaller binaries, we could easily run into
       another update that causes an sshd lockout if the listener process isn't
       restarted. So, let's try to prevent that. After the package is upgraded,
       we'll use "sshd -t" to make sure that we have a sane configuration, and if
       so then we'll restart the listener process automatically.
       If you don't like this idea, you may turn it off in /etc/default/sshd.
+--------------------------+
Wed Jul 3 22:27:28 UTC 2024
patches/packages/openssh-9.8p1-i586-2_slack15.0.txz: Rebuilt.
       rc.sshd: also shut down sshd-session processes with "stop" function.
       This shuts down connections cleanly instead of them having to time out.
       Thanks to Petri Kaukasoina.
+--------------------------+
Wed Jul 3 21:19:57 UTC 2024
patches/packages/httpd-2.4.61-i586-1_slack15.0.txz: Upgraded.
       This update contains the fix for the 2.4.60 regression, which has also
       been assigned a CVE. We fixed this already, but we'll make it official.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4
       https://www.cve.org/CVERecord?id=CVE-2024-39884
       (* Security fix *)
+--------------------------+
Wed Jul 3 18:48:48 UTC 2024
patches/packages/ca-certificates-20240703-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/netatalk-3.2.1-i586-1_slack15.0.txz: Upgraded.
       Shared library .so-version bump.
       Fixed security issues that could lead to a denial of service or the
       execution of arbitrary code.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-38439
       https://www.cve.org/CVERecord?id=CVE-2024-38440
       https://www.cve.org/CVERecord?id=CVE-2024-38441
       (* Security fix *)
+--------------------------+
Tue Jul 2 19:31:00 UTC 2024
patches/packages/httpd-2.4.60-i586-2_slack15.0.txz: Rebuilt.
       This update is to fix a regression and to note security issues that were not
       listed in the CHANGES file included with the source code.
       Fixed a regression where a config file using AddType rather than AddHandler
       could cause raw PHP files to be downloaded rather than processed.
       Thanks to Nobby6.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.60
       https://www.cve.org/CVERecord?id=CVE-2024-39573
       https://www.cve.org/CVERecord?id=CVE-2024-38477
       https://www.cve.org/CVERecord?id=CVE-2024-38476
       https://www.cve.org/CVERecord?id=CVE-2024-38475
       https://www.cve.org/CVERecord?id=CVE-2024-38474
       https://www.cve.org/CVERecord?id=CVE-2024-38473
       https://www.cve.org/CVERecord?id=CVE-2024-38472
       https://www.cve.org/CVERecord?id=CVE-2024-36387
       (* Security fix *)
patches/packages/ksh93-1.0.9-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Jul 1 20:12:46 UTC 2024
patches/packages/httpd-2.4.60-i586-1_slack15.0.txz: Upgraded.
       This is the latest release from the Apache HTTP Server 2.4.x stable branch.
patches/packages/openssh-9.8p1-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Fix race condition resulting in potential remote code execution.
       For more information, see:
       https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
       https://www.cve.org/CVERecord?id=CVE-2024-6387
       (* Security fix *)
+--------------------------+
Wed Jun 26 20:06:09 UTC 2024
patches/packages/bluez-5.71-i586-3_slack15.0.txz: Rebuilt.
       Fix a regression in bluez-5.71:
       [PATCH] audio: transport: Fix crash on A2DP suspend.
       Thanks to coltfire.
patches/packages/xcb-util-cursor-0.1.5-i586-1.txz: Upgraded.
       This is a bugfix release.
       Thanks to Lockywolf.
+--------------------------+
Sat Jun 22 20:05:28 UTC 2024
patches/packages/emacs-29.4-i586-1_slack15.0.txz: Upgraded.
       Emacs 29.4 is an emergency bugfix release intended to fix a
       security vulnerability:
       Arbitrary shell commands are no longer run when turning on Org mode.
       This is for security reasons, to avoid running malicious commands.
       (* Security fix *)
+--------------------------+
Tue Jun 18 21:05:48 UTC 2024
patches/packages/cups-2.4.10-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sun Jun 16 21:32:49 UTC 2024
patches/packages/linux-5.15.161/*: Upgraded.
       These updates fix regressions with the 5.15.160 packages.
       Hopefully we do not get any new ones. :-)
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
+--------------------------+
Sat Jun 15 20:51:59 UTC 2024
patches/packages/ca-certificates-20240615-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Wed Jun 12 21:12:05 UTC 2024
patches/packages/mozilla-thunderbird-115.11.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.11.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/
       https://www.cve.org/CVERecord?id=CVE-2024-4367
       https://www.cve.org/CVERecord?id=CVE-2024-4767
       https://www.cve.org/CVERecord?id=CVE-2024-4768
       https://www.cve.org/CVERecord?id=CVE-2024-4769
       https://www.cve.org/CVERecord?id=CVE-2024-4770
       https://www.cve.org/CVERecord?id=CVE-2024-4777
       (* Security fix *)
+--------------------------+
Tue Jun 11 21:09:01 UTC 2024
patches/packages/cups-2.4.9-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       When starting the cupsd server with a Listen configuration item pointing
       to a symbolic link, the cupsd process can be caused to perform an arbitrary
       chmod of the provided argument, providing world-writable access to the
       target.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-35235
       (* Security fix *)
patches/packages/mozilla-firefox-115.12.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.12.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-26/
       https://www.cve.org/CVERecord?id=CVE-2024-5702
       https://www.cve.org/CVERecord?id=CVE-2024-5688
       https://www.cve.org/CVERecord?id=CVE-2024-5690
       https://www.cve.org/CVERecord?id=CVE-2024-5691
       https://www.cve.org/CVERecord?id=CVE-2024-5692
       https://www.cve.org/CVERecord?id=CVE-2024-5693
       https://www.cve.org/CVERecord?id=CVE-2024-5696
       https://www.cve.org/CVERecord?id=CVE-2024-5700
       (* Security fix *)
+--------------------------+
Sat Jun 8 19:42:03 UTC 2024
patches/packages/kernel-firmware-20240606_90df68d-noarch-1.txz: Upgraded.
       Updated to the latest kernel firmware.
patches/packages/linux-5.15.160/*: Upgraded.
       These updates fix a regression with the first 5.15.160 packages:
       Subject: [PATCH] Revert "drm/amdgpu: init iommu after amdkfd device init"
       This reverts commit 56b522f4668167096a50c39446d6263c96219f5f.
       A user reported that this commit breaks the integrated gpu of his
       notebook, causing a black screen. He was able to bisect the problematic
       commit and verified that by reverting it the notebook works again.
       He also confirmed that kernel 6.8.1 also works on his device, so the
       upstream commit itself seems to be ok.
       An amdgpu developer (Alex Deucher) confirmed that this patch should
       have never been ported to 5.15 in the first place, so revert this
       commit from the 5.15 stable series.
       Thanks to fsLeg.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
+--------------------------+
Thu Jun 6 19:44:49 UTC 2024
extra/php81/php81-8.1.29-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Bypass of CVE-2012-1823, Argument Injection in PHP-CGI.
       Filter bypass in filter_var FILTER_VALIDATE_URL.
       Bypass of CVE-2024-1874.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.29
       https://www.cve.org/CVERecord?id=CVE-2024-4577
       https://www.cve.org/CVERecord?id=CVE-2024-5458
       https://www.cve.org/CVERecord?id=CVE-2024-5585
       (* Security fix *)
+--------------------------+
Wed Jun 5 19:06:36 UTC 2024
patches/packages/ca-certificates-20240604-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/kernel-firmware-20240604_22643bb-noarch-1.txz: Upgraded.
       Updated to the latest kernel firmware.
patches/packages/linux-5.15.160/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.147:
       https://www.cve.org/CVERecord?id=CVE-2023-52340
       https://www.cve.org/CVERecord?id=CVE-2023-6040
       https://www.cve.org/CVERecord?id=CVE-2024-0646
       Fixed in 5.15.148:
       https://www.cve.org/CVERecord?id=CVE-2023-46838
       https://www.cve.org/CVERecord?id=CVE-2023-52436
       https://www.cve.org/CVERecord?id=CVE-2023-52438
       https://www.cve.org/CVERecord?id=CVE-2023-52439
       https://www.cve.org/CVERecord?id=CVE-2023-52443
       https://www.cve.org/CVERecord?id=CVE-2023-52444
       https://www.cve.org/CVERecord?id=CVE-2023-52445
       https://www.cve.org/CVERecord?id=CVE-2023-52448
       https://www.cve.org/CVERecord?id=CVE-2023-52449
       https://www.cve.org/CVERecord?id=CVE-2023-52451
       https://www.cve.org/CVERecord?id=CVE-2023-52454
       https://www.cve.org/CVERecord?id=CVE-2023-52456
       https://www.cve.org/CVERecord?id=CVE-2023-52458
       https://www.cve.org/CVERecord?id=CVE-2023-52463
       https://www.cve.org/CVERecord?id=CVE-2023-52464
       https://www.cve.org/CVERecord?id=CVE-2023-52467
       https://www.cve.org/CVERecord?id=CVE-2023-52469
       https://www.cve.org/CVERecord?id=CVE-2023-52470
       https://www.cve.org/CVERecord?id=CVE-2023-52609
       https://www.cve.org/CVERecord?id=CVE-2023-52610
       https://www.cve.org/CVERecord?id=CVE-2023-52612
       https://www.cve.org/CVERecord?id=CVE-2023-6356
       https://www.cve.org/CVERecord?id=CVE-2023-6536
       https://www.cve.org/CVERecord?id=CVE-2023-6915
       https://www.cve.org/CVERecord?id=CVE-2024-1085
       https://www.cve.org/CVERecord?id=CVE-2024-24860
       https://www.cve.org/CVERecord?id=CVE-2024-26586
       https://www.cve.org/CVERecord?id=CVE-2024-26589
       https://www.cve.org/CVERecord?id=CVE-2024-26591
       https://www.cve.org/CVERecord?id=CVE-2024-26597
       https://www.cve.org/CVERecord?id=CVE-2024-26598
       https://www.cve.org/CVERecord?id=CVE-2024-26631
       https://www.cve.org/CVERecord?id=CVE-2024-26633
       Fixed in 5.15.149:
       https://www.cve.org/CVERecord?id=CVE-2023-52429
       https://www.cve.org/CVERecord?id=CVE-2023-52435
       https://www.cve.org/CVERecord?id=CVE-2023-52486
       https://www.cve.org/CVERecord?id=CVE-2023-52489
       https://www.cve.org/CVERecord?id=CVE-2023-52491
       https://www.cve.org/CVERecord?id=CVE-2023-52492
       https://www.cve.org/CVERecord?id=CVE-2023-52493
       https://www.cve.org/CVERecord?id=CVE-2023-52494
       https://www.cve.org/CVERecord?id=CVE-2023-52498
       https://www.cve.org/CVERecord?id=CVE-2023-52583
       https://www.cve.org/CVERecord?id=CVE-2023-52587
       https://www.cve.org/CVERecord?id=CVE-2023-52588
       https://www.cve.org/CVERecord?id=CVE-2023-52594
       https://www.cve.org/CVERecord?id=CVE-2023-52595
       https://www.cve.org/CVERecord?id=CVE-2023-52597
       https://www.cve.org/CVERecord?id=CVE-2023-52598
       https://www.cve.org/CVERecord?id=CVE-2023-52599
       https://www.cve.org/CVERecord?id=CVE-2023-52600
       https://www.cve.org/CVERecord?id=CVE-2023-52601
       https://www.cve.org/CVERecord?id=CVE-2023-52602
       https://www.cve.org/CVERecord?id=CVE-2023-52603
       https://www.cve.org/CVERecord?id=CVE-2023-52604
       https://www.cve.org/CVERecord?id=CVE-2023-52606
       https://www.cve.org/CVERecord?id=CVE-2023-52607
       https://www.cve.org/CVERecord?id=CVE-2023-52608
       https://www.cve.org/CVERecord?id=CVE-2023-52614
       https://www.cve.org/CVERecord?id=CVE-2023-52615
       https://www.cve.org/CVERecord?id=CVE-2023-52616
       https://www.cve.org/CVERecord?id=CVE-2023-52617
       https://www.cve.org/CVERecord?id=CVE-2023-52618
       https://www.cve.org/CVERecord?id=CVE-2023-52619
       https://www.cve.org/CVERecord?id=CVE-2023-52622
       https://www.cve.org/CVERecord?id=CVE-2023-52623
       https://www.cve.org/CVERecord?id=CVE-2023-52627
       https://www.cve.org/CVERecord?id=CVE-2023-52630
       https://www.cve.org/CVERecord?id=CVE-2023-52631
       https://www.cve.org/CVERecord?id=CVE-2023-52633
       https://www.cve.org/CVERecord?id=CVE-2023-52635
       https://www.cve.org/CVERecord?id=CVE-2023-52637
       https://www.cve.org/CVERecord?id=CVE-2023-52638
       https://www.cve.org/CVERecord?id=CVE-2024-0340
       https://www.cve.org/CVERecord?id=CVE-2024-1086
       https://www.cve.org/CVERecord?id=CVE-2024-1151
       https://www.cve.org/CVERecord?id=CVE-2024-23849
       https://www.cve.org/CVERecord?id=CVE-2024-23850
       https://www.cve.org/CVERecord?id=CVE-2024-23851
       https://www.cve.org/CVERecord?id=CVE-2024-26592
       https://www.cve.org/CVERecord?id=CVE-2024-26593
       https://www.cve.org/CVERecord?id=CVE-2024-26594
       https://www.cve.org/CVERecord?id=CVE-2024-26600
       https://www.cve.org/CVERecord?id=CVE-2024-26602
       https://www.cve.org/CVERecord?id=CVE-2024-26606
       https://www.cve.org/CVERecord?id=CVE-2024-26608
       https://www.cve.org/CVERecord?id=CVE-2024-26610
       https://www.cve.org/CVERecord?id=CVE-2024-26614
       https://www.cve.org/CVERecord?id=CVE-2024-26615
       https://www.cve.org/CVERecord?id=CVE-2024-26625
       https://www.cve.org/CVERecord?id=CVE-2024-26627
       https://www.cve.org/CVERecord?id=CVE-2024-26635
       https://www.cve.org/CVERecord?id=CVE-2024-26636
       https://www.cve.org/CVERecord?id=CVE-2024-26640
       https://www.cve.org/CVERecord?id=CVE-2024-26641
       https://www.cve.org/CVERecord?id=CVE-2024-26644
       https://www.cve.org/CVERecord?id=CVE-2024-26645
       https://www.cve.org/CVERecord?id=CVE-2024-26660
       https://www.cve.org/CVERecord?id=CVE-2024-26663
       https://www.cve.org/CVERecord?id=CVE-2024-26664
       https://www.cve.org/CVERecord?id=CVE-2024-26665
       https://www.cve.org/CVERecord?id=CVE-2024-26668
       https://www.cve.org/CVERecord?id=CVE-2024-26671
       https://www.cve.org/CVERecord?id=CVE-2024-26673
       https://www.cve.org/CVERecord?id=CVE-2024-26675
       https://www.cve.org/CVERecord?id=CVE-2024-26676
       https://www.cve.org/CVERecord?id=CVE-2024-26679
       https://www.cve.org/CVERecord?id=CVE-2024-26684
       https://www.cve.org/CVERecord?id=CVE-2024-26685
       https://www.cve.org/CVERecord?id=CVE-2024-26689
       https://www.cve.org/CVERecord?id=CVE-2024-26696
       https://www.cve.org/CVERecord?id=CVE-2024-26697
       https://www.cve.org/CVERecord?id=CVE-2024-26698
       https://www.cve.org/CVERecord?id=CVE-2024-26702
       https://www.cve.org/CVERecord?id=CVE-2024-26704
       https://www.cve.org/CVERecord?id=CVE-2024-26707
       https://www.cve.org/CVERecord?id=CVE-2024-26712
       https://www.cve.org/CVERecord?id=CVE-2024-26715
       https://www.cve.org/CVERecord?id=CVE-2024-26717
       https://www.cve.org/CVERecord?id=CVE-2024-26720
       https://www.cve.org/CVERecord?id=CVE-2024-26727
       https://www.cve.org/CVERecord?id=CVE-2024-26808
       Fixed in 5.15.150:
       https://www.cve.org/CVERecord?id=CVE-2023-52434
       https://www.cve.org/CVERecord?id=CVE-2023-52497
       https://www.cve.org/CVERecord?id=CVE-2023-52640
       https://www.cve.org/CVERecord?id=CVE-2023-52641
       https://www.cve.org/CVERecord?id=CVE-2024-0565
       https://www.cve.org/CVERecord?id=CVE-2024-26601
       https://www.cve.org/CVERecord?id=CVE-2024-26603
       https://www.cve.org/CVERecord?id=CVE-2024-26733
       https://www.cve.org/CVERecord?id=CVE-2024-26735
       https://www.cve.org/CVERecord?id=CVE-2024-26736
       https://www.cve.org/CVERecord?id=CVE-2024-26737
       https://www.cve.org/CVERecord?id=CVE-2024-26743
       https://www.cve.org/CVERecord?id=CVE-2024-26744
       https://www.cve.org/CVERecord?id=CVE-2024-26747
       https://www.cve.org/CVERecord?id=CVE-2024-26748
       https://www.cve.org/CVERecord?id=CVE-2024-26749
       https://www.cve.org/CVERecord?id=CVE-2024-26751
       https://www.cve.org/CVERecord?id=CVE-2024-26752
       https://www.cve.org/CVERecord?id=CVE-2024-26754
       https://www.cve.org/CVERecord?id=CVE-2024-26763
       https://www.cve.org/CVERecord?id=CVE-2024-26764
       https://www.cve.org/CVERecord?id=CVE-2024-26766
       https://www.cve.org/CVERecord?id=CVE-2024-26769
       https://www.cve.org/CVERecord?id=CVE-2024-26771
       https://www.cve.org/CVERecord?id=CVE-2024-26772
       https://www.cve.org/CVERecord?id=CVE-2024-26773
       https://www.cve.org/CVERecord?id=CVE-2024-26774
       https://www.cve.org/CVERecord?id=CVE-2024-26776
       https://www.cve.org/CVERecord?id=CVE-2024-26777
       https://www.cve.org/CVERecord?id=CVE-2024-26778
       https://www.cve.org/CVERecord?id=CVE-2024-26779
       Fixed in 5.15.151:
       https://www.cve.org/CVERecord?id=CVE-2023-52620
       https://www.cve.org/CVERecord?id=CVE-2024-0841
       https://www.cve.org/CVERecord?id=CVE-2024-26622
       https://www.cve.org/CVERecord?id=CVE-2024-26688
       https://www.cve.org/CVERecord?id=CVE-2024-26782
       https://www.cve.org/CVERecord?id=CVE-2024-26788
       https://www.cve.org/CVERecord?id=CVE-2024-26790
       https://www.cve.org/CVERecord?id=CVE-2024-26791
       https://www.cve.org/CVERecord?id=CVE-2024-26793
       https://www.cve.org/CVERecord?id=CVE-2024-26795
       https://www.cve.org/CVERecord?id=CVE-2024-26798
       https://www.cve.org/CVERecord?id=CVE-2024-26801
       https://www.cve.org/CVERecord?id=CVE-2024-26802
       https://www.cve.org/CVERecord?id=CVE-2024-26803
       https://www.cve.org/CVERecord?id=CVE-2024-26804
       https://www.cve.org/CVERecord?id=CVE-2024-26805
       Fixed in 5.15.152:
       https://www.cve.org/CVERecord?id=CVE-2024-26659
       https://www.cve.org/CVERecord?id=CVE-2024-26787
       Fixed in 5.15.153:
       https://www.cve.org/CVERecord?id=CVE-2023-52447
       https://www.cve.org/CVERecord?id=CVE-2023-6270
       https://www.cve.org/CVERecord?id=CVE-2023-7042
       https://www.cve.org/CVERecord?id=CVE-2024-22099
       https://www.cve.org/CVERecord?id=CVE-2024-26651
       https://www.cve.org/CVERecord?id=CVE-2024-26809
       (* Security fix *)
+--------------------------+
Sat Jun 1 19:52:37 UTC 2024
patches/packages/ntp-4.2.8p18-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix release to fix a possible regression. In some cases ntpd
       gets an error on mixed ipv4/ipv6 networks, so we'll make it possible to
       easily configure ntpd to use ipv4 only or ipv6 only (as well as to change
       any other ntpd options).
       rc.ntp: properly create the PID file on start.
       Add /etc/default/ntp to configure ntpd startup options since some people are
       needing to add -4 to avoid an error.
       Thanks to rkelsen and teoberi.
+--------------------------+
Sun May 26 00:07:39 UTC 2024
patches/packages/ntp-4.2.8p18-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed May 22 18:57:13 UTC 2024
patches/packages/curl-8.8.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon May 20 18:42:49 UTC 2024
patches/packages/mariadb-10.5.25-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Difficult to exploit vulnerability allows unauthenticated attacker with
       logon to the infrastructure where MariaDB Server executes to compromise the
       server. This could result in unauthorized update, insert or delete access
       to some of the data as well as unauthorized read access to a subset of the
       data and unauthorized ability to cause a partial denial of service.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-21096
       (* Security fix *)
+--------------------------+
Thu May 16 02:31:40 UTC 2024
patches/packages/gdk-pixbuf2-2.42.12-i586-1_slack15.0.txz: Upgraded.
       ani: Reject files with multiple INA or IART chunks.
       ani: Reject files with multiple anih chunks.
       ani: validate chunk size.
       Thanks to 0xvhp, pedrib, and Benjamin Gilbert.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-48622
       (* Security fix *)
patches/packages/git-2.39.4-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Recursive clones on case-insensitive filesystems that support symbolic
       links are susceptible to case confusion that can be exploited to
       execute just-cloned code during the clone operation.
       Repositories can be configured to execute arbitrary code during local
       clones. To address this, the ownership checks introduced in v2.30.3
       are now extended to cover cloning local repositories.
       Local clones may end up hardlinking files into the target repository's
       object database when source and target repository reside on the same
       disk. If the source repository is owned by a different user, then
       those hardlinked files may be rewritten at any point in time by the
       untrusted user.
       When cloning a local source repository that contains symlinks via the
       filesystem, Git may create hardlinks to arbitrary user-readable files
       on the same filesystem as the target repository in the objects/
       directory.
       It is supposed to be safe to clone untrusted repositories, even those
       unpacked from zip archives or tarballs originating from untrusted
       sources, but Git can be tricked to run arbitrary code as part of the
       clone.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-32002
       https://www.cve.org/CVERecord?id=CVE-2024-32004
       https://www.cve.org/CVERecord?id=CVE-2024-32020
       https://www.cve.org/CVERecord?id=CVE-2024-32021
       https://www.cve.org/CVERecord?id=CVE-2024-32465
       (* Security fix *)
patches/packages/popa3d-1.0.3-i586-7_slack15.0.txz: Rebuilt.
       This is a bugfix release:
       Build with AUTH_PAM, not AUTH_SHADOW.
       Thanks to jayjwa.
testing/packages/bind-9.18.27-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue May 14 19:07:51 UTC 2024
patches/packages/mozilla-firefox-115.11.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.11.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-22/
       https://www.cve.org/CVERecord?id=CVE-2024-4367
       https://www.cve.org/CVERecord?id=CVE-2024-4767
       https://www.cve.org/CVERecord?id=CVE-2024-4768
       https://www.cve.org/CVERecord?id=CVE-2024-4769
       https://www.cve.org/CVERecord?id=CVE-2024-4770
       https://www.cve.org/CVERecord?id=CVE-2024-4777
       (* Security fix *)
+--------------------------+
Mon May 13 18:22:20 UTC 2024
patches/packages/libxml2-2.11.8-i586-1_slack15.0.txz: Upgraded.
       Fix buffer overread with "xmllint --htmlout".
       xmllint: Fix --pedantic option.
       save: Handle invalid parent pointers in xhtmlNodeDumpOutput.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-34459
       (* Security fix *)
+--------------------------+
Sun May 12 19:10:12 UTC 2024
patches/packages/whois-5.5.23-i586-1_slack15.0.txz: Upgraded.
       Updated the .sc, .********* (.xn--yfro4i67o, Singapore)
       and .********************************* (.xn--clchc0ea0b2g2a9gcd, Singapore)
       TLD servers.
+--------------------------+
Thu May 9 19:26:51 UTC 2024
patches/packages/sg3_utils-1.47-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix release to fix a regression in rescan-scsi-bus.sh that
       causes all SCSI devices to be removed from the system when the '-r'
       option is used. Thanks to jwoithe for the link to the upstream patch.
+--------------------------+
Thu Apr 25 17:58:17 UTC 2024
patches/packages/libarchive-3.7.3-i586-2_slack15.0.txz: Rebuilt.
       Patched an out-of-bound error in the rar e8 filter that could allow for
       the execution of arbitrary code.
       Thanks to gmgf for the heads-up.
       For more information, see:
       https://github.com/advisories/GHSA-2jc9-36w4-pmqw
       https://www.cve.org/CVERecord?id=CVE-2024-26256
       (* Security fix *)
+--------------------------+
Tue Apr 23 22:24:03 UTC 2024
patches/packages/ruby-3.0.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Arbitrary memory address read vulnerability with Regex search.
       RCE vulnerability with .rdoc_options in RDoc.
       Buffer overread vulnerability in StringIO.
       For more information, see:
       https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
       https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
       https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
       https://www.cve.org/CVERecord?id=CVE-2024-27282
       https://www.cve.org/CVERecord?id=CVE-2024-27281
       https://www.cve.org/CVERecord?id=CVE-2024-27280
       (* Security fix *)
+--------------------------+
Tue Apr 23 19:48:05 UTC 2024
patches/packages/emacs-29.3-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       Only build the X11/GTK+3 version. Use "emacs -nw" if you want to start it
       in a terminal emulator in text mode, or rebuild if you really need to get
       rid of the X11 dependency for some reason.
       Build using --with-pdumper=auto. It seems that --with-dumping=unexec produces
       a buggy Emacs here in the modern era, with symptoms such as "child signal FD:
       Invalid argument". It's possible this had something to do with the reported
       memory leaks as well.
       Thanks to 3Tom for the bug report.
patches/packages/krusader-2.8.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Apr 22 19:36:38 UTC 2024
patches/packages/freerdp-2.11.7-i586-1_slack15.0.txz: Upgraded.
       This release eliminates a bunch of issues detected during oss-fuzz runs.
       (* Security fix *)
+--------------------------+
Fri Apr 19 19:36:17 UTC 2024
patches/packages/freerdp-2.11.6-i586-1_slack15.0.txz: Upgraded.
       This release is a security release and addresses multiple issues:
       [Low] OutOfBound Read in zgfx_decompress_segment.
       [Moderate] Integer overflow & OutOfBound Write in
       clear_decompress_residual_data.
       [Low] integer underflow in nsc_rle_decode.
       [Low] OutOfBound Read in planar_skip_plane_rle.
       [Low] OutOfBound Read in ncrush_decompress.
       [Low] OutOfBound Read in interleaved_decompress.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-32041
       https://www.cve.org/CVERecord?id=CVE-2024-32039
       https://www.cve.org/CVERecord?id=CVE-2024-32040
       https://www.cve.org/CVERecord?id=CVE-2024-32458
       https://www.cve.org/CVERecord?id=CVE-2024-32459
       https://www.cve.org/CVERecord?id=CVE-2024-32460
       (* Security fix *)
+--------------------------+
Fri Apr 19 05:38:28 UTC 2024
patches/packages/mozilla-thunderbird-115.10.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.10.1/releasenotes/
+--------------------------+
Thu Apr 18 19:17:30 UTC 2024
patches/packages/bind-9.16.50-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/aaa_glibc-solibs-2.33-i586-6_slack15.0.txz: Rebuilt.
patches/packages/glibc-2.33-i586-6_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       The iconv() function in the GNU C Library versions 2.39 and older may
       overflow the output buffer passed to it by up to 4 bytes when converting
       strings to the ISO-2022-CN-EXT character set, which may be used to crash
       an application or overwrite a neighbouring variable.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-2961
       (* Security fix *)
patches/packages/glibc-i18n-2.33-i586-6_slack15.0.txz: Rebuilt.
patches/packages/glibc-profile-2.33-i586-6_slack15.0.txz: Rebuilt.
testing/packages/bind-9.18.26-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Apr 17 20:35:48 UTC 2024
patches/packages/mozilla-thunderbird-115.10.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.10.0/releasenotes/
       https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird115.10
       (* Security fix *)
+--------------------------+
Tue Apr 16 18:50:13 UTC 2024
patches/packages/mozilla-firefox-115.10.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.10.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-19/
       https://www.cve.org/CVERecord?id=CVE-2024-3852
       https://www.cve.org/CVERecord?id=CVE-2024-3854
       https://www.cve.org/CVERecord?id=CVE-2024-3857
       https://www.cve.org/CVERecord?id=CVE-2024-2609
       https://www.cve.org/CVERecord?id=CVE-2024-3859
       https://www.cve.org/CVERecord?id=CVE-2024-3861
       https://www.cve.org/CVERecord?id=CVE-2024-3863
       https://www.cve.org/CVERecord?id=CVE-2024-3302
       https://www.cve.org/CVERecord?id=CVE-2024-3864
       (* Security fix *)
+--------------------------+
Sun Apr 14 18:35:32 UTC 2024
patches/packages/less-653-i586-1_slack15.0.txz: Upgraded.
       This update patches a security issue:
       less through 653 allows OS command execution via a newline character in the
       name of a file, because quoting is mishandled in filename.c. Exploitation
       typically requires use with attacker-controlled file names, such as the files
       extracted from an untrusted archive. Exploitation also requires the LESSOPEN
       environment variable, but this is set by default in many common cases.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-32487
       (* Security fix *)
+--------------------------+
Fri Apr 12 19:08:59 UTC 2024
extra/php81/php81-8.1.28-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Command injection via array-ish $command parameter of proc_open.
       __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix.
       Password_verify can erroneously return true, opening ATO risk.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.28
       https://www.cve.org/CVERecord?id=CVE-2024-1874
       https://www.cve.org/CVERecord?id=CVE-2024-2756
       https://www.cve.org/CVERecord?id=CVE-2024-3096
       (* Security fix *)
+--------------------------+
Mon Apr 8 18:44:37 UTC 2024
patches/packages/libarchive-3.7.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Fix possible vulnerability in tar error reporting introduced in f27c173
       by JiaT75.
       For more information, see:
       https://github.com/libarchive/libarchive/commit/f27c173d17dc807733b3a4f8c11207c3f04ff34f
       https://github.com/libarchive/libarchive/pull/2101
       (* Security fix *)
+--------------------------+
Fri Apr 5 20:11:23 UTC 2024
extra/tigervnc/tigervnc-1.12.0-i586-6_slack15.0.txz: Rebuilt.
       Recompiled against xorg-server-1.20.14, including the latest patches for
       several security issues:
       Heap buffer overread/data leakage in ProcXIGetSelectedEvents.
       Heap buffer overread/data leakage in ProcXIPassiveGrabDevice.
       Heap buffer overread/data leakage in ProcAppleDRICreatePixmap.
       Use-after-free in ProcRenderAddGlyphs.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-April/003497.html
       https://www.cve.org/CVERecord?id=CVE-2024-31080
       https://www.cve.org/CVERecord?id=CVE-2024-31081
       https://www.cve.org/CVERecord?id=CVE-2024-31082
       https://www.cve.org/CVERecord?id=CVE-2024-31083
       (* Security fix *)
+--------------------------+
Thu Apr 4 20:49:23 UTC 2024
patches/packages/httpd-2.4.59-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       HTTP/2 DoS by memory exhaustion on endless continuation frames.
       HTTP Response Splitting in multiple modules.
       HTTP response splitting.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.59
       https://www.cve.org/CVERecord?id=CVE-2024-27316
       https://www.cve.org/CVERecord?id=CVE-2024-24795
       https://www.cve.org/CVERecord?id=CVE-2023-38709
       (* Security fix *)
patches/packages/nghttp2-1.61.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       nghttp2 library keeps reading the unbounded number of HTTP/2 CONTINUATION
       frames even after a stream is reset to keep HPACK context in sync. This
       causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates
       this vulnerability by limiting the number of CONTINUATION frames it can
       accept after a HEADERS frame.
       For more information, see:
       https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
       https://www.kb.cert.org/vuls/id/421644
       https://www.cve.org/CVERecord?id=CVE-2024-28182
       (* Security fix *)
+--------------------------+
Wed Apr 3 22:22:06 UTC 2024
patches/packages/xorg-server-1.20.14-i586-12_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       Heap buffer overread/data leakage in ProcXIGetSelectedEvents.
       Heap buffer overread/data leakage in ProcXIPassiveGrabDevice.
       Heap buffer overread/data leakage in ProcAppleDRICreatePixmap.
       Use-after-free in ProcRenderAddGlyphs.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-April/003497.html
       https://www.cve.org/CVERecord?id=CVE-2024-31080
       https://www.cve.org/CVERecord?id=CVE-2024-31081
       https://www.cve.org/CVERecord?id=CVE-2024-31082
       https://www.cve.org/CVERecord?id=CVE-2024-31083
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-12_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-12_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-12_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-11_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       Heap buffer overread/data leakage in ProcXIGetSelectedEvents.
       Heap buffer overread/data leakage in ProcXIPassiveGrabDevice.
       Use-after-free in ProcRenderAddGlyphs.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2024-April/003497.html
       https://www.cve.org/CVERecord?id=CVE-2024-31080
       https://www.cve.org/CVERecord?id=CVE-2024-31081
       https://www.cve.org/CVERecord?id=CVE-2024-31083
       (* Security fix *)
+--------------------------+
Wed Apr 3 19:58:56 UTC 2024
patches/packages/whois-5.5.22-i586-1_slack15.0.txz: Upgraded.
       Fixed a segmentation fault with --no-recursion.
       Updated the .bm and .vi TLD servers.
       Removed 4 new gTLDs which are no longer active.
+--------------------------+
Fri Mar 29 02:25:21 UTC 2024
patches/packages/coreutils-9.5-i586-1_slack15.0.txz: Upgraded.
       chmod -R now avoids a race where an attacker may replace a traversed file
       with a symlink, causing chmod to operate on an unintended file.
       [This bug was present in "the beginning".]
       split --line-bytes with a mixture of very long and short lines no longer
       overwrites the heap.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-0684
       (* Security fix *)
+--------------------------+
Thu Mar 28 21:40:08 UTC 2024
patches/packages/seamonkey-2.53.18.2-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.18.2
       (* Security fix *)
patches/packages/util-linux-2.37.4-i586-3_slack15.0.txz: Rebuilt.
       This release fixes a vulnerability where the wall command did not filter
       escape sequences from command line arguments, allowing unprivileged users
       to put arbitrary text on other users terminals.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-28085
       (* Security fix *)
+--------------------------+
Wed Mar 27 19:16:09 UTC 2024
patches/packages/curl-8.7.1-i586-1_slack15.0.txz: Upgraded.
       This release fixes the following security issues:
       TLS certificate check bypass with mbedTLS.
       HTTP/2 push headers memory-leak.
       QUIC certificate check bypass with wolfSSL.
       Usage of disabled protocol.
       For more information, see:
       https://curl.se/docs/CVE-2024-2466.html
       https://curl.se/docs/CVE-2024-2398.html
       https://curl.se/docs/CVE-2024-2379.html
       https://curl.se/docs/CVE-2024-2004.html
       https://www.cve.org/CVERecord?id=CVE-2024-2466
       https://www.cve.org/CVERecord?id=CVE-2024-2398
       https://www.cve.org/CVERecord?id=CVE-2024-2379
       https://www.cve.org/CVERecord?id=CVE-2024-2004
       (* Security fix *)
+--------------------------+
Sun Mar 24 18:21:46 UTC 2024
patches/packages/emacs-29.3-i586-1_slack15.0.txz: Upgraded.
       GNU Emacs through 28.2 allows attackers to execute commands via shell
       metacharacters in the name of a source-code file, because lib-src/etags.c
       uses the system C library function in its implementation of the ctags
       program. For example, a victim may use the "ctags *" command (suggested in
       the ctags documentation) in a situation where the current working directory
       has contents that depend on untrusted input.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-45939
       (* Security fix *)
+--------------------------+
Sat Mar 23 19:34:02 UTC 2024
patches/packages/mozilla-firefox-115.9.1esr-i686-1_slack15.0.txz: Upgraded.
       This update fixes a critical security issue:
       An attacker was able to inject an event handler into a privileged object
       that would allow arbitrary JavaScript execution in the parent process.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.9.1esr/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-16/
       https://www.cve.org/CVERecord?id=CVE-2024-29944
       (* Security fix *)
+--------------------------+
Wed Mar 20 21:10:30 UTC 2024
patches/packages/bind-9.16.49-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/python3-3.9.19-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       bundled libexpat was updated to 2.6.0.
       zipfile is now protected from the "quoted-overlap" zipbomb.
       tempfile.TemporaryDirectory cleanup no longer dereferences symlinks when
       working around file system permission errors.
       For more information, see:
       https://pythoninsider.blogspot.com/2024/03/python-31014-3919-and-3819-is-now.html
       https://www.cve.org/CVERecord?id=CVE-2023-52425
       https://www.cve.org/CVERecord?id=CVE-2024-0450
       https://www.cve.org/CVERecord?id=CVE-2023-6597
       (* Security fix *)
testing/packages/bind-9.18.25-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Mar 20 00:08:59 UTC 2024
patches/packages/gnutls-3.8.4-i586-1_slack15.0.txz: Upgraded.
       This update fixes two medium severity security issues:
       libgnutls: Fix side-channel in the deterministic ECDSA.
       Reported by George Pantelakis (#1516).
       libgnutls: Fixed a bug where certtool crashed when verifying a certificate
       chain with more than 16 certificates. Reported by William Woodruff (#1525)
       and yixiangzhike (#1527).
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-28834
       https://www.cve.org/CVERecord?id=CVE-2024-28835
       (* Security fix *)
patches/packages/mozilla-firefox-115.9.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.9.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-13/
       https://www.cve.org/CVERecord?id=CVE-2024-0743
       https://www.cve.org/CVERecord?id=CVE-2024-2605
       https://www.cve.org/CVERecord?id=CVE-2024-2607
       https://www.cve.org/CVERecord?id=CVE-2024-2608
       https://www.cve.org/CVERecord?id=CVE-2024-2616
       https://www.cve.org/CVERecord?id=CVE-2023-5388
       https://www.cve.org/CVERecord?id=CVE-2024-2610
       https://www.cve.org/CVERecord?id=CVE-2024-2611
       https://www.cve.org/CVERecord?id=CVE-2024-2612
       https://www.cve.org/CVERecord?id=CVE-2024-2614
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.9.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.9.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/
       https://www.cve.org/CVERecord?id=CVE-2024-0743
       https://www.cve.org/CVERecord?id=CVE-2024-2605
       https://www.cve.org/CVERecord?id=CVE-2024-2607
       https://www.cve.org/CVERecord?id=CVE-2024-2608
       https://www.cve.org/CVERecord?id=CVE-2024-2616
       https://www.cve.org/CVERecord?id=CVE-2023-5388
       https://www.cve.org/CVERecord?id=CVE-2024-2610
       https://www.cve.org/CVERecord?id=CVE-2024-2611
       https://www.cve.org/CVERecord?id=CVE-2024-2612
       https://www.cve.org/CVERecord?id=CVE-2024-2614
       (* Security fix *)
+--------------------------+
Wed Mar 13 19:46:48 UTC 2024
patches/packages/expat-2.6.2-i586-1_slack15.0.txz: Upgraded.
       Prevent billion laughs attacks with isolated use of external parsers.
       For more information, see:
       https://github.com/libexpat/libexpat/commit/1d50b80cf31de87750103656f6eb693746854aa8
       https://www.cve.org/CVERecord?id=CVE-2024-28757
       (* Security fix *)
+--------------------------+
Fri Mar 8 19:20:11 UTC 2024
patches/packages/xfce4-weather-plugin-0.11.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Thu Mar 7 20:40:08 UTC 2024
patches/packages/ghostscript-9.55.0-i586-2_slack15.0.txz: Rebuilt.
       Fixes security issues:
       A vulnerability was identified in the way Ghostscript/GhostPDL called
       tesseract for the OCR devices, which could allow arbitrary code execution.
       Thanks to J_W for the heads-up.
       Mishandling of permission validation for pipe devices could allow arbitrary
       code execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664
       (* Security fix *)
+--------------------------+
Tue Mar 5 21:16:50 UTC 2024
patches/packages/mozilla-thunderbird-115.8.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.8.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-11/
       https://www.cve.org/CVERecord?id=CVE-2024-1936
       (* Security fix *)
patches/packages/postfix-3.6.15-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.postfix.org/announcements/postfix-3.8.6.html
+--------------------------+
Fri Mar 1 22:13:28 UTC 2024
patches/packages/expat-2.6.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Thu Feb 29 19:11:19 UTC 2024
patches/packages/openjpeg-2.5.2-i586-1_slack15.0.txz: Upgraded.
       Fixed a regression in openjpeg-2.5.1:
       API breakage / openjpeg version no longer detected (openjpeg.h no longer
       includes opj_config.h).
+--------------------------+
Wed Feb 28 18:36:48 UTC 2024
patches/packages/wpa_supplicant-2.10-i586-2_slack15.0.txz: Rebuilt.
       Patched the implementation of PEAP in wpa_supplicant to prevent an
       authentication bypass. For a successful attack, wpa_supplicant must be
       configured to not verify the network's TLS certificate during Phase 1
       authentication, and an eap_peap_decrypt vulnerability can then be abused
       to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
       Success packet instead of starting Phase 2. This allows an adversary to
       impersonate Enterprise Wi-Fi networks.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-52160
       (* Security fix *)
+--------------------------+
Mon Feb 26 20:09:43 UTC 2024
patches/packages/openjpeg-2.5.1-i586-1_slack15.0.txz: Upgraded.
       Fixed a heap-based buffer overflow in openjpeg in color.c:379:42 in
       sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use
       this to execute arbitrary code with the permissions of the application
       compiled against openjpeg.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2021-3575
       (* Security fix *)
+--------------------------+
Sun Feb 25 19:16:52 UTC 2024
patches/packages/whois-5.5.21-i586-1_slack15.0.txz: Upgraded.
       Updated the .cv and .sd TLD servers.
       Removed 4 new gTLDs which are no longer active.
+--------------------------+
Fri Feb 23 20:37:29 UTC 2024
patches/packages/dcron-4.5-i586-13_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       run-parts.8: document skiping *.orig files. Thanks to metaed.
+--------------------------+
Wed Feb 21 20:00:08 UTC 2024
patches/packages/dcron-4.5-i586-12_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       run-parts: skip *.orig files. Thanks to metaed.
patches/packages/mozilla-thunderbird-115.8.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.8.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-07/
       https://www.cve.org/CVERecord?id=CVE-2024-1546
       https://www.cve.org/CVERecord?id=CVE-2024-1547
       https://www.cve.org/CVERecord?id=CVE-2024-1548
       https://www.cve.org/CVERecord?id=CVE-2024-1549
       https://www.cve.org/CVERecord?id=CVE-2024-1550
       https://www.cve.org/CVERecord?id=CVE-2024-1551
       https://www.cve.org/CVERecord?id=CVE-2024-1552
       https://www.cve.org/CVERecord?id=CVE-2024-1553
       (* Security fix *)
+--------------------------+
Tue Feb 20 21:08:27 UTC 2024
patches/packages/libuv-1.48.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes a server-side request forgery (SSRF) flaw.
       Thanks to alex2grad for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-24806
       (* Security fix *)
+--------------------------+
Tue Feb 20 18:41:59 UTC 2024
patches/packages/mozilla-firefox-115.8.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.8.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-06/
       https://www.cve.org/CVERecord?id=CVE-2024-1546
       https://www.cve.org/CVERecord?id=CVE-2024-1547
       https://www.cve.org/CVERecord?id=CVE-2024-1548
       https://www.cve.org/CVERecord?id=CVE-2024-1549
       https://www.cve.org/CVERecord?id=CVE-2024-1550
       https://www.cve.org/CVERecord?id=CVE-2024-1551
       https://www.cve.org/CVERecord?id=CVE-2024-1552
       https://www.cve.org/CVERecord?id=CVE-2024-1553
       (* Security fix *)
+--------------------------+
Sun Feb 18 21:03:57 UTC 2024
extra/llvm-17.0.6-i586-1_slack15.0.txz: Added.
       In case anyone needs a newer compiler.
extra/llvm13-compat-13.0.0-i586-1_slack15.0.txz: Added.
       In case anyone needs to run binaries linked to the old compiler.
+--------------------------+
Fri Feb 16 20:18:59 UTC 2024
patches/packages/ca-certificates-20240216-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Wed Feb 14 04:18:12 UTC 2024
patches/packages/dnsmasq-2.90-i586-1_slack15.0.txz: Upgraded.
       Add limits on the resources used to do DNSSEC validation.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-50387
       https://www.cve.org/CVERecord?id=CVE-2023-50868
       (* Security fix *)
+--------------------------+
Tue Feb 13 19:19:24 UTC 2024
patches/packages/bind-9.16.48-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Specific DNS answers could cause a denial-of-service condition due to DNS
       validation taking a long time.
       Query patterns that continuously triggered cache database maintenance could
       exhaust all available memory on the host running named.
       Restore DNS64 state when handling a serve-stale timeout.
       Specific queries could trigger an assertion check with nxdomain-redirect
       enabled.
       Speed up parsing of DNS messages with many different names.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-50387
       https://www.cve.org/CVERecord?id=CVE-2023-50387
       https://kb.isc.org/docs/cve-2023-6516
       https://www.cve.org/CVERecord?id=CVE-2023-6516
       https://kb.isc.org/docs/cve-2023-5679
       https://www.cve.org/CVERecord?id=CVE-2023-5679
       https://kb.isc.org/docs/cve-2023-5517
       https://www.cve.org/CVERecord?id=CVE-2023-5517
       https://kb.isc.org/docs/cve-2023-4408
       https://www.cve.org/CVERecord?id=CVE-2023-4408
       (* Security fix *)
testing/packages/bind-9.18.24-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Specific DNS answers could cause a denial-of-service condition due to DNS
       validation taking a long time.
       Restore DNS64 state when handling a serve-stale timeout.
       Specific queries could trigger an assertion check with nxdomain-redirect
       enabled.
       Speed up parsing of DNS messages with many different names.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-50387
       https://www.cve.org/CVERecord?id=CVE-2023-50387
       https://kb.isc.org/docs/cve-2023-5679
       https://www.cve.org/CVERecord?id=CVE-2023-5679
       https://kb.isc.org/docs/cve-2023-5517
       https://www.cve.org/CVERecord?id=CVE-2023-5517
       https://kb.isc.org/docs/cve-2023-4408
       https://www.cve.org/CVERecord?id=CVE-2023-4408
       (* Security fix *)
+--------------------------+
Sun Feb 11 22:11:59 UTC 2024
patches/packages/mariadb-10.5.24-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://mariadb.com/kb/en/mariadb-10-5-24-release-notes/
+--------------------------+
Fri Feb 9 21:48:09 UTC 2024
patches/packages/xpdf-4.05-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Fixed a bug in the ICCBased color space parser that was allowing the number
       of components to be zero. Thanks to huckleberry for the bug report.
       Fixed a bug in the ICCBased color space parser that was allowing the number
       of components to be zero. Thanks to huckleberry for the bug report.
       Added checks for PDF object loops in AcroForm::scanField(),
       Catalog::readPageLabelTree2(), and Catalog::readEmbeddedFileTree().
       The zero-width character problem can also happen if the page size is very
       large -- that needs to be limited too, the same way as character position
       coordinates. Thanks to jlinliu for the bug report.
       Add some missing bounds check code in DCTStream. Thanks to Jiahao Liu for
       the bug report.
       Fix a deadlock when an object stream's length field is contained in another
       object stream. Thanks to Jiahao Liu for the bug report.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-2662
       https://www.cve.org/CVERecord?id=CVE-2023-2662
       https://www.cve.org/CVERecord?id=CVE-2018-7453
       https://www.cve.org/CVERecord?id=CVE-2018-16369
       https://www.cve.org/CVERecord?id=CVE-2022-36561
       https://www.cve.org/CVERecord?id=CVE-2022-41844
       https://www.cve.org/CVERecord?id=CVE-2023-2663
       https://www.cve.org/CVERecord?id=CVE-2023-2664
       https://www.cve.org/CVERecord?id=CVE-2023-3044
       https://www.cve.org/CVERecord?id=CVE-2023-3436
       (* Security fix *)
+--------------------------+
Thu Feb 8 22:17:18 UTC 2024
patches/packages/dehydrated-0.7.1-noarch-1_slack15.0.txz: Upgraded.
       This is a bugfix release that addresses (among other things) an
       "unbound variable" error if the signing server is not available.
       Thanks to metaed for the heads-up.
+--------------------------+
Wed Feb 7 20:07:29 UTC 2024
patches/packages/expat-2.6.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Fix quadratic runtime issues with big tokens that can cause
       denial of service.
       Fix billion laughs attacks for users compiling *without* XML_DTD
       defined (which is not common).
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-52425
       https://www.cve.org/CVERecord?id=CVE-2023-52426
       (* Security fix *)
+--------------------------+
Sun Feb 4 19:37:40 UTC 2024
patches/packages/libxml2-2.11.7-i586-1_slack15.0.txz: Upgraded.
       Fix the following security issue:
       xmlreader: Don't expand XIncludes when backtracking.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-25062
       (* Security fix *)
+--------------------------+
Sat Feb 3 20:54:00 UTC 2024
patches/packages/ca-certificates-20240203-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/glibc-zoneinfo-2024a-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Wed Jan 31 21:19:19 UTC 2024
extra/sendmail/sendmail-8.18.1-i586-1_slack15.0.txz: Upgraded.
       sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
       Remote attackers can use a published exploitation technique to inject e-mail
       messages with a spoofed MAIL FROM address, allowing bypass of an SPF
       protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
       but some other popular e-mail servers do not. This is resolved in 8.18 and
       later versions with 'o' in srv_features.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-51765
       (* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded.
patches/packages/curl-8.6.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/libmilter-8.18.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Fri Jan 26 20:59:27 UTC 2024
patches/packages/pam-1.6.0-i586-1_slack15.0.txz: Upgraded.
       pam_namespace.so: fixed a possible local denial-of-service vulnerability.
       For more information, see:
       https://seclists.org/oss-sec/2024/q1/31
       https://www.cve.org/CVERecord?id=CVE-2024-22365
       (* Security fix *)
+--------------------------+
Wed Jan 24 04:53:38 UTC 2024
patches/packages/mozilla-thunderbird-115.7.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.7.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2024-04/
       https://www.cve.org/CVERecord?id=CVE-2024-0741
       https://www.cve.org/CVERecord?id=CVE-2024-0742
       https://www.cve.org/CVERecord?id=CVE-2024-0746
       https://www.cve.org/CVERecord?id=CVE-2024-0747
       https://www.cve.org/CVERecord?id=CVE-2024-0749
       https://www.cve.org/CVERecord?id=CVE-2024-0750
       https://www.cve.org/CVERecord?id=CVE-2024-0751
       https://www.cve.org/CVERecord?id=CVE-2024-0753
       https://www.cve.org/CVERecord?id=CVE-2024-0755
       (* Security fix *)
+--------------------------+
Tue Jan 23 20:08:07 UTC 2024
patches/packages/mozilla-firefox-115.7.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.7.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2024-02/
       https://www.cve.org/CVERecord?id=CVE-2024-0741
       https://www.cve.org/CVERecord?id=CVE-2024-0742
       https://www.cve.org/CVERecord?id=CVE-2024-0746
       https://www.cve.org/CVERecord?id=CVE-2024-0747
       https://www.cve.org/CVERecord?id=CVE-2024-0749
       https://www.cve.org/CVERecord?id=CVE-2024-0750
       https://www.cve.org/CVERecord?id=CVE-2024-0751
       https://www.cve.org/CVERecord?id=CVE-2024-0753
       https://www.cve.org/CVERecord?id=CVE-2024-0755
       (* Security fix *)
+--------------------------+
Mon Jan 22 20:57:12 UTC 2024
patches/packages/postfix-3.6.14-i586-1_slack15.0.txz: Upgraded.
       Security (inbound SMTP smuggling): with "smtpd_forbid_bare_newline
       = normalize" (default "no" for Postfix < 3.9), the Postfix
       SMTP server requires the standard End-of-DATA sequence
       <CR><LF>.<CR><LF>, and otherwise allows command or message
       content lines ending in the non-standard <LF>, processing
       them as if the client sent the standard <CR><LF>.
       The alternative setting, "smtpd_forbid_bare_newline = reject"
       will reject any command or message that contains a bare
       <LF>, and is more likely to cause problems with legitimate
       clients.
       For backwards compatibility, local clients are excluded by
       default with "smtpd_forbid_bare_newline_exclusions =
       $mynetworks".
       For more information, see:
       https://www.postfix.org/smtp-smuggling.html
       (* Security fix *)
+--------------------------+
Sun Jan 21 20:50:08 UTC 2024
extra/tigervnc/tigervnc-1.12.0-i586-5_slack15.0.txz: Rebuilt.
       Recompiled against xorg-server-1.20.14, including the latest patches for
       several security issues. Thanks to marav.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-6377
       https://www.cve.org/CVERecord?id=CVE-2023-6478
       https://www.cve.org/CVERecord?id=CVE-2023-6816
       https://www.cve.org/CVERecord?id=CVE-2024-0229
       https://www.cve.org/CVERecord?id=CVE-2024-0408
       https://www.cve.org/CVERecord?id=CVE-2024-0409
       https://www.cve.org/CVERecord?id=CVE-2024-21885
       https://www.cve.org/CVERecord?id=CVE-2024-21886
       https://www.cve.org/CVERecord?id=CVE-2024-21886
       (* Security fix *)
+--------------------------+
Wed Jan 17 21:13:27 UTC 2024
patches/packages/seamonkey-2.53.18.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.18.1
+--------------------------+
Tue Jan 16 20:49:28 UTC 2024
patches/packages/gnutls-3.8.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes two medium severity security issues:
       Fix more timing side-channel inside RSA-PSK key exchange.
       Fix assertion failure when verifying a certificate chain with a cycle of
       cross signatures.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2024-0553
       https://www.cve.org/CVERecord?id=CVE-2024-0567
       (* Security fix *)
patches/packages/xorg-server-1.20.14-i586-11_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer.
       Reattaching to different master device may lead to out-of-bounds memory access.
       Heap buffer overflow in XISendDeviceHierarchyEvent.
       Heap buffer overflow in DisableDevice.
       SELinux context corruption.
       SELinux unlabeled GLX PBuffer.
       For more information, see:
       https://lists.x.org/archives/xorg/2024-January/061525.html
       https://www.cve.org/CVERecord?id=CVE-2023-6816
       https://www.cve.org/CVERecord?id=CVE-2024-0229
       https://www.cve.org/CVERecord?id=CVE-2024-21885
       https://www.cve.org/CVERecord?id=CVE-2024-21886
       https://www.cve.org/CVERecord?id=CVE-2024-0408
       https://www.cve.org/CVERecord?id=CVE-2024-0409
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-11_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-11_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-11_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-10_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer.
       Reattaching to different master device may lead to out-of-bounds memory access.
       Heap buffer overflow in XISendDeviceHierarchyEvent.
       Heap buffer overflow in DisableDevice.
       SELinux unlabeled GLX PBuffer.
       For more information, see:
       https://lists.x.org/archives/xorg/2024-January/061525.html
       https://www.cve.org/CVERecord?id=CVE-2023-6816
       https://www.cve.org/CVERecord?id=CVE-2024-0229
       https://www.cve.org/CVERecord?id=CVE-2024-21885
       https://www.cve.org/CVERecord?id=CVE-2024-21886
       https://www.cve.org/CVERecord?id=CVE-2024-0408
       (* Security fix *)
+--------------------------+
Wed Jan 10 20:25:54 UTC 2024
patches/packages/xorriso-1.5.6.pl02-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Jan 9 20:49:08 UTC 2024
patches/packages/mozilla-thunderbird-115.6.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.thunderbird.net/en-US/thunderbird/115.6.1/releasenotes/
+--------------------------+
Sat Dec 30 19:53:07 UTC 2023
patches/packages/sudo-1.9.15p5-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Dec 26 00:20:26 UTC 2023
patches/packages/kernel-firmware-20231222_a7dee43-noarch-1.txz: Upgraded.
       Updated to the latest kernel firmware.
patches/packages/linux-5.15.145/*: Upgraded.
       These updates fix various bugs and security issues.
       Thanks to jwoithe for the PCI fix!
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.140:
       https://www.cve.org/CVERecord?id=CVE-2023-46862
       Fixed in 5.15.141:
       https://www.cve.org/CVERecord?id=CVE-2023-6121
       (* Security fix *)
+--------------------------+
Sat Dec 23 02:48:56 UTC 2023
patches/packages/glibc-zoneinfo-2023d-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
patches/packages/postfix-3.6.13-i586-1_slack15.0.txz: Upgraded.
       Security: this release adds support to defend against an email spoofing
       attack (SMTP smuggling) on recipients at a Postfix server. Sites
       concerned about SMTP smuggling attacks should enable this feature on
       Internet-facing Postfix servers. For compatibility with non-standard
       clients, Postfix by default excludes clients in mynetworks from this
       countermeasure.
       The recommended settings are:
       # Optionally disconnect remote SMTP clients that send bare newlines,
       # but allow local clients with non-standard SMTP implementations
       # such as netcat, fax machines, or load balancer health checks.
       #
       smtpd_forbid_bare_newline = yes
       smtpd_forbid_bare_newline_exclusions = $mynetworks
       The smtpd_forbid_bare_newline feature is disabled by default.
       For more information, see:
       https://www.postfix.org/smtp-smuggling.html
       (* Security fix *)
+--------------------------+
Thu Dec 21 20:46:11 UTC 2023
extra/php81/php81-8.1.27-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.27
+--------------------------+
Wed Dec 20 21:10:47 UTC 2023
patches/packages/bind-9.16.45-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/proftpd-1.3.8b-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       mod_sftp: implemented mitigations for "Terrapin" SSH attack.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-48795
       (* Security fix *)
testing/packages/bind-9.18.21-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Dec 19 21:24:05 UTC 2023
patches/packages/bluez-5.71-i586-2_slack15.0.txz: Rebuilt.
       Fix a regression in bluez-5.71:
       [PATCH] adapter: Fix link key address type for old kernels.
       Thanks to marav.
patches/packages/libssh-0.10.6-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Command injection using proxycommand.
       Potential downgrade attack using strict kex.
       Missing checks for return values of MD functions.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-6004
       https://www.cve.org/CVERecord?id=CVE-2023-48795
       https://www.cve.org/CVERecord?id=CVE-2023-6918
       (* Security fix *)
patches/packages/mozilla-firefox-115.6.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-54/
       https://www.cve.org/CVERecord?id=CVE-2023-6856
       https://www.cve.org/CVERecord?id=CVE-2023-6865
       https://www.cve.org/CVERecord?id=CVE-2023-6857
       https://www.cve.org/CVERecord?id=CVE-2023-6858
       https://www.cve.org/CVERecord?id=CVE-2023-6859
       https://www.cve.org/CVERecord?id=CVE-2023-6860
       https://www.cve.org/CVERecord?id=CVE-2023-6867
       https://www.cve.org/CVERecord?id=CVE-2023-6861
       https://www.cve.org/CVERecord?id=CVE-2023-6862
       https://www.cve.org/CVERecord?id=CVE-2023-6863
       https://www.cve.org/CVERecord?id=CVE-2023-6864
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.6.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.thunderbird.net/en-US/thunderbird/115.6.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-55/
       https://www.cve.org/CVERecord?id=CVE-2023-50762
       https://www.cve.org/CVERecord?id=CVE-2023-50761
       https://www.cve.org/CVERecord?id=CVE-2023-6856
       https://www.cve.org/CVERecord?id=CVE-2023-6857
       https://www.cve.org/CVERecord?id=CVE-2023-6858
       https://www.cve.org/CVERecord?id=CVE-2023-6859
       https://www.cve.org/CVERecord?id=CVE-2023-6860
       https://www.cve.org/CVERecord?id=CVE-2023-6861
       https://www.cve.org/CVERecord?id=CVE-2023-6862
       https://www.cve.org/CVERecord?id=CVE-2023-6863
       https://www.cve.org/CVERecord?id=CVE-2023-6864
       (* Security fix *)
+--------------------------+
Sat Dec 16 20:33:34 UTC 2023
patches/packages/sudo-1.9.15p4-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Thu Dec 14 20:09:31 UTC 2023
patches/packages/bluez-5.71-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       It may have been possible for an attacker within Bluetooth range to inject
       keystrokes (and possibly execute commands) while devices were discoverable.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-45866
       (* Security fix *)
patches/packages/libxml2-2.11.6-i586-1_slack15.0.txz: Upgraded.
       We're going to drop back to the 2.11 branch here on the stable releases
       since it has all of the relevant security fixes and better compatibility.
+--------------------------+
Thu Dec 14 18:33:00 UTC 2023
patches/packages/sudo-1.9.15p3-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Dec 13 22:01:34 UTC 2023
patches/packages/libxml2-2.12.3-i586-1_slack15.0.txz: Upgraded.
       This update addresses regressions when building against libxml2 that were
       due to header file refactoring.
patches/packages/xorg-server-1.20.14-i586-10_slack15.0.txz: Rebuilt.
       This update fixes two security issues:
       Out-of-bounds memory write in XKB button actions.
       Out-of-bounds memory read in RRChangeOutputProperty and
       RRChangeProviderProperty.
       For more information, see:
       https://lists.x.org/archives/xorg/2023-December/061517.html
       https://www.cve.org/CVERecord?id=CVE-2023-6377
       https://www.cve.org/CVERecord?id=CVE-2023-6478
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-10_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-9_slack15.0.txz: Rebuilt.
       This update fixes two security issues:
       Out-of-bounds memory write in XKB button actions.
       Out-of-bounds memory read in RRChangeOutputProperty and
       RRChangeProviderProperty.
       For more information, see:
       https://lists.x.org/archives/xorg/2023-December/061517.html
       https://www.cve.org/CVERecord?id=CVE-2023-6377
       https://www.cve.org/CVERecord?id=CVE-2023-6478
       (* Security fix *)
+--------------------------+
Tue Dec 12 19:54:42 UTC 2023
patches/packages/mozilla-thunderbird-115.5.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.5.2/releasenotes/
+--------------------------+
Sun Dec 10 01:12:17 UTC 2023
patches/packages/libxml2-2.12.2-i586-1_slack15.0.txz: Upgraded.
       Add --sysconfdir=/etc option so that this can find the xml catalog.
       Thanks to SpiderTux.
       Fix the following security issues:
       Fix integer overflows with XML_PARSE_HUGE.
       Fix dict corruption caused by entity reference cycles.
       Hashing of empty dict strings isn't deterministic.
       Fix null deref in xmlSchemaFixupComplexType.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-40303
       https://www.cve.org/CVERecord?id=CVE-2022-40304
       https://www.cve.org/CVERecord?id=CVE-2023-29469
       https://www.cve.org/CVERecord?id=CVE-2023-28484
       (* Security fix *)
+--------------------------+
Sat Dec 9 19:55:12 UTC 2023
patches/packages/seamonkey-2.53.18-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.18
+--------------------------+
Wed Dec 6 20:29:23 UTC 2023
patches/packages/rdfind-1.6.0-i586-1_slack15.0.txz: Added.
       Redundant data finder utility, needed to build the kernel-firmware package.
+--------------------------+
Thu Nov 30 21:21:55 UTC 2023
patches/packages/samba-4.18.9-i586-1_slack15.0.txz: Upgraded.
       This is a security release in order to address the following defect:
       An information leak vulnerability was discovered in Samba's LDAP server.
       Due to missing access control checks, an authenticated but unprivileged
       attacker could discover the names and preserved attributes of deleted objects
       in the LDAP store. Upgrading to this package will not prevent this
       information leak - if you are using Samba as an Active Directory Domain
       Controller, you will need to follow the instructions in the samba.org link
       given below.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2018-14628.html
       https://www.cve.org/CVERecord?id=CVE-2018-14628
       (* Security fix *)
+--------------------------+
Tue Nov 28 22:13:48 UTC 2023
patches/packages/mozilla-thunderbird-115.5.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.5.1/releasenotes/
+--------------------------+
Fri Nov 24 20:52:02 UTC 2023
patches/packages/vim-9.0.2127-i586-1_slack15.0.txz: Upgraded.
       Fixed security issues.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-48231
       https://www.cve.org/CVERecord?id=CVE-2023-48232
       https://www.cve.org/CVERecord?id=CVE-2023-48233
       https://www.cve.org/CVERecord?id=CVE-2023-48234
       https://www.cve.org/CVERecord?id=CVE-2023-48235
       https://www.cve.org/CVERecord?id=CVE-2023-48236
       https://www.cve.org/CVERecord?id=CVE-2023-48237
       (* Security fix *)
patches/packages/vim-gvim-9.0.2127-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Wed Nov 22 19:26:09 UTC 2023
patches/packages/mozilla-thunderbird-115.5.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.5.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/
       https://www.cve.org/CVERecord?id=CVE-2023-6204
       https://www.cve.org/CVERecord?id=CVE-2023-6205
       https://www.cve.org/CVERecord?id=CVE-2023-6206
       https://www.cve.org/CVERecord?id=CVE-2023-6207
       https://www.cve.org/CVERecord?id=CVE-2023-6208
       https://www.cve.org/CVERecord?id=CVE-2023-6209
       https://www.cve.org/CVERecord?id=CVE-2023-6212
       (* Security fix *)
+--------------------------+
Tue Nov 21 21:15:30 UTC 2023
patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded.
       Updated to the latest kernel firmware.
patches/packages/linux-5.15.139/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.116:
       https://www.cve.org/CVERecord?id=CVE-2023-35788
       https://www.cve.org/CVERecord?id=CVE-2022-45887
       https://www.cve.org/CVERecord?id=CVE-2022-45886
       https://www.cve.org/CVERecord?id=CVE-2023-3212
       https://www.cve.org/CVERecord?id=CVE-2022-45919
       Fixed in 5.15.117:
       https://www.cve.org/CVERecord?id=CVE-2023-2124
       https://www.cve.org/CVERecord?id=CVE-2023-34255
       Fixed in 5.15.118:
       https://www.cve.org/CVERecord?id=CVE-2023-3609
       https://www.cve.org/CVERecord?id=CVE-2023-3117
       https://www.cve.org/CVERecord?id=CVE-2023-3390
       https://www.cve.org/CVERecord?id=CVE-2023-3338
       Fixed in 5.15.119:
       https://www.cve.org/CVERecord?id=CVE-2023-3610
       Fixed in 5.15.121:
       https://www.cve.org/CVERecord?id=CVE-2023-31248
       https://www.cve.org/CVERecord?id=CVE-2023-38432
       https://www.cve.org/CVERecord?id=CVE-2023-3866
       https://www.cve.org/CVERecord?id=CVE-2023-2898
       https://www.cve.org/CVERecord?id=CVE-2023-44466
       https://www.cve.org/CVERecord?id=CVE-2023-4132
       https://www.cve.org/CVERecord?id=CVE-2023-3611
       https://www.cve.org/CVERecord?id=CVE-2022-48502
       https://www.cve.org/CVERecord?id=CVE-2023-3865
       https://www.cve.org/CVERecord?id=CVE-2023-35001
       https://www.cve.org/CVERecord?id=CVE-2023-3776
       https://www.cve.org/CVERecord?id=CVE-2023-3863
       Fixed in 5.15.122:
       https://www.cve.org/CVERecord?id=CVE-2023-20593
       Fixed in 5.15.123:
       https://www.cve.org/CVERecord?id=CVE-2023-3777
       https://www.cve.org/CVERecord?id=CVE-2023-4004
       Fixed in 5.15.124:
       https://www.cve.org/CVERecord?id=CVE-2023-4015
       https://www.cve.org/CVERecord?id=CVE-2023-4147
       https://www.cve.org/CVERecord?id=CVE-2023-1206
       Fixed in 5.15.125:
       https://www.cve.org/CVERecord?id=CVE-2022-40982
       https://www.cve.org/CVERecord?id=CVE-2023-20569
       Fixed in 5.15.126:
       https://www.cve.org/CVERecord?id=CVE-2023-20588
       https://www.cve.org/CVERecord?id=CVE-2023-4128
       https://www.cve.org/CVERecord?id=CVE-2023-4208
       https://www.cve.org/CVERecord?id=CVE-2023-4206
       https://www.cve.org/CVERecord?id=CVE-2023-4207
       https://www.cve.org/CVERecord?id=CVE-2023-40283
       Fixed in 5.15.128:
       https://www.cve.org/CVERecord?id=CVE-2023-4569
       https://www.cve.org/CVERecord?id=CVE-2023-39194
       https://www.cve.org/CVERecord?id=CVE-2023-4273
       https://www.cve.org/CVERecord?id=CVE-2023-3772
       Fixed in 5.15.132:
       https://www.cve.org/CVERecord?id=CVE-2023-4921
       https://www.cve.org/CVERecord?id=CVE-2023-4623
       https://www.cve.org/CVERecord?id=CVE-2023-42753
       https://www.cve.org/CVERecord?id=CVE-2023-42752
       https://www.cve.org/CVERecord?id=CVE-2023-39189
       https://www.cve.org/CVERecord?id=CVE-2023-4881
       https://www.cve.org/CVERecord?id=CVE-2023-45871
       https://www.cve.org/CVERecord?id=CVE-2023-39193
       https://www.cve.org/CVERecord?id=CVE-2023-39192
       Fixed in 5.15.133:
       https://www.cve.org/CVERecord?id=CVE-2023-42755
       Fixed in 5.15.134:
       https://www.cve.org/CVERecord?id=CVE-2023-42754
       https://www.cve.org/CVERecord?id=CVE-2023-4563
       https://www.cve.org/CVERecord?id=CVE-2023-4244
       https://www.cve.org/CVERecord?id=CVE-2023-5197
       Fixed in 5.15.135:
       https://www.cve.org/CVERecord?id=CVE-2023-34324
       https://www.cve.org/CVERecord?id=CVE-2023-31085
       https://www.cve.org/CVERecord?id=CVE-2023-5158
       Fixed in 5.15.136:
       https://www.cve.org/CVERecord?id=CVE-2023-35827
       Fixed in 5.15.137:
       https://www.cve.org/CVERecord?id=CVE-2023-46813
       https://www.cve.org/CVERecord?id=CVE-2023-5717
       https://www.cve.org/CVERecord?id=CVE-2023-5178
       (* Security fix *)
patches/packages/mozilla-firefox-115.5.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       Thanks to zuriel for the taskbar icon fix on Wayland. :-)
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-50/
       https://www.cve.org/CVERecord?id=CVE-2023-6204
       https://www.cve.org/CVERecord?id=CVE-2023-6205
       https://www.cve.org/CVERecord?id=CVE-2023-6206
       https://www.cve.org/CVERecord?id=CVE-2023-6207
       https://www.cve.org/CVERecord?id=CVE-2023-6208
       https://www.cve.org/CVERecord?id=CVE-2023-6209
       https://www.cve.org/CVERecord?id=CVE-2023-6212
       (* Security fix *)
+--------------------------+
Sat Nov 18 19:26:33 UTC 2023
patches/packages/ca-certificates-20231117-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Thu Nov 16 20:51:47 UTC 2023
patches/packages/gegl-0.4.46-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release, needed by the GIMP upgrade.
patches/packages/gimp-2.10.36-i586-1_slack15.0.txz: Upgraded.
       This release fixes security issues:
       If a user loads a malicious DDS, PSD, or PSP file, this could result in a
       program crash or possibly the execution of arbitrary code.
       Please note that this package also requires the updated gegl package.
       Thanks to henca for the heads-up.
       For more information, see:
       https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/
       https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
       https://www.zerodayinitiative.com/advisories/ZDI-23-1592/
       https://www.zerodayinitiative.com/advisories/ZDI-23-1593/
       https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444
       (* Security fix *)
+--------------------------+
Wed Nov 15 22:01:26 UTC 2023
patches/packages/mozilla-thunderbird-115.4.3-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.4.3/releasenotes/
+--------------------------+
Tue Nov 14 21:22:47 UTC 2023
patches/packages/mariadb-10.5.23-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Vulnerability allows high privileged attacker with network access via
       multiple protocols to compromise the server. Successful attacks of this
       vulnerability can result in unauthorized ability to cause a hang or
       frequently repeatable crash.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084
       (* Security fix *)
+--------------------------+
Mon Nov 13 19:20:40 UTC 2023
extra/tigervnc/tigervnc-1.12.0-i586-4_slack15.0.txz: Rebuilt.
       Recompiled against xorg-server-1.20.14, including patches for several
       security issues. Thanks to marav.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-3550
       https://www.cve.org/CVERecord?id=CVE-2022-3551
       https://www.cve.org/CVERecord?id=CVE-2022-3553
       https://www.cve.org/CVERecord?id=CVE-2022-4283
       https://www.cve.org/CVERecord?id=CVE-2022-46340
       https://www.cve.org/CVERecord?id=CVE-2022-46341
       https://www.cve.org/CVERecord?id=CVE-2022-46342
       https://www.cve.org/CVERecord?id=CVE-2022-46343
       https://www.cve.org/CVERecord?id=CVE-2022-46344
       https://www.cve.org/CVERecord?id=CVE-2023-0494
       https://www.cve.org/CVERecord?id=CVE-2023-1393
       https://www.cve.org/CVERecord?id=CVE-2023-5367
       https://www.cve.org/CVERecord?id=CVE-2023-5380
       (* Security fix *)
+--------------------------+
Fri Nov 10 18:46:44 UTC 2023
patches/packages/whois-5.5.20-i586-1_slack15.0.txz: Upgraded.
       Added the .gn TLD server.
       Removed 6 new gTLDs which are no longer active.
+--------------------------+
Wed Nov 8 22:04:25 UTC 2023
patches/packages/mozilla-thunderbird-115.4.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.4.2/releasenotes/
patches/packages/sudo-1.9.15p1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release:
       Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based sudoers
       from being able to read the ldap.conf file.
+--------------------------+
Tue Nov 7 19:57:12 UTC 2023
patches/packages/sudo-1.9.15-i586-1_slack15.0.txz: Upgraded.
       The sudoers plugin has been modified to make it more resilient to ROWHAMMER
       attacks on authentication and policy matching.
       The sudoers plugin now constructs the user time stamp file path name using
       the user-ID instead of the user name. This avoids a potential problem with
       user names that contain a path separator ('/') being interpreted as part of
       the path name.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-42465
       https://www.cve.org/CVERecord?id=CVE-2023-42456
       (* Security fix *)
+--------------------------+
Tue Oct 31 18:49:18 UTC 2023
extra/php81/php81-8.1.25-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.25
+--------------------------+
Thu Oct 26 19:55:16 UTC 2023
patches/packages/mozilla-thunderbird-115.4.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.4.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-47/
       https://www.cve.org/CVERecord?id=CVE-2023-5721
       https://www.cve.org/CVERecord?id=CVE-2023-5732
       https://www.cve.org/CVERecord?id=CVE-2023-5724
       https://www.cve.org/CVERecord?id=CVE-2023-5725
       https://www.cve.org/CVERecord?id=CVE-2023-5726
       https://www.cve.org/CVERecord?id=CVE-2023-5727
       https://www.cve.org/CVERecord?id=CVE-2023-5728
       https://www.cve.org/CVERecord?id=CVE-2023-5730
       (* Security fix *)
patches/packages/xorg-server-1.20.14-i586-9_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       OOB write in XIChangeDeviceProperty/RRChangeOutputProperty.
       Use-after-free bug in DestroyWindow.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-October/003430.html
       https://www.cve.org/CVERecord?id=CVE-2023-5367
       https://www.cve.org/CVERecord?id=CVE-2023-5380
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-9_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-9_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-9_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-8_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       OOB write in XIChangeDeviceProperty/RRChangeOutputProperty.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-October/003430.html
       https://www.cve.org/CVERecord?id=CVE-2023-5367
       (* Security fix *)
+--------------------------+
Tue Oct 24 22:26:20 UTC 2023
patches/packages/mozilla-firefox-115.4.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.4.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-46/
       https://www.cve.org/CVERecord?id=CVE-2023-5721
       https://www.cve.org/CVERecord?id=CVE-2023-5732
       https://www.cve.org/CVERecord?id=CVE-2023-5724
       https://www.cve.org/CVERecord?id=CVE-2023-5725
       https://www.cve.org/CVERecord?id=CVE-2023-5726
       https://www.cve.org/CVERecord?id=CVE-2023-5727
       https://www.cve.org/CVERecord?id=CVE-2023-5728
       https://www.cve.org/CVERecord?id=CVE-2023-5730
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.4.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.4.0/releasenotes/
patches/packages/vim-9.0.2063-i586-1_slack15.0.txz: Upgraded.
       Fixed use-after-free security issue.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-5535
       (* Security fix *)
patches/packages/vim-gvim-9.0.2063-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Sun Oct 22 19:30:42 UTC 2023
patches/packages/LibRaw-0.20.2-i586-4_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       A Buffer Overflow vulnerability was found in LibRaw_buffer_datastream::
       gets(char*, int), which could lead to privilege escalation or application
       crash.
       A heap-buffer-overflow was found in raw2image_ex(int), which may lead to
       application crash by maliciously crafted input file.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2021-32142
       https://www.cve.org/CVERecord?id=CVE-2023-1729
       (* Security fix *)
+--------------------------+
Thu Oct 19 19:14:05 UTC 2023
patches/packages/httpd-2.4.58-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       moderate: Apache HTTP Server: HTTP/2 stream memory not reclaimed
       right away on RST.
       low: mod_macro buffer over-read.
       low: Apache HTTP Server: DoS in HTTP/2 with initial windows size 0.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.58
       https://www.cve.org/CVERecord?id=CVE-2023-45802
       https://www.cve.org/CVERecord?id=CVE-2023-31122
       https://www.cve.org/CVERecord?id=CVE-2023-43622
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.3.3-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.3.3/releasenotes/
+--------------------------+
Tue Oct 17 19:34:56 UTC 2023
patches/packages/util-linux-2.37.4-i586-2_slack15.0.txz: Rebuilt.
       Copy /etc/pam.d/login to /etc/pam.d/remote. This is needed for /bin/login's
       '-h' option, used (for example) by telnetd. If -h is used without
       /etc/pam.d/remote, pam will not be configured properly, and /etc/securetty
       will be ignored, possibly allowing root to login from a tty that is not
       considered secure. Of course, the usual disclaimers about the security of
       telnet/telnetd apply.
       Thanks to HytronBG and Petri Kaukasoina.
       (* Security fix *)
+--------------------------+
Wed Oct 11 22:22:40 UTC 2023
patches/packages/libcaca-0.99.beta20-i586-1_slack15.0.txz: Upgraded.
       Fixed a crash bug (a crafted file defining width of zero leads to divide by
       zero and a crash). Seems to be merely a bug rather than a security issue, but
       I'd been meaning to get beta20 building so this was a good excuse.
       Thanks to marav.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-0856
       (* Security fix *)
+--------------------------+
Wed Oct 11 06:37:21 UTC 2023
patches/packages/curl-8.4.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Cookie injection with none file.
       SOCKS5 heap buffer overflow.
       For more information, see:
       https://curl.se/docs/CVE-2023-38546.html
       https://curl.se/docs/CVE-2023-38545.html
       https://www.cve.org/CVERecord?id=CVE-2023-38546
       https://www.cve.org/CVERecord?id=CVE-2023-38545
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.3.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.3.2/releasenotes/
patches/packages/nghttp2-1.57.0-i586-1_slack15.0.txz: Upgraded.
       This release has a fix to mitigate the HTTP/2 Rapid Reset vulnerability.
       For more information, see:
       https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
       https://www.cve.org/CVERecord?id=CVE-2023-44487
       (* Security fix *)
patches/packages/samba-4.18.8-i586-1_slack15.0.txz: Upgraded.
       This is a security release in order to address the following defects:
       Unsanitized pipe names allow SMB clients to connect as root to existing
       unix domain sockets on the file system.
       SMB client can truncate files to 0 bytes by opening files with OVERWRITE
       disposition when using the acl_xattr Samba VFS module with the smb.conf
       setting "acl_xattr:ignore system acls = yes"
       An RODC and a user with the GET_CHANGES right can view all attributes,
       including secrets and passwords. Additionally, the access check fails
       open on error conditions.
       Calls to the rpcecho server on the AD DC can request that the server block
       for a user-defined amount of time, denying service.
       Samba can be made to start multiple incompatible RPC listeners, disrupting
       service on the AD DC.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2023-3961.html
       https://www.samba.org/samba/security/CVE-2023-4091.html
       https://www.samba.org/samba/security/CVE-2023-4154.html
       https://www.samba.org/samba/security/CVE-2023-42669.html
       https://www.samba.org/samba/security/CVE-2023-42670.html
       https://www.cve.org/CVERecord?id=CVE-2023-3961
       https://www.cve.org/CVERecord?id=CVE-2023-4091
       https://www.cve.org/CVERecord?id=CVE-2023-4154
       https://www.cve.org/CVERecord?id=CVE-2023-42669
       https://www.cve.org/CVERecord?id=CVE-2023-42670
       (* Security fix *)
+--------------------------+
Tue Oct 10 19:27:56 UTC 2023
patches/packages/libcue-2.2.1-i586-4_slack15.0.txz: Rebuilt.
       Fixed a bug which could allow memory corruption resulting in arbitrary
       code execution.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-43641
       (* Security fix *)
patches/packages/libnotify-0.8.3-i586-1_slack15.0.txz: Upgraded.
       This release contains a critical stability/minor security update which
       affects Electron applications that utilize Portal notifications (eg,
       through Flatpak). It is highly recommended that all users of libnotify
       0.8.x update to this release.
       (* Security fix *)
+--------------------------+
Mon Oct 9 18:10:01 UTC 2023
patches/packages/wayland-1.22.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/whois-5.5.19-i586-1_slack15.0.txz: Upgraded.
       Fixed english support for Japanese queries to not add again the /e argument
       if it had already been provided by the user. (Closes: #1050171)
       Added the .ye and .*************** (.xn--54b7fta0cc, Bangladesh) TLD servers.
       Updated the .ba, .bb, .dk, .es, .gt, .jo, .ml, .mo, .pa, .pn, .sv, .uy,
       .a+-la-r+-d+.n+, (.xn--mgbayh7gpa, Jordan) and .****** (.xn--mix891f, Macao)
       TLD servers.
       Upgraded the TLD URLs to HTTPS whenever possible.
       Updated the charset for whois.jprs.jp.
       Removed 3 new gTLDs which are no longer active.
       Removed support for the obsolete as32 dot notation.
+--------------------------+
Fri Oct 6 21:28:34 UTC 2023
patches/packages/netatalk-3.1.18-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Harden create_appledesktop_folder().
       For more information, see:
       https://netatalk.sourceforge.io/CVE-2022-22995.php
       https://www.cve.org/CVERecord?id=CVE-2022-22995
       (* Security fix *)
+--------------------------+
Tue Oct 3 22:19:10 UTC 2023
patches/packages/libX11-1.8.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       libX11: out-of-bounds memory access in _XkbReadKeySyms().
       libX11: stack exhaustion from infinite recursion in PutSubImage().
       libX11: integer overflow in XCreateImage() leading to a heap overflow.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-October/003424.html
       https://www.cve.org/CVERecord?id=CVE-2023-43785
       https://www.cve.org/CVERecord?id=CVE-2023-43786
       https://www.cve.org/CVERecord?id=CVE-2023-43787
       (* Security fix *)
patches/packages/libXpm-3.5.17-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       libXpm: out of bounds read in XpmCreateXpmImageFromBuffer().
       libXpm: out of bounds read on XPM with corrupted colormap.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-October/003424.html
       https://www.cve.org/CVERecord?id=CVE-2023-43788
       https://www.cve.org/CVERecord?id=CVE-2023-43789
       (* Security fix *)
+--------------------------+
Sat Sep 30 21:33:49 UTC 2023
patches/packages/libvpx-1.12.0-i586-1_slack15.0.txz: Upgraded.
       This release contains two security related fixes -- one each for VP8 and VP9.
       For more information, see:
       https://crbug.com/1486441
       https://www.cve.org/CVERecord?id=CVE-2023-5217
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.3.1-i686-1_slack15.0.txz: Upgraded.
       This release contains a security fix for a critical heap buffer overflow in
       the libvpx VP8 encoder.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.3.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
       https://www.cve.org/CVERecord?id=CVE-2023-5217
       (* Security fix *)
+--------------------------+
Thu Sep 28 21:37:06 UTC 2023
extra/php81/php81-8.1.24-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.24
patches/packages/mozilla-firefox-115.3.1esr-i686-1_slack15.0.txz: Upgraded.
       This update contains a security fix.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.3.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
       https://www.cve.org/CVERecord?id=CVE-2023-5217
       (* Security fix *)
+--------------------------+
Wed Sep 27 23:51:07 UTC 2023
patches/packages/mozilla-thunderbird-115.3.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.3.0/releasenotes/
+--------------------------+
Tue Sep 26 19:30:21 UTC 2023
patches/packages/Cython-0.29.36-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/mozilla-firefox-115.3.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.3.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-42/
       https://www.cve.org/CVERecord?id=CVE-2023-5168
       https://www.cve.org/CVERecord?id=CVE-2023-5169
       https://www.cve.org/CVERecord?id=CVE-2023-5171
       https://www.cve.org/CVERecord?id=CVE-2023-5174
       https://www.cve.org/CVERecord?id=CVE-2023-5176
       (* Security fix *)
+--------------------------+
Thu Sep 21 19:32:42 UTC 2023
patches/packages/bind-9.16.44-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Limit the amount of recursion that can be performed by isccc_cc_fromwire.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-3341
       https://www.cve.org/CVERecord?id=CVE-2023-3341
       (* Security fix *)
patches/packages/cups-2.4.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Fixed Heap-based buffer overflow when reading Postscript in PPD files.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-4504
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.2.3-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.2.3/releasenotes/
patches/packages/seamonkey-2.53.17.1-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.17.1
       https://www.cve.org/CVERecord?id=CVE-2023-4863
       (* Security fix *)
testing/packages/bind-9.18.19-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Limit the amount of recursion that can be performed by isccc_cc_fromwire.
       Fix use-after-free error in TLS DNS code when sending data.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-3341
       https://www.cve.org/CVERecord?id=CVE-2023-3341
       https://kb.isc.org/docs/cve-2023-4236
       https://www.cve.org/CVERecord?id=CVE-2023-4236
       (* Security fix *)
+--------------------------+
Mon Sep 18 18:40:04 UTC 2023
patches/packages/netatalk-3.1.17-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Validate data type in dalloc_value_for_key(). This flaw could allow a
       malicious actor to cause Netatalk's afpd daemon to crash, or possibly to
       execute arbitrary code.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-42464
       (* Security fix *)
+--------------------------+
Fri Sep 15 19:48:39 UTC 2023
patches/packages/python3-3.9.18-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Fixed an issue where instances of ssl.SSLSocket were vulnerable to a bypass
       of the TLS handshake and included protections (like certificate verification)
       and treating sent unencrypted data as if it were post-handshake TLS encrypted
       data. Security issue reported by Aapo Oksman; patch by Gregory P. Smith.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-40217
       (* Security fix *)
+--------------------------+
Thu Sep 14 21:10:50 UTC 2023
patches/packages/libwebp-1.3.2-i586-1_slack15.0.txz: Upgraded.
       Security fix for lossless decoder (chromium: #1479274, CVE-2023-4863).
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-4863
       (* Security fix *)
+--------------------------+
Thu Sep 14 02:38:14 UTC 2023
patches/packages/curl-8.3.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       HTTP headers eat all memory.
       https://curl.se/docs/CVE-2023-38039.html
       https://www.cve.org/CVERecord?id=CVE-2023-38039
       (* Security fix *)
patches/packages/libarchive-3.7.2-i586-1_slack15.0.txz: Upgraded.
       This update fixes multiple security vulnerabilities in the PAX writer:
       Heap overflow in url_encode() in archive_write_set_format_pax.c.
       NULL dereference in archive_write_pax_header_xattrs().
       Another NULL dereference in archive_write_pax_header_xattrs().
       NULL dereference in archive_write_pax_header_xattr().
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.2.2-i686-1_slack15.0.txz: Upgraded.
       This release contains a security fix for a critical heap buffer overflow.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.2.2/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
       https://www.cve.org/CVERecord?id=CVE-2023-4863
       (* Security fix *)
patches/packages/netatalk-3.1.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues.
       Shared library .so-version bump.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-23121
       https://www.cve.org/CVERecord?id=CVE-2022-23123
       (* Security fix *)
+--------------------------+
Wed Sep 13 01:32:01 UTC 2023
patches/packages/mozilla-firefox-115.2.1esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.2.1/releasenotes/
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.2.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.2.1/releasenotes/
+--------------------------+
Mon Sep 11 20:19:30 UTC 2023
patches/packages/openssl-1.1.1w-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue that does not affect Linux:
       Fix POLY1305 MAC implementation corrupting XMM registers on Windows.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-4807
patches/packages/openssl-solibs-1.1.1w-i586-1_slack15.0.txz: Upgraded.
patches/packages/vim-9.0.1897-i586-1_slack15.0.txz: Upgraded.
       Fixed three use-after-free security issues.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-4733
       https://www.cve.org/CVERecord?id=CVE-2023-4752
       https://www.cve.org/CVERecord?id=CVE-2023-4750
       (* Security fix *)
patches/packages/vim-gvim-9.0.1897-i586-1_slack15.0.txz: Upgraded.
       Fixed three use-after-free security issues.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-4733
       https://www.cve.org/CVERecord?id=CVE-2023-4752
       https://www.cve.org/CVERecord?id=CVE-2023-4750
       (* Security fix *)
+--------------------------+
Sun Sep 3 19:37:21 UTC 2023
patches/packages/rocs-21.12.1-i586-2_slack15.0.txz: Rebuilt.
       Fix crash on startup. Thanks to Lockywolf and ponce.
+--------------------------+
Fri Sep 1 20:16:14 UTC 2023
extra/php81/php81-8.1.23-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.23
+--------------------------+
Wed Aug 30 21:58:04 UTC 2023
patches/packages/mozilla-firefox-115.2.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.2.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-36/
       https://www.cve.org/CVERecord?id=CVE-2023-4573
       https://www.cve.org/CVERecord?id=CVE-2023-4574
       https://www.cve.org/CVERecord?id=CVE-2023-4575
       https://www.cve.org/CVERecord?id=CVE-2023-4576
       https://www.cve.org/CVERecord?id=CVE-2023-4577
       https://www.cve.org/CVERecord?id=CVE-2023-4051
       https://www.cve.org/CVERecord?id=CVE-2023-4578
       https://www.cve.org/CVERecord?id=CVE-2023-4053
       https://www.cve.org/CVERecord?id=CVE-2023-4580
       https://www.cve.org/CVERecord?id=CVE-2023-4581
       https://www.cve.org/CVERecord?id=CVE-2023-4582
       https://www.cve.org/CVERecord?id=CVE-2023-4583
       https://www.cve.org/CVERecord?id=CVE-2023-4584
       https://www.cve.org/CVERecord?id=CVE-2023-4585
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.2.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.2.0/releasenotes/
       (* Security fix *)
+--------------------------+
Wed Aug 16 20:45:00 UTC 2023
patches/packages/mozilla-thunderbird-115.1.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.1.1/releasenotes/
+--------------------------+
Mon Aug 14 19:04:41 UTC 2023
patches/packages/mariadb-10.5.22-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://mariadb.com/kb/en/mariadb-10-5-22-changelog/
+--------------------------+
Mon Aug 7 19:22:02 UTC 2023
extra/php80/php80-8.0.30-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Security issue with external entity loading in XML without enabling it.
       Missing error check and insufficient random bytes in HTTP Digest
       authentication for SOAP.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247
       (* Security fix *)
patches/packages/vim-9.0.1678-i586-1_slack15.0.txz: Upgraded.
       Applied the last patches from Bram Moolenaar.
       RIP Bram, and thanks for your great work on VIM and your kindness to the
       orphan children in Uganda.
       If you'd like to honor Bram with a donation to his charity, please visit:
       https://iccf-holland.org/
patches/packages/vim-gvim-9.0.1678-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Fri Aug 4 20:17:36 UTC 2023
extra/php81/php81-8.1.22-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Libxml: Fixed bug GHSA-3qrf-m4j2-pcrr (Security issue with external entity
       loading in XML without enabling it).
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-3823
       (* Security fix *)
extra/rust-for-mozilla/rust-1.70.0-i686-1_slack15.0.txz: Upgraded.
       Upgraded the Rust compiler for Firefox 115.1.0 ESR and Thunderbird 115.1.0.
pasture/samba-4.15.13-i586-1_slack15.0.txz: Added.
       We'll hang onto this just in case.
patches/packages/mozilla-firefox-115.1.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/115.1.0esr/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/
       https://www.cve.org/CVERecord?id=CVE-2023-4045
       https://www.cve.org/CVERecord?id=CVE-2023-4046
       https://www.cve.org/CVERecord?id=CVE-2023-4047
       https://www.cve.org/CVERecord?id=CVE-2023-4048
       https://www.cve.org/CVERecord?id=CVE-2023-4049
       https://www.cve.org/CVERecord?id=CVE-2023-4050
       https://www.cve.org/CVERecord?id=CVE-2023-4052
       https://www.cve.org/CVERecord?id=CVE-2023-4054
       https://www.cve.org/CVERecord?id=CVE-2023-4055
       https://www.cve.org/CVERecord?id=CVE-2023-4056
       https://www.cve.org/CVERecord?id=CVE-2023-4057
       (* Security fix *)
patches/packages/mozilla-thunderbird-115.1.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/115.1.0/releasenotes/
patches/packages/samba-4.18.5-i586-1_slack15.0.txz: Upgraded.
       PLEASE NOTE: We are taking the unusual step of moving to the latest Samba
       branch because Windows has made changes that break Samba 4.15.x. The last
       4.15.x will be retained in /pasture as a fallback. There may be some
       required configuration changes with this, but we've kept using MIT Kerberos
       to try to have the behavior change as little as possible. Upgrade carefully.
       This update fixes security issues:
       When winbind is used for NTLM authentication, a maliciously crafted request
       can trigger an out-of-bounds read in winbind and possibly crash it.
       SMB2 packet signing is not enforced if an admin configured
       "server signing = required" or for SMB2 connections to Domain Controllers
       where SMB2 packet signing is mandatory.
       An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be
       triggered by an unauthenticated attacker by issuing a malformed RPC request.
       Missing type validation in Samba's mdssvc RPC service for Spotlight can be
       used by an unauthenticated attacker to trigger a process crash in a shared
       RPC mdssvc worker process.
       As part of the Spotlight protocol Samba discloses the server-side absolute
       path of shares and files and directories in search results.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2022-2127.html
       https://www.samba.org/samba/security/CVE-2023-3347.html
       https://www.samba.org/samba/security/CVE-2023-34966.html
       https://www.samba.org/samba/security/CVE-2023-34967.html
       https://www.samba.org/samba/security/CVE-2023-34968.html
       https://www.cve.org/CVERecord?id=CVE-2022-2127
       https://www.cve.org/CVERecord?id=CVE-2023-3347
       https://www.cve.org/CVERecord?id=CVE-2023-34966
       https://www.cve.org/CVERecord?id=CVE-2023-34967
       https://www.cve.org/CVERecord?id=CVE-2023-34968
       (* Security fix *)
+--------------------------+
Tue Aug 1 19:50:53 UTC 2023
patches/packages/openssl-1.1.1v-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Fix excessive time spent checking DH q parameter value.
       Fix DH_check() excessive time with over sized modulus.
       For more information, see:
       https://www.openssl.org/news/secadv/20230731.txt
       https://www.openssl.org/news/secadv/20230719.txt
       https://www.cve.org/CVERecord?id=CVE-2023-3817
       https://www.cve.org/CVERecord?id=CVE-2023-3446
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1v-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Mon Jul 31 21:52:46 UTC 2023
patches/packages/mozilla-thunderbird-102.13.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.13.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-28/
       https://www.cve.org/CVERecord?id=CVE-2023-3417
       (* Security fix *)
patches/packages/seamonkey-2.53.17-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.17
       (* Security fix *)
+--------------------------+
Wed Jul 26 19:26:39 UTC 2023
patches/packages/curl-8.2.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
testing/packages/mozilla-firefox-115.0.3esr-i686-1_slack15.0.txz: Added.
       This seems good to go, but a little testing won't hurt.
testing/packages/mozilla-thunderbird-115.0.1-i686-1_slack15.0.txz: Added.
       Here, like in -current, we're going to wait until upstream deems this ready
       to trigger the automatic update from earlier versions.
testing/packages/rust-1.70.0-i686-1_slack15.0.txz: Added.
       This will replace the package in /extra/rust-for-mozilla/ when the 115.x
       versions of Firefox and Thunderbird become the main ones in Slackware 15.0.
+--------------------------+
Tue Jul 25 19:45:27 UTC 2023
patches/packages/kernel-firmware-20230725_b6ea35f-noarch-1.txz: Upgraded.
       Restored license files and other documentation. Thanks to drumz.
+--------------------------+
Mon Jul 24 22:07:56 UTC 2023
patches/packages/kernel-firmware-20230724_59fbffa-noarch-1.txz: Upgraded.
       AMD microcode updated to fix a use-after-free in AMD Zen2 processors.
       From Tavis Ormandy's annoucement of the issue:
       "The practical result here is that you can spy on the registers of other
       processes. No system calls or privileges are required.
       It works across virtual machines and affects all operating systems.
       I have written a poc for this issue that's fast enough to reconstruct
       keys and passwords as users log in."
       For more information, see:
       https://seclists.org/oss-sec/2023/q3/59
       https://www.cve.org/CVERecord?id=CVE-2023-20593
       (* Security fix *)
+--------------------------+
Mon Jul 24 00:17:18 UTC 2023
patches/packages/whois-5.5.18-i586-1_slack15.0.txz: Upgraded.
       Updated the .ga TLD server.
       Added new recovered IPv4 allocations.
       Removed the delegation of 43.0.0.0/8 to JPNIC.
       Removed 12 new gTLDs which are no longer active.
       Improved the man page source, courtesy of Bjarni Ingi Gislason.
       Added the .edu.za SLD server.
       Updated the .alt.za SLD server.
       Added the -ru and -su NIC handles servers.
+--------------------------+
Fri Jul 21 19:35:45 UTC 2023
patches/packages/ca-certificates-20230721-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Wed Jul 19 20:36:46 UTC 2023
patches/packages/curl-8.2.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       fopen race condition.
       For more information, see:
       https://curl.se/docs/CVE-2023-32001.html
       https://www.cve.org/CVERecord?id=CVE-2023-32001
       (* Security fix *)
patches/packages/openssh-9.3p2-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       ssh-agent(1) in OpenSSH between and 5.5 and 9.3p1 (inclusive): remote code
       execution relating to PKCS#11 providers.
       The PKCS#11 support ssh-agent(1) could be abused to achieve remote code
       execution via a forwarded agent socket if the following conditions are met:
       * Exploitation requires the presence of specific libraries on the victim
       system.
       * Remote exploitation requires that the agent was forwarded to an
       attacker-controlled system.
       Exploitation can also be prevented by starting ssh-agent(1) with an empty
       PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring an allowlist that
       contains only specific provider libraries.
       This vulnerability was discovered and demonstrated to be exploitable by the
       Qualys Security Advisory team.
       Potentially-incompatible changes:
       * ssh-agent(8): the agent will now refuse requests to load PKCS#11 modules
       issued by remote clients by default. A flag has been added to restore the
       previous behaviour: "-Oallow-remote-pkcs11".
       For more information, see:
       https://www.openssh.com/txt/release-9.3p2
       https://www.cve.org/CVERecord?id=CVE-2023-38408
       (* Security fix *)
+--------------------------+
Mon Jul 17 19:17:19 UTC 2023
patches/packages/sudo-1.9.14p2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Wed Jul 12 20:41:16 UTC 2023
patches/packages/krb5-1.19.2-i586-4_slack15.0.txz: Rebuilt.
       Fix potential uninitialized pointer free in kadm5 XDR parsing.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-36054
       (* Security fix *)
patches/packages/sudo-1.9.14p1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Fri Jul 7 23:06:07 UTC 2023
patches/packages/mozilla-thunderbird-102.13.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.13.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-24/
       https://www.cve.org/CVERecord?id=CVE-2023-37201
       https://www.cve.org/CVERecord?id=CVE-2023-37202
       https://www.cve.org/CVERecord?id=CVE-2023-37207
       https://www.cve.org/CVERecord?id=CVE-2023-37208
       https://www.cve.org/CVERecord?id=CVE-2023-37211
       (* Security fix *)
+--------------------------+
Tue Jul 4 20:26:12 UTC 2023
patches/packages/mozilla-firefox-102.13.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.13.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-23/
       https://www.cve.org/CVERecord?id=CVE-2023-37201
       https://www.cve.org/CVERecord?id=CVE-2023-37202
       https://www.cve.org/CVERecord?id=CVE-2023-37207
       https://www.cve.org/CVERecord?id=CVE-2023-37208
       https://www.cve.org/CVERecord?id=CVE-2023-37211
       (* Security fix *)
+--------------------------+
Mon Jun 26 19:44:44 UTC 2023
patches/packages/network-scripts-15.0-noarch-19_slack15.0.txz: Rebuilt.
       This update fixes a bug and adds a new feature:
       Re-add support for the DHCP_IPADDR parameter from rc.inet1.conf.
       Expand the help text for DHCP_IPADDR in rc.inet1.conf.
       Add support for a DHCP_OPTS parameter.
       Thanks to ljb643 and Darren 'Tadgy' Austin.
patches/packages/vim-9.0.1667-i586-1_slack15.0.txz: Upgraded.
       This fixes a rare divide-by-zero bug that could cause vim to crash. In an
       interactive program such as vim, I can't really see this qualifying as a
       security issue, but since it was brought up as such on LQ we'll just go
       along with it this time. :)
       Thanks to marav for the heads-up.
       (* Security fix *)
patches/packages/vim-gvim-9.0.1667-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Sat Jun 24 00:16:22 UTC 2023
patches/packages/linux-5.15.117/*: Upgraded.
       We're going to back up one version to avoid an amdgpu regression in 5.15.118.
       If you're already using 5.15.118 without issues, feel free to stick with it.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
+--------------------------+
Thu Jun 22 19:07:50 UTC 2023
patches/packages/cups-2.4.6-i586-1_slack15.0.txz: Upgraded.
       Fixed use-after-free when logging warnings in case of failures
       in cupsdAcceptClient().
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-34241
       (* Security fix *)
+--------------------------+
Thu Jun 22 01:54:11 UTC 2023
patches/packages/bind-9.16.42-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Exceeding the recursive-clients quota may cause named to terminate
       unexpectedly when stale-answer-client-timeout is set to 0.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-2911
       https://www.cve.org/CVERecord?id=CVE-2023-2911
       (* Security fix *)
patches/packages/kernel-firmware-20230620_045b213-noarch-1.txz: Upgraded.
patches/packages/linux-5.15.118/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.93:
       https://www.cve.org/CVERecord?id=CVE-2023-2162
       https://www.cve.org/CVERecord?id=CVE-2023-32269
       Fixed in 5.15.94:
       https://www.cve.org/CVERecord?id=CVE-2023-1078
       https://www.cve.org/CVERecord?id=CVE-2022-27672
       Fixed in 5.15.95:
       https://www.cve.org/CVERecord?id=CVE-2023-1513
       https://www.cve.org/CVERecord?id=CVE-2023-1281
       https://www.cve.org/CVERecord?id=CVE-2023-26545
       Fixed in 5.15.96:
       https://www.cve.org/CVERecord?id=CVE-2023-0459
       https://www.cve.org/CVERecord?id=CVE-2022-3707
       https://www.cve.org/CVERecord?id=CVE-2022-2196
       Fixed in 5.15.99:
       https://www.cve.org/CVERecord?id=CVE-2023-2985
       https://www.cve.org/CVERecord?id=CVE-2023-1079
       https://www.cve.org/CVERecord?id=CVE-2023-25012
       https://www.cve.org/CVERecord?id=CVE-2023-1076
       https://www.cve.org/CVERecord?id=CVE-2023-1077
       https://www.cve.org/CVERecord?id=CVE-2023-1118
       Fixed in 5.15.100:
       https://www.cve.org/CVERecord?id=CVE-2023-23004
       https://www.cve.org/CVERecord?id=CVE-2023-1829
       Fixed in 5.15.104:
       https://www.cve.org/CVERecord?id=CVE-2023-30456
       https://www.cve.org/CVERecord?id=CVE-2023-2235
       https://www.cve.org/CVERecord?id=CVE-2023-1855
       https://www.cve.org/CVERecord?id=CVE-2023-1990
       Fixed in 5.15.105:
       https://www.cve.org/CVERecord?id=CVE-2023-2483
       https://www.cve.org/CVERecord?id=CVE-2023-30772
       https://www.cve.org/CVERecord?id=CVE-2023-33203
       https://www.cve.org/CVERecord?id=CVE-2023-33288
       https://www.cve.org/CVERecord?id=CVE-2022-4379
       https://www.cve.org/CVERecord?id=CVE-2023-1670
       https://www.cve.org/CVERecord?id=CVE-2022-4269
       https://www.cve.org/CVERecord?id=CVE-2023-1989
       https://www.cve.org/CVERecord?id=CVE-2023-28466
       https://www.cve.org/CVERecord?id=CVE-2023-2194
       Fixed in 5.15.106:
       https://www.cve.org/CVERecord?id=CVE-2023-1611
       Fixed in 5.15.108:
       https://www.cve.org/CVERecord?id=CVE-2023-1859
       Fixed in 5.15.109:
       https://www.cve.org/CVERecord?id=CVE-2023-2156
       https://www.cve.org/CVERecord?id=CVE-2023-31436
       https://www.cve.org/CVERecord?id=CVE-2023-2248
       Fixed in 5.15.110:
       https://www.cve.org/CVERecord?id=CVE-2023-1380
       https://www.cve.org/CVERecord?id=CVE-2023-2002
       Fixed in 5.15.111:
       https://www.cve.org/CVERecord?id=CVE-2023-32233
       https://www.cve.org/CVERecord?id=CVE-2023-2269
       Fixed in 5.15.112:
       https://www.cve.org/CVERecord?id=CVE-2023-34256
       Fixed in 5.15.113:
       https://www.cve.org/CVERecord?id=CVE-2022-48425
       (* Security fix *)
testing/packages/bind-9.18.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Exceeding the recursive-clients quota may cause named to terminate
       unexpectedly when stale-answer-client-timeout is set to 0.
       For more information, see:
       https://kb.isc.org/docs/cve-2023-2911
       https://www.cve.org/CVERecord?id=CVE-2023-2911
       (* Security fix *)
+--------------------------+
Thu Jun 15 18:59:33 UTC 2023
patches/packages/libX11-1.8.6-i586-1_slack15.0.txz: Upgraded.
       This update fixes buffer overflows in InitExt.c that could at least cause
       the client to crash due to memory corruption.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-3138
       (* Security fix *)
+--------------------------+
Wed Jun 14 21:43:32 UTC 2023
patches/packages/cups-2.4.5-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/ksh93-1.0.6-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Fri Jun 9 01:06:21 UTC 2023
extra/php81/php81-8.1.20-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.20
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.12.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.12.0/releasenotes/
       (* Security fix *)
patches/packages/python3-3.9.17-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       urllib.parse.urlsplit() now strips leading C0 control and space characters
       following the specification for URLs defined by WHATWG.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-24329
       (* Security fix *)
+--------------------------+
Wed Jun 7 21:12:41 UTC 2023
patches/packages/cups-2.4.4-i586-1_slack15.0.txz: Upgraded.
       This update is a hotfix for a segfault in cupsGetNamedDest(), when caller
       tries to find the default destination and the default destination is not set
       on the machine.
patches/packages/ksh93-1.0.5_20230607_9b251344-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix and robustness enhancement release.
       Thanks to McDutchie for the great work!
       Thanks to pghvlaans for improvements to the build script.
+--------------------------+
Tue Jun 6 20:26:59 UTC 2023
extra/sendmail/sendmail-8.17.2-i586-2_slack15.0.txz: Rebuilt.
       Recompiled without -DUSE_EAI or ICU libraries as this experimental option
       is still leading to regressions.
extra/sendmail/sendmail-cf-8.17.2-noarch-2_slack15.0.txz: Rebuilt.
patches/packages/mozilla-firefox-102.12.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.12.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-19/
       https://www.cve.org/CVERecord?id=CVE-2023-34414
       https://www.cve.org/CVERecord?id=CVE-2023-34416
       (* Security fix *)
patches/packages/ntp-4.2.8p17-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sun Jun 4 19:16:13 UTC 2023
extra/sendmail/sendmail-8.17.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
extra/sendmail/sendmail-cf-8.17.2-noarch-1_slack15.0.txz: Upgraded.
patches/packages/libmilter-8.17.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Fri Jun 2 20:56:35 UTC 2023
patches/packages/cups-2.4.3-i586-1_slack15.0.txz: Upgraded.
       Fixed a heap buffer overflow in _cups_strlcpy(), when the configuration file
       cupsd.conf sets the value of loglevel to DEBUG, that could allow a remote
       attacker to launch a denial of service (DoS) attack, or possibly execute
       arbirary code.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-32324
       (* Security fix *)
patches/packages/ntp-4.2.8p16-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-26551
       https://www.cve.org/CVERecord?id=CVE-2023-26552
       https://www.cve.org/CVERecord?id=CVE-2023-26553
       https://www.cve.org/CVERecord?id=CVE-2023-26554
       https://www.cve.org/CVERecord?id=CVE-2023-26555
       (* Security fix *)
+--------------------------+
Wed May 31 01:29:12 UTC 2023
patches/packages/curl-8.1.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/openssl-1.1.1u-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Possible DoS translating ASN.1 object identifiers.
       For more information, see:
       https://www.openssl.org/news/secadv/20230530.txt
       https://www.cve.org/CVERecord?id=CVE-2023-2650
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1u-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Sat May 27 20:42:29 UTC 2023
patches/packages/mozilla-thunderbird-102.11.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.11.2/releasenotes/
+--------------------------+
Thu May 25 19:04:56 UTC 2023
patches/packages/mozilla-thunderbird-102.11.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.11.1/releasenotes/
patches/packages/ntfs-3g-2022.10.3-i586-1_slack15.0.txz: Upgraded.
       Fixed vulnerabilities that may allow an attacker using a maliciously
       crafted NTFS-formatted image file or external storage to potentially
       execute arbitrary privileged code or cause a denial of service.
       Thanks to opty.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40284
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30789
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30788
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30787
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30786
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30785
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30784
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30783
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46790
       (* Security fix *)
+--------------------------+
Thu May 25 00:24:33 UTC 2023
patches/packages/curl-8.1.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/texlive-2023.230322-i586-1_slack15.0.txz: Upgraded.
       This update patches a security issue:
       LuaTeX before 1.17.0 allows execution of arbitrary shell commands when
       compiling a TeX file obtained from an untrusted source. This occurs
       because luatex-core.lua lets the original io.popen be accessed. This also
       affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
       Thanks to Johannes Schoepfer.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-32700
       (* Security fix *)
+--------------------------+
Mon May 22 19:05:02 UTC 2023
patches/packages/c-ares-1.19.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       0-byte UDP payload causes Denial of Service.
       Insufficient randomness in generation of DNS query IDs.
       Buffer Underwrite in ares_inet_net_pton().
       AutoTools does not set CARES_RANDOM_FILE during cross compilation.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-32067
       https://www.cve.org/CVERecord?id=CVE-2023-31147
       https://www.cve.org/CVERecord?id=CVE-2023-31130
       https://www.cve.org/CVERecord?id=CVE-2023-31124
       (* Security fix *)
+--------------------------+
Fri May 19 18:59:24 UTC 2023
patches/packages/cups-filters-1.28.17-i586-1_slack15.0.txz: Upgraded.
       [PATCH] Merge pull request from GHSA-gpxc-v2m8-fr3x.
       With execv() command line arguments are passed as separate strings and
       not the full command line in a single string. This prevents arbitrary
       command execution by escaping the quoting of the arguments in a job
       with forged job title.
       Thanks to marav.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-24805
       (* Security fix *)
+--------------------------+
Wed May 17 20:59:51 UTC 2023
patches/packages/curl-8.1.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       more POST-after-PUT confusion.
       IDN wildcard match.
       siglongjmp race condition.
       UAF in SSH sha256 fingerprint check.
       For more information, see:
       https://curl.se/docs/CVE-2023-28322.html
       https://curl.se/docs/CVE-2023-28321.html
       https://curl.se/docs/CVE-2023-28320.html
       https://curl.se/docs/CVE-2023-28319.html
       https://www.cve.org/CVERecord?id=CVE-2023-28322
       https://www.cve.org/CVERecord?id=CVE-2023-28321
       https://www.cve.org/CVERecord?id=CVE-2023-28320
       https://www.cve.org/CVERecord?id=CVE-2023-28319
       (* Security fix *)
patches/packages/bind-9.16.41-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
testing/packages/bind-9.18.15-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sun May 14 17:03:16 UTC 2023
extra/php80/php80-8.0.28-i586-2_slack15.0.txz: Rebuilt.
       This update removes extension=xmlrpc from the php.ini files.
extra/php81/php81-8.1.19-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.19
+--------------------------+
Wed May 10 23:42:53 UTC 2023
patches/packages/mozilla-thunderbird-102.11.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.11.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-18/
       https://www.cve.org/CVERecord?id=CVE-2023-32206
       https://www.cve.org/CVERecord?id=CVE-2023-32207
       https://www.cve.org/CVERecord?id=CVE-2023-32211
       https://www.cve.org/CVERecord?id=CVE-2023-32212
       https://www.cve.org/CVERecord?id=CVE-2023-32213
       https://www.cve.org/CVERecord?id=CVE-2023-32214
       https://www.cve.org/CVERecord?id=CVE-2023-32215
       (* Security fix *)
+--------------------------+
Tue May 9 20:11:22 UTC 2023
patches/packages/mozilla-firefox-102.11.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.11.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2023-17/
       https://www.cve.org/CVERecord?id=CVE-2023-32205
       https://www.cve.org/CVERecord?id=CVE-2023-32206
       https://www.cve.org/CVERecord?id=CVE-2023-32207
       https://www.cve.org/CVERecord?id=CVE-2023-32211
       https://www.cve.org/CVERecord?id=CVE-2023-32212
       https://www.cve.org/CVERecord?id=CVE-2023-32213
       https://www.cve.org/CVERecord?id=CVE-2023-32214
       https://www.cve.org/CVERecord?id=CVE-2023-32215
       (* Security fix *)
+--------------------------+
Sat May 6 19:01:04 UTC 2023
patches/packages/ca-certificates-20230506-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Thu May 4 19:02:58 UTC 2023
patches/packages/libssh-0.10.5-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       A NULL dereference during rekeying with algorithm guessing.
       A possible authorization bypass in pki_verify_data_signature under
       low-memory conditions.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-1667
       https://www.cve.org/CVERecord?id=CVE-2023-2283
       (* Security fix *)
+--------------------------+
Wed May 3 19:33:18 UTC 2023
patches/packages/whois-5.5.17-i586-1_slack15.0.txz: Upgraded.
       Added the .cd TLD server.
       Updated the -kg NIC handles server name.
       Removed 2 new gTLDs which are no longer active.
+--------------------------+
Mon May 1 20:22:43 UTC 2023
patches/packages/netatalk-3.1.15-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues, including a critical vulnerability that
       allows remote attackers to execute arbitrary code on affected installations
       of Netatalk. Authentication is not required to exploit this vulnerability.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-43634
       https://www.cve.org/CVERecord?id=CVE-2022-45188
       (* Security fix *)
+--------------------------+
Tue Apr 25 21:20:19 UTC 2023
patches/packages/git-2.35.8-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       By feeding specially crafted input to `git apply --reject`, a
       path outside the working tree can be overwritten with partially
       controlled contents (corresponding to the rejected hunk(s) from
       the given patch).
       When Git is compiled with runtime prefix support and runs without
       translated messages, it still used the gettext machinery to
       display messages, which subsequently potentially looked for
       translated messages in unexpected places. This allowed for
       malicious placement of crafted messages.
       When renaming or deleting a section from a configuration file,
       certain malicious configuration values may be misinterpreted as
       the beginning of a new configuration section, leading to arbitrary
       configuration injection.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-25652
       https://www.cve.org/CVERecord?id=CVE-2023-25815
       https://www.cve.org/CVERecord?id=CVE-2023-29007
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.10.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.10.1/releasenotes/
+--------------------------+
Wed Apr 19 19:17:14 UTC 2023
patches/packages/bind-9.16.40-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
testing/packages/bind-9.18.14-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Thu Apr 13 22:25:18 UTC 2023
extra/php81/php81-8.1.17-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.php.net/ChangeLog-8.php#8.1.17
+--------------------------+
Thu Apr 13 01:10:27 UTC 2023
patches/packages/mozilla-thunderbird-102.10.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.10.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#MFSA-TMP-2023-0001
       https://www.cve.org/CVERecord?id=CVE-2023-29531
       https://www.cve.org/CVERecord?id=CVE-2023-29532
       https://www.cve.org/CVERecord?id=CVE-2023-29533
       https://www.cve.org/CVERecord?id=CVE-2023-29535
       https://www.cve.org/CVERecord?id=CVE-2023-29536
       https://www.cve.org/CVERecord?id=CVE-2023-0547
       https://www.cve.org/CVERecord?id=CVE-2023-29479
       https://www.cve.org/CVERecord?id=CVE-2023-29539
       https://www.cve.org/CVERecord?id=CVE-2023-29541
       https://www.cve.org/CVERecord?id=CVE-2023-29542
       https://www.cve.org/CVERecord?id=CVE-2023-29545
       https://www.cve.org/CVERecord?id=CVE-2023-1945
       https://www.cve.org/CVERecord?id=CVE-2023-29548
       https://www.cve.org/CVERecord?id=CVE-2023-29550
       (* Security fix *)
+--------------------------+
Tue Apr 11 18:49:02 UTC 2023
patches/packages/mozilla-firefox-102.10.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.10.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-14
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#MFSA-TMP-2023-0001
       https://www.cve.org/CVERecord?id=CVE-2023-29531
       https://www.cve.org/CVERecord?id=CVE-2023-29532
       https://www.cve.org/CVERecord?id=CVE-2023-29533
       https://www.cve.org/CVERecord?id=CVE-2023-29535
       https://www.cve.org/CVERecord?id=CVE-2023-29536
       https://www.cve.org/CVERecord?id=CVE-2023-29539
       https://www.cve.org/CVERecord?id=CVE-2023-29541
       https://www.cve.org/CVERecord?id=CVE-2023-29545
       https://www.cve.org/CVERecord?id=CVE-2023-1945
       https://www.cve.org/CVERecord?id=CVE-2023-29548
       https://www.cve.org/CVERecord?id=CVE-2023-29550
       (* Security fix *)
+--------------------------+
Fri Apr 7 18:53:33 UTC 2023
patches/packages/httpd-2.4.57-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.57
+--------------------------+
Wed Apr 5 18:31:03 UTC 2023
patches/packages/zstd-1.5.5-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release. The primary focus is to correct a rare corruption
       bug in high compression mode. While the probability might be very small,
       corruption issues are nonetheless very serious, so an update to this version
       is highly recommended, especially if you employ high compression modes
       (levels 16+).
+--------------------------+
Sun Apr 2 18:33:01 UTC 2023
patches/packages/irssi-1.4.4-i586-1_slack15.0.txz: Upgraded.
       Do not crash Irssi when one line is printed as the result of another line
       being printed.
       Also solve a memory leak while printing unformatted lines.
       (* Security fix *)
+--------------------------+
Fri Mar 31 18:01:09 UTC 2023
patches/packages/ruby-3.0.6-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       ReDoS vulnerability in URI.
       ReDoS vulnerability in Time.
       For more information, see:
       https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/
       https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
       https://www.cve.org/CVERecord?id=CVE-2023-28755
       https://www.cve.org/CVERecord?id=CVE-2023-28756
       (* Security fix *)
patches/packages/seamonkey-2.53.16-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.16
       (* Security fix *)
+--------------------------+
Wed Mar 29 20:56:21 UTC 2023
patches/packages/glibc-zoneinfo-2023c-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
patches/packages/mozilla-thunderbird-102.9.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.9.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-12/
       https://www.cve.org/CVERecord?id=CVE-2023-28427
       (* Security fix *)
patches/packages/xorg-server-1.20.14-i586-8_slack15.0.txz: Rebuilt.
       [PATCH] composite: Fix use-after-free of the COW.
       Fix use-after-free that can lead to local privileges elevation on systems
       where the X server is running privileged and remote code execution for ssh
       X forwarding sessions.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-March/003374.html
       https://www.cve.org/CVERecord?id=CVE-2023-1393
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-8_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-8_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-8_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-7_slack15.0.txz: Rebuilt.
       [PATCH] composite: Fix use-after-free of the COW.
       Fix use-after-free that can lead to local privileges elevation on systems
       where the X server is running privileged and remote code execution for ssh
       X forwarding sessions.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2023-March/003374.html
       https://www.cve.org/CVERecord?id=CVE-2023-1393
       (* Security fix *)
+--------------------------+
Fri Mar 24 19:42:46 UTC 2023
patches/packages/glibc-zoneinfo-2023b-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
patches/packages/tar-1.34-i586-2_slack15.0.txz: Rebuilt.
       GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use
       of uninitialized memory for a conditional jump. Exploitation to change the
       flow of control has not been demonstrated. The issue occurs in from_header
       in list.c via a V7 archive in which mtime has approximately 11 whitespace
       characters.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-48303
       (* Security fix *)
+--------------------------+
Mon Mar 20 18:26:23 UTC 2023
patches/packages/curl-8.0.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       SSH connection too eager reuse still.
       HSTS double-free.
       GSS delegation too eager connection re-use.
       FTP too eager connection reuse.
       SFTP path ~ resolving discrepancy.
       TELNET option IAC injection.
       For more information, see:
       https://curl.se/docs/CVE-2023-27538.html
       https://curl.se/docs/CVE-2023-27537.html
       https://curl.se/docs/CVE-2023-27536.html
       https://curl.se/docs/CVE-2023-27535.html
       https://curl.se/docs/CVE-2023-27534.html
       https://curl.se/docs/CVE-2023-27533.html
       https://www.cve.org/CVERecord?id=CVE-2023-27538
       https://www.cve.org/CVERecord?id=CVE-2023-27537
       https://www.cve.org/CVERecord?id=CVE-2023-27536
       https://www.cve.org/CVERecord?id=CVE-2023-27535
       https://www.cve.org/CVERecord?id=CVE-2023-27534
       https://www.cve.org/CVERecord?id=CVE-2023-27533
       (* Security fix *)
patches/packages/vim-9.0.1418-i586-1_slack15.0.txz: Upgraded.
       Fixed security issues:
       NULL pointer dereference issue in utfc_ptr2len.
       Incorrect Calculation of Buffer Size.
       Heap-based Buffer Overflow.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-1264
       https://www.cve.org/CVERecord?id=CVE-2023-1175
       https://www.cve.org/CVERecord?id=CVE-2023-1170
       (* Security fix *)
patches/packages/vim-gvim-9.0.1418-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Mar 16 23:34:56 UTC 2023
patches/packages/bind-9.16.39-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/mozilla-thunderbird-102.9.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.9.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-11/
       https://www.cve.org/CVERecord?id=CVE-2023-25751
       https://www.cve.org/CVERecord?id=CVE-2023-28164
       https://www.cve.org/CVERecord?id=CVE-2023-28162
       https://www.cve.org/CVERecord?id=CVE-2023-25752
       https://www.cve.org/CVERecord?id=CVE-2023-28163
       https://www.cve.org/CVERecord?id=CVE-2023-28176
       (* Security fix *)
patches/packages/openssh-9.3p1-i586-1_slack15.0.txz: Upgraded.
       This release contains fixes for a security problem and a memory
       safety problem. The memory safety problem is not believed to be
       exploitable, but we report most network-reachable memory faults as
       security bugs.
       For more information, see:
       https://www.openssh.com/txt/release-9.3
       (* Security fix *)
testing/packages/bind-9.18.13-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Tue Mar 14 20:42:47 UTC 2023
patches/packages/mozilla-firefox-102.9.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.9.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-10
       https://www.cve.org/CVERecord?id=CVE-2023-25751
       https://www.cve.org/CVERecord?id=CVE-2023-28164
       https://www.cve.org/CVERecord?id=CVE-2023-28162
       https://www.cve.org/CVERecord?id=CVE-2023-25752
       https://www.cve.org/CVERecord?id=CVE-2023-28163
       https://www.cve.org/CVERecord?id=CVE-2023-28176
       (* Security fix *)
+--------------------------+
Wed Mar 8 20:26:54 UTC 2023
patches/packages/httpd-2.4.56-i586-1_slack15.0.txz: Upgraded.
       This update fixes two security issues:
       HTTP Response Smuggling vulnerability via mod_proxy_uwsgi.
       HTTP Request Smuggling attack via mod_rewrite and mod_proxy.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.56
       https://www.cve.org/CVERecord?id=CVE-2023-27522
       https://www.cve.org/CVERecord?id=CVE-2023-25690
       (* Security fix *)
+--------------------------+
Mon Mar 6 20:18:10 UTC 2023
patches/packages/sudo-1.9.13p3-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Mon Mar 6 02:21:57 UTC 2023
patches/packages/xscreensaver-6.06-i586-1_slack15.0.txz: Upgraded.
       Here's an upgrade to the latest xscreensaver.
+--------------------------+
Tue Feb 28 21:33:32 UTC 2023
patches/packages/whois-5.5.16-i586-1_slack15.0.txz: Upgraded.
       Add bash completion support, courtesy of Ville Skytta.
       Updated the .tr TLD server.
       Removed support for -metu NIC handles.
+--------------------------+
Mon Feb 20 19:41:06 UTC 2023
patches/packages/curl-7.88.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
+--------------------------+
Sat Feb 18 02:04:34 UTC 2023
patches/packages/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded.
patches/packages/linux-5.15.94/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.81:
       https://www.cve.org/CVERecord?id=CVE-2022-47519
       https://www.cve.org/CVERecord?id=CVE-2022-47518
       https://www.cve.org/CVERecord?id=CVE-2022-47520
       https://www.cve.org/CVERecord?id=CVE-2022-47521
       https://www.cve.org/CVERecord?id=CVE-2022-3344
       Fixed in 5.15.82:
       https://www.cve.org/CVERecord?id=CVE-2022-45869
       https://www.cve.org/CVERecord?id=CVE-2022-4378
       Fixed in 5.15.83:
       https://www.cve.org/CVERecord?id=CVE-2022-3643
       Fixed in 5.15.84:
       https://www.cve.org/CVERecord?id=CVE-2022-3545
       Fixed in 5.15.85:
       https://www.cve.org/CVERecord?id=CVE-2022-45934
       Fixed in 5.15.86:
       https://www.cve.org/CVERecord?id=CVE-2022-3534
       https://www.cve.org/CVERecord?id=CVE-2022-3424
       Fixed in 5.15.87:
       https://www.cve.org/CVERecord?id=CVE-2022-41218
       https://www.cve.org/CVERecord?id=CVE-2023-23455
       https://www.cve.org/CVERecord?id=CVE-2023-23454
       https://www.cve.org/CVERecord?id=CVE-2023-0045
       https://www.cve.org/CVERecord?id=CVE-2023-0210
       https://www.cve.org/CVERecord?id=CVE-2022-36280
       Fixed in 5.15.88:
       https://www.cve.org/CVERecord?id=CVE-2023-0266
       https://www.cve.org/CVERecord?id=CVE-2022-47929
       Fixed in 5.15.89:
       https://www.cve.org/CVERecord?id=CVE-2023-0179
       https://www.cve.org/CVERecord?id=CVE-2023-0394
       Fixed in 5.15.90:
       https://www.cve.org/CVERecord?id=CVE-2022-4382
       https://www.cve.org/CVERecord?id=CVE-2022-4842
       Fixed in 5.15.91:
       https://www.cve.org/CVERecord?id=CVE-2022-4129
       https://www.cve.org/CVERecord?id=CVE-2023-23559
       (* Security fix *)
+--------------------------+
Thu Feb 16 22:07:06 UTC 2023
patches/packages/mozilla-thunderbird-102.8.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.8.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-07/
       https://www.cve.org/CVERecord?id=CVE-2023-0616
       https://www.cve.org/CVERecord?id=CVE-2023-25728
       https://www.cve.org/CVERecord?id=CVE-2023-25730
       https://www.cve.org/CVERecord?id=CVE-2023-0767
       https://www.cve.org/CVERecord?id=CVE-2023-25735
       https://www.cve.org/CVERecord?id=CVE-2023-25737
       https://www.cve.org/CVERecord?id=CVE-2023-25738
       https://www.cve.org/CVERecord?id=CVE-2023-25739
       https://www.cve.org/CVERecord?id=CVE-2023-25729
       https://www.cve.org/CVERecord?id=CVE-2023-25732
       https://www.cve.org/CVERecord?id=CVE-2023-25734
       https://www.cve.org/CVERecord?id=CVE-2023-25742
       https://www.cve.org/CVERecord?id=CVE-2023-25746
       (* Security fix *)
+--------------------------+
Wed Feb 15 19:48:10 UTC 2023
patches/packages/curl-7.88.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       HTTP multi-header compression denial of service.
       HSTS amnesia with --parallel.
       HSTS ignored on multiple requests.
       For more information, see:
       https://curl.se/docs/CVE-2023-23916.html
       https://curl.se/docs/CVE-2023-23915.html
       https://curl.se/docs/CVE-2023-23914.html
       https://www.cve.org/CVERecord?id=CVE-2023-23916
       https://www.cve.org/CVERecord?id=CVE-2023-23915
       https://www.cve.org/CVERecord?id=CVE-2023-23914
       (* Security fix *)
patches/packages/git-2.35.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Using a specially-crafted repository, Git can be tricked into using
       its local clone optimization even when using a non-local transport.
       Though Git will abort local clones whose source $GIT_DIR/objects
       directory contains symbolic links (c.f., CVE-2022-39253), the objects
       directory itself may still be a symbolic link.
       These two may be combined to include arbitrary files based on known
       paths on the victim's filesystem within the malicious repository's
       working copy, allowing for data exfiltration in a similar manner as
       CVE-2022-39253.
       By feeding a crafted input to "git apply", a path outside the
       working tree can be overwritten as the user who is running "git
       apply".
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-22490
       https://www.cve.org/CVERecord?id=CVE-2023-23946
       (* Security fix *)
+--------------------------+
Wed Feb 15 03:05:40 UTC 2023
extra/php80/php80-8.0.28-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Core: Password_verify() always return true with some hash.
       Core: 1-byte array overrun in common path resolve code.
       SAPI: DOS vulnerability when parsing multipart request body.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0567
       https://www.cve.org/CVERecord?id=CVE-2023-0568
       https://www.cve.org/CVERecord?id=CVE-2023-0662
       (* Security fix *)
extra/php81/php81-8.1.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Core: Password_verify() always return true with some hash.
       Core: 1-byte array overrun in common path resolve code.
       SAPI: DOS vulnerability when parsing multipart request body.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0567
       https://www.cve.org/CVERecord?id=CVE-2023-0568
       https://www.cve.org/CVERecord?id=CVE-2023-0662
       (* Security fix *)
patches/packages/hwdata-0.367-noarch-1_slack15.0.txz: Upgraded.
       Upgraded to get information for newer hardware.
       Requested by kingbeowulf on LQ.
patches/packages/mozilla-firefox-102.8.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.8.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-06/
       https://www.cve.org/CVERecord?id=CVE-2023-25728
       https://www.cve.org/CVERecord?id=CVE-2023-25730
       https://www.cve.org/CVERecord?id=CVE-2023-25743
       https://www.cve.org/CVERecord?id=CVE-2023-0767
       https://www.cve.org/CVERecord?id=CVE-2023-25735
       https://www.cve.org/CVERecord?id=CVE-2023-25737
       https://www.cve.org/CVERecord?id=CVE-2023-25738
       https://www.cve.org/CVERecord?id=CVE-2023-25739
       https://www.cve.org/CVERecord?id=CVE-2023-25729
       https://www.cve.org/CVERecord?id=CVE-2023-25732
       https://www.cve.org/CVERecord?id=CVE-2023-25734
       https://www.cve.org/CVERecord?id=CVE-2023-25742
       https://www.cve.org/CVERecord?id=CVE-2023-25746
       (* Security fix *)
patches/packages/php-7.4.33-i586-3_slack15.0.txz: Rebuilt.
       This update fixes security issues:
       Core: Password_verify() always return true with some hash.
       Core: 1-byte array overrun in common path resolve code.
       SAPI: DOS vulnerability when parsing multipart request body.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0567
       https://www.cve.org/CVERecord?id=CVE-2023-0568
       https://www.cve.org/CVERecord?id=CVE-2023-0662
       (* Security fix *)
+--------------------------+
Fri Feb 10 20:08:41 UTC 2023
patches/packages/gnutls-3.7.9-i586-1_slack15.0.txz: Upgraded.
       libgnutls: Fix a Bleichenbacher oracle in the TLS RSA key exchange.
       Reported by Hubert Kario (#1050). Fix developed by Alexander Sosedkin.
       [GNUTLS-SA-2020-07-14, CVSS: medium] [CVE-2023-0361]
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0361
       (* Security fix *)
+--------------------------+
Thu Feb 9 00:59:27 UTC 2023
patches/packages/mozilla-thunderbird-102.7.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.7.2/releasenotes/
+--------------------------+
Tue Feb 7 20:48:57 UTC 2023
patches/packages/openssl-1.1.1t-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       X.400 address type confusion in X.509 GeneralName.
       Timing Oracle in RSA Decryption.
       Use-after-free following BIO_new_NDEF.
       Double free after calling PEM_read_bio_ex.
       For more information, see:
       https://www.openssl.org/news/secadv/20230207.txt
       https://www.cve.org/CVERecord?id=CVE-2023-0286
       https://www.cve.org/CVERecord?id=CVE-2022-4304
       https://www.cve.org/CVERecord?id=CVE-2023-0215
       https://www.cve.org/CVERecord?id=CVE-2022-4450
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1t-i586-1_slack15.0.txz: Upgraded.
patches/packages/xorg-server-1.20.14-i586-7_slack15.0.txz: Rebuilt.
       [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
       Also merged another patch to prevent crashes when using a compositor with
       the NVIDIA blob. Thanks to mdinslage, willysr, and Daedra.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0494
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-7_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-6_slack15.0.txz: Rebuilt.
       [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
       Also merged another patch to prevent crashes when using a compositor with
       the NVIDIA blob. Thanks to mdinslage, willysr, and Daedra.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0494
       (* Security fix *)
+--------------------------+
Thu Feb 2 22:52:48 UTC 2023
patches/packages/openssh-9.2p1-i586-1_slack15.0.txz: Upgraded.
       This release contains fixes for two security problems and a memory safety
       problem. The memory safety problem is not believed to be exploitable, but
       upstream reports most network-reachable memory faults as security bugs.
       This update contains some potentially incompatible changes regarding the
       scp utility. For more information, see:
       https://www.openssh.com/releasenotes.html#9.0
       For more information, see:
       https://www.openssh.com/releasenotes.html#9.2
       (* Security fix *)
+--------------------------+
Wed Feb 1 22:27:31 UTC 2023
patches/packages/apr-1.7.2-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Integer Overflow or Wraparound vulnerability in apr_encode functions of
       Apache Portable Runtime (APR) allows an attacker to write beyond bounds
       of a buffer. (CVE-2022-24963)
       Restore fix for out-of-bounds array dereference in apr_time_exp*() functions.
       (This issue was addressed as CVE-2017-12613 in APR 1.6.3 and
       later 1.6.x releases, but was missing in 1.7.0.) (CVE-2021-35940)
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-24963
       https://www.cve.org/CVERecord?id=CVE-2021-35940
       https://www.cve.org/CVERecord?id=CVE-2017-12613
       (* Security fix *)
patches/packages/apr-util-1.6.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Integer Overflow or Wraparound vulnerability in apr_base64 functions
       of Apache Portable Runtime Utility (APR-util) allows an attacker to
       write beyond bounds of a buffer. (CVE-2022-25147)
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-25147
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.7.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.7.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-04/
       https://www.cve.org/CVERecord?id=CVE-2023-0430
       (* Security fix *)
+--------------------------+
Thu Jan 26 00:34:41 UTC 2023
patches/packages/bind-9.16.37-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       An UPDATE message flood could cause :iscman:`named` to exhaust all
       available memory. This flaw was addressed by adding a new
       :any:`update-quota` option that controls the maximum number of
       outstanding DNS UPDATE messages that :iscman:`named` can hold in a
       queue at any given time (default: 100).
       :iscman:`named` could crash with an assertion failure when an RRSIG
       query was received and :any:`stale-answer-client-timeout` was set to a
       non-zero value. This has been fixed.
       :iscman:`named` running as a resolver with the
       :any:`stale-answer-client-timeout` option set to any value greater
       than ``0`` could crash with an assertion failure, when the
       :any:`recursive-clients` soft quota was reached. This has been fixed.
       For more information, see:
       https://kb.isc.org/docs/cve-2022-3094
       https://kb.isc.org/docs/cve-2022-3736
       https://kb.isc.org/docs/cve-2022-3924
       https://www.cve.org/CVERecord?id=CVE-2022-3094
       https://www.cve.org/CVERecord?id=CVE-2022-3736
       https://www.cve.org/CVERecord?id=CVE-2022-3924
       (* Security fix *)
patches/packages/vim-9.0.1241-i586-1_slack15.0.txz: Upgraded.
       Fixed a security issue:
       Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0433
       (* Security fix *)
patches/packages/vim-gvim-9.0.1241-i586-1_slack15.0.txz: Upgraded.
testing/packages/bind-9.18.11-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       An UPDATE message flood could cause :iscman:`named` to exhaust all
       available memory. This flaw was addressed by adding a new
       :any:`update-quota` option that controls the maximum number of
       outstanding DNS UPDATE messages that :iscman:`named` can hold in a
       queue at any given time (default: 100).
       :iscman:`named` could crash with an assertion failure when an RRSIG
       query was received and :any:`stale-answer-client-timeout` was set to a
       non-zero value. This has been fixed.
       :iscman:`named` running as a resolver with the
       :any:`stale-answer-client-timeout` option set to any value greater
       than ``0`` could crash with an assertion failure, when the
       :any:`recursive-clients` soft quota was reached. This has been fixed.
       For more information, see:
       https://kb.isc.org/docs/cve-2022-3094
       https://kb.isc.org/docs/cve-2022-3736
       https://kb.isc.org/docs/cve-2022-3924
       https://www.cve.org/CVERecord?id=CVE-2022-3094
       https://www.cve.org/CVERecord?id=CVE-2022-3736
       https://www.cve.org/CVERecord?id=CVE-2022-3924
       (* Security fix *)
+--------------------------+
Fri Jan 20 23:58:24 UTC 2023
patches/packages/mozilla-thunderbird-102.7.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.7.0/releasenotes/
       https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird102.7
       (* Security fix *)
patches/packages/seamonkey-2.53.15-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.15
       (* Security fix *)
+--------------------------+
Thu Jan 19 00:40:12 UTC 2023
patches/packages/sudo-1.9.12p2-i586-1_slack15.0.txz: Upgraded.
       This update fixes a flaw in sudo's -e option (aka sudoedit) that could allow
       a malicious user with sudoedit privileges to edit arbitrary files.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-22809
       (* Security fix *)
+--------------------------+
Wed Jan 18 06:11:54 UTC 2023
patches/packages/git-2.35.6-i586-1_slack15.0.txz: Upgraded.
       This release fixes two security issues:
       * CVE-2022-41903:
       git log has the ability to display commits using an arbitrary
       format with its --format specifiers. This functionality is also
       exposed to git archive via the export-subst gitattribute.
       When processing the padding operators (e.g., %<(, %<|(, %>(,
       %>>(, or %><( ), an integer overflow can occur in
       pretty.c::format_and_pad_commit() where a size_t is improperly
       stored as an int, and then added as an offset to a subsequent
       memcpy() call.
       This overflow can be triggered directly by a user running a
       command which invokes the commit formatting machinery (e.g., git
       log --format=...). It may also be triggered indirectly through
       git archive via the export-subst mechanism, which expands format
       specifiers inside of files within the repository during a git
       archive.
       This integer overflow can result in arbitrary heap writes, which
       may result in remote code execution.
       * CVE-2022-23521:
       gitattributes are a mechanism to allow defining attributes for
       paths. These attributes can be defined by adding a `.gitattributes`
       file to the repository, which contains a set of file patterns and
       the attributes that should be set for paths matching this pattern.
       When parsing gitattributes, multiple integer overflows can occur
       when there is a huge number of path patterns, a huge number of
       attributes for a single pattern, or when the declared attribute
       names are huge.
       These overflows can be triggered via a crafted `.gitattributes` file
       that may be part of the commit history. Git silently splits lines
       longer than 2KB when parsing gitattributes from a file, but not when
       parsing them from the index. Consequentially, the failure mode
       depends on whether the file exists in the working tree, the index or
       both.
       This integer overflow can result in arbitrary heap reads and writes,
       which may result in remote code execution.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-41903
       https://www.cve.org/CVERecord?id=CVE-2022-23521
       (* Security fix *)
patches/packages/httpd-2.4.55-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       mod_proxy allows a backend to trigger HTTP response splitting.
       mod_proxy_ajp possible request smuggling.
       mod_dav out of bounds read, or write of zero byte.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.55
       https://www.cve.org/CVERecord?id=CVE-2022-37436
       https://www.cve.org/CVERecord?id=CVE-2022-36760
       https://www.cve.org/CVERecord?id=CVE-2006-20001
       (* Security fix *)
patches/packages/libXpm-3.5.15-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Infinite loop on unclosed comments.
       Runaway loop with width of 0 and enormous height.
       Compression commands depend on $PATH.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-46285
       https://www.cve.org/CVERecord?id=CVE-2022-44617
       https://www.cve.org/CVERecord?id=CVE-2022-4883
       (* Security fix *)
patches/packages/mozilla-firefox-102.7.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.7.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2023-02/
       https://www.cve.org/CVERecord?id=CVE-2022-46871
       https://www.cve.org/CVERecord?id=CVE-2023-23598
       https://www.cve.org/CVERecord?id=CVE-2023-23599
       https://www.cve.org/CVERecord?id=CVE-2023-23601
       https://www.cve.org/CVERecord?id=CVE-2023-23602
       https://www.cve.org/CVERecord?id=CVE-2022-46877
       https://www.cve.org/CVERecord?id=CVE-2023-23603
       https://www.cve.org/CVERecord?id=CVE-2023-23605
       (* Security fix *)
+--------------------------+
Fri Jan 13 20:29:55 UTC 2023
patches/packages/netatalk-3.1.14-i586-1_slack15.0.txz: Upgraded.
       Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow
       resulting in code execution via a crafted .appl file.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-45188
       (* Security fix *)
+--------------------------+
Tue Jan 10 21:32:00 UTC 2023
patches/packages/ca-certificates-20221205-noarch-2_slack15.0.txz: Rebuilt.
       Make sure that if we're installing this package on another partition (such as
       when using installpkg with a --root parameter) that the updates are done on
       that partition. Thanks to fulalas.
+--------------------------+
Sat Jan 7 01:50:00 UTC 2023
extra/php80/php80-8.0.27-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       PDO::quote() may return unquoted string.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31631
       (* Security fix *)
extra/php81/php81-8.1.14-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       PDO::quote() may return unquoted string.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31631
       (* Security fix *)
patches/packages/mozilla-nss-3.87-i586-1_slack15.0.txz: Upgraded.
       Fixed memory corruption in NSS via DER-encoded DSA and RSA-PSS signatures.
       For more information, see:
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
       https://www.cve.org/CVERecord?id=CVE-2021-43527
       (* Security fix *)
patches/packages/php-7.4.33-i586-2_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       PDO::quote() may return unquoted string.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31631
       (* Security fix *)
+--------------------------+
Thu Jan 5 03:09:24 UTC 2023
patches/packages/vim-9.0.1146-i586-1_slack15.0.txz: Upgraded.
       Fixed security issues:
       Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
       Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1144.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2023-0049
       https://www.cve.org/CVERecord?id=CVE-2023-0051
       (* Security fix *)
patches/packages/vim-gvim-9.0.1146-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Wed Jan 4 02:18:08 UTC 2023
patches/packages/libtiff-4.4.0-i586-1_slack15.0.txz: Upgraded.
       Patched various security bugs.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-2056
       https://www.cve.org/CVERecord?id=CVE-2022-2057
       https://www.cve.org/CVERecord?id=CVE-2022-2058
       https://www.cve.org/CVERecord?id=CVE-2022-3970
       https://www.cve.org/CVERecord?id=CVE-2022-34526
       (* Security fix *)
patches/packages/rxvt-unicode-9.26-i586-3_slack15.0.txz: Rebuilt.
       When the "background" extension was loaded, an attacker able to control the
       data written to the terminal would be able to execute arbitrary code as the
       terminal's user. Thanks to David Leadbeater and Ben Collver.
       For more information, see:
       https://www.openwall.com/lists/oss-security/2022/12/05/1
       https://www.cve.org/CVERecord?id=CVE-2022-4170
       (* Security fix *)
patches/packages/whois-5.5.15-i586-1_slack15.0.txz: Upgraded.
       Updated the .bd, .nz and .tv TLD servers.
       Added the .llyw.cymru, .gov.scot and .gov.wales SLD servers.
       Updated the .ac.uk and .gov.uk SLD servers.
       Recursion has been enabled for whois.nic.tv.
       Updated the list of new gTLDs with four generic TLDs assigned in October 2013
       which were missing due to a bug.
       Removed 4 new gTLDs which are no longer active.
       Added the Georgian translation, contributed by Temuri Doghonadze.
       Updated the Finnish translation, contributed by Lauri Nurmi.
+--------------------------+
Thu Dec 22 03:40:55 UTC 2022
patches/packages/bind-9.16.36-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/curl-7.87.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/mozilla-thunderbird-102.6.1-i686-1_slack15.0.txz: Upgraded.
       This release contains a security fix and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.6.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-54/
       https://www.cve.org/CVERecord?id=CVE-2022-46874
       (* Security fix *)
testing/packages/bind-9.18.10-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Tue Dec 20 20:40:18 UTC 2022
patches/packages/libksba-1.6.3-i586-1_slack15.0.txz: Upgraded.
       Fix another integer overflow in the CRL's signature parser.
       (* Security fix *)
patches/packages/sdl-1.2.15-i586-13_slack15.0.txz: Rebuilt.
       This update fixes a heap overflow problem in video/SDL_pixels.c in SDL.
       By crafting a malicious .BMP file, an attacker can cause the application
       using this library to crash, denial of service, or code execution.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2021-33657
       (* Security fix *)
+--------------------------+
Mon Dec 19 21:18:22 UTC 2022
patches/packages/xorg-server-1.20.14-i586-6_slack15.0.txz: Rebuilt.
       This release fixes an invalid event type mask in XTestSwapFakeInput which
       was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
       for CVE-2022-46340.
patches/packages/xorg-server-xephyr-1.20.14-i586-6_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-6_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-6_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-5_slack15.0.txz: Rebuilt.
       This release fixes an invalid event type mask in XTestSwapFakeInput which
       was inadvertently changed from octal 0177 to hexadecimal 0x177 in the fix
       for CVE-2022-46340.
+--------------------------+
Sun Dec 18 20:28:03 UTC 2022
patches/packages/libarchive-3.6.2-i586-2_slack15.0.txz: Rebuilt.
       This update fixes a regression causing a failure to compile against
       libarchive: don't include iconv in libarchive.pc.
+--------------------------+
Sat Dec 17 21:14:11 UTC 2022
patches/packages/samba-4.15.13-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of
       Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.
       A Samba Active Directory DC will issue weak rc4-hmac session keys for
       use between modern clients and servers despite all modern Kerberos
       implementations supporting the aes256-cts-hmac-sha1-96 cipher.
       On Samba Active Directory DCs and members
       'kerberos encryption types = legacy'
       would force rc4-hmac as a client even if the server supports
       aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
       This is the Samba CVE for the Windows Kerberos Elevation of Privilege
       Vulnerability disclosed by Microsoft on Nov 8 2022.
       A service account with the special constrained delegation permission
       could forge a more powerful ticket than the one it was presented with.
       The "RC4" protection of the NetLogon Secure channel uses the same
       algorithms as rc4-hmac cryptography in Kerberos, and so must also be
       assumed to be weak.
       Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
       was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed
       that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue
       rc4-hmac encrypted tickets despite the target server supporting better
       encryption (eg aes256-cts-hmac-sha1-96).
       Note that there are several important behavior changes included in this
       release, which may cause compatibility problems interacting with system
       still expecting the former behavior.
       Please read the advisories of CVE-2022-37966, CVE-2022-37967 and
       CVE-2022-38023 carefully!
       For more information, see:
       https://www.samba.org/samba/security/CVE-2022-37966.html
       https://www.samba.org/samba/security/CVE-2022-37967.html
       https://www.samba.org/samba/security/CVE-2022-38023.html
       https://www.samba.org/samba/security/CVE-2022-45141.html
       https://www.cve.org/CVERecord?id=CVE-2022-37966
       https://www.cve.org/CVERecord?id=CVE-2022-37967
       https://www.cve.org/CVERecord?id=CVE-2022-38023
       https://www.cve.org/CVERecord?id=CVE-2022-45141
       (* Security fix *)
+--------------------------+
Wed Dec 14 21:19:34 UTC 2022
patches/packages/mozilla-firefox-102.6.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.6.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-52/
       https://www.cve.org/CVERecord?id=CVE-2022-46880
       https://www.cve.org/CVERecord?id=CVE-2022-46872
       https://www.cve.org/CVERecord?id=CVE-2022-46881
       https://www.cve.org/CVERecord?id=CVE-2022-46874
       https://www.cve.org/CVERecord?id=CVE-2022-46875
       https://www.cve.org/CVERecord?id=CVE-2022-46882
       https://www.cve.org/CVERecord?id=CVE-2022-46878
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.6.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.6.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
       https://www.cve.org/CVERecord?id=CVE-2022-46880
       https://www.cve.org/CVERecord?id=CVE-2022-46872
       https://www.cve.org/CVERecord?id=CVE-2022-46881
       https://www.cve.org/CVERecord?id=CVE-2022-46874
       https://www.cve.org/CVERecord?id=CVE-2022-46875
       https://www.cve.org/CVERecord?id=CVE-2022-46882
       https://www.cve.org/CVERecord?id=CVE-2022-46878
       (* Security fix *)
patches/packages/xorg-server-1.20.14-i586-5_slack15.0.txz: Rebuilt.
       This release fixes 6 recently reported security vulnerabilities in
       various extensions.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2022-December/003302.html
       https://www.cve.org/CVERecord?id=CVE-2022-46340
       https://www.cve.org/CVERecord?id=CVE-2022-46341
       https://www.cve.org/CVERecord?id=CVE-2022-46342
       https://www.cve.org/CVERecord?id=CVE-2022-46343
       https://www.cve.org/CVERecord?id=CVE-2022-46344
       https://www.cve.org/CVERecord?id=CVE-2022-4283
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-4_slack15.0.txz: Rebuilt.
       This release fixes 6 recently reported security vulnerabilities in
       various extensions.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2022-December/003302.html
       https://www.cve.org/CVERecord?id=CVE-2022-46340
       https://www.cve.org/CVERecord?id=CVE-2022-46341
       https://www.cve.org/CVERecord?id=CVE-2022-46342
       https://www.cve.org/CVERecord?id=CVE-2022-46343
       https://www.cve.org/CVERecord?id=CVE-2022-46344
       https://www.cve.org/CVERecord?id=CVE-2022-4283
       (* Security fix *)
+--------------------------+
Fri Dec 9 19:43:46 UTC 2022
patches/packages/libarchive-3.6.2-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix and security release.
       Relevant bugfixes:
       rar5 reader: fix possible garbled output with bsdtar -O (#1745)
       mtree reader: support reading mtree files with tabs (#1783)
       Security fixes:
       various small fixes for issues found by CodeQL
       (* Security fix *)
+--------------------------+
Thu Dec 8 22:48:34 UTC 2022
patches/packages/emacs-27.2-i586-2_slack15.0.txz: Rebuilt.
       GNU Emacs through 28.2 allows attackers to execute commands via shell
       metacharacters in the name of a source-code file, because lib-src/etags.c
       uses the system C library function in its implementation of the ctags
       program. For example, a victim may use the "ctags *" command (suggested in
       the ctags documentation) in a situation where the current working directory
       has contents that depend on untrusted input.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-45939
       (* Security fix *)
patches/packages/vim-9.0.1034-i586-1_slack15.0.txz: Upgraded.
       This update fixes various security issues such as a heap-based buffer
       overflow and use after free.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-4141
       https://www.cve.org/CVERecord?id=CVE-2022-3591
       https://www.cve.org/CVERecord?id=CVE-2022-3520
       https://www.cve.org/CVERecord?id=CVE-2022-3491
       https://www.cve.org/CVERecord?id=CVE-2022-4292
       https://www.cve.org/CVERecord?id=CVE-2022-4293
       (* Security fix *)
patches/packages/vim-gvim-9.0.1034-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Wed Dec 7 18:48:07 UTC 2022
patches/packages/python3-3.9.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       gh-98739: Updated bundled libexpat to 2.5.0 to fix CVE-2022-43680
       (heap use-after-free).
       gh-98433: The IDNA codec decoder used on DNS hostnames by socket or asyncio
       related name resolution functions no longer involves a quadratic algorithm
       to fix CVE-2022-45061. This prevents a potential CPU denial of service if an
       out-of-spec excessive length hostname involving bidirectional characters were
       decoded. Some protocols such as urllib http 3xx redirects potentially allow
       for an attacker to supply such a name.
       gh-100001: python -m http.server no longer allows terminal control characters
       sent within a garbage request to be printed to the stderr server log.
       gh-87604: Avoid publishing list of active per-interpreter audit hooks via the
       gc module.
       gh-97514: On Linux the multiprocessing module returns to using filesystem
       backed unix domain sockets for communication with the forkserver process
       instead of the Linux abstract socket namespace. Only code that chooses to use
       the "forkserver" start method is affected. This prevents Linux CVE-2022-42919
       (potential privilege escalation) as abstract sockets have no permissions and
       could allow any user on the system in the same network namespace (often the
       whole system) to inject code into the multiprocessing forkserver process.
       Filesystem based socket permissions restrict this to the forkserver process
       user as was the default in Python 3.8 and earlier.
       gh-98517: Port XKCP's fix for the buffer overflows in SHA-3 to fix
       CVE-2022-37454.
       gh-68966: The deprecated mailcap module now refuses to inject unsafe text
       (filenames, MIME types, parameters) into shell commands to address
       CVE-2015-20107. Instead of using such text, it will warn and act as if a
       match was not found (or for test commands, as if the test failed).
       For more information, see:
       https://pythoninsider.blogspot.com/2022/12/python-3111-3109-3916-3816-3716-and.html
       https://www.cve.org/CVERecord?id=CVE-2022-43680
       https://www.cve.org/CVERecord?id=CVE-2022-45061
       https://www.cve.org/CVERecord?id=CVE-2022-42919
       https://www.cve.org/CVERecord?id=CVE-2022-37454
       https://www.cve.org/CVERecord?id=CVE-2015-20107
       (* Security fix *)
+--------------------------+
Mon Dec 5 21:00:46 UTC 2022
patches/packages/ca-certificates-20221205-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/glibc-zoneinfo-2022g-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Fri Dec 2 20:58:24 UTC 2022
patches/packages/krusader-2.8.0-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/mozilla-thunderbird-102.5.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.5.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-50/
       https://www.cve.org/CVERecord?id=CVE-2022-45414
       (* Security fix *)
+--------------------------+
Tue Nov 29 20:56:03 UTC 2022
patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded.
patches/packages/linux-5.15.80/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.63:
       https://www.cve.org/CVERecord?id=CVE-2022-3629
       https://www.cve.org/CVERecord?id=CVE-2022-3635
       https://www.cve.org/CVERecord?id=CVE-2022-3633
       https://www.cve.org/CVERecord?id=CVE-2022-3625
       Fixed in 5.15.64:
       https://www.cve.org/CVERecord?id=CVE-2022-39190
       https://www.cve.org/CVERecord?id=CVE-2022-3028
       https://www.cve.org/CVERecord?id=CVE-2022-2905
       Fixed in 5.15.65:
       https://www.cve.org/CVERecord?id=CVE-2022-42703
       https://www.cve.org/CVERecord?id=CVE-2022-3176
       Fixed in 5.15.66:
       https://www.cve.org/CVERecord?id=CVE-2022-4095
       https://www.cve.org/CVERecord?id=CVE-2022-20421
       Fixed in 5.15.68:
       https://www.cve.org/CVERecord?id=CVE-2022-3303
       https://www.cve.org/CVERecord?id=CVE-2022-2663
       https://www.cve.org/CVERecord?id=CVE-2022-40307
       https://www.cve.org/CVERecord?id=CVE-2022-3586
       Fixed in 5.15.70:
       https://www.cve.org/CVERecord?id=CVE-2022-0171
       https://www.cve.org/CVERecord?id=CVE-2022-39842
       https://www.cve.org/CVERecord?id=CVE-2022-3061
       Fixed in 5.15.72:
       https://www.cve.org/CVERecord?id=CVE-2022-2308
       Fixed in 5.15.73:
       https://www.cve.org/CVERecord?id=CVE-2022-2978
       https://www.cve.org/CVERecord?id=CVE-2022-43750
       Fixed in 5.15.74:
       https://www.cve.org/CVERecord?id=CVE-2022-40768
       https://www.cve.org/CVERecord?id=CVE-2022-42721
       https://www.cve.org/CVERecord?id=CVE-2022-3621
       https://www.cve.org/CVERecord?id=CVE-2022-42722
       https://www.cve.org/CVERecord?id=CVE-2022-42719
       https://www.cve.org/CVERecord?id=CVE-2022-41674
       https://www.cve.org/CVERecord?id=CVE-2022-3649
       https://www.cve.org/CVERecord?id=CVE-2022-3646
       https://www.cve.org/CVERecord?id=CVE-2022-42720
       Fixed in 5.15.75:
       https://www.cve.org/CVERecord?id=CVE-2022-43945
       https://www.cve.org/CVERecord?id=CVE-2022-41849
       https://www.cve.org/CVERecord?id=CVE-2022-3535
       https://www.cve.org/CVERecord?id=CVE-2022-3594
       https://www.cve.org/CVERecord?id=CVE-2022-2602
       https://www.cve.org/CVERecord?id=CVE-2022-41850
       https://www.cve.org/CVERecord?id=CVE-2022-3565
       https://www.cve.org/CVERecord?id=CVE-2022-3542
       Fixed in 5.15.77:
       https://www.cve.org/CVERecord?id=CVE-2022-3524
       Fixed in 5.15.78:
       https://www.cve.org/CVERecord?id=CVE-2022-3628
       https://www.cve.org/CVERecord?id=CVE-2022-3623
       https://www.cve.org/CVERecord?id=CVE-2022-42896
       https://www.cve.org/CVERecord?id=CVE-2022-42895
       https://www.cve.org/CVERecord?id=CVE-2022-3543
       https://www.cve.org/CVERecord?id=CVE-2022-3564
       https://www.cve.org/CVERecord?id=CVE-2022-3619
       Fixed in 5.15.80:
       https://www.cve.org/CVERecord?id=CVE-2022-3521
       https://www.cve.org/CVERecord?id=CVE-2022-3169
       (* Security fix *)
patches/packages/openssl-1.1.1s-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
patches/packages/openssl-solibs-1.1.1s-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Nov 24 20:55:37 UTC 2022
patches/packages/ruby-3.0.5-i586-1_slack15.0.txz: Upgraded.
       This release includes a security fix:
       HTTP response splitting in CGI.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2021-33621
       (* Security fix *)
+--------------------------+
Thu Nov 17 20:02:33 UTC 2022
patches/packages/freerdp-2.9.0-i586-1_slack15.0.txz: Upgraded.
       Fixed multiple client side input validation issues.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-39316
       https://www.cve.org/CVERecord?id=CVE-2022-39317
       https://www.cve.org/CVERecord?id=CVE-2022-39318
       https://www.cve.org/CVERecord?id=CVE-2022-39319
       https://www.cve.org/CVERecord?id=CVE-2022-39320
       https://www.cve.org/CVERecord?id=CVE-2022-41877
       https://www.cve.org/CVERecord?id=CVE-2022-39347
       (* Security fix *)
+--------------------------+
Thu Nov 17 01:49:28 UTC 2022
patches/packages/krb5-1.19.2-i586-3_slack15.0.txz: Rebuilt.
       Fixed integer overflows in PAC parsing.
       Fixed memory leak in OTP kdcpreauth module.
       Fixed PKCS11 module path search.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-42898
       (* Security fix *)
patches/packages/mozilla-firefox-102.5.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.5.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-48/
       https://www.cve.org/CVERecord?id=CVE-2022-45403
       https://www.cve.org/CVERecord?id=CVE-2022-45404
       https://www.cve.org/CVERecord?id=CVE-2022-45405
       https://www.cve.org/CVERecord?id=CVE-2022-45406
       https://www.cve.org/CVERecord?id=CVE-2022-45408
       https://www.cve.org/CVERecord?id=CVE-2022-45409
       https://www.cve.org/CVERecord?id=CVE-2022-45410
       https://www.cve.org/CVERecord?id=CVE-2022-45411
       https://www.cve.org/CVERecord?id=CVE-2022-45412
       https://www.cve.org/CVERecord?id=CVE-2022-45416
       https://www.cve.org/CVERecord?id=CVE-2022-45418
       https://www.cve.org/CVERecord?id=CVE-2022-45420
       https://www.cve.org/CVERecord?id=CVE-2022-45421
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.5.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.5.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/
       https://www.cve.org/CVERecord?id=CVE-2022-45403
       https://www.cve.org/CVERecord?id=CVE-2022-45404
       https://www.cve.org/CVERecord?id=CVE-2022-45405
       https://www.cve.org/CVERecord?id=CVE-2022-45406
       https://www.cve.org/CVERecord?id=CVE-2022-45408
       https://www.cve.org/CVERecord?id=CVE-2022-45409
       https://www.cve.org/CVERecord?id=CVE-2022-45410
       https://www.cve.org/CVERecord?id=CVE-2022-45411
       https://www.cve.org/CVERecord?id=CVE-2022-45412
       https://www.cve.org/CVERecord?id=CVE-2022-45416
       https://www.cve.org/CVERecord?id=CVE-2022-45418
       https://www.cve.org/CVERecord?id=CVE-2022-45420
       https://www.cve.org/CVERecord?id=CVE-2022-45421
       (* Security fix *)
patches/packages/samba-4.15.12-i586-1_slack15.0.txz: Upgraded.
       Fixed a security issue where Samba's Kerberos libraries and AD DC failed
       to guard against integer overflows when parsing a PAC on a 32-bit system,
       which allowed an attacker with a forged PAC to corrupt the heap.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2022-42898.html
       https://www.cve.org/CVERecord?id=CVE-2022-42898
       (* Security fix *)
patches/packages/xfce4-settings-4.16.5-i586-1_slack15.0.txz: Upgraded.
       This update fixes regressions in the previous security fix:
       mime-settings: Properly quote command parameters.
       Revert "Escape characters which do not belong into an URI/URL (Issue #390)."
+--------------------------+
Thu Nov 10 19:47:59 UTC 2022
patches/packages/php-7.4.33-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       GD: OOB read due to insufficient input validation in imageloadfont().
       Hash: buffer overflow in hash_update() on long parameter.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31630
       https://www.cve.org/CVERecord?id=CVE-2022-37454
       (* Security fix *)
+--------------------------+
Wed Nov 9 22:16:30 UTC 2022
patches/packages/sysstat-12.7.1-i586-1_slack15.0.txz: Upgraded.
       On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1,
       allocate_structures contains a size_t overflow in sa_common.c. The
       allocate_structures function insufficiently checks bounds before arithmetic
       multiplication, allowing for an overflow in the size allocated for the
       buffer representing system activities.
       This issue may lead to Remote Code Execution (RCE).
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-39377
       (* Security fix *)
patches/packages/xfce4-settings-4.16.4-i586-1_slack15.0.txz: Upgraded.
       Fixed an argument injection vulnerability in xfce4-mime-helper.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-45062
       (* Security fix *)
+--------------------------+
Tue Nov 8 22:21:43 UTC 2022
patches/packages/glibc-zoneinfo-2022f-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
patches/packages/mariadb-10.5.18-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://mariadb.com/kb/en/mariadb-10-5-18-release-notes
+--------------------------+
Sat Nov 5 19:18:19 UTC 2022
patches/packages/sudo-1.9.12p1-i586-1_slack15.0.txz: Upgraded.
       Fixed a potential out-of-bounds write for passwords smaller than 8
       characters when passwd authentication is enabled.
       This does not affect configurations that use other authentication
       methods such as PAM, AIX authentication or BSD authentication.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-43995
       (* Security fix *)
+--------------------------+
Fri Nov 4 19:29:28 UTC 2022
patches/packages/mozilla-thunderbird-102.4.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.4.2/releasenotes/
+--------------------------+
Fri Nov 4 02:24:51 UTC 2022
patches/packages/mozilla-nss-3.84-i586-1_slack15.0.txz: Upgraded.
       Fixed a segmentation fault when the server requests a client auth cert but
       the client has no certs in its database.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-3479
       (* Security fix *)
+--------------------------+
Mon Oct 31 23:31:36 UTC 2022
extra/php80/php80-8.0.25-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       GD: OOB read due to insufficient input validation in imageloadfont().
       Hash: buffer overflow in hash_update() on long parameter.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31630
       https://www.cve.org/CVERecord?id=CVE-2022-37454
       (* Security fix *)
extra/php81/php81-8.1.12-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       GD: OOB read due to insufficient input validation in imageloadfont().
       Hash: buffer overflow in hash_update() on long parameter.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-31630
       https://www.cve.org/CVERecord?id=CVE-2022-37454
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.4.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.4.1/releasenotes/
patches/packages/vim-9.0.0814-i586-1_slack15.0.txz: Upgraded.
       A vulnerability was found in vim and classified as problematic. Affected by
       this issue is the function qf_update_buffer of the file quickfix.c of the
       component autocmd Handler. The manipulation leads to use after free. The
       attack may be launched remotely. Upgrading to version 9.0.0805 is able to
       address this issue.
       Thanks to marav for the heads-up.
       For more information, see:
       https://www.cve.org/CVERecord?id=CVE-2022-3705
       (* Security fix *)
patches/packages/vim-gvim-9.0.0814-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Oct 27 02:30:15 UTC 2022
patches/packages/curl-7.86.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       HSTS bypass via IDN.
       HTTP proxy double-free.
       .netrc parser out-of-bounds access.
       POST following PUT confusion.
       For more information, see:
       https://curl.se/docs/CVE-2022-42916.html
       https://curl.se/docs/CVE-2022-42915.html
       https://curl.se/docs/CVE-2022-35260.html
       https://curl.se/docs/CVE-2022-32221.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42915
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35260
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
       (* Security fix *)
+--------------------------+
Tue Oct 25 18:38:58 UTC 2022
patches/packages/expat-2.5.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Fix heap use-after-free after overeager destruction of a shared DTD in
       function XML_ExternalEntityParserCreate in out-of-memory situations.
       Expected impact is denial of service or potentially arbitrary code
       execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
       (* Security fix *)
patches/packages/samba-4.15.11-i586-1_slack15.0.txz: Upgraded.
       This update fixes the following security issue:
       There is a limited write heap buffer overflow in the GSSAPI unwrap_des()
       and unwrap_des3() routines of Heimdal (included in Samba).
       For more information, see:
       https://www.samba.org/samba/security/CVE-2022-3437.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
       (* Security fix *)
+--------------------------+
Fri Oct 21 18:19:00 UTC 2022
patches/packages/rsync-3.2.7-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       Notably, this addresses some regressions caused by the file-list validation
       fix in rsync-3.2.5.
       Thanks to llgar.
+--------------------------+
Thu Oct 20 18:39:03 UTC 2022
patches/packages/mozilla-thunderbird-102.4.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.4.0/releasenotes/
patches/packages/whois-5.5.14-i586-1_slack15.0.txz: Upgraded.
       This update adds the .bf and .sd TLD servers, removes the .gu TLD server,
       updates the .dm, .fj, .mt and .pk TLD servers, updates the charset for
       whois.nic.tr, updates the list of new gTLDs, removes whois.nic.fr from the
       list of RIPE-like servers (because it is not one anymore), renames
       whois.arnes.si to whois.register.si in the list of RIPE-like servers, and
       adds the hiding string for whois.auda.org.au.
+--------------------------+
Wed Oct 19 20:06:33 UTC 2022
patches/packages/samba-4.15.10-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.samba.org/samba/history/samba-4.15.10.html
+--------------------------+
Tue Oct 18 20:29:54 UTC 2022
patches/packages/git-2.35.5-i586-1_slack15.0.txz: Upgraded.
       This release fixes two security issues:
       * CVE-2022-39253:
       When relying on the `--local` clone optimization, Git dereferences
       symbolic links in the source repository before creating hardlinks
       (or copies) of the dereferenced link in the destination repository.
       This can lead to surprising behavior where arbitrary files are
       present in a repository's `$GIT_DIR` when cloning from a malicious
       repository.
       Git will no longer dereference symbolic links via the `--local`
       clone mechanism, and will instead refuse to clone repositories that
       have symbolic links present in the `$GIT_DIR/objects` directory.
       Additionally, the value of `protocol.file.allow` is changed to be
       "user" by default.
       * CVE-2022-39260:
       An overly-long command string given to `git shell` can result in
       overflow in `split_cmdline()`, leading to arbitrary heap writes and
       remote code execution when `git shell` is exposed and the directory
       `$HOME/git-shell-commands` exists.
       `git shell` is taught to refuse interactive commands that are
       longer than 4MiB in size. `split_cmdline()` is hardened to reject
       inputs larger than 2GiB.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
       (* Security fix *)
patches/packages/mozilla-firefox-102.4.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.4.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-45/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932
       (* Security fix *)
+--------------------------+
Mon Oct 17 19:31:45 UTC 2022
patches/packages/xorg-server-1.20.14-i586-4_slack15.0.txz: Rebuilt.
       xkb: proof GetCountedString against request length attacks.
       xkb: fix some possible memleaks in XkbGetKbdByName.
       xquartz: Fix a possible crash when editing the Application menu due
       to mutating immutable arrays.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3553
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-4_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-4_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-4_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-i586-3_slack15.0.txz: Rebuilt.
       xkb: proof GetCountedString against request length attacks.
       xkb: fix some possible memleaks in XkbGetKbdByName.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551
       (* Security fix *)
+--------------------------+
Mon Oct 17 00:42:43 UTC 2022
patches/packages/glibc-zoneinfo-2022e-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Sat Oct 15 20:28:34 UTC 2022
patches/packages/zlib-1.2.13-i586-1_slack15.0.txz: Upgraded.
       Fixed a bug when getting a gzip header extra field with inflateGetHeader().
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
       (* Security fix *)
+--------------------------+
Fri Oct 14 01:39:37 UTC 2022
patches/packages/mozilla-thunderbird-102.3.3-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.3.3/releasenotes/
patches/packages/python3-3.9.15-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Bundled libexpat was upgraded from 2.4.7 to 2.4.9 which fixes a heap
       use-after-free vulnerability in function doContent.
       gh-97616: a fix for a possible buffer overflow in list *= int.
       gh-97612: a fix for possible shell injection in the example script
       get-remote-certificate.py.
       gh-96577: a fix for a potential buffer overrun in msilib.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674
       (* Security fix *)
+--------------------------+
Sat Oct 8 19:23:31 UTC 2022
patches/packages/libksba-1.6.2-i586-1_slack15.0.txz: Upgraded.
       Detect a possible overflow directly in the TLV parser.
       This patch detects possible integer overflows immmediately when creating
       the TI object.
       Reported-by: ZDI-CAN-18927, ZDI-CAN-18928, ZDI-CAN-18929
       (* Security fix *)
+--------------------------+
Fri Oct 7 20:32:18 UTC 2022
patches/packages/mozilla-thunderbird-102.3.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.3.2/releasenotes/
+--------------------------+
Wed Oct 5 18:55:36 UTC 2022
patches/packages/dhcp-4.4.3_P1-i586-1_slack15.0.txz: Upgraded.
       This update fixes two security issues:
       Corrected a reference count leak that occurs when the server builds
       responses to leasequery packets.
       Corrected a memory leak that occurs when unpacking a packet that has an
       FQDN option (81) that contains a label with length greater than 63 bytes.
       Thanks to VictorV of Cyber Kunlun Lab for reporting these issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929
       (* Security fix *)
+--------------------------+
Sat Oct 1 18:38:27 UTC 2022
patches/packages/glibc-zoneinfo-2022d-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Fri Sep 30 17:52:21 UTC 2022
extra/php80/php80-8.0.24-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       phar wrapper: DOS when using quine gzip file.
       Don't mangle HTTP variable names that clash with ones that have a specific
       semantic meaning.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
       (* Security fix *)
extra/php81/php81-8.1.11-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       phar wrapper: DOS when using quine gzip file.
       Don't mangle HTTP variable names that clash with ones that have a specific
       semantic meaning.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.3.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.3.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-43/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236
       (* Security fix *)
patches/packages/php-7.4.32-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       phar wrapper: DOS when using quine gzip file.
       Don't mangle HTTP variable names that clash with ones that have a specific
       semantic meaning.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
       (* Security fix *)
patches/packages/seamonkey-2.53.14-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.14
       (* Security fix *)
patches/packages/vim-9.0.0623-i586-1_slack15.0.txz: Upgraded.
       Fixed use-after-free and stack-based buffer overflow.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3352
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3324
       (* Security fix *)
patches/packages/vim-gvim-9.0.0623-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Wed Sep 28 18:59:51 UTC 2022
patches/packages/xorg-server-xwayland-21.1.4-i586-2_slack15.0.txz: Rebuilt.
       xkb: switch to array index loops to moving pointers.
       xkb: add request length validation for XkbSetGeometry.
       xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck.
       I hadn't realized that the xorg-server patches were needed (or applied
       cleanly) to Xwayland. Thanks to LuckyCyborg for the kind reminder. :-)
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
       (* Security fix *)
+--------------------------+
Mon Sep 26 19:43:54 UTC 2022
patches/packages/dnsmasq-2.87-i586-1_slack15.0.txz: Upgraded.
       Fix write-after-free error in DHCPv6 server code.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934
       (* Security fix *)
patches/packages/vim-9.0.0594-i586-1_slack15.0.txz: Upgraded.
       Fixed stack-based buffer overflow.
       Thanks to marav for the heads-up.
       In addition, Mig21 pointed out an issue where the defaults.vim file might
       need to be edited for some purposes as its contents will override the
       settings in the system-wide vimrc. Usually this file is replaced whenever
       vim is upgraded, which in those situations would be inconvenient for the
       admin. So, I've added support for a file named defaults.vim.custom which
       (if it exists) will be used instead of the defaults.vim file shipped in
       the package and will persist through upgrades.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3296
       (* Security fix *)
patches/packages/vim-gvim-9.0.0594-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Fri Sep 23 23:51:02 UTC 2022
patches/packages/vim-9.0.0558-i586-1_slack15.0.txz: Upgraded.
       Fixed use after free.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3256
       (* Security fix *)
patches/packages/vim-gvim-9.0.0558-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Sep 22 19:50:20 UTC 2022
patches/packages/ca-certificates-20220922-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Wed Sep 21 19:19:07 UTC 2022
patches/packages/cups-2.4.2-i586-3_slack15.0.txz: Rebuilt.
       Fixed crash when using the CUPS web setup interface:
       [PATCH] Fix OpenSSL crash bug - "tls" pointer wasn't cleared after freeing
       it (Issue #409).
       Thanks to MisterL, bryjen, and kjhambrick.
       Fixed an OpenSSL certificate loading issue:
       [PATCH] The OpenSSL code path wasn't loading the full certificate
       chain (Issue #465).
       Thanks to tmmukunn.
+--------------------------+
Wed Sep 21 18:30:30 UTC 2022
patches/packages/bind-9.16.33-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       Fix memory leak in EdDSA verify processing.
       Fix memory leak in ECDSA verify processing.
       Fix serve-stale crash that could happen when stale-answer-client-timeout
       was set to 0 and there was a stale CNAME in the cache for an incoming query.
       Prevent excessive resource use while processing large delegations.
       For more information, see:
       https://kb.isc.org/docs/cve-2022-38178
       https://kb.isc.org/docs/cve-2022-38177
       https://kb.isc.org/docs/cve-2022-3080
       https://kb.isc.org/docs/cve-2022-2795
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795
       (* Security fix *)
patches/packages/cups-2.4.2-i586-2_slack15.0.txz: Rebuilt.
       Install pkgconfig file to the proper directory.
+--------------------------+
Tue Sep 20 22:50:28 UTC 2022
patches/packages/expat-2.4.9-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       Heap use-after-free vulnerability in function doContent. Expected impact is
       denial of service or potentially arbitrary code execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674
       (* Security fix *)
patches/packages/mozilla-firefox-102.3.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.3.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-41/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.3.0-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.3.0/releasenotes/
+--------------------------+
Sun Sep 18 19:02:14 UTC 2022
patches/packages/vim-9.0.0500-i586-1_slack15.0.txz: Upgraded.
       Fixed heap-based buffer overflow.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234
       (* Security fix *)
patches/packages/vim-gvim-9.0.0500-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Sat Sep 10 01:51:43 UTC 2022
patches/packages/vim-9.0.0417-i586-1_slack15.0.txz: Upgraded.
       Fixed null pointer dereference.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3153
       (* Security fix *)
patches/packages/vim-gvim-9.0.0417-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Sep 8 01:33:19 UTC 2022
patches/packages/mozilla-thunderbird-102.2.2-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.2.2/releasenotes/
+--------------------------+
Wed Sep 7 18:40:44 UTC 2022
patches/packages/python3-3.9.14-i586-1_slack15.0.txz: Upgraded.
       This is a security and bugfix release.
       gh-95778: Converting between int and str in bases other than 2 (binary), 4,
       8 (octal), 16 (hexadecimal), or 32 such as base 10 (decimal) now raises a
       ValueError if the number of digits in string form is above a limit to avoid
       potential denial of service attacks due to the algorithmic complexity.
       For more information, see:
       https://pythoninsider.blogspot.com/2022/09/python-releases-3107-3914-3814-and-3714.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
       (* Security fix *)
+--------------------------+
Tue Sep 6 20:21:24 UTC 2022
extra/rust-for-mozilla/rust-1.60.0-i686-1_slack15.0.txz: Upgraded.
       Upgraded the Rust compiler for Firefox 102.2.0 and Thunderbird 102.2.1.
patches/packages/mozilla-firefox-102.2.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/102.2.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-34/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478
       (* Security fix *)
patches/packages/mozilla-thunderbird-102.2.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       Some accounts may need to be reconfigured after moving from
       Thunderbird 91.13.0 to Thunderbird 102.2.1.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/102.2.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-38/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059
       (* Security fix *)
patches/packages/vim-9.0.0396-i586-1_slack15.0.txz: Upgraded.
       Fixed use after free.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099
       (* Security fix *)
patches/packages/vim-gvim-9.0.0396-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Thu Sep 1 20:01:13 UTC 2022
patches/packages/poppler-21.12.0-i586-2_slack15.0.txz: Rebuilt.
       [PATCH] JBIG2Stream: Fix crash on broken file.
       For more information, see:
       http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30860
       (* Security fix *)
+--------------------------+
Thu Sep 1 03:08:39 UTC 2022
patches/packages/curl-7.85.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       control code in cookie denial of service.
       For more information, see:
       https://curl.se/docs/CVE-2022-35252.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
       (* Security fix *)
+--------------------------+
Tue Aug 30 19:39:30 UTC 2022
extra/sendmail/sendmail-8.17.1-i586-4_slack15.0.txz: Rebuilt.
       Patched sendmail.h to fix SASL auth. Thanks to af7567.
       Build without -DUSE_EAI (which is evidently considered experimental) since
       the option breaks the vacation binary. Thanks to bitfuzzy and HQuest.
       It is possible that this could work but requires additional options. I found
       this in the ChangeLog for the SUSE rpm:
       Experimental support for SMTPUTF8 (EAI, see RFC 6530-6533) is available
       when using the compile time option USE_EAI (see also
       devtools/Site/site.config.m4.sample for other required settings) and the cf
       option SMTPUTF8. If a mail submission via the command line requires the
       use of SMTPUTF8, e.g., because a header uses UTF-8 encoding, but the
       addresses on the command line are all ASCII, then the new option -U must be
       used, and the cf option SMTPUTF8 must be set in submit.cf.
       Any assistance with getting -DUSE_EAI working properly would be appreciated.
extra/sendmail/sendmail-cf-8.17.1-noarch-4_slack15.0.txz: Rebuilt.
patches/packages/vim-9.0.0334-i586-1_slack15.0.txz: Upgraded.
       Fixed use after free.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3016
       (* Security fix *)
patches/packages/vim-gvim-9.0.0334-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Fri Aug 26 04:02:20 UTC 2022
patches/packages/linux-5.15.63/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.39:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
       Fixed in 5.15.40:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943
       Fixed in 5.15.41:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
       Fixed in 5.15.42:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
       Fixed in 5.15.44:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
       Fixed in 5.15.45:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
       Fixed in 5.15.46:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973
       Fixed in 5.15.47:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981
       Fixed in 5.15.48:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
       Fixed in 5.15.53:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
       Fixed in 5.15.54:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
       Fixed in 5.15.56:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123
       Fixed in 5.15.57:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
       Fixed in 5.15.58:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
       Fixed in 5.15.59:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
       Fixed in 5.15.60:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
       Fixed in 5.15.61:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
       (* Security fix *)
patches/packages/vim-9.0.0270-i586-1_slack15.0.txz: Upgraded.
       We're just going to move to vim-9 instead of continuing to backport patches
       to the vim-8 branch. Most users will be better served by this.
       Fixed use after free and null pointer dereference.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
       (* Security fix *)
patches/packages/vim-gvim-9.0.0270-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Tue Aug 23 19:27:56 UTC 2022
extra/sendmail/sendmail-8.17.1-i586-3_slack15.0.txz: Rebuilt.
       In recent versions of glibc, USE_INET6 has been removed which caused sendmail
       to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the
       site.config.m4 allows the reverse lookups to work again fixing this issue.
       Thanks to talo.
extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt.
patches/packages/hunspell-1.7.1-i586-1_slack15.0.txz: Upgraded.
       Fixed invalid read operation in SuggestMgr::leftcommonsubstring
       in suggestmgr.cxx.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707
       (* Security fix *)
patches/packages/mozilla-firefox-91.13.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.13.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-35/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478
       (* Security fix *)
patches/packages/mozilla-thunderbird-91.13.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.13.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-37/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478
       (* Security fix *)
+--------------------------+
Sat Aug 20 20:04:15 UTC 2022
patches/packages/vim-8.2.4649-i586-3_slack15.0.txz: Rebuilt.
       Fix use after free.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2889
       (* Security fix *)
patches/packages/vim-gvim-8.2.4649-i586-3_slack15.0.txz: Rebuilt.
+--------------------------+
Thu Aug 18 23:19:52 UTC 2022
patches/packages/glibc-zoneinfo-2022c-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Wed Aug 17 20:41:53 UTC 2022
patches/packages/vim-8.2.4649-i586-2_slack15.0.txz: Rebuilt.
       Fix use after free, out-of-bounds read, and heap based buffer overflow.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
       (* Security fix *)
patches/packages/vim-gvim-8.2.4649-i586-2_slack15.0.txz: Rebuilt.
+--------------------------+
Tue Aug 16 18:51:34 UTC 2022
patches/packages/mariadb-10.5.17-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and several security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084
       (* Security fix *)
+--------------------------+
Mon Aug 15 20:23:47 UTC 2022
patches/packages/rsync-3.2.5-i586-1_slack15.0.txz: Upgraded.
       Added some file-list safety checking that helps to ensure that a rogue
       sending rsync can't add unrequested top-level names and/or include recursive
       names that should have been excluded by the sender. These extra safety
       checks only require the receiver rsync to be updated. When dealing with an
       untrusted sending host, it is safest to copy into a dedicated destination
       directory for the remote content (i.e. don't copy into a destination
       directory that contains files that aren't from the remote host unless you
       trust the remote host).
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154
       (* Security fix *)
+--------------------------+
Sat Aug 13 19:12:40 UTC 2022
patches/packages/glibc-zoneinfo-2022b-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Tue Aug 9 19:25:22 UTC 2022
patches/packages/zlib-1.2.12-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix update.
       Applied an upstream patch to restore the handling of CRC inputs to be the
       same as in previous releases of zlib. This fixes an issue with OpenJDK.
       Thanks to alienBOB.
+--------------------------+
Fri Jul 29 19:59:03 UTC 2022
patches/packages/gnutls-3.7.7-i586-1_slack15.0.txz: Upgraded.
       libgnutls: Fixed double free during verification of pkcs7 signatures.
       Reported by Jaak Ristioja.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
       (* Security fix *)
+--------------------------+
Thu Jul 28 23:48:36 UTC 2022
patches/packages/mozilla-thunderbird-91.12.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.12.0/releasenotes/
       https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird91.12
       (* Security fix *)
+--------------------------+
Wed Jul 27 19:17:38 UTC 2022
patches/packages/samba-4.15.9-i586-1_slack15.0.txz: Upgraded.
       This update fixes the following security issues:
       Samba AD users can bypass certain restrictions associated with changing
       passwords.
       Samba AD users can forge password change requests for any user.
       Samba AD users can crash the server process with an LDAP add or modify
       request.
       Samba AD users can induce a use-after-free in the server process with an
       LDAP add or modify request.
       Server memory information leak via SMB1.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2022-2031.html
       https://www.samba.org/samba/security/CVE-2022-32744.html
       https://www.samba.org/samba/security/CVE-2022-32745.html
       https://www.samba.org/samba/security/CVE-2022-32746.html
       https://www.samba.org/samba/security/CVE-2022-32742.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
       (* Security fix *)
+--------------------------+
Mon Jul 25 20:53:49 UTC 2022
patches/packages/mozilla-firefox-91.12.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.12.0/releasenotes/
       (* Security fix *)
patches/packages/perl-5.34.0-i586-2_slack15.0.txz: Rebuilt.
       This is a bugfix release.
       Upgraded: Devel-CheckLib-1.16, IO-Socket-SSL-2.074, Net-SSLeay-1.92,
       Path-Tiny-0.122, Template-Toolkit-3.100, URI-5.12, libnet-3.14.
       Added a symlink to libperl.so in /usr/${LIBDIRSUFFIX} since net-snmp (and
       possibly other programs) might have trouble linking with it since it's not
       in the LD_LIBRARY_PATH. Thanks to oneforall.
+--------------------------+
Thu Jul 21 18:13:18 UTC 2022
patches/packages/net-snmp-5.9.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause
       an out-of-bounds memory access.
       A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL
       pointer dereference.
       Improper Input Validation when SETing malformed OIDs in master agent and
       subagent simultaneously.
       A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
       can cause an out-of-bounds memory access.
       A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a
       NULL pointer dereference.
       A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer
       dereference.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810
       (* Security fix *)
+--------------------------+
Wed Jul 13 19:56:59 UTC 2022
patches/packages/xorg-server-1.20.14-i586-3_slack15.0.txz: Rebuilt.
       xkb: switch to array index loops to moving pointers.
       xkb: add request length validation for XkbSetGeometry.
       xkb: swap XkbSetDeviceInfo and XkbSetDeviceInfoCheck.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320
       (* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-i586-3_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-i586-3_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-i586-3_slack15.0.txz: Rebuilt.
+--------------------------+
Mon Jul 11 19:22:52 UTC 2022
patches/packages/seamonkey-2.53.13-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.13
       (* Security fix *)
+--------------------------+
Sun Jul 10 18:49:34 UTC 2022
patches/packages/wavpack-5.5.0-i586-1_slack15.0.txz: Upgraded.
       WavPack 5.5.0 contains a fix for CVE-2021-44269 wherein encoding a specially
       crafted DSD file causes an out-of-bounds read exception.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44269
       (* Security fix *)
+--------------------------+
Thu Jul 7 23:03:01 UTC 2022
patches/packages/gnupg2-2.2.36-i586-1_slack15.0.txz: Upgraded.
       g10: Fix possibly garbled status messages in NOTATION_DATA. This bug could
       trick GPGME and other parsers to accept faked status lines.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34903
       (* Security fix *)
extra/php81/php81-8.1.8-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       Fileinfo: Fixed bug #81723 (Heap buffer overflow in finfo_buffer).
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31627
       (* Security fix *)
+--------------------------+
Tue Jul 5 20:17:00 UTC 2022
patches/packages/openssl-1.1.1q-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Heap memory corruption with RSA private key operation.
       AES OCB fails to encrypt some bytes.
       For more information, see:
       https://www.openssl.org/news/secadv/20220705.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2274
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1q-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Fri Jul 1 01:23:50 UTC 2022
patches/packages/mozilla-thunderbird-91.11.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.11.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-26/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484
       (* Security fix *)
+--------------------------+
Tue Jun 28 19:16:08 UTC 2022
patches/packages/curl-7.84.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       Set-Cookie denial of service.
       HTTP compression denial of service.
       Unpreserved file permissions.
       FTP-KRB bad message verification.
       For more information, see:
       https://curl.se/docs/CVE-2022-32205.html
       https://curl.se/docs/CVE-2022-32206.html
       https://curl.se/docs/CVE-2022-32207.html
       https://curl.se/docs/CVE-2022-32208.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
       (* Security fix *)
patches/packages/mozilla-firefox-91.11.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.11.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-25/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484
       (* Security fix *)
+--------------------------+
Thu Jun 23 05:30:51 UTC 2022
patches/packages/ca-certificates-20220622-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/openssl-1.1.1p-i586-1_slack15.0.txz: Upgraded.
       In addition to the c_rehash shell command injection identified in
       CVE-2022-1292, further circumstances where the c_rehash script does not
       properly sanitise shell metacharacters to prevent command injection were
       found by code review.
       When the CVE-2022-1292 was fixed it was not discovered that there
       are other places in the script where the file names of certificates
       being hashed were possibly passed to a command executed through the shell.
       For more information, see:
       https://www.openssl.org/news/secadv/20220621.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1p-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Mon Jun 13 21:02:58 UTC 2022
patches/packages/php-7.4.30-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       mysqlnd/pdo password buffer overflow.
       Uninitialized array in pg_query_params().
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625
       (* Security fix *)
extra/php80/php80-8.0.20-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       mysqlnd/pdo password buffer overflow.
       Uninitialized array in pg_query_params().
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625
       (* Security fix *)
extra/php81/php81-8.1.7-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       mysqlnd/pdo password buffer overflow.
       Uninitialized array in pg_query_params().
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625
       (* Security fix *)
+--------------------------+
Wed Jun 8 19:15:34 UTC 2022
patches/packages/httpd-2.4.54-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism.
       Information Disclosure in mod_lua with websockets.
       mod_sed denial of service.
       Denial of service in mod_lua r:parsebody.
       Read beyond bounds in ap_strcmp_match().
       Read beyond bounds via ap_rwrite().
       Read beyond bounds in mod_isapi.
       mod_proxy_ajp: Possible request smuggling.
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.54
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
       (* Security fix *)
+--------------------------+
Sat Jun 4 18:43:17 UTC 2022
patches/packages/pidgin-2.14.10-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and several security issues.
       For more information, see:
       https://www.pidgin.im/posts/2022-06-2.14.10-released/
       (* Security fix *)
+--------------------------+
Thu Jun 2 19:42:06 UTC 2022
patches/packages/mozilla-thunderbird-91.10.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.10.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-22/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31739
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747
       (* Security fix *)
+--------------------------+
Wed Jun 1 00:49:45 UTC 2022
patches/packages/mozilla-firefox-91.10.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.10.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-21/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31739
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747
       (* Security fix *)
+--------------------------+
Thu May 26 18:27:32 UTC 2022
patches/packages/cups-2.4.2-i586-1_slack15.0.txz: Upgraded.
       Fixed certificate strings comparison for Local authorization.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
       (* Security fix *)
+--------------------------+
Sat May 21 19:30:02 UTC 2022
patches/packages/mariadb-10.5.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and several security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458
       (* Security fix *)
+--------------------------+
Sat May 21 01:35:40 UTC 2022
patches/packages/mozilla-firefox-91.9.1esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.9.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-19/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529
       (* Security fix *)
patches/packages/mozilla-thunderbird-91.9.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.9.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-19/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529
       (* Security fix *)
+--------------------------+
Thu May 19 23:07:59 UTC 2022
patches/packages/bind-9.16.29-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
testing/packages/bind-9.18.3-i586-1_slack15.0.txz: Upgraded.
       Fixed a crash in DNS-over-HTTPS (DoH) code caused by premature TLS stream
       socket object deletion.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1183
       (* Security fix *)
+--------------------------+
Wed May 11 19:01:59 UTC 2022
patches/packages/curl-7.83.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       HSTS bypass via trailing dot.
       TLS and SSH connection too eager reuse.
       CERTINFO never-ending busy-loop.
       percent-encoded path separator in URL host.
       cookie for trailing dot TLD.
       curl removes wrong file on error.
       For more information, see:
       https://curl.se/docs/CVE-2022-30115.html
       https://curl.se/docs/CVE-2022-27782.html
       https://curl.se/docs/CVE-2022-27781.html
       https://curl.se/docs/CVE-2022-27780.html
       https://curl.se/docs/CVE-2022-27779.html
       https://curl.se/docs/CVE-2022-27778.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30115
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27779
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27778
       (* Security fix *)
+--------------------------+
Mon May 9 21:33:25 UTC 2022
patches/packages/linux-5.15.38/*: Upgraded.
       These updates fix various bugs and security issues.
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.27:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
       Fixed in 5.15.28:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
       Fixed in 5.15.29:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
       Fixed in 5.15.32:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
       Fixed in 5.15.33:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
       Fixed in 5.15.34:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
       Fixed in 5.15.35:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
       Fixed in 5.15.37:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
       (* Security fix *)
+--------------------------+
Wed May 4 21:24:57 UTC 2022
patches/packages/mozilla-thunderbird-91.9.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.9.0/releasenotes/
       (* Security fix *)
patches/packages/openssl-1.1.1o-i586-1_slack15.0.txz: Upgraded.
       Fixed a bug in the c_rehash script which was not properly sanitising shell
       metacharacters to prevent command injection.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1o-i586-1_slack15.0.txz: Upgraded.
patches/packages/seamonkey-2.53.12-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.12
       (* Security fix *)
+--------------------------+
Mon May 2 20:02:49 UTC 2022
patches/packages/libxml2-2.9.14-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       Fix integer overflow in xmlBuf and xmlBuffer.
       Fix potential double-free in xmlXPtrStringRangeFunction.
       Fix memory leak in xmlFindCharEncodingHandler.
       Normalize XPath strings in-place.
       Prevent integer-overflow in htmlSkipBlankChars() and xmlSkipBlankChars().
       Fix leak of xmlElementContent.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
       (* Security fix *)
patches/packages/mozilla-firefox-91.9.0esr-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.9.0/releasenotes/
patches/packages/samba-4.15.7-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.samba.org/samba/history/samba-4.15.7.html
+--------------------------+
Sat Apr 30 21:18:47 UTC 2022
patches/packages/pidgin-2.14.9-i586-1_slack15.0.txz: Upgraded.
       Mitigate the potential for a man in the middle attack via DNS spoofing by
       removing the code that supported the _xmppconnect DNS TXT record.
       For more information, see:
       https://www.pidgin.im/about/security/advisories/cve-2022-26491/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26491
       (* Security fix *)
+--------------------------+
Wed Apr 27 21:43:51 UTC 2022
patches/packages/curl-7.83.0-i586-1_slack15.0.txz: Upgraded.
       This update fixes security issues:
       OAUTH2 bearer bypass in connection re-use.
       Credential leak on redirect.
       Bad local IPv6 connection reuse.
       Auth/cookie leak on redirect.
       For more information, see:
       https://curl.se/docs/CVE-2022-22576.html
       https://curl.se/docs/CVE-2022-27774.html
       https://curl.se/docs/CVE-2022-27775.html
       https://curl.se/docs/CVE-2022-27776.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
       (* Security fix *)
+--------------------------+
Mon Apr 25 20:55:17 UTC 2022
patches/packages/freerdp-2.7.0-i586-1_slack15.0.txz: Upgraded.
       This update is a security and maintenance release.
       For more information, see:
       https://github.com/FreeRDP/FreeRDP/blob/2.7.0/ChangeLog
       (* Security fix *)
+--------------------------+
Thu Apr 21 19:11:10 UTC 2022
patches/packages/mozilla-thunderbird-91.8.1-i686-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.8.1/releasenotes/
+--------------------------+
Thu Apr 14 21:14:21 UTC 2022
patches/packages/git-2.35.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue where a Git worktree created by another
       user might be able to execute arbitrary code.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
       (* Security fix *)
patches/packages/gzip-1.12-i586-1_slack15.0.txz: Upgraded.
       This update fixes a security issue:
       zgrep applied to a crafted file name with two or more newlines can no
       longer overwrite an arbitrary, attacker-selected file.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
       (* Security fix *)
patches/packages/xz-5.2.5-i586-4_slack15.0.txz: Rebuilt.
       This update fixes a security issue:
       xzgrep applied to a crafted file name with two or more newlines can no
       longer overwrite an arbitrary, attacker-selected file.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
       (* Security fix *)
+--------------------------+
Wed Apr 13 20:51:01 UTC 2022
patches/packages/ruby-3.0.4-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       Double free in Regexp compilation.
       Buffer overrun in String-to-Float conversion.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739
       (* Security fix *)
+--------------------------+
Tue Apr 12 21:56:14 UTC 2022
patches/packages/whois-5.5.13-i586-1_slack15.0.txz: Upgraded.
       This update adds the .sd TLD server, updates the list of new gTLDs, and adds
       a Turkish translation.
+--------------------------+
Fri Apr 8 20:03:36 UTC 2022
patches/packages/libarchive-3.6.1-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix and security release.
       Security fixes:
       7zip reader: fix PPMD read beyond boundary.
       ZIP reader: fix possible out of bounds read.
       ISO reader: fix possible heap buffer overflow in read_children().
       RARv4 redaer: fix multiple issues in RARv4 filter code (introduced in
       libarchive 3.6.0).
       Fix heap use after free in archive_read_format_rar_read_data().
       Fix null dereference in read_data_compressed().
       Fix heap user after free in run_filters().
       (* Security fix *)
+--------------------------+
Wed Apr 6 20:23:46 UTC 2022
patches/packages/mozilla-thunderbird-91.8.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
       (* Security fix *)
+--------------------------+
Tue Apr 5 19:16:30 UTC 2022
patches/packages/mozilla-firefox-91.8.0esr-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.8.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-14/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
       (* Security fix *)
+--------------------------+
Sun Apr 3 19:57:16 UTC 2022
patches/packages/ca-certificates-20220403-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
+--------------------------+
Wed Mar 30 22:37:05 UTC 2022
patches/packages/vim-8.2.4649-i586-1_slack15.0.txz: Upgraded.
       Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646.
       This vulnerability is capable of crashing software, bypassing protection
       mechanisms, modifying memory, and possibly execution of arbitrary code.
       Thanks to marav for the heads-up.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
       https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
       https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
       (* Security fix *)
patches/packages/vim-gvim-8.2.4649-i586-1_slack15.0.txz: Upgraded.
+--------------------------+
Mon Mar 28 19:33:46 UTC 2022
patches/packages/whois-5.5.12-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release. Thanks to Nobby6.
patches/packages/zlib-1.2.12-i586-1_slack15.0.txz: Upgraded.
       This update fixes memory corruption when deflating (i.e., when compressing)
       if the input has many distant matches. Thanks to marav.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
       (* Security fix *)
+--------------------------+
Fri Mar 25 19:18:41 UTC 2022
patches/packages/seamonkey-2.53.11.1-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.11.1
       (* Security fix *)
+--------------------------+
Thu Mar 24 20:59:09 UTC 2022
patches/packages/python3-3.9.12-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://pythoninsider.blogspot.com/2022/03/python-3104-and-3912-are-now-available.html
usb-and-pxe-installers/usbimg2disk.sh: Upgraded.
       Calculate the space requirement by checking the size of the packages in the
       Slackware directory tree.
+--------------------------+
Mon Mar 21 20:24:16 UTC 2022
patches/packages/bind-9.16.27-i586-1_slack15.0.txz: Upgraded.
       Sorry folks, I had not meant to bump BIND to the newer branch. I've moved
       the other packages into /testing. Thanks to Nobby6 for pointing this out.
       This update fixes bugs and the following security issues:
       A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
       to be called recursively, which in turn left TCP connections hanging in the
       CLOSE_WAIT state blocking indefinitely when out-of-order processing was
       disabled.
       The rules for acceptance of records into the cache have been tightened to
       prevent the possibility of poisoning if forwarders send records outside
       the configured bailiwick.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
       (* Security fix *)
testing/packages/bind-9.18.1-i586-1_slack15.0.txz: Moved.
+--------------------------+
Mon Mar 21 07:31:06 UTC 2022
patches/packages/qt5-5.15.3_20220318_e507d3e5-i586-1_slack15.0.txz: Upgraded.
       Pulled from git again to fix missing liblocationlabsplugin.so.
       Fixed syntax error in qt5.csh. Thanks to rkomar.
+--------------------------+
Sat Mar 19 20:28:16 UTC 2022
patches/packages/glibc-zoneinfo-2022a-noarch-1_slack15.0.txz: Upgraded.
       This package provides the latest timezone updates.
+--------------------------+
Fri Mar 18 20:16:12 UTC 2022
patches/packages/python3-3.9.11-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues:
       libexpat upgraded from 2.4.1 to 2.4.7
       bundled pip upgraded from 21.2.4 to 22.0.4
       authorization bypass fixed in urllib.request
       REDoS avoided in importlib.metadata
       For more information, see:
       https://pythoninsider.blogspot.com/2022/03/python-3103-3911-3813-and-3713-are-now.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28363
       (* Security fix *)
+--------------------------+
Thu Mar 17 19:46:28 UTC 2022
patches/packages/bind-9.18.1-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       An assertion could occur in resume_dslookup() if the fetch had been shut
       down earlier.
       Lookups involving a DNAME could trigger an INSIST when "synth-from-dnssec"
       was enabled.
       A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
       to be called recursively, which in turn left TCP connections hanging in the
       CLOSE_WAIT state blocking indefinitely when out-of-order processing was
       disabled.
       The rules for acceptance of records into the cache have been tightened to
       prevent the possibility of poisoning if forwarders send records outside
       the configured bailiwick.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
       (* Security fix *)
patches/packages/bluez-5.64-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release:
       Fix issue with handling A2DP discover procedure.
       Fix issue with media endpoint replies and SetConfiguration.
       Fix issue with HoG queuing events before report map is read.
       Fix issue with HoG and read order of GATT attributes.
       Fix issue with HoG and not using UHID_CREATE2 interface.
       Fix issue with failed scanning for 5 minutes after reboot.
patches/packages/openssl-1.1.1n-i586-1_slack15.0.txz: Upgraded.
       This update fixes a high severity security issue:
       The BN_mod_sqrt() function, which computes a modular square root, contains
       a bug that can cause it to loop forever for non-prime moduli.
       For more information, see:
       https://www.openssl.org/news/secadv/20220315.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
       (* Security fix *)
patches/packages/openssl-solibs-1.1.1n-i586-1_slack15.0.txz: Upgraded.
patches/packages/qt5-5.15.3_20220312_33a3f16f-i586-1_slack15.0.txz: Upgraded.
       Thanks to Heinz Wiesinger for updating the fetch_sources.sh script to make
       sure that the QtWebEngine version matches the rest of Qt, which got the
       latest git pull compiling again.
       If a 32-bit userspace is detected, then:
       export QTWEBENGINE_CHROMIUM_FLAGS="--disable-seccomp-filter-sandbox"
       This works around crashes occuring with 32-bit QtWebEngine applications.
       Thanks to alienBOB.
+--------------------------+
Tue Mar 15 00:13:59 UTC 2022
patches/packages/httpd-2.4.53-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       mod_sed: Read/write beyond bounds
       core: Possible buffer overflow with very large or unlimited
       LimitXMLRequestBody
       HTTP request smuggling vulnerability
       mod_lua: Use of uninitialized value in r:parsebody
       For more information, see:
       https://downloads.apache.org/httpd/CHANGES_2.4.53
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
       (* Security fix *)
patches/packages/mozilla-firefox-91.7.1esr-i686-1_slack15.0.txz: Upgraded.
       This release makes the following change:
       Yandex and Mail.ru have been removed as optional search providers in the
       drop-down search menu in Firefox.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.7.1/releasenotes/
       (* Security fix *)
+--------------------------+
Sat Mar 12 20:57:35 UTC 2022
patches/packages/polkit-0.120-i586-3_slack15.0.txz: Rebuilt.
       Patched to fix a security issue where an unprivileged user could cause a
       denial of service due to process file descriptor exhaustion.
       Thanks to marav.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115
       (* Security fix *)
+--------------------------+
Thu Mar 10 02:30:54 UTC 2022
patches/packages/ca-certificates-20220309-noarch-1_slack15.0.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
patches/packages/mozilla-thunderbird-91.7.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.7.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-12/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386
       (* Security fix *)
+--------------------------+
Wed Mar 9 04:14:08 UTC 2022
patches/packages/linux-5.15.27/*: Upgraded.
       These updates fix various bugs and security issues, including the recently
       announced "Dirty Pipe" vulnerability which allows overwriting data in
       arbitrary read-only files (CVE-2022-0847).
       Be sure to upgrade your initrd after upgrading the kernel packages.
       If you use lilo to boot your machine, be sure lilo.conf points to the correct
       kernel and initrd and run lilo as root to update the bootloader.
       If you use elilo to boot your machine, you should run eliloconfig to copy the
       kernel and initrd to the EFI System Partition.
       For more information, see:
       Fixed in 5.15.20:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
       Fixed in 5.15.23:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
       Fixed in 5.15.24:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
       Fixed in 5.15.25:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
       Fixed in 5.15.26:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
       (* Security fix *)
+--------------------------+
Tue Mar 8 04:39:53 UTC 2022
patches/packages/boost-1.78.0-i586-2_slack15.0.txz: Rebuilt.
       This update has been patched to fix a regression:
       Boost.Build silently skips installation of library headers and binaries in
       some cases.
       Thanks to Willy Sudiarto Raharjo.
+--------------------------+
Tue Mar 8 00:52:43 UTC 2022
patches/packages/mozilla-firefox-91.7.0esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.7.0/releasenotes/
       (* Security fix *)
+--------------------------+
Sat Mar 5 19:56:26 UTC 2022
patches/packages/expat-2.4.7-i586-1_slack15.0.txz: Upgraded.
       This is a bugfix release:
       Relax fix to CVE-2022-25236 (introduced with release 2.4.5) with regard to
       all valid URI characters (RFC 3986).
patches/packages/mozilla-firefox-91.6.1esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.6.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-09/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486
       (* Security fix *)
patches/packages/mozilla-thunderbird-91.6.2-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.6.2/releasenotes/
       (* Security fix *)
+--------------------------+
Wed Mar 2 21:39:57 UTC 2022
patches/packages/seamonkey-2.53.11-i686-1_slack15.0.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.11
       (* Security fix *)
+--------------------------+
Tue Mar 1 05:05:48 UTC 2022
patches/packages/libxml2-2.9.13-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       Use-after-free of ID and IDREF attributes
       (Thanks to Shinji Sato for the report)
       Use-after-free in xmlXIncludeCopyRange (David Kilzer)
       Fix Null-deref-in-xmlSchemaGetComponentTargetNs (huangduirong)
       Fix memory leak in xmlXPathCompNodeTest
       Fix null pointer deref in xmlStringGetNodeList
       Fix several memory leaks found by Coverity (David King)
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
       (* Security fix *)
patches/packages/libxslt-1.1.35-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and the following security issues:
       Fix use-after-free in xsltApplyTemplates
       Fix memory leak in xsltDocumentElem (David King)
       Fix memory leak in xsltCompileIdKeyPattern (David King)
       Fix double-free with stylesheets containing entity nodes
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30560
       (* Security fix *)
+--------------------------+
Fri Feb 25 00:03:28 UTC 2022
patches/packages/cyrus-sasl-2.1.28-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
       (* Security fix *)
+--------------------------+
Mon Feb 21 20:21:38 UTC 2022
patches/packages/expat-2.4.6-i586-1_slack15.0.txz: Upgraded.
       Fixed a regression introduced by the fix for CVE-2022-25313 that affects
       applications that (1) call function XML_SetElementDeclHandler and (2) are
       parsing XML that contains nested element declarations:
       (e.g. "<!ELEMENT junk ((bar|foo|xyz+), zebra*)>").
patches/packages/flac-1.3.4-i586-1_slack15.0.txz: Upgraded.
       This update fixes overflow issues with encoding and decoding.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0561
       (* Security fix *)
patches/packages/mariadb-10.5.15-i586-2_slack15.0.txz: Rebuilt.
       Removed dangling symlink.
+--------------------------+
Sun Feb 20 05:13:20 UTC 2022
patches/packages/expat-2.4.5-i586-1_slack15.0.txz: Upgraded.
       Fixed security issues that could lead to denial of service or potentially
       arbitrary code execution.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
       (* Security fix *)
+--------------------------+
Fri Feb 18 05:29:00 UTC 2022
patches/packages/mozilla-thunderbird-91.6.1-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.6.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-07/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0566
       (* Security fix *)
patches/packages/php-7.4.28-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       UAF due to php_filter_float() failing for ints.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708
       (* Security fix *)
extra/php80/php80-8.0.16-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       UAF due to php_filter_float() failing for ints.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708
       (* Security fix *)
extra/php81/php81-8.1.3-i586-1_slack15.0.txz: Upgraded.
       This update fixes bugs and a security issue:
       UAF due to php_filter_float() failing for ints.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708
       (* Security fix *)
+--------------------------+
Tue Feb 15 20:00:48 UTC 2022
patches/packages/aaa_base-15.0-i586-4_slack15.0.txz: Rebuilt.
       If root's mailbox did not already exist, it would be created with insecure
       permissions leading to possible local information disclosure. This update
       ensures that a new mailbox will be created with proper permissions and
       ownership, and corrects the permissions on an existing mailbox if they are
       found to be incorrect. Thanks to Martin for the bug report.
       (* Security fix *)
patches/packages/util-linux-2.37.4-i586-1_slack15.0.txz: Upgraded.
       This release fixes a security issue in chsh(1) and chfn(8):
       By default, these utilities had been linked with libreadline, which allows
       the INPUTRC environment variable to be abused to produce an error message
       containing data from an arbitrary file. So, don't link these utilities with
       libreadline as it does not use secure_getenv() (or a similar concept), or
       sanitize the config file path to avoid vulnerabilities that could occur in
       set-user-ID or set-group-ID programs.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0563
       (* Security fix *)
+--------------------------+
Mon Feb 14 00:10:38 UTC 2022
patches/packages/mariadb-10.5.15-i586-1_slack15.0.txz: Upgraded.
       This update fixes potential denial-of-service vulnerabilities.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663
       (* Security fix *)
+--------------------------+
Thu Feb 10 01:46:55 UTC 2022
patches/packages/at-3.2.3-i586-1_slack15.0.txz: Upgraded.
       Switched to at-3.2.3 since version 3.2.4 has a regression that causes
       queued jobs to not always run on time when atd is run as a standalone
       daemon. Thanks to Cesare.
patches/packages/mozilla-firefox-91.6.0esr-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.6.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-05/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22753
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
       (* Security fix *)
patches/packages/mozilla-thunderbird-91.6.0-i686-1_slack15.0.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.6.0/releasenotes/
       https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird91.6
       (* Security fix *)
+--------------------------+
Wed Feb 2 22:22:22 UTC 2022
Slackware 15.0 x86 stable is released!

Another too-long development cycle is behind us after we bit off more than
we could chew and then had to shine it up to a high-gloss finish. Hopefully
we've managed to get the tricky parts out of the way so that we'll be able
to see a 15.1 incremental update after a far shorter development cycle.
Certainly the development infrastructure has been streamlined here and things
should be easier moving forward. My thanks to the rest of the Slackware team,
all the upstream developers who have given us such great building materials,
the folks on LinuxQuestions.org and elsewhere for all the help with testing,
great suggestions, and countless bug fixes, and to everyone who helped
support this project so that the release could finally see the light of day.
I couldn't have done any of this without your help, and I'm grateful to all
of you. Thanks!

For more information, check out the RELEASE_NOTES, CHANGES_AND_HINTS.TXT,
and ANNOUNCE.15.0.

Have fun! :-)
+--------------------------+
Wed Feb 2 08:21:48 UTC 2022
a/kernel-generic-5.15.19-i586-2.txz: Upgraded.
a/kernel-generic-smp-5.15.19_smp-i686-2.txz: Upgraded.
a/kernel-huge-5.15.19-i586-2.txz: Upgraded.
a/kernel-huge-smp-5.15.19_smp-i686-2.txz: Upgraded.
a/kernel-modules-5.15.19-i586-2.txz: Upgraded.
a/kernel-modules-smp-5.15.19_smp-i686-2.txz: Upgraded.
d/kernel-headers-5.15.19_smp-x86-2.txz: Upgraded.
k/kernel-source-5.15.19_smp-noarch-2.txz: Upgraded.
       -RTC_SYSTOHC_DEVICE "rtc0"
       RTC_SYSTOHC y -> n
extra/linux-5.15.19-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Rebuilt.
       -RTC_SYSTOHC_DEVICE "rtc0"
       RTC_SYSTOHC y -> n
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Feb 2 04:17:39 UTC 2022
fortune -m "I will be finished tomorrow" fortunes2
a/kernel-generic-5.15.19-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.19_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.19-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.19_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.19-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.19_smp-i686-1.txz: Upgraded.
ap/screen-4.9.0-i586-1.txz: Upgraded.
       Patched possible denial of service via a crafted UTF-8 character sequence.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937
       (* Security fix *)
d/kernel-headers-5.15.19_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.19_smp-noarch-1.txz: Upgraded.
       RTC_INTF_DEV_UIE_EMUL y -> n
       RTC_SYSTOHC n -> y
       +RTC_SYSTOHC_DEVICE "rtc0"
l/lcms2-2.13-i586-2.txz: Rebuilt.
       [PATCH] Fix for optimization error on grayscale.
       Thanks to Aaron Boxer for reporting this issue.
       Thanks to gmgf.
extra/linux-5.15.19-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/source/linux-5.16.5-configs/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Feb 1 08:27:47 UTC 2022
kde/kate-21.12.1-i586-2.txz: Rebuilt.
       Fix missing validation of binaries executed via QProcess.
       Thanks to Heinz Wiesinger.
       For more information, see:
       https://kde.org/info/security/advisory-20220131-1.txt
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
       (* Security fix *)
+--------------------------+
Tue Feb 1 05:35:21 UTC 2022
Hey, my shiny brass lamp is almost out of fuel!
a/rpm2tgz-1.2.2-i586-6.txz: Rebuilt.
       Don't use --no-absolute-filenames, because inexplicably it also strips the
       leading '/' from symlink targets, generally creating a broken symlink.
       The problem we were attempting to fix is far less common than symlinks to
       absolute filenames, so we'll revert this for further consideration.
       Thanks to pghvlaans.
+--------------------------+
Tue Feb 1 04:37:04 UTC 2022
The sepulchral voice intones, "The cave is now closed."
kde/falkon-3.2.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.90.0-i586-2.txz: Rebuilt.
       [PATCH] only start programs in user's path.
       [PATCH] only execute diff in path.
       Thanks to gmgf.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
       (* Security fix *)
l/libcanberra-0.30-i586-9.txz: Rebuilt.
       Fix a bug crashing some applications in Wayland desktops.
       Thanks to 01micko.
n/samba-4.15.5-i586-1.txz: Upgraded.
       This is a security release in order to address the following defects:
       UNIX extensions in SMB1 disclose whether the outside target of a symlink
       exists.
       Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
       allows remote attackers to execute arbitrary code as root on affected Samba
       installations that use the VFS module vfs_fruit.
       Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
       the ability to write to an account can exploit this to perform a
       denial-of-service attack by adding an SPN that matches an existing service.
       Additionally, an attacker who can intercept traffic can impersonate existing
       services, resulting in a loss of confidentiality and integrity.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2021-44141.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
       https://www.samba.org/samba/security/CVE-2021-44142.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
       https://www.samba.org/samba/security/CVE-2022-0336.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
       (* Security fix *)
x/xterm-370-i586-7.txz: Rebuilt.
       Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
       Thanks to gmgf.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
       (* Security fix *)
testing/source/linux-5.16.4-configs/*: Added.
       Sample config files to build 5.16.4 Linux kernels.
+--------------------------+
Sun Jan 30 20:48:46 UTC 2022
a/aaa_libraries-15.0-i586-19.txz: Rebuilt.
       Upgraded: libexpat.so.1.8.4, libjson-c.so.5.1.0 (thanks to peake).
ap/at-3.2.4-i586-1.txz: Upgraded.
d/git-2.35.1-i586-1.txz: Upgraded.
l/expat-2.4.4-i586-1.txz: Upgraded.
       This update merges the patches we previously applied to expat-2.4.3.
l/imagemagick-7.1.0_22-i586-1.txz: Upgraded.
l/lcms2-2.13-i586-1.txz: Upgraded.
+--------------------------+
Sat Jan 29 19:23:50 UTC 2022
a/kernel-generic-5.15.18-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.18_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.18-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.18_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.18-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.18_smp-i686-1.txz: Upgraded.
ap/vim-8.2.4256-i586-1.txz: Upgraded.
d/kernel-headers-5.15.18_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.18_smp-noarch-1.txz: Upgraded.
xap/vim-gvim-8.2.4256-i586-1.txz: Upgraded.
extra/linux-5.15.18-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Jan 29 06:17:05 UTC 2022
a/rpm2tgz-1.2.2-i586-5.txz: Rebuilt.
       rpm2targz: when extracting the cpio archive from inside the RPM, use
       --no-absolute-filenames to protect against a poorly made RPM scribbling all
       over system files/directories. Thanks to Sl4ck3ver.
       Support -i option to ignore non-zero exit value from rpm2cpio.
       This allows repackaging some malformed RPMs.
       Thanks to ricky_cardo for the sample malformed RPM.
+--------------------------+
Fri Jan 28 21:01:03 UTC 2022
a/plzip-1.10-i586-1.txz: Upgraded.
ap/sudo-1.9.9-i586-1.txz: Upgraded.
d/Cython-0.29.27-i586-1.txz: Upgraded.
d/poke-2.0-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.10-i586-1.txz: Upgraded.
x/mesa-21.3.5-i586-2.txz: Rebuilt.
       Include eglinfo utility. Thanks to LuckyCyborg.
x/wayland-protocols-1.25-noarch-1.txz: Upgraded.
+--------------------------+
Thu Jan 27 22:43:13 UTC 2022
a/aaa_libraries-15.0-i586-18.txz: Rebuilt.
       Rebuilt to pick up the patched libexpat.so.1.8.3.
a/kernel-generic-5.15.17-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.17_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.17-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.17_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.17-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.17_smp-i686-1.txz: Upgraded.
a/lzlib-1.13-i586-1.txz: Upgraded.
a/sysvinit-scripts-15.0-noarch-8.txz: Rebuilt.
       rc.S: clear /var/lock/subsys before starting libcgroup services.
       Thanks to pyllyukko.
ap/pamixer-1.5-i586-2.txz: Rebuilt.
       Recompiled against boost-1.78.0.
d/kernel-headers-5.15.17_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.17_smp-noarch-1.txz: Upgraded.
kde/kig-21.12.1-i586-2.txz: Rebuilt.
       Recompiled against boost-1.78.0.
kde/kopeninghours-21.12.1-i586-2.txz: Rebuilt.
       Recompiled against boost-1.78.0.
kde/krita-5.0.2-i586-2.txz: Rebuilt.
       Recompiled against boost-1.78.0.
l/boost-1.78.0-i586-1.txz: Upgraded.
       I hadn't planned to update this at such a late stage, but POV-Ray needs it
       and everything we ship builds fine against it. Thanks to bender647.
       Shared library .so-version bump.
l/cryfs-0.10.3-i586-4.txz: Rebuilt.
       Recompiled against boost-1.78.0.
l/expat-2.4.3-i586-3.txz: Rebuilt.
       Prevent integer overflow in doProlog.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
       (* Security fix *)
l/netpbm-10.97.03-i586-1.txz: Upgraded.
l/openexr-2.5.7-i586-5.txz: Rebuilt.
       Recompiled against boost-1.78.0.
l/pipewire-0.3.44-i586-1.txz: Upgraded.
n/fetchmail-6.4.27-i586-1.txz: Upgraded.
n/libgpg-error-1.44-i586-1.txz: Upgraded.
x/mesa-21.3.5-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.5.1esr-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.5.1/releasenotes/
       (* Security fix *)
extra/linux-5.15.17-nosmp-sdk/*: Upgraded.
extra/rust-for-mozilla/rust-1.54.0-i686-4.txz: Rebuilt.
       Removed duplicated libLLVM shared library.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jan 26 20:46:44 UTC 2022
a/aaa_libraries-15.0-i586-17.txz: Rebuilt.
       Upgraded: libcap.so.2.63, libglib-2.0.so.0.7000.3,
       libgmodule-2.0.so.0.7000.3, libgobject-2.0.so.0.7000.3,
       libgthread-2.0.so.0.7000.3, libtdb.so.1.4.6.
a/mkinitrd-1.4.11-i586-28.txz: Rebuilt.
       Support kernel modules compressed with xz. Thanks to baldzhang.
l/glib2-2.70.3-i586-1.txz: Upgraded.
l/libcap-2.63-i586-1.txz: Upgraded.
n/bluez-5.63-i586-2.txz: Rebuilt.
       rc.bluetooth: use #!/bin/bash shebang.
       Filter commented and empty lines when parsing uart.conf.
       Thanks to atelszewski.
+--------------------------+
Wed Jan 26 04:37:35 UTC 2022
l/polkit-0.120-i586-2.txz: Rebuilt.
       [PATCH] pkexec: local privilege escalation.
       Thanks to Qualys Research Labs for reporting this issue.
       For more information, see:
       https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
       (* Security fix *)
+--------------------------+
Tue Jan 25 20:10:35 UTC 2022
d/icecream-1.3.1-i586-4.txz: Rebuilt.
       rc.icecream.conf: generate an error message and avoid a hang when
       "hostname -d" doesn't work, usually because the hostname in /etc/HOSTNAME
       can't be resolved. Thanks to franzen.
kde/latte-dock-0.10.8-i586-1.txz: Upgraded.
xap/geeqie-1.7.2-i586-1.txz: Upgraded.
+--------------------------+
Tue Jan 25 06:16:36 UTC 2022
It may look like we're currently experiencing more stuckness, but this will
lead us to Quality. We'll have this release in the can before you know it.
a/aaa_glibc-solibs-2.33-i586-5.txz: Rebuilt.
a/aaa_libraries-15.0-i586-16.txz: Rebuilt.
       Rebuilt to pick up the patched libexpat.so.1.8.3.
a/kernel-firmware-20220124_eb8ea1b-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.16-i586-2.txz: Upgraded.
a/kernel-generic-smp-5.15.16_smp-i686-2.txz: Upgraded.
a/kernel-huge-5.15.16-i586-2.txz: Upgraded.
       -9P_FSCACHE n
       9P_FS m -> y
       Thanks to peake.
a/kernel-huge-smp-5.15.16_smp-i686-2.txz: Upgraded.
       -9P_FSCACHE n
       9P_FS m -> y
       Thanks to peake.
a/kernel-modules-5.15.16-i586-2.txz: Upgraded.
a/kernel-modules-smp-5.15.16_smp-i686-2.txz: Upgraded.
a/mkinitrd-1.4.11-i586-27.txz: Rebuilt.
       mkinitrd_command_generator.sh: properly detect partitions of a RAID device.
       Thanks to perrin4869.
a/util-linux-2.37.3-i586-1.txz: Upgraded.
       This release fixes two security mount(8) and umount(8) issues:
       An issue related to parsing the /proc/self/mountinfo file allows an
       unprivileged user to unmount other user's filesystems that are either
       world-writable themselves or mounted in a world-writable directory.
       Improper UID check in libmount allows an unprivileged user to unmount
       FUSE filesystems of users with similar UID.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
       (* Security fix *)
ap/vim-8.2.4212-i586-1.txz: Upgraded.
d/git-2.35.0-i586-1.txz: Upgraded.
d/kernel-headers-5.15.16_smp-x86-2.txz: Upgraded.
k/kernel-source-5.15.16_smp-noarch-2.txz: Upgraded.
l/expat-2.4.3-i586-2.txz: Rebuilt.
       Fix signed integer overflow in function XML_GetBuffer for when
       XML_CONTEXT_BYTES is defined to >0 (which is both common and
       default). Impact is denial of service or other undefined behavior.
       While we're here, also patch a memory leak on output file opening error.
       Thanks to marav.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
       (* Security fix *)
l/fluidsynth-2.2.5-i586-1.txz: Upgraded.
l/glibc-2.33-i586-5.txz: Rebuilt.
       This update patches two security issues:
       Unexpected return value from glibc's realpath().
       Off-by-one buffer overflow/underflow in glibc's getcwd().
       Thanks to Qualys Research Labs for reporting these issues.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
       (* Security fix *)
l/glibc-i18n-2.33-i586-5.txz: Rebuilt.
l/glibc-profile-2.33-i586-5.txz: Rebuilt.
l/tdb-1.4.6-i586-1.txz: Upgraded.
x/xf86-input-libinput-1.2.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.5.1-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.5.1/releasenotes/
xap/vim-gvim-8.2.4212-i586-1.txz: Upgraded.
extra/linux-5.15.16-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Jan 23 19:36:54 UTC 2022
l/imagemagick-7.1.0_20-i586-1.txz: Upgraded.
       Built using --with-fftw. Thanks to stormbr.
+--------------------------+
Sun Jan 23 01:17:39 UTC 2022
ap/ddrescue-1.26-i586-1.txz: Upgraded.
d/parallel-20220122-noarch-1.txz: Upgraded.
l/libimobiledevice-20211124_2c6121d-i586-2.txz: Rebuilt.
       Don't include compatibility pkgconfig symlink. It's unlikely that
       anything requires it.
l/libimobiledevice-glue-20211125_3cb687b-i586-2.txz: Rebuilt.
       Removed broken pkgconfig symlink. Thanks to marav.
isolinux/initrd.img: Rebuilt.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Jan 21 19:58:34 UTC 2022
kde/kconfigwidgets-5.90.1-i586-1.txz: Upgraded.
l/libwebp-1.2.2-i586-1.txz: Upgraded.
+--------------------------+
Fri Jan 21 05:47:49 UTC 2022
a/aaa_libraries-15.0-i586-15.txz: Rebuilt.
       Upgraded: libzstd.so.1.5.2.
a/kernel-firmware-20220119_0c6a7b3-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.16-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.16_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.16-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.16_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.16-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.16_smp-i686-1.txz: Upgraded.
ap/vim-8.2.4166-i586-1.txz: Upgraded.
d/kernel-headers-5.15.16_smp-x86-1.txz: Upgraded.
d/rust-1.58.1-i686-1.txz: Upgraded.
k/kernel-source-5.15.16_smp-noarch-1.txz: Upgraded.
l/qt5-5.15.3_20211130_014c375b-i586-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] Move the wayland socket polling to a separate event thread.
       Thanks to LuckyCyborg.
l/svgalib-1.9.25-i586-7.txz: Rebuilt.
       Don't try to use the (broken) assembly. Thanks to nobodino.
l/zstd-1.5.2-i586-1.txz: Upgraded.
x/ibus-m17n-1.4.9-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.4166-i586-1.txz: Upgraded.
extra/linux-5.15.16-nosmp-sdk/*: Upgraded.
extra/php80/php80-8.0.15-i586-1.txz: Upgraded.
extra/php81/php81-8.1.2-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jan 19 18:18:02 UTC 2022
ap/inxi-3.3.12_1-noarch-1.txz: Upgraded.
ap/man-db-2.9.4-i586-3.txz: Rebuilt.
       Don't use --no-purge in the daily cron job to update the databases.
l/gst-plugins-bad-free-1.18.5-i586-4.txz: Rebuilt.
       Link against neon-0.32.2. Thanks to marav.
n/bind-9.16.25-i586-1.txz: Upgraded.
n/ethtool-5.16-i586-1.txz: Upgraded.
n/samba-4.15.4-i586-1.txz: Upgraded.
n/wpa_supplicant-2.10-i586-1.txz: Upgraded.
       The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant
       before 2.10 are vulnerable to side-channel attacks as a result of cache
       access patterns.
       NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23304
       (* Security fix *)
x/xterm-370-i586-6.txz: Rebuilt.
       XTerm-console: improve the font settings. Thanks to GazL.
+--------------------------+
Tue Jan 18 20:39:39 UTC 2022
l/rpcsvc-proto-1.4.3-i586-1.txz: Upgraded.
x/xterm-370-i586-5.txz: Rebuilt.
       XTerm-console: don't include locale options by default. Fix typo in comment.
       Thanks to GazL.
isolinux/initrd.img: Rebuilt.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Jan 17 22:44:42 UTC 2022
Things haven't quite settled down yet with more bugfixes and a couple of safe
upgrades, so not today folks. But enjoy Slackware's half-birthday anyway! ;-)
ap/slackpkg-15.0.10-noarch-1.txz: Upgraded.
       Fix mirrors.ucr.ac.cr link address (Emmet Ford)
       Remove wroc.pl mirrors (Emmet Ford)
       Remove kddilabs.jp from mirrors (Emmet Ford)
       Unattended usage improvements (PiterPUNK)
       Create file to flag if the system needs restart (PiterPUNK)
       Thanks to Robby Workman.
kde/kstars-3.5.7-i586-1.txz: Upgraded.
kde/kwin-5.23.5-i586-2.txz: Rebuilt.
       [PATCH] Bypass wayland interface blacklisting.
       Thanks to LuckyCyborg.
kde/plasma-workspace-5.23.5-i586-3.txz: Rebuilt.
       [PATCH 1/2] Revert "Drop setupX11 from startplasma-waylandsession."
       [PATCH 2/2] Revert "Drop X11 root properties for KDE full session."
       Thanks to LuckyCyborg.
l/libical-3.0.13-i586-1.txz: Upgraded.
n/p11-kit-0.24.1-i586-1.txz: Upgraded.
n/stunnel-5.62-i586-1.txz: Upgraded.
x/xterm-370-i586-4.txz: Rebuilt.
       Fixed XTerm-console (previously XTerm.linux.console).
       Renamed XTerm.upstream.default to XTerm-upstream.
       Thanks to GazL.
xap/fluxbox-1.3.7-i586-6.txz: Rebuilt.
       [PATCH] replace FbRootWindow::depth with maxDepth.
       Thanks to OldHolborn.
xap/geeqie-1.7.1-i586-1.txz: Upgraded.
+--------------------------+
Sun Jan 16 21:33:27 UTC 2022
a/aaa_libraries-15.0-i586-14.txz: Rebuilt.
       Upgraded: libexpat.so.1.8.3.
a/kernel-generic-5.15.15-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.15_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.15-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.15_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.15-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.15_smp-i686-1.txz: Upgraded.
ap/cups-filters-1.28.11-i586-1.txz: Upgraded.
ap/ksh93-1.0_20220114_e569f23e-i586-1.txz: Upgraded.
ap/vim-8.2.4115-i586-1.txz: Upgraded.
d/gdb-11.2-i586-1.txz: Upgraded.
d/kernel-headers-5.15.15_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.15_smp-noarch-1.txz: Upgraded.
kde/kwayland-server-5.23.5-i586-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] Store surface object in tablet cursor using QPointer.
       Thanks to ZhaoLin1457.
l/expat-2.4.3-i586-1.txz: Upgraded.
       Fix issues with left shifts by >=29 places resulting in:
       a) realloc acting as free
       b) realloc allocating too few bytes
       c) undefined behavior
       Fix integer overflow on variable m_groupSize in function doProlog leading
       to realloc acting as free. Impact is denial of service or other undefined
       behavior.
       Prevent integer overflows near memory allocation at multiple places.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
       (* Security fix *)
l/libunwind-1.6.2-i586-1.txz: Upgraded.
x/xterm-370-i586-3.txz: Rebuilt.
       Ship a sample XTerm.linux.console app-defaults file. Thanks to GazL.
xap/vim-gvim-8.2.4115-i586-1.txz: Upgraded.
xap/xsnow-3.4.3-i586-1.txz: Upgraded.
extra/linux-5.15.15-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Jan 16 07:23:29 UTC 2022
a/aaa_base-15.0-i586-3.txz: Rebuilt.
       In initial email to root, use the new /var/lib/pkgtools/ paths to the files
       for packages and scripts. Thanks to franzen.
a/btrfs-progs-5.16-i586-1.txz: Upgraded.
d/python3-3.9.10-i586-1.txz: Upgraded.
d/rust-1.58.0-i686-1.txz: Upgraded.
kde/digikam-7.5.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.90.0-i586-2.txz: Rebuilt.
       Applied patch:
       [PATCH] Prevent kglobalaccel5 getting activated on non-Plasma systems.
       Although this patch was later reverted, I'm on board with the need for it.
       If it causes any problems, please let me know soon.
       Thanks to Lockywolf.
kde/kid3-3.9.1-i586-1.txz: Upgraded.
kde/plasma-wayland-protocols-1.6.0-i586-1.txz: Upgraded.
kde/sddm-0.19.0-i586-10.txz: Rebuilt.
       Allow the init program to properly supervise sddm when entering runlevel 4.
       Thanks to mumahendras3.
l/neon-0.32.2-i586-1.txz: Upgraded.
l/netpbm-10.97.02-i586-1.txz: Upgraded.
n/postfix-3.6.4-i586-1.txz: Upgraded.
x/mesa-21.3.4-i586-1.txz: Upgraded.
x/xterm-370-i586-2.txz: Rebuilt.
       Use upstream app-defaults again. Thanks to OldHolborn.
+--------------------------+
Fri Jan 14 05:24:07 UTC 2022
a/cryptsetup-2.4.3-i586-1.txz: Upgraded.
       This update addresses a multi-step attack on LUKS2 format by orchestrating
       LUKS2 reencryption metadata in existing LUKS2 header. An attacker is able to
       trigger permanent data decryption (ciphertext->plaintext transformation) on
       part of data device on next LUKS2 device activation. Attacker does _not_
       have to know passphrase or decrypted volume encryption key.
       cryptsetup versions older than 2.2.0 are not affected by this, because they
       do not support online LUKS2 reencryption.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122
       (* Security fix *)
+--------------------------+
Wed Jan 12 22:04:33 UTC 2022
Good hello, and welcome to the third and final release candidate for Slackware
15.0. We're 99% frozen at this point and are mostly looking for regression or
other bug reports that might be able to be addressed before this goes stable.
Of course, the management here reserves the right to make exceptions... that
5.15.15 kernel version has a nice ring to it. If your requests didn't make it
into this iteration, perhaps we will revisit them for the next -current cycle.
Some were just a little too late but will more than likely be needed next time
(I'm looking at Didier's grubconfig), while others are just out of scope for
the main tree where I like to abide by YAGNI as much as possible.
Anyway, let's get some testing done and we'll be there soon. Enjoy! :-)
a/aaa_base-15.0-i586-2.txz: Rebuilt.
       The Linux Counter has shut down, so remove the registration email.
       Update the welcome email for Slackware 15.0.
a/aaa_libraries-15.0-i586-13.txz: Rebuilt.
       Upgraded: libsigsegv.so.2.0.7.
a/eudev-3.2.11-i586-1.txz: Upgraded.
a/haveged-1.9.17-i586-1.txz: Upgraded.
a/hdparm-9.63-i586-1.txz: Upgraded.
a/kernel-firmware-20220111_13dca28-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.14-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.14_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.14-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.14_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.14-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.14_smp-i686-1.txz: Upgraded.
ap/vim-8.2.4065-i586-1.txz: Upgraded.
d/kernel-headers-5.15.14_smp-x86-1.txz: Upgraded.
d/strace-5.16-i586-1.txz: Upgraded.
d/vala-0.54.6-i586-1.txz: Upgraded.
k/kernel-source-5.15.14_smp-noarch-1.txz: Upgraded.
kde/attica-5.90.0-i586-1.txz: Upgraded.
kde/baloo-5.90.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.90.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.90.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.90.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.90.0-i586-1.txz: Upgraded.
kde/kactivities-5.90.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.90.0-i586-1.txz: Upgraded.
kde/kapidox-5.90.0-i586-1.txz: Upgraded.
kde/karchive-5.90.0-i586-1.txz: Upgraded.
kde/kauth-5.90.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.90.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.90.0-i586-1.txz: Upgraded.
kde/kcmutils-5.90.0-i586-1.txz: Upgraded.
kde/kcodecs-5.90.0-i586-1.txz: Upgraded.
kde/kcompletion-5.90.0-i586-1.txz: Upgraded.
kde/kconfig-5.90.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.90.0-i586-1.txz: Upgraded.
kde/kcontacts-5.90.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.90.0-i586-1.txz: Upgraded.
kde/kcrash-5.90.0-i586-1.txz: Upgraded.
kde/kdav-5.90.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.90.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.90.0-i586-1.txz: Upgraded.
kde/kded-5.90.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.90.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.90.0-i586-1.txz: Upgraded.
kde/kdesu-5.90.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.90.0-i586-1.txz: Upgraded.
kde/kdnssd-5.90.0-i586-1.txz: Upgraded.
kde/kdoctools-5.90.0-i586-1.txz: Upgraded.
kde/kemoticons-5.90.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.90.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.90.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.90.0-i586-1.txz: Upgraded.
kde/kholidays-5.90.0-i586-1.txz: Upgraded.
kde/khtml-5.90.0-i586-1.txz: Upgraded.
kde/ki18n-5.90.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.90.0-i586-1.txz: Upgraded.
kde/kidletime-5.90.0-i586-1.txz: Upgraded.
kde/kimageformats-5.90.0-i586-1.txz: Upgraded.
kde/kinit-5.90.0-i586-1.txz: Upgraded.
kde/kio-5.90.0-i586-1.txz: Upgraded.
kde/kirigami2-5.90.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.90.0-i586-1.txz: Upgraded.
kde/kitemviews-5.90.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.90.0-i586-1.txz: Upgraded.
kde/kjs-5.90.0-i586-1.txz: Upgraded.
kde/kjsembed-5.90.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.90.0-i586-1.txz: Upgraded.
kde/knewstuff-5.90.0-i586-1.txz: Upgraded.
kde/knotifications-5.90.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.90.0-i586-1.txz: Upgraded.
kde/kpackage-5.90.0-i586-1.txz: Upgraded.
kde/kparts-5.90.0-i586-1.txz: Upgraded.
kde/kpeople-5.90.0-i586-1.txz: Upgraded.
kde/kplotting-5.90.0-i586-1.txz: Upgraded.
kde/kpty-5.90.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.90.0-i586-1.txz: Upgraded.
kde/kross-5.90.0-i586-1.txz: Upgraded.
kde/krunner-5.90.0-i586-1.txz: Upgraded.
kde/kservice-5.90.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.90.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.90.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.90.0-i586-1.txz: Upgraded.
kde/kwallet-5.90.0-i586-1.txz: Upgraded.
kde/kwayland-5.90.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.90.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.90.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.90.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.90.0-i586-1.txz: Upgraded.
kde/latte-dock-0.10.7-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.90.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.90.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.90.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.90.0-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.5-i586-2.txz: Rebuilt.
       [PATCH] [libtaskmanager] Increase buffer for pipewire format negotiation.
       Thanks to ZhaoLin1457.
       [PATCH] runners/shell: Port from KToolInvocation::invokeTerminal
       to KTerminalLauncherJob.
       Thanks to gmgf.
kde/prison-5.90.0-i586-1.txz: Upgraded.
kde/purpose-5.90.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.90.0-i586-1.txz: Upgraded.
kde/solid-5.90.0-i586-1.txz: Upgraded.
kde/sonnet-5.90.0-i586-1.txz: Upgraded.
kde/syndication-5.90.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.90.0-i586-1.txz: Upgraded.
kde/threadweaver-5.90.0-i586-1.txz: Upgraded.
l/SDL2-2.0.20-i586-1.txz: Upgraded.
l/SDL2_ttf-2.0.18-i586-1.txz: Upgraded.
l/libsigsegv-2.14-i586-1.txz: Upgraded.
l/pango-1.48.11-i586-1.txz: Upgraded.
l/python-urllib3-1.26.8-i586-1.txz: Upgraded.
n/getmail-6.18.6-i586-1.txz: Upgraded.
n/iproute2-5.16.0-i586-1.txz: Upgraded.
n/metamail-2.7-i586-10.txz: Rebuilt.
       Fixed misnamed mimencode man page. Thanks to mbeninca.
n/mtr-0.95-i586-1.txz: Upgraded.
n/socat-1.7.4.3-i586-1.txz: Upgraded.
xap/freerdp-2.5.0-i586-1.txz: Upgraded.
xap/gnuplot-5.4.3-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.5.0esr-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.5.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2022-02/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22746
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22744
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
       (* Security fix *)
xap/mozilla-thunderbird-91.5.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.5.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2022-03/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22746
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22744
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
       (* Security fix *)
xap/vim-gvim-8.2.4065-i586-1.txz: Upgraded.
extra/linux-5.15.14-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Jan 7 06:03:52 UTC 2022
a/kernel-firmware-20220106_4aa2c65-noarch-1.txz: Upgraded.
a/tcsh-6.23.02-i586-1.txz: Upgraded.
ap/sqlite-3.37.2-i586-1.txz: Upgraded.
ap/vim-8.2.4018-i586-1.txz: Upgraded.
d/mercurial-6.0.1-i586-1.txz: Upgraded.
kde/akonadi-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-mime-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-notes-21.12.1-i586-1.txz: Upgraded.
kde/akonadi-search-21.12.1-i586-1.txz: Upgraded.
kde/akonadiconsole-21.12.1-i586-1.txz: Upgraded.
kde/akregator-21.12.1-i586-1.txz: Upgraded.
kde/analitza-21.12.1-i586-1.txz: Upgraded.
kde/ark-21.12.1-i586-1.txz: Upgraded.
kde/artikulate-21.12.1-i586-1.txz: Upgraded.
kde/audiocd-kio-21.12.1-i586-1.txz: Upgraded.
kde/baloo-widgets-21.12.1-i586-1.txz: Upgraded.
kde/blinken-21.12.1-i586-1.txz: Upgraded.
kde/bomber-21.12.1-i586-1.txz: Upgraded.
kde/bovo-21.12.1-i586-1.txz: Upgraded.
kde/calendarsupport-21.12.1-i586-1.txz: Upgraded.
kde/cantor-21.12.1-i586-1.txz: Upgraded.
kde/cervisia-21.12.1-i586-1.txz: Upgraded.
kde/dolphin-21.12.1-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.12.1-i586-1.txz: Upgraded.
kde/dragon-21.12.1-i586-1.txz: Upgraded.
kde/elisa-21.12.1-i586-1.txz: Upgraded.
kde/eventviews-21.12.1-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.12.1-i586-1.txz: Upgraded.
kde/filelight-21.12.1-i586-1.txz: Upgraded.
kde/granatier-21.12.1-i586-1.txz: Upgraded.
kde/grantlee-editor-21.12.1-i586-1.txz: Upgraded.
kde/grantleetheme-21.12.1-i586-1.txz: Upgraded.
kde/gwenview-21.12.1-i586-1.txz: Upgraded.
kde/incidenceeditor-21.12.1-i586-1.txz: Upgraded.
kde/itinerary-21.12.1-i586-1.txz: Upgraded.
kde/juk-21.12.1-i586-1.txz: Upgraded.
kde/k3b-21.12.1-i586-1.txz: Upgraded.
kde/kaddressbook-21.12.1-i586-1.txz: Upgraded.
kde/kalarm-21.12.1-i586-1.txz: Upgraded.
kde/kalarmcal-21.12.1-i586-1.txz: Upgraded.
kde/kalgebra-21.12.1-i586-1.txz: Upgraded.
kde/kalzium-21.12.1-i586-1.txz: Upgraded.
kde/kamera-21.12.1-i586-1.txz: Upgraded.
kde/kamoso-21.12.1-i586-1.txz: Upgraded.
kde/kanagram-21.12.1-i586-1.txz: Upgraded.
kde/kapman-21.12.1-i586-1.txz: Upgraded.
kde/kapptemplate-21.12.1-i586-1.txz: Upgraded.
kde/kate-21.12.1-i586-1.txz: Upgraded.
kde/katomic-21.12.1-i586-1.txz: Upgraded.
kde/kbackup-21.12.1-i586-1.txz: Upgraded.
kde/kblackbox-21.12.1-i586-1.txz: Upgraded.
kde/kblocks-21.12.1-i586-1.txz: Upgraded.
kde/kbounce-21.12.1-i586-1.txz: Upgraded.
kde/kbreakout-21.12.1-i586-1.txz: Upgraded.
kde/kbruch-21.12.1-i586-1.txz: Upgraded.
kde/kcachegrind-21.12.1-i586-1.txz: Upgraded.
kde/kcalc-21.12.1-i586-1.txz: Upgraded.
kde/kcalutils-21.12.1-i586-1.txz: Upgraded.
kde/kcharselect-21.12.1-i586-1.txz: Upgraded.
kde/kcolorchooser-21.12.1-i586-1.txz: Upgraded.
kde/kcron-21.12.1-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.12.1-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.12.1-i586-1.txz: Upgraded.
kde/kdebugsettings-21.12.1-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.12.1-i586-1.txz: Upgraded.
kde/kdeedu-data-21.12.1-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.12.1-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.12.1-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.12.1-i586-1.txz: Upgraded.
kde/kdenlive-21.12.1-i586-1.txz: Upgraded.
kde/kdepim-addons-21.12.1-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.12.1-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.12.1-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.12.1-i586-1.txz: Upgraded.
kde/kdev-php-21.12.1-i586-1.txz: Upgraded.
kde/kdev-python-21.12.1-i586-1.txz: Upgraded.
kde/kdevelop-21.12.1-i586-1.txz: Upgraded.
kde/kdf-21.12.1-i586-1.txz: Upgraded.
kde/kdialog-21.12.1-i586-1.txz: Upgraded.
kde/kdiamond-21.12.1-i586-1.txz: Upgraded.
kde/keditbookmarks-21.12.1-i586-1.txz: Upgraded.
kde/kfind-21.12.1-i586-1.txz: Upgraded.
kde/kfloppy-21.12.1-i586-1.txz: Upgraded.
kde/kfourinline-21.12.1-i586-1.txz: Upgraded.
kde/kgeography-21.12.1-i586-1.txz: Upgraded.
kde/kget-21.12.1-i586-1.txz: Upgraded.
kde/kgoldrunner-21.12.1-i586-1.txz: Upgraded.
kde/kgpg-21.12.1-i586-1.txz: Upgraded.
kde/khangman-21.12.1-i586-1.txz: Upgraded.
kde/khelpcenter-21.12.1-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.12.1-i586-1.txz: Upgraded.
kde/kig-21.12.1-i586-1.txz: Upgraded.
kde/kigo-21.12.1-i586-1.txz: Upgraded.
kde/killbots-21.12.1-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.12.1-i586-1.txz: Upgraded.
kde/kimap-21.12.1-i586-1.txz: Upgraded.
kde/kio-extras-21.12.1-i586-1.txz: Upgraded.
kde/kio-gdrive-21.12.1-i586-1.txz: Upgraded.
kde/kipi-plugins-21.12.1-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.12.1-i586-1.txz: Upgraded.
kde/kiriki-21.12.1-i586-1.txz: Upgraded.
kde/kiten-21.12.1-i586-1.txz: Upgraded.
kde/kitinerary-21.12.1-i586-1.txz: Upgraded.
kde/kjumpingcube-21.12.1-i586-1.txz: Upgraded.
kde/kldap-21.12.1-i586-1.txz: Upgraded.
kde/kleopatra-21.12.1-i586-1.txz: Upgraded.
kde/klickety-21.12.1-i586-1.txz: Upgraded.
kde/klines-21.12.1-i586-1.txz: Upgraded.
kde/kmag-21.12.1-i586-1.txz: Upgraded.
kde/kmahjongg-21.12.1-i586-1.txz: Upgraded.
kde/kmail-21.12.1-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.12.1-i586-1.txz: Upgraded.
kde/kmailtransport-21.12.1-i586-1.txz: Upgraded.
kde/kmbox-21.12.1-i586-1.txz: Upgraded.
kde/kmime-21.12.1-i586-1.txz: Upgraded.
kde/kmines-21.12.1-i586-1.txz: Upgraded.
kde/kmix-21.12.1-i586-1.txz: Upgraded.
kde/kmousetool-21.12.1-i586-1.txz: Upgraded.
kde/kmouth-21.12.1-i586-1.txz: Upgraded.
kde/kmplot-21.12.1-i586-1.txz: Upgraded.
kde/knavalbattle-21.12.1-i586-1.txz: Upgraded.
kde/knetwalk-21.12.1-i586-1.txz: Upgraded.
kde/knights-21.12.1-i586-1.txz: Upgraded.
kde/knotes-21.12.1-i586-1.txz: Upgraded.
kde/kolf-21.12.1-i586-1.txz: Upgraded.
kde/kollision-21.12.1-i586-1.txz: Upgraded.
kde/kolourpaint-21.12.1-i586-1.txz: Upgraded.
kde/kompare-21.12.1-i586-1.txz: Upgraded.
kde/konqueror-21.12.1-i586-1.txz: Upgraded.
kde/konquest-21.12.1-i586-1.txz: Upgraded.
kde/konsole-21.12.1-i586-1.txz: Upgraded.
kde/kontact-21.12.1-i586-1.txz: Upgraded.
kde/kontactinterface-21.12.1-i586-1.txz: Upgraded.
kde/kontrast-21.12.1-i586-1.txz: Upgraded.
kde/konversation-21.12.1-i586-1.txz: Upgraded.
kde/kopeninghours-21.12.1-i586-1.txz: Upgraded.
kde/kopete-21.12.1-i586-1.txz: Upgraded.
kde/korganizer-21.12.1-i586-1.txz: Upgraded.
kde/kosmindoormap-21.12.1-i586-1.txz: Upgraded.
kde/kpat-21.12.1-i586-1.txz: Upgraded.
kde/kpimtextedit-21.12.1-i586-1.txz: Upgraded.
kde/kpkpass-21.12.1-i586-1.txz: Upgraded.
kde/kpmcore-21.12.1-i586-1.txz: Upgraded.
kde/kpublictransport-21.12.1-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.12.1-i586-1.txz: Upgraded.
kde/krdc-21.12.1-i586-1.txz: Upgraded.
kde/kreversi-21.12.1-i586-1.txz: Upgraded.
kde/krfb-21.12.1-i586-1.txz: Upgraded.
kde/krita-5.0.2-i586-1.txz: Upgraded.
kde/kross-interpreters-21.12.1-i586-1.txz: Upgraded.
kde/kruler-21.12.1-i586-1.txz: Upgraded.
kde/kshisen-21.12.1-i586-1.txz: Upgraded.
kde/ksirk-21.12.1-i586-1.txz: Upgraded.
kde/ksmtp-21.12.1-i586-1.txz: Upgraded.
kde/ksnakeduel-21.12.1-i586-1.txz: Upgraded.
kde/kspaceduel-21.12.1-i586-1.txz: Upgraded.
kde/ksquares-21.12.1-i586-1.txz: Upgraded.
kde/ksudoku-21.12.1-i586-1.txz: Upgraded.
kde/ksystemlog-21.12.1-i586-1.txz: Upgraded.
kde/kteatime-21.12.1-i586-1.txz: Upgraded.
kde/ktimer-21.12.1-i586-1.txz: Upgraded.
kde/ktnef-21.12.1-i586-1.txz: Upgraded.
kde/ktorrent-21.12.1-i586-1.txz: Upgraded.
kde/ktouch-21.12.1-i586-1.txz: Upgraded.
kde/kturtle-21.12.1-i586-1.txz: Upgraded.
kde/kubrick-21.12.1-i586-1.txz: Upgraded.
kde/kwalletmanager-21.12.1-i586-1.txz: Upgraded.
kde/kwave-21.12.1-i586-1.txz: Upgraded.
kde/kwordquiz-21.12.1-i586-1.txz: Upgraded.
kde/libgravatar-21.12.1-i586-1.txz: Upgraded.
kde/libkcddb-21.12.1-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.12.1-i586-1.txz: Upgraded.
kde/libkdcraw-21.12.1-i586-1.txz: Upgraded.
kde/libkdegames-21.12.1-i586-1.txz: Upgraded.
kde/libkdepim-21.12.1-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.12.1-i586-1.txz: Upgraded.
kde/libkexiv2-21.12.1-i586-1.txz: Upgraded.
kde/libkgapi-21.12.1-i586-1.txz: Upgraded.
kde/libkipi-21.12.1-i586-1.txz: Upgraded.
kde/libkleo-21.12.1-i586-1.txz: Upgraded.
kde/libkmahjongg-21.12.1-i586-1.txz: Upgraded.
kde/libkomparediff2-21.12.1-i586-1.txz: Upgraded.
kde/libksane-21.12.1-i586-1.txz: Upgraded.
kde/libksieve-21.12.1-i586-1.txz: Upgraded.
kde/libktorrent-21.12.1-i586-1.txz: Upgraded.
kde/lokalize-21.12.1-i586-1.txz: Upgraded.
kde/lskat-21.12.1-i586-1.txz: Upgraded.
kde/mailcommon-21.12.1-i586-1.txz: Upgraded.
kde/mailimporter-21.12.1-i586-1.txz: Upgraded.
kde/marble-21.12.1-i586-1.txz: Upgraded.
kde/markdownpart-21.12.1-i586-1.txz: Upgraded.
kde/mbox-importer-21.12.1-i586-1.txz: Upgraded.
kde/messagelib-21.12.1-i586-1.txz: Upgraded.
kde/minuet-21.12.1-i586-1.txz: Upgraded.
kde/okular-21.12.1-i586-1.txz: Upgraded.
kde/palapeli-21.12.1-i586-1.txz: Upgraded.
kde/parley-21.12.1-i586-1.txz: Upgraded.
kde/partitionmanager-21.12.1-i586-1.txz: Upgraded.
kde/picmi-21.12.1-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.12.1-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.12.1-i586-1.txz: Upgraded.
kde/pimcommon-21.12.1-i586-1.txz: Upgraded.
kde/poxml-21.12.1-i586-1.txz: Upgraded.
kde/print-manager-21.12.1-i586-1.txz: Upgraded.
kde/rocs-21.12.1-i586-1.txz: Upgraded.
kde/skanlite-21.12.1-i586-1.txz: Upgraded.
kde/spectacle-21.12.1-i586-1.txz: Upgraded.
kde/step-21.12.1-i586-1.txz: Upgraded.
kde/svgpart-21.12.1-i586-1.txz: Upgraded.
kde/sweeper-21.12.1-i586-1.txz: Upgraded.
kde/umbrello-21.12.1-i586-1.txz: Upgraded.
kde/yakuake-21.12.1-i586-1.txz: Upgraded.
kde/zanshin-21.12.1-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.12.1-i586-1.txz: Upgraded.
l/mozilla-nss-3.74-i586-1.txz: Upgraded.
l/readline-8.1.002-i586-1.txz: Upgraded.
n/bluez-5.63-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.4018-i586-1.txz: Upgraded.
+--------------------------+
Wed Jan 5 20:09:37 UTC 2022
a/aaa_libraries-15.0-i586-12.txz: Rebuilt.
       Upgraded: libcap.so.2.62, libelf-0.186.so, libzstd.so.1.5.1,
       libcares.so.2.5.1, libexpat.so.1.8.2, libglib-2.0.so.0.7000.2,
       libgmodule-2.0.so.0.7000.2, libgobject-2.0.so.0.7000.2,
       libgthread-2.0.so.0.7000.2, libpcre2-8.so.0.10.4.
       Added: libunwind.so.8.0.1 (thanks to Jeebizz).
a/kernel-generic-5.15.13-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.13_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.13-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.13_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.13-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.13_smp-i686-1.txz: Upgraded.
d/doxygen-1.9.3-i586-2.txz: Rebuilt.
       Fix manpage versions, build and install docs. Thanks to duncan_roe.
d/kernel-headers-5.15.13_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.13_smp-noarch-1.txz: Upgraded.
l/libuv-1.43.0-i586-1.txz: Upgraded.
l/pipewire-0.3.43-i586-1.txz: Upgraded.
       Remove redundant .sample files on package upgrade.
       When disabling pipewire, toss the .desktop files and keep the .sample files
       if both exist.
       Added missing X-KDE-autostart-phase=1 to pipewire-pulse.desktop.sample.
       Thanks to ZhaoLin1457.
n/curl-7.81.0-i586-1.txz: Upgraded.
x/fcitx-qt5-1.2.7-i586-1.txz: Upgraded.
extra/linux-5.15.13-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jan 4 22:51:41 UTC 2022
a/bash-5.1.016-i586-1.txz: Upgraded.
a/haveged-1.9.16-i586-1.txz: Upgraded.
a/hwdata-0.355-noarch-1.txz: Upgraded.
ap/gphoto2-2.5.28-i586-1.txz: Upgraded.
kde/bluedevil-5.23.5-i586-1.txz: Upgraded.
kde/breeze-5.23.5-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.5-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.5-i586-1.txz: Upgraded.
kde/drkonqi-5.23.5-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.5-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.5-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.5-i586-1.txz: Upgraded.
kde/kdecoration-5.23.5-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.5-i586-1.txz: Upgraded.
kde/kgamma5-5.23.5-i586-1.txz: Upgraded.
kde/khotkeys-5.23.5-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.5-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.5-i586-1.txz: Upgraded.
kde/konsole-21.12.0-i586-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] Use tighter matching when finding the default profile file name.
       Thanks to alienBOB.
kde/kscreen-5.23.5-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.5-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.5-i586-1.txz: Upgraded.
kde/ksystemstats-5.23.5-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.5-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.5-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.5-i586-1.txz: Upgraded.
kde/kwin-5.23.5-i586-1.txz: Upgraded.
kde/kwrited-5.23.5-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.5-i586-1.txz: Upgraded.
kde/libkscreen-5.23.5-i586-1.txz: Upgraded.
kde/libksysguard-5.23.5-i586-1.txz: Upgraded.
kde/milou-5.23.5-i586-1.txz: Upgraded.
kde/oxygen-5.23.5-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.5-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.5-i586-1.txz: Upgraded.
kde/plasma-disks-5.23.5-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.5-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.5-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.5-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.5-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.5-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.5-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.5-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.5-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.5-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.5-i586-1.txz: Upgraded.
kde/powerdevil-5.23.5-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.5-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.5-i586-1.txz: Upgraded.
kde/systemsettings-5.23.5-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.5-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_19-i586-2.txz: Rebuilt.
       It seems that even with --enable-opencl, ImageMagick has disabled OpenCL
       support by default unless the environment variable MAGICK_OCL_DEVICE=true
       is set, so there should be no harm enabling this feature again.
       Thanks to denydias.
l/iso-codes-4.9.0-noarch-1.txz: Upgraded.
l/libgphoto2-2.5.28-i586-1.txz: Upgraded.
l/pipewire-0.3.42-i586-2.txz: Rebuilt.
       Added sample startup files in /etc/xdg/autostart. Thanks to stormtracknole.
       Added scripts (pipewire-enable.sh, pipewire-disable.sh) to setup pipewire as
       the default multimedia server, or to disable it and return to pulseaudio as
       the default. Thanks to stormtracknole and LuckyCyborg for many useful tips.
l/pulseaudio-15.0-i586-4.txz: Rebuilt.
       Install pulseaudio.desktop as a .new file so that future package updates
       won't overwrite custom content.
n/whois-5.5.11-i586-1.txz: Upgraded.
n/yptools-4.2.3-i586-5.txz: Rebuilt.
       Fixed ypcat installation. Thanks to Stuart Winter.
x/libdrm-2.4.109-i586-1.txz: Upgraded.
x/xdg-desktop-portal-1.12.1-i586-1.txz: Upgraded.
x/xf86-video-vmware-13.3.0-i586-6.txz: Rebuilt.
       Patched to build against libdrm-2.4.109. Thanks to gmgf.
+--------------------------+
Sun Jan 2 20:40:21 UTC 2022
d/doxygen-1.9.3-i586-1.txz: Upgraded.
n/network-scripts-15.0-noarch-18.txz: Rebuilt.
       netconfig: when DHCP configuration is selected, also add hostname labeled
       loopback entries to /etc/hosts. We don't want to have to rely on something
       else providing correct name service in order to be able to reach our
       machine through its own hostname. This was a regression since the netconfig
       shipped with Slackware 14.2.
       Thanks to Zexuo.
+--------------------------+
Sun Jan 2 01:25:29 UTC 2022
a/mdadm-4.2-i586-1.txz: Upgraded.
ap/usbmuxd-20210925_e3a3180-i586-1.txz: Upgraded.
       Updated to fix mounting devices with iOS 15.1. Thanks to qunying.
l/libimobiledevice-20211124_2c6121d-i586-1.txz: Upgraded.
l/libimobiledevice-glue-20211125_3cb687b-i586-1.txz: Added.
l/xapian-core-1.4.19-i586-1.txz: Upgraded.
x/mesa-21.3.3-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 31 19:44:41 UTC 2021
a/e2fsprogs-1.46.5-i586-1.txz: Upgraded.
ap/sqlite-3.37.1-i586-1.txz: Upgraded.
n/mutt-2.1.5-i586-1.txz: Upgraded.
n/yptools-4.2.3-i586-4.txz: Rebuilt.
       Added /usr/sbin/yp_dump_binding and /usr/sbin/yptest.
       Add a hint about adding "nis" in /etc/pam.d/system-auth to /etc/default/yp.
+--------------------------+
Wed Dec 29 20:48:42 UTC 2021
a/kernel-firmware-20211229_57d6b95-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.12-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.12_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.12-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.12_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.12-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.12_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.15.12_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.12_smp-noarch-1.txz: Upgraded.
extra/linux-5.15.12-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Dec 29 02:42:32 UTC 2021
l/libgsf-1.14.48-i586-1.txz: Upgraded.
l/netpbm-10.97.00-i586-1.txz: Upgraded.
n/wpa_supplicant-2.9-i586-8.txz: Rebuilt.
       This update fixes the following security issues:
       AP mode PMF disconnection protection bypass.
       UPnP SUBSCRIBE misbehavior in hostapd WPS AP.
       P2P group information processing vulnerability.
       P2P provision discovery processing vulnerability.
       ASN.1: Validate DigestAlgorithmIdentifier parameters.
       Flush pending control interface message for an interface to be removed.
       These issues could result in a denial-of-service, privilege escalation,
       arbitrary code execution, or other unexpected behavior.
       Thanks to nobodino for pointing out the patches.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0535
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004
       (* Security fix *)
xap/seamonkey-2.53.10.2-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.10.2
       (* Security fix *)
+--------------------------+
Mon Dec 27 23:06:00 UTC 2021
The --enable-systemd-logind change to xorg-server that caused resume from
suspend regressions (and others) has been reverted, and in retrospect it was
a bad idea to take it at that point, but it had appeared as if it wouldn't
cause problems in the case where Xorg was running as root. Oh well, lesson
learned. But the build script has been enhanced to make it easy to build
rootless versions of the xorg-server packages. Just do this:
       ROOTLESSX=YES ./x11.SlackBuild xserver xorg-server
Depending on your GPU, this could work for your use case with no problems.
Also, I've gone ahead and taken a couple of shared library version bumps since
the projects (opencv and poppler) have decent track records as far as not
introducing regressions, and if there are any, we've got time to test and fix.
I'm still avoiding some things that aren't as trusted in that regard, and will
likely continue to do so. :-)
ap/cups-filters-1.28.10-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/ark-21.12.0-i586-2.txz: Rebuilt.
       Applied upstream patches:
       [PATCH] Fix extraction "Dolphin Actions" not abiding "Open destination
       folder after extracting" setting.
       [PATCH] Do not highlight file after compression.
       Thanks to ctrlaltca.
kde/calligra-3.2.1-i586-15.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/cantor-21.12.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/digikam-7.4.0-i586-2.txz: Rebuilt.
       Recompiled against opencv-4.5.5.
kde/kfilemetadata-5.89.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/kile-2.9.93-i586-15.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/kitinerary-21.12.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/krita-5.0.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
kde/okular-21.12.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
l/gegl-0.4.34-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
l/gst-plugins-bad-free-1.18.5-i586-3.txz: Rebuilt.
       Recompiled against opencv-4.5.5.
l/imagemagick-7.1.0_19-i586-1.txz: Upgraded.
l/mlt-7.4.0-i586-1.txz: Upgraded.
l/opencv-4.5.5-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/poppler-21.12.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
n/fetchmail-6.4.26-i586-1.txz: Upgraded.
n/tin-2.6.1-i586-1.txz: Upgraded.
x/ibus-anthy-1.5.14-i586-1.txz: Upgraded.
x/xorg-server-1.20.14-i586-2.txz: Rebuilt.
       Recompiled using these options:
       --enable-suid-wrapper --enable-install-setuid --disable-systemd-logind.
x/xorg-server-xephyr-1.20.14-i586-2.txz: Rebuilt.
x/xorg-server-xnest-1.20.14-i586-2.txz: Rebuilt.
x/xorg-server-xvfb-1.20.14-i586-2.txz: Rebuilt.
xap/geeqie-1.6-i586-4.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
xap/gimp-2.10.30-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
xfce/tumbler-4.16.0-i586-4.txz: Rebuilt.
       Recompiled against poppler-21.12.0.
extra/rust-for-mozilla/rust-1.54.0-i686-3.txz: Added.
       This is an alternate version of Rust that may be useful for compiling
       software from Mozilla since using the very latest Rust often won't
       compile, or produces an unstable build.
+--------------------------+
Fri Dec 24 20:43:23 UTC 2021
Merry Christmas, everyone! :-) See you again on Sunday or Monday.
xap/pan-0.149-i586-1.txz: Upgraded.
+--------------------------+
Thu Dec 23 19:48:40 UTC 2021
kde/krita-5.0.0-i586-1.txz: Upgraded.
n/stunnel-5.61-i586-1.txz: Upgraded.
+--------------------------+
Wed Dec 22 19:27:39 UTC 2021
a/kernel-generic-5.15.11-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.11_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.11-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.11_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.11-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.11_smp-i686-1.txz: Upgraded.
ap/qpdf-10.5.0-i586-1.txz: Upgraded.
d/kernel-headers-5.15.11_smp-x86-1.txz: Upgraded.
d/parallel-20211222-noarch-1.txz: Upgraded.
k/kernel-source-5.15.11_smp-noarch-1.txz: Upgraded.
l/netpbm-10.96.06-i586-1.txz: Upgraded.
extra/linux-5.15.11-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Dec 21 19:04:03 UTC 2021
ap/vim-8.2.3868-i586-1.txz: Upgraded.
kde/breeze-icons-5.89.0-noarch-2.txz: Rebuilt.
       Applied upstream patches:
       [PATCH] improve installation of light fallback icons
       [PATCH] Include "*@*" in the icon_files list for installation
       Thanks to Heinz Wiesinger.
l/gtk+3-3.24.31-i586-1.txz: Upgraded.
l/zstd-1.5.1-i586-1.txz: Upgraded.
n/net-snmp-5.9.1-i586-4.txz: Rebuilt.
       Moved options for snmpd from rc.snmpd to /etc/default/snmpd.
       Thanks to Jakub 'shasta' Jankowski.
xap/vim-gvim-8.2.3868-i586-1.txz: Upgraded.
+--------------------------+
Mon Dec 20 19:41:32 UTC 2021
a/pkgtools-15.0-noarch-42.txz: Rebuilt.
       setup.services: list rc.nfsd. Suggested by alienBOB.
l/expat-2.4.2-i586-1.txz: Upgraded.
l/gegl-0.4.34-i586-1.txz: Upgraded.
n/httpd-2.4.52-i586-1.txz: Upgraded.
       SECURITY: CVE-2021-44790: Possible buffer overflow when parsing
       multipart content in mod_lua of Apache HTTP Server 2.4.51 and
       earlier (cve.mitre.org)
       A carefully crafted request body can cause a buffer overflow in
       the mod_lua multipart parser (r:parsebody() called from Lua
       scripts).
       The Apache httpd team is not aware of an exploit for the
       vulnerabilty though it might be possible to craft one.
       This issue affects Apache HTTP Server 2.4.51 and earlier.
       Credits: Chamal
       SECURITY: CVE-2021-44224: Possible NULL dereference or SSRF in
       forward proxy configurations in Apache HTTP Server 2.4.51 and
       earlier (cve.mitre.org)
       A crafted URI sent to httpd configured as a forward proxy
       (ProxyRequests on) can cause a crash (NULL pointer dereference)
       or, for configurations mixing forward and reverse proxy
       declarations, can allow for requests to be directed to a
       declared Unix Domain Socket endpoint (Server Side Request
       Forgery).
       This issue affects Apache HTTP Server 2.4.7 up to 2.4.51
       (included).
       Credits: ae 1/4*a-o(R)e 1/4
       TengMA(@Te3t123)
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
       (* Security fix *)
xap/gimp-2.10.30-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.4.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.4.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-55/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
       (* Security fix *)
xap/xlockmore-5.68-i586-1.txz: Upgraded.
xap/xsnow-3.4.2-i586-1.txz: Upgraded.
+--------------------------+
Sun Dec 19 18:57:11 UTC 2021
kde/kid3-3.9.0-i586-1.txz: Upgraded.
kde/latte-dock-0.10.6-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.4-i586-2.txz: Rebuilt.
       Applied patch:
       [PATCH] OpenVPN: Import tls-crypt keys
       Thanks to PJ Beers.
kde/umbrello-21.12.0-i586-2.txz: Rebuilt.
       Recompiled against kdevelop-21.12.0.
l/imagemagick-7.1.0_18-i586-1.txz: Upgraded.
l/librsvg-2.52.5-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 17 20:47:13 UTC 2021
a/kernel-generic-5.15.10-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.10_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.10-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.10_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.10-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.10_smp-i686-1.txz: Upgraded.
ap/inxi-3.3.11_1-noarch-1.txz: Upgraded.
ap/ksh93-1.0_20211217_ce3e080c-i586-1.txz: Upgraded.
ap/neofetch-20211210_ccd5d9f5-noarch-1.txz: Upgraded.
d/Cython-0.29.26-i586-1.txz: Upgraded.
d/kernel-headers-5.15.10_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.10_smp-noarch-1.txz: Upgraded.
l/utf8proc-2.7.0-i586-1.txz: Upgraded.
n/ca-certificates-20211216-noarch-1.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
xap/xine-ui-0.99.13-i686-1.txz: Upgraded.
extra/linux-5.15.10-nosmp-sdk/*: Upgraded.
extra/php80/php80-8.0.14-i586-1.txz: Upgraded.
extra/php81/php81-8.1.1-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Dec 16 21:34:10 UTC 2021
a/kernel-firmware-20211216_f682ecb-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.9-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.9_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.9-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.9_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.9-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.9_smp-i686-1.txz: Upgraded.
a/openssl-solibs-1.1.1m-i586-1.txz: Upgraded.
ap/inxi-3.3.10_1-noarch-1.txz: Upgraded.
       Thanks to h2-1.
d/kernel-headers-5.15.9_smp-x86-1.txz: Upgraded.
d/vala-0.54.5-i586-1.txz: Upgraded.
k/kernel-source-5.15.9_smp-noarch-1.txz: Upgraded.
       SUNRPC_DEBUG n -> y
       +NFS_DEBUG y
       Thanks to bassmadrigal.
kde/latte-dock-0.10.5-i586-1.txz: Upgraded.
l/mozilla-nss-3.73.1-i586-1.txz: Upgraded.
l/pipewire-0.3.42-i586-1.txz: Upgraded.
n/iputils-20211215-i586-1.txz: Upgraded.
n/openssl-1.1.1m-i586-1.txz: Upgraded.
n/php-7.4.27-i586-1.txz: Upgraded.
x/xorg-server-1.20.14-i586-1.txz: Upgraded.
       Built using --enable-systemd-logind to use elogind for device setup.
       Some code changes would be required in xorg-server, xinit, and various login
       managers to make rootless X work out of the box or to fall back in cases
       where elogind isn't supported, and those changes aren't appropriate here in
       the RC stage, but you can try it without recompiling:
       chmod 755 /usr/libexec/Xorg*
       Thanks to LuckyCyborg.
x/xorg-server-xephyr-1.20.14-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.20.14-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.20.14-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.4.1esr-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.4.1/releasenotes/
extra/linux-5.15.9-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Dec 15 19:25:48 UTC 2021
ap/nano-6.0-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.12.0-i586-3.txz: Rebuilt.
       Rebuilt with the updated patch that was merged upstream:
       [PATCH] POP3: Fix SSL/TLS connections
       Thanks to gmgf.
n/bind-9.16.24-i586-1.txz: Upgraded.
n/openvpn-2.5.5-i586-1.txz: Upgraded.
+--------------------------+
Wed Dec 15 04:34:02 UTC 2021
a/dialog-1.3_20211214-i586-1.txz: Upgraded.
a/kernel-generic-5.15.8-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.8_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.8-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.8_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.8-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.8_smp-i686-1.txz: Upgraded.
a/sysvinit-3.01-i586-1.txz: Upgraded.
d/kernel-headers-5.15.8_smp-x86-1.txz: Upgraded.
d/patchelf-0.14.3-i586-1.txz: Upgraded.
k/kernel-source-5.15.8_smp-noarch-1.txz: Upgraded.
l/oniguruma-6.9.7.1-i586-1.txz: Upgraded.
l/pipewire-0.3.41-i586-1.txz: Upgraded.
x/libinput-1.19.3-i586-1.txz: Upgraded.
x/xorg-server-1.20.13-i586-2.txz: Rebuilt.
       Fixes for multiple input validation failures in X server extensions:
       render: Fix out of bounds access in SProcRenderCompositeGlyphs()
       xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
       Xext: Fix out of bounds access in SProcScreenSaverSuspend()
       record: Fix out of bounds access in SwapCreateRegister()
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
       (* Security fix *)
x/xorg-server-xephyr-1.20.13-i586-2.txz: Rebuilt.
x/xorg-server-xnest-1.20.13-i586-2.txz: Rebuilt.
x/xorg-server-xvfb-1.20.13-i586-2.txz: Rebuilt.
x/xorg-server-xwayland-21.1.4-i586-1.txz: Upgraded.
       Fixes for multiple input validation failures in X server extensions:
       render: Fix out of bounds access in SProcRenderCompositeGlyphs()
       xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
       Xext: Fix out of bounds access in SProcScreenSaverSuspend()
       record: Fix out of bounds access in SwapCreateRegister()
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011
       (* Security fix *)
xap/xsnow-3.4.1-i586-1.txz: Upgraded.
extra/linux-5.15.8-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Dec 13 20:10:04 UTC 2021
ap/slackpkg-15.0.9-noarch-1.txz: Upgraded.
       files/mirrors-x86*: Remove bad mirrors from list (Emmet Ford)
       Automatically rebuild package lists if missing (Piter PUNK)
xap/seamonkey-2.53.10.1-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.10.1
       (* Security fix *)
xap/xsnow-3.4.0-i586-1.txz: Upgraded.
+--------------------------+
Sun Dec 12 19:23:13 UTC 2021
ap/mpg123-1.29.3-i586-1.txz: Upgraded.
kde/attica-5.89.0-i586-1.txz: Upgraded.
kde/baloo-5.89.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.89.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.89.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.89.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.89.0-i586-1.txz: Upgraded.
kde/kactivities-5.89.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.89.0-i586-1.txz: Upgraded.
kde/kapidox-5.89.0-i586-1.txz: Upgraded.
kde/karchive-5.89.0-i586-1.txz: Upgraded.
kde/kauth-5.89.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.89.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.89.0-i586-1.txz: Upgraded.
kde/kcmutils-5.89.0-i586-1.txz: Upgraded.
kde/kcodecs-5.89.0-i586-1.txz: Upgraded.
kde/kcompletion-5.89.0-i586-1.txz: Upgraded.
kde/kconfig-5.89.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.89.0-i586-1.txz: Upgraded.
kde/kcontacts-5.89.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.89.0-i586-1.txz: Upgraded.
kde/kcrash-5.89.0-i586-1.txz: Upgraded.
kde/kdav-5.89.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.89.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.89.0-i586-1.txz: Upgraded.
kde/kded-5.89.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.89.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.89.0-i586-1.txz: Upgraded.
kde/kdesu-5.89.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.89.0-i586-1.txz: Upgraded.
kde/kdnssd-5.89.0-i586-1.txz: Upgraded.
kde/kdoctools-5.89.0-i586-1.txz: Upgraded.
kde/kemoticons-5.89.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.89.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.89.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.89.0-i586-1.txz: Upgraded.
kde/kholidays-5.89.0-i586-1.txz: Upgraded.
kde/khtml-5.89.0-i586-1.txz: Upgraded.
kde/ki18n-5.89.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.89.0-i586-1.txz: Upgraded.
kde/kidletime-5.89.0-i586-1.txz: Upgraded.
kde/kimageformats-5.89.0-i586-1.txz: Upgraded.
kde/kinit-5.89.0-i586-1.txz: Upgraded.
kde/kio-5.89.0-i586-1.txz: Upgraded.
kde/kirigami2-5.89.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.89.0-i586-1.txz: Upgraded.
kde/kitemviews-5.89.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.89.0-i586-1.txz: Upgraded.
kde/kjs-5.89.0-i586-1.txz: Upgraded.
kde/kjsembed-5.89.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.89.0-i586-1.txz: Upgraded.
kde/knewstuff-5.89.0-i586-1.txz: Upgraded.
kde/knotifications-5.89.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.89.0-i586-1.txz: Upgraded.
kde/kpackage-5.89.0-i586-1.txz: Upgraded.
kde/kparts-5.89.0-i586-1.txz: Upgraded.
kde/kpeople-5.89.0-i586-1.txz: Upgraded.
kde/kplotting-5.89.0-i586-1.txz: Upgraded.
kde/kpty-5.89.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.89.0-i586-1.txz: Upgraded.
kde/kross-5.89.0-i586-1.txz: Upgraded.
kde/krunner-5.89.0-i586-1.txz: Upgraded.
kde/kservice-5.89.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.89.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.89.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.89.0-i586-1.txz: Upgraded.
kde/kwallet-5.89.0-i586-1.txz: Upgraded.
kde/kwayland-5.89.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.89.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.89.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.89.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.89.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.89.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.89.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.89.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.89.0-i586-1.txz: Upgraded.
kde/prison-5.89.0-i586-1.txz: Upgraded.
kde/purpose-5.89.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.89.0-i586-1.txz: Upgraded.
kde/solid-5.89.0-i586-1.txz: Upgraded.
kde/sonnet-5.89.0-i586-1.txz: Upgraded.
kde/syndication-5.89.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.89.0-i586-1.txz: Upgraded.
kde/threadweaver-5.89.0-i586-1.txz: Upgraded.
l/harfbuzz-3.2.0-i586-1.txz: Upgraded.
l/libcap-2.62-i586-1.txz: Upgraded.
n/mutt-2.1.4-i586-1.txz: Upgraded.
+--------------------------+
Sat Dec 11 20:02:51 UTC 2021
kde/kdepim-runtime-21.12.0-i586-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] POP3: Fix SSL/TLS connections
       Thanks to gmgf.
+--------------------------+
Sat Dec 11 19:32:57 UTC 2021
kde/digikam-7.4.0-i586-1.txz: Upgraded.
n/fetchmail-6.4.25-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 10 20:53:11 UTC 2021
a/mcelog-180-i586-1.txz: Upgraded.
kde/akonadi-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-mime-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-notes-21.12.0-i586-1.txz: Upgraded.
kde/akonadi-search-21.12.0-i586-1.txz: Upgraded.
kde/akonadiconsole-21.12.0-i586-1.txz: Upgraded.
kde/akregator-21.12.0-i586-1.txz: Upgraded.
kde/analitza-21.12.0-i586-1.txz: Upgraded.
kde/ark-21.12.0-i586-1.txz: Upgraded.
kde/artikulate-21.12.0-i586-1.txz: Upgraded.
kde/audiocd-kio-21.12.0-i586-1.txz: Upgraded.
kde/baloo-widgets-21.12.0-i586-1.txz: Upgraded.
kde/blinken-21.12.0-i586-1.txz: Upgraded.
kde/bomber-21.12.0-i586-1.txz: Upgraded.
kde/bovo-21.12.0-i586-1.txz: Upgraded.
kde/calendarsupport-21.12.0-i586-1.txz: Upgraded.
kde/cantor-21.12.0-i586-1.txz: Upgraded.
kde/cervisia-21.12.0-i586-1.txz: Upgraded.
kde/dolphin-21.12.0-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.12.0-i586-1.txz: Upgraded.
kde/dragon-21.12.0-i586-1.txz: Upgraded.
kde/elisa-21.12.0-i586-1.txz: Upgraded.
kde/eventviews-21.12.0-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.12.0-i586-1.txz: Upgraded.
kde/filelight-21.12.0-i586-1.txz: Upgraded.
kde/granatier-21.12.0-i586-1.txz: Upgraded.
kde/grantlee-editor-21.12.0-i586-1.txz: Upgraded.
kde/grantleetheme-21.12.0-i586-1.txz: Upgraded.
kde/gwenview-21.12.0-i586-1.txz: Upgraded.
kde/incidenceeditor-21.12.0-i586-1.txz: Upgraded.
kde/itinerary-21.12.0-i586-1.txz: Upgraded.
kde/juk-21.12.0-i586-1.txz: Upgraded.
kde/k3b-21.12.0-i586-1.txz: Upgraded.
kde/kaddressbook-21.12.0-i586-1.txz: Upgraded.
kde/kalarm-21.12.0-i586-1.txz: Upgraded.
kde/kalarmcal-21.12.0-i586-1.txz: Upgraded.
kde/kalgebra-21.12.0-i586-1.txz: Upgraded.
kde/kalzium-21.12.0-i586-1.txz: Upgraded.
kde/kamera-21.12.0-i586-1.txz: Upgraded.
kde/kamoso-21.12.0-i586-1.txz: Upgraded.
kde/kanagram-21.12.0-i586-1.txz: Upgraded.
kde/kapman-21.12.0-i586-1.txz: Upgraded.
kde/kapptemplate-21.12.0-i586-1.txz: Upgraded.
kde/kate-21.12.0-i586-1.txz: Upgraded.
kde/katomic-21.12.0-i586-1.txz: Upgraded.
kde/kbackup-21.12.0-i586-1.txz: Upgraded.
kde/kblackbox-21.12.0-i586-1.txz: Upgraded.
kde/kblocks-21.12.0-i586-1.txz: Upgraded.
kde/kbounce-21.12.0-i586-1.txz: Upgraded.
kde/kbreakout-21.12.0-i586-1.txz: Upgraded.
kde/kbruch-21.12.0-i586-1.txz: Upgraded.
kde/kcachegrind-21.12.0-i586-1.txz: Upgraded.
kde/kcalc-21.12.0-i586-1.txz: Upgraded.
kde/kcalutils-21.12.0-i586-1.txz: Upgraded.
kde/kcharselect-21.12.0-i586-1.txz: Upgraded.
kde/kcolorchooser-21.12.0-i586-1.txz: Upgraded.
kde/kcron-21.12.0-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.12.0-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.12.0-i586-1.txz: Upgraded.
kde/kdebugsettings-21.12.0-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.12.0-i586-1.txz: Upgraded.
kde/kdeedu-data-21.12.0-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.12.0-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.12.0-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.12.0-i586-1.txz: Upgraded.
kde/kdenlive-21.12.0-i586-1.txz: Upgraded.
kde/kdepim-addons-21.12.0-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.12.0-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.12.0-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.12.0-i586-1.txz: Upgraded.
kde/kdev-php-21.12.0-i586-1.txz: Upgraded.
kde/kdev-python-21.12.0-i586-1.txz: Upgraded.
kde/kdevelop-21.12.0-i586-1.txz: Upgraded.
kde/kdf-21.12.0-i586-1.txz: Upgraded.
kde/kdialog-21.12.0-i586-1.txz: Upgraded.
kde/kdiamond-21.12.0-i586-1.txz: Upgraded.
kde/keditbookmarks-21.12.0-i586-1.txz: Upgraded.
kde/kfind-21.12.0-i586-1.txz: Upgraded.
kde/kfloppy-21.12.0-i586-1.txz: Upgraded.
kde/kfourinline-21.12.0-i586-1.txz: Upgraded.
kde/kgeography-21.12.0-i586-1.txz: Upgraded.
kde/kget-21.12.0-i586-1.txz: Upgraded.
kde/kgoldrunner-21.12.0-i586-1.txz: Upgraded.
kde/kgpg-21.12.0-i586-1.txz: Upgraded.
kde/khangman-21.12.0-i586-1.txz: Upgraded.
kde/khelpcenter-21.12.0-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.12.0-i586-1.txz: Upgraded.
kde/kig-21.12.0-i586-1.txz: Upgraded.
kde/kigo-21.12.0-i586-1.txz: Upgraded.
kde/killbots-21.12.0-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.12.0-i586-1.txz: Upgraded.
kde/kimap-21.12.0-i586-1.txz: Upgraded.
kde/kio-extras-21.12.0-i586-1.txz: Upgraded.
kde/kio-gdrive-21.12.0-i586-1.txz: Upgraded.
kde/kipi-plugins-21.12.0-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.12.0-i586-1.txz: Upgraded.
kde/kiriki-21.12.0-i586-1.txz: Upgraded.
kde/kiten-21.12.0-i586-1.txz: Upgraded.
kde/kitinerary-21.12.0-i586-1.txz: Upgraded.
kde/kjumpingcube-21.12.0-i586-1.txz: Upgraded.
kde/kldap-21.12.0-i586-1.txz: Upgraded.
kde/kleopatra-21.12.0-i586-1.txz: Upgraded.
kde/klickety-21.12.0-i586-1.txz: Upgraded.
kde/klines-21.12.0-i586-1.txz: Upgraded.
kde/kmag-21.12.0-i586-1.txz: Upgraded.
kde/kmahjongg-21.12.0-i586-1.txz: Upgraded.
kde/kmail-21.12.0-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.12.0-i586-1.txz: Upgraded.
kde/kmailtransport-21.12.0-i586-1.txz: Upgraded.
kde/kmbox-21.12.0-i586-1.txz: Upgraded.
kde/kmime-21.12.0-i586-1.txz: Upgraded.
kde/kmines-21.12.0-i586-1.txz: Upgraded.
kde/kmix-21.12.0-i586-1.txz: Upgraded.
kde/kmousetool-21.12.0-i586-1.txz: Upgraded.
kde/kmouth-21.12.0-i586-1.txz: Upgraded.
kde/kmplot-21.12.0-i586-1.txz: Upgraded.
kde/knavalbattle-21.12.0-i586-1.txz: Upgraded.
kde/knetwalk-21.12.0-i586-1.txz: Upgraded.
kde/knights-21.12.0-i586-1.txz: Upgraded.
kde/knotes-21.12.0-i586-1.txz: Upgraded.
kde/kolf-21.12.0-i586-1.txz: Upgraded.
kde/kollision-21.12.0-i586-1.txz: Upgraded.
kde/kolourpaint-21.12.0-i586-1.txz: Upgraded.
kde/kompare-21.12.0-i586-1.txz: Upgraded.
kde/konqueror-21.12.0-i586-1.txz: Upgraded.
kde/konquest-21.12.0-i586-1.txz: Upgraded.
kde/konsole-21.12.0-i586-1.txz: Upgraded.
kde/kontact-21.12.0-i586-1.txz: Upgraded.
kde/kontactinterface-21.12.0-i586-1.txz: Upgraded.
kde/kontrast-21.12.0-i586-1.txz: Upgraded.
kde/konversation-21.12.0-i586-1.txz: Upgraded.
kde/kopeninghours-21.12.0-i586-1.txz: Upgraded.
kde/kopete-21.12.0-i586-1.txz: Upgraded.
kde/korganizer-21.12.0-i586-1.txz: Upgraded.
kde/kosmindoormap-21.12.0-i586-1.txz: Upgraded.
kde/kpat-21.12.0-i586-1.txz: Upgraded.
kde/kpimtextedit-21.12.0-i586-1.txz: Upgraded.
kde/kpkpass-21.12.0-i586-1.txz: Upgraded.
kde/kpmcore-21.12.0-i586-1.txz: Upgraded.
kde/kpublictransport-21.12.0-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.12.0-i586-1.txz: Upgraded.
kde/krdc-21.12.0-i586-1.txz: Upgraded.
kde/kreversi-21.12.0-i586-1.txz: Upgraded.
kde/krfb-21.12.0-i586-1.txz: Upgraded.
kde/kross-interpreters-21.12.0-i586-1.txz: Upgraded.
kde/kruler-21.12.0-i586-1.txz: Upgraded.
kde/kshisen-21.12.0-i586-1.txz: Upgraded.
kde/ksirk-21.12.0-i586-1.txz: Upgraded.
kde/ksmtp-21.12.0-i586-1.txz: Upgraded.
kde/ksnakeduel-21.12.0-i586-1.txz: Upgraded.
kde/kspaceduel-21.12.0-i586-1.txz: Upgraded.
kde/ksquares-21.12.0-i586-1.txz: Upgraded.
kde/ksudoku-21.12.0-i586-1.txz: Upgraded.
kde/ksystemlog-21.12.0-i586-1.txz: Upgraded.
kde/kteatime-21.12.0-i586-1.txz: Upgraded.
kde/ktimer-21.12.0-i586-1.txz: Upgraded.
kde/ktnef-21.12.0-i586-1.txz: Upgraded.
kde/ktorrent-21.12.0-i586-1.txz: Upgraded.
kde/ktouch-21.12.0-i586-1.txz: Upgraded.
kde/kturtle-21.12.0-i586-1.txz: Upgraded.
kde/kubrick-21.12.0-i586-1.txz: Upgraded.
kde/kwalletmanager-21.12.0-i586-1.txz: Upgraded.
kde/kwave-21.12.0-i586-1.txz: Upgraded.
kde/kwordquiz-21.12.0-i586-1.txz: Upgraded.
kde/libgravatar-21.12.0-i586-1.txz: Upgraded.
kde/libkcddb-21.12.0-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.12.0-i586-1.txz: Upgraded.
kde/libkdcraw-21.12.0-i586-1.txz: Upgraded.
kde/libkdegames-21.12.0-i586-1.txz: Upgraded.
kde/libkdepim-21.12.0-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.12.0-i586-1.txz: Upgraded.
kde/libkexiv2-21.12.0-i586-1.txz: Upgraded.
kde/libkgapi-21.12.0-i586-1.txz: Upgraded.
kde/libkipi-21.12.0-i586-1.txz: Upgraded.
kde/libkleo-21.12.0-i586-1.txz: Upgraded.
kde/libkmahjongg-21.12.0-i586-1.txz: Upgraded.
kde/libkomparediff2-21.12.0-i586-1.txz: Upgraded.
kde/libksane-21.12.0-i586-1.txz: Upgraded.
kde/libksieve-21.12.0-i586-1.txz: Upgraded.
kde/libktorrent-21.12.0-i586-1.txz: Upgraded.
kde/lokalize-21.12.0-i586-1.txz: Upgraded.
kde/lskat-21.12.0-i586-1.txz: Upgraded.
kde/mailcommon-21.12.0-i586-1.txz: Upgraded.
kde/mailimporter-21.12.0-i586-1.txz: Upgraded.
kde/marble-21.12.0-i586-1.txz: Upgraded.
kde/markdownpart-21.12.0-i586-1.txz: Upgraded.
kde/mbox-importer-21.12.0-i586-1.txz: Upgraded.
kde/messagelib-21.12.0-i586-1.txz: Upgraded.
kde/minuet-21.12.0-i586-1.txz: Upgraded.
kde/okular-21.12.0-i586-1.txz: Upgraded.
kde/palapeli-21.12.0-i586-1.txz: Upgraded.
kde/parley-21.12.0-i586-1.txz: Upgraded.
kde/partitionmanager-21.12.0-i586-1.txz: Upgraded.
kde/picmi-21.12.0-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.12.0-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.12.0-i586-1.txz: Upgraded.
kde/pimcommon-21.12.0-i586-1.txz: Upgraded.
kde/poxml-21.12.0-i586-1.txz: Upgraded.
kde/print-manager-21.12.0-i586-1.txz: Upgraded.
kde/rocs-21.12.0-i586-1.txz: Upgraded.
kde/skanlite-21.12.0-i586-1.txz: Upgraded.
kde/spectacle-21.12.0-i586-1.txz: Upgraded.
kde/step-21.12.0-i586-1.txz: Upgraded.
kde/svgpart-21.12.0-i586-1.txz: Upgraded.
kde/sweeper-21.12.0-i586-1.txz: Upgraded.
kde/umbrello-21.12.0-i586-1.txz: Upgraded.
kde/yakuake-21.12.0-i586-1.txz: Upgraded.
kde/zanshin-21.12.0-i586-1.txz: Added.
kde/zeroconf-ioslave-21.12.0-i586-1.txz: Upgraded.
l/xxHash-0.8.1-i586-2.txz: Rebuilt.
       Fixed manpage symlinks. Thanks to Stuart Winter.
x/libX11-1.7.3.1-i586-1.txz: Upgraded.
+--------------------------+
Thu Dec 9 20:05:35 UTC 2021
ap/sysstat-12.5.5-i586-1.txz: Upgraded.
l/libical-3.0.12-i586-1.txz: Upgraded.
x/wayland-1.20.0-i586-1.txz: Upgraded.
xap/xsnow-3.3.6-i586-1.txz: Upgraded.
+--------------------------+
Wed Dec 8 20:42:30 UTC 2021
a/kernel-generic-5.15.7-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.7_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.7-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.7_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.7-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.7_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.15.7_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.7_smp-noarch-1.txz: Upgraded.
n/samba-4.15.3-i586-1.txz: Upgraded.
       This release fixes bugs and these regressions in the 4.15.2 release:
       CVE-2020-25717: A user on the domain can become root on domain members.
       https://www.samba.org/samba/security/CVE-2020-25717.html
       PLEASE [RE-]READ!
       The instructions have been updated and some workarounds initially advised
       for 4.15.2 are no longer required and should be reverted in most cases.
       BUG-14902: User with multiple spaces (eg Fred<space><space>Nurk) become
       un-deletable. While this release should fix this bug, it is advised to have
       a look at the bug report for more detailed information, see:
       https://bugzilla.samba.org/show_bug.cgi?id=14902
       For more information, see:
       https://www.samba.org/samba/security/CVE-2020-25717.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
       (* Security fix *)
x/libX11-1.7.3-i586-1.txz: Upgraded.
x/xscope-1.4.2-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.4.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.4.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
       (* Security fix *)
xfce/exo-4.16.3-i586-1.txz: Upgraded.
extra/linux-5.15.7-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Dec 7 21:02:41 UTC 2021
ap/vim-8.2.3754-i586-1.txz: Upgraded.
d/Cython-0.29.25-i586-1.txz: Upgraded.
d/rust-1.57.0-i686-1.txz: Upgraded.
kde/kscreen-5.23.4-i586-2.txz: Rebuilt.
       Applied upstream patches:
       [PATCH 1/4] Compute logicalSize taking into account current config.
       [PATCH 2/4] Update screen size when mode changes.
       [PATCH 3/4] Ensure to set outputs explicitLogicalSize upon loading config.
       [PATCH 4/4] Fix output identifier window positioning in wayland with some
       scale.
       Thanks to Heinz Wiesinger.
kde/libkscreen-5.23.4-i586-2.txz: Rebuilt.
       Applied upstream patches:
       [PATCH] XrandR: Fix impossibilty to change resolution in VirtualBox.
       [PATCH] Under X11 ignore per-screen scale to compute logicalSize.
       Thanks to Heinz Wiesinger.
l/glib-networking-2.70.1-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_17-i586-1.txz: Upgraded.
l/vte-0.66.2-i586-1.txz: Upgraded.
n/dovecot-2.3.17.1-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.4.0esr-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.4.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-53/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
       https://bugzilla.mozilla.org/show_bug.cgi?id=1737751
       (* Security fix *)
xap/vim-gvim-8.2.3754-i586-1.txz: Upgraded.
+--------------------------+
Sat Dec 4 20:31:55 UTC 2021
a/hwdata-0.354-noarch-1.txz: Upgraded.
a/sysklogd-2.3.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.88.0-noarch-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] Install dark icons via execute_process to use copy command.
       Thanks to Heinz Wiesinger.
l/netpbm-10.96.04-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.9-i586-1.txz: Upgraded.
+--------------------------+
Fri Dec 3 20:07:20 UTC 2021
ap/rpm-4.16.1.3-i586-4.txz: Rebuilt.
       Patched to handle non-compliant RPMs created by install4j. Thanks to alienBOB.
d/poke-1.4-i586-1.txz: Upgraded.
l/enchant-2.3.2-i586-1.txz: Upgraded.
l/freetype-2.11.1-i586-1.txz: Upgraded.
l/glib2-2.70.2-i586-1.txz: Upgraded.
n/lynx-2.9.0dev.10-i586-1.txz: Upgraded.
extra/php8/php8-8.1.0-i586-1.txz: Removed.
extra/php80/php80-8.0.13-i586-1.txz: Added.
extra/php81/php81-8.1.0-i586-1.txz: Added.
+--------------------------+
Thu Dec 2 19:14:20 UTC 2021
d/strace-5.15-i586-1.txz: Upgraded.
l/mozilla-nss-3.73-i586-1.txz: Upgraded.
       Everything linked to NSS/NSPR was rebuild tested here.
       This update fixes a critical security issue:
       NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are
       vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS
       signatures. Applications using NSS for handling signatures encoded within
       CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications
       using NSS for certificate validation or other TLS, X.509, OCSP or CRL
       functionality may be impacted, depending on how they configure NSS.
       Note: This vulnerability does NOT impact Mozilla Firefox. However, email
       clients and PDF viewers that use NSS for signature verification, such as
       Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted.
       Thanks to Tavis Ormandy of Google Project Zero.
       For more information, see:
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
       (* Security fix *)
l/qt5-5.15.3_20211130_014c375b-i586-1.txz: Upgraded.
+--------------------------+
Wed Dec 1 19:44:13 UTC 2021
a/kernel-generic-5.15.6-i586-1.txz: Upgraded.
       Disabled PREEMPT on the non-SMP kernels, as it quickly leads to deadlocks.
a/kernel-generic-smp-5.15.6_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.6-i586-1.txz: Upgraded.
       Disabled PREEMPT on the non-SMP kernels, as it quickly leads to deadlocks.
a/kernel-huge-smp-5.15.6_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.6-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.6_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.15.6_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.6_smp-noarch-1.txz: Upgraded.
l/SDL2-2.0.18-i586-1.txz: Upgraded.
l/libqalculate-3.22.0-i586-1.txz: Upgraded.
extra/linux-5.15.6-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Nov 30 19:20:23 UTC 2021
ap/htop-3.1.2-i586-1.txz: Upgraded.
kde/bluedevil-5.23.4-i586-1.txz: Upgraded.
kde/breeze-5.23.4-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.4-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.4-i586-1.txz: Upgraded.
kde/drkonqi-5.23.4-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.4-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.4-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.4-i586-1.txz: Upgraded.
kde/kdecoration-5.23.4-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.4-i586-1.txz: Upgraded.
kde/kgamma5-5.23.4-i586-1.txz: Upgraded.
kde/khotkeys-5.23.4-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.4-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.4-i586-1.txz: Upgraded.
kde/kscreen-5.23.4-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.4-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.4-i586-1.txz: Upgraded.
kde/ksystemstats-5.23.4-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.4-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.4-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.4-i586-1.txz: Upgraded.
kde/kwin-5.23.4-i586-1.txz: Upgraded.
kde/kwrited-5.23.4-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.4-i586-1.txz: Upgraded.
kde/libkscreen-5.23.4-i586-1.txz: Upgraded.
kde/libksysguard-5.23.4-i586-1.txz: Upgraded.
kde/milou-5.23.4-i586-1.txz: Upgraded.
kde/oxygen-5.23.4-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.4-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.4-i586-1.txz: Upgraded.
kde/plasma-disks-5.23.4-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.4-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.4-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.4-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.4-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.4-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.4-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.4-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.4-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.4-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.4-i586-1.txz: Upgraded.
kde/powerdevil-5.23.4-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.4-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.4-i586-1.txz: Upgraded.
kde/systemsettings-5.23.4-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.4-i586-1.txz: Upgraded.
l/xxHash-0.8.1-i586-1.txz: Upgraded.
+--------------------------+
Mon Nov 29 19:32:48 UTC 2021
ap/cdrtools-3.02a09-i586-1.txz: Upgraded.
d/vala-0.54.4-i586-1.txz: Upgraded.
x/xauth-1.1.1-i586-1.txz: Upgraded.
extra/php8/php8-8.1.0-i586-1.txz: Upgraded.
+--------------------------+
Sun Nov 28 05:04:03 UTC 2021
ap/inxi-20211122_2feaf0b8-noarch-1.txz: Upgraded.
ap/neofetch-20211127_c1c69937-noarch-1.txz: Upgraded.
ap/sqlite-3.37.0-i586-1.txz: Upgraded.
+--------------------------+
Fri Nov 26 19:33:57 UTC 2021
ap/ksh93-1.0_20211125_84ded2d-i586-1.txz: Upgraded.
d/git-2.34.1-i586-1.txz: Upgraded.
l/harfbuzz-3.1.2-i586-1.txz: Upgraded.
l/libexif-0.6.24-i586-1.txz: Upgraded.
l/libsoup-2.74.2-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.8-i586-1.txz: Upgraded.
n/ModemManager-1.18.4-i586-1.txz: Upgraded.
n/gnupg2-2.2.33-i586-1.txz: Upgraded.
x/mesa-21.2.6-i586-1.txz: Upgraded.
xfce/mousepad-0.5.8-i586-1.txz: Upgraded.
+--------------------------+
Wed Nov 24 20:49:02 UTC 2021
kde/kopeninghours-21.08.3-i586-2.txz: Rebuilt.
       Respect $LIBDIRSUFFIX when installing the Python module.
       Thanks to qunying.
+--------------------------+
Wed Nov 24 19:22:57 UTC 2021
d/ruby-3.0.3-i586-1.txz: Upgraded.
       This update fixes bugs and security issues:
       Regular Expression Denial of Service Vulnerability of Date Parsing Methods.
       Buffer Overrun in CGI.escape_html.
       Cookie Prefix Spoofing in CGI::Cookie.parse.
       For more information, see:
       http://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
       http://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/
       http://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41816
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819
       (* Security fix *)
l/Mako-1.1.6-i586-1.txz: Upgraded.
+--------------------------+
Tue Nov 23 19:44:27 UTC 2021
a/btrfs-progs-5.15.1-i586-1.txz: Upgraded.
a/kernel-firmware-20211123_b0e898f-noarch-1.txz: Upgraded.
ap/vim-8.2.3656-i586-1.txz: Upgraded.
d/mercurial-6.0-i586-1.txz: Upgraded.
d/parallel-20211122-noarch-1.txz: Upgraded.
l/fluidsynth-2.2.4-i586-1.txz: Upgraded.
n/libnetfilter_log-1.0.2-i586-1.txz: Upgraded.
x/wayland-protocols-1.24-noarch-1.txz: Upgraded.
xap/vim-gvim-8.2.3656-i586-1.txz: Upgraded.
extra/tigervnc/tigervnc-1.12.0-i586-3.txz: Rebuilt.
       Removed pam_selinux.so module from /etc/pam.d/tigervnc. Thanks to 0XBF.
+--------------------------+
Mon Nov 22 19:52:11 UTC 2021
l/imagemagick-7.1.0_16-i586-1.txz: Upgraded.
l/python-Jinja2-3.0.3-i586-1.txz: Added.
       Added missing dependency of kapidox.
l/python-MarkupSafe-2.0.1-i586-1.txz: Added.
       Added missing dependency of Mako.
l/python-PyYAML-6.0-i586-1.txz: Added.
       Added missing dependency of kapidox.
l/python-doxypypy-0.8.8.6-i586-1.txz: Added.
       Added missing dependency of kapidox.
l/python-doxyqml-0.5.1-i586-1.txz: Added.
       Added missing dependency of kapidox.
l/python-pbr-5.8.0-i586-1.txz: Added.
       Added missing dependency of python-pysol_cards.
extra/tigervnc/tigervnc-1.12.0-i586-2.txz: Rebuilt.
       Use the upstream vncserver script, patched to search in some additional
       locations for a startup script: $HOME/.vnc/xstartup, $HOME/.xinitrc, and
       /etc/X11/xinit/xinitrc.
       Add a symlink for vncserver in the old location (/usr/bin/vncserver).
       Thanks to 0XBF.
+--------------------------+
Sun Nov 21 20:16:54 UTC 2021
a/kernel-generic-5.15.4-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.4-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.4-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.4_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.15.4_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.4_smp-noarch-1.txz: Upgraded.
l/imagemagick-7.1.0_15-i586-1.txz: Upgraded.
l/libcap-2.61-i586-1.txz: Upgraded.
l/python-packaging-21.3-i586-1.txz: Upgraded.
n/nss-pam-ldapd-0.9.12-i586-1.txz: Upgraded.
extra/fltk/fltk-1.3.8-i586-1.txz: Upgraded.
extra/linux-5.15.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Nov 20 20:23:50 UTC 2021
ap/mariadb-10.5.13-i586-2.txz: Rebuilt.
       Install /etc/security/user_map.conf as /etc/security/user_map.conf.new to
       protect it from being overwritten by future upgrades.
       Thanks to Markus Wiesner.
d/python3-3.9.9-i586-2.txz: Rebuilt.
       Do not patch posix_user platlib to use $HOME/.local/lib64 on 64-bit - use
       $HOME/.local/lib for all platforms. This avoids a warning from pip about the
       install location not matching between distutils and sysconfig. Note that this
       might require already installed modules to be moved from $HOME/.local/lib64
       to $HOME/.local/lib (or they could be removed and then reinstalled).
       At first this seemed to be a non-optimal solution for this issue, but other
       distributions are taking this same approach and it appears that the
       posix_user platlib setting has always been ignored until recently.
       If this causes any unexpected issues, let me know.
       Thanks to redneonglow and alijkl.
n/fetchmail-6.4.24-i586-1.txz: Upgraded.
+--------------------------+
Sat Nov 20 07:12:58 UTC 2021
d/python3-3.9.9-i586-1.txz: Upgraded.
       This is a bugfix release, fixing four bugs in Python 3.9.8 (including an
       argparse regression in Python 3.9.8 which caused complex command-line tools
       to fail recognizing sub-commands properly). It also makes a couple of
       corrections to the documentation.
       For more information, see:
       https://docs.python.org/release/3.9.9/whatsnew/changelog.html
l/libjpeg-turbo-2.1.2-i586-1.txz: Upgraded.
l/python-setuptools_scm-6.3.2-i586-1.txz: Added.
       This is needed when building some Python modules to correctly parse their
       metadata, as recently discovered with importlib_metadata and zipp. While
       we'll stick to the version of Markdown that we've got, it seems like a good
       idea to get this in before the release to help prevent people from running
       into similar "version 0.0.0" issues with other Python modules.
       Thanks to USUARIONUEVO.
l/python-tomli-1.2.2-i586-1.txz: Added.
       This is needed by setuptools_scm. Also, the SlackBuild contains a nice
       example of using a setup.py shim to setuptools for a Python module that
       only contains pyproject.toml and not setup.py.
       Thanks to Heinz Wiesinger.
l/qtkeychain-0.13.2-i586-1.txz: Upgraded.
n/libmbim-1.26.2-i586-1.txz: Upgraded.
n/libnftnl-1.2.1-i586-1.txz: Upgraded.
n/nftables-1.0.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.3.2-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.3.2/releasenotes/
extra/php8/php8-8.0.13-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       XML: special character is breaking the path in xml function.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707
       (* Security fix *)
+--------------------------+
Thu Nov 18 21:13:10 UTC 2021
a/bash-5.1.012-i586-1.txz: Upgraded.
a/cryptsetup-2.4.2-i586-1.txz: Upgraded.
a/kernel-generic-5.15.3-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.3-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.3-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.3_smp-i686-1.txz: Upgraded.
d/ccache-4.5.1-i586-1.txz: Upgraded.
d/kernel-headers-5.15.3_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.3_smp-noarch-1.txz: Upgraded.
kde/latte-dock-0.10.4-i586-1.txz: Upgraded.
n/php-7.4.26-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       XML: special character is breaking the path in xml function.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707
       (* Security fix *)
x/ibus-1.5.25-i586-5.txz: Rebuilt.
       Fixed paths in:
       [PATCH] client/gtk3/ibusimcontext: Fix wrong cursor location in gtk3 apps.
       Thanks to Lockywolf.
xap/audacious-4.1-i586-3.txz: Rebuilt.
       Removed the extra menu entry for the GTK+ version as this can just be
       selected in the settings. Thanks to franzen.
extra/linux-5.15.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Nov 17 20:50:35 UTC 2021
Clearly we're going to have to tread more carefully for things to settle down,
so consider this RC2 and a much harder freeze. A test mass rebuild was done
here and there are no more "fails to build from source" remaining (thanks to
nobodino for some amazing and relentless testing).
a/exfatprogs-1.1.3-i586-1.txz: Upgraded.
ap/lxc-4.0.11-i586-3.txz: Rebuilt.
       Added some additional packages to the lxc-slackware template:
       bridge-utils, dbus, iptables, libnl3, libpcap.
       Thanks to linux91 for the hints.
ap/qpdf-10.4.0-i586-1.txz: Upgraded.
l/python-docutils-0.17.1-i586-3.txz: Rebuilt.
       Revert to this version for now since 0.18 isn't compatible with Sphinx.
       Thanks to HQuest.
l/python-markdown-3.3.4-i586-3.txz: Rebuilt.
       Reverted this to fix the Samba build. The newer versions of Markdown require
       importlib_metadata and zipp, and adding these also fixes the build, but oddly
       the installed PKG-INFO shows version 0.0.0, which I suspect is more breakage
       going on with setuptools. I've tried rebuilding all other Python modules here
       to see if a more general breakage had crept in somehow, but those are the
       only two Python modules I've found that exhibit this issue, and I've found
       other similar reports (but no fixes). Markdown-3.3.4 seems to be the safe bet
       for now.
n/bind-9.16.23-i586-1.txz: Upgraded.
x/libdrm-2.4.107-i586-1.txz: Upgraded.
       Reverted to 2.4.107 as 2.4.108 does not seem to be completely compatible with
       xorg-server-1.20.13. Fixes xf86-video-vmware failing to build from source.
       Thanks to nobodino.
+--------------------------+
Tue Nov 16 19:04:47 UTC 2021
ap/ksh93-1.0_7ea95b7-i586-1.txz: Upgraded.
       Changed the fetch script to pull the 1.0 branch.
       Packaged shcomp and man page and additional documentation.
       Merged some other changes to the build script.
       Thanks to Martijn Dekker (McDutchie).
ap/vim-8.2.3605-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_14-i586-1.txz: Upgraded.
l/python-markdown-3.3.5-i586-1.txz: Upgraded.
xap/seamonkey-2.53.10-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.10
       (* Security fix *)
xap/vim-gvim-8.2.3605-i586-1.txz: Upgraded.
extra/brltty/brltty-6.4-i586-4.txz: Rebuilt.
       Fixed installation of the Tcl bindings. Thanks to Stuart Winter.
extra/tigervnc/tigervnc-1.12.0-i586-1.txz: Upgraded.
       Thanks to alienBOB for the original build script, and to 0XBF and Linux From
       Scratch for some useful hints on getting this back in shape.
+--------------------------+
Mon Nov 15 20:33:49 UTC 2021
a/kernel-firmware-20211115_f5d5195-noarch-1.txz: Upgraded.
d/git-2.34.0-i586-1.txz: Upgraded.
xap/gftp-2.8.0b-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.3.1-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.3.1/releasenotes/
xfce/xfce4-whiskermenu-plugin-2.6.2-i586-1.txz: Upgraded.
+--------------------------+
Sun Nov 14 18:51:15 UTC 2021
d/slacktrack-2.22-i586-1.txz: Upgraded.
       Test makepkg's response to the package name as part of the pre-build
       sanity checks. This catches malformed package names and extension types.
       Thanks to Eduard Rozenberg for the suggestion.
       Thanks to Stuart Winter.
kde/kstars-3.5.6-i586-1.txz: Upgraded.
x/xterm-370-i586-1.txz: Upgraded.
+--------------------------+
Sat Nov 13 20:02:49 UTC 2021
a/kernel-firmware-20211112_150c19f-noarch-1.txz: Upgraded.
ap/nvme-cli-1.16-i586-1.txz: Upgraded.
d/ccache-4.5-i586-1.txz: Upgraded.
kde/attica-5.88.0-i586-1.txz: Upgraded.
kde/baloo-5.88.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.88.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.88.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.88.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.88.0-i586-1.txz: Upgraded.
kde/kactivities-5.88.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.88.0-i586-1.txz: Upgraded.
kde/kapidox-5.88.0-i586-1.txz: Upgraded.
kde/karchive-5.88.0-i586-1.txz: Upgraded.
kde/kauth-5.88.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.88.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.88.0-i586-1.txz: Upgraded.
kde/kcmutils-5.88.0-i586-1.txz: Upgraded.
kde/kcodecs-5.88.0-i586-1.txz: Upgraded.
kde/kcompletion-5.88.0-i586-1.txz: Upgraded.
kde/kconfig-5.88.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.88.0-i586-1.txz: Upgraded.
kde/kcontacts-5.88.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.88.0-i586-1.txz: Upgraded.
kde/kcrash-5.88.0-i586-1.txz: Upgraded.
kde/kdav-5.88.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.88.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.88.0-i586-1.txz: Upgraded.
kde/kded-5.88.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.88.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.88.0-i586-1.txz: Upgraded.
kde/kdesu-5.88.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.88.0-i586-1.txz: Upgraded.
kde/kdnssd-5.88.0-i586-1.txz: Upgraded.
kde/kdoctools-5.88.0-i586-1.txz: Upgraded.
kde/kemoticons-5.88.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.88.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.88.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.88.0-i586-1.txz: Upgraded.
kde/kholidays-5.88.0-i586-1.txz: Upgraded.
kde/khtml-5.88.0-i586-1.txz: Upgraded.
kde/ki18n-5.88.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.88.0-i586-1.txz: Upgraded.
kde/kidletime-5.88.0-i586-1.txz: Upgraded.
kde/kimageformats-5.88.0-i586-1.txz: Upgraded.
kde/kinit-5.88.0-i586-1.txz: Upgraded.
kde/kio-5.88.0-i586-1.txz: Upgraded.
kde/kirigami2-5.88.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.88.0-i586-1.txz: Upgraded.
kde/kitemviews-5.88.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.88.0-i586-1.txz: Upgraded.
kde/kjs-5.88.0-i586-1.txz: Upgraded.
kde/kjsembed-5.88.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.88.0-i586-1.txz: Upgraded.
kde/knewstuff-5.88.0-i586-1.txz: Upgraded.
kde/knotifications-5.88.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.88.0-i586-1.txz: Upgraded.
kde/kpackage-5.88.0-i586-1.txz: Upgraded.
kde/kparts-5.88.0-i586-1.txz: Upgraded.
kde/kpeople-5.88.0-i586-1.txz: Upgraded.
kde/kplotting-5.88.0-i586-1.txz: Upgraded.
kde/kpty-5.88.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.88.0-i586-1.txz: Upgraded.
kde/kross-5.88.0-i586-1.txz: Upgraded.
kde/krunner-5.88.0-i586-1.txz: Upgraded.
kde/kservice-5.88.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.88.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.88.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.88.0-i586-1.txz: Upgraded.
kde/kwallet-5.88.0-i586-1.txz: Upgraded.
kde/kwayland-5.88.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.88.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.88.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.88.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.88.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.88.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.88.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.88.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.88.0-i586-1.txz: Upgraded.
kde/prison-5.88.0-i586-1.txz: Upgraded.
kde/purpose-5.88.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.88.0-i586-1.txz: Upgraded.
kde/solid-5.88.0-i586-1.txz: Upgraded.
kde/sonnet-5.88.0-i586-1.txz: Upgraded.
kde/syndication-5.88.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.88.0-i586-1.txz: Upgraded.
kde/threadweaver-5.88.0-i586-1.txz: Upgraded.
l/librsvg-2.52.4-i586-1.txz: Upgraded.
+--------------------------+
Fri Nov 12 19:19:46 UTC 2021
a/kernel-generic-5.15.2-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.2_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.2-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.2_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.2-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.2_smp-i686-1.txz: Upgraded.
a/sysvinit-scripts-15.0-noarch-7.txz: Rebuilt.
       rc.M: adjust the startup order to make sure a few services are running when
       needed (such as MariaDB for dovecot and postfix). Thanks to Tshane.
ap/ksh93-20211112_d160abc-i586-1.txz: Upgraded.
       Don't assume that /bin/sh mode is desired when ksh is run from su.
       Thanks to McDutchie.
ap/lxc-4.0.11-i586-2.txz: Rebuilt.
       Move the bash-completion symlinks to the system directory. Thanks to kaott.
d/kernel-headers-5.15.2_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.2_smp-noarch-1.txz: Upgraded.
l/pipewire-0.3.40-i586-1.txz: Upgraded.
n/s-nail-14.9.23-i586-1.txz: Upgraded.
extra/linux-5.15.2-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Nov 11 20:36:12 UTC 2021
a/sdparm-1.12-i586-2.txz: Rebuilt.
       Recompiled against sg3_utils-1.47.
a/sysvinit-scripts-15.0-noarch-6.txz: Rebuilt.
       rc.{6,S,M}: merged changes for compatibility with LXC containers.
a/udisks-1.0.5-i586-10.txz: Rebuilt.
       Recompiled against sg3_utils-1.47.
ap/lxc-4.0.11-i586-1.txz: Upgraded.
       Requires libseccomp-2.5.3.
       No more local versions of rc.{6,S,M,inet1}: the regular versions work now.
l/elfutils-0.186-i586-1.txz: Upgraded.
l/libgpod-0.8.3-i586-11.txz: Rebuilt.
       Recompiled against sg3_utils-1.47.
l/libseccomp-2.5.3-i586-1.txz: Added.
       This is needed by lxc-4.0.11. Thanks to Willy Sudiarto Raharjo.
l/sg3_utils-1.47-i586-1.txz: Upgraded.
       Shared library .so-version bump.
n/network-scripts-15.0-noarch-17.txz: Rebuilt.
       Merged changes in rc.inet1 to make it compatible with LXC containers.
       Patched netconfig to ensure the proper permissions on rc.networkmanager
       when NetworkManager is not chosen.
x/ibus-1.5.25-i586-4.txz: Rebuilt.
       [PATCH] client/gtk2/ibusimcontext: Fix wrong cursor location in gtk3 apps.
       Thanks to Lockywolf.
+--------------------------+
Wed Nov 10 20:32:37 UTC 2021
d/python3-3.9.8-i586-1.txz: Upgraded.
l/libtasn1-4.18.0-i586-1.txz: Upgraded.
n/curl-7.80.0-i586-1.txz: Upgraded.
n/ethtool-5.15-i586-1.txz: Upgraded.
n/samba-4.15.2-i586-1.txz: Upgraded.
       This is a security release in order to address the following defects:
       SMB1 client connections can be downgraded to plaintext authentication.
       A user on the domain can become root on domain members.
       Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC.
       Samba AD DC did not always rely on the SID and PAC in Kerberos tickets.
       Kerberos acceptors need easy access to stable AD identifiers (eg objectSid).
       Samba AD DC did not do suffienct access and conformance checking of data
       stored.
       Use after free in Samba AD DC RPC server.
       Subsequent DCE/RPC fragment injection vulnerability.
       For more information, see:
       https://www.samba.org/samba/security/CVE-2016-2124.html
       https://www.samba.org/samba/security/CVE-2020-25717.html
       ^^ (PLEASE READ! There are important behaviour changes described)
       https://www.samba.org/samba/security/CVE-2020-25718.html
       https://www.samba.org/samba/security/CVE-2020-25719.html
       https://www.samba.org/samba/security/CVE-2020-25721.html
       https://www.samba.org/samba/security/CVE-2020-25722.html
       https://www.samba.org/samba/security/CVE-2021-3738.html
       https://www.samba.org/samba/security/CVE-2021-23192.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
       (* Security fix *)
x/xorg-server-xwayland-21.1.3-i586-1.txz: Upgraded.
+--------------------------+
Tue Nov 9 20:22:27 UTC 2021
a/dialog-1.3_20211107-i586-1.txz: Upgraded.
ap/mariadb-10.5.13-i586-1.txz: Upgraded.
       This update fixes a security issue:
       Easily exploitable vulnerability allows high privileged attacker with network
       access via multiple protocols to compromise MariaDB Server. Successful
       attacks of this vulnerability can result in unauthorized ability to cause a
       hang or frequently repeatable crash (complete DOS) of MariaDB Server as well
       as unauthorized update, insert or delete access to some of MariaDB Server
       accessible data.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
       (* Security fix *)
kde/bluedevil-5.23.3-i586-1.txz: Upgraded.
kde/breeze-5.23.3-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.3-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.3-i586-1.txz: Upgraded.
kde/drkonqi-5.23.3-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.3-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.3-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.3-i586-1.txz: Upgraded.
kde/kdecoration-5.23.3-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.3-i586-1.txz: Upgraded.
kde/kdev-python-5.6.2-i586-4.txz: Added.
kde/kgamma5-5.23.3-i586-1.txz: Upgraded.
kde/khotkeys-5.23.3-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.3-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.3-i586-1.txz: Upgraded.
kde/kscreen-5.23.3-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.3-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.3-i586-1.txz: Upgraded.
kde/ksystemstats-5.23.3-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.3-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.3-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.3-i586-1.txz: Upgraded.
kde/kwin-5.23.3-i586-1.txz: Upgraded.
kde/kwrited-5.23.3-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.3-i586-1.txz: Upgraded.
kde/libkscreen-5.23.3-i586-1.txz: Upgraded.
kde/libksysguard-5.23.3-i586-1.txz: Upgraded.
kde/milou-5.23.3-i586-1.txz: Upgraded.
kde/oxygen-5.23.3-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.3-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.3-i586-1.txz: Upgraded.
kde/plasma-disks-5.23.3-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.3-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.3-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.3-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.3-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.3-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.3-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.3-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.3-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.3-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.3-i586-1.txz: Upgraded.
kde/powerdevil-5.23.3-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.3-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.3-i586-1.txz: Upgraded.
kde/systemsettings-5.23.3-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.3-i586-1.txz: Upgraded.
l/libxml2-2.9.12-i586-5.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] Work around lxml API abuse.
       Thanks to brobr.
x/libdrm-2.4.108-i586-1.txz: Upgraded.
x/libevdev-1.12.0-i586-1.txz: Upgraded.
xap/xsnow-3.3.2-i586-1.txz: Upgraded.
       Just in time for tomorrow night here in Minnesota. :-)
+--------------------------+
Tue Nov 9 03:20:45 UTC 2021
ap/texinfo-6.8-i586-3.txz: Rebuilt.
       Patched to fix issues with pt_BR locale. Thanks to Luiz Ramos.
l/harfbuzz-3.1.1-i586-1.txz: Upgraded.
l/netpbm-10.96.03-i586-1.txz: Upgraded.
l/qtkeychain-0.13.1-i586-1.txz: Upgraded.
n/iw-5.16-i586-1.txz: Upgraded.
n/postfix-3.6.3-i586-1.txz: Upgraded.
+--------------------------+
Sat Nov 6 20:24:12 UTC 2021
a/kernel-generic-5.15.1-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.1_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.1-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.1_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.1-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.1_smp-i686-1.txz: Upgraded.
ap/ksh93-20211105_77827c5-i586-1.txz: Upgraded.
       Switched to ksh93u+m. Thanks to aikempshall and GazL.
d/kernel-headers-5.15.1_smp-x86-1.txz: Upgraded.
k/kernel-source-5.15.1_smp-noarch-1.txz: Upgraded.
l/libxml2-2.9.12-i586-4.txz: Rebuilt.
       Patched to fix python3 unicode errors. Thanks to Daedra.
l/python-pycparser-2.21-i586-1.txz: Upgraded.
l/vte-0.66.1-i586-1.txz: Upgraded.
tcl/tcl-8.6.12-i586-1.txz: Upgraded.
tcl/tk-8.6.12-i586-1.txz: Upgraded.
xap/pan-0.148-i586-1.txz: Upgraded.
extra/linux-5.15.1-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Nov 5 22:49:19 UTC 2021
a/btrfs-progs-5.15-i586-1.txz: Upgraded.
a/hwdata-0.353-noarch-1.txz: Upgraded.
kde/plasma-wayland-protocols-1.5.0-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.3.0esr-i686-2.txz: Rebuilt.
       Rebuilt with rust-1.54.0, which seems to produce a stable Firefox package.
       Looking at this page, it would seem that upstream is probably compiling
       the official package with rust-1.54.0:
       https://firefox-source-docs.mozilla.org/writing-rust-code/update-policy.html
       Normally I'd be inclined to drop back on the version of Rust in the main
       tree, but rust-1.56.1 fixes a security issue (one that doesn't affect any
       crates used by Firefox), so that doesn't seem to be a good idea.
+--------------------------+
Fri Nov 5 01:05:01 UTC 2021
kde/akonadi-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-mime-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-notes-21.08.3-i586-1.txz: Upgraded.
kde/akonadi-search-21.08.3-i586-1.txz: Upgraded.
kde/akonadiconsole-21.08.3-i586-1.txz: Upgraded.
kde/akregator-21.08.3-i586-1.txz: Upgraded.
kde/analitza-21.08.3-i586-1.txz: Upgraded.
kde/ark-21.08.3-i586-1.txz: Upgraded.
kde/artikulate-21.08.3-i586-1.txz: Upgraded.
kde/audiocd-kio-21.08.3-i586-1.txz: Upgraded.
kde/baloo-widgets-21.08.3-i586-1.txz: Upgraded.
kde/blinken-21.08.3-i586-1.txz: Upgraded.
kde/bomber-21.08.3-i586-1.txz: Upgraded.
kde/bovo-21.08.3-i586-1.txz: Upgraded.
kde/calendarsupport-21.08.3-i586-1.txz: Upgraded.
kde/cantor-21.08.3-i586-1.txz: Upgraded.
kde/cervisia-21.08.3-i586-1.txz: Upgraded.
kde/dolphin-21.08.3-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.08.3-i586-1.txz: Upgraded.
kde/dragon-21.08.3-i586-1.txz: Upgraded.
kde/elisa-21.08.3-i586-1.txz: Upgraded.
kde/eventviews-21.08.3-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.08.3-i586-1.txz: Upgraded.
kde/filelight-21.08.3-i586-1.txz: Upgraded.
kde/granatier-21.08.3-i586-1.txz: Upgraded.
kde/grantlee-editor-21.08.3-i586-1.txz: Upgraded.
kde/grantleetheme-21.08.3-i586-1.txz: Upgraded.
kde/gwenview-21.08.3-i586-1.txz: Upgraded.
kde/incidenceeditor-21.08.3-i586-1.txz: Upgraded.
kde/itinerary-21.08.3-i586-1.txz: Upgraded.
kde/juk-21.08.3-i586-1.txz: Upgraded.
kde/k3b-21.08.3-i586-1.txz: Upgraded.
kde/kaddressbook-21.08.3-i586-1.txz: Upgraded.
kde/kalarm-21.08.3-i586-1.txz: Upgraded.
kde/kalarmcal-21.08.3-i586-1.txz: Upgraded.
kde/kalgebra-21.08.3-i586-1.txz: Upgraded.
kde/kalzium-21.08.3-i586-1.txz: Upgraded.
kde/kamera-21.08.3-i586-1.txz: Upgraded.
kde/kamoso-21.08.3-i586-1.txz: Upgraded.
kde/kanagram-21.08.3-i586-1.txz: Upgraded.
kde/kapman-21.08.3-i586-1.txz: Upgraded.
kde/kapptemplate-21.08.3-i586-1.txz: Upgraded.
kde/kate-21.08.3-i586-1.txz: Upgraded.
kde/katomic-21.08.3-i586-1.txz: Upgraded.
kde/kbackup-21.08.3-i586-1.txz: Upgraded.
kde/kblackbox-21.08.3-i586-1.txz: Upgraded.
kde/kblocks-21.08.3-i586-1.txz: Upgraded.
kde/kbounce-21.08.3-i586-1.txz: Upgraded.
kde/kbreakout-21.08.3-i586-1.txz: Upgraded.
kde/kbruch-21.08.3-i586-1.txz: Upgraded.
kde/kcachegrind-21.08.3-i586-1.txz: Upgraded.
kde/kcalc-21.08.3-i586-1.txz: Upgraded.
kde/kcalutils-21.08.3-i586-1.txz: Upgraded.
kde/kcharselect-21.08.3-i586-1.txz: Upgraded.
kde/kcolorchooser-21.08.3-i586-1.txz: Upgraded.
kde/kcron-21.08.3-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.08.3-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.08.3-i586-1.txz: Upgraded.
kde/kdebugsettings-21.08.3-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.08.3-i586-1.txz: Upgraded.
kde/kdeedu-data-21.08.3-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.08.3-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.08.3-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.08.3-i586-1.txz: Upgraded.
kde/kdenlive-21.08.3-i586-1.txz: Upgraded.
kde/kdepim-addons-21.08.3-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.08.3-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.08.3-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.08.3-i586-1.txz: Upgraded.
kde/kdf-21.08.3-i586-1.txz: Upgraded.
kde/kdialog-21.08.3-i586-1.txz: Upgraded.
kde/kdiamond-21.08.3-i586-1.txz: Upgraded.
kde/keditbookmarks-21.08.3-i586-1.txz: Upgraded.
kde/kfind-21.08.3-i586-1.txz: Upgraded.
kde/kfloppy-21.08.3-i586-1.txz: Upgraded.
kde/kfourinline-21.08.3-i586-1.txz: Upgraded.
kde/kgeography-21.08.3-i586-1.txz: Upgraded.
kde/kget-21.08.3-i586-1.txz: Upgraded.
kde/kgoldrunner-21.08.3-i586-1.txz: Upgraded.
kde/kgpg-21.08.3-i586-1.txz: Upgraded.
kde/khangman-21.08.3-i586-1.txz: Upgraded.
kde/khelpcenter-21.08.3-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.08.3-i586-1.txz: Upgraded.
kde/kig-21.08.3-i586-1.txz: Upgraded.
kde/kigo-21.08.3-i586-1.txz: Upgraded.
kde/killbots-21.08.3-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.08.3-i586-1.txz: Upgraded.
kde/kimap-21.08.3-i586-1.txz: Upgraded.
kde/kio-extras-21.08.3-i586-1.txz: Upgraded.
kde/kio-gdrive-21.08.3-i586-1.txz: Upgraded.
kde/kipi-plugins-21.08.3-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.08.3-i586-1.txz: Upgraded.
kde/kiriki-21.08.3-i586-1.txz: Upgraded.
kde/kiten-21.08.3-i586-1.txz: Upgraded.
kde/kitinerary-21.08.3-i586-1.txz: Upgraded.
kde/kjumpingcube-21.08.3-i586-1.txz: Upgraded.
kde/kldap-21.08.3-i586-1.txz: Upgraded.
kde/kleopatra-21.08.3-i586-1.txz: Upgraded.
kde/klickety-21.08.3-i586-1.txz: Upgraded.
kde/klines-21.08.3-i586-1.txz: Upgraded.
kde/kmag-21.08.3-i586-1.txz: Upgraded.
kde/kmahjongg-21.08.3-i586-1.txz: Upgraded.
kde/kmail-21.08.3-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.08.3-i586-1.txz: Upgraded.
kde/kmailtransport-21.08.3-i586-1.txz: Upgraded.
kde/kmbox-21.08.3-i586-1.txz: Upgraded.
kde/kmime-21.08.3-i586-1.txz: Upgraded.
kde/kmines-21.08.3-i586-1.txz: Upgraded.
kde/kmix-21.08.3-i586-1.txz: Upgraded.
kde/kmousetool-21.08.3-i586-1.txz: Upgraded.
kde/kmouth-21.08.3-i586-1.txz: Upgraded.
kde/kmplot-21.08.3-i586-1.txz: Upgraded.
kde/knavalbattle-21.08.3-i586-1.txz: Upgraded.
kde/knetwalk-21.08.3-i586-1.txz: Upgraded.
kde/knights-21.08.3-i586-1.txz: Upgraded.
kde/knotes-21.08.3-i586-1.txz: Upgraded.
kde/kolf-21.08.3-i586-1.txz: Upgraded.
kde/kollision-21.08.3-i586-1.txz: Upgraded.
kde/kolourpaint-21.08.3-i586-1.txz: Upgraded.
kde/kompare-21.08.3-i586-1.txz: Upgraded.
kde/konqueror-21.08.3-i586-1.txz: Upgraded.
kde/konquest-21.08.3-i586-1.txz: Upgraded.
kde/konsole-21.08.3-i586-1.txz: Upgraded.
kde/kontact-21.08.3-i586-1.txz: Upgraded.
kde/kontactinterface-21.08.3-i586-1.txz: Upgraded.
kde/kontrast-21.08.3-i586-1.txz: Upgraded.
kde/konversation-21.08.3-i586-1.txz: Upgraded.
kde/kopeninghours-21.08.3-i586-1.txz: Upgraded.
kde/kopete-21.08.3-i586-1.txz: Upgraded.
kde/korganizer-21.08.3-i586-1.txz: Upgraded.
kde/kosmindoormap-21.08.3-i586-1.txz: Upgraded.
kde/kpat-21.08.3-i586-1.txz: Upgraded.
kde/kpimtextedit-21.08.3-i586-1.txz: Upgraded.
kde/kpkpass-21.08.3-i586-1.txz: Upgraded.
kde/kpmcore-21.08.3-i586-1.txz: Upgraded.
kde/kpublictransport-21.08.3-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.08.3-i586-1.txz: Upgraded.
kde/krdc-21.08.3-i586-1.txz: Upgraded.
kde/kreversi-21.08.3-i586-1.txz: Upgraded.
kde/krfb-21.08.3-i586-1.txz: Upgraded.
kde/kross-interpreters-21.08.3-i586-1.txz: Upgraded.
kde/kruler-21.08.3-i586-1.txz: Upgraded.
kde/kshisen-21.08.3-i586-1.txz: Upgraded.
kde/ksirk-21.08.3-i586-1.txz: Upgraded.
kde/ksmtp-21.08.3-i586-1.txz: Upgraded.
kde/ksnakeduel-21.08.3-i586-1.txz: Upgraded.
kde/kspaceduel-21.08.3-i586-1.txz: Upgraded.
kde/ksquares-21.08.3-i586-1.txz: Upgraded.
kde/ksudoku-21.08.3-i586-1.txz: Upgraded.
kde/ksystemlog-21.08.3-i586-1.txz: Upgraded.
kde/kteatime-21.08.3-i586-1.txz: Upgraded.
kde/ktimer-21.08.3-i586-1.txz: Upgraded.
kde/ktnef-21.08.3-i586-1.txz: Upgraded.
kde/ktorrent-21.08.3-i586-1.txz: Upgraded.
kde/ktouch-21.08.3-i586-1.txz: Upgraded.
kde/kturtle-21.08.3-i586-1.txz: Upgraded.
kde/kubrick-21.08.3-i586-1.txz: Upgraded.
kde/kwalletmanager-21.08.3-i586-1.txz: Upgraded.
kde/kwave-21.08.3-i586-1.txz: Upgraded.
kde/kwordquiz-21.08.3-i586-1.txz: Upgraded.
kde/libgravatar-21.08.3-i586-1.txz: Upgraded.
kde/libkcddb-21.08.3-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.08.3-i586-1.txz: Upgraded.
kde/libkdcraw-21.08.3-i586-1.txz: Upgraded.
kde/libkdegames-21.08.3-i586-1.txz: Upgraded.
kde/libkdepim-21.08.3-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.08.3-i586-1.txz: Upgraded.
kde/libkexiv2-21.08.3-i586-1.txz: Upgraded.
kde/libkgapi-21.08.3-i586-1.txz: Upgraded.
kde/libkipi-21.08.3-i586-1.txz: Upgraded.
kde/libkleo-21.08.3-i586-1.txz: Upgraded.
kde/libkmahjongg-21.08.3-i586-1.txz: Upgraded.
kde/libkomparediff2-21.08.3-i586-1.txz: Upgraded.
kde/libksane-21.08.3-i586-1.txz: Upgraded.
kde/libksieve-21.08.3-i586-1.txz: Upgraded.
kde/libktorrent-21.08.3-i586-1.txz: Upgraded.
kde/lokalize-21.08.3-i586-1.txz: Upgraded.
kde/lskat-21.08.3-i586-1.txz: Upgraded.
kde/mailcommon-21.08.3-i586-1.txz: Upgraded.
kde/mailimporter-21.08.3-i586-1.txz: Upgraded.
kde/marble-21.08.3-i586-1.txz: Upgraded.
kde/markdownpart-21.08.3-i586-1.txz: Upgraded.
kde/mbox-importer-21.08.3-i586-1.txz: Upgraded.
kde/messagelib-21.08.3-i586-1.txz: Upgraded.
kde/minuet-21.08.3-i586-1.txz: Upgraded.
kde/okular-21.08.3-i586-1.txz: Upgraded.
kde/palapeli-21.08.3-i586-1.txz: Upgraded.
kde/parley-21.08.3-i586-1.txz: Upgraded.
kde/partitionmanager-21.08.3-i586-1.txz: Upgraded.
kde/picmi-21.08.3-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.08.3-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.08.3-i586-1.txz: Upgraded.
kde/pimcommon-21.08.3-i586-1.txz: Upgraded.
kde/poxml-21.08.3-i586-1.txz: Upgraded.
kde/print-manager-21.08.3-i586-1.txz: Upgraded.
kde/rocs-21.08.3-i586-1.txz: Upgraded.
kde/skanlite-21.08.3-i586-1.txz: Upgraded.
kde/spectacle-21.08.3-i586-1.txz: Upgraded.
kde/step-21.08.3-i586-1.txz: Upgraded.
kde/svgpart-21.08.3-i586-1.txz: Upgraded.
kde/sweeper-21.08.3-i586-1.txz: Upgraded.
kde/umbrello-21.08.3-i586-1.txz: Upgraded.
kde/yakuake-21.08.3-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.08.3-i586-1.txz: Upgraded.
l/harfbuzz-3.1.0-i586-1.txz: Upgraded.
l/iso-codes-4.8.0-noarch-1.txz: Upgraded.
l/mlt-7.2.0-i586-1.txz: Upgraded.
n/libgpg-error-1.43-i586-1.txz: Upgraded.
+--------------------------+
Thu Nov 4 04:43:31 UTC 2021
a/kernel-firmware-20211102_c9e68c4-noarch-1.txz: Upgraded.
a/kernel-generic-5.15.0-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.15.0_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.15.0-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.15.0_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.15.0-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.15.0_smp-i686-1.txz: Upgraded.
a/libblockdev-2.26-i586-3.txz: Rebuilt.
a/libbytesize-2.6-i586-3.txz: Rebuilt.
a/libpwquality-1.4.4-i586-6.txz: Rebuilt.
a/util-linux-2.37.2-i586-6.txz: Rebuilt.
a/volume_key-0.3.12-i586-5.txz: Rebuilt.
ap/hplip-3.20.5-i586-6.txz: Rebuilt.
ap/linuxdoc-tools-0.9.82-i586-3.txz: Rebuilt.
ap/rpm-4.16.1.3-i586-3.txz: Rebuilt.
ap/undervolt-20210815_e39aea1-i586-2.txz: Rebuilt.
ap/vim-8.2.3570-i586-1.txz: Upgraded.
d/Cython-0.29.24-i586-3.txz: Rebuilt.
d/distcc-3.4-i586-3.txz: Rebuilt.
d/gdb-11.1-i586-4.txz: Rebuilt.
d/gyp-20210831_d6c5dd51-i586-2.txz: Rebuilt.
d/kernel-headers-5.15.0_smp-x86-1.txz: Upgraded.
d/llvm-13.0.0-i586-2.txz: Rebuilt.
d/mercurial-5.9.3-i586-2.txz: Rebuilt.
d/meson-0.59.4-i586-1.txz: Upgraded.
d/python-pip-21.3.1-i586-2.txz: Rebuilt.
d/python-setuptools-57.5.0-i586-2.txz: Rebuilt.
d/python3-3.9.7-i586-2.txz: Rebuilt.
       Back to Python 3.9, which seems to be the best version to use at this time.
d/rust-1.56.1-i686-1.txz: Upgraded.
d/scons-4.2.0-i586-2.txz: Rebuilt.
d/vala-0.54.3-i586-1.txz: Upgraded.
k/kernel-source-5.15.0_smp-noarch-1.txz: Upgraded.
       We'll be using 5.15.x in the 15.0 release, and it's working well here, so
       let's just start it right out in the main tree rather than in /testing.
       The primary differences with the previous (5.14.15) kernel:
       The default preemption mode is changed to "voluntary".
       Added CONFIG_CEC_GPIO=m (thanks to LuckyCyborg).
kde/calligra-3.2.1-i586-14.txz: Rebuilt.
kde/cantor-21.08.2-i586-2.txz: Rebuilt.
kde/kapidox-5.87.0-i586-2.txz: Rebuilt.
kde/kauth-5.87.0-i586-2.txz: Rebuilt.
kde/kcodecs-5.87.0-i586-2.txz: Rebuilt.
kde/kcompletion-5.87.0-i586-2.txz: Rebuilt.
kde/kconfig-5.87.0-i586-2.txz: Rebuilt.
kde/kconfigwidgets-5.87.0-i586-2.txz: Rebuilt.
kde/kcoreaddons-5.87.0-i586-2.txz: Rebuilt.
kde/kdbusaddons-5.87.0-i586-2.txz: Rebuilt.
kde/kfilemetadata-5.87.0-i586-2.txz: Rebuilt.
kde/kguiaddons-5.87.0-i586-2.txz: Rebuilt.
kde/ki18n-5.87.0-i586-2.txz: Rebuilt.
kde/kig-21.08.2-i586-3.txz: Rebuilt.
kde/kile-2.9.93-i586-14.txz: Rebuilt.
kde/kitemmodels-5.87.0-i586-2.txz: Rebuilt.
kde/kitemviews-5.87.0-i586-2.txz: Rebuilt.
kde/kitinerary-21.08.2-i586-2.txz: Rebuilt.
kde/kjobwidgets-5.87.0-i586-2.txz: Rebuilt.
kde/kmymoney-5.1.2-i586-4.txz: Rebuilt.
kde/krita-4.4.8-i586-6.txz: Rebuilt.
kde/kwidgetsaddons-5.87.0-i586-2.txz: Rebuilt.
kde/okular-21.08.2-i586-2.txz: Rebuilt.
l/M2Crypto-0.38.0-i586-3.txz: Rebuilt.
l/Mako-1.1.4-i586-5.txz: Rebuilt.
l/PyQt5-5.15.2-i586-5.txz: Rebuilt.
l/QScintilla-2.11.6-i586-5.txz: Rebuilt.
l/boost-1.77.0-i586-3.txz: Rebuilt.
l/brotli-1.0.9-i586-7.txz: Rebuilt.
l/cfitsio-4.0.0-i586-1.txz: Upgraded.
l/dbus-python-1.2.18-i586-3.txz: Rebuilt.
l/gexiv2-0.14.0-i586-3.txz: Rebuilt.
l/glade-3.38.2-i586-5.txz: Rebuilt.
l/gobject-introspection-1.70.0-i586-3.txz: Rebuilt.
l/gtk4-4.4.1-i586-1.txz: Upgraded.
l/lensfun-0.3.95-i586-5.txz: Rebuilt.
l/libcaca-0.99.beta19-i586-11.txz: Rebuilt.
l/libcap-ng-0.8.2-i586-5.txz: Rebuilt.
l/libimobiledevice-20200615_4791a82-i586-6.txz: Rebuilt.
l/libproxy-0.4.17-i586-5.txz: Rebuilt.
l/libwebp-1.2.1-i586-3.txz: Rebuilt.
l/libxml2-2.9.12-i586-3.txz: Rebuilt.
l/netpbm-10.96.02-i586-1.txz: Upgraded.
l/newt-0.52.21-i586-7.txz: Rebuilt.
l/openexr-2.5.7-i586-4.txz: Rebuilt.
l/poppler-21.11.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/pycairo-1.20.1-i586-3.txz: Rebuilt.
l/pycups-2.0.1-i586-6.txz: Rebuilt.
l/pycurl-7.44.1-i586-3.txz: Rebuilt.
l/pygobject3-3.42.0-i586-3.txz: Rebuilt.
l/pyparsing-2.4.7-i586-6.txz: Rebuilt.
l/python-appdirs-1.4.4-i586-6.txz: Rebuilt.
l/python-certifi-2021.10.8-i586-2.txz: Rebuilt.
l/python-cffi-1.15.0-i586-2.txz: Rebuilt.
l/python-chardet-4.0.0-i586-5.txz: Rebuilt.
l/python-charset-normalizer-2.0.7-i586-2.txz: Rebuilt.
l/python-distro-1.6.0-i586-2.txz: Rebuilt.
l/python-dnspython-2.1.0-i586-3.txz: Rebuilt.
l/python-docutils-0.18-i586-2.txz: Rebuilt.
l/python-future-0.18.2-i586-7.txz: Rebuilt.
l/python-idna-3.3-i586-2.txz: Rebuilt.
l/python-markdown-3.3.4-i586-3.txz: Rebuilt.
l/python-notify2-0.3.1-i586-10.txz: Rebuilt.
l/python-packaging-21.2-i586-2.txz: Rebuilt.
l/python-pillow-8.4.0-i586-2.txz: Rebuilt.
l/python-ply-3.11-i586-8.txz: Rebuilt.
l/python-pycparser-2.20-i586-3.txz: Rebuilt.
l/python-pygments-2.10.0-i586-3.txz: Rebuilt.
l/python-pysol_cards-0.12.0-i586-2.txz: Rebuilt.
l/python-random2-1.0.1-i586-5.txz: Rebuilt.
l/python-requests-2.26.0-i586-3.txz: Rebuilt.
l/python-sane-2.9.1-i586-5.txz: Rebuilt.
l/python-six-1.16.0-i586-3.txz: Rebuilt.
l/python-urllib3-1.26.7-i586-3.txz: Rebuilt.
l/sip-4.19.25-i586-5.txz: Rebuilt.
l/speech-dispatcher-0.10.2-i586-5.txz: Rebuilt.
l/system-config-printer-1.5.15-i586-5.txz: Rebuilt.
l/talloc-2.3.3-i586-3.txz: Rebuilt.
l/tdb-1.4.5-i586-3.txz: Rebuilt.
l/tevent-0.11.0-i586-3.txz: Rebuilt.
n/bind-9.16.22-i586-2.txz: Rebuilt.
n/epic5-2.1.6-i586-3.txz: Rebuilt.
n/fetchmail-6.4.23-i586-2.txz: Rebuilt.
n/getmail-6.18.5-i586-2.txz: Rebuilt.
n/gpgme-1.16.0-i586-3.txz: Rebuilt.
n/iproute2-5.15.0-i586-1.txz: Upgraded.
n/net-snmp-5.9.1-i586-3.txz: Rebuilt.
n/nftables-1.0.0-i586-4.txz: Rebuilt.
n/nss-pam-ldapd-0.9.11-i586-5.txz: Rebuilt.
n/obexftp-0.24.2-i586-10.txz: Rebuilt.
n/pssh-2.3.4-i586-6.txz: Rebuilt.
n/samba-4.15.1-i586-2.txz: Rebuilt.
n/socat-1.7.4.2-i586-1.txz: Upgraded.
x/ibus-1.5.25-i586-3.txz: Rebuilt.
x/ibus-anthy-1.5.13-i586-3.txz: Rebuilt.
x/ibus-hangul-1.5.4-i586-5.txz: Rebuilt.
x/ibus-libpinyin-1.12.1-i586-3.txz: Rebuilt.
x/ibus-table-1.14.1-i586-3.txz: Rebuilt.
x/pyxdg-0.27-i586-6.txz: Rebuilt.
x/xcb-proto-1.14.1-i586-6.txz: Rebuilt.
xap/blueman-2.2.3-i586-2.txz: Rebuilt.
xap/hexchat-2.16.0-i586-3.txz: Rebuilt.
xap/mozilla-firefox-91.3.0esr-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.3.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-49/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38505
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38510
       (* Security fix *)
xap/mozilla-thunderbird-91.3.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.3.0/releasenotes/
       (* Security fix *)
xap/vim-gvim-8.2.3570-i586-1.txz: Upgraded.
extra/brltty/brltty-6.4-i586-3.txz: Rebuilt.
extra/linux-5.15.0-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Oct 31 19:59:15 UTC 2021
d/meson-0.59.3-i586-1.txz: Upgraded.
       Reverted to a version that works better for us. Thanks to nobodino.
l/imagemagick-7.1.0_13-i586-1.txz: Upgraded.
l/pcre2-10.39-i586-1.txz: Upgraded.
l/sip-4.19.25-i586-4.txz: Rebuilt.
       Fixed missing sip.h.
n/getmail-6.18.5-i586-1.txz: Upgraded.
+--------------------------+
Fri Oct 29 17:19:45 UTC 2021
a/gawk-5.1.1-i586-1.txz: Upgraded.
l/python-packaging-21.2-i586-1.txz: Upgraded.
n/pam-krb5-4.11-i586-1.txz: Upgraded.
x/mesa-21.2.5-i586-1.txz: Upgraded.
xap/blueman-2.2.3-i586-1.txz: Upgraded.
xap/freerdp-2.4.1-i586-2.txz: Rebuilt.
       Rebuilt without -DWITH_SANITIZE_ADDRESS=ON. Thanks to ctrlaltca.
+--------------------------+
Thu Oct 28 20:27:04 UTC 2021
a/kernel-firmware-20211028_b21eb26-noarch-1.txz: Upgraded.
l/glib2-2.70.1-i586-1.txz: Upgraded.
l/mozilla-nss-3.72-i586-1.txz: Upgraded.
l/python-distro-1.6.0-i586-1.txz: Upgraded.
l/v4l-utils-1.22.1-i586-1.txz: Upgraded.
n/dovecot-2.3.17-i586-1.txz: Upgraded.
+--------------------------+
Thu Oct 28 01:11:07 UTC 2021
a/kernel-generic-5.14.15-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.15_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.15-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.15_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.15-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.15_smp-i686-1.txz: Upgraded.
d/cmake-3.21.4-i586-1.txz: Upgraded.
d/kernel-headers-5.14.15_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.15_smp-noarch-1.txz: Upgraded.
       We're going to go ahead and take both of those changes that were considered
       in /testing. GazL almost had me talked out of the autogroup change, but it's
       easy to disable if traditional "nice" behavior is important to someone.
       -DRM_I810 n
       -INLINE_READ_UNLOCK y
       -INLINE_READ_UNLOCK_IRQ y
       -INLINE_SPIN_UNLOCK_IRQ y
       -INLINE_WRITE_UNLOCK y
       -INLINE_WRITE_UNLOCK_IRQ y
       PREEMPT n -> y
       PREEMPT_VOLUNTARY y -> n
       SCHED_AUTOGROUP n -> y
       +CEC_GPIO n
       +DEBUG_PREEMPT y
       +PREEMPTION y
       +PREEMPT_COUNT y
       +PREEMPT_DYNAMIC y
       +PREEMPT_RCU y
       +PREEMPT_TRACER n
       +RCU_BOOST n
       +TASKS_RCU y
       +UNINLINE_SPIN_UNLOCK y
kde/plasma-desktop-5.23.2.1-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_12-i586-1.txz: Upgraded.
l/librsvg-2.52.3-i586-1.txz: Upgraded.
n/bind-9.16.22-i586-1.txz: Upgraded.
       This update fixes bugs and the following security issue:
       The "lame-ttl" option is now forcibly set to 0. This effectively disables
       the lame server cache, as it could previously be abused by an attacker to
       significantly degrade resolver performance.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
       (* Security fix *)
n/c-ares-1.18.1-i586-1.txz: Upgraded.
n/samba-4.15.1-i586-1.txz: Upgraded.
extra/linux-5.14.15-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Oct 26 22:01:32 UTC 2021
a/aaa_libraries-15.0-i586-11.txz: Rebuilt.
       Upgraded: libcap.so.2.60, libncurses.so.6.3, libncursesw.so.6.3,
       libtinfo.so.6.3, libcares.so.2.5.0, libform.so.6.3, libformw.so.6.3,
       libmenu.so.6.3, libmenuw.so.6.3, libpanel.so.6.3, libpanelw.so.6.3.
       Added: libvpx.so.6.4.0.
a/kernel-firmware-20211025_fc14618-noarch-1.txz: Upgraded.
d/mercurial-5.9.3-i586-1.txz: Upgraded.
kde/bluedevil-5.23.2-i586-1.txz: Upgraded.
kde/breeze-5.23.2-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.2-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.2-i586-1.txz: Upgraded.
kde/drkonqi-5.23.2-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.2-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.2-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.2-i586-1.txz: Upgraded.
kde/kdecoration-5.23.2-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.2-i586-1.txz: Upgraded.
kde/kgamma5-5.23.2-i586-1.txz: Upgraded.
kde/khotkeys-5.23.2-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.2-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.2-i586-1.txz: Upgraded.
kde/kscreen-5.23.2-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.2-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.2-i586-1.txz: Upgraded.
kde/ksystemstats-5.23.2-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.2-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.2-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.2-i586-1.txz: Upgraded.
kde/kwin-5.23.2-i586-1.txz: Upgraded.
kde/kwrited-5.23.2-i586-1.txz: Upgraded.
kde/latte-dock-0.10.3-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.2-i586-1.txz: Upgraded.
kde/libkscreen-5.23.2-i586-1.txz: Upgraded.
kde/libksysguard-5.23.2-i586-1.txz: Upgraded.
kde/milou-5.23.2-i586-1.txz: Upgraded.
kde/oxygen-5.23.2-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.2-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.2-i586-1.txz: Upgraded.
kde/plasma-disks-5.23.2-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.2-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.2-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.2-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.2-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.2-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.2-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.2-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.2-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.2-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.2-i586-1.txz: Upgraded.
kde/powerdevil-5.23.2-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.2-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.2-i586-1.txz: Upgraded.
kde/systemsettings-5.23.2-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.2-i586-1.txz: Upgraded.
l/ffmpeg-4.4.1-i586-2.txz: Rebuilt.
       Recompiled against libvpx-1.11.0.
l/gst-plugins-good-1.18.5-i586-2.txz: Rebuilt.
       Recompiled against libvpx-1.11.0.
l/libvpx-1.11.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-docutils-0.18-i586-1.txz: Upgraded.
l/qt5-5.15.3_20211024_2aa0de43-i586-1.txz: Upgraded.
       Upgraded to latest git (might as well) and compiled against libvpx-1.11.0.
n/c-ares-1.18.0-i586-1.txz: Upgraded.
xap/xine-lib-1.2.11-i586-7.txz: Rebuilt.
       Recompiled against libvpx-1.11.0.
+--------------------------+
Mon Oct 25 19:30:42 UTC 2021
ap/slackpkg-15.0.8-noarch-1.txz: Upgraded.
       Author: piterpunk <piterpunk@slackware.com>
       To make it easier to do an unattended slackpkg update/upgrade process,
       this commit provides different exit codes for many situations:
       0 Successful slackpkg execution.
       1 Something wrong happened.
       20 No package found to be downloaded, installed, reinstalled,
       upgraded, or removed.
       50 Slackpkg itself was upgraded and you need to re-run it.
       100 There are pending updates.
       Code and the main manpage are updated accordingly.
       In addition, this commit also:
       - removes the ChangeLog.txt in doinst.sh, so the needed
       'slackpkg update' after Slackpkg upgrade won't say it's all OK
       and doesn't need to redo the package lists
       - removes AUTHORS from manpage. Nowadays there is code from many
       people in Slackpkg and it seems a bit unfair to have only my and
       Evaldo's name listed there.
       Signed-off-by: Robby Workman <rworkman@slackware.com>
d/meson-0.60.0-i586-1.txz: Upgraded.
l/ffmpeg-4.4.1-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_11-i586-1.txz: Upgraded.
l/libcap-2.60-i586-1.txz: Upgraded.
l/libsoup-2.74.1-i586-1.txz: Upgraded.
l/sip-4.19.25-i586-3.txz: Rebuilt.
       Drop the Qt4 modules. Thanks to gmgf.
n/dhcpcd-9.4.1-i586-1.txz: Upgraded.
testing/packages/linux-5.14.x/kernel-generic-5.14.14-i586-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-generic-smp-5.14.14_smp-i686-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14_smp-x86-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-i586-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-smp-5.14.14_smp-i686-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-i586-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-smp-5.14.14_smp-i686-3.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14_smp-noarch-3.txz: Rebuilt.
       Let's enable SCHED_AUTOGROUP, which should improve desktop latency under a
       heavy CPU load while being mostly inert on servers. It may be disabled at
       boot time with a "noautogroup" kernel parameter, or at runtime like this:
       echo 0 > /proc/sys/kernel/sched_autogroup_enabled
       Thanks to gbschenkel.
       SCHED_AUTOGROUP n -> y
+--------------------------+
Sat Oct 23 18:57:30 UTC 2021
a/aaa_terminfo-6.3-i586-1.txz: Upgraded.
a/glibc-zoneinfo-2021e-noarch-1.txz: Upgraded.
ap/itstool-2.0.7-i586-2.txz: Rebuilt.
       Rebuilt with PYTHON=/usr/bin/python3. Thanks to USUARIONUEVO.
ap/mpg123-1.29.2-i586-1.txz: Upgraded.
d/meson-0.59.3-i586-1.txz: Upgraded.
d/parallel-20211022-noarch-1.txz: Upgraded.
d/python-pip-21.3.1-i586-1.txz: Upgraded.
d/python-setuptools-58.3.0-i586-1.txz: Upgraded.
l/exiv2-0.27.5-i586-1.txz: Upgraded.
l/ncurses-6.3-i586-1.txz: Upgraded.
n/php-7.4.25-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
       (* Security fix *)
xap/mozilla-thunderbird-91.2.1-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.2.1/releasenotes/
testing/packages/linux-5.14.x/kernel-generic-5.14.14-i586-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-generic-smp-5.14.14_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-headers-5.14.14_smp-x86-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-5.14.14-i586-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-huge-smp-5.14.14_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-5.14.14-i586-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-modules-smp-5.14.14_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.14.x/kernel-source-5.14.14_smp-noarch-2.txz: Rebuilt.
       These kernels enable CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y allowing
       the kernel preemption model to be specified on the kernel command line
       with one of these options: preempt=none, preempt=voluntary, and preempt=full.
       Since there is no .config option to set a default, and the default in the
       kernel sources is "full" (which is probably not a good default), the
       kernel-source.SlackBuild has been modified to add support for an environment
       variable CONFIG_PREEMPT_DEFAULT_MODE which can be set to none, voluntary, or
       full to set the default kernel preemption model when a command line option
       is not provided. These kernels have been built with a preemption model of
       "none" (presumably the safest choice which will behave like the kernels we
       have shipped before.) The runtime overhead on 64-bit should be negligible.
       On 32-bit we lack support for HAVE_STATIC_CALL_INLINE, so spinlocks and
       mutexes will have to be approached through a trampoline, adding a very small
       amount of overhead. I feel this is probably worth it in order to have the
       option to run a kernel with voluntary or full preemption, especially for
       gaming or desktop purposes. The reduction in input lag with these modes is
       actually quite noticable.
       To check the current preemption model, you may use debugfs:
       mount -t debugfs none /sys/kernel/debug
       cat /sys/kernel/debug/sched/preempt
       (none) voluntary full
       You may change to a different preemption model on the fly once debugfs is
       mounted:
       echo voluntary > /sys/kernel/debug/sched/preempt
       cat /sys/kernel/debug/sched/preempt
       none (voluntary) full
       Thanks to Daedra.
       -DRM_I810 n
       -INLINE_READ_UNLOCK y
       -INLINE_READ_UNLOCK_IRQ y
       -INLINE_SPIN_UNLOCK_IRQ y
       -INLINE_WRITE_UNLOCK y
       -INLINE_WRITE_UNLOCK_IRQ y
       PREEMPT n -> y
       PREEMPT_VOLUNTARY y -> n
       +CEC_GPIO n
       +DEBUG_PREEMPT y
       +PREEMPTION y
       +PREEMPT_COUNT y
       +PREEMPT_DYNAMIC y
       +PREEMPT_RCU y
       +PREEMPT_TRACER n
       +RCU_BOOST n
       +TASKS_RCU y
       +UNINLINE_SPIN_UNLOCK y
+--------------------------+
Thu Oct 21 19:36:32 UTC 2021
a/lvm2-2.03.13-i586-1.txz: Upgraded.
       Reverted to working version.
d/rust-1.56.0-i686-1.txz: Upgraded.
l/pipewire-0.3.39-i586-1.txz: Upgraded.
n/krb5-1.19.2-i586-2.txz: Rebuilt.
       [PATCH] Fix KDC null deref on TGS inner body null server.
       This fixes an issue where an authenticated attacker can cause a denial of
       service in the KDC by sending a FAST TGS request with no server field.
       Thanks to nobodino.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
       (* Security fix *)
x/ibus-m17n-1.4.8-i586-1.txz: Upgraded.
x/libinput-1.19.2-i586-1.txz: Upgraded.
xap/freerdp-2.4.1-i586-1.txz: Upgraded.
       This update fixes two security issues:
       Improper client input validation for gateway connections allows to overwrite
       memory.
       Improper region checks in all clients allow out of bound write to memory.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160
       (* Security fix *)
xap/gftp-2.7.1b-i586-1.txz: Upgraded.
extra/php8/php8-8.0.12-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
       (* Security fix *)
+--------------------------+
Wed Oct 20 19:29:55 UTC 2021
a/kernel-generic-5.14.14-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.14_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.14-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.14_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.14-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.14_smp-i686-1.txz: Upgraded.
a/lvm2-2.03.14-i586-1.txz: Upgraded.
d/kernel-headers-5.14.14_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.14_smp-noarch-1.txz: Upgraded.
n/autofs-5.1.8-i586-1.txz: Upgraded.
extra/linux-5.14.14-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Oct 19 18:10:12 UTC 2021
kde/alkimia-8.1.0-i586-3.txz: Rebuilt.
       Fixed data install location /usr/plasma -> /usr/share/plasma.
       Thanks to oneforall.
kde/bluedevil-5.23.1-i586-1.txz: Upgraded.
kde/breeze-5.23.1-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.1-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.1-i586-1.txz: Upgraded.
kde/drkonqi-5.23.1-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.1-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.1-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.1-i586-1.txz: Upgraded.
kde/kdecoration-5.23.1-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.1-i586-1.txz: Upgraded.
kde/kgamma5-5.23.1-i586-1.txz: Upgraded.
kde/khotkeys-5.23.1-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.1-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.1-i586-1.txz: Upgraded.
kde/kscreen-5.23.1-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.1-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.1-i586-1.txz: Upgraded.
kde/ksystemstats-5.23.1-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.1-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.1-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.1-i586-1.txz: Upgraded.
kde/kwin-5.23.1-i586-1.txz: Upgraded.
kde/kwrited-5.23.1-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.1-i586-1.txz: Upgraded.
kde/libkscreen-5.23.1-i586-1.txz: Upgraded.
kde/libksysguard-5.23.1-i586-1.txz: Upgraded.
kde/milou-5.23.1-i586-1.txz: Upgraded.
kde/oxygen-5.23.1-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.1-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.1-i586-1.txz: Upgraded.
       Applied upstream patch:
       [PATCH] Desktop as folder: restore functionality of the "delete" action.
       Thanks to ctrlaltca.
kde/plasma-disks-5.23.1-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.1-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.1-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.1-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.1-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.1-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.1-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.1-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.1-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.1-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.1-i586-1.txz: Upgraded.
kde/powerdevil-5.23.1-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.1-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.1-i586-1.txz: Upgraded.
kde/systemsettings-5.23.1-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.1-i586-1.txz: Upgraded.
l/gdbm-1.22-i586-1.txz: Upgraded.
n/nghttp2-1.46.0-i586-1.txz: Upgraded.
x/ttf-tlwg-0.7.3-noarch-1.txz: Upgraded.
+--------------------------+
Tue Oct 19 01:10:06 UTC 2021
a/file-5.41-i586-1.txz: Upgraded.
ap/vim-8.2.3536-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.0-i586-4.txz: Rebuilt.
       Fixed applying the previous patch. Thanks to LuckyCyborg.
xap/vim-gvim-8.2.3536-i586-1.txz: Upgraded.
+--------------------------+
Mon Oct 18 18:40:47 UTC 2021
a/kernel-firmware-20211018_d34196f-noarch-1.txz: Upgraded.
ap/hplip-3.20.5-i586-5.txz: Rebuilt.
       Applied patch to fix hp-scan when using Python 3.10. Thanks to kingbeowulf.
ap/mpg123-1.29.1-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.0-i586-3.txz: Rebuilt.
       [PATCH] Revert "No icons on the desktop by default". Thanks to LuckyCyborg.
+--------------------------+
Sun Oct 17 18:52:33 UTC 2021
a/glibc-zoneinfo-2021d-noarch-1.txz: Upgraded.
a/kernel-generic-5.14.13-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.13_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.13-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.13_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.13-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.13_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.14.13_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.13_smp-noarch-1.txz: Upgraded.
extra/linux-5.14.13-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Oct 16 18:12:37 UTC 2021
ap/pamixer-1.5-i586-1.txz: Upgraded.
l/librsvg-2.52.2-i586-1.txz: Upgraded.
l/liburing-2.1-i586-2.txz: Rebuilt.
       Don't package the examples.
l/spirv-llvm-translator-13.0.0-i586-1.txz: Upgraded.
+--------------------------+
Fri Oct 15 20:47:13 UTC 2021
ap/htop-3.1.1-i586-1.txz: Upgraded.
d/automake-1.16.2-noarch-4.txz: Rebuilt.
       The GNU toolchain is making it increasingly impossible to use our usual
       "${ARCH}-slackware-linux" host, erroring out with a host mismatch on at
       least GTK+2. So, we'll drop back to this version of automake for now,
       with a fix applied for detecting Python 3.10. More than likely we'll be
       changing the host to "${ARCH}-slackware-linux-gnu" to satisfy upstream,
       but that will have to wait for the next devel cycle.
d/llvm-13.0.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
d/rust-1.55.0-i686-2.txz: Rebuilt.
       Recompiled against llvm-13.0.0.
kde/kdevelop-5.6.2-i586-6.txz: Rebuilt.
       Recompiled against llvm-13.0.0.
kde/plasma-workspace-5.23.0-i586-2.txz: Rebuilt.
       Applied upstream patch:
       [PATCH] sddm-theme: fix missing password field on "Other" page.
       Thanks to USUARIONUEVO and LuckyCyborg.
l/libclc-13.0.0-i586-1.txz: Upgraded.
       Recompiled against llvm-13.0.0.
l/python-pillow-8.4.0-i586-1.txz: Upgraded.
l/qt5-5.15.3_20211013_5c7c3af5-i586-1.txz: Upgraded.
       Upgraded to latest git (might as well) and compiled against llvm-13.0.0.
l/spirv-llvm-translator-20210920_098034ea-i586-1.txz: Upgraded.
       Recompiled against llvm-13.0.0.
x/mesa-21.2.4-i586-1.txz: Upgraded.
       Compiled against llvm-13.0.0.
xap/pidgin-2.14.8-i586-1.txz: Upgraded.
+--------------------------+
Thu Oct 14 19:39:32 UTC 2021
Huge thanks and congratulations to the KDE Community on the release of the
Plasma 25th Anniversary Edition!
kde/bluedevil-5.23.0-i586-1.txz: Upgraded.
kde/breeze-5.23.0-i586-1.txz: Upgraded.
kde/breeze-grub-5.23.0-i586-1.txz: Upgraded.
kde/breeze-gtk-5.23.0-i586-1.txz: Upgraded.
kde/drkonqi-5.23.0-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.23.0-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.23.0-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.23.0-i586-1.txz: Upgraded.
kde/kdecoration-5.23.0-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.23.0-i586-1.txz: Upgraded.
kde/kgamma5-5.23.0-i586-1.txz: Upgraded.
kde/khotkeys-5.23.0-i586-1.txz: Upgraded.
kde/kinfocenter-5.23.0-i586-1.txz: Upgraded.
kde/kmenuedit-5.23.0-i586-1.txz: Upgraded.
kde/kscreen-5.23.0-i586-1.txz: Upgraded.
kde/kscreenlocker-5.23.0-i586-1.txz: Upgraded.
kde/ksshaskpass-5.23.0-i586-1.txz: Upgraded.
kde/ksysguard-5.22.0-i586-2.txz: Removed.
kde/ksystemstats-5.23.0-i586-1.txz: Upgraded.
kde/kwallet-pam-5.23.0-i586-1.txz: Upgraded.
kde/kwayland-integration-5.23.0-i586-1.txz: Upgraded.
kde/kwayland-server-5.23.0-i586-1.txz: Upgraded.
kde/kwin-5.23.0-i586-1.txz: Upgraded.
kde/kwrited-5.23.0-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.23.0-i586-1.txz: Upgraded.
kde/libkscreen-5.23.0-i586-1.txz: Upgraded.
kde/libksysguard-5.23.0-i586-1.txz: Upgraded.
kde/milou-5.23.0-i586-1.txz: Upgraded.
kde/oxygen-5.23.0-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.23.0-i586-1.txz: Upgraded.
kde/plasma-desktop-5.23.0-i586-1.txz: Upgraded.
kde/plasma-disks-5.23.0-i586-1.txz: Upgraded.
kde/plasma-firewall-5.23.0-i586-1.txz: Upgraded.
kde/plasma-integration-5.23.0-i586-1.txz: Upgraded.
kde/plasma-nm-5.23.0-i586-1.txz: Upgraded.
kde/plasma-pa-5.23.0-i586-1.txz: Upgraded.
kde/plasma-sdk-5.23.0-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.23.0-i586-1.txz: Upgraded.
kde/plasma-vault-5.23.0-i586-1.txz: Upgraded.
kde/plasma-workspace-5.23.0-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.23.0-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.23.0-i586-1.txz: Upgraded.
kde/powerdevil-5.23.0-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.23.0-i586-1.txz: Upgraded.
kde/sddm-kcm-5.23.0-i586-1.txz: Upgraded.
kde/systemsettings-5.23.0-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.23.0-i586-1.txz: Upgraded.
n/bluez-5.62-i586-1.txz: Upgraded.
xfce/xfce4-whiskermenu-plugin-2.6.1-i586-1.txz: Upgraded.
+--------------------------+
Wed Oct 13 20:16:22 UTC 2021
a/kernel-generic-5.14.12-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.12_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.12-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.12_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.12-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.12_smp-i686-1.txz: Upgraded.
d/git-2.33.1-i586-1.txz: Upgraded.
d/kernel-headers-5.14.12_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.12_smp-noarch-1.txz: Upgraded.
kde/kig-21.08.2-i586-2.txz: Rebuilt.
       Recompiled against libboost_python310.so.1.77.0.
l/freecell-solver-6.6.0-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_10-i586-1.txz: Upgraded.
l/libqalculate-3.21.0-i586-1.txz: Upgraded.
l/python-cffi-1.15.0-i586-1.txz: Upgraded.
l/python-idna-3.3-i586-1.txz: Upgraded.
l/python-pysol_cards-0.12.0-i586-1.txz: Upgraded.
xap/xscreensaver-6.02-i586-1.txz: Upgraded.
extra/linux-5.14.12-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Oct 12 19:22:20 UTC 2021
a/kernel-firmware-20211012_b563148-noarch-1.txz: Upgraded.
a/mkinitrd-1.4.11-i586-26.txz: Rebuilt.
       Don't include 40-usb_modeswitch.rules on the initrd. Thanks to LuckyCyborg.
d/scons-4.2.0-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.7-i586-1.txz: Upgraded.
xfce/mousepad-0.5.7-i586-2.txz: Rebuilt.
       Added plugins directory. Thanks to Roman Dyaba.
+--------------------------+
Mon Oct 11 23:45:10 UTC 2021
d/python-pip-21.3-i586-1.txz: Upgraded.
l/aspell-en-2020.12.07_0-i586-1.txz: Upgraded.
l/boost-1.77.0-i586-2.txz: Rebuilt.
       Recompiled against python-3.10. Thanks to nobodino and ctrlaltca.
l/qt5-5.15.3_20211006_0243418f-i586-1.txz: Upgraded.
       Updated from the repo to get a few Wayland related fixes.
n/gnutls-3.7.2-i586-1.txz: Upgraded.
+--------------------------+
Sun Oct 10 22:20:01 UTC 2021
a/aaa_terminfo-6.2_20211009-i586-1.txz: Upgraded.
a/btrfs-progs-5.14.2-i586-1.txz: Upgraded.
ap/sc-im-20210927_64b1a41-i586-1.txz: Upgraded.
ap/undervolt-20210815_e39aea1-i586-1.txz: Upgraded.
d/gyp-20210831_d6c5dd51-i586-1.txz: Upgraded.
       Patched for Python 3.10. Thanks to nobodino.
kde/attica-5.87.0-i586-1.txz: Upgraded.
kde/baloo-5.87.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.87.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.87.0-noarch-1.txz: Upgraded.
kde/digikam-7.3.0-i586-3.txz: Rebuilt.
       Recompiled against opencv-4.5.4.
kde/extra-cmake-modules-5.87.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.87.0-i586-1.txz: Upgraded.
kde/kactivities-5.87.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.87.0-i586-1.txz: Upgraded.
kde/kapidox-5.87.0-i586-1.txz: Upgraded.
kde/karchive-5.87.0-i586-1.txz: Upgraded.
kde/kauth-5.87.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.87.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.87.0-i586-1.txz: Upgraded.
kde/kcmutils-5.87.0-i586-1.txz: Upgraded.
kde/kcodecs-5.87.0-i586-1.txz: Upgraded.
kde/kcompletion-5.87.0-i586-1.txz: Upgraded.
kde/kconfig-5.87.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.87.0-i586-1.txz: Upgraded.
kde/kcontacts-5.87.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.87.0-i586-1.txz: Upgraded.
kde/kcrash-5.87.0-i586-1.txz: Upgraded.
kde/kdav-5.87.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.87.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.87.0-i586-1.txz: Upgraded.
kde/kded-5.87.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.87.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.87.0-i586-1.txz: Upgraded.
kde/kdesu-5.87.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.87.0-i586-1.txz: Upgraded.
kde/kdnssd-5.87.0-i586-1.txz: Upgraded.
kde/kdoctools-5.87.0-i586-1.txz: Upgraded.
kde/kemoticons-5.87.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.87.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.87.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.87.0-i586-1.txz: Upgraded.
kde/kholidays-5.87.0-i586-1.txz: Upgraded.
kde/khtml-5.87.0-i586-1.txz: Upgraded.
kde/ki18n-5.87.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.87.0-i586-1.txz: Upgraded.
kde/kidletime-5.87.0-i586-1.txz: Upgraded.
kde/kimageformats-5.87.0-i586-1.txz: Upgraded.
kde/kinit-5.87.0-i586-1.txz: Upgraded.
kde/kio-5.87.0-i586-1.txz: Upgraded.
kde/kirigami2-5.87.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.87.0-i586-1.txz: Upgraded.
kde/kitemviews-5.87.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.87.0-i586-1.txz: Upgraded.
kde/kjots-20211003_4109f07-i586-1.txz: Upgraded.
kde/kjs-5.87.0-i586-1.txz: Upgraded.
kde/kjsembed-5.87.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.87.0-i586-1.txz: Upgraded.
kde/knewstuff-5.87.0-i586-1.txz: Upgraded.
kde/knotifications-5.87.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.87.0-i586-1.txz: Upgraded.
kde/kpackage-5.87.0-i586-1.txz: Upgraded.
kde/kparts-5.87.0-i586-1.txz: Upgraded.
kde/kpeople-5.87.0-i586-1.txz: Upgraded.
kde/kplotting-5.87.0-i586-1.txz: Upgraded.
kde/kpty-5.87.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.87.0-i586-1.txz: Upgraded.
kde/kross-5.87.0-i586-1.txz: Upgraded.
kde/krunner-5.87.0-i586-1.txz: Upgraded.
kde/kservice-5.87.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.87.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.87.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.87.0-i586-1.txz: Upgraded.
kde/kwallet-5.87.0-i586-1.txz: Upgraded.
kde/kwayland-5.87.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.87.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.87.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.87.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.87.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.87.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.87.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.87.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.87.0-i586-1.txz: Upgraded.
kde/prison-5.87.0-i586-1.txz: Upgraded.
kde/purpose-5.87.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.87.0-i586-1.txz: Upgraded.
kde/solid-5.87.0-i586-1.txz: Upgraded.
kde/sonnet-5.87.0-i586-1.txz: Upgraded.
kde/syndication-5.87.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.87.0-i586-1.txz: Upgraded.
kde/threadweaver-5.87.0-i586-1.txz: Upgraded.
kde/wacomtablet-20210906_d1e216a-i586-1.txz: Upgraded.
l/QtAV-20210414_305e5404-i586-1.txz: Upgraded.
l/ffmpeg-4.4-i586-2.txz: Rebuilt.
       Recompiled against vid.stab-20201110_f9166e9.
l/gst-plugins-bad-free-1.18.5-i586-2.txz: Rebuilt.
       Recompiled against opencv-4.5.4.
l/libical-3.0.11-i586-1.txz: Upgraded.
l/mlt-7.0.1-i586-3.txz: Rebuilt.
       Recompiled against vid.stab-20201110_f9166e9.
l/ncurses-6.2_20211009-i586-1.txz: Upgraded.
l/opencv-4.5.4-i586-1.txz: Upgraded.
       Changed ABI.
l/python-certifi-2021.10.8-i586-1.txz: Upgraded.
l/vid.stab-20201110_f9166e9-i586-1.txz: Upgraded.
       Shared library .so-version bump.
n/wget2-2.0.0-i586-2.txz: Rebuilt.
       Rebuilt using --with-openssl. Thanks to walecha and marav.
t/texlive-2021.210418-i586-2.txz: Rebuilt.
       Removed broken texdoctk symlink. Thanks to marav, drumz, and franzen.
+--------------------------+
Sun Oct 10 00:11:13 UTC 2021
A new Python (and related rebuilds), the latest release of the KDE Gear
applications, and a new kernel. Enjoy! :-)
a/aaa_libraries-15.0-i586-10.txz: Rebuilt.
       Upgraded: libcap.so.2.59, libglib-2.0.so.0.7000.0,
       libgmodule-2.0.so.0.7000.0, libgobject-2.0.so.0.7000.0,
       libgthread-2.0.so.0.7000.0, libpcre2-8.so.0.10.3.
       Removed: libboost*.so.1.76.0, libicu*.so.68.2
a/kernel-generic-5.14.11-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.11_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.11-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.11_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.11-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.11_smp-i686-1.txz: Upgraded.
a/libblockdev-2.26-i586-2.txz: Rebuilt.
a/libbytesize-2.6-i586-2.txz: Rebuilt.
a/libpwquality-1.4.4-i586-5.txz: Rebuilt.
a/util-linux-2.37.2-i586-5.txz: Rebuilt.
a/volume_key-0.3.12-i586-4.txz: Rebuilt.
ap/hplip-3.20.5-i586-4.txz: Rebuilt.
ap/linuxdoc-tools-0.9.82-i586-2.txz: Rebuilt.
ap/rpm-4.16.1.3-i586-2.txz: Rebuilt.
ap/undervolt-20201024_13fa33d-i586-4.txz: Rebuilt.
ap/vim-8.2.3487-i586-1.txz: Upgraded.
d/Cython-0.29.24-i586-2.txz: Rebuilt.
d/automake-1.16.5-noarch-1.txz: Upgraded.
       Needed to properly detect python-3.10. If you see anything detecting the
       Python version as 3.1, you'll need to run autoreconf -vif before ./configure.
d/distcc-3.4-i586-2.txz: Rebuilt.
d/gdb-11.1-i586-3.txz: Rebuilt.
d/gyp-20200512_caa60026-i586-5.txz: Rebuilt.
d/kernel-headers-5.14.11_smp-x86-1.txz: Upgraded.
d/llvm-12.0.1-i586-2.txz: Rebuilt.
d/mercurial-5.9.2-i586-2.txz: Rebuilt.
d/meson-0.59.2-i586-2.txz: Rebuilt.
d/python-pip-21.2.4-i586-2.txz: Rebuilt.
d/python-setuptools-58.2.0-i586-2.txz: Rebuilt.
d/python3-3.10.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
d/scons-4.0.1-i586-5.txz: Rebuilt.
k/kernel-source-5.14.11_smp-noarch-1.txz: Upgraded.
kde/akonadi-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-mime-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-notes-21.08.2-i586-1.txz: Upgraded.
kde/akonadi-search-21.08.2-i586-1.txz: Upgraded.
kde/akonadiconsole-21.08.2-i586-1.txz: Upgraded.
kde/akregator-21.08.2-i586-1.txz: Upgraded.
kde/analitza-21.08.2-i586-1.txz: Upgraded.
kde/ark-21.08.2-i586-1.txz: Upgraded.
kde/artikulate-21.08.2-i586-1.txz: Upgraded.
kde/audiocd-kio-21.08.2-i586-1.txz: Upgraded.
kde/baloo-widgets-21.08.2-i586-1.txz: Upgraded.
kde/blinken-21.08.2-i586-1.txz: Upgraded.
kde/bomber-21.08.2-i586-1.txz: Upgraded.
kde/bovo-21.08.2-i586-1.txz: Upgraded.
kde/calendarsupport-21.08.2-i586-1.txz: Upgraded.
kde/cantor-21.08.2-i586-1.txz: Upgraded.
kde/cervisia-21.08.2-i586-1.txz: Upgraded.
kde/dolphin-21.08.2-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.08.2-i586-1.txz: Upgraded.
kde/dragon-21.08.2-i586-1.txz: Upgraded.
kde/elisa-21.08.2-i586-1.txz: Upgraded.
kde/eventviews-21.08.2-i586-1.txz: Upgraded.
kde/extra-cmake-modules-5.86.0-i586-3.txz: Rebuilt.
       Increment maximum python3 version.
kde/ffmpegthumbs-21.08.2-i586-1.txz: Upgraded.
kde/filelight-21.08.2-i586-1.txz: Upgraded.
kde/granatier-21.08.2-i586-1.txz: Upgraded.
kde/grantlee-editor-21.08.2-i586-1.txz: Upgraded.
kde/grantleetheme-21.08.2-i586-1.txz: Upgraded.
kde/gwenview-21.08.2-i586-1.txz: Upgraded.
kde/incidenceeditor-21.08.2-i586-1.txz: Upgraded.
kde/itinerary-21.08.2-i586-1.txz: Upgraded.
kde/juk-21.08.2-i586-1.txz: Upgraded.
kde/k3b-21.08.2-i586-1.txz: Upgraded.
kde/kaddressbook-21.08.2-i586-1.txz: Upgraded.
kde/kalarm-21.08.2-i586-1.txz: Upgraded.
kde/kalarmcal-21.08.2-i586-1.txz: Upgraded.
kde/kalgebra-21.08.2-i586-1.txz: Upgraded.
kde/kalzium-21.08.2-i586-1.txz: Upgraded.
kde/kamera-21.08.2-i586-1.txz: Upgraded.
kde/kamoso-21.08.2-i586-1.txz: Upgraded.
kde/kanagram-21.08.2-i586-1.txz: Upgraded.
kde/kapidox-5.86.0-i586-3.txz: Rebuilt.
kde/kapman-21.08.2-i586-1.txz: Upgraded.
kde/kapptemplate-21.08.2-i586-1.txz: Upgraded.
kde/kate-21.08.2-i586-1.txz: Upgraded.
kde/katomic-21.08.2-i586-1.txz: Upgraded.
kde/kauth-5.86.0-i586-3.txz: Rebuilt.
kde/kbackup-21.08.2-i586-1.txz: Upgraded.
kde/kblackbox-21.08.2-i586-1.txz: Upgraded.
kde/kblocks-21.08.2-i586-1.txz: Upgraded.
kde/kbounce-21.08.2-i586-1.txz: Upgraded.
kde/kbreakout-21.08.2-i586-1.txz: Upgraded.
kde/kbruch-21.08.2-i586-1.txz: Upgraded.
kde/kcachegrind-21.08.2-i586-1.txz: Upgraded.
kde/kcalc-21.08.2-i586-1.txz: Upgraded.
kde/kcalutils-21.08.2-i586-1.txz: Upgraded.
kde/kcharselect-21.08.2-i586-1.txz: Upgraded.
kde/kcodecs-5.86.0-i586-3.txz: Rebuilt.
kde/kcolorchooser-21.08.2-i586-1.txz: Upgraded.
kde/kcompletion-5.86.0-i586-3.txz: Rebuilt.
kde/kconfig-5.86.0-i586-3.txz: Rebuilt.
kde/kconfigwidgets-5.86.0-i586-3.txz: Rebuilt.
kde/kcoreaddons-5.86.0-i586-3.txz: Rebuilt.
kde/kcron-21.08.2-i586-1.txz: Upgraded.
kde/kdbusaddons-5.86.0-i586-3.txz: Rebuilt.
kde/kde-dev-scripts-21.08.2-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.08.2-i586-1.txz: Upgraded.
kde/kdebugsettings-21.08.2-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.08.2-i586-1.txz: Upgraded.
kde/kdeedu-data-21.08.2-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.08.2-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.08.2-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.08.2-i586-1.txz: Upgraded.
kde/kdenlive-21.08.2-i586-1.txz: Upgraded.
kde/kdepim-addons-21.08.2-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.08.2-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.08.2-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.08.2-i586-1.txz: Upgraded.
kde/kdev-python-5.6.2-i586-3.txz: Removed.
       Due to the removal of the old parser from Python 3.10, this is no longer
       compatible. We'll keep an eye on upstream to see if this changes, though.
kde/kdf-21.08.2-i586-1.txz: Upgraded.
kde/kdialog-21.08.2-i586-1.txz: Upgraded.
kde/kdiamond-21.08.2-i586-1.txz: Upgraded.
kde/keditbookmarks-21.08.2-i586-1.txz: Upgraded.
kde/kfind-21.08.2-i586-1.txz: Upgraded.
kde/kfloppy-21.08.2-i586-1.txz: Upgraded.
kde/kfourinline-21.08.2-i586-1.txz: Upgraded.
kde/kgeography-21.08.2-i586-1.txz: Upgraded.
kde/kget-21.08.2-i586-1.txz: Upgraded.
kde/kgoldrunner-21.08.2-i586-1.txz: Upgraded.
kde/kgpg-21.08.2-i586-1.txz: Upgraded.
kde/kguiaddons-5.86.0-i586-3.txz: Rebuilt.
kde/khangman-21.08.2-i586-1.txz: Upgraded.
kde/khelpcenter-21.08.2-i586-1.txz: Upgraded.
kde/ki18n-5.86.0-i586-3.txz: Rebuilt.
kde/kidentitymanagement-21.08.2-i586-1.txz: Upgraded.
kde/kig-21.08.2-i586-1.txz: Upgraded.
kde/kigo-21.08.2-i586-1.txz: Upgraded.
kde/killbots-21.08.2-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.08.2-i586-1.txz: Upgraded.
kde/kimap-21.08.2-i586-1.txz: Upgraded.
kde/kio-extras-21.08.2-i586-1.txz: Upgraded.
kde/kio-gdrive-21.08.2-i586-1.txz: Upgraded.
kde/kipi-plugins-21.08.2-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.08.2-i586-1.txz: Upgraded.
kde/kiriki-21.08.2-i586-1.txz: Upgraded.
kde/kitemmodels-5.86.0-i586-3.txz: Rebuilt.
kde/kitemviews-5.86.0-i586-3.txz: Rebuilt.
kde/kiten-21.08.2-i586-1.txz: Upgraded.
kde/kitinerary-21.08.2-i586-1.txz: Upgraded.
kde/kjobwidgets-5.86.0-i586-3.txz: Rebuilt.
kde/kjumpingcube-21.08.2-i586-1.txz: Upgraded.
kde/kldap-21.08.2-i586-1.txz: Upgraded.
kde/kleopatra-21.08.2-i586-1.txz: Upgraded.
kde/klickety-21.08.2-i586-1.txz: Upgraded.
kde/klines-21.08.2-i586-1.txz: Upgraded.
kde/kmag-21.08.2-i586-1.txz: Upgraded.
kde/kmahjongg-21.08.2-i586-1.txz: Upgraded.
kde/kmail-21.08.2-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.08.2-i586-1.txz: Upgraded.
kde/kmailtransport-21.08.2-i586-1.txz: Upgraded.
kde/kmbox-21.08.2-i586-1.txz: Upgraded.
kde/kmime-21.08.2-i586-1.txz: Upgraded.
kde/kmines-21.08.2-i586-1.txz: Upgraded.
kde/kmix-21.08.2-i586-1.txz: Upgraded.
kde/kmousetool-21.08.2-i586-1.txz: Upgraded.
kde/kmouth-21.08.2-i586-1.txz: Upgraded.
kde/kmplot-21.08.2-i586-1.txz: Upgraded.
kde/kmymoney-5.1.2-i586-3.txz: Rebuilt.
kde/knavalbattle-21.08.2-i586-1.txz: Upgraded.
kde/knetwalk-21.08.2-i586-1.txz: Upgraded.
kde/knights-21.08.2-i586-1.txz: Upgraded.
kde/knotes-21.08.2-i586-1.txz: Upgraded.
kde/kolf-21.08.2-i586-1.txz: Upgraded.
kde/kollision-21.08.2-i586-1.txz: Upgraded.
kde/kolourpaint-21.08.2-i586-1.txz: Upgraded.
kde/kompare-21.08.2-i586-1.txz: Upgraded.
kde/konqueror-21.08.2-i586-1.txz: Upgraded.
kde/konquest-21.08.2-i586-1.txz: Upgraded.
kde/konsole-21.08.2-i586-1.txz: Upgraded.
kde/kontact-21.08.2-i586-1.txz: Upgraded.
kde/kontactinterface-21.08.2-i586-1.txz: Upgraded.
kde/kontrast-21.08.2-i586-1.txz: Upgraded.
kde/konversation-21.08.2-i586-1.txz: Upgraded.
kde/kopeninghours-21.08.2-i586-1.txz: Upgraded.
kde/kopete-21.08.2-i586-1.txz: Upgraded.
kde/korganizer-21.08.2-i586-1.txz: Upgraded.
kde/kosmindoormap-21.08.2-i586-1.txz: Upgraded.
kde/kpat-21.08.2-i586-1.txz: Upgraded.
kde/kpimtextedit-21.08.2-i586-1.txz: Upgraded.
kde/kpkpass-21.08.2-i586-1.txz: Upgraded.
kde/kpmcore-21.08.2-i586-1.txz: Upgraded.
kde/kpublictransport-21.08.2-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.08.2-i586-1.txz: Upgraded.
kde/krdc-21.08.2-i586-1.txz: Upgraded.
kde/kreversi-21.08.2-i586-1.txz: Upgraded.
kde/krfb-21.08.2-i586-1.txz: Upgraded.
kde/krita-4.4.8-i586-5.txz: Rebuilt.
kde/kross-interpreters-21.08.2-i586-1.txz: Upgraded.
kde/kruler-21.08.2-i586-1.txz: Upgraded.
kde/kshisen-21.08.2-i586-1.txz: Upgraded.
kde/ksirk-21.08.2-i586-1.txz: Upgraded.
kde/ksmtp-21.08.2-i586-1.txz: Upgraded.
kde/ksnakeduel-21.08.2-i586-1.txz: Upgraded.
kde/kspaceduel-21.08.2-i586-1.txz: Upgraded.
kde/ksquares-21.08.2-i586-1.txz: Upgraded.
kde/ksudoku-21.08.2-i586-1.txz: Upgraded.
kde/ksystemlog-21.08.2-i586-1.txz: Upgraded.
kde/kteatime-21.08.2-i586-1.txz: Upgraded.
kde/ktimer-21.08.2-i586-1.txz: Upgraded.
kde/ktnef-21.08.2-i586-1.txz: Upgraded.
kde/ktorrent-21.08.2-i586-1.txz: Upgraded.
kde/ktouch-21.08.2-i586-1.txz: Upgraded.
kde/kturtle-21.08.2-i586-1.txz: Upgraded.
kde/kubrick-21.08.2-i586-1.txz: Upgraded.
kde/kwalletmanager-21.08.2-i586-1.txz: Upgraded.
kde/kwave-21.08.2-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.86.0-i586-3.txz: Rebuilt.
kde/kwordquiz-21.08.2-i586-1.txz: Upgraded.
kde/libgravatar-21.08.2-i586-1.txz: Upgraded.
kde/libkcddb-21.08.2-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.08.2-i586-1.txz: Upgraded.
kde/libkdcraw-21.08.2-i586-1.txz: Upgraded.
kde/libkdegames-21.08.2-i586-1.txz: Upgraded.
kde/libkdepim-21.08.2-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.08.2-i586-1.txz: Upgraded.
kde/libkexiv2-21.08.2-i586-1.txz: Upgraded.
kde/libkgapi-21.08.2-i586-1.txz: Upgraded.
kde/libkipi-21.08.2-i586-1.txz: Upgraded.
kde/libkleo-21.08.2-i586-1.txz: Upgraded.
kde/libkmahjongg-21.08.2-i586-1.txz: Upgraded.
kde/libkomparediff2-21.08.2-i586-1.txz: Upgraded.
kde/libksane-21.08.2-i586-1.txz: Upgraded.
kde/libksieve-21.08.2-i586-1.txz: Upgraded.
kde/libktorrent-21.08.2-i586-1.txz: Upgraded.
kde/lokalize-21.08.2-i586-1.txz: Upgraded.
kde/lskat-21.08.2-i586-1.txz: Upgraded.
kde/mailcommon-21.08.2-i586-1.txz: Upgraded.
kde/mailimporter-21.08.2-i586-1.txz: Upgraded.
kde/marble-21.08.2-i586-1.txz: Upgraded.
kde/markdownpart-21.08.2-i586-1.txz: Upgraded.
kde/mbox-importer-21.08.2-i586-1.txz: Upgraded.
kde/messagelib-21.08.2-i586-1.txz: Upgraded.
kde/minuet-21.08.2-i586-1.txz: Upgraded.
kde/okular-21.08.2-i586-1.txz: Upgraded.
kde/palapeli-21.08.2-i586-1.txz: Upgraded.
kde/parley-21.08.2-i586-1.txz: Upgraded.
kde/partitionmanager-21.08.2-i586-1.txz: Upgraded.
kde/picmi-21.08.2-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.08.2-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.08.2-i586-1.txz: Upgraded.
kde/pimcommon-21.08.2-i586-1.txz: Upgraded.
kde/poxml-21.08.2-i586-1.txz: Upgraded.
kde/print-manager-21.08.2-i586-1.txz: Upgraded.
kde/rocs-21.08.2-i586-1.txz: Upgraded.
kde/skanlite-21.08.2-i586-1.txz: Upgraded.
kde/spectacle-21.08.2-i586-1.txz: Upgraded.
kde/step-21.08.2-i586-1.txz: Upgraded.
kde/svgpart-21.08.2-i586-1.txz: Upgraded.
kde/sweeper-21.08.2-i586-1.txz: Upgraded.
kde/umbrello-21.08.2-i586-1.txz: Upgraded.
kde/yakuake-21.08.2-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.08.2-i586-1.txz: Upgraded.
l/M2Crypto-0.38.0-i586-2.txz: Rebuilt.
l/Mako-1.1.4-i586-4.txz: Rebuilt.
l/PyQt5-5.15.2-i586-4.txz: Rebuilt.
l/QScintilla-2.11.6-i586-4.txz: Rebuilt.
l/brotli-1.0.9-i586-6.txz: Rebuilt.
l/dbus-python-1.2.18-i586-2.txz: Rebuilt.
l/gexiv2-0.14.0-i586-2.txz: Rebuilt.
l/glade-3.38.2-i586-4.txz: Rebuilt.
l/gobject-introspection-1.70.0-i586-2.txz: Rebuilt.
l/lensfun-0.3.95-i586-4.txz: Rebuilt.
l/libcaca-0.99.beta19-i586-10.txz: Rebuilt.
l/libcap-ng-0.8.2-i586-4.txz: Rebuilt.
l/libimobiledevice-20200615_4791a82-i586-5.txz: Rebuilt.
l/libproxy-0.4.17-i586-4.txz: Rebuilt.
l/libwebp-1.2.1-i586-2.txz: Rebuilt.
l/libxml2-2.9.12-i586-2.txz: Rebuilt.
l/newt-0.52.21-i586-6.txz: Rebuilt.
l/openexr-2.5.7-i586-3.txz: Rebuilt.
l/pycairo-1.20.1-i586-2.txz: Rebuilt.
l/pycups-2.0.1-i586-5.txz: Rebuilt.
l/pycurl-7.44.1-i586-2.txz: Rebuilt.
l/pygobject3-3.42.0-i586-2.txz: Rebuilt.
l/pyparsing-2.4.7-i586-5.txz: Rebuilt.
l/python-appdirs-1.4.4-i586-5.txz: Rebuilt.
l/python-certifi-2021.5.30-i586-2.txz: Rebuilt.
l/python-cffi-1.14.6-i586-2.txz: Rebuilt.
l/python-chardet-4.0.0-i586-4.txz: Rebuilt.
l/python-charset-normalizer-2.0.6-i586-2.txz: Rebuilt.
l/python-distro-1.5.0-i586-5.txz: Rebuilt.
l/python-dnspython-2.1.0-i586-2.txz: Rebuilt.
l/python-docutils-0.17.1-i586-2.txz: Rebuilt.
l/python-future-0.18.2-i586-6.txz: Rebuilt.
l/python-idna-3.2-i586-2.txz: Rebuilt.
l/python-markdown-3.3.4-i586-2.txz: Rebuilt.
l/python-notify2-0.3.1-i586-9.txz: Rebuilt.
l/python-packaging-21.0-i586-2.txz: Rebuilt.
l/python-pillow-8.3.2-i586-2.txz: Rebuilt.
l/python-ply-3.11-i586-7.txz: Rebuilt.
l/python-pycparser-2.20-i586-2.txz: Rebuilt.
l/python-pygments-2.10.0-i586-2.txz: Rebuilt.
l/python-pysol_cards-0.10.2-i586-2.txz: Rebuilt.
l/python-random2-1.0.1-i586-4.txz: Rebuilt.
l/python-requests-2.26.0-i586-2.txz: Rebuilt.
l/python-sane-2.9.1-i586-4.txz: Rebuilt.
l/python-six-1.16.0-i586-2.txz: Rebuilt.
l/python-urllib3-1.26.7-i586-2.txz: Rebuilt.
l/sip-4.19.25-i586-2.txz: Rebuilt.
l/speech-dispatcher-0.10.2-i586-4.txz: Rebuilt.
l/system-config-printer-1.5.15-i586-4.txz: Rebuilt.
l/talloc-2.3.3-i586-2.txz: Rebuilt.
l/tdb-1.4.5-i586-2.txz: Rebuilt.
l/tevent-0.11.0-i586-2.txz: Rebuilt.
n/bind-9.16.21-i586-5.txz: Rebuilt.
n/epic5-2.1.6-i586-2.txz: Rebuilt.
n/fetchmail-6.4.22-i586-2.txz: Rebuilt.
n/getmail-6.18.4-i586-2.txz: Rebuilt.
n/gpgme-1.16.0-i586-2.txz: Rebuilt.
n/net-snmp-5.9.1-i586-2.txz: Rebuilt.
n/nftables-1.0.0-i586-3.txz: Rebuilt.
n/nss-pam-ldapd-0.9.11-i586-4.txz: Rebuilt.
n/obexftp-0.24.2-i586-9.txz: Rebuilt.
n/pssh-2.3.4-i586-5.txz: Rebuilt.
n/samba-4.15.0-i586-2.txz: Rebuilt.
x/ibus-1.5.25-i586-2.txz: Rebuilt.
x/ibus-anthy-1.5.13-i586-2.txz: Rebuilt.
x/ibus-hangul-1.5.4-i586-4.txz: Rebuilt.
x/ibus-libpinyin-1.12.1-i586-2.txz: Rebuilt.
x/ibus-table-1.14.1-i586-2.txz: Rebuilt.
x/pyxdg-0.27-i586-5.txz: Rebuilt.
x/xcb-proto-1.14.1-i586-5.txz: Rebuilt.
xap/blueman-2.2.2-i586-2.txz: Rebuilt.
xap/hexchat-2.16.0-i586-2.txz: Rebuilt.
xap/vim-gvim-8.2.3487-i586-1.txz: Upgraded.
extra/brltty/brltty-6.4-i586-2.txz: Rebuilt.
extra/linux-5.14.11-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Oct 8 03:23:28 UTC 2021
n/httpd-2.4.51-i586-1.txz: Upgraded.
       SECURITY: CVE-2021-42013: Path Traversal and Remote Code
       Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete
       fix of CVE-2021-41773) (cve.mitre.org)
       It was found that the fix for CVE-2021-41773 in Apache HTTP
       Server 2.4.50 was insufficient. An attacker could use a path
       traversal attack to map URLs to files outside the directories
       configured by Alias-like directives.
       If files outside of these directories are not protected by the
       usual default configuration "require all denied", these requests
       can succeed. If CGI scripts are also enabled for these aliased
       pathes, this could allow for remote code execution.
       This issue only affects Apache 2.4.49 and Apache 2.4.50 and not
       earlier versions.
       Credits: Reported by Juan Escobar from Dreamlab Technologies,
       Fernando MuA+-oz from NULL Life CTF Team, and Shungo Kumasaka
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013
       (* Security fix *)
+--------------------------+
Thu Oct 7 19:12:20 UTC 2021
a/kernel-generic-5.14.10-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.10_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.10-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.10_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.10-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.10_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.14.10_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.10_smp-noarch-1.txz: Upgraded.
kde/kio-5.86.0-i586-3.txz: Rebuilt.
       Allow changing panel launcher icons. Thanks to RadicalDreamer and ctrlaltca.
n/epic5-2.1.6-i586-1.txz: Upgraded.
n/gnupg2-2.2.32-i586-1.txz: Upgraded.
xap/xpaint-3.1.4-i586-1.txz: Upgraded.
extra/linux-5.14.10-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Oct 6 19:25:04 UTC 2021
a/hwdata-0.352-noarch-1.txz: Upgraded.
ap/nano-5.9-i586-1.txz: Upgraded.
d/mercurial-5.9.2-i586-1.txz: Upgraded.
l/libgnt-2.14.3-i586-1.txz: Upgraded.
l/librsvg-2.52.1-i586-1.txz: Upgraded.
l/mozjs78-78.15.0esr-i586-1.txz: Upgraded.
l/netpbm-10.96.01-i586-1.txz: Upgraded.
l/polkit-0.120-i586-1.txz: Upgraded.
n/openvpn-2.5.4-i586-1.txz: Upgraded.
x/xkeyboard-config-2.34-noarch-1.txz: Upgraded.
xap/gftp-2.7.0b-i586-3.txz: Rebuilt.
       Removed broken icon symlink. Thanks to marav.
xap/mozilla-thunderbird-91.2.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.2.0/releasenotes/
       (* Security fix *)
extra/fltk/fltk-1.3.7-i586-1.txz: Upgraded.
+--------------------------+
Wed Oct 6 00:02:15 UTC 2021
a/glibc-zoneinfo-2021c-noarch-1.txz: Upgraded.
a/util-linux-2.37.2-i586-4.txz: Rebuilt.
       Removed broken /usr/share/bash-completion/completions/runuser symlink.
       Thanks to marav.
n/ca-certificates-20211005-noarch-1.txz: Upgraded.
       Don't install /etc/ca-certificates.conf as a .new file - it's an auto-
       generated list that will just end up suffering a mismatch with the files
       included in the package. Thanks to Weber Kai.
xap/mozilla-firefox-91.2.0esr-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.2.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-45/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501
       (* Security fix *)
+--------------------------+
Mon Oct 4 19:28:39 UTC 2021
a/util-linux-2.37.2-i586-3.txz: Rebuilt.
       Removed broken /usr/bin/raw symlink. Thanks to marav.
d/gdb-11.1-i586-2.txz: Rebuilt.
       Don't ship .la files.
d/vala-0.54.2-i586-1.txz: Upgraded.
kde/artikulate-21.08.1-i586-3.txz: Rebuilt.
       Fixed broken COPYING{,.DOC} symlinks. Thanks to marav.
kde/kservice-5.86.0-i586-4.txz: Rebuilt.
       In /etc/profile.d/kde.{csh,sh}:
       Fixed test for kf5 directory. Thanks to LuckyCyborg.
       Make adding /etc/kde/xdg to $XDG_CONFIG_DIRS conditional on the existence
       of that directory.
l/imagemagick-7.1.0_9-i586-1.txz: Upgraded.
n/bind-9.16.21-i586-4.txz: Rebuilt.
       Removed broken symlink. Thanks to marav.
n/httpd-2.4.50-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       Fixed null pointer dereference in h2 fuzzing.
       Fixed path traversal and file disclosure vulnerability.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41524
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773
       (* Security fix *)
x/cldr-emoji-annotation-37.0_13.0_0_2-noarch-4.txz: Rebuilt.
       Fixed broken COPYING symlink. Thanks to marav.
xap/x3270-4.0ga14-i586-2.txz: Rebuilt.
       Fixed symlinks in html directory. Thanks to marav.
+--------------------------+
Sun Oct 3 23:05:29 UTC 2021
a/mcelog-179-i586-1.txz: Upgraded.
ap/squashfs-tools-4.5-i586-2.txz: Rebuilt.
       Fixed broken symlinks. Thanks to marav.
l/eigen2-2.0.17-i586-4.txz: Removed.
l/eigen3-3.4.0-i586-1.txz: Upgraded.
l/pcre2-10.38-i586-1.txz: Upgraded.
n/links-2.25-i586-1.txz: Upgraded.
n/snownews-1.9-i586-1.txz: Upgraded.
+--------------------------+
Sat Oct 2 19:21:52 UTC 2021
d/python-setuptools-58.2.0-i586-1.txz: Upgraded.
kde/kservice-5.86.0-i586-3.txz: Rebuilt.
       Fix paths in kde.{csh,sh}. Thanks to marco70.
       Since kdesu and kxmlgui are looking in /usr/lib${LIBDIRSUFFIX}/kf5 for
       some reason, let's just link that location to libexec/kf5 to make things
       work again. Also, I'm not sure why these things are in this particular
       package, but I guess they had to go somewhere.
l/python-cffi-1.14.6-i586-1.txz: Added.
       This is needed by hexchat-2.16.0.
l/python-pycparser-2.20-i586-1.txz: Added.
       This is needed by hexchat-2.16.0.
l/vte-0.66.0-i586-1.txz: Upgraded.
xap/hexchat-2.16.0-i586-1.txz: Upgraded.
extra/brltty/brltty-6.4-i586-1.txz: Upgraded.
+--------------------------+
Sat Oct 2 05:36:25 UTC 2021
kde/calligra-3.2.1-i586-13.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/cantor-21.08.1-i586-3.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/kde-cli-tools-5.22.5-i586-3.txz: Rebuilt.
       Added /usr/bin/kdesu symlink. Thanks to rherbert.
kde/kdesu-5.86.0-i586-3.txz: Rebuilt.
       Removed broken /usr/bin/kdesu symlink. Thanks to rherbert.
kde/kfilemetadata-5.86.0-i586-3.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/kile-2.9.93-i586-13.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/kitinerary-21.08.1-i586-3.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/krita-4.4.8-i586-4.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
kde/krusader-2.7.2-i586-5.txz: Rebuilt.
       Adjust cmake to point to the correct kdesu location. Thanks to marco70.
kde/okular-21.08.1-i586-3.txz: Rebuilt.
       Recompiled against poppler-21.10.0.
l/poppler-21.10.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
+--------------------------+
Fri Oct 1 05:38:04 UTC 2021
x/liberation-fonts-ttf-2.1.5-noarch-1.txz: Upgraded.
x/libva-utils-2.13.0-i586-1.txz: Upgraded.
x/noto-fonts-ttf-20171024-noarch-4.txz: Rebuilt.
       Package NotoSansCoptic-Regular.ttf and a few other unhinted fonts.
       Thanks to Roman Dyaba.
xfce/Greybird-3.22.15-noarch-1.txz: Upgraded.
+--------------------------+
Fri Oct 1 00:21:20 UTC 2021
Hey folks, sorry about all the bandwidth rebuilding Plasma, but there's no
good reason to specify a libexec dir that's different from upsteam's default,
so we've removed that option to let everything fall into the default location.
Only a couple dozen packages seemed to be affected, but it's just safer to
recompile all of them just to be sure. Thanks to fulalas.
a/haveged-1.9.15-i586-1.txz: Upgraded.
a/kernel-generic-5.14.9-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.9_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.9-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.9_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.9-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.9_smp-i686-1.txz: Upgraded.
a/udisks2-2.9.4-i586-1.txz: Upgraded.
d/kernel-headers-5.14.9_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.9_smp-noarch-1.txz: Upgraded.
kde/akonadi-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-calendar-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-calendar-tools-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-contacts-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-import-wizard-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-mime-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-notes-21.08.1-i586-2.txz: Rebuilt.
kde/akonadi-search-21.08.1-i586-2.txz: Rebuilt.
kde/akonadiconsole-21.08.1-i586-2.txz: Rebuilt.
kde/akregator-21.08.1-i586-2.txz: Rebuilt.
kde/alkimia-8.1.0-i586-2.txz: Rebuilt.
kde/analitza-21.08.1-i586-2.txz: Rebuilt.
kde/ark-21.08.1-i586-2.txz: Rebuilt.
kde/artikulate-21.08.1-i586-2.txz: Rebuilt.
kde/attica-5.86.0-i586-2.txz: Rebuilt.
kde/audiocd-kio-21.08.1-i586-2.txz: Rebuilt.
kde/baloo-5.86.0-i586-2.txz: Rebuilt.
kde/baloo-widgets-21.08.1-i586-2.txz: Rebuilt.
kde/blinken-21.08.1-i586-2.txz: Rebuilt.
kde/bluedevil-5.22.5-i586-2.txz: Rebuilt.
kde/bluez-qt-5.86.0-i586-2.txz: Rebuilt.
kde/bomber-21.08.1-i586-2.txz: Rebuilt.
kde/bovo-21.08.1-i586-2.txz: Rebuilt.
kde/breeze-5.22.5-i586-2.txz: Rebuilt.
kde/breeze-grub-5.22.5-i586-2.txz: Rebuilt.
kde/breeze-gtk-5.22.5-i586-2.txz: Rebuilt.
kde/breeze-icons-5.86.0-noarch-2.txz: Rebuilt.
kde/calendarsupport-21.08.1-i586-2.txz: Rebuilt.
kde/calligra-3.2.1-i586-12.txz: Rebuilt.
kde/calligraplan-3.3.0-i586-3.txz: Rebuilt.
kde/cantor-21.08.1-i586-2.txz: Rebuilt.
kde/cervisia-21.08.1-i586-2.txz: Rebuilt.
kde/digikam-7.3.0-i586-2.txz: Rebuilt.
kde/dolphin-21.08.1-i586-2.txz: Rebuilt.
kde/dolphin-plugins-21.08.1-i586-2.txz: Rebuilt.
kde/dragon-21.08.1-i586-2.txz: Rebuilt.
kde/drkonqi-5.22.5-i586-2.txz: Rebuilt.
kde/elisa-21.08.1-i586-2.txz: Rebuilt.
kde/eventviews-21.08.1-i586-2.txz: Rebuilt.
kde/extra-cmake-modules-5.86.0-i586-2.txz: Rebuilt.
kde/falkon-3.1.0-i586-4.txz: Rebuilt.
kde/ffmpegthumbs-21.08.1-i586-2.txz: Rebuilt.
kde/filelight-21.08.1-i586-2.txz: Rebuilt.
kde/frameworkintegration-5.86.0-i586-2.txz: Rebuilt.
kde/granatier-21.08.1-i586-2.txz: Rebuilt.
kde/grantlee-editor-21.08.1-i586-2.txz: Rebuilt.
kde/grantleetheme-21.08.1-i586-2.txz: Rebuilt.
kde/gwenview-21.08.1-i586-2.txz: Rebuilt.
kde/incidenceeditor-21.08.1-i586-2.txz: Rebuilt.
kde/itinerary-21.08.1-i586-2.txz: Rebuilt.
kde/juk-21.08.1-i586-2.txz: Rebuilt.
kde/k3b-21.08.1-i586-2.txz: Rebuilt.
kde/kactivities-5.86.0-i586-2.txz: Rebuilt.
kde/kactivities-stats-5.86.0-i586-2.txz: Rebuilt.
kde/kactivitymanagerd-5.22.5-i586-2.txz: Rebuilt.
kde/kaddressbook-21.08.1-i586-2.txz: Rebuilt.
kde/kalarm-21.08.1-i586-2.txz: Rebuilt.
kde/kalarmcal-21.08.1-i586-2.txz: Rebuilt.
kde/kalgebra-21.08.1-i586-2.txz: Rebuilt.
kde/kalzium-21.08.1-i586-2.txz: Rebuilt.
kde/kamera-21.08.1-i586-2.txz: Rebuilt.
kde/kamoso-21.08.1-i586-2.txz: Rebuilt.
kde/kanagram-21.08.1-i586-2.txz: Rebuilt.
kde/kapidox-5.86.0-i586-2.txz: Rebuilt.
kde/kapman-21.08.1-i586-2.txz: Rebuilt.
kde/kapptemplate-21.08.1-i586-2.txz: Rebuilt.
kde/karchive-5.86.0-i586-2.txz: Rebuilt.
kde/kate-21.08.1-i586-2.txz: Rebuilt.
kde/katomic-21.08.1-i586-2.txz: Rebuilt.
kde/kauth-5.86.0-i586-2.txz: Rebuilt.
kde/kbackup-21.08.1-i586-2.txz: Rebuilt.
kde/kblackbox-21.08.1-i586-2.txz: Rebuilt.
kde/kblocks-21.08.1-i586-2.txz: Rebuilt.
kde/kbookmarks-5.86.0-i586-2.txz: Rebuilt.
kde/kbounce-21.08.1-i586-2.txz: Rebuilt.
kde/kbreakout-21.08.1-i586-2.txz: Rebuilt.
kde/kbruch-21.08.1-i586-2.txz: Rebuilt.
kde/kcachegrind-21.08.1-i586-2.txz: Rebuilt.
kde/kcalc-21.08.1-i586-2.txz: Rebuilt.
kde/kcalendarcore-5.86.0-i586-2.txz: Rebuilt.
kde/kcalutils-21.08.1-i586-2.txz: Rebuilt.
kde/kcharselect-21.08.1-i586-2.txz: Rebuilt.
kde/kcmutils-5.86.0-i586-2.txz: Rebuilt.
kde/kcodecs-5.86.0-i586-2.txz: Rebuilt.
kde/kcolorchooser-21.08.1-i586-2.txz: Rebuilt.
kde/kcompletion-5.86.0-i586-2.txz: Rebuilt.
kde/kconfig-5.86.0-i586-2.txz: Rebuilt.
kde/kconfigwidgets-5.86.0-i586-2.txz: Rebuilt.
kde/kcontacts-5.86.0-i586-2.txz: Rebuilt.
kde/kcoreaddons-5.86.0-i586-2.txz: Rebuilt.
kde/kcrash-5.86.0-i586-2.txz: Rebuilt.
kde/kcron-21.08.1-i586-2.txz: Rebuilt.
kde/kdav-5.86.0-i586-2.txz: Rebuilt.
kde/kdbusaddons-5.86.0-i586-2.txz: Rebuilt.
kde/kde-cli-tools-5.22.5-i586-2.txz: Rebuilt.
kde/kde-dev-scripts-21.08.1-i586-2.txz: Rebuilt.
kde/kde-dev-utils-21.08.1-i586-2.txz: Rebuilt.
kde/kde-gtk-config-5.22.5-i586-2.txz: Rebuilt.
kde/kdebugsettings-21.08.1-i586-2.txz: Rebuilt.
kde/kdeclarative-5.86.0-i586-2.txz: Rebuilt.
kde/kdeconnect-kde-21.08.1-i586-2.txz: Rebuilt.
kde/kdecoration-5.22.5-i586-2.txz: Rebuilt.
kde/kded-5.86.0-i586-2.txz: Rebuilt.
kde/kdeedu-data-21.08.1-i586-2.txz: Rebuilt.
kde/kdegraphics-mobipocket-21.08.1-i586-2.txz: Rebuilt.
kde/kdegraphics-thumbnailers-21.08.1-i586-2.txz: Rebuilt.
kde/kdelibs4support-5.86.0-i586-2.txz: Rebuilt.
kde/kdenetwork-filesharing-21.08.1-i586-2.txz: Rebuilt.
kde/kdenlive-21.08.1-i586-2.txz: Rebuilt.
kde/kdepim-addons-21.08.1-i586-2.txz: Rebuilt.
kde/kdepim-runtime-21.08.1-i586-2.txz: Rebuilt.
kde/kdeplasma-addons-5.22.5-i586-2.txz: Rebuilt.
kde/kdesdk-kioslaves-21.08.1-i586-2.txz: Rebuilt.
kde/kdesdk-thumbnailers-21.08.1-i586-2.txz: Rebuilt.
kde/kdesignerplugin-5.86.0-i586-2.txz: Rebuilt.
kde/kdesu-5.86.0-i586-2.txz: Rebuilt.
kde/kdev-php-5.6.2-i586-3.txz: Rebuilt.
kde/kdev-python-5.6.2-i586-3.txz: Rebuilt.
kde/kdevelop-5.6.2-i586-5.txz: Rebuilt.
kde/kdevelop-pg-qt-2.2.1-i586-4.txz: Rebuilt.
kde/kdewebkit-5.86.0-i586-2.txz: Rebuilt.
kde/kdf-21.08.1-i586-2.txz: Rebuilt.
kde/kdiagram-2.8.0-i586-4.txz: Rebuilt.
kde/kdialog-21.08.1-i586-2.txz: Rebuilt.
kde/kdiamond-21.08.1-i586-2.txz: Rebuilt.
kde/kdnssd-5.86.0-i586-2.txz: Rebuilt.
kde/kdoctools-5.86.0-i586-2.txz: Rebuilt.
kde/keditbookmarks-21.08.1-i586-2.txz: Rebuilt.
kde/kemoticons-5.86.0-i586-2.txz: Rebuilt.
kde/kfilemetadata-5.86.0-i586-2.txz: Rebuilt.
kde/kfind-21.08.1-i586-2.txz: Rebuilt.
kde/kfloppy-21.08.1-i586-2.txz: Rebuilt.
kde/kfourinline-21.08.1-i586-2.txz: Rebuilt.
kde/kgamma5-5.22.5-i586-2.txz: Rebuilt.
kde/kgeography-21.08.1-i586-2.txz: Rebuilt.
kde/kget-21.08.1-i586-2.txz: Rebuilt.
kde/kglobalaccel-5.86.0-i586-2.txz: Rebuilt.
kde/kgoldrunner-21.08.1-i586-2.txz: Rebuilt.
kde/kgpg-21.08.1-i586-2.txz: Rebuilt.
kde/kguiaddons-5.86.0-i586-2.txz: Rebuilt.
kde/khangman-21.08.1-i586-2.txz: Rebuilt.
kde/khelpcenter-21.08.1-i586-2.txz: Rebuilt.
kde/kholidays-5.86.0-i586-2.txz: Rebuilt.
kde/khotkeys-5.22.5-i586-2.txz: Rebuilt.
kde/khtml-5.86.0-i586-2.txz: Rebuilt.
kde/ki18n-5.86.0-i586-2.txz: Rebuilt.
kde/kiconthemes-5.86.0-i586-2.txz: Rebuilt.
kde/kid3-3.8.7-i586-2.txz: Rebuilt.
kde/kidentitymanagement-21.08.1-i586-2.txz: Rebuilt.
kde/kidletime-5.86.0-i586-2.txz: Rebuilt.
kde/kig-21.08.1-i586-2.txz: Rebuilt.
kde/kigo-21.08.1-i586-2.txz: Rebuilt.
kde/kile-2.9.93-i586-12.txz: Rebuilt.
kde/killbots-21.08.1-i586-2.txz: Rebuilt.
kde/kimageformats-5.86.0-i586-2.txz: Rebuilt.
kde/kimagemapeditor-21.08.1-i586-2.txz: Rebuilt.
kde/kimap-21.08.1-i586-2.txz: Rebuilt.
kde/kinfocenter-5.22.5-i586-2.txz: Rebuilt.
kde/kinit-5.86.0-i586-2.txz: Rebuilt.
kde/kio-5.86.0-i586-2.txz: Rebuilt.
kde/kio-extras-21.08.1-i586-2.txz: Rebuilt.
kde/kio-gdrive-21.08.1-i586-2.txz: Rebuilt.
kde/kipi-plugins-21.08.1-i586-2.txz: Rebuilt.
kde/kirigami-gallery-21.08.1-i586-2.txz: Rebuilt.
kde/kirigami2-5.86.0-i586-2.txz: Rebuilt.
kde/kiriki-21.08.1-i586-2.txz: Rebuilt.
kde/kitemmodels-5.86.0-i586-2.txz: Rebuilt.
kde/kitemviews-5.86.0-i586-2.txz: Rebuilt.
kde/kiten-21.08.1-i586-2.txz: Rebuilt.
kde/kitinerary-21.08.1-i586-2.txz: Rebuilt.
kde/kjobwidgets-5.86.0-i586-2.txz: Rebuilt.
kde/kjots-20201206_f7d555c-i586-4.txz: Rebuilt.
kde/kjs-5.86.0-i586-2.txz: Rebuilt.
kde/kjsembed-5.86.0-i586-2.txz: Rebuilt.
kde/kjumpingcube-21.08.1-i586-2.txz: Rebuilt.
kde/kldap-21.08.1-i586-2.txz: Rebuilt.
kde/kleopatra-21.08.1-i586-2.txz: Rebuilt.
kde/klickety-21.08.1-i586-2.txz: Rebuilt.
kde/klines-21.08.1-i586-2.txz: Rebuilt.
kde/kmag-21.08.1-i586-2.txz: Rebuilt.
kde/kmahjongg-21.08.1-i586-2.txz: Rebuilt.
kde/kmail-21.08.1-i586-2.txz: Rebuilt.
kde/kmail-account-wizard-21.08.1-i586-2.txz: Rebuilt.
kde/kmailtransport-21.08.1-i586-2.txz: Rebuilt.
kde/kmbox-21.08.1-i586-2.txz: Rebuilt.
kde/kmediaplayer-5.86.0-i586-2.txz: Rebuilt.
kde/kmenuedit-5.22.5-i586-2.txz: Rebuilt.
kde/kmime-21.08.1-i586-2.txz: Rebuilt.
kde/kmines-21.08.1-i586-2.txz: Rebuilt.
kde/kmix-21.08.1-i586-2.txz: Rebuilt.
kde/kmousetool-21.08.1-i586-2.txz: Rebuilt.
kde/kmouth-21.08.1-i586-2.txz: Rebuilt.
kde/kmplot-21.08.1-i586-2.txz: Rebuilt.
kde/kmymoney-5.1.2-i586-2.txz: Rebuilt.
kde/knavalbattle-21.08.1-i586-2.txz: Rebuilt.
kde/knetwalk-21.08.1-i586-2.txz: Rebuilt.
kde/knewstuff-5.86.0-i586-3.txz: Rebuilt.
kde/knights-21.08.1-i586-2.txz: Rebuilt.
kde/knotes-21.08.1-i586-2.txz: Rebuilt.
kde/knotifications-5.86.0-i586-2.txz: Rebuilt.
kde/knotifyconfig-5.86.0-i586-2.txz: Rebuilt.
kde/kolf-21.08.1-i586-2.txz: Rebuilt.
kde/kollision-21.08.1-i586-2.txz: Rebuilt.
kde/kolourpaint-21.08.1-i586-2.txz: Rebuilt.
kde/kompare-21.08.1-i586-2.txz: Rebuilt.
kde/konqueror-21.08.1-i586-2.txz: Rebuilt.
kde/konquest-21.08.1-i586-2.txz: Rebuilt.
kde/konsole-21.08.1-i586-2.txz: Rebuilt.
kde/kontact-21.08.1-i586-2.txz: Rebuilt.
kde/kontactinterface-21.08.1-i586-2.txz: Rebuilt.
kde/kontrast-21.08.1-i586-2.txz: Rebuilt.
kde/konversation-21.08.1-i586-2.txz: Rebuilt.
kde/kopeninghours-21.08.1-i586-2.txz: Rebuilt.
kde/kopete-21.08.1-i586-2.txz: Rebuilt.
kde/korganizer-21.08.1-i586-2.txz: Rebuilt.
kde/kosmindoormap-21.08.1-i586-2.txz: Rebuilt.
kde/kpackage-5.86.0-i586-2.txz: Rebuilt.
kde/kparts-5.86.0-i586-2.txz: Rebuilt.
kde/kpat-21.08.1-i586-2.txz: Rebuilt.
kde/kpeople-5.86.0-i586-2.txz: Rebuilt.
kde/kpeoplevcard-0.1-i586-4.txz: Rebuilt.
kde/kpimtextedit-21.08.1-i586-2.txz: Rebuilt.
kde/kpkpass-21.08.1-i586-2.txz: Rebuilt.
kde/kplotting-5.86.0-i586-2.txz: Rebuilt.
kde/kpmcore-21.08.1-i586-2.txz: Rebuilt.
kde/kpty-5.86.0-i586-2.txz: Rebuilt.
kde/kpublictransport-21.08.1-i586-2.txz: Rebuilt.
kde/kqtquickcharts-21.08.1-i586-2.txz: Rebuilt.
kde/kquickcharts-5.86.0-i586-2.txz: Rebuilt.
kde/krdc-21.08.1-i586-2.txz: Rebuilt.
kde/krename-5.0.1-i586-4.txz: Rebuilt.
kde/kreversi-21.08.1-i586-2.txz: Rebuilt.
kde/krfb-21.08.1-i586-2.txz: Rebuilt.
kde/krita-4.4.8-i586-3.txz: Rebuilt.
kde/kross-5.86.0-i586-2.txz: Rebuilt.
kde/kross-interpreters-21.08.1-i586-2.txz: Rebuilt.
kde/kruler-21.08.1-i586-2.txz: Rebuilt.
kde/krunner-5.86.0-i586-2.txz: Rebuilt.
kde/krusader-2.7.2-i586-4.txz: Rebuilt.
kde/kscreen-5.22.5-i586-2.txz: Rebuilt.
kde/kscreenlocker-5.22.5-i586-2.txz: Rebuilt.
kde/kservice-5.86.0-i586-2.txz: Rebuilt.
kde/kshisen-21.08.1-i586-2.txz: Rebuilt.
kde/ksirk-21.08.1-i586-2.txz: Rebuilt.
kde/ksmtp-21.08.1-i586-2.txz: Rebuilt.
kde/ksnakeduel-21.08.1-i586-2.txz: Rebuilt.
kde/kspaceduel-21.08.1-i586-2.txz: Rebuilt.
kde/ksquares-21.08.1-i586-2.txz: Rebuilt.
kde/ksshaskpass-5.22.5-i586-2.txz: Rebuilt.
kde/kstars-3.5.5-i586-2.txz: Rebuilt.
kde/ksudoku-21.08.1-i586-2.txz: Rebuilt.
kde/ksysguard-5.22.0-i586-2.txz: Rebuilt.
kde/ksystemlog-21.08.1-i586-2.txz: Rebuilt.
kde/ksystemstats-5.22.5-i586-2.txz: Rebuilt.
kde/kteatime-21.08.1-i586-2.txz: Rebuilt.
kde/ktexteditor-5.86.0-i586-2.txz: Rebuilt.
kde/ktextwidgets-5.86.0-i586-2.txz: Rebuilt.
kde/ktimer-21.08.1-i586-2.txz: Rebuilt.
kde/ktimetracker-5.0.1-i586-4.txz: Rebuilt.
kde/ktnef-21.08.1-i586-2.txz: Rebuilt.
kde/ktorrent-21.08.1-i586-2.txz: Rebuilt.
kde/ktouch-21.08.1-i586-2.txz: Rebuilt.
kde/kturtle-21.08.1-i586-2.txz: Rebuilt.
kde/kubrick-21.08.1-i586-2.txz: Rebuilt.
kde/kunitconversion-5.86.0-i586-2.txz: Rebuilt.
kde/kwallet-5.86.0-i586-2.txz: Rebuilt.
kde/kwallet-pam-5.22.5-i586-2.txz: Rebuilt.
kde/kwalletmanager-21.08.1-i586-2.txz: Rebuilt.
kde/kwave-21.08.1-i586-2.txz: Rebuilt.
kde/kwayland-5.86.0-i586-2.txz: Rebuilt.
kde/kwayland-integration-5.22.5-i586-2.txz: Rebuilt.
kde/kwayland-server-5.22.5-i586-2.txz: Rebuilt.
kde/kwidgetsaddons-5.86.0-i586-2.txz: Rebuilt.
kde/kwin-5.22.5-i586-2.txz: Rebuilt.
kde/kwindowsystem-5.86.0-i586-2.txz: Rebuilt.
kde/kwordquiz-21.08.1-i586-2.txz: Rebuilt.
kde/kwrited-5.22.5-i586-2.txz: Rebuilt.
kde/kxmlgui-5.86.0-i586-2.txz: Rebuilt.
kde/kxmlrpcclient-5.86.0-i586-2.txz: Rebuilt.
kde/latte-dock-0.10.2-i586-2.txz: Rebuilt.
kde/layer-shell-qt-5.22.5-i586-2.txz: Rebuilt.
kde/libgravatar-21.08.1-i586-2.txz: Rebuilt.
kde/libkcddb-21.08.1-i586-2.txz: Rebuilt.
kde/libkcompactdisc-21.08.1-i586-2.txz: Rebuilt.
kde/libkdcraw-21.08.1-i586-2.txz: Rebuilt.
kde/libkdegames-21.08.1-i586-2.txz: Rebuilt.
kde/libkdepim-21.08.1-i586-2.txz: Rebuilt.
kde/libkeduvocdocument-21.08.1-i586-2.txz: Rebuilt.
kde/libkexiv2-21.08.1-i586-2.txz: Rebuilt.
kde/libkgapi-21.08.1-i586-2.txz: Rebuilt.
kde/libkipi-21.08.1-i586-2.txz: Rebuilt.
kde/libkleo-21.08.1-i586-2.txz: Rebuilt.
kde/libkmahjongg-21.08.1-i586-2.txz: Rebuilt.
kde/libkomparediff2-21.08.1-i586-2.txz: Rebuilt.
kde/libksane-21.08.1-i586-2.txz: Rebuilt.
kde/libkscreen-5.22.5-i586-2.txz: Rebuilt.
kde/libksieve-21.08.1-i586-2.txz: Rebuilt.
kde/libksysguard-5.22.5-i586-2.txz: Rebuilt.
kde/libktorrent-21.08.1-i586-2.txz: Rebuilt.
kde/lokalize-21.08.1-i586-2.txz: Rebuilt.
kde/lskat-21.08.1-i586-2.txz: Rebuilt.
kde/mailcommon-21.08.1-i586-2.txz: Rebuilt.
kde/mailimporter-21.08.1-i586-2.txz: Rebuilt.
kde/marble-21.08.1-i586-2.txz: Rebuilt.
kde/markdownpart-21.08.1-i586-2.txz: Rebuilt.
kde/mbox-importer-21.08.1-i586-2.txz: Rebuilt.
kde/messagelib-21.08.1-i586-2.txz: Rebuilt.
kde/milou-5.22.5-i586-2.txz: Rebuilt.
kde/minuet-21.08.1-i586-2.txz: Rebuilt.
kde/modemmanager-qt-5.86.0-i586-2.txz: Rebuilt.
kde/networkmanager-qt-5.86.0-i586-2.txz: Rebuilt.
kde/okteta-0.26.6-i586-2.txz: Rebuilt.
kde/okular-21.08.1-i586-2.txz: Rebuilt.
kde/oxygen-5.22.5-i586-2.txz: Rebuilt.
kde/oxygen-fonts-5.4.3-noarch-4.txz: Rebuilt.
kde/oxygen-gtk2-1.4.6-i586-4.txz: Rebuilt.
kde/oxygen-icons5-5.86.0-noarch-2.txz: Rebuilt.
kde/palapeli-21.08.1-i586-2.txz: Rebuilt.
kde/parley-21.08.1-i586-2.txz: Rebuilt.
kde/partitionmanager-21.08.1-i586-2.txz: Rebuilt.
kde/picmi-21.08.1-i586-2.txz: Rebuilt.
kde/pim-data-exporter-21.08.1-i586-2.txz: Rebuilt.
kde/pim-sieve-editor-21.08.1-i586-2.txz: Rebuilt.
kde/pimcommon-21.08.1-i586-2.txz: Rebuilt.
kde/plasma-browser-integration-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-desktop-5.22.5-i586-3.txz: Rebuilt.
kde/plasma-disks-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-firewall-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-framework-5.86.0-i586-2.txz: Rebuilt.
kde/plasma-integration-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-nm-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-pa-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-sdk-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-systemmonitor-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-vault-5.22.5-i586-2.txz: Rebuilt.
kde/plasma-wayland-protocols-1.4.0-i586-2.txz: Rebuilt.
kde/plasma-workspace-5.22.5-i586-3.txz: Rebuilt.
kde/plasma-workspace-wallpapers-5.22.5-i586-2.txz: Rebuilt.
kde/polkit-kde-agent-1-5.22.5-i586-2.txz: Rebuilt.
kde/powerdevil-5.22.5-i586-2.txz: Rebuilt.
kde/poxml-21.08.1-i586-2.txz: Rebuilt.
kde/print-manager-21.08.1-i586-2.txz: Rebuilt.
kde/prison-5.86.0-i586-2.txz: Rebuilt.
kde/pulseaudio-qt-1.3-i586-2.txz: Rebuilt.
kde/purpose-5.86.0-i586-2.txz: Rebuilt.
kde/qqc2-breeze-style-5.22.5-i586-2.txz: Rebuilt.
kde/qqc2-desktop-style-5.86.0-i586-2.txz: Rebuilt.
kde/rocs-21.08.1-i586-2.txz: Rebuilt.
kde/sddm-0.19.0-i586-9.txz: Rebuilt.
kde/sddm-kcm-5.22.5-i586-2.txz: Rebuilt.
kde/skanlite-21.08.1-i586-2.txz: Rebuilt.
kde/solid-5.86.0-i586-2.txz: Rebuilt.
kde/sonnet-5.86.0-i586-2.txz: Rebuilt.
kde/spectacle-21.08.1-i586-2.txz: Rebuilt.
kde/step-21.08.1-i586-2.txz: Rebuilt.
kde/svgpart-21.08.1-i586-2.txz: Rebuilt.
kde/sweeper-21.08.1-i586-2.txz: Rebuilt.
kde/syndication-5.86.0-i586-2.txz: Rebuilt.
kde/syntax-highlighting-5.86.0-i586-2.txz: Rebuilt.
kde/systemsettings-5.22.5-i586-2.txz: Rebuilt.
kde/threadweaver-5.86.0-i586-2.txz: Rebuilt.
kde/umbrello-21.08.1-i586-2.txz: Rebuilt.
kde/wacomtablet-20201030_417d9d9-i586-4.txz: Rebuilt.
kde/xdg-desktop-portal-kde-5.22.5-i586-2.txz: Rebuilt.
kde/yakuake-21.08.1-i586-2.txz: Rebuilt.
kde/zeroconf-ioslave-21.08.1-i586-2.txz: Rebuilt.
l/mozilla-nss-3.71-i586-1.txz: Upgraded.
l/pipewire-0.3.38-i586-1.txz: Upgraded.
x/mesa-21.2.3-i586-1.txz: Upgraded.
extra/linux-5.14.9-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Sep 29 19:15:54 UTC 2021
a/kernel-firmware-20210928_7a30050-noarch-1.txz: Upgraded.
d/ccache-4.4.2-i586-1.txz: Upgraded.
d/meson-0.59.2-i586-1.txz: Upgraded.
l/gc-8.0.6-i586-1.txz: Upgraded.
l/mlt-7.0.1-i586-2.txz: Rebuilt.
       Fixed man page installation. Thanks to GazL and Markus Wiesner.
l/netpbm-10.96.00-i586-1.txz: Upgraded.
n/epic5-2.1.5-i586-2.txz: Rebuilt.
       Fixed man page installation. Thanks to GazL and kaott.
n/openssh-8.8p1-i586-2.txz: Rebuilt.
       Add pam_elogind.so to /etc/pam.d/sshd to track user sessions over ssh,
       properly set the XDG_ variables, and create the runtime directory.
       Thanks to davjohn.
xap/NetworkManager-openvpn-1.8.16-i586-1.txz: Upgraded.
+--------------------------+
Tue Sep 28 18:18:11 UTC 2021
kde/knewstuff-5.86.0-i586-2.txz: Rebuilt.
       [PATCH] Fix crash in DownloadWidget.
l/pygobject3-3.42.0-i586-1.txz: Upgraded.
n/pinentry-1.2.0-i586-1.txz: Upgraded.
x/libinput-1.19.1-i586-1.txz: Upgraded.
xap/seamonkey-2.53.9.1-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.9.1
       (* Security fix *)
+--------------------------+
Tue Sep 28 01:37:33 UTC 2021
n/nftables-1.0.0-i586-2.txz: Rebuilt.
       Added options --with-json and --enable-python needed for firewalld.
       Thanks to stormtracknole.
xap/mozilla-thunderbird-91.1.2-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.1.2/releasenotes/
+--------------------------+
Mon Sep 27 18:50:28 UTC 2021
a/coreutils-9.0-i586-3.txz: Rebuilt.
       DIR_COLORS: Support .webm and .webp extensions. Thanks to madridsecreto.
       Applied upstream patch:
       [PATCH] chmod: fix exit status when ignoring symlinks
ap/ghostscript-9.55.0-i586-1.txz: Upgraded.
ap/vim-8.2.3458-i586-1.txz: Upgraded.
d/vala-0.54.1-i586-1.txz: Upgraded.
l/at-spi2-core-2.42.0-i586-1.txz: Upgraded.
l/gexiv2-0.14.0-i586-1.txz: Upgraded.
l/gjs-1.70.0-i586-1.txz: Upgraded.
l/glib-networking-2.70.0-i586-1.txz: Upgraded.
l/glib2-2.70.0-i586-1.txz: Upgraded.
l/gobject-introspection-1.70.0-i586-1.txz: Upgraded.
l/libcap-2.59-i586-1.txz: Upgraded.
l/librsvg-2.52.0-i586-1.txz: Upgraded.
l/libsoup-2.74.0-i586-1.txz: Upgraded.
n/ModemManager-1.18.2-i586-1.txz: Upgraded.
n/NetworkManager-1.32.12-i586-1.txz: Upgraded.
n/tin-2.6.0-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.3458-i586-1.txz: Upgraded.
+--------------------------+
Sun Sep 26 18:57:07 UTC 2021
a/kernel-generic-5.14.8-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.8_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.8-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.8_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.8-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.8_smp-i686-1.txz: Upgraded.
ap/itstool-2.0.7-i586-1.txz: Upgraded.
d/kernel-headers-5.14.8_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.8_smp-noarch-1.txz: Upgraded.
l/libmtp-1.1.19-i586-1.txz: Upgraded.
n/getmail-6.18.4-i586-1.txz: Upgraded.
n/openssh-8.8p1-i586-1.txz: Upgraded.
       Please note "Potentially-incompatible changes" from the release notes:
       This release disables RSA signatures using the SHA-1 hash algorithm
       by default. This change has been made as the SHA-1 hash algorithm is
       cryptographically broken, and it is possible to create chosen-prefix
       hash collisions for <USD$50K [1]
       For most users, this change should be invisible and there is
       no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
       RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
       will automatically use the stronger algorithm where possible.
       Incompatibility is more likely when connecting to older SSH
       implementations that have not been upgraded or have not closely tracked
       improvements in the SSH protocol. For these cases, it may be necessary
       to selectively re-enable RSA/SHA1 to allow connection and/or user
       authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms
       options. For example, the following stanza in ~/.ssh/config will enable
       RSA/SHA1 for host and user authentication for a single destination host:
       Host old-host
       HostkeyAlgorithms +ssh-rsa
       PubkeyAcceptedAlgorithms +ssh-rsa
       We recommend enabling RSA/SHA1 only as a stopgap measure until legacy
       implementations can be upgraded or reconfigured with another key type
       (such as ECDSA or Ed25519).
       [1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
       Application to the PGP Web of Trust" Leurent, G and Peyrin, T
       (2020) https://eprint.iacr.org/2020/014.pdf
extra/linux-5.14.8-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Sep 25 19:32:08 UTC 2021
a/coreutils-9.0-i586-2.txz: Rebuilt.
       DIR_COLORS: Add support for .tzst, .zst, .flv, and .m2t extensions.
       Thanks to regdub.
a/elvis-2.2_0-i586-8.txz: Rebuilt.
       Removed elvis.clr.orig. Thanks to ctrlaltca.
d/bison-3.8.2-i586-1.txz: Upgraded.
d/meson-0.59.1-i586-1.txz: Upgraded.
d/subversion-1.14.1-i586-4.txz: Rebuilt.
       Added compile options --with-kwallet and --with-gnome-keyring (the latter was
       already used by default). Thanks to rsts and Windu.
kde/plasma-desktop-5.22.5-i586-2.txz: Rebuilt.
       Removed main.xml.orig. Thanks to ctrlaltca.
l/gst-plugins-bad-free-1.18.5-i586-1.txz: Added.
       These are the "bad" GStreamer plugins that have free enough licenses to ship.
       Thanks to Heinz Wiesinger.
l/gtk4-4.4.0-i586-1.txz: Upgraded.
l/libssh2-1.10.0-i586-1.txz: Upgraded.
n/lynx-2.9.0dev.9-i586-1.txz: Upgraded.
       Based on testing here, this seems stable enough to include. Please let me
       know if there are any new problems.
       lynx.cfg: Add ASSUME_CHARSET:utf-8. Thanks to usr345.
       Removed CHANGES.orig. Thanks to ctrlaltca.
xap/x3270-4.0ga14-i586-1.txz: Upgraded.
xap/xpdf-4.03-i586-3.txz: Rebuilt.
       Removed .orig files. Thanks to ctrlaltca.
+--------------------------+
Sat Sep 25 01:05:55 UTC 2021
a/coreutils-9.0-i586-1.txz: Upgraded.
       Thanks to GazL for pointing out where I needed to be looking in the code to
       stick with the traditional (for us, anyway) ls quoting style.
n/ca-certificates-20210924-noarch-1.txz: Upgraded.
       Removed DST_Root_CA_X3.crt.
n/cifs-utils-6.14-i586-1.txz: Upgraded.
+--------------------------+
Fri Sep 24 19:47:44 UTC 2021
l/fribidi-1.0.11-i586-1.txz: Upgraded.
l/harfbuzz-3.0.0-i586-1.txz: Upgraded.
n/bind-9.16.21-i586-3.txz: Rebuilt.
       Clean this up a little more... for consistency, make all three variables
       set in /etc/default/named start with NAMED_. Likewise, make sure that all
       uses of them in rc.bind start with NAMED_ (fixes a mismatch discovered by
       Nobby6). For anyone wishing to run BIND as root, it seems to accept -u root
       just fine, but if you really don't want a -u option, just set NAMED_OPTIONS
       to " " to avoid triggering the fallback.
n/php-7.4.24-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       Zip: ZipArchive::extractTo extracts outside of destination.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21706
       (* Security fix *)
x/xdg-desktop-portal-1.10.1-i586-1.txz: Added.
       This is needed by the xdg-desktop-portal-kde backend.
       Thanks to Vincent Batts.
extra/php8/php8-8.0.11-i586-1.txz: Upgraded.
       This update fixes bugs and a security issue:
       Zip: ZipArchive::extractTo extracts outside of destination.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21706
       (* Security fix *)
+--------------------------+
Thu Sep 23 19:15:14 UTC 2021
a/kernel-firmware-20210923_0268c1b-noarch-1.txz: Upgraded.
d/parallel-20210922-noarch-1.txz: Upgraded.
l/pipewire-0.3.37-i586-1.txz: Upgraded.
l/python-urllib3-1.26.7-i586-1.txz: Upgraded.
xap/freerdp-2.4.0-i586-1.txz: Added.
       This is needed for krdc to use RDP. Thanks to max242.
xfce/mousepad-0.5.7-i586-1.txz: Upgraded.
+--------------------------+
Wed Sep 22 18:45:12 UTC 2021
a/kernel-generic-5.14.7-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.7_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.7-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.7_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.7-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.7_smp-i686-1.txz: Upgraded.
ap/sudo-1.9.8p2-i586-1.txz: Upgraded.
d/kernel-headers-5.14.7_smp-x86-1.txz: Upgraded.
d/python-setuptools-58.1.0-i586-1.txz: Upgraded.
k/kernel-source-5.14.7_smp-noarch-1.txz: Upgraded.
l/neon-0.32.1-i586-1.txz: Upgraded.
n/ca-certificates-20210922-noarch-1.txz: Upgraded.
n/curl-7.79.1-i586-1.txz: Upgraded.
n/nghttp2-1.45.1-i586-1.txz: Upgraded.
x/xterm-369-i586-1.txz: Upgraded.
extra/linux-5.14.7-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Sep 21 18:03:27 UTC 2021
a/btrfs-progs-5.14.1-i586-1.txz: Upgraded.
a/sysvinit-3.00-i586-1.txz: Upgraded.
ap/htop-3.1.0-i586-1.txz: Upgraded.
d/cmake-3.21.3-i586-1.txz: Upgraded.
kde/attica-5.86.0-i586-1.txz: Upgraded.
kde/baloo-5.86.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.86.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.86.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.86.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.86.0-i586-1.txz: Upgraded.
kde/kactivities-5.86.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.86.0-i586-1.txz: Upgraded.
kde/kapidox-5.86.0-i586-1.txz: Upgraded.
kde/karchive-5.86.0-i586-1.txz: Upgraded.
kde/kauth-5.86.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.86.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.86.0-i586-1.txz: Upgraded.
kde/kcmutils-5.86.0-i586-1.txz: Upgraded.
kde/kcodecs-5.86.0-i586-1.txz: Upgraded.
kde/kcompletion-5.86.0-i586-1.txz: Upgraded.
kde/kconfig-5.86.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.86.0-i586-1.txz: Upgraded.
kde/kcontacts-5.86.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.86.0-i586-1.txz: Upgraded.
kde/kcrash-5.86.0-i586-1.txz: Upgraded.
kde/kdav-5.86.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.86.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.86.0-i586-1.txz: Upgraded.
kde/kded-5.86.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.86.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.86.0-i586-1.txz: Upgraded.
kde/kdesu-5.86.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.86.0-i586-1.txz: Upgraded.
kde/kdnssd-5.86.0-i586-1.txz: Upgraded.
kde/kdoctools-5.86.0-i586-1.txz: Upgraded.
kde/kemoticons-5.86.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.86.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.86.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.86.0-i586-1.txz: Upgraded.
kde/kholidays-5.86.0-i586-1.txz: Upgraded.
kde/khtml-5.86.0-i586-1.txz: Upgraded.
kde/ki18n-5.86.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.86.0-i586-1.txz: Upgraded.
kde/kidletime-5.86.0-i586-1.txz: Upgraded.
kde/kimageformats-5.86.0-i586-1.txz: Upgraded.
kde/kinit-5.86.0-i586-1.txz: Upgraded.
kde/kio-5.86.0-i586-1.txz: Upgraded.
kde/kirigami2-5.86.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.86.0-i586-1.txz: Upgraded.
kde/kitemviews-5.86.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.86.0-i586-1.txz: Upgraded.
kde/kjs-5.86.0-i586-1.txz: Upgraded.
kde/kjsembed-5.86.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.86.0-i586-1.txz: Upgraded.
kde/knewstuff-5.86.0-i586-1.txz: Upgraded.
kde/knotifications-5.86.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.86.0-i586-1.txz: Upgraded.
kde/kpackage-5.86.0-i586-1.txz: Upgraded.
kde/kparts-5.86.0-i586-1.txz: Upgraded.
kde/kpeople-5.86.0-i586-1.txz: Upgraded.
kde/kplotting-5.86.0-i586-1.txz: Upgraded.
kde/kpty-5.86.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.86.0-i586-1.txz: Upgraded.
kde/kross-5.86.0-i586-1.txz: Upgraded.
kde/krunner-5.86.0-i586-1.txz: Upgraded.
kde/kservice-5.86.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.86.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.86.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.86.0-i586-1.txz: Upgraded.
kde/kwallet-5.86.0-i586-1.txz: Upgraded.
kde/kwayland-5.86.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.86.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.86.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.86.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.86.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.86.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.86.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.86.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.86.0-i586-1.txz: Upgraded.
kde/prison-5.86.0-i586-1.txz: Upgraded.
kde/purpose-5.86.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.86.0-i586-1.txz: Upgraded.
kde/solid-5.86.0-i586-1.txz: Upgraded.
kde/sonnet-5.86.0-i586-1.txz: Upgraded.
kde/syndication-5.86.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.86.0-i586-1.txz: Upgraded.
kde/threadweaver-5.86.0-i586-1.txz: Upgraded.
l/neon-0.32.0-i586-1.txz: Upgraded.
n/alpine-2.25-i586-1.txz: Upgraded.
       Fixed a denial-of-service security issue where untagged responses from an
       IMAP server are accepted before STARTTLS.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38370
       (* Security fix *)
n/fetchmail-6.4.22-i586-1.txz: Upgraded.
x/libva-2.13.0-i586-2.txz: Rebuilt.
       Instead of disabling messaging entirely, add an /etc/libva.conf that sets it
       to a medium level and can be adjusted by the user. Thanks to Markus Wiesner.
x/mesa-21.2.2-i586-1.txz: Upgraded.
+--------------------------+
Mon Sep 20 18:49:19 UTC 2021
a/acpid-2.0.33-i586-1.txz: Upgraded.
n/nghttp2-1.45.0-i586-1.txz: Upgraded.
n/samba-4.15.0-i586-1.txz: Upgraded.
x/libXi-1.8-i586-1.txz: Upgraded.
x/libva-2.13.0-i586-1.txz: Upgraded.
       Build with enable_va_messaging=false to avoid console spam. Thanks to GazL.
x/wayland-protocols-1.23-noarch-1.txz: Upgraded.
x/xf86-input-libinput-1.2.0-i586-1.txz: Upgraded.
x/xorgproto-2021.5-i586-1.txz: Upgraded.
xap/pan-0.147-i586-1.txz: Upgraded.
+--------------------------+
Sun Sep 19 18:57:24 UTC 2021
a/kernel-firmware-20210919_d526e04-noarch-1.txz: Upgraded.
l/gd-2.3.3-i586-2.txz: Rebuilt.
       Applied upstream patch to restore macros used while building PHP.
       Thanks to nobodino.
l/gjs-1.68.4-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_8-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.6-i586-1.txz: Upgraded.
xfce/xfce4-whiskermenu-plugin-2.6.0-i586-1.txz: Upgraded.
+--------------------------+
Sun Sep 19 00:13:58 UTC 2021
a/kernel-generic-5.14.6-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.6_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.6-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.6_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.6-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.6_smp-i686-1.txz: Upgraded.
ap/mpg123-1.29.0-i586-2.txz: Rebuilt.
       Add ../lib64/mpg123 to the module search path. Thanks to Pithium.
d/kernel-headers-5.14.6_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.6_smp-noarch-1.txz: Upgraded.
       PINCTRL_CANNONLAKE n -> m
       Thanks to bassmadrigal.
kde/kstars-3.5.5-i586-1.txz: Upgraded.
l/libcap-2.58-i586-1.txz: Upgraded.
n/bind-9.16.21-i586-2.txz: Rebuilt.
       rc.bind: make sure /etc/rndc.key has correct ownership. Thanks to marav.
xfce/thunar-4.16.10-i586-1.txz: Upgraded.
extra/linux-5.14.6-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Sep 17 17:22:57 UTC 2021
kde/plasma-workspace-5.22.5-i586-2.txz: Rebuilt.
       Patched to fix USB storage devices detected only once per session.
       Thanks to ctrlaltca.
n/NetworkManager-1.32.10-i586-4.txz: Rebuilt.
       Patched to shut down dhcpcd gracefully, and restored dhcpcd as the default
       client when using NetworkManager on Slackware. In this case I'll swim
       upstream if it means better security. Who knows what your DHCP server might
       attempt when it comes to public WiFi? :-)
       Thanks to Roy Marples and marav.
n/gnupg2-2.2.31-i586-1.txz: Upgraded.
xap/pidgin-2.14.7-i586-1.txz: Upgraded.
+--------------------------+
Fri Sep 17 04:17:57 UTC 2021
a/cryptsetup-2.4.1-i586-1.txz: Upgraded.
a/sysvinit-scripts-15.0-noarch-5.txz: Rebuilt.
       Stop D-Bus after NFS partitions are unmounted to avoid a hang.
       Thanks to vulcan59 and bassmadrigal.
ap/sudo-1.9.8p1-i586-1.txz: Upgraded.
l/fftw-3.3.10-i586-1.txz: Upgraded.
l/libxkbcommon-1.3.1-i586-1.txz: Upgraded.
l/pipewire-0.3.36-i586-1.txz: Upgraded.
n/dhcpcd-9.4.0-i586-2.txz: Rebuilt.
       Applied upstream patch:
       DHCP6: Only send FQDN for SOLICIT, REQUEST, RENEW, or REBIND messages.
       Thanks to marav.
n/httpd-2.4.49-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       mod_proxy: Server Side Request Forgery (SSRF) vulnerabilty [Yann Ylavic]
       core: ap_escape_quotes buffer overflow
       mod_proxy_uwsgi: Out of bound read vulnerability [Yann Ylavic]
       core: null pointer dereference on malformed request
       mod_http2: Request splitting vulnerability with mod_proxy [Stefan Eissing]
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
       (* Security fix *)
x/ibus-libpinyin-1.12.1-i586-1.txz: Upgraded.
x/libpinyin-2.6.1-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.1.1-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.1.1/releasenotes/
+--------------------------+
Thu Sep 16 18:33:01 UTC 2021
a/kernel-generic-5.14.5-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.5_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.5-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.5_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.5-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.5_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.14.5_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.5_smp-noarch-1.txz: Upgraded.
extra/linux-5.14.5-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Sep 16 02:52:54 UTC 2021
a/etc-15.0-i586-17.txz: Rebuilt.
       Added named:named (53:53) user and group.
a/kernel-firmware-20210915_198ac65-noarch-1.txz: Upgraded.
a/kernel-generic-5.14.4-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.4-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.4-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.4_smp-i686-1.txz: Upgraded.
ap/sudo-1.9.8-i586-1.txz: Upgraded.
d/kernel-headers-5.14.4_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.4_smp-noarch-1.txz: Upgraded.
kde/breeze-icons-5.85.0-noarch-2.txz: Rebuilt.
       Patched with upstream commit to allow using this icon theme with Xfce.
l/fluidsynth-2.2.3-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.5-i586-1.txz: Upgraded.
l/qca-2.3.4-i586-1.txz: Upgraded.
n/NetworkManager-1.32.10-i586-3.txz: Rebuilt.
       Switch to dhcp=internal to avoid problems swimming upstream.
       For those looking for a fix to continue using dhcpcd, a PRIVSEP build
       variable was added to the SlackBuild, and you may produce a fully
       NetworkManager compatible dhcpcd package with this command:
       PRIVSEP=no ./dhcpcd.SlackBuild
       Privilege separation remains the dhcpcd package default as we don't want
       to weaken security for those using rc.inet1 along with dhcpcd.
       Some additional comments about this were added to 00-dhcp-client.conf
       mentioning this and the workaround of killing dhcpcd manually when
       resuming with the stock dhcpcd package.
n/bind-9.16.21-i586-1.txz: Upgraded.
       Fixed call to rndc-confgen in the install script.
       Make /etc/rndc.key owned by named:named.
       Run named as named:named by default (configurable in /etc/default/named).
       rc.bind: chown /run/named and /var/named to configured user:group.
       Thanks to Ressy for prompting this cleanup. :)
n/curl-7.79.0-i586-1.txz: Upgraded.
       This update fixes security issues:
       clear the leftovers pointer when sending succeeds.
       do not ignore --ssl-reqd.
       reject STARTTLS server response pipelining.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
       (* Security fix *)
n/links-2.24-i586-1.txz: Upgraded.
n/wireguard-tools-1.0.20210914-i586-1.txz: Upgraded.
x/libinput-1.19.0-i586-1.txz: Upgraded.
xap/gimp-2.10.28-i586-1.txz: Upgraded.
extra/linux-5.14.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Sep 13 18:04:35 UTC 2021
a/btrfs-progs-5.14-i586-1.txz: Upgraded.
a/kernel-firmware-20210912_7160358-noarch-1.txz: Upgraded.
a/kernel-generic-5.14.3-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.3-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.3-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.3_smp-i686-1.txz: Upgraded.
ap/vim-8.2.3435-i586-1.txz: Upgraded.
d/bison-3.8.1-i586-1.txz: Upgraded.
d/ccache-4.4.1-i586-1.txz: Upgraded.
d/gdb-11.1-i586-1.txz: Upgraded.
d/kernel-headers-5.14.3_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.3_smp-noarch-1.txz: Upgraded.
kde/latte-dock-0.10.2-i586-1.txz: Upgraded.
l/gd-2.3.3-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_7-i586-1.txz: Upgraded.
l/libedit-20210910_3.1-i586-1.txz: Upgraded.
l/libexif-0.6.23-i586-1.txz: Upgraded.
l/pango-1.48.10-i586-1.txz: Upgraded.
n/NetworkManager-1.32.10-i586-2.txz: Rebuilt.
       00-dhcp-client.conf: Add the --noconfigure option to dhcpcd, or else the
       network won't return after suspend/resume. Thanks to marav.
n/ethtool-5.14-i586-1.txz: Upgraded.
n/mutt-2.1.3-i586-1.txz: Upgraded.
n/wget2-2.0.0-i586-1.txz: Added.
xap/vim-gvim-8.2.3435-i586-1.txz: Upgraded.
xfce/thunar-4.16.9-i586-1.txz: Upgraded.
extra/linux-5.14.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Sep 10 18:58:52 UTC 2021
a/grub-2.06-i586-4.txz: Rebuilt.
       Install file in /etc/grub.d as .new so that they won't be clobbered by
       future package updates.
       Patch grub-mkconfig to skip .new files in /etc/grub.d.
       Thanks to denydias.
d/bison-3.7.6-i586-1.txz: Upgraded.
       Reverted bison-3.8 since it breaks building glibc. Looks like I picked the
       wrong week to upgrade bison. ;-)
       Thanks to nobodino.
l/jansson-2.14-i586-1.txz: Upgraded.
l/libcap-2.57-i586-1.txz: Upgraded.
l/liburing-2.1-i586-1.txz: Upgraded.
xap/libnma-1.8.32-i586-2.txz: Rebuilt.
       Added glib-compile-schemas to the install script. Thanks to bormant.
xap/network-manager-applet-1.24.0-i586-2.txz: Rebuilt.
       Removed glib-compile-schemas from the install script. Thanks to bormant.
+--------------------------+
Thu Sep 9 18:51:50 UTC 2021
a/grub-2.06-i586-3.txz: Rebuilt.
       Fix unreadable XFS filesystem with v4 superblock. Thanks to Didier Spaier.
d/python-setuptools-58.0.4-i586-1.txz: Upgraded.
d/rust-1.55.0-i686-1.txz: Upgraded.
l/gst-plugins-base-1.18.5-i586-1.txz: Upgraded.
l/gst-plugins-good-1.18.5-i586-1.txz: Upgraded.
l/gst-plugins-libav-1.18.5-i586-1.txz: Upgraded.
l/gstreamer-1.18.5-i586-1.txz: Upgraded.
l/libgtop-2.40.0-i586-5.txz: Rebuilt.
       Don't ship .la files. Thanks to Toutatis.
l/pipewire-0.3.35-i586-1.txz: Upgraded.
n/dnsmasq-2.86-i586-1.txz: Upgraded.
xfce/mousepad-0.5.6-i586-2.txz: Rebuilt.
       Don't ship .la files. Thanks to Toutatis.
+--------------------------+
Wed Sep 8 18:07:38 UTC 2021
a/kernel-generic-5.14.2-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.2_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.2-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.2_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.2-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.2_smp-i686-1.txz: Upgraded.
ap/inxi-20210824_73d96439-noarch-1.txz: Upgraded.
ap/neofetch-20210904_77f2afc3-noarch-1.txz: Upgraded.
d/bison-3.8-i586-1.txz: Upgraded.
d/kernel-headers-5.14.2_smp-x86-1.txz: Upgraded.
d/python-setuptools-58.0.3-i586-1.txz: Upgraded.
k/kernel-source-5.14.2_smp-noarch-1.txz: Upgraded.
n/wget-1.21.2-i586-1.txz: Upgraded.
extra/linux-5.14.2-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Sep 7 19:06:41 UTC 2021
d/python-setuptools-58.0.2-i586-1.txz: Upgraded.
l/SDL2_mixer-2.0.4-i586-5.txz: Rebuilt.
       Rebuilt to fix embedded shared library .so-versions used for dynamic loading.
       Thanks to teeemcee.
l/fuse3-3.10.5-i586-1.txz: Upgraded.
l/harfbuzz-2.9.1-i586-1.txz: Upgraded.
l/poppler-data-0.4.11-noarch-1.txz: Upgraded.
l/sdl-1.2.15-i586-12.txz: Rebuilt.
       Rebuilt to fix embedded shared library .so-versions in libSDL_mixer-1.2.so.0
       used for dynamic loading. Thanks to teeemcee.
n/libqmi-1.30.2-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.1.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.1.0/releasenotes/
       (* Security fix *)
+--------------------------+
Mon Sep 6 18:55:54 UTC 2021
ap/mpg123-1.29.0-i586-1.txz: Upgraded.
ap/texinfo-6.8-i586-2.txz: Rebuilt.
       Regenerate /usr/info/dir.new.
d/python-setuptools-58.0.1-i586-1.txz: Upgraded.
d/rinutils-0.10.0-i586-1.txz: Upgraded.
kde/plasma-wayland-protocols-1.4.0-i586-1.txz: Upgraded.
l/gegl-0.4.32-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_6-i586-1.txz: Upgraded.
l/libgtop-2.40.0-i586-4.txz: Rebuilt.
       Remove /usr/info/dir that shouldn't have been included.
       Upgrade the texinfo package after this one to restore the correct file.
       Thanks to elyk.
l/libsamplerate-0.2.2-i586-1.txz: Upgraded.
l/mozilla-nss-3.70-i586-1.txz: Upgraded.
xap/gimp-2.10.26-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.1.0esr-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.1.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-40/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38492
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38495
       (* Security fix *)
xfce/libxfce4ui-4.16.1-i586-1.txz: Upgraded.
+--------------------------+
Sat Sep 4 18:31:25 UTC 2021
a/pam-1.5.2-i586-1.txz: Upgraded.
d/python-setuptools-57.5.0-i586-1.txz: Upgraded.
l/libcap-2.56-i586-1.txz: Upgraded.
x/OpenCC-1.1.3-i586-1.txz: Upgraded.
+--------------------------+
Fri Sep 3 18:51:49 UTC 2021
a/gzip-1.11-i586-1.txz: Upgraded.
a/kernel-firmware-20210903_2984e26-noarch-1.txz: Upgraded.
a/kernel-generic-5.14.1-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.1_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.1-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.1_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.1-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.1_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.14.1_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.1_smp-noarch-1.txz: Upgraded.
kde/kstars-3.5.4-i586-1.txz: Upgraded.
n/bind-9.16.20-i586-2.txz: Rebuilt.
       rc.bind: Fixed typo: $RDNC_OPTIONS -> $RNDC_OPTIONS
       rc.bind: Allow a 10 second (default) timeout for rndc to stop BIND. At that
       point if BIND is still running, use killall -SIGTERM to stop it.
       Thanks to akschu.
xap/ssr-0.4.3-i586-1.txz: Upgraded.
extra/linux-5.14.1-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Sep 3 00:22:37 UTC 2021
a/hwdata-0.351-noarch-1.txz: Upgraded.
d/strace-5.14-i586-1.txz: Upgraded.
kde/akonadi-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-mime-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-notes-21.08.1-i586-1.txz: Upgraded.
kde/akonadi-search-21.08.1-i586-1.txz: Upgraded.
kde/akonadiconsole-21.08.1-i586-1.txz: Upgraded.
kde/akregator-21.08.1-i586-1.txz: Upgraded.
kde/analitza-21.08.1-i586-1.txz: Upgraded.
kde/ark-21.08.1-i586-1.txz: Upgraded.
kde/artikulate-21.08.1-i586-1.txz: Upgraded.
kde/audiocd-kio-21.08.1-i586-1.txz: Upgraded.
kde/baloo-widgets-21.08.1-i586-1.txz: Upgraded.
kde/blinken-21.08.1-i586-1.txz: Upgraded.
kde/bomber-21.08.1-i586-1.txz: Upgraded.
kde/bovo-21.08.1-i586-1.txz: Upgraded.
kde/calendarsupport-21.08.1-i586-1.txz: Upgraded.
kde/calligra-3.2.1-i586-11.txz: Rebuilt.
       Recompiled against poppler-21.09.0.
kde/cantor-21.08.1-i586-1.txz: Upgraded.
kde/cervisia-21.08.1-i586-1.txz: Upgraded.
kde/dolphin-21.08.1-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.08.1-i586-1.txz: Upgraded.
kde/dragon-21.08.1-i586-1.txz: Upgraded.
kde/elisa-21.08.1-i586-1.txz: Upgraded.
kde/eventviews-21.08.1-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.08.1-i586-1.txz: Upgraded.
kde/filelight-21.08.1-i586-1.txz: Upgraded.
kde/granatier-21.08.1-i586-1.txz: Upgraded.
kde/grantlee-editor-21.08.1-i586-1.txz: Upgraded.
kde/grantleetheme-21.08.1-i586-1.txz: Upgraded.
kde/gwenview-21.08.1-i586-1.txz: Upgraded.
kde/incidenceeditor-21.08.1-i586-1.txz: Upgraded.
kde/itinerary-21.08.1-i586-1.txz: Upgraded.
kde/juk-21.08.1-i586-1.txz: Upgraded.
kde/k3b-21.08.1-i586-1.txz: Upgraded.
kde/kaddressbook-21.08.1-i586-1.txz: Upgraded.
kde/kalarm-21.08.1-i586-1.txz: Upgraded.
kde/kalarmcal-21.08.1-i586-1.txz: Upgraded.
kde/kalgebra-21.08.1-i586-1.txz: Upgraded.
kde/kalzium-21.08.1-i586-1.txz: Upgraded.
kde/kamera-21.08.1-i586-1.txz: Upgraded.
kde/kamoso-21.08.1-i586-1.txz: Upgraded.
kde/kanagram-21.08.1-i586-1.txz: Upgraded.
kde/kapman-21.08.1-i586-1.txz: Upgraded.
kde/kapptemplate-21.08.1-i586-1.txz: Upgraded.
kde/kate-21.08.1-i586-1.txz: Upgraded.
kde/katomic-21.08.1-i586-1.txz: Upgraded.
kde/kbackup-21.08.1-i586-1.txz: Upgraded.
kde/kblackbox-21.08.1-i586-1.txz: Upgraded.
kde/kblocks-21.08.1-i586-1.txz: Upgraded.
kde/kbounce-21.08.1-i586-1.txz: Upgraded.
kde/kbreakout-21.08.1-i586-1.txz: Upgraded.
kde/kbruch-21.08.1-i586-1.txz: Upgraded.
kde/kcachegrind-21.08.1-i586-1.txz: Upgraded.
kde/kcalc-21.08.1-i586-1.txz: Upgraded.
kde/kcalutils-21.08.1-i586-1.txz: Upgraded.
kde/kcharselect-21.08.1-i586-1.txz: Upgraded.
kde/kcolorchooser-21.08.1-i586-1.txz: Upgraded.
kde/kcron-21.08.1-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.08.1-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.08.1-i586-1.txz: Upgraded.
kde/kdebugsettings-21.08.1-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.08.1-i586-1.txz: Upgraded.
kde/kdeedu-data-21.08.1-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.08.1-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.08.1-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.08.1-i586-1.txz: Upgraded.
kde/kdenlive-21.08.1-i586-1.txz: Upgraded.
kde/kdepim-addons-21.08.1-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.08.1-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.08.1-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.08.1-i586-1.txz: Upgraded.
kde/kdf-21.08.1-i586-1.txz: Upgraded.
kde/kdialog-21.08.1-i586-1.txz: Upgraded.
kde/kdiamond-21.08.1-i586-1.txz: Upgraded.
kde/keditbookmarks-21.08.1-i586-1.txz: Upgraded.
kde/kfilemetadata-5.85.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.09.0.
kde/kfind-21.08.1-i586-1.txz: Upgraded.
kde/kfloppy-21.08.1-i586-1.txz: Upgraded.
kde/kfourinline-21.08.1-i586-1.txz: Upgraded.
kde/kgeography-21.08.1-i586-1.txz: Upgraded.
kde/kget-21.08.1-i586-1.txz: Upgraded.
kde/kgoldrunner-21.08.1-i586-1.txz: Upgraded.
kde/kgpg-21.08.1-i586-1.txz: Upgraded.
kde/khangman-21.08.1-i586-1.txz: Upgraded.
kde/khelpcenter-21.08.1-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.08.1-i586-1.txz: Upgraded.
kde/kig-21.08.1-i586-1.txz: Upgraded.
kde/kigo-21.08.1-i586-1.txz: Upgraded.
kde/kile-2.9.93-i586-11.txz: Rebuilt.
       Recompiled against poppler-21.09.0.
kde/killbots-21.08.1-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.08.1-i586-1.txz: Upgraded.
kde/kimap-21.08.1-i586-1.txz: Upgraded.
kde/kio-extras-21.08.1-i586-1.txz: Upgraded.
kde/kio-gdrive-21.08.1-i586-1.txz: Upgraded.
kde/kipi-plugins-21.08.1-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.08.1-i586-1.txz: Upgraded.
kde/kiriki-21.08.1-i586-1.txz: Upgraded.
kde/kiten-21.08.1-i586-1.txz: Upgraded.
kde/kitinerary-21.08.1-i586-1.txz: Upgraded.
kde/kjumpingcube-21.08.1-i586-1.txz: Upgraded.
kde/kldap-21.08.1-i586-1.txz: Upgraded.
kde/kleopatra-21.08.1-i586-1.txz: Upgraded.
kde/klickety-21.08.1-i586-1.txz: Upgraded.
kde/klines-21.08.1-i586-1.txz: Upgraded.
kde/kmag-21.08.1-i586-1.txz: Upgraded.
kde/kmahjongg-21.08.1-i586-1.txz: Upgraded.
kde/kmail-21.08.1-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.08.1-i586-1.txz: Upgraded.
kde/kmailtransport-21.08.1-i586-1.txz: Upgraded.
kde/kmbox-21.08.1-i586-1.txz: Upgraded.
kde/kmime-21.08.1-i586-1.txz: Upgraded.
kde/kmines-21.08.1-i586-1.txz: Upgraded.
kde/kmix-21.08.1-i586-1.txz: Upgraded.
kde/kmousetool-21.08.1-i586-1.txz: Upgraded.
kde/kmouth-21.08.1-i586-1.txz: Upgraded.
kde/kmplot-21.08.1-i586-1.txz: Upgraded.
kde/knavalbattle-21.08.1-i586-1.txz: Upgraded.
kde/knetwalk-21.08.1-i586-1.txz: Upgraded.
kde/knights-21.08.1-i586-1.txz: Upgraded.
kde/knotes-21.08.1-i586-1.txz: Upgraded.
kde/kolf-21.08.1-i586-1.txz: Upgraded.
kde/kollision-21.08.1-i586-1.txz: Upgraded.
kde/kolourpaint-21.08.1-i586-1.txz: Upgraded.
kde/kompare-21.08.1-i586-1.txz: Upgraded.
kde/konqueror-21.08.1-i586-1.txz: Upgraded.
kde/konquest-21.08.1-i586-1.txz: Upgraded.
kde/konsole-21.08.1-i586-1.txz: Upgraded.
kde/kontact-21.08.1-i586-1.txz: Upgraded.
kde/kontactinterface-21.08.1-i586-1.txz: Upgraded.
kde/kontrast-21.08.1-i586-1.txz: Upgraded.
kde/konversation-21.08.1-i586-1.txz: Upgraded.
kde/kopeninghours-21.08.1-i586-1.txz: Upgraded.
kde/kopete-21.08.1-i586-1.txz: Upgraded.
kde/korganizer-21.08.1-i586-1.txz: Upgraded.
kde/kosmindoormap-21.08.1-i586-1.txz: Upgraded.
kde/kpat-21.08.1-i586-1.txz: Upgraded.
kde/kpimtextedit-21.08.1-i586-1.txz: Upgraded.
kde/kpkpass-21.08.1-i586-1.txz: Upgraded.
kde/kpmcore-21.08.1-i586-1.txz: Upgraded.
kde/kpublictransport-21.08.1-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.08.1-i586-1.txz: Upgraded.
kde/krdc-21.08.1-i586-1.txz: Upgraded.
kde/kreversi-21.08.1-i586-1.txz: Upgraded.
kde/krfb-21.08.1-i586-1.txz: Upgraded.
kde/krita-4.4.8-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.09.0.
kde/kross-interpreters-21.08.1-i586-1.txz: Upgraded.
kde/kruler-21.08.1-i586-1.txz: Upgraded.
kde/kshisen-21.08.1-i586-1.txz: Upgraded.
kde/ksirk-21.08.1-i586-1.txz: Upgraded.
kde/ksmtp-21.08.1-i586-1.txz: Upgraded.
kde/ksnakeduel-21.08.1-i586-1.txz: Upgraded.
kde/kspaceduel-21.08.1-i586-1.txz: Upgraded.
kde/ksquares-21.08.1-i586-1.txz: Upgraded.
kde/ksudoku-21.08.1-i586-1.txz: Upgraded.
kde/ksystemlog-21.08.1-i586-1.txz: Upgraded.
kde/kteatime-21.08.1-i586-1.txz: Upgraded.
kde/ktimer-21.08.1-i586-1.txz: Upgraded.
kde/ktnef-21.08.1-i586-1.txz: Upgraded.
kde/ktorrent-21.08.1-i586-1.txz: Upgraded.
kde/ktouch-21.08.1-i586-1.txz: Upgraded.
kde/kturtle-21.08.1-i586-1.txz: Upgraded.
kde/kubrick-21.08.1-i586-1.txz: Upgraded.
kde/kwalletmanager-21.08.1-i586-1.txz: Upgraded.
kde/kwave-21.08.1-i586-1.txz: Upgraded.
kde/kwordquiz-21.08.1-i586-1.txz: Upgraded.
kde/libgravatar-21.08.1-i586-1.txz: Upgraded.
kde/libkcddb-21.08.1-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.08.1-i586-1.txz: Upgraded.
kde/libkdcraw-21.08.1-i586-1.txz: Upgraded.
kde/libkdegames-21.08.1-i586-1.txz: Upgraded.
kde/libkdepim-21.08.1-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.08.1-i586-1.txz: Upgraded.
kde/libkexiv2-21.08.1-i586-1.txz: Upgraded.
kde/libkgapi-21.08.1-i586-1.txz: Upgraded.
kde/libkipi-21.08.1-i586-1.txz: Upgraded.
kde/libkleo-21.08.1-i586-1.txz: Upgraded.
kde/libkmahjongg-21.08.1-i586-1.txz: Upgraded.
kde/libkomparediff2-21.08.1-i586-1.txz: Upgraded.
kde/libksane-21.08.1-i586-1.txz: Upgraded.
kde/libksieve-21.08.1-i586-1.txz: Upgraded.
kde/libktorrent-21.08.1-i586-1.txz: Upgraded.
kde/lokalize-21.08.1-i586-1.txz: Upgraded.
kde/lskat-21.08.1-i586-1.txz: Upgraded.
kde/mailcommon-21.08.1-i586-1.txz: Upgraded.
kde/mailimporter-21.08.1-i586-1.txz: Upgraded.
kde/marble-21.08.1-i586-1.txz: Upgraded.
kde/markdownpart-21.08.1-i586-1.txz: Upgraded.
kde/mbox-importer-21.08.1-i586-1.txz: Upgraded.
kde/messagelib-21.08.1-i586-1.txz: Upgraded.
kde/minuet-21.08.1-i586-1.txz: Upgraded.
kde/okular-21.08.1-i586-1.txz: Upgraded.
kde/palapeli-21.08.1-i586-1.txz: Upgraded.
kde/parley-21.08.1-i586-1.txz: Upgraded.
kde/partitionmanager-21.08.1-i586-1.txz: Upgraded.
kde/picmi-21.08.1-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.08.1-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.08.1-i586-1.txz: Upgraded.
kde/pimcommon-21.08.1-i586-1.txz: Upgraded.
kde/poxml-21.08.1-i586-1.txz: Upgraded.
kde/print-manager-21.08.1-i586-1.txz: Upgraded.
kde/rocs-21.08.1-i586-1.txz: Upgraded.
kde/skanlite-21.08.1-i586-1.txz: Upgraded.
kde/spectacle-21.08.1-i586-1.txz: Upgraded.
kde/step-21.08.1-i586-1.txz: Upgraded.
kde/svgpart-21.08.1-i586-1.txz: Upgraded.
kde/sweeper-21.08.1-i586-1.txz: Upgraded.
kde/umbrello-21.08.1-i586-1.txz: Upgraded.
kde/yakuake-21.08.1-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.08.1-i586-1.txz: Upgraded.
l/gdbm-1.21-i586-1.txz: Upgraded.
l/glib2-2.68.4-i586-3.txz: Rebuilt.
       /etc/profile.d/libglib2.csh: Don't use bash syntax. Thanks to theodore.s.
l/poppler-21.09.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-pillow-8.3.2-i586-1.txz: Upgraded.
+--------------------------+
Wed Sep 1 18:39:59 UTC 2021
a/util-linux-2.37.2-i586-2.txz: Rebuilt.
       Rebuild with --disable-raw since the raw driver has been removed from the
       kernel. Thanks to nobodino and SeB.
ap/vim-8.2.3394-i586-1.txz: Upgraded.
l/glib2-2.68.4-i586-2.txz: Rebuilt.
       Better detect UTF-8 locales in libglib2.sh and libglib2.csh.
       Thanks to Didier Spaier.
l/tidy-html5-5.8.0-i586-2.txz: Rebuilt.
       Fixed manpage installation. Thanks to kaott.
n/iproute2-5.14.0-i586-1.txz: Upgraded.
x/libwacom-1.12-i586-1.txz: Upgraded.
x/wayland-protocols-1.22-noarch-1.txz: Upgraded.
xap/vim-gvim-8.2.3394-i586-1.txz: Upgraded.
extra/sendmail/sendmail-8.17.1-i586-2.txz: Rebuilt.
       Rebuilt with -DUSE_EAI and -licui18n -licuuc -licudata added to
       site.config.m4 to support SMTPUTF8. Thanks to niksoggia.
extra/sendmail/sendmail-cf-8.17.1-noarch-2.txz: Rebuilt.
+--------------------------+
Tue Aug 31 20:58:13 UTC 2021
a/etc-15.0-i586-16.txz: Rebuilt.
       Added dhcpcd:dhcpcd (68:68) user and group. Thanks to Paul Blazejowski.
a/kernel-firmware-20210830_2e271f2-noarch-1.txz: Upgraded.
a/ntfs-3g-2021.8.22-i586-1.txz: Upgraded.
       Shared library .so-version bump.
       Fixed vulnerabilities that may allow an attacker using a maliciously
       crafted NTFS-formatted image file or external storage to potentially
       execute arbitrary privileged code.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263
       (* Security fix *)
d/mercurial-5.9.1-i586-1.txz: Upgraded.
d/python3-3.9.7-i586-1.txz: Upgraded.
kde/bluedevil-5.22.5-i586-1.txz: Upgraded.
kde/breeze-5.22.5-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.5-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.5-i586-1.txz: Upgraded.
kde/drkonqi-5.22.5-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.5-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.5-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.5-i586-1.txz: Upgraded.
kde/kdecoration-5.22.5-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.5-i586-1.txz: Upgraded.
kde/kgamma5-5.22.5-i586-1.txz: Upgraded.
kde/khotkeys-5.22.5-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.5-i586-1.txz: Upgraded.
kde/kmenuedit-5.22.5-i586-1.txz: Upgraded.
kde/kscreen-5.22.5-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.5-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.5-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.5-i586-1.txz: Upgraded.
kde/kwallet-pam-5.22.5-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.5-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.5-i586-1.txz: Upgraded.
kde/kwin-5.22.5-i586-1.txz: Upgraded.
kde/kwrited-5.22.5-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.5-i586-1.txz: Upgraded.
kde/libkscreen-5.22.5-i586-1.txz: Upgraded.
kde/libksysguard-5.22.5-i586-1.txz: Upgraded.
kde/milou-5.22.5-i586-1.txz: Upgraded.
kde/oxygen-5.22.5-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.5-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.5-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.5-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.5-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.5-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.5-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.5-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.5-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.5-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.5-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.5-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.5-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.5-i586-1.txz: Upgraded.
kde/powerdevil-5.22.5-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.5-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.5-i586-1.txz: Upgraded.
kde/systemsettings-5.22.5-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.5-i586-1.txz: Upgraded.
l/mozilla-nss-3.69.1-i586-1.txz: Upgraded.
xap/xlockmore-5.67-i586-1.txz: Upgraded.
+--------------------------+
Mon Aug 30 18:22:08 UTC 2021
a/etc-15.0-i586-15.txz: Rebuilt.
       /etc/profile: Don't define a $LESS variable, but provide a commented-out
       example of "-M -R". As far as I can tell, setting $LESS to -M is something
       that we picked up from SLS's /etc/profile at the very beginning and then
       kept it because it wasn't causing any problems. Personally, I'll be
       uncommenting this because it's nice to get the extra output from less
       provided by -M concerning your place in the file, but we'll leave it up
       to the end user how to handle this.
       Thanks to krown, marav, Lockywolf, and drgibbon.
a/kernel-generic-5.14.0-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.14.0_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.14.0-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.14.0_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.14.0-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.14.0_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.14.0_smp-x86-1.txz: Upgraded.
k/kernel-source-5.14.0_smp-noarch-1.txz: Upgraded.
l/libcap-2.55-i586-1.txz: Upgraded.
n/gnupg2-2.2.30-i586-1.txz: Upgraded.
n/proftpd-1.3.7c-i586-1.txz: Upgraded.
xap/xsnow-3.3.1-i586-1.txz: Upgraded.
extra/linux-5.14.0-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Aug 29 18:23:50 UTC 2021
ap/man-pages-5.13-noarch-1.txz: Upgraded.
d/binutils-2.37-i586-1.txz: Upgraded.
       With a few upstream patches to fix some regressions in the release, we no
       longer get any new FTBFS with this, so we'll take it.
d/oprofile-1.4.0-i586-8.txz: Rebuilt.
       Recompiled against binutils-2.37.
kde/sddm-0.19.0-i586-8.txz: Rebuilt.
       Patched to fix build.
l/libcap-2.54-i586-1.txz: Upgraded.
l/libssh-0.9.6-i586-1.txz: Upgraded.
       Fix possible heap-buffer overflow when rekeying with different key exchange
       mechanism.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
       (* Security fix *)
l/qt5-5.15.3_20210826_21ea9c12-i586-1.txz: Upgraded.
       Switched to the patched qt5 from https://invent.kde.org/qt/qt/qt5.git.
       Huge thanks to Heinz Wiesinger for the script to create a release tarball.
       Likely this fixes many security issues.
       (* Security fix *)
x/libglvnd-1.3.3-i586-1.txz: Upgraded.
       Reverted to this version because changes to the header files won't allow the
       EGL portions of Qt to properly compile.
+--------------------------+
Thu Aug 26 23:13:18 UTC 2021
a/kernel-generic-5.13.13-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.13_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.13-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.13_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.13-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.13_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.13_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.13_smp-noarch-1.txz: Upgraded.
l/iso-codes-4.7.0-noarch-1.txz: Upgraded.
l/pipewire-0.3.34-i586-1.txz: Upgraded.
xap/seamonkey-2.53.9-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.9
       (* Security fix *)
extra/linux-5.13.13-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Aug 25 20:32:43 UTC 2021
d/cmake-3.21.2-i586-1.txz: Upgraded.
d/gcc-11.2.0-i586-2.txz: Rebuilt.
d/gcc-brig-11.2.0-i586-2.txz: Rebuilt.
d/gcc-g++-11.2.0-i586-2.txz: Rebuilt.
d/gcc-gdc-11.2.0-i586-2.txz: Rebuilt.
d/gcc-gfortran-11.2.0-i586-2.txz: Rebuilt.
d/gcc-gnat-11.2.0-i586-2.txz: Rebuilt.
d/gcc-go-11.2.0-i586-2.txz: Rebuilt.
       [PATCH] compiler: correct condition for calling memclrHasPointers
       This fixes bootstrapping golang 1.17 with gcc-go.
       Thanks to Heinz Wiesinger.
d/gcc-objc-11.2.0-i586-2.txz: Rebuilt.
kde/latte-dock-0.10.1-i586-1.txz: Upgraded.
n/mutt-2.1.2-i586-1.txz: Upgraded.
n/php-7.4.23-i586-1.txz: Upgraded.
x/ibus-table-1.14.1-i586-1.txz: Upgraded.
x/libglvnd-1.3.4-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.0.3-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.0.3/releasenotes/
extra/php8/php8-8.0.10-i586-1.txz: Upgraded.
+--------------------------+
Tue Aug 24 19:40:54 UTC 2021
a/openssl-solibs-1.1.1l-i586-1.txz: Upgraded.
kde/krita-4.4.8-i586-1.txz: Upgraded.
l/json-glib-1.6.6-i586-1.txz: Upgraded.
l/libarchive-3.5.2-i586-1.txz: Upgraded.
n/bluez-5.61-i586-1.txz: Upgraded.
n/openssl-1.1.1l-i586-1.txz: Upgraded.
       Fixed an SM2 Decryption Buffer Overflow.
       Fixed various read buffer overruns processing ASN.1 strings.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
       (* Security fix *)
n/samba-4.14.7-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.0.2-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.0.2/releasenotes/
+--------------------------+
Mon Aug 23 20:05:36 UTC 2021
d/parallel-20210822-noarch-1.txz: Upgraded.
l/imagemagick-7.1.0_5-i586-1.txz: Upgraded.
l/pulseaudio-15.0-i586-3.txz: Rebuilt.
       Build module-gsettings.so. Thanks to SeB.
l/python2-module-collection-2.7.18-i586-6.txz: Rebuilt.
       Restored pycairo.h and pycairo.pc. Thanks to nobodino.
n/libgcrypt-1.9.4-i586-1.txz: Upgraded.
       Fix Elgamal encryption for other implementations.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
       (* Security fix *)
t/fig2dev-3.2.8b-i586-1.txz: Upgraded.
t/xfig-3.2.8b-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.0.1-i686-2.txz: Rebuilt.
       Rebuilt with: --with-unsigned-addon-scopes=app,system --allow-addon-sideload
xap/mozilla-thunderbird-91.0.2-i686-2.txz: Rebuilt.
       Rebuilt with "export MOZ_REQUIRE_SIGNING=" to fix add-ons and language packs.
       Thanks to marav.
+--------------------------+
Sun Aug 22 18:53:28 UTC 2021
d/help2man-1.48.5-i586-1.txz: Upgraded.
x/mesa-21.2.1-i586-1.txz: Upgraded.
       21.2.x has some important bug fixes, and there's still time to test, so...
+--------------------------+
Sat Aug 21 18:57:13 UTC 2021
a/upower-0.99.13-i586-1.txz: Upgraded.
a/xfsprogs-5.13.0-i586-1.txz: Upgraded.
l/freetype-2.11.0-i586-2.txz: Rebuilt.
       Restore quiet no-op rendering of bitmap glyphs.
+--------------------------+
Sat Aug 21 04:38:34 UTC 2021
a/e2fsprogs-1.46.4-i586-1.txz: Upgraded.
d/ccache-4.4-i586-1.txz: Upgraded.
d/mercurial-5.9-i586-1.txz: Upgraded.
kde/konsole-21.08.0-i586-3.txz: Rebuilt.
       Merged another upstream patch for the case where there is no konsolerc.
l/glib2-2.68.4-i586-1.txz: Upgraded.
l/gnu-efi-3.0.14-i586-1.txz: Upgraded.
n/libmilter-8.17.1-i586-1.txz: Upgraded.
n/nftables-1.0.0-i586-1.txz: Upgraded.
n/openssh-8.7p1-i586-1.txz: Upgraded.
x/ibus-1.5.25-i586-1.txz: Upgraded.
x/ibus-anthy-1.5.13-i586-1.txz: Upgraded.
xap/libnma-1.8.32-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-91.0.2-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.0.2/releasenotes/
xap/pavucontrol-5.0-i586-1.txz: Upgraded.
+--------------------------+
Thu Aug 19 18:54:03 UTC 2021
a/cryptsetup-2.4.0-i586-1.txz: Upgraded.
ap/cups-filters-1.28.10-i586-1.txz: Upgraded.
d/doxygen-1.9.2-i586-1.txz: Upgraded.
kde/akonadi-search-21.08.0-i586-2.txz: Rebuilt.
       Rebuilt against recompiled xapian-core package.
kde/akonadiconsole-21.08.0-i586-2.txz: Rebuilt.
       Rebuilt against recompiled xapian-core package.
kde/khelpcenter-21.08.0-i586-2.txz: Rebuilt.
       Rebuilt against recompiled xapian-core package.
l/harfbuzz-2.9.0-i586-1.txz: Upgraded.
       Looking over the changes, they appear to be safe enough and/or mostly
       bugfixes, so we'll take this. If it breaks anything, please report.
l/json-glib-1.6.4-i586-1.txz: Upgraded.
l/ocl-icd-2.3.1-i586-1.txz: Upgraded.
l/pango-1.48.9-i586-1.txz: Upgraded.
l/pycurl-7.44.1-i586-1.txz: Upgraded.
l/xapian-core-1.4.18-i586-4.txz: Rebuilt.
       Rebuilt with gcc-11.2.0 per doxygen warning.
n/NetworkManager-1.32.10-i586-1.txz: Upgraded.
xap/network-manager-applet-1.24.0-i586-1.txz: Upgraded.
extra/sendmail/sendmail-8.17.1-i586-1.txz: Upgraded.
extra/sendmail/sendmail-cf-8.17.1-noarch-1.txz: Upgraded.
+--------------------------+
Thu Aug 19 05:17:32 UTC 2021
a/aaa_libraries-15.0-i586-9.txz: Rebuilt.
       Fixed wrong version of libasound.so.2.0.0.
       Thanks to Eduardo Charquero and PiterPunk.
a/kernel-firmware-20210818_c46b8c3-noarch-1.txz: Upgraded.
a/kernel-generic-5.13.12-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.12_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.12-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.12_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.12-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.12_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.12_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.12_smp-noarch-1.txz: Upgraded.
kde/konsole-21.08.0-i586-2.txz: Rebuilt.
       Patched to fix konsole size and toolbars. Thanks to alienBOB and PiterPunk.
n/bind-9.16.20-i586-1.txz: Upgraded.
       This update fixes bugs and the following security issue:
       An assertion failure occurred when named attempted to send a UDP packet that
       exceeded the MTU size, if Response Rate Limiting (RRL) was enabled.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25218
       (* Security fix *)
extra/linux-5.13.12-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Aug 17 20:08:40 UTC 2021
a/aaa_glibc-solibs-2.33-i586-4.txz: Rebuilt.
a/util-linux-2.37.2-i586-1.txz: Upgraded.
d/git-2.33.0-i586-1.txz: Upgraded.
d/vala-0.52.5-i586-1.txz: Upgraded.
l/gexiv2-0.12.3-i586-1.txz: Upgraded.
l/glibc-2.33-i586-4.txz: Rebuilt.
       In librt, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain
       NOTIFY_REMOVED data, leading to a NULL pointer dereference.
       NOTE: this vulnerability was introduced as a side effect of the
       CVE-2021-33574 fix.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604
       (* Security fix *)
l/glibc-i18n-2.33-i586-4.txz: Rebuilt.
l/glibc-profile-2.33-i586-4.txz: Rebuilt.
l/libcap-2.53-i586-1.txz: Upgraded.
l/python2-module-collection-2.7.18-i586-5.txz: Rebuilt.
       Added dbus-python-1.2.16.
n/ModemManager-1.16.10-i586-1.txz: Upgraded.
n/NetworkManager-1.32.8-i586-1.txz: Upgraded.
n/stunnel-5.60-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.0.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.0.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-37/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29991
       (* Security fix *)
xap/mozilla-thunderbird-91.0.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.0.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-37/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29991
       (* Security fix *)
+--------------------------+
Mon Aug 16 05:28:16 UTC 2021
Hey everyone, long time no see! No, I wasn't out fishing. Sadly, I haven't had
a fishing rod in my hand (or even a fishing license in my wallet) for this
entire season, but there may yet be a chance for that this year. Along with the
usual suspects, I've been trying to clear out the list of things that needed
to get done in order to reach the standard of excellence demanded from a
Slackware release, and I think we've gotten it pretty close. GCC was bumped to
version 11.2.0 (because we just can't send this out 2 versions behind), and
everything was verified to build properly or fixed up so that it did. I don't
see any benefit to another public mass rebuild, so we're not going to do one.
Anyway, without further ado, here is Slackware 15.0 release candidate one.
Consider most things frozen and the focus now to be any remaining blocker bugs.
We'll more than likely take that next Plasma bugfix release, but it's soon
time to get off this treadmill. Enjoy! :-)
a/aaa_libraries-15.0-i586-8.txz: Rebuilt.
       Upgraded: libcap.so.2.52, libpcre.so.1.2.13, libboost_atomic.so.1.76.0,
       libboost_chrono.so.1.76.0, libboost_container.so.1.76.0,
       libboost_context.so.1.76.0, libboost_contract.so.1.76.0,
       libboost_coroutine.so.1.76.0, libboost_date_time.so.1.76.0,
       libboost_fiber.so.1.76.0, libboost_filesystem.so.1.76.0,
       libboost_graph.so.1.76.0, libboost_iostreams.so.1.76.0,
       libboost_json.so.1.76.0, libboost_locale.so.1.76.0, libboost_log.so.1.76.0,
       libboost_log_setup.so.1.76.0, libboost_math_c99.so.1.76.0,
       libboost_math_c99f.so.1.76.0, libboost_math_c99l.so.1.76.0,
       libboost_math_tr1.so.1.76.0, libboost_math_tr1f.so.1.76.0,
       libboost_math_tr1l.so.1.76.0, libboost_nowide.so.1.76.0,
       libboost_prg_exec_monitor.so.1.76.0, libboost_program_options.so.1.76.0,
       libboost_python27.so.1.76.0, libboost_python39.so.1.76.0,
       libboost_random.so.1.76.0, libboost_regex.so.1.76.0,
       libboost_serialization.so.1.76.0, libboost_stacktrace_addr2line.so.1.76.0,
       libboost_stacktrace_basic.so.1.76.0, libboost_stacktrace_noop.so.1.76.0,
       libboost_system.so.1.76.0, libboost_thread.so.1.76.0,
       libboost_timer.so.1.76.0, libboost_type_erasure.so.1.76.0,
       libboost_unit_test_framework.so.1.76.0, libboost_wave.so.1.76.0,
       libboost_wserialization.so.1.76.0, libcares.so.2.4.3,
       libglib-2.0.so.0.6800.3, libgmodule-2.0.so.0.6800.3,
       libgobject-2.0.so.0.6800.3, libgthread-2.0.so.0.6800.3,
       libidn.so.12.6.3, liblber-2.4.so.2.11.7, libldap-2.4.so.2.11.7,
       libstdc++.so.6.0.29, libtdb.so.1.4.5.
a/grep-3.7-i586-1.txz: Upgraded.
a/kernel-firmware-20210812_24c4a85-noarch-1.txz: Upgraded.
a/kernel-generic-5.13.11-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.11_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.11-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.11_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.11-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.11_smp-i686-1.txz: Upgraded.
a/libgudev-237-i586-1.txz: Upgraded.
a/lvm2-2.03.13-i586-1.txz: Upgraded.
ap/linuxdoc-tools-0.9.82-i586-1.txz: Upgraded.
       Thanks to Stuart Winter.
ap/mariadb-10.5.12-i586-1.txz: Upgraded.
       Looks like we're still hitting a few regressions in the 10.6 branch. The
       most obvious one where the version reported by MariaDB is the library
       version rather than the server version (as previously reported) could be
       reverted, but this could lead to future problems as fixes for this
       change land in other projects. It seems that the safest approach at this
       time is to switch back to the most recent release from the 10.5 branch
       and keep an eye on the situation.
       Thanks to richarson and Heinz Wiesinger.
ap/mc-4.8.27-i586-1.txz: Upgraded.
ap/pamixer-1.4-i586-11.txz: Rebuilt.
       Recompiled against boost-1.77.0.
ap/slackpkg-15.0.7-noarch-1.txz: Upgraded.
       Remove ftp://spout.ussg.indiana.edu from mirrorlist.
       Allow "slackpkg help" to work after slackpkg is upgraded (JK Wood).
       Thanks to Robby Workman.
ap/squashfs-tools-4.5-i586-1.txz: Upgraded.
ap/vim-8.2.3352-i586-1.txz: Upgraded.
d/gcc-11.2.0-i586-1.txz: Upgraded.
d/gcc-brig-11.2.0-i586-1.txz: Upgraded.
d/gcc-g++-11.2.0-i586-1.txz: Upgraded.
d/gcc-gdc-11.2.0-i586-1.txz: Upgraded.
d/gcc-gfortran-11.2.0-i586-1.txz: Upgraded.
d/gcc-gnat-11.2.0-i586-1.txz: Upgraded.
d/gcc-go-11.2.0-i586-1.txz: Upgraded.
d/gcc-objc-11.2.0-i586-1.txz: Upgraded.
d/help2man-1.48.4-i586-1.txz: Upgraded.
d/kernel-headers-5.13.11_smp-x86-1.txz: Upgraded.
d/libtool-2.4.6-i586-18.txz: Rebuilt.
       Recompiled to update embedded GCC version number.
d/meson-0.58.2-i586-1.txz: Upgraded.
d/parallel-20210722-noarch-1.txz: Upgraded.
d/python-pip-21.2.4-i586-1.txz: Upgraded.
d/slacktrack-2.21-i586-1.txz: Upgraded.
       Thanks to Stuart Winter.
k/kernel-source-5.13.11_smp-noarch-1.txz: Upgraded.
       CC_VERSION_TEXT "gcc (GCC) 10.3.0" -> "gcc (GCC) 11.2.0"
       GCC_VERSION 100300 -> 110200
       +CC_HAS_ASM_GOTO_OUTPUT y
       +HAVE_KCSAN_COMPILER y
       +SND_SOC_INTEL_HDA_DSP_COMMON m
       +SND_SOC_INTEL_SOF_MAXIM_COMMON m
kde/akonadi-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-mime-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-notes-21.08.0-i586-1.txz: Upgraded.
kde/akonadi-search-21.08.0-i586-1.txz: Upgraded.
kde/akonadiconsole-21.08.0-i586-1.txz: Upgraded.
kde/akregator-21.08.0-i586-1.txz: Upgraded.
kde/analitza-21.08.0-i586-1.txz: Upgraded.
kde/ark-21.08.0-i586-1.txz: Upgraded.
kde/artikulate-21.08.0-i586-1.txz: Upgraded.
kde/attica-5.85.0-i586-1.txz: Upgraded.
kde/audiocd-kio-21.08.0-i586-1.txz: Upgraded.
kde/baloo-5.85.0-i586-1.txz: Upgraded.
kde/baloo-widgets-21.08.0-i586-1.txz: Upgraded.
kde/blinken-21.08.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.85.0-i586-1.txz: Upgraded.
kde/bomber-21.08.0-i586-1.txz: Upgraded.
kde/bovo-21.08.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.85.0-noarch-1.txz: Upgraded.
kde/calendarsupport-21.08.0-i586-1.txz: Upgraded.
kde/cantor-21.08.0-i586-1.txz: Upgraded.
kde/cervisia-21.08.0-i586-1.txz: Upgraded.
kde/dolphin-21.08.0-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.08.0-i586-1.txz: Upgraded.
kde/dragon-21.08.0-i586-1.txz: Upgraded.
kde/elisa-21.08.0-i586-1.txz: Upgraded.
kde/eventviews-21.08.0-i586-1.txz: Upgraded.
kde/extra-cmake-modules-5.85.0-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.08.0-i586-1.txz: Upgraded.
kde/filelight-21.08.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.85.0-i586-1.txz: Upgraded.
kde/granatier-21.08.0-i586-1.txz: Upgraded.
kde/grantlee-editor-21.08.0-i586-1.txz: Upgraded.
kde/grantleetheme-21.08.0-i586-1.txz: Upgraded.
kde/gwenview-21.08.0-i586-1.txz: Upgraded.
kde/incidenceeditor-21.08.0-i586-1.txz: Upgraded.
kde/itinerary-21.08.0-i586-1.txz: Upgraded.
kde/juk-21.08.0-i586-1.txz: Upgraded.
kde/k3b-21.08.0-i586-1.txz: Upgraded.
kde/kactivities-5.85.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.85.0-i586-1.txz: Upgraded.
kde/kaddressbook-21.08.0-i586-1.txz: Upgraded.
kde/kalarm-21.08.0-i586-1.txz: Upgraded.
kde/kalarmcal-21.08.0-i586-1.txz: Upgraded.
kde/kalgebra-21.08.0-i586-1.txz: Upgraded.
kde/kalzium-21.08.0-i586-1.txz: Upgraded.
kde/kamera-21.08.0-i586-1.txz: Upgraded.
kde/kamoso-21.08.0-i586-1.txz: Upgraded.
kde/kanagram-21.08.0-i586-1.txz: Upgraded.
kde/kapidox-5.85.0-i586-1.txz: Upgraded.
kde/kapman-21.08.0-i586-1.txz: Upgraded.
kde/kapptemplate-21.08.0-i586-1.txz: Upgraded.
kde/karchive-5.85.0-i586-1.txz: Upgraded.
kde/kate-21.08.0-i586-1.txz: Upgraded.
kde/katomic-21.08.0-i586-1.txz: Upgraded.
kde/kauth-5.85.0-i586-1.txz: Upgraded.
kde/kbackup-21.08.0-i586-1.txz: Upgraded.
kde/kblackbox-21.08.0-i586-1.txz: Upgraded.
kde/kblocks-21.08.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.85.0-i586-1.txz: Upgraded.
kde/kbounce-21.08.0-i586-1.txz: Upgraded.
kde/kbreakout-21.08.0-i586-1.txz: Upgraded.
kde/kbruch-21.08.0-i586-1.txz: Upgraded.
kde/kcachegrind-21.08.0-i586-1.txz: Upgraded.
kde/kcalc-21.08.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.85.0-i586-1.txz: Upgraded.
kde/kcalutils-21.08.0-i586-1.txz: Upgraded.
kde/kcharselect-21.08.0-i586-1.txz: Upgraded.
kde/kcmutils-5.85.0-i586-1.txz: Upgraded.
kde/kcodecs-5.85.0-i586-1.txz: Upgraded.
kde/kcolorchooser-21.08.0-i586-1.txz: Upgraded.
kde/kcompletion-5.85.0-i586-1.txz: Upgraded.
kde/kconfig-5.85.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.85.0-i586-1.txz: Upgraded.
kde/kcontacts-5.85.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.85.0-i586-1.txz: Upgraded.
kde/kcrash-5.85.0-i586-1.txz: Upgraded.
kde/kcron-21.08.0-i586-1.txz: Upgraded.
kde/kdav-5.85.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.85.0-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.08.0-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.08.0-i586-1.txz: Upgraded.
kde/kdebugsettings-21.08.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.85.0-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.08.0-i586-1.txz: Upgraded.
kde/kded-5.85.0-i586-1.txz: Upgraded.
kde/kdeedu-data-21.08.0-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.08.0-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.08.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.85.0-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.08.0-i586-1.txz: Upgraded.
kde/kdenlive-21.08.0-i586-1.txz: Upgraded.
kde/kdepim-addons-21.08.0-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.08.0-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.08.0-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.08.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.85.0-i586-1.txz: Upgraded.
kde/kdesu-5.85.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.85.0-i586-1.txz: Upgraded.
kde/kdf-21.08.0-i586-1.txz: Upgraded.
kde/kdialog-21.08.0-i586-1.txz: Upgraded.
kde/kdiamond-21.08.0-i586-1.txz: Upgraded.
kde/kdnssd-5.85.0-i586-1.txz: Upgraded.
kde/kdoctools-5.85.0-i586-1.txz: Upgraded.
kde/keditbookmarks-21.08.0-i586-1.txz: Upgraded.
kde/kemoticons-5.85.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.85.0-i586-1.txz: Upgraded.
kde/kfind-21.08.0-i586-1.txz: Upgraded.
kde/kfloppy-21.08.0-i586-1.txz: Upgraded.
kde/kfourinline-21.08.0-i586-1.txz: Upgraded.
kde/kgeography-21.08.0-i586-1.txz: Upgraded.
kde/kget-21.08.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.85.0-i586-1.txz: Upgraded.
kde/kgoldrunner-21.08.0-i586-1.txz: Upgraded.
kde/kgpg-21.08.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.85.0-i586-1.txz: Upgraded.
kde/khangman-21.08.0-i586-1.txz: Upgraded.
kde/khelpcenter-21.08.0-i586-1.txz: Upgraded.
kde/kholidays-5.85.0-i586-1.txz: Upgraded.
kde/khtml-5.85.0-i586-1.txz: Upgraded.
kde/ki18n-5.85.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.85.0-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.08.0-i586-1.txz: Upgraded.
kde/kidletime-5.85.0-i586-1.txz: Upgraded.
kde/kig-21.08.0-i586-1.txz: Upgraded.
kde/kigo-21.08.0-i586-1.txz: Upgraded.
kde/killbots-21.08.0-i586-1.txz: Upgraded.
kde/kimageformats-5.85.0-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.08.0-i586-1.txz: Upgraded.
kde/kimap-21.08.0-i586-1.txz: Upgraded.
kde/kinit-5.85.0-i586-1.txz: Upgraded.
kde/kio-5.85.0-i586-1.txz: Upgraded.
kde/kio-extras-21.08.0-i586-1.txz: Upgraded.
kde/kio-gdrive-21.08.0-i586-1.txz: Upgraded.
kde/kipi-plugins-21.08.0-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.08.0-i586-1.txz: Upgraded.
kde/kirigami2-5.85.0-i586-1.txz: Upgraded.
kde/kiriki-21.08.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.85.0-i586-1.txz: Upgraded.
kde/kitemviews-5.85.0-i586-1.txz: Upgraded.
kde/kiten-21.08.0-i586-1.txz: Upgraded.
kde/kitinerary-21.08.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.85.0-i586-1.txz: Upgraded.
kde/kjs-5.85.0-i586-1.txz: Upgraded.
kde/kjsembed-5.85.0-i586-1.txz: Upgraded.
kde/kjumpingcube-21.08.0-i586-1.txz: Upgraded.
kde/kldap-21.08.0-i586-1.txz: Upgraded.
kde/kleopatra-21.08.0-i586-1.txz: Upgraded.
kde/klickety-21.08.0-i586-1.txz: Upgraded.
kde/klines-21.08.0-i586-1.txz: Upgraded.
kde/kmag-21.08.0-i586-1.txz: Upgraded.
kde/kmahjongg-21.08.0-i586-1.txz: Upgraded.
kde/kmail-21.08.0-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.08.0-i586-1.txz: Upgraded.
kde/kmailtransport-21.08.0-i586-1.txz: Upgraded.
kde/kmbox-21.08.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.85.0-i586-1.txz: Upgraded.
kde/kmime-21.08.0-i586-1.txz: Upgraded.
kde/kmines-21.08.0-i586-1.txz: Upgraded.
kde/kmix-21.08.0-i586-1.txz: Upgraded.
kde/kmousetool-21.08.0-i586-1.txz: Upgraded.
kde/kmouth-21.08.0-i586-1.txz: Upgraded.
kde/kmplot-21.08.0-i586-1.txz: Upgraded.
kde/knavalbattle-21.08.0-i586-1.txz: Upgraded.
kde/knetwalk-21.08.0-i586-1.txz: Upgraded.
kde/knewstuff-5.85.0-i586-1.txz: Upgraded.
kde/knights-21.08.0-i586-1.txz: Upgraded.
kde/knotes-21.08.0-i586-1.txz: Upgraded.
kde/knotifications-5.85.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.85.0-i586-1.txz: Upgraded.
kde/kolf-21.08.0-i586-1.txz: Upgraded.
kde/kollision-21.08.0-i586-1.txz: Upgraded.
kde/kolourpaint-21.08.0-i586-1.txz: Upgraded.
kde/kompare-21.08.0-i586-1.txz: Upgraded.
kde/konqueror-21.08.0-i586-1.txz: Upgraded.
kde/konquest-21.08.0-i586-1.txz: Upgraded.
kde/konsole-21.08.0-i586-1.txz: Upgraded.
kde/kontact-21.08.0-i586-1.txz: Upgraded.
kde/kontactinterface-21.08.0-i586-1.txz: Upgraded.
kde/kontrast-21.08.0-i586-1.txz: Upgraded.
kde/konversation-21.08.0-i586-1.txz: Upgraded.
kde/kopeninghours-21.08.0-i586-1.txz: Upgraded.
kde/kopete-21.08.0-i586-1.txz: Upgraded.
kde/korganizer-21.08.0-i586-1.txz: Upgraded.
kde/kosmindoormap-21.08.0-i586-1.txz: Upgraded.
kde/kpackage-5.85.0-i586-1.txz: Upgraded.
kde/kparts-5.85.0-i586-1.txz: Upgraded.
kde/kpat-21.08.0-i586-1.txz: Upgraded.
kde/kpeople-5.85.0-i586-1.txz: Upgraded.
kde/kpimtextedit-21.08.0-i586-1.txz: Upgraded.
kde/kpkpass-21.08.0-i586-1.txz: Upgraded.
kde/kplotting-5.85.0-i586-1.txz: Upgraded.
kde/kpmcore-21.08.0-i586-1.txz: Upgraded.
kde/kpty-5.85.0-i586-1.txz: Upgraded.
kde/kpublictransport-21.08.0-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.08.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.85.0-i586-1.txz: Upgraded.
kde/krdc-21.08.0-i586-1.txz: Upgraded.
kde/kreversi-21.08.0-i586-1.txz: Upgraded.
kde/krfb-21.08.0-i586-1.txz: Upgraded.
kde/krita-4.4.7-i586-2.txz: Rebuilt.
       Recompiled against boost-1.77.0.
kde/kross-5.85.0-i586-1.txz: Upgraded.
kde/kross-interpreters-21.08.0-i586-1.txz: Upgraded.
kde/kruler-21.08.0-i586-1.txz: Upgraded.
kde/krunner-5.85.0-i586-1.txz: Upgraded.
kde/kservice-5.85.0-i586-1.txz: Upgraded.
kde/kshisen-21.08.0-i586-1.txz: Upgraded.
kde/ksirk-21.08.0-i586-1.txz: Upgraded.
kde/ksmtp-21.08.0-i586-1.txz: Upgraded.
kde/ksnakeduel-21.08.0-i586-1.txz: Upgraded.
kde/kspaceduel-21.08.0-i586-1.txz: Upgraded.
kde/ksquares-21.08.0-i586-1.txz: Upgraded.
kde/ksudoku-21.08.0-i586-1.txz: Upgraded.
kde/ksystemlog-21.08.0-i586-1.txz: Upgraded.
kde/kteatime-21.08.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.85.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.85.0-i586-1.txz: Upgraded.
kde/ktimer-21.08.0-i586-1.txz: Upgraded.
kde/ktnef-21.08.0-i586-1.txz: Upgraded.
kde/ktorrent-21.08.0-i586-1.txz: Upgraded.
kde/ktouch-21.08.0-i586-1.txz: Upgraded.
kde/kturtle-21.08.0-i586-1.txz: Upgraded.
kde/kubrick-21.08.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.85.0-i586-1.txz: Upgraded.
kde/kwallet-5.85.0-i586-1.txz: Upgraded.
kde/kwalletmanager-21.08.0-i586-1.txz: Upgraded.
kde/kwave-21.08.0-i586-1.txz: Upgraded.
kde/kwayland-5.85.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.85.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.85.0-i586-1.txz: Upgraded.
kde/kwordquiz-21.08.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.85.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.85.0-i586-1.txz: Upgraded.
kde/latte-dock-0.10.0-i586-1.txz: Upgraded.
kde/libgravatar-21.08.0-i586-1.txz: Upgraded.
kde/libkcddb-21.08.0-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.08.0-i586-1.txz: Upgraded.
kde/libkdcraw-21.08.0-i586-1.txz: Upgraded.
kde/libkdegames-21.08.0-i586-1.txz: Upgraded.
kde/libkdepim-21.08.0-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.08.0-i586-1.txz: Upgraded.
kde/libkexiv2-21.08.0-i586-1.txz: Upgraded.
kde/libkgapi-21.08.0-i586-1.txz: Upgraded.
kde/libkipi-21.08.0-i586-1.txz: Upgraded.
kde/libkleo-21.08.0-i586-1.txz: Upgraded.
kde/libkmahjongg-21.08.0-i586-1.txz: Upgraded.
kde/libkomparediff2-21.08.0-i586-1.txz: Upgraded.
kde/libksane-21.08.0-i586-1.txz: Upgraded.
kde/libksieve-21.08.0-i586-1.txz: Upgraded.
kde/libktorrent-21.08.0-i586-1.txz: Upgraded.
kde/lokalize-21.08.0-i586-1.txz: Upgraded.
kde/lskat-21.08.0-i586-1.txz: Upgraded.
kde/mailcommon-21.08.0-i586-1.txz: Upgraded.
kde/mailimporter-21.08.0-i586-1.txz: Upgraded.
kde/marble-21.08.0-i586-1.txz: Upgraded.
kde/markdownpart-21.08.0-i586-1.txz: Upgraded.
kde/mbox-importer-21.08.0-i586-1.txz: Upgraded.
kde/messagelib-21.08.0-i586-1.txz: Upgraded.
kde/minuet-21.08.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.85.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.85.0-i586-1.txz: Upgraded.
kde/okular-21.08.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.85.0-noarch-1.txz: Upgraded.
kde/palapeli-21.08.0-i586-1.txz: Upgraded.
kde/parley-21.08.0-i586-1.txz: Upgraded.
kde/partitionmanager-21.08.0-i586-1.txz: Upgraded.
kde/picmi-21.08.0-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.08.0-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.08.0-i586-1.txz: Upgraded.
kde/pimcommon-21.08.0-i586-1.txz: Upgraded.
kde/plasma-framework-5.85.0-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.4-i586-2.txz: Rebuilt.
       Recompiled against libqalculate-3.20.1.
kde/poxml-21.08.0-i586-1.txz: Upgraded.
kde/print-manager-21.08.0-i586-1.txz: Upgraded.
kde/prison-5.85.0-i586-1.txz: Upgraded.
kde/purpose-5.85.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.85.0-i586-1.txz: Upgraded.
kde/rocs-21.08.0-i586-1.txz: Upgraded.
kde/skanlite-21.08.0-i586-3.txz: Rebuilt.
kde/solid-5.85.0-i586-1.txz: Upgraded.
kde/sonnet-5.85.0-i586-1.txz: Upgraded.
kde/spectacle-21.08.0-i586-1.txz: Upgraded.
kde/step-21.08.0-i586-1.txz: Upgraded.
kde/svgpart-21.08.0-i586-1.txz: Upgraded.
kde/sweeper-21.08.0-i586-1.txz: Upgraded.
kde/syndication-5.85.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.85.0-i586-1.txz: Upgraded.
kde/threadweaver-5.85.0-i586-1.txz: Upgraded.
kde/umbrello-21.08.0-i586-1.txz: Upgraded.
kde/yakuake-21.08.0-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.08.0-i586-1.txz: Upgraded.
l/SDL2-2.0.16-i586-1.txz: Upgraded.
l/atkmm-2.28.2-i586-1.txz: Upgraded.
l/boost-1.77.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/cryfs-0.10.3-i586-3.txz: Rebuilt.
       Patched for gcc11 and recompiled against boost-1.77.0.
l/enchant-2.3.1-i586-1.txz: Upgraded.
l/gjs-1.68.3-i586-1.txz: Upgraded.
l/gtk4-4.2.1-i586-1.txz: Added.
l/gtkmm3-3.24.5-i586-1.txz: Upgraded.
l/libjpeg-turbo-2.1.1-i586-1.txz: Upgraded.
l/libqalculate-3.20.1-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/libwebp-1.2.1-i586-1.txz: Upgraded.
l/mlt-7.0.1-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/mozilla-nss-3.69-i586-1.txz: Upgraded.
l/mozjs78-78.13.0esr-i586-1.txz: Upgraded.
l/netpbm-10.95.01-i586-1.txz: Upgraded.
l/ocl-icd-2.3.0-i586-2.txz: Rebuilt.
       Patched to support the latest Khronos headers.
l/openexr-2.5.7-i586-2.txz: Rebuilt.
       Recompiled against boost-1.77.0.
l/pango-1.48.8-i586-1.txz: Upgraded.
l/pulseaudio-15.0-i586-2.txz: Rebuilt.
       Ensure that start-pulseaudio-x11 is generated properly when pulseaudio is
       built using meson. Thanks to davjohn.
l/python-pygments-2.10.0-i586-1.txz: Upgraded.
l/qt5-5.15.2-i586-11.txz: Rebuilt.
       Patched to compile with gcc11 (such as adding #include <limits> to some of
       the header files shipped in the package).
l/tidy-html5-5.8.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
n/ModemManager-1.16.8-i586-1.txz: Upgraded.
n/NetworkManager-1.32.6-i586-1.txz: Upgraded.
n/c-ares-1.17.2-i586-1.txz: Upgraded.
       This update fixes a security issue:
       Missing input validation on hostnames returned by DNS servers.
       For more information, see:
       https://c-ares.haxx.se/adv_20210810.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672
       (* Security fix *)
n/dhcpcd-9.4.0-i586-1.txz: Upgraded.
n/fetchmail-6.4.21-i586-1.txz: Upgraded.
n/nmap-7.92-i586-1.txz: Upgraded.
n/openresolv-3.12.0-noarch-1.txz: Added.
       This is needed for wg-quick in the wireguard-tools package.
       Thanks to synbq Bucharest, Jeremy Hansen, and Daniel Wilkins.
n/php-7.4.22-i586-2.txz: Rebuilt.
       Recompiled against tidy-html5-5.8.0.
x/ibus-m17n-1.4.7-i586-1.txz: Upgraded.
x/libepoxy-1.5.9-i586-1.txz: Upgraded.
x/mesa-21.1.7-i586-1.txz: Upgraded.
x/vulkan-sdk-1.2.176.1-i586-2.txz: Rebuilt.
x/xrdb-1.2.1-i586-1.txz: Upgraded.
xap/mozilla-firefox-91.0-i686-1.txz: Upgraded.
       New ESR release :-)
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/91.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-33/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29981
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29983
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29987
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29982
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29990
       (* Security fix *)
xap/mozilla-thunderbird-91.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/91.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-36/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29981
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29987
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29982
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989
       (* Security fix *)
xap/network-manager-applet-1.22.0-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.3352-i586-1.txz: Upgraded.
extra/linux-5.13.11-nosmp-sdk/*: Upgraded.
extra/php8/php8-8.0.9-i586-2.txz: Rebuilt.
       Recompiled against tidy-html5-5.8.0.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Aug 7 19:04:04 UTC 2021
a/aaa_glibc-solibs-2.33-i586-3.txz: Rebuilt.
a/usbutils-014-i586-1.txz: Upgraded.
ap/mariadb-10.6.4-i586-1.txz: Upgraded.
ap/nvme-cli-1.15-i586-1.txz: Upgraded.
l/glibc-2.33-i586-3.txz: Rebuilt.
       Since glibc-2.34 makes a potentially risky change of moving all functions
       into the main library, and another inconvenient (for us) change of renaming
       the library files, we'll stick with glibc-2.33 for Slackware 15.0 and test
       the newer glibc in the next release cycle. But we'll backport the security
       fixes from glibc-2.34 with this update:
       The nameserver caching daemon (nscd), when processing a request for netgroup
       lookup, may crash due to a double-free, potentially resulting in degraded
       service or Denial of Service on the local system. Reported by Chris Schanzle.
       The mq_notify function has a potential use-after-free issue when using a
       notification type of SIGEV_THREAD and a thread attribute with a non-default
       affinity mask.
       The wordexp function may overflow the positional parameter number when
       processing the expansion resulting in a crash. Reported by Philippe Antoine.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
       (* Security fix *)
l/glibc-i18n-2.33-i586-3.txz: Rebuilt.
l/glibc-profile-2.33-i586-3.txz: Rebuilt.
l/liburing-2.0-i586-1.txz: Added.
       This is needed by mariadb, and provides increased performance on high speed
       devices such as NVMe.
n/dovecot-2.3.16-i586-1.txz: Upgraded.
xap/blueman-2.2.2-i586-1.txz: Upgraded.
+--------------------------+
Fri Aug 6 18:04:01 UTC 2021
a/udisks2-2.9.3-i586-1.txz: Upgraded.
d/patchelf-0.13-i586-1.txz: Upgraded.
d/python-pip-21.2.3-i586-1.txz: Upgraded.
kde/krita-4.4.7-i586-1.txz: Upgraded.
l/gjs-1.68.2-i586-1.txz: Upgraded.
l/glib-networking-2.68.2-i586-1.txz: Upgraded.
l/pcaudiolib-1.2-i586-1.txz: Upgraded.
l/pipewire-0.3.33-i586-1.txz: Upgraded.
l/python-pysol_cards-0.10.2-i586-1.txz: Upgraded.
n/ipset-7.15-i586-1.txz: Upgraded.
n/libqmi-1.30.0-i586-1.txz: Upgraded.
n/mobile-broadband-provider-info-20210805-i586-1.txz: Upgraded.
xap/blackbox-0.77-i586-1.txz: Upgraded.
+--------------------------+
Wed Aug 4 20:16:51 UTC 2021
a/kernel-generic-5.13.8-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.8_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.8-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.8_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.8-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.8_smp-i686-1.txz: Upgraded.
ap/dash-0.5.11.4-i586-1.txz: Upgraded.
ap/lxc-4.0.10-i586-1.txz: Upgraded.
       Thanks to Matthew Chamley.
d/kernel-headers-5.13.8_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.8_smp-noarch-1.txz: Upgraded.
n/vsftpd-3.0.5-i586-1.txz: Upgraded.
extra/linux-5.13.8-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Aug 3 18:18:13 UTC 2021
a/hwdata-0.350-noarch-1.txz: Upgraded.
l/libcap-2.52-i586-1.txz: Upgraded.
x/ibus-table-1.14.0-i586-1.txz: Upgraded.
x/libinput-1.18.1-i586-1.txz: Upgraded.
+--------------------------+
Tue Aug 3 06:55:27 UTC 2021
a/libcgroup-0.41-i586-10.txz: Rebuilt.
       Added LANG=C to the build script.
ap/diffutils-3.8-i586-1.txz: Upgraded.
d/re2c-2.2-i586-1.txz: Upgraded.
d/rust-1.54.0-i686-2.txz: Rebuilt.
       Move bash completions to /usr/share/bash-completion/completions/.
       Thanks to Robby Workman.
kde/calligra-3.2.1-i586-10.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/cantor-21.04.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/kfilemetadata-5.84.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/kile-2.9.93-i586-10.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/kitinerary-21.04.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/krita-4.4.5-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
kde/okular-21.04.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.08.0.
l/jasper-2.0.33-i586-1.txz: Upgraded.
l/poppler-21.08.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-charset-normalizer-2.0.4-i586-1.txz: Upgraded.
n/libmbim-1.26.0-i586-1.txz: Upgraded.
x/libXfont2-2.0.5-i586-1.txz: Upgraded.
x/libXft-2.3.4-i586-1.txz: Upgraded.
x/xeyes-1.2.0-i586-1.txz: Upgraded.
x/xorg-cf-files-1.0.7-i586-1.txz: Upgraded.
x/xwd-1.0.8-i586-1.txz: Upgraded.
xfce/mousepad-0.5.6-i586-1.txz: Upgraded.
+--------------------------+
Sat Jul 31 17:52:38 UTC 2021
a/btrfs-progs-5.13.1-i586-1.txz: Upgraded.
a/kernel-generic-5.13.7-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.7_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.7-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.7_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.7-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.7_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.7_smp-x86-1.txz: Upgraded.
d/python-pip-21.2.2-i586-1.txz: Upgraded.
k/kernel-source-5.13.7_smp-noarch-1.txz: Upgraded.
extra/linux-5.13.7-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Jul 30 18:19:26 UTC 2021
d/rust-1.54.0-i686-1.txz: Upgraded.
n/fetchmail-6.4.20-i586-1.txz: Upgraded.
n/php-7.4.22-i586-1.txz: Upgraded.
x/mesa-21.1.6-i586-1.txz: Upgraded.
x/xf86-video-amdgpu-21.0.0-i586-1.txz: Upgraded.
x/xorg-server-1.20.13-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.20.13-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.20.13-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.20.13-i586-1.txz: Upgraded.
extra/php8/php8-8.0.9-i586-1.txz: Upgraded.
+--------------------------+
Wed Jul 28 22:48:44 UTC 2021
a/e2fsprogs-1.46.3-i586-1.txz: Upgraded.
a/kernel-generic-5.13.6-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.6_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.6-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.6_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.6-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.6_smp-i686-1.txz: Upgraded.
a/libblockdev-2.26-i586-1.txz: Upgraded.
ap/vim-8.2.3238-i586-1.txz: Upgraded.
d/kernel-headers-5.13.6_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.6_smp-noarch-1.txz: Upgraded.
l/libgnt-2.14.2-i586-1.txz: Upgraded.
l/pulseaudio-15.0-i586-1.txz: Upgraded.
n/ipset-7.14-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.3238-i586-1.txz: Upgraded.
extra/linux-5.13.6-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jul 27 21:12:53 UTC 2021
a/sysvinit-scripts-15.0-noarch-4.txz: Rebuilt.
       rc.S: Change /var/run to be a symlink to /run rather than bind mounted.
       This works around an issue with solid-5.84.0. While there is a patch
       available for solid, it's probably best to handle the legacy /var/run
       location in the same way that most other distributions do.
       Unfortunately, this change needs to be made at boot time before /var/run
       would be mounted, so a reboot will be required. Make sure that the new
       /etc/rc.d/rc.S.new is moved to /etc/rc.d/rc.S before rebooting.
       Thanks to ZhaoLin1457.
ap/sudo-1.9.7p2-i586-1.txz: Upgraded.
d/cmake-3.21.1-i586-1.txz: Upgraded.
kde/bluedevil-5.22.4-i586-1.txz: Upgraded.
kde/breeze-5.22.4-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.4-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.4-i586-1.txz: Upgraded.
kde/drkonqi-5.22.4-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.4-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.4-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.4-i586-1.txz: Upgraded.
kde/kdecoration-5.22.4-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.4-i586-1.txz: Upgraded.
kde/kgamma5-5.22.4-i586-1.txz: Upgraded.
kde/khotkeys-5.22.4-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.4-i586-1.txz: Upgraded.
kde/kmenuedit-5.22.4-i586-1.txz: Upgraded.
kde/kscreen-5.22.4-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.4-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.4-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.4-i586-1.txz: Upgraded.
kde/kwallet-pam-5.22.4-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.4-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.4-i586-1.txz: Upgraded.
kde/kwin-5.22.4-i586-1.txz: Upgraded.
kde/kwrited-5.22.4-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.4-i586-1.txz: Upgraded.
kde/libkscreen-5.22.4-i586-1.txz: Upgraded.
kde/libksysguard-5.22.4-i586-1.txz: Upgraded.
kde/milou-5.22.4-i586-1.txz: Upgraded.
kde/oxygen-5.22.4-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.4-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.4-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.4-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.4-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.4-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.4-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.4-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.4-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.4-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.4-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.4-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.4-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.4-i586-1.txz: Upgraded.
kde/powerdevil-5.22.4-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.4-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.4-i586-1.txz: Upgraded.
kde/systemsettings-5.22.4-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.4-i586-1.txz: Upgraded.
+--------------------------+
Tue Jul 27 00:50:16 UTC 2021
a/kernel-generic-5.13.5-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.5_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.5-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.5_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.5-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.5_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.5_smp-x86-1.txz: Upgraded.
d/python-pip-21.2.1-i586-1.txz: Upgraded.
k/kernel-source-5.13.5_smp-noarch-1.txz: Upgraded.
l/gtk+3-3.24.30-i586-1.txz: Upgraded.
n/iputils-20210722-i586-1.txz: Upgraded.
n/krb5-1.19.2-i586-1.txz: Upgraded.
n/postfix-3.6.2-i586-1.txz: Upgraded.
extra/linux-5.13.5-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Jul 22 19:23:58 UTC 2021
a/util-linux-2.37.1-i586-1.txz: Upgraded.
l/libidn-1.38-i586-1.txz: Upgraded.
n/bind-9.16.19-i586-1.txz: Upgraded.
xap/mozilla-firefox-90.0.2-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/90.0.2/releasenotes/
xap/seamonkey-2.53.8.1-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.8.1
       (* Security fix *)
+--------------------------+
Wed Jul 21 18:16:58 UTC 2021
a/mcelog-178-i586-1.txz: Upgraded.
l/dbus-python-1.2.18-i586-1.txz: Upgraded.
n/curl-7.78.0-i586-1.txz: Upgraded.
       This update fixes security issues:
       CURLOPT_SSLCERT mixup with Secure Transport
       TELNET stack contents disclosure again
       Bad connection reuse due to flawed path name checks
       Metalink download sends credentials
       Wrong content via metalink not discarded
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
       (* Security fix *)
+--------------------------+
Wed Jul 21 05:30:44 UTC 2021
a/kernel-generic-5.13.4-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.4_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.4-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.4_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.4-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.4_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.4_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.4_smp-noarch-1.txz: Upgraded.
l/tdb-1.4.5-i586-1.txz: Upgraded.
extra/linux-5.13.4-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jul 20 19:04:14 UTC 2021
a/kernel-firmware-20210719_168452e-noarch-1.txz: Upgraded.
d/python-setuptools-57.4.0-i586-1.txz: Upgraded.
d/strace-5.13-i586-1.txz: Upgraded.
l/freetype-2.11.0-i586-1.txz: Upgraded.
l/libidn2-2.3.2-i586-1.txz: Upgraded.
l/libuv-1.42.0-i586-1.txz: Upgraded.
l/pipewire-0.3.32-i586-1.txz: Upgraded.
xap/gparted-1.3.1-i586-1.txz: Upgraded.
+--------------------------+
Tue Jul 20 05:39:14 UTC 2021
a/kernel-generic-5.13.3-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.3_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.3-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.3_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.3-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.3_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.3_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.3_smp-noarch-1.txz: Upgraded.
xap/mozilla-firefox-90.0.1-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/90.0.1/releasenotes/
extra/linux-5.13.3-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon Jul 19 03:31:08 UTC 2021
d/meson-0.59.0-i586-1.txz: Upgraded.
d/python-setuptools-57.3.0-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_4-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.3-i586-1.txz: Upgraded.
n/nghttp2-1.44.0-i586-1.txz: Upgraded.
+--------------------------+
Sat Jul 17 17:55:10 UTC 2021
Happy 28th birthday, Slackware! :-)
a/aaa_base-15.0-i586-1.txz: Upgraded.
       Bump version numbers in /etc/os-release and /etc/slackware-version.
       Not quite ready to freeze things for a release candidate, but getting there.
       Initial email to root still needs a refresh.
a/kernel-firmware-20210716_b7c134f-noarch-1.txz: Upgraded.
x/ibus-m17n-1.4.6-i586-1.txz: Upgraded.
x/ibus-table-1.13.3-i586-1.txz: Upgraded.
+--------------------------+
Fri Jul 16 18:53:33 UTC 2021
a/mkinitrd-1.4.11-i586-25.txz: Rebuilt.
       Abort if a temporary directory cannot be created, otherwise the contents of
       the current directory could be destroyed. Thanks to Andypoo.
d/Cython-0.29.24-i586-1.txz: Upgraded.
l/libedit-20210714_3.1-i586-1.txz: Upgraded.
x/libwacom-1.11-i586-1.txz: Upgraded.
+--------------------------+
Thu Jul 15 22:37:59 UTC 2021
d/cmake-3.21.0-i586-1.txz: Upgraded.
d/python-setuptools-57.2.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.84.0-i586-2.txz: Rebuilt.
       Recompiled to use editorconfig-core-c-0.12.5. Thanks to Heinz Wiesinger.
l/editorconfig-core-c-0.12.5-i586-1.txz: Added.
       Thanks to David Demelier.
l/python-charset-normalizer-2.0.2-i586-1.txz: Upgraded.
l/talloc-2.3.3-i586-1.txz: Upgraded.
l/tdb-1.4.4-i586-1.txz: Upgraded.
l/tevent-0.11.0-i586-1.txz: Upgraded.
x/mesa-21.1.5-i586-1.txz: Upgraded.
+--------------------------+
Wed Jul 14 17:57:37 UTC 2021
a/kernel-generic-5.13.2-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.13.2_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.13.2-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.13.2_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.13.2-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.13.2_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.13.2_smp-x86-1.txz: Upgraded.
k/kernel-source-5.13.2_smp-noarch-1.txz: Upgraded.
xap/gnuchess-6.2.9-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-78.12.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.12.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-30/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976
       (* Security fix *)
extra/linux-5.13.2-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jul 13 20:51:28 UTC 2021
xap/seamonkey-2.53.8-i686-2.txz: Rebuilt.
       Fixed desktop files changing Terminal=0 to Terminal=false. Thanks to marav.
+--------------------------+
Tue Jul 13 19:31:54 UTC 2021
a/btrfs-progs-5.13-i586-1.txz: Upgraded.
kde/minuet-21.04.3-i586-2.txz: Rebuilt.
       Recompiled against fluidsynth-2.2.2.
l/fluidsynth-2.2.2-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/mozjs78-78.12.0esr-i586-1.txz: Upgraded.
l/python-charset-normalizer-2.0.1-i586-1.txz: Added.
       Needed by python-requests-2.26.0.
l/python-idna-3.2-i586-1.txz: Upgraded.
l/python-requests-2.26.0-i586-1.txz: Upgraded.
n/mutt-2.1.1-i586-1.txz: Upgraded.
n/samba-4.14.6-i586-1.txz: Upgraded.
xap/audacious-plugins-4.1-i586-3.txz: Rebuilt.
       Recompiled against fluidsynth-2.2.2.
+--------------------------+
Mon Jul 12 19:17:02 UTC 2021
ap/mpg123-1.28.2-i586-1.txz: Upgraded.
xap/mozilla-firefox-90.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/90.0/releasenotes/
       (* Security fix *)
+--------------------------+
Sun Jul 11 18:23:51 UTC 2021
a/kernel-generic-5.12.16-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.16_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.16-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.16_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.16-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.16_smp-i686-1.txz: Upgraded.
a/less-590-i586-1.txz: Upgraded.
a/os-prober-1.79-i586-1.txz: Upgraded.
ap/vim-8.2.3150-i586-1.txz: Upgraded.
d/kernel-headers-5.12.16_smp-x86-1.txz: Upgraded.
k/kernel-source-5.12.16_smp-noarch-1.txz: Upgraded.
kde/digikam-7.3.0-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.3150-i586-1.txz: Upgraded.
extra/linux-5.12.16-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat Jul 10 18:45:01 UTC 2021
kde/attica-5.84.0-i586-1.txz: Upgraded.
kde/baloo-5.84.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.84.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.84.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.84.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.84.0-i586-1.txz: Upgraded.
kde/kactivities-5.84.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.84.0-i586-1.txz: Upgraded.
kde/kapidox-5.84.0-i586-1.txz: Upgraded.
kde/karchive-5.84.0-i586-1.txz: Upgraded.
kde/kauth-5.84.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.84.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.84.0-i586-1.txz: Upgraded.
kde/kcmutils-5.84.0-i586-1.txz: Upgraded.
kde/kcodecs-5.84.0-i586-1.txz: Upgraded.
kde/kcompletion-5.84.0-i586-1.txz: Upgraded.
kde/kconfig-5.84.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.84.0-i586-1.txz: Upgraded.
kde/kcontacts-5.84.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.84.0-i586-1.txz: Upgraded.
kde/kcrash-5.84.0-i586-1.txz: Upgraded.
kde/kdav-5.84.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.84.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.84.0-i586-1.txz: Upgraded.
kde/kded-5.84.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.84.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.84.0-i586-1.txz: Upgraded.
kde/kdesu-5.84.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.84.0-i586-1.txz: Upgraded.
kde/kdnssd-5.84.0-i586-1.txz: Upgraded.
kde/kdoctools-5.84.0-i586-1.txz: Upgraded.
kde/kemoticons-5.84.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.84.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.84.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.84.0-i586-1.txz: Upgraded.
kde/kholidays-5.84.0-i586-1.txz: Upgraded.
kde/khtml-5.84.0-i586-1.txz: Upgraded.
kde/ki18n-5.84.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.84.0-i586-1.txz: Upgraded.
kde/kidletime-5.84.0-i586-1.txz: Upgraded.
kde/kimageformats-5.84.0-i586-1.txz: Upgraded.
kde/kinit-5.84.0-i586-1.txz: Upgraded.
kde/kio-5.84.0-i586-1.txz: Upgraded.
kde/kirigami2-5.84.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.84.0-i586-1.txz: Upgraded.
kde/kitemviews-5.84.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.84.0-i586-1.txz: Upgraded.
kde/kjs-5.84.0-i586-1.txz: Upgraded.
kde/kjsembed-5.84.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.84.0-i586-1.txz: Upgraded.
kde/knewstuff-5.84.0-i586-1.txz: Upgraded.
kde/knotifications-5.84.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.84.0-i586-1.txz: Upgraded.
kde/kpackage-5.84.0-i586-1.txz: Upgraded.
kde/kparts-5.84.0-i586-1.txz: Upgraded.
kde/kpeople-5.84.0-i586-1.txz: Upgraded.
kde/kplotting-5.84.0-i586-1.txz: Upgraded.
kde/kpty-5.84.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.84.0-i586-1.txz: Upgraded.
kde/kross-5.84.0-i586-1.txz: Upgraded.
kde/krunner-5.84.0-i586-1.txz: Upgraded.
kde/kservice-5.84.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.84.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.84.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.84.0-i586-1.txz: Upgraded.
kde/kwallet-5.84.0-i586-1.txz: Upgraded.
kde/kwayland-5.84.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.84.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.84.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.84.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.84.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.84.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.84.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.84.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.84.0-i586-1.txz: Upgraded.
kde/prison-5.84.0-i586-1.txz: Upgraded.
kde/purpose-5.84.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.84.0-i586-1.txz: Upgraded.
kde/solid-5.84.0-i586-1.txz: Upgraded.
kde/sonnet-5.84.0-i586-1.txz: Upgraded.
kde/syndication-5.84.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.84.0-i586-1.txz: Upgraded.
kde/threadweaver-5.84.0-i586-1.txz: Upgraded.
+--------------------------+
Fri Jul 9 19:26:44 UTC 2021
a/hwdata-0.349-noarch-1.txz: Upgraded.
ap/mpg123-1.28.1-i586-1.txz: Upgraded.
d/llvm-12.0.1-i586-1.txz: Upgraded.
d/mercurial-5.8.1-i586-1.txz: Upgraded.
l/at-spi2-core-2.40.3-i586-1.txz: Upgraded.
l/harfbuzz-2.8.2-i586-1.txz: Upgraded.
n/ethtool-5.13-i586-1.txz: Upgraded.
x/xorg-server-1.20.12-i586-1.txz: Upgraded.
x/xorg-server-xephyr-1.20.12-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.20.12-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.20.12-i586-1.txz: Upgraded.
x/xorg-server-xwayland-21.1.2-i586-1.txz: Upgraded.
xap/NetworkManager-openvpn-1.8.14-i586-1.txz: Upgraded.
xap/pidgin-2.14.6-i586-1.txz: Upgraded.
+--------------------------+
Fri Jul 9 03:14:33 UTC 2021
kde/akonadi-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-mime-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-notes-21.04.3-i586-1.txz: Upgraded.
kde/akonadi-search-21.04.3-i586-1.txz: Upgraded.
kde/akonadiconsole-21.04.3-i586-1.txz: Upgraded.
kde/akregator-21.04.3-i586-1.txz: Upgraded.
kde/analitza-21.04.3-i586-1.txz: Upgraded.
kde/ark-21.04.3-i586-1.txz: Upgraded.
kde/artikulate-21.04.3-i586-1.txz: Upgraded.
kde/audiocd-kio-21.04.3-i586-1.txz: Upgraded.
kde/baloo-widgets-21.04.3-i586-1.txz: Upgraded.
kde/blinken-21.04.3-i586-1.txz: Upgraded.
kde/bomber-21.04.3-i586-1.txz: Upgraded.
kde/bovo-21.04.3-i586-1.txz: Upgraded.
kde/calendarsupport-21.04.3-i586-1.txz: Upgraded.
kde/cantor-21.04.3-i586-1.txz: Upgraded.
kde/cervisia-21.04.3-i586-1.txz: Upgraded.
kde/dolphin-21.04.3-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.04.3-i586-1.txz: Upgraded.
kde/dragon-21.04.3-i586-1.txz: Upgraded.
kde/elisa-21.04.3-i586-1.txz: Upgraded.
kde/eventviews-21.04.3-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.04.3-i586-1.txz: Upgraded.
kde/filelight-21.04.3-i586-1.txz: Upgraded.
kde/granatier-21.04.3-i586-1.txz: Upgraded.
kde/grantlee-editor-21.04.3-i586-1.txz: Upgraded.
kde/grantleetheme-21.04.3-i586-1.txz: Upgraded.
kde/gwenview-21.04.3-i586-1.txz: Upgraded.
kde/incidenceeditor-21.04.3-i586-1.txz: Upgraded.
kde/itinerary-21.04.3-i586-1.txz: Upgraded.
kde/juk-21.04.3-i586-1.txz: Upgraded.
kde/k3b-21.04.3-i586-1.txz: Upgraded.
kde/kaddressbook-21.04.3-i586-1.txz: Upgraded.
kde/kalarm-21.04.3-i586-1.txz: Upgraded.
kde/kalarmcal-21.04.3-i586-1.txz: Upgraded.
kde/kalgebra-21.04.3-i586-1.txz: Upgraded.
kde/kalzium-21.04.3-i586-1.txz: Upgraded.
kde/kamera-21.04.3-i586-1.txz: Upgraded.
kde/kamoso-21.04.3-i586-1.txz: Upgraded.
kde/kanagram-21.04.3-i586-1.txz: Upgraded.
kde/kapman-21.04.3-i586-1.txz: Upgraded.
kde/kapptemplate-21.04.3-i586-1.txz: Upgraded.
kde/kate-21.04.3-i586-1.txz: Upgraded.
kde/katomic-21.04.3-i586-1.txz: Upgraded.
kde/kbackup-21.04.3-i586-1.txz: Upgraded.
kde/kblackbox-21.04.3-i586-1.txz: Upgraded.
kde/kblocks-21.04.3-i586-1.txz: Upgraded.
kde/kbounce-21.04.3-i586-1.txz: Upgraded.
kde/kbreakout-21.04.3-i586-1.txz: Upgraded.
kde/kbruch-21.04.3-i586-1.txz: Upgraded.
kde/kcachegrind-21.04.3-i586-1.txz: Upgraded.
kde/kcalc-21.04.3-i586-1.txz: Upgraded.
kde/kcalutils-21.04.3-i586-1.txz: Upgraded.
kde/kcharselect-21.04.3-i586-1.txz: Upgraded.
kde/kcolorchooser-21.04.3-i586-1.txz: Upgraded.
kde/kcron-21.04.3-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.04.3-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.04.3-i586-1.txz: Upgraded.
kde/kdebugsettings-21.04.3-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.04.3-i586-1.txz: Upgraded.
kde/kdeedu-data-21.04.3-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.04.3-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.04.3-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.04.3-i586-1.txz: Upgraded.
kde/kdenlive-21.04.3-i586-1.txz: Upgraded.
kde/kdepim-addons-21.04.3-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.04.3-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.04.3-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.04.3-i586-1.txz: Upgraded.
kde/kdf-21.04.3-i586-1.txz: Upgraded.
kde/kdialog-21.04.3-i586-1.txz: Upgraded.
kde/kdiamond-21.04.3-i586-1.txz: Upgraded.
kde/keditbookmarks-21.04.3-i586-1.txz: Upgraded.
kde/kfind-21.04.3-i586-1.txz: Upgraded.
kde/kfloppy-21.04.3-i586-1.txz: Upgraded.
kde/kfourinline-21.04.3-i586-1.txz: Upgraded.
kde/kgeography-21.04.3-i586-1.txz: Upgraded.
kde/kget-21.04.3-i586-1.txz: Upgraded.
kde/kgoldrunner-21.04.3-i586-1.txz: Upgraded.
kde/kgpg-21.04.3-i586-1.txz: Upgraded.
kde/khangman-21.04.3-i586-1.txz: Upgraded.
kde/khelpcenter-21.04.3-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.04.3-i586-1.txz: Upgraded.
kde/kig-21.04.3-i586-1.txz: Upgraded.
kde/kigo-21.04.3-i586-1.txz: Upgraded.
kde/killbots-21.04.3-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.04.3-i586-1.txz: Upgraded.
kde/kimap-21.04.3-i586-1.txz: Upgraded.
kde/kio-extras-21.04.3-i586-1.txz: Upgraded.
kde/kio-gdrive-21.04.3-i586-1.txz: Upgraded.
kde/kipi-plugins-21.04.3-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.04.3-i586-1.txz: Upgraded.
kde/kiriki-21.04.3-i586-1.txz: Upgraded.
kde/kiten-21.04.3-i586-1.txz: Upgraded.
kde/kitinerary-21.04.3-i586-1.txz: Upgraded.
kde/kjumpingcube-21.04.3-i586-1.txz: Upgraded.
kde/kldap-21.04.3-i586-1.txz: Upgraded.
kde/kleopatra-21.04.3-i586-1.txz: Upgraded.
kde/klickety-21.04.3-i586-1.txz: Upgraded.
kde/klines-21.04.3-i586-1.txz: Upgraded.
kde/kmag-21.04.3-i586-1.txz: Upgraded.
kde/kmahjongg-21.04.3-i586-1.txz: Upgraded.
kde/kmail-21.04.3-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.04.3-i586-1.txz: Upgraded.
kde/kmailtransport-21.04.3-i586-1.txz: Upgraded.
kde/kmbox-21.04.3-i586-1.txz: Upgraded.
kde/kmime-21.04.3-i586-1.txz: Upgraded.
kde/kmines-21.04.3-i586-1.txz: Upgraded.
kde/kmix-21.04.3-i586-1.txz: Upgraded.
kde/kmousetool-21.04.3-i586-1.txz: Upgraded.
kde/kmouth-21.04.3-i586-1.txz: Upgraded.
kde/kmplot-21.04.3-i586-1.txz: Upgraded.
kde/knavalbattle-21.04.3-i586-1.txz: Upgraded.
kde/knetwalk-21.04.3-i586-1.txz: Upgraded.
kde/knights-21.04.3-i586-1.txz: Upgraded.
kde/knotes-21.04.3-i586-1.txz: Upgraded.
kde/kolf-21.04.3-i586-1.txz: Upgraded.
kde/kollision-21.04.3-i586-1.txz: Upgraded.
kde/kolourpaint-21.04.3-i586-1.txz: Upgraded.
kde/kompare-21.04.3-i586-1.txz: Upgraded.
kde/konqueror-21.04.3-i586-1.txz: Upgraded.
kde/konquest-21.04.3-i586-1.txz: Upgraded.
kde/konsole-21.04.3-i586-1.txz: Upgraded.
kde/kontact-21.04.3-i586-1.txz: Upgraded.
kde/kontactinterface-21.04.3-i586-1.txz: Upgraded.
kde/kontrast-21.04.3-i586-1.txz: Upgraded.
kde/konversation-21.04.3-i586-1.txz: Upgraded.
kde/kopeninghours-21.04.3-i586-1.txz: Upgraded.
kde/kopete-21.04.3-i586-1.txz: Upgraded.
kde/korganizer-21.04.3-i586-1.txz: Upgraded.
kde/kosmindoormap-21.04.3-i586-1.txz: Upgraded.
kde/kpat-21.04.3-i586-1.txz: Upgraded.
kde/kpimtextedit-21.04.3-i586-1.txz: Upgraded.
kde/kpkpass-21.04.3-i586-1.txz: Upgraded.
kde/kpmcore-21.04.3-i586-1.txz: Upgraded.
kde/kpublictransport-21.04.3-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.04.3-i586-1.txz: Upgraded.
kde/krdc-21.04.3-i586-1.txz: Upgraded.
kde/kreversi-21.04.3-i586-1.txz: Upgraded.
kde/krfb-21.04.3-i586-1.txz: Upgraded.
kde/kross-interpreters-21.04.3-i586-1.txz: Upgraded.
kde/kruler-21.04.3-i586-1.txz: Upgraded.
kde/kshisen-21.04.3-i586-1.txz: Upgraded.
kde/ksirk-21.04.3-i586-1.txz: Upgraded.
kde/ksmtp-21.04.3-i586-1.txz: Upgraded.
kde/ksnakeduel-21.04.3-i586-1.txz: Upgraded.
kde/kspaceduel-21.04.3-i586-1.txz: Upgraded.
kde/ksquares-21.04.3-i586-1.txz: Upgraded.
kde/ksudoku-21.04.3-i586-1.txz: Upgraded.
kde/ksystemlog-21.04.3-i586-1.txz: Upgraded.
kde/kteatime-21.04.3-i586-1.txz: Upgraded.
kde/ktimer-21.04.3-i586-1.txz: Upgraded.
kde/ktnef-21.04.3-i586-1.txz: Upgraded.
kde/ktorrent-21.04.3-i586-1.txz: Upgraded.
kde/ktouch-21.04.3-i586-1.txz: Upgraded.
kde/kturtle-21.04.3-i586-1.txz: Upgraded.
kde/kubrick-21.04.3-i586-1.txz: Upgraded.
kde/kwalletmanager-21.04.3-i586-1.txz: Upgraded.
kde/kwave-21.04.3-i586-1.txz: Upgraded.
kde/kwordquiz-21.04.3-i586-1.txz: Upgraded.
kde/libgravatar-21.04.3-i586-1.txz: Upgraded.
kde/libkcddb-21.04.3-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.04.3-i586-1.txz: Upgraded.
kde/libkdcraw-21.04.3-i586-1.txz: Upgraded.
kde/libkdegames-21.04.3-i586-1.txz: Upgraded.
kde/libkdepim-21.04.3-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.04.3-i586-1.txz: Upgraded.
kde/libkexiv2-21.04.3-i586-1.txz: Upgraded.
kde/libkgapi-21.04.3-i586-1.txz: Upgraded.
kde/libkipi-21.04.3-i586-1.txz: Upgraded.
kde/libkleo-21.04.3-i586-1.txz: Upgraded.
kde/libkmahjongg-21.04.3-i586-1.txz: Upgraded.
kde/libkomparediff2-21.04.3-i586-1.txz: Upgraded.
kde/libksane-21.04.3-i586-1.txz: Upgraded.
kde/libksieve-21.04.3-i586-1.txz: Upgraded.
kde/libktorrent-21.04.3-i586-1.txz: Upgraded.
kde/lokalize-21.04.3-i586-1.txz: Upgraded.
kde/lskat-21.04.3-i586-1.txz: Upgraded.
kde/mailcommon-21.04.3-i586-1.txz: Upgraded.
kde/mailimporter-21.04.3-i586-1.txz: Upgraded.
kde/marble-21.04.3-i586-1.txz: Upgraded.
kde/markdownpart-21.04.3-i586-1.txz: Upgraded.
kde/mbox-importer-21.04.3-i586-1.txz: Upgraded.
kde/messagelib-21.04.3-i586-1.txz: Upgraded.
kde/minuet-21.04.3-i586-1.txz: Upgraded.
kde/okular-21.04.3-i586-1.txz: Upgraded.
kde/palapeli-21.04.3-i586-1.txz: Upgraded.
kde/parley-21.04.3-i586-1.txz: Upgraded.
kde/partitionmanager-21.04.3-i586-1.txz: Upgraded.
kde/picmi-21.04.3-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.04.3-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.04.3-i586-1.txz: Upgraded.
kde/pimcommon-21.04.3-i586-1.txz: Upgraded.
kde/poxml-21.04.3-i586-1.txz: Upgraded.
kde/print-manager-21.04.3-i586-1.txz: Upgraded.
kde/rocs-21.04.3-i586-1.txz: Upgraded.
kde/spectacle-21.04.3-i586-1.txz: Upgraded.
kde/step-21.04.3-i586-1.txz: Upgraded.
kde/svgpart-21.04.3-i586-1.txz: Upgraded.
kde/sweeper-21.04.3-i586-1.txz: Upgraded.
kde/umbrello-21.04.3-i586-1.txz: Upgraded.
kde/yakuake-21.04.3-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.04.3-i586-1.txz: Upgraded.
l/libuv-1.41.1-i586-1.txz: Upgraded.
l/sip-4.19.25-i586-1.txz: Upgraded.
n/NetworkManager-1.28.2-i586-1.txz: Upgraded.
n/bluez-5.60-i586-1.txz: Upgraded.
n/getmail-6.18.3-i586-1.txz: Upgraded.
+--------------------------+
Wed Jul 7 20:50:57 UTC 2021
a/kernel-generic-5.12.15-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.15_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.15-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.15_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.15-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.15_smp-i686-1.txz: Upgraded.
a/libbytesize-2.6-i586-1.txz: Upgraded.
a/mcelog-177-i586-1.txz: Upgraded.
d/kernel-headers-5.12.15_smp-x86-1.txz: Upgraded.
d/ruby-3.0.2-i586-1.txz: Upgraded.
       This update fixes bugs and security issues:
       Trusting FTP PASV responses vulnerability in Net::FTP.
       StartTLS stripping vulnerability in Net::IMAP.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066
       (* Security fix *)
k/kernel-source-5.12.15_smp-noarch-1.txz: Upgraded.
l/python-pillow-8.3.1-i586-1.txz: Upgraded.
extra/linux-5.12.15-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.13.x/kernel-generic-5.13.1-i586-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-generic-smp-5.13.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-headers-5.13.1_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-huge-5.13.1-i586-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-huge-smp-5.13.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-modules-5.13.1-i586-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-modules-smp-5.13.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-source-5.13.1_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jul 6 20:44:20 UTC 2021
ap/mc-4.8.26-i586-3.txz: Rebuilt.
       Rebuilt with --enable-aspell. Thanks to Ressy and bassmadrigal.
ap/slackpkg-15.0.6-noarch-1.txz: Upgraded.
       Fix getting gpg key on ARM ; use only www.slackware.com.
       Remove support for Slackintosh project - it's dead, Jim.
       Thanks to Robby Workman.
d/python-setuptools-57.1.0-i586-1.txz: Upgraded.
kde/bluedevil-5.22.3-i586-1.txz: Upgraded.
kde/breeze-5.22.3-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.3-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.3-i586-1.txz: Upgraded.
kde/digikam-7.2.0-i586-4.txz: Rebuilt.
       Recompiled against opencv-4.5.3.
kde/drkonqi-5.22.3-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.3-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.3-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.3-i586-1.txz: Upgraded.
kde/kdecoration-5.22.3-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.3-i586-1.txz: Upgraded.
kde/kgamma5-5.22.3-i586-1.txz: Upgraded.
kde/khotkeys-5.22.3-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.3-i586-1.txz: Upgraded.
kde/kio-extras-21.04.2-i586-2.txz: Rebuilt.
       Recompiled against kdsoap-2.0.0.
kde/kmenuedit-5.22.3-i586-1.txz: Upgraded.
kde/kscreen-5.22.3-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.3-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.3-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.3-i586-1.txz: Upgraded.
kde/kwallet-pam-5.22.3-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.3-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.3-i586-1.txz: Upgraded.
kde/kwin-5.22.3-i586-1.txz: Upgraded.
kde/kwrited-5.22.3-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.3-i586-1.txz: Upgraded.
kde/libkscreen-5.22.3-i586-1.txz: Upgraded.
kde/libksysguard-5.22.3-i586-1.txz: Upgraded.
kde/milou-5.22.3-i586-1.txz: Upgraded.
kde/oxygen-5.22.3-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.3-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.3-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.3-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.3-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.3-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.3-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.3-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.3-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.3-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.3-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.3-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.3-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.3-i586-1.txz: Upgraded.
kde/powerdevil-5.22.3-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.3-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.3-i586-1.txz: Upgraded.
kde/systemsettings-5.22.3-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.3-i586-1.txz: Upgraded.
l/kdsoap-2.0.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/opencv-4.5.3-i586-1.txz: Upgraded.
       Changed ABI.
n/getmail-6.18.1-i586-1.txz: Upgraded.
t/texlive-2021.210418-i586-1.txz: Upgraded.
       Thanks to Johannes Schoepfer.
+--------------------------+
Sun Jul 4 18:14:23 UTC 2021
ap/texinfo-6.8-i586-1.txz: Upgraded.
l/pango-1.48.7-i586-1.txz: Upgraded.
l/poppler-21.07.0-i586-1.txz: Upgraded.
l/python-packaging-21.0-i586-1.txz: Upgraded.
x/libdrm-2.4.107-i586-1.txz: Upgraded.
xap/seamonkey-2.53.8-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.8
       (* Security fix *)
+--------------------------+
Fri Jul 2 21:05:49 UTC 2021
l/babl-0.1.88-i586-1.txz: Upgraded.
l/netpbm-10.95.00-i586-1.txz: Upgraded.
l/python-pillow-8.3.0-i586-1.txz: Upgraded.
+--------------------------+
Thu Jul 1 18:15:40 UTC 2021
x/mesa-21.1.4-i586-1.txz: Upgraded.
+--------------------------+
Wed Jun 30 18:28:50 UTC 2021
a/kernel-generic-5.12.14-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.14_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.14-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.14_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.14-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.14_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.12.14_smp-x86-1.txz: Upgraded.
k/kernel-source-5.12.14_smp-noarch-1.txz: Upgraded.
l/pango-1.48.6-i586-1.txz: Upgraded.
l/pipewire-0.3.31-i586-1.txz: Upgraded.
n/iproute2-5.13.0-i586-1.txz: Upgraded.
extra/linux-5.12.14-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jun 30 03:45:31 UTC 2021
a/kernel-firmware-20210629_d79c267-noarch-1.txz: Upgraded.
ap/cups-2.3.3op2-i586-1.txz: Upgraded.
kde/lokalize-21.04.2-i586-2.txz: Rebuilt.
       Recompiled against hunspell-1.7.0.
kde/sonnet-5.83.0-i586-2.txz: Rebuilt.
       Recompiled against hunspell-1.7.0.
l/enchant-2.3.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/gtkspell-2.0.16-i586-7.txz: Rebuilt.
       Recompiled against enchant-2.3.0.
l/hunspell-1.7.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-urllib3-1.26.6-i586-2.txz: Rebuilt.
       Don't build python2 version.
l/python2-module-collection-2.7.18-i586-4.txz: Rebuilt.
       Upgraded to urllib3-1.25.11 for compatibility with requests.
       Thanks to USUARIONUEVO.
l/qt5-5.15.2-i586-10.txz: Rebuilt.
       Recompiled against hunspell-1.7.0.
n/php-7.4.21-i586-1.txz: Upgraded.
       This update fixes bugs and security issues:
       Core: SSRF bypass in FILTER_VALIDATE_URL.
       PDO_Firebird: Stack buffer overflow in firebird_info_cb.
       PDO_Firebird: SIGSEGV in firebird_handle_doer.
       PDO_Firebird: SIGSEGV in firebird_stmt_execute.
       PDO_Firebird: Crash while parsing blob data in firebird_fetch_blob.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21705
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21704
       (* Security fix *)
xap/pan-0.146-i586-5.txz: Rebuilt.
       Recompiled against enchant-2.3.0.
extra/php8/php8-8.0.8-i586-1.txz: Upgraded.
+--------------------------+
Mon Jun 28 18:40:09 UTC 2021
d/python-pip-21.1.3-i586-1.txz: Upgraded.
d/python3-3.9.6-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_2-i586-1.txz: Upgraded.
l/python-urllib3-1.26.6-i586-1.txz: Upgraded.
n/gpgme-1.16.0-i586-1.txz: Upgraded.
x/glu-9.0.2-i586-1.txz: Upgraded.
testing/packages/linux-5.13.x/kernel-generic-5.13.0-i586-1.txz: Added.
testing/packages/linux-5.13.x/kernel-generic-smp-5.13.0_smp-i686-1.txz: Added.
testing/packages/linux-5.13.x/kernel-headers-5.13.0_smp-x86-1.txz: Added.
testing/packages/linux-5.13.x/kernel-huge-5.13.0-i586-1.txz: Added.
testing/packages/linux-5.13.x/kernel-huge-smp-5.13.0_smp-i686-1.txz: Added.
testing/packages/linux-5.13.x/kernel-modules-5.13.0-i586-1.txz: Added.
testing/packages/linux-5.13.x/kernel-modules-smp-5.13.0_smp-i686-1.txz: Added.
testing/packages/linux-5.13.x/kernel-source-5.13.0_smp-noarch-1.txz: Added.
+--------------------------+
Thu Jun 24 22:01:01 UTC 2021
kde/kmymoney-5.1.2-i586-1.txz: Upgraded.
n/gnupg2-2.2.28-i586-1.txz: Upgraded.
       Probably best to revert to this version for now.
x/xf86-input-libinput-1.1.0-i586-1.txz: Upgraded.
+--------------------------+
Wed Jun 23 20:40:52 UTC 2021
a/dialog-1.3_20210621-i586-1.txz: Upgraded.
a/kernel-generic-5.12.13-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.13_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.13-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.13_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.13-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.13_smp-i686-1.txz: Upgraded.
ap/mariadb-10.5.11-i586-1.txz: Upgraded.
ap/vim-8.2.3038-i586-1.txz: Upgraded.
d/kernel-headers-5.12.13_smp-x86-1.txz: Upgraded.
k/kernel-source-5.12.13_smp-noarch-1.txz: Upgraded.
kde/bluedevil-5.22.2.1-i586-1.txz: Upgraded.
kde/breeze-5.22.2.1-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.2.1-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.2.1-i586-1.txz: Upgraded.
kde/drkonqi-5.22.2.1-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.2.1-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.2.1-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.2.1-i586-1.txz: Upgraded.
kde/kdecoration-5.22.2.1-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.2.1-i586-1.txz: Upgraded.
kde/kgamma5-5.22.2.1-i586-1.txz: Upgraded.
kde/khotkeys-5.22.2.1-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.2.1-i586-1.txz: Upgraded.
kde/kmenuedit-5.22.2.1-i586-1.txz: Upgraded.
kde/kscreen-5.22.2.1-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.2.1-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.2.1-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.2.1-i586-1.txz: Upgraded.
kde/kwallet-pam-5.22.2.1-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.2.1-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.2.1-i586-1.txz: Upgraded.
kde/kwin-5.22.2.1-i586-1.txz: Upgraded.
kde/kwrited-5.22.2.1-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.2.1-i586-1.txz: Upgraded.
kde/libkscreen-5.22.2.1-i586-1.txz: Upgraded.
kde/libksysguard-5.22.2.1-i586-1.txz: Upgraded.
kde/milou-5.22.2.1-i586-1.txz: Upgraded.
kde/oxygen-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.2.1-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.2.1-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.2.1-i586-1.txz: Upgraded.
kde/powerdevil-5.22.2.1-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.2.1-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.2.1-i586-1.txz: Upgraded.
kde/systemsettings-5.22.2.1-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.2.1-i586-1.txz: Upgraded.
xap/mozilla-firefox-89.0.2-i686-1.txz: Upgraded.
       This is a bugfix release to fix occasional hangs with Software WebRender.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/89.0.2/releasenotes/
xap/vim-gvim-8.2.3038-i586-1.txz: Upgraded.
extra/linux-5.12.13-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jun 22 18:39:30 UTC 2021
ap/man-pages-5.12-noarch-1.txz: Upgraded.
d/cmake-3.20.5-i586-1.txz: Upgraded.
d/parallel-20210622-noarch-1.txz: Upgraded.
l/imagemagick-7.1.0_1-i586-1.txz: Upgraded.
l/libcap-2.51-i586-1.txz: Upgraded.
n/gnupg2-2.3.1-i586-1.txz: Upgraded.
x/libva-utils-2.12.0-i586-1.txz: Upgraded.
+--------------------------+
Mon Jun 21 18:26:35 UTC 2021
kde/kid3-3.8.7-i586-1.txz: Upgraded.
l/openexr-2.5.7-i586-1.txz: Upgraded.
n/dovecot-2.3.15-i586-1.txz: Upgraded.
       This update fixes security issues:
       Dovecot did not correctly escape kid and azp fields in JWT tokens. This may
       be used to supply attacker controlled keys to validate tokens, if attacker
       has local access.
       On-path attacker could have injected plaintext commands before STARTTLS
       negotiation that would be executed after STARTTLS finished with the client.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29157
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33515
       (* Security fix *)
x/libva-2.12.0-i586-1.txz: Upgraded.
+--------------------------+
Sat Jun 19 19:12:24 UTC 2021
ap/sqlite-3.36.0-i586-1.txz: Upgraded.
l/libzip-1.8.0-i586-1.txz: Upgraded.
l/polkit-qt-1-0.114.0-i586-1.txz: Upgraded.
x/mesa-21.1.3-i586-1.txz: Upgraded.
+--------------------------+
Fri Jun 18 20:33:08 UTC 2021
a/kernel-generic-5.12.12-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.12_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.12-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.12_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.12-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.12_smp-i686-1.txz: Upgraded.
a/upower-0.99.12-i586-1.txz: Upgraded.
d/kernel-headers-5.12.12_smp-x86-1.txz: Upgraded.
d/rust-1.53.0-i686-1.txz: Upgraded.
k/kernel-source-5.12.12_smp-noarch-1.txz: Upgraded.
kde/kdeconnect-kde-21.04.2-i586-2.txz: Rebuilt.
       Recompiled against pulseaudio-qt-1.3.
l/gdbm-1.20-i586-1.txz: Upgraded.
n/bind-9.16.18-i586-1.txz: Upgraded.
n/openvpn-2.5.3-i586-1.txz: Upgraded.
extra/linux-5.12.12-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jun 16 18:32:47 UTC 2021
a/kernel-generic-5.12.11-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.11_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.11-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.11_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.11-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.11_smp-i686-1.txz: Upgraded.
ap/cups-filters-1.28.9-i586-1.txz: Upgraded.
d/kernel-headers-5.12.11_smp-x86-1.txz: Upgraded.
k/kernel-source-5.12.11_smp-noarch-1.txz: Upgraded.
l/exiv2-0.27.4-i586-1.txz: Upgraded.
l/pcre-8.45-i586-1.txz: Upgraded.
extra/linux-5.12.11-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jun 16 01:06:18 UTC 2021
a/grub-2.06-i586-2.txz: Rebuilt.
       Don't use the -O2 compiler optimization as it causes an immediate reboot.
       Thanks to kaott.
ap/nano-5.8-i586-1.txz: Upgraded.
d/opencl-headers-2021.04.29-noarch-1.txz: Upgraded.
       Thanks to Heinz Wiesinger.
kde/bluedevil-5.22.1-i586-1.txz: Upgraded.
kde/breeze-5.22.1-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.1-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.1-i586-1.txz: Upgraded.
kde/drkonqi-5.22.1-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.1-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.1-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.1-i586-1.txz: Upgraded.
kde/kdecoration-5.22.1-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.1-i586-1.txz: Upgraded.
kde/kgamma5-5.22.1-i586-1.txz: Upgraded.
kde/khotkeys-5.22.1-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.1-i586-1.txz: Upgraded.
kde/kmenuedit-5.22.1-i586-1.txz: Upgraded.
kde/kscreen-5.22.1-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.1-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.1-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.1-i586-1.txz: Upgraded.
kde/kwallet-pam-5.22.1-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.1-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.1-i586-1.txz: Upgraded.
kde/kwin-5.22.1-i586-1.txz: Upgraded.
kde/kwrited-5.22.1-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.1-i586-1.txz: Upgraded.
kde/libkscreen-5.22.1-i586-1.txz: Upgraded.
kde/libksysguard-5.22.1-i586-1.txz: Upgraded.
kde/milou-5.22.1-i586-1.txz: Upgraded.
kde/oxygen-5.22.1-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.1-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.1-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.1-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.1-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.1-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.1-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.1-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.1-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.1-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.1-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.1-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.1-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.1-i586-1.txz: Upgraded.
kde/powerdevil-5.22.1-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.1-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.1-i586-1.txz: Upgraded.
kde/systemsettings-5.22.1-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.1-i586-1.txz: Upgraded.
l/M2Crypto-0.38.0-i586-1.txz: Upgraded.
l/libclc-12.0.0-i586-1.txz: Upgraded.
       Thanks to Heinz Wiesinger.
l/spirv-llvm-translator-12.0.0-i586-1.txz: Added.
       Needed by libclc. Thanks to Heinz Wiesinger.
n/getmail-6.17-i586-1.txz: Upgraded.
n/nfs-utils-2.5.4-i586-1.txz: Upgraded.
n/proftpd-1.3.7b-i586-1.txz: Upgraded.
x/fonttosfnt-1.2.2-i586-1.txz: Upgraded.
x/vulkan-sdk-1.2.176.1-i586-1.txz: Upgraded.
       Thanks to Heinz Wiesinger.
xap/mozilla-firefox-89.0.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/89.0.1/releasenotes/
       (* Security fix *)
+--------------------------+
Mon Jun 14 19:10:17 UTC 2021
ap/alsa-utils-1.2.5.1-i586-1.txz: Upgraded.
d/cmake-3.20.4-i586-1.txz: Upgraded.
kde/pulseaudio-qt-1.3-i586-1.txz: Upgraded.
l/alsa-lib-1.2.5.1-i586-1.txz: Upgraded.
n/bluez-5.59-i586-1.txz: Upgraded.
n/postfix-3.6.1-i586-1.txz: Upgraded.
+--------------------------+
Sun Jun 13 19:27:08 UTC 2021
ap/sudo-1.9.7p1-i586-1.txz: Upgraded.
kde/attica-5.83.0-i586-1.txz: Upgraded.
kde/baloo-5.83.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.83.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.83.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.83.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.83.0-i586-1.txz: Upgraded.
kde/kactivities-5.83.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.83.0-i586-1.txz: Upgraded.
kde/kapidox-5.83.0-i586-1.txz: Upgraded.
kde/karchive-5.83.0-i586-1.txz: Upgraded.
kde/kauth-5.83.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.83.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.83.0-i586-1.txz: Upgraded.
kde/kcmutils-5.83.0-i586-1.txz: Upgraded.
kde/kcodecs-5.83.0-i586-1.txz: Upgraded.
kde/kcompletion-5.83.0-i586-1.txz: Upgraded.
kde/kconfig-5.83.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.83.0-i586-1.txz: Upgraded.
kde/kcontacts-5.83.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.83.0-i586-1.txz: Upgraded.
kde/kcrash-5.83.0-i586-1.txz: Upgraded.
kde/kdav-5.83.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.83.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.83.0-i586-1.txz: Upgraded.
kde/kded-5.83.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.83.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.83.0-i586-1.txz: Upgraded.
kde/kdesu-5.83.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.83.0-i586-1.txz: Upgraded.
kde/kdnssd-5.83.0-i586-1.txz: Upgraded.
kde/kdoctools-5.83.0-i586-1.txz: Upgraded.
kde/kemoticons-5.83.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.83.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.83.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.83.0-i586-1.txz: Upgraded.
kde/kholidays-5.83.0-i586-1.txz: Upgraded.
kde/khtml-5.83.0-i586-1.txz: Upgraded.
kde/ki18n-5.83.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.83.0-i586-1.txz: Upgraded.
kde/kidletime-5.83.0-i586-1.txz: Upgraded.
kde/kimageformats-5.83.0-i586-1.txz: Upgraded.
kde/kinit-5.83.0-i586-1.txz: Upgraded.
kde/kio-5.83.0-i586-1.txz: Upgraded.
kde/kirigami2-5.83.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.83.0-i586-1.txz: Upgraded.
kde/kitemviews-5.83.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.83.0-i586-1.txz: Upgraded.
kde/kjs-5.83.0-i586-1.txz: Upgraded.
kde/kjsembed-5.83.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.83.0-i586-1.txz: Upgraded.
kde/knewstuff-5.83.0-i586-1.txz: Upgraded.
kde/knotifications-5.83.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.83.0-i586-1.txz: Upgraded.
kde/kpackage-5.83.0-i586-1.txz: Upgraded.
kde/kparts-5.83.0-i586-1.txz: Upgraded.
kde/kpeople-5.83.0-i586-1.txz: Upgraded.
kde/kplotting-5.83.0-i586-1.txz: Upgraded.
kde/kpty-5.83.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.83.0-i586-1.txz: Upgraded.
kde/kross-5.83.0-i586-1.txz: Upgraded.
kde/krunner-5.83.0-i586-1.txz: Upgraded.
kde/kservice-5.83.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.83.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.83.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.83.0-i586-1.txz: Upgraded.
kde/kwallet-5.83.0-i586-1.txz: Upgraded.
kde/kwayland-5.83.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.83.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.83.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.83.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.83.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.83.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.83.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.83.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.83.0-i586-1.txz: Upgraded.
kde/prison-5.83.0-i586-1.txz: Upgraded.
kde/purpose-5.83.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.83.0-i586-1.txz: Upgraded.
kde/solid-5.83.0-i586-1.txz: Upgraded.
kde/sonnet-5.83.0-i586-1.txz: Upgraded.
kde/syndication-5.83.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.83.0-i586-1.txz: Upgraded.
kde/threadweaver-5.83.0-i586-1.txz: Upgraded.
l/imagemagick-7.1.0_0-i586-1.txz: Upgraded.
n/mutt-2.1.0-i586-1.txz: Upgraded.
+--------------------------+
Fri Jun 11 19:09:59 UTC 2021
a/util-linux-2.37-i586-1.txz: Upgraded.
l/glib2-2.68.3-i586-1.txz: Upgraded.
l/mozilla-nss-3.67-i586-1.txz: Upgraded.
l/rubygem-asciidoctor-2.0.15-i586-1.txz: Added.
       This is required to process the man pages for the util-linux build.
       Thanks to Trevor D. Cook.
n/gnupg2-2.2.28-i586-1.txz: Upgraded.
+--------------------------+
Thu Jun 10 23:42:12 UTC 2021
a/gptfdisk-1.0.8-i586-1.txz: Upgraded.
a/kernel-generic-5.12.10-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.10_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.10-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.10_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.10-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.10_smp-i686-1.txz: Upgraded.
ap/sysstat-12.5.4-i586-1.txz: Upgraded.
ap/tmux-3.2a-i586-1.txz: Upgraded.
ap/vim-8.2.2971-i586-1.txz: Upgraded.
d/kernel-headers-5.12.10_smp-x86-1.txz: Upgraded.
k/kernel-source-5.12.10_smp-noarch-1.txz: Upgraded.
kde/akonadi-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-mime-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-notes-21.04.2-i586-1.txz: Upgraded.
kde/akonadi-search-21.04.2-i586-1.txz: Upgraded.
kde/akonadiconsole-21.04.2-i586-1.txz: Upgraded.
kde/akregator-21.04.2-i586-1.txz: Upgraded.
kde/analitza-21.04.2-i586-1.txz: Upgraded.
kde/ark-21.04.2-i586-1.txz: Upgraded.
kde/artikulate-21.04.2-i586-1.txz: Upgraded.
kde/audiocd-kio-21.04.2-i586-1.txz: Upgraded.
kde/baloo-widgets-21.04.2-i586-1.txz: Upgraded.
kde/blinken-21.04.2-i586-1.txz: Upgraded.
kde/bomber-21.04.2-i586-1.txz: Upgraded.
kde/bovo-21.04.2-i586-1.txz: Upgraded.
kde/calendarsupport-21.04.2-i586-1.txz: Upgraded.
kde/cantor-21.04.2-i586-1.txz: Upgraded.
kde/cervisia-21.04.2-i586-1.txz: Upgraded.
kde/dolphin-21.04.2-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.04.2-i586-1.txz: Upgraded.
kde/dragon-21.04.2-i586-1.txz: Upgraded.
kde/elisa-21.04.2-i586-1.txz: Upgraded.
kde/eventviews-21.04.2-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.04.2-i586-1.txz: Upgraded.
kde/filelight-21.04.2-i586-1.txz: Upgraded.
kde/granatier-21.04.2-i586-1.txz: Upgraded.
kde/grantlee-editor-21.04.2-i586-1.txz: Upgraded.
kde/grantleetheme-21.04.2-i586-1.txz: Upgraded.
kde/gwenview-21.04.2-i586-1.txz: Upgraded.
kde/incidenceeditor-21.04.2-i586-1.txz: Upgraded.
kde/itinerary-21.04.2-i586-1.txz: Upgraded.
kde/juk-21.04.2-i586-1.txz: Upgraded.
kde/k3b-21.04.2-i586-1.txz: Upgraded.
kde/kaddressbook-21.04.2-i586-1.txz: Upgraded.
kde/kalarm-21.04.2-i586-1.txz: Upgraded.
kde/kalarmcal-21.04.2-i586-1.txz: Upgraded.
kde/kalgebra-21.04.2-i586-1.txz: Upgraded.
kde/kalzium-21.04.2-i586-1.txz: Upgraded.
kde/kamera-21.04.2-i586-1.txz: Upgraded.
kde/kamoso-21.04.2-i586-1.txz: Upgraded.
kde/kanagram-21.04.2-i586-1.txz: Upgraded.
kde/kapman-21.04.2-i586-1.txz: Upgraded.
kde/kapptemplate-21.04.2-i586-1.txz: Upgraded.
kde/kate-21.04.2-i586-1.txz: Upgraded.
kde/katomic-21.04.2-i586-1.txz: Upgraded.
kde/kbackup-21.04.2-i586-1.txz: Upgraded.
kde/kblackbox-21.04.2-i586-1.txz: Upgraded.
kde/kblocks-21.04.2-i586-1.txz: Upgraded.
kde/kbounce-21.04.2-i586-1.txz: Upgraded.
kde/kbreakout-21.04.2-i586-1.txz: Upgraded.
kde/kbruch-21.04.2-i586-1.txz: Upgraded.
kde/kcachegrind-21.04.2-i586-1.txz: Upgraded.
kde/kcalc-21.04.2-i586-1.txz: Upgraded.
kde/kcalutils-21.04.2-i586-1.txz: Upgraded.
kde/kcharselect-21.04.2-i586-1.txz: Upgraded.
kde/kcolorchooser-21.04.2-i586-1.txz: Upgraded.
kde/kcron-21.04.2-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.04.2-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.04.2-i586-1.txz: Upgraded.
kde/kdebugsettings-21.04.2-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.04.2-i586-1.txz: Upgraded.
kde/kdeedu-data-21.04.2-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.04.2-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.04.2-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.04.2-i586-1.txz: Upgraded.
kde/kdenlive-21.04.2-i586-1.txz: Upgraded.
kde/kdepim-addons-21.04.2-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.04.2-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.04.2-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.04.2-i586-1.txz: Upgraded.
kde/kdf-21.04.2-i586-1.txz: Upgraded.
kde/kdialog-21.04.2-i586-1.txz: Upgraded.
kde/kdiamond-21.04.2-i586-1.txz: Upgraded.
kde/keditbookmarks-21.04.2-i586-1.txz: Upgraded.
kde/kfind-21.04.2-i586-1.txz: Upgraded.
kde/kfloppy-21.04.2-i586-1.txz: Upgraded.
kde/kfourinline-21.04.2-i586-1.txz: Upgraded.
kde/kgeography-21.04.2-i586-1.txz: Upgraded.
kde/kget-21.04.2-i586-1.txz: Upgraded.
kde/kgoldrunner-21.04.2-i586-1.txz: Upgraded.
kde/kgpg-21.04.2-i586-1.txz: Upgraded.
kde/khangman-21.04.2-i586-1.txz: Upgraded.
kde/khelpcenter-21.04.2-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.04.2-i586-1.txz: Upgraded.
kde/kig-21.04.2-i586-1.txz: Upgraded.
kde/kigo-21.04.2-i586-1.txz: Upgraded.
kde/killbots-21.04.2-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.04.2-i586-1.txz: Upgraded.
kde/kimap-21.04.2-i586-1.txz: Upgraded.
kde/kio-extras-21.04.2-i586-1.txz: Upgraded.
kde/kio-gdrive-21.04.2-i586-1.txz: Upgraded.
kde/kipi-plugins-21.04.2-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.04.2-i586-1.txz: Upgraded.
kde/kiriki-21.04.2-i586-1.txz: Upgraded.
kde/kiten-21.04.2-i586-1.txz: Upgraded.
kde/kitinerary-21.04.2-i586-1.txz: Upgraded.
kde/kjumpingcube-21.04.2-i586-1.txz: Upgraded.
kde/kldap-21.04.2-i586-1.txz: Upgraded.
kde/kleopatra-21.04.2-i586-1.txz: Upgraded.
kde/klickety-21.04.2-i586-1.txz: Upgraded.
kde/klines-21.04.2-i586-1.txz: Upgraded.
kde/kmag-21.04.2-i586-1.txz: Upgraded.
kde/kmahjongg-21.04.2-i586-1.txz: Upgraded.
kde/kmail-21.04.2-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.04.2-i586-1.txz: Upgraded.
kde/kmailtransport-21.04.2-i586-1.txz: Upgraded.
kde/kmbox-21.04.2-i586-1.txz: Upgraded.
kde/kmime-21.04.2-i586-1.txz: Upgraded.
kde/kmines-21.04.2-i586-1.txz: Upgraded.
kde/kmix-21.04.2-i586-1.txz: Upgraded.
kde/kmousetool-21.04.2-i586-1.txz: Upgraded.
kde/kmouth-21.04.2-i586-1.txz: Upgraded.
kde/kmplot-21.04.2-i586-1.txz: Upgraded.
kde/knavalbattle-21.04.2-i586-1.txz: Upgraded.
kde/knetwalk-21.04.2-i586-1.txz: Upgraded.
kde/knights-21.04.2-i586-1.txz: Upgraded.
kde/knotes-21.04.2-i586-1.txz: Upgraded.
kde/kolf-21.04.2-i586-1.txz: Upgraded.
kde/kollision-21.04.2-i586-1.txz: Upgraded.
kde/kolourpaint-21.04.2-i586-1.txz: Upgraded.
kde/kompare-21.04.2-i586-1.txz: Upgraded.
kde/konqueror-21.04.2-i586-1.txz: Upgraded.
kde/konquest-21.04.2-i586-1.txz: Upgraded.
kde/konsole-21.04.2-i586-1.txz: Upgraded.
kde/kontact-21.04.2-i586-1.txz: Upgraded.
kde/kontactinterface-21.04.2-i586-1.txz: Upgraded.
kde/kontrast-21.04.2-i586-1.txz: Upgraded.
kde/konversation-21.04.2-i586-1.txz: Upgraded.
kde/kopeninghours-21.04.2-i586-1.txz: Upgraded.
kde/kopete-21.04.2-i586-1.txz: Upgraded.
kde/korganizer-21.04.2-i586-1.txz: Upgraded.
kde/kosmindoormap-21.04.2-i586-1.txz: Upgraded.
kde/kpat-21.04.2-i586-1.txz: Upgraded.
kde/kpimtextedit-21.04.2-i586-1.txz: Upgraded.
kde/kpkpass-21.04.2-i586-1.txz: Upgraded.
kde/kpmcore-21.04.2-i586-1.txz: Upgraded.
kde/kpublictransport-21.04.2-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.04.2-i586-1.txz: Upgraded.
kde/krdc-21.04.2-i586-1.txz: Upgraded.
kde/kreversi-21.04.2-i586-1.txz: Upgraded.
kde/krfb-21.04.2-i586-1.txz: Upgraded.
kde/kross-interpreters-21.04.2-i586-1.txz: Upgraded.
kde/kruler-21.04.2-i586-1.txz: Upgraded.
kde/kshisen-21.04.2-i586-1.txz: Upgraded.
kde/ksirk-21.04.2-i586-1.txz: Upgraded.
kde/ksmtp-21.04.2-i586-1.txz: Upgraded.
kde/ksnakeduel-21.04.2-i586-1.txz: Upgraded.
kde/kspaceduel-21.04.2-i586-1.txz: Upgraded.
kde/ksquares-21.04.2-i586-1.txz: Upgraded.
kde/ksudoku-21.04.2-i586-1.txz: Upgraded.
kde/ksystemlog-21.04.2-i586-1.txz: Upgraded.
kde/kteatime-21.04.2-i586-1.txz: Upgraded.
kde/ktimer-21.04.2-i586-1.txz: Upgraded.
kde/ktnef-21.04.2-i586-1.txz: Upgraded.
kde/ktorrent-21.04.2-i586-1.txz: Upgraded.
kde/ktouch-21.04.2-i586-1.txz: Upgraded.
kde/kturtle-21.04.2-i586-1.txz: Upgraded.
kde/kubrick-21.04.2-i586-1.txz: Upgraded.
kde/kwalletmanager-21.04.2-i586-1.txz: Upgraded.
kde/kwave-21.04.2-i586-1.txz: Upgraded.
kde/kwordquiz-21.04.2-i586-1.txz: Upgraded.
kde/libgravatar-21.04.2-i586-1.txz: Upgraded.
kde/libkcddb-21.04.2-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.04.2-i586-1.txz: Upgraded.
kde/libkdcraw-21.04.2-i586-1.txz: Upgraded.
kde/libkdegames-21.04.2-i586-1.txz: Upgraded.
kde/libkdepim-21.04.2-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.04.2-i586-1.txz: Upgraded.
kde/libkexiv2-21.04.2-i586-1.txz: Upgraded.
kde/libkgapi-21.04.2-i586-1.txz: Upgraded.
kde/libkipi-21.04.2-i586-1.txz: Upgraded.
kde/libkleo-21.04.2-i586-1.txz: Upgraded.
kde/libkmahjongg-21.04.2-i586-1.txz: Upgraded.
kde/libkomparediff2-21.04.2-i586-1.txz: Upgraded.
kde/libksane-21.04.2-i586-1.txz: Upgraded.
kde/libksieve-21.04.2-i586-1.txz: Upgraded.
kde/libktorrent-21.04.2-i586-1.txz: Upgraded.
kde/lokalize-21.04.2-i586-1.txz: Upgraded.
kde/lskat-21.04.2-i586-1.txz: Upgraded.
kde/mailcommon-21.04.2-i586-1.txz: Upgraded.
kde/mailimporter-21.04.2-i586-1.txz: Upgraded.
kde/marble-21.04.2-i586-1.txz: Upgraded.
kde/markdownpart-21.04.2-i586-1.txz: Upgraded.
kde/mbox-importer-21.04.2-i586-1.txz: Upgraded.
kde/messagelib-21.04.2-i586-1.txz: Upgraded.
kde/minuet-21.04.2-i586-1.txz: Upgraded.
kde/okular-21.04.2-i586-1.txz: Upgraded.
kde/palapeli-21.04.2-i586-1.txz: Upgraded.
kde/parley-21.04.2-i586-1.txz: Upgraded.
kde/partitionmanager-21.04.2-i586-1.txz: Upgraded.
kde/picmi-21.04.2-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.04.2-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.04.2-i586-1.txz: Upgraded.
kde/pimcommon-21.04.2-i586-1.txz: Upgraded.
kde/poxml-21.04.2-i586-1.txz: Upgraded.
kde/print-manager-21.04.2-i586-1.txz: Upgraded.
kde/rocs-21.04.2-i586-1.txz: Upgraded.
kde/spectacle-21.04.2-i586-1.txz: Upgraded.
kde/step-21.04.2-i586-1.txz: Upgraded.
kde/svgpart-21.04.2-i586-1.txz: Upgraded.
kde/sweeper-21.04.2-i586-1.txz: Upgraded.
kde/umbrello-21.04.2-i586-1.txz: Upgraded.
kde/yakuake-21.04.2-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.04.2-i586-1.txz: Upgraded.
l/fuse3-3.10.4-i586-1.txz: Upgraded.
l/libpcap-1.10.1-i586-1.txz: Upgraded.
l/pipewire-0.3.30-i586-1.txz: Upgraded.
n/libksba-1.6.0-i586-1.txz: Upgraded.
n/tcpdump-4.99.1-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.2971-i586-1.txz: Upgraded.
xap/xscreensaver-6.01-i586-1.txz: Upgraded.
extra/linux-5.12.10-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Jun 9 18:59:30 UTC 2021
a/dialog-1.3_20210530-i586-1.txz: Upgraded.
a/grub-2.06-i586-1.txz: Upgraded.
a/kernel-firmware-20210609_0f66b74-noarch-1.txz: Upgraded.
d/gcc-10.3.0-i586-2.txz: Rebuilt.
       Applied upstream patches to address the regressions noted in PR100101 and
       PR100102. Thanks to eduardr.
d/gcc-brig-10.3.0-i586-2.txz: Rebuilt.
d/gcc-g++-10.3.0-i586-2.txz: Rebuilt.
d/gcc-gdc-10.3.0-i586-2.txz: Rebuilt.
d/gcc-gfortran-10.3.0-i586-2.txz: Rebuilt.
d/gcc-gnat-10.3.0-i586-2.txz: Rebuilt.
d/gcc-go-10.3.0-i586-2.txz: Rebuilt.
d/gcc-objc-10.3.0-i586-2.txz: Rebuilt.
d/meson-0.58.1-i586-1.txz: Upgraded.
kde/bluedevil-5.22.0-i586-1.txz: Upgraded.
kde/breeze-5.22.0-i586-1.txz: Upgraded.
kde/breeze-grub-5.22.0-i586-1.txz: Upgraded.
kde/breeze-gtk-5.22.0-i586-1.txz: Upgraded.
kde/drkonqi-5.22.0-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.22.0-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.22.0-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.22.0-i586-1.txz: Upgraded.
kde/kdecoration-5.22.0-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.22.0-i586-1.txz: Upgraded.
kde/kgamma5-5.22.0-i586-1.txz: Upgraded.
kde/khotkeys-5.22.0-i586-1.txz: Upgraded.
kde/kinfocenter-5.22.0-i586-1.txz: Upgraded.
kde/kmenuedit-5.22.0-i586-1.txz: Upgraded.
kde/krita-4.4.5-i586-1.txz: Upgraded.
kde/kscreen-5.22.0-i586-1.txz: Upgraded.
kde/kscreenlocker-5.22.0-i586-1.txz: Upgraded.
kde/ksshaskpass-5.22.0-i586-1.txz: Upgraded.
kde/ksysguard-5.22.0-i586-1.txz: Upgraded.
kde/ksystemstats-5.22.0-i586-1.txz: Added.
kde/kwallet-pam-5.22.0-i586-1.txz: Upgraded.
kde/kwayland-integration-5.22.0-i586-1.txz: Upgraded.
kde/kwayland-server-5.22.0-i586-1.txz: Upgraded.
kde/kwin-5.22.0-i586-1.txz: Upgraded.
kde/kwrited-5.22.0-i586-1.txz: Upgraded.
kde/latte-dock-0.9.12-i586-1.txz: Upgraded.
kde/layer-shell-qt-5.22.0-i586-1.txz: Added.
kde/libkscreen-5.22.0-i586-1.txz: Upgraded.
kde/libksysguard-5.22.0-i586-1.txz: Upgraded.
kde/milou-5.22.0-i586-1.txz: Upgraded.
kde/oxygen-5.22.0-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.22.0-i586-1.txz: Upgraded.
kde/plasma-desktop-5.22.0-i586-1.txz: Upgraded.
kde/plasma-disks-5.22.0-i586-1.txz: Upgraded.
kde/plasma-firewall-5.22.0-i586-1.txz: Upgraded.
kde/plasma-integration-5.22.0-i586-1.txz: Upgraded.
kde/plasma-nm-5.22.0-i586-1.txz: Upgraded.
kde/plasma-pa-5.22.0-i586-1.txz: Upgraded.
kde/plasma-sdk-5.22.0-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.22.0-i586-1.txz: Upgraded.
kde/plasma-vault-5.22.0-i586-1.txz: Upgraded.
kde/plasma-workspace-5.22.0-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.22.0-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.22.0-i586-1.txz: Upgraded.
kde/powerdevil-5.22.0-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.22.0-i586-1.txz: Upgraded.
kde/sddm-kcm-5.22.0-i586-1.txz: Upgraded.
kde/systemsettings-5.22.0-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.22.0-i586-1.txz: Upgraded.
l/alsa-lib-1.2.5-i586-3.txz: Rebuilt.
       Apply upstream patches to fix device detection. Thanks to USUARIONUEVO.
l/libiodbc-3.52.15-i586-1.txz: Upgraded.
n/sshfs-3.7.2-i586-1.txz: Upgraded.
n/wpa_supplicant-2.9-i586-7.txz: Rebuilt.
       Support WPA3 and add some more options from the defconfig included in the
       source to Slackware's config file. Thanks to ArTourter.
x/xkeyboard-config-2.33-noarch-1.txz: Upgraded.
x/xterm-368-i586-1.txz: Upgraded.
xfce/xfce4-settings-4.16.2-i586-1.txz: Upgraded.
+--------------------------+
Mon Jun 7 18:53:49 UTC 2021
Hey folks! Sorry about the delay in getting this batch out but I had other
distractions going on here last week that prevented getting this one wrapped
up. Anyway, probably the highlight of this update set is that we've decided
to abandon the 5.10 LTS kernel in favor of following the latest one. We've
never really had a policy that required LTS in a stable release although that
is how it has been done for years, but based on comments from the Slackware
community it seems like 5.10 LTS isn't getting a lot of love and lacks
hardware support that people need now. Conversely, the reports on 5.12 have
been almost entirely positive, so we're going to provide what we think is the
best available kernel. It's unlikely that we'll see another LTS prior to
release, so the plan for maintenance is to keep following the latest kernels
as needed for security purposes. If that means we have to jump to a new branch
while supporting the stable release, we'll start the kernel out in testing
first until we've had some feedback that it's safe to move it to the patches
directory. Sooner or later we will end up on an LTS kernel again, and at that
point we'll just roll with that one. Feel free to comment (or complain) about
this plan on LQ... I'll be curious to see what people think. Anyway, enjoy!
a/hwdata-0.348-noarch-1.txz: Upgraded.
a/kernel-generic-5.12.9-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.12.9_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.12.9-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.12.9_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.12.9-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.12.9_smp-i686-1.txz: Upgraded.
ap/ispell-3.4.04-i586-1.txz: Upgraded.
ap/mpg123-1.28.0-i586-1.txz: Upgraded.
ap/slackpkg-15.0.5-noarch-1.txz: Upgraded.
       Add "--" option to "command cd" in bash completion file. (akinomyoga)
       shell-completions/slackpkg.bash: add "show-changelog".
       Import bash-completion file from upstream project.
       Added the new-config actions for specific files. (Piter PUNK)
       Harden slackpkg with respect to obtaining GPG key. (CRTS)
d/clisp-2.50_20191103_c26de7873-i586-5.txz: Rebuilt.
       Upgraded to libffcall-2.3.
d/git-2.32.0-i586-1.txz: Upgraded.
d/kernel-headers-5.12.9_smp-x86-1.txz: Upgraded.
d/poke-1.3-i586-1.txz: Upgraded.
d/vala-0.52.4-i586-1.txz: Upgraded.
k/kernel-source-5.12.9_smp-noarch-1.txz: Upgraded.
kde/calligra-3.2.1-i586-9.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/cantor-21.04.1-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/digikam-7.2.0-i586-3.txz: Rebuilt.
       Recompiled against imagemagick-7.0.11_14.
kde/kfilemetadata-5.82.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/kile-2.9.93-i586-9.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/kitinerary-21.04.1-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/krita-4.4.3-i586-5.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
kde/okular-21.04.1-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
l/alsa-lib-1.2.5-i586-2.txz: Rebuilt.
       Account for unexpected packing of the conf file tarballs. We'll see if this
       is enough to make things work well again.
l/at-spi2-core-2.40.2-i586-1.txz: Upgraded.
l/dvdauthor-0.7.2-i586-5.txz: Rebuilt.
       Recompiled against imagemagick-7.0.11_14.
l/libogg-1.3.5-i586-1.txz: Upgraded.
l/librsvg-2.50.7-i586-1.txz: Upgraded.
l/pipewire-0.3.29-i586-1.txz: Upgraded.
l/polkit-0.119-i586-1.txz: Upgraded.
       This update includes a mitigation for local privilege escalation using
       polkit_system_bus_name_get_creds_sync().
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560
       (* Security fix *)
l/poppler-21.06.1-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/pycairo-1.20.1-i586-1.txz: Upgraded.
l/qca-2.3.3-i586-1.txz: Upgraded.
l/vte-0.64.2-i586-1.txz: Upgraded.
n/epic5-2.1.5-i586-1.txz: Upgraded.
n/httpd-2.4.48-i586-1.txz: Upgraded.
       This release contains security fixes and improvements.
       mod_http2: Fix a potential NULL pointer dereference.
       Unexpected <Location> section matching with 'MergeSlashes OFF'.
       mod_auth_digest: possible stack overflow by one nul byte while validating
       the Digest nonce.
       mod_session: Fix possible crash due to NULL pointer dereference, which
       could be used to cause a Denial of Service with a malicious backend
       server and SessionHeader.
       mod_session: Fix possible crash due to NULL pointer dereference, which
       could be used to cause a Denial of Service.
       mod_proxy_http: Fix possible crash due to NULL pointer dereference, which
       could be used to cause a Denial of Service.
       mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end
       negotiation.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
       (* Security fix *)
n/libmbim-1.24.8-i586-1.txz: Upgraded.
n/libqmi-1.28.6-i586-1.txz: Upgraded.
n/nettle-3.7.3-i586-1.txz: Upgraded.
n/openldap-2.4.59-i586-1.txz: Upgraded.
n/p11-kit-0.24.0-i586-1.txz: Upgraded.
n/php-7.4.20-i586-1.txz: Upgraded.
n/vsftpd-3.0.4-i586-1.txz: Upgraded.
n/whois-5.5.10-i586-1.txz: Upgraded.
x/libX11-1.7.2-i586-1.txz: Upgraded.
       This is a bug fix release, correcting a regression introduced by and
       improving the checks from the fix for CVE-2021-31535.
x/libinput-1.18.0-i586-1.txz: Upgraded.
x/mesa-21.1.2-i586-1.txz: Upgraded.
xap/blueman-2.2.1-i586-1.txz: Upgraded.
xap/gnuplot-5.4.2-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-78.11.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.11.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-26/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29964
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967
       (* Security fix *)
xap/pidgin-2.14.5-i586-1.txz: Upgraded.
xap/xine-lib-1.2.11-i586-6.txz: Rebuilt.
       Recompiled against poppler-21.06.1.
extra/bash-completion/bash-completion-2.11-noarch-2.txz: Rebuilt.
       Removed the slackpkg completion file.
extra/linux-5.12.9-nosmp-sdk/*: Upgraded.
extra/php8/php8-8.0.7-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Jun 1 18:41:29 UTC 2021
l/gsl-2.7-i586-1.txz: Upgraded.
l/mozjs78-78.11.0esr-i586-1.txz: Upgraded.
n/samba-4.14.5-i586-1.txz: Upgraded.
+--------------------------+
Mon May 31 23:21:18 UTC 2021
ap/alsa-utils-1.2.5-i586-1.txz: Upgraded.
ap/ispell-3.4.03-i586-1.txz: Upgraded.
d/m4-1.4.19-i586-1.txz: Upgraded.
l/alsa-lib-1.2.5-i586-1.txz: Upgraded.
l/alsa-plugins-1.2.5-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_14-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/libedit-20210522_3.1-i586-1.txz: Upgraded.
l/python-certifi-2021.5.30-i586-1.txz: Upgraded.
xap/mozilla-firefox-89.0-i686-1.txz: Upgraded.
       This is a bugfix release.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/89.0/releasenotes/
+--------------------------+
Sat May 29 17:36:51 UTC 2021
n/dhcp-4.4.2_P1-i586-1.txz: Upgraded.
       This update fixes a security issue:
       Corrected a buffer overwrite possible when parsing hexadecimal
       literals with more than 1024 octets. Reported by Jon Franklin from Dell,
       and also by Pawel Wieczorkiewicz from Amazon Web Services. [Gitlab #182]
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217
       (* Security fix *)
+--------------------------+
Fri May 28 19:26:15 UTC 2021
a/cryptsetup-2.3.6-i586-1.txz: Upgraded.
a/kernel-generic-5.10.41-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.41_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.41-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.41_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.41-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.41_smp-i686-1.txz: Upgraded.
d/cmake-3.20.3-i586-1.txz: Upgraded.
d/kernel-headers-5.10.41_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.41_smp-noarch-1.txz: Upgraded.
l/mozilla-nss-3.66-i586-1.txz: Upgraded.
extra/linux-5.10.41-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.8-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.8_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.8-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.8-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.8_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu May 27 18:50:50 UTC 2021
a/aaa_libraries-15.0-i586-7.txz: Rebuilt.
       Upgraded: libcap.so.2.50, libelf-0.185.so, libzstd.so.1.5.0,
       libexpat.so.1.8.1, libglib-2.0.so.0.6800.2, libgmodule-2.0.so.0.6800.2,
       libgobject-2.0.so.0.6800.2, libgthread-2.0.so.0.6800.2, libidn.so.12.6.2,
       libisl.so.23.1.0, libpcre2-8.so.0.10.2, libtiff.so.5.7.0, libtiffxx.so.5.7.0.
ap/mariadb-10.5.10-i586-2.txz: Rebuilt.
       Recompiled against pcre2-10.37.
ap/vim-8.2.2891-i586-1.txz: Upgraded.
l/netpbm-10.94.05-i586-1.txz: Upgraded.
l/pcre2-10.37-i586-1.txz: Upgraded.
       Shared library .so-version bump.
xap/vim-gvim-8.2.2891-i586-1.txz: Upgraded.
+--------------------------+
Wed May 26 20:00:32 UTC 2021
a/kernel-generic-5.10.40-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.40_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.40-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.40_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.40-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.40_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.40_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.40_smp-noarch-1.txz: Upgraded.
l/librsvg-2.50.6-i586-1.txz: Upgraded.
l/python-urllib3-1.26.5-i586-1.txz: Upgraded.
n/ca-certificates-20210526-noarch-1.txz: Upgraded.
       This update provides the latest CA certificates to check for the
       authenticity of SSL connections.
n/curl-7.77.0-i586-1.txz: Upgraded.
       This update fixes security issues:
       schannel cipher selection surprise
       TELNET stack contents disclosure
       TLS session caching disaster
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22297
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22298
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22901
       (* Security fix *)
n/net-snmp-5.9.1-i586-1.txz: Upgraded.
n/nftables-0.9.9-i586-1.txz: Upgraded.
x/libinput-1.17.3-i586-1.txz: Upgraded.
extra/linux-5.10.40-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.7-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.7_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.7-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.7-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.7_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue May 25 18:01:05 UTC 2021
a/xfsprogs-5.12.0-i586-1.txz: Upgraded.
l/libcap-2.50-i586-1.txz: Upgraded.
l/libqalculate-3.19.0-i586-1.txz: Upgraded.
n/gnutls-3.6.16-i586-1.txz: Upgraded.
       Fixed potential miscalculation of ECDSA/EdDSA code backported from Nettle.
       In GnuTLS, as long as it is built and linked against the fixed version of
       Nettle, this only affects GOST curves. [CVE-2021-20305]
       Fixed potential use-after-free in sending "key_share" and "pre_shared_key"
       extensions. When sending those extensions, the client may dereference a
       pointer no longer valid after realloc. This happens only when the client
       sends a large Client Hello message, e.g., when HRR is sent in a resumed
       session previously negotiated large FFDHE parameters, because the initial
       allocation of the buffer is large enough without having to call realloc
       (#1151). [GNUTLS-SA-2021-03-10, CVSS: low]
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
       (* Security fix *)
n/libnftnl-1.2.0-i586-1.txz: Upgraded.
n/links-2.23-i586-1.txz: Upgraded.
+--------------------------+
Sun May 23 19:31:03 UTC 2021
a/mcelog-176-i586-2.txz: Rebuilt.
       Fixed size syntax in logrotate config file. Thanks to ecd102.
d/parallel-20210522-noarch-1.txz: Upgraded.
d/python-pip-21.1.2-i586-1.txz: Upgraded.
d/python-setuptools-57.0.0-i586-1.txz: Upgraded.
l/elfutils-0.185-i586-1.txz: Upgraded.
l/expat-2.4.1-i586-1.txz: Upgraded.
       This update provides new mitigations against the "billion laughs" denial
       of service attack.
       For more information, see:
       https://github.com/libexpat/libexpat/blob/R_2_4_1/expat/Changes
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340
       (* Security fix *)
l/imagemagick-7.0.11_13-i586-2.txz: Rebuilt.
       Recompiled against perl-5.34.0.
n/httpd-2.4.46-i586-4.txz: Rebuilt.
       Fixed size syntax in logrotate config file. Thanks to ecd102.
+--------------------------+
Sat May 22 19:25:09 UTC 2021
a/kernel-generic-5.10.39-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.39_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.39-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.39_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.39-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.39_smp-i686-1.txz: Upgraded.
ap/slackpkg-15.0.3-noarch-1.txz: Upgraded.
       Fixed 'continue' error message. Thanks to dive.
d/kernel-headers-5.10.39_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.39_smp-noarch-1.txz: Upgraded.
l/libsigc++-2.10.7-i586-1.txz: Upgraded.
x/libepoxy-1.5.8-i586-1.txz: Upgraded.
extra/linux-5.10.39-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.6-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.6_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.6_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.6-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.6_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.6-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.6_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.6_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri May 21 19:33:21 UTC 2021
a/exfatprogs-1.1.2-i586-1.txz: Upgraded.
a/kmod-29-i586-1.txz: Upgraded.
a/logrotate-3.18.1-i586-1.txz: Upgraded.
a/pkgtools-15.0-noarch-41.txz: Rebuilt.
       installpkg, upgradepkg: skip the install script when doing upgradepkg's
       pre-install. In cases where the script operations are expensive this can
       nearly double the speed of upgrading a package. Thanks to Stuart Winter.
ap/texinfo-6.7-i586-5.txz: Rebuilt.
       Recompiled against perl-5.34.0.
ap/vim-8.2.2876-i586-1.txz: Upgraded.
       Compiled against perl-5.34.0.
d/perl-5.34.0-i586-1.txz: Upgraded.
d/sassc-3.6.2-i586-1.txz: Upgraded.
d/subversion-1.14.1-i586-3.txz: Rebuilt.
       Recompiled against perl-5.34.0.
l/libsass-3.6.5-i586-1.txz: Upgraded.
l/libsigc++3-3.0.7-i586-1.txz: Upgraded.
n/bind-9.16.16-i586-1.txz: Upgraded.
n/epic5-2.1.4-i586-2.txz: Rebuilt.
       Recompiled against perl-5.34.0.
n/irssi-1.2.3-i586-2.txz: Rebuilt.
       Recompiled against perl-5.34.0.
n/libndp-1.8-i586-1.txz: Upgraded.
n/net-snmp-5.9-i586-6.txz: Rebuilt.
       Recompiled against perl-5.34.0.
n/ntp-4.2.8p15-i586-8.txz: Rebuilt.
       Recompiled against perl-5.34.0.
n/openldap-2.4.58-i586-2.txz: Rebuilt.
       Recompiled against perl-5.34.0.
x/mesa-21.1.1-i586-1.txz: Upgraded.
xap/hexchat-2.14.3-i586-8.txz: Rebuilt.
       Recompiled against perl-5.34.0.
xap/rxvt-unicode-9.26-i586-2.txz: Rebuilt.
       Recompiled against perl-5.34.0.
xap/vim-gvim-8.2.2876-i586-1.txz: Upgraded.
       Compiled against perl-5.34.0.
+--------------------------+
Wed May 19 21:05:00 UTC 2021
a/kernel-firmware-20210518_f846292-noarch-1.txz: Upgraded.
a/kernel-generic-5.10.38-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.38_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.38-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.38_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.38-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.38_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.38_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.38_smp-noarch-1.txz: Upgraded.
l/imagemagick-7.0.11_13-i586-1.txz: Upgraded.
l/pango-1.48.5-i586-1.txz: Upgraded.
l/pipewire-0.3.28-i586-1.txz: Upgraded.
       Config files are now installed in the data dir, system overrides
       in /etc/pipewire and $HOME are checked first.
x/libX11-1.7.1-i586-1.txz: Upgraded.
       This update fixes missing request length checks in libX11 that can lead to
       the emission of extra X protocol requests to the X server.
       For more information, see:
       https://lists.x.org/archives/xorg-announce/2021-May/003088.html
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535
       (* Security fix *)
x/libdrm-2.4.106-i586-1.txz: Upgraded.
xfce/xfce4-screenshooter-1.9.9-i586-1.txz: Upgraded.
extra/linux-5.10.38-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.5-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.5_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.5_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.5-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.5_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.5-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.5_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.5_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon May 17 19:12:54 UTC 2021
l/libusb-compat-0.1.7-i586-1.txz: Upgraded.
xap/mozilla-thunderbird-78.10.2-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.10.2/releasenotes/
       (* Security fix *)
extra/fltk/fltk-1.3.6-i586-1.txz: Upgraded.
+--------------------------+
Sun May 16 18:36:10 UTC 2021
a/dialog-1.3_20210509-i586-1.txz: Upgraded.
l/libidn-1.37-i586-1.txz: Upgraded.
l/netpbm-10.94.04-i586-1.txz: Upgraded.
+--------------------------+
Sat May 15 18:09:18 UTC 2021
l/libxml2-2.9.12-i586-1.txz: Upgraded.
       This update fixes a denial-of-service security issue.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
       (* Security fix *)
l/mozilla-nss-3.65-i586-1.txz: Upgraded.
l/zstd-1.5.0-i586-1.txz: Upgraded.
n/libqmi-1.28.4-i586-1.txz: Upgraded.
xap/rxvt-unicode-9.26-i586-1.txz: Upgraded.
+--------------------------+
Fri May 14 19:59:26 UTC 2021
a/btrfs-progs-5.12.1-i586-1.txz: Upgraded.
a/kernel-generic-5.10.37-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.37_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.37-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.37_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.37-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.37_smp-i686-1.txz: Upgraded.
ap/lxc-2.0.11_fad08f383-i586-8.txz: Rebuilt.
       Add some additional required packages, run ldconfig inside the rootfs,
       update the slackpkg.conf, and account for changed hostname handling.
       Thanks to PiterPunk.
d/kernel-headers-5.10.37_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.37_smp-noarch-1.txz: Upgraded.
n/getmail-6.16-i586-1.txz: Upgraded.
extra/linux-5.10.37-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.4-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.4_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.4_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.4-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.4_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.4-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.4_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.4_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri May 14 02:38:35 UTC 2021
ap/vim-8.2.2850-i586-1.txz: Upgraded.
d/llvm-12.0.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
d/rust-1.52.1-i686-1.txz: Upgraded.
kde/akonadi-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-mime-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-notes-21.04.1-i586-1.txz: Upgraded.
kde/akonadi-search-21.04.1-i586-1.txz: Upgraded.
kde/akonadiconsole-21.04.1-i586-1.txz: Upgraded.
kde/akregator-21.04.1-i586-1.txz: Upgraded.
kde/analitza-21.04.1-i586-1.txz: Upgraded.
kde/ark-21.04.1-i586-1.txz: Upgraded.
kde/artikulate-21.04.1-i586-1.txz: Upgraded.
kde/audiocd-kio-21.04.1-i586-1.txz: Upgraded.
kde/baloo-widgets-21.04.1-i586-1.txz: Upgraded.
kde/blinken-21.04.1-i586-1.txz: Upgraded.
kde/bomber-21.04.1-i586-1.txz: Upgraded.
kde/bovo-21.04.1-i586-1.txz: Upgraded.
kde/calendarsupport-21.04.1-i586-1.txz: Upgraded.
kde/cantor-21.04.1-i586-1.txz: Upgraded.
kde/cervisia-21.04.1-i586-1.txz: Upgraded.
kde/dolphin-21.04.1-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.04.1-i586-1.txz: Upgraded.
kde/dragon-21.04.1-i586-1.txz: Upgraded.
kde/elisa-21.04.1-i586-1.txz: Upgraded.
kde/eventviews-21.04.1-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.04.1-i586-1.txz: Upgraded.
kde/filelight-21.04.1-i586-1.txz: Upgraded.
kde/granatier-21.04.1-i586-1.txz: Upgraded.
kde/grantlee-editor-21.04.1-i586-1.txz: Upgraded.
kde/grantleetheme-21.04.1-i586-1.txz: Upgraded.
kde/gwenview-21.04.1-i586-1.txz: Upgraded.
kde/incidenceeditor-21.04.1-i586-1.txz: Upgraded.
kde/itinerary-21.04.1-i586-1.txz: Upgraded.
kde/juk-21.04.1-i586-1.txz: Upgraded.
kde/k3b-21.04.1-i586-1.txz: Upgraded.
kde/kaddressbook-21.04.1-i586-1.txz: Upgraded.
kde/kalarm-21.04.1-i586-1.txz: Upgraded.
kde/kalarmcal-21.04.1-i586-1.txz: Upgraded.
kde/kalgebra-21.04.1-i586-1.txz: Upgraded.
kde/kalzium-21.04.1-i586-1.txz: Upgraded.
kde/kamera-21.04.1-i586-1.txz: Upgraded.
kde/kamoso-21.04.1-i586-1.txz: Upgraded.
kde/kanagram-21.04.1-i586-1.txz: Upgraded.
kde/kapman-21.04.1-i586-1.txz: Upgraded.
kde/kapptemplate-21.04.1-i586-1.txz: Upgraded.
kde/kate-21.04.1-i586-1.txz: Upgraded.
kde/katomic-21.04.1-i586-1.txz: Upgraded.
kde/kbackup-21.04.1-i586-1.txz: Upgraded.
kde/kblackbox-21.04.1-i586-1.txz: Upgraded.
kde/kblocks-21.04.1-i586-1.txz: Upgraded.
kde/kbounce-21.04.1-i586-1.txz: Upgraded.
kde/kbreakout-21.04.1-i586-1.txz: Upgraded.
kde/kbruch-21.04.1-i586-1.txz: Upgraded.
kde/kcachegrind-21.04.1-i586-1.txz: Upgraded.
kde/kcalc-21.04.1-i586-1.txz: Upgraded.
kde/kcalutils-21.04.1-i586-1.txz: Upgraded.
kde/kcharselect-21.04.1-i586-1.txz: Upgraded.
kde/kcolorchooser-21.04.1-i586-1.txz: Upgraded.
kde/kcron-21.04.1-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.04.1-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.04.1-i586-1.txz: Upgraded.
kde/kdebugsettings-21.04.1-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.04.1-i586-1.txz: Upgraded.
kde/kdeedu-data-21.04.1-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.04.1-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.04.1-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.04.1-i586-1.txz: Upgraded.
kde/kdenlive-21.04.1-i586-1.txz: Upgraded.
kde/kdepim-addons-21.04.1-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.04.1-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.04.1-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.04.1-i586-1.txz: Upgraded.
kde/kdevelop-5.6.2-i586-4.txz: Rebuilt.
       Recompiled against llvm-12.0.0.
kde/kdf-21.04.1-i586-1.txz: Upgraded.
kde/kdialog-21.04.1-i586-1.txz: Upgraded.
kde/kdiamond-21.04.1-i586-1.txz: Upgraded.
kde/keditbookmarks-21.04.1-i586-1.txz: Upgraded.
kde/kfind-21.04.1-i586-1.txz: Upgraded.
kde/kfloppy-21.04.1-i586-1.txz: Upgraded.
kde/kfourinline-21.04.1-i586-1.txz: Upgraded.
kde/kgeography-21.04.1-i586-1.txz: Upgraded.
kde/kget-21.04.1-i586-1.txz: Upgraded.
kde/kgoldrunner-21.04.1-i586-1.txz: Upgraded.
kde/kgpg-21.04.1-i586-1.txz: Upgraded.
kde/khangman-21.04.1-i586-1.txz: Upgraded.
kde/khelpcenter-21.04.1-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.04.1-i586-1.txz: Upgraded.
kde/kig-21.04.1-i586-1.txz: Upgraded.
kde/kigo-21.04.1-i586-1.txz: Upgraded.
kde/killbots-21.04.1-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.04.1-i586-1.txz: Upgraded.
kde/kimap-21.04.1-i586-1.txz: Upgraded.
kde/kio-extras-21.04.1-i586-1.txz: Upgraded.
kde/kio-gdrive-21.04.1-i586-1.txz: Upgraded.
kde/kipi-plugins-21.04.1-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.04.1-i586-1.txz: Upgraded.
kde/kiriki-21.04.1-i586-1.txz: Upgraded.
kde/kiten-21.04.1-i586-1.txz: Upgraded.
kde/kitinerary-21.04.1-i586-1.txz: Upgraded.
kde/kjumpingcube-21.04.1-i586-1.txz: Upgraded.
kde/kldap-21.04.1-i586-1.txz: Upgraded.
kde/kleopatra-21.04.1-i586-1.txz: Upgraded.
kde/klickety-21.04.1-i586-1.txz: Upgraded.
kde/klines-21.04.1-i586-1.txz: Upgraded.
kde/kmag-21.04.1-i586-1.txz: Upgraded.
kde/kmahjongg-21.04.1-i586-1.txz: Upgraded.
kde/kmail-21.04.1-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.04.1-i586-1.txz: Upgraded.
kde/kmailtransport-21.04.1-i586-1.txz: Upgraded.
kde/kmbox-21.04.1-i586-1.txz: Upgraded.
kde/kmime-21.04.1-i586-1.txz: Upgraded.
kde/kmines-21.04.1-i586-1.txz: Upgraded.
kde/kmix-21.04.1-i586-1.txz: Upgraded.
kde/kmousetool-21.04.1-i586-1.txz: Upgraded.
kde/kmouth-21.04.1-i586-1.txz: Upgraded.
kde/kmplot-21.04.1-i586-1.txz: Upgraded.
kde/knavalbattle-21.04.1-i586-1.txz: Upgraded.
kde/knetwalk-21.04.1-i586-1.txz: Upgraded.
kde/knights-21.04.1-i586-1.txz: Upgraded.
kde/knotes-21.04.1-i586-1.txz: Upgraded.
kde/kolf-21.04.1-i586-1.txz: Upgraded.
kde/kollision-21.04.1-i586-1.txz: Upgraded.
kde/kolourpaint-21.04.1-i586-1.txz: Upgraded.
kde/kompare-21.04.1-i586-1.txz: Upgraded.
kde/konqueror-21.04.1-i586-1.txz: Upgraded.
kde/konquest-21.04.1-i586-1.txz: Upgraded.
kde/konsole-21.04.1-i586-1.txz: Upgraded.
kde/kontact-21.04.1-i586-1.txz: Upgraded.
kde/kontactinterface-21.04.1-i586-1.txz: Upgraded.
kde/kontrast-21.04.1-i586-1.txz: Upgraded.
kde/konversation-21.04.1-i586-1.txz: Upgraded.
kde/kopeninghours-21.04.1-i586-1.txz: Upgraded.
kde/kopete-21.04.1-i586-1.txz: Upgraded.
kde/korganizer-21.04.1-i586-1.txz: Upgraded.
kde/kosmindoormap-21.04.1-i586-1.txz: Upgraded.
kde/kpat-21.04.1-i586-1.txz: Upgraded.
kde/kpimtextedit-21.04.1-i586-1.txz: Upgraded.
kde/kpkpass-21.04.1-i586-1.txz: Upgraded.
kde/kpmcore-21.04.1-i586-1.txz: Upgraded.
kde/kpublictransport-21.04.1-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.04.1-i586-1.txz: Upgraded.
kde/krdc-21.04.1-i586-1.txz: Upgraded.
kde/kreversi-21.04.1-i586-1.txz: Upgraded.
kde/krfb-21.04.1-i586-1.txz: Upgraded.
kde/kross-interpreters-21.04.1-i586-1.txz: Upgraded.
kde/kruler-21.04.1-i586-1.txz: Upgraded.
kde/kshisen-21.04.1-i586-1.txz: Upgraded.
kde/ksirk-21.04.1-i586-1.txz: Upgraded.
kde/ksmtp-21.04.1-i586-1.txz: Upgraded.
kde/ksnakeduel-21.04.1-i586-1.txz: Upgraded.
kde/kspaceduel-21.04.1-i586-1.txz: Upgraded.
kde/ksquares-21.04.1-i586-1.txz: Upgraded.
kde/ksudoku-21.04.1-i586-1.txz: Upgraded.
kde/ksystemlog-21.04.1-i586-1.txz: Upgraded.
kde/kteatime-21.04.1-i586-1.txz: Upgraded.
kde/ktimer-21.04.1-i586-1.txz: Upgraded.
kde/ktnef-21.04.1-i586-1.txz: Upgraded.
kde/ktorrent-21.04.1-i586-1.txz: Upgraded.
kde/ktouch-21.04.1-i586-1.txz: Upgraded.
kde/kturtle-21.04.1-i586-1.txz: Upgraded.
kde/kubrick-21.04.1-i586-1.txz: Upgraded.
kde/kwalletmanager-21.04.1-i586-1.txz: Upgraded.
kde/kwave-21.04.1-i586-1.txz: Upgraded.
kde/kwordquiz-21.04.1-i586-1.txz: Upgraded.
kde/libgravatar-21.04.1-i586-1.txz: Upgraded.
kde/libkcddb-21.04.1-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.04.1-i586-1.txz: Upgraded.
kde/libkdcraw-21.04.1-i586-1.txz: Upgraded.
kde/libkdegames-21.04.1-i586-1.txz: Upgraded.
kde/libkdepim-21.04.1-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.04.1-i586-1.txz: Upgraded.
kde/libkexiv2-21.04.1-i586-1.txz: Upgraded.
kde/libkgapi-21.04.1-i586-1.txz: Upgraded.
kde/libkipi-21.04.1-i586-1.txz: Upgraded.
kde/libkleo-21.04.1-i586-1.txz: Upgraded.
kde/libkmahjongg-21.04.1-i586-1.txz: Upgraded.
kde/libkomparediff2-21.04.1-i586-1.txz: Upgraded.
kde/libksane-21.04.1-i586-1.txz: Upgraded.
kde/libksieve-21.04.1-i586-1.txz: Upgraded.
kde/libktorrent-21.04.1-i586-1.txz: Upgraded.
kde/lokalize-21.04.1-i586-1.txz: Upgraded.
kde/lskat-21.04.1-i586-1.txz: Upgraded.
kde/mailcommon-21.04.1-i586-1.txz: Upgraded.
kde/mailimporter-21.04.1-i586-1.txz: Upgraded.
kde/marble-21.04.1-i586-1.txz: Upgraded.
kde/markdownpart-21.04.1-i586-1.txz: Upgraded.
kde/mbox-importer-21.04.1-i586-1.txz: Upgraded.
kde/messagelib-21.04.1-i586-1.txz: Upgraded.
kde/minuet-21.04.1-i586-1.txz: Upgraded.
kde/okular-21.04.1-i586-1.txz: Upgraded.
kde/palapeli-21.04.1-i586-1.txz: Upgraded.
kde/parley-21.04.1-i586-1.txz: Upgraded.
kde/partitionmanager-21.04.1-i586-1.txz: Upgraded.
kde/picmi-21.04.1-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.04.1-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.04.1-i586-1.txz: Upgraded.
kde/pimcommon-21.04.1-i586-1.txz: Upgraded.
kde/poxml-21.04.1-i586-1.txz: Upgraded.
kde/print-manager-21.04.1-i586-1.txz: Upgraded.
kde/rocs-21.04.1-i586-1.txz: Upgraded.
kde/spectacle-21.04.1-i586-1.txz: Upgraded.
kde/step-21.04.1-i586-1.txz: Upgraded.
kde/svgpart-21.04.1-i586-1.txz: Upgraded.
kde/sweeper-21.04.1-i586-1.txz: Upgraded.
kde/umbrello-21.04.1-i586-1.txz: Upgraded.
kde/yakuake-21.04.1-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.04.1-i586-1.txz: Upgraded.
l/libidn2-2.3.1-i586-1.txz: Upgraded.
l/libtasn1-4.17.0-i586-1.txz: Upgraded.
l/qt5-5.15.2-i586-9.txz: Rebuilt.
       Recompiled against llvm-12.0.0.
x/egl-wayland-1.1.7-i586-1.txz: Upgraded.
x/mesa-21.1.0-i586-2.txz: Rebuilt.
       Recompiled against llvm-12.0.0.
xap/vim-gvim-8.2.2850-i586-1.txz: Upgraded.
+--------------------------+
Wed May 12 19:02:20 UTC 2021
a/kernel-firmware-20210512_55d9649-noarch-1.txz: Upgraded.
a/sysklogd-2.2.3-i586-1.txz: Upgraded.
ap/sudo-1.9.7-i586-1.txz: Upgraded.
d/distcc-3.4-i586-1.txz: Upgraded.
n/rpcbind-1.2.6-i586-1.txz: Upgraded.
x/libXfixes-6.0.0-i586-1.txz: Upgraded.
x/mesa-21.1.0-i586-1.txz: Upgraded.
xfce/mousepad-0.5.5-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.3-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.3_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.3_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.3-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.3_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.3-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.3_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.3_smp-noarch-1.txz: Upgraded.
+--------------------------+
Tue May 11 19:35:17 UTC 2021
a/btrfs-progs-5.12-i586-1.txz: Upgraded.
a/hdparm-9.62-i586-1.txz: Upgraded.
a/kernel-generic-5.10.36-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.36_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.36-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.36_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.36-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.36_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.36_smp-x86-1.txz: Upgraded.
d/meson-0.58.0-i586-2.txz: Rebuilt.
       Applied upstream fix for GNOME projects failing to build.
       Some projects still require an adjustment to implicit_include_directories.
k/kernel-source-5.10.36_smp-noarch-1.txz: Upgraded.
l/elfutils-0.184-i586-1.txz: Upgraded.
l/glib2-2.68.2-i586-1.txz: Upgraded.
n/libtirpc-1.3.2-i586-1.txz: Upgraded.
n/snownews-1.8-i586-1.txz: Upgraded.
extra/linux-5.10.36-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Mon May 10 18:24:16 UTC 2021
ap/mpg123-1.27.2-i586-1.txz: Upgraded.
ap/qpdf-10.3.2-i586-1.txz: Upgraded.
d/ccache-4.3-i586-1.txz: Upgraded.
d/guile-3.0.7-i586-1.txz: Upgraded.
d/python-setuptools-56.2.0-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_12-i586-1.txz: Upgraded.
l/netpbm-10.94.03-i586-1.txz: Upgraded.
n/rp-pppoe-3.15-i586-1.txz: Upgraded.
xap/gnuchess-6.2.8-i586-1.txz: Upgraded.
+--------------------------+
Sun May 9 02:37:17 UTC 2021
kde/attica-5.82.0-i586-1.txz: Upgraded.
kde/baloo-5.82.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.82.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.82.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.82.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.82.0-i586-1.txz: Upgraded.
kde/kactivities-5.82.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.82.0-i586-1.txz: Upgraded.
kde/kapidox-5.82.0-i586-1.txz: Upgraded.
kde/karchive-5.82.0-i586-1.txz: Upgraded.
kde/kauth-5.82.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.82.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.82.0-i586-1.txz: Upgraded.
kde/kcmutils-5.82.0-i586-1.txz: Upgraded.
kde/kcodecs-5.82.0-i586-1.txz: Upgraded.
kde/kcompletion-5.82.0-i586-1.txz: Upgraded.
kde/kconfig-5.82.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.82.0-i586-1.txz: Upgraded.
kde/kcontacts-5.82.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.82.0-i586-1.txz: Upgraded.
kde/kcrash-5.82.0-i586-1.txz: Upgraded.
kde/kdav-5.82.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.82.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.82.0-i586-1.txz: Upgraded.
kde/kded-5.82.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.82.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.82.0-i586-1.txz: Upgraded.
kde/kdesu-5.82.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.82.0-i586-1.txz: Upgraded.
kde/kdnssd-5.82.0-i586-1.txz: Upgraded.
kde/kdoctools-5.82.0-i586-1.txz: Upgraded.
kde/kemoticons-5.82.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.82.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.82.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.82.0-i586-1.txz: Upgraded.
kde/kholidays-5.82.0-i586-1.txz: Upgraded.
kde/khtml-5.82.0-i586-1.txz: Upgraded.
kde/ki18n-5.82.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.82.0-i586-1.txz: Upgraded.
kde/kidletime-5.82.0-i586-1.txz: Upgraded.
kde/kimageformats-5.82.0-i586-1.txz: Upgraded.
kde/kinit-5.82.0-i586-1.txz: Upgraded.
kde/kio-5.82.0-i586-1.txz: Upgraded.
kde/kirigami2-5.82.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.82.0-i586-1.txz: Upgraded.
kde/kitemviews-5.82.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.82.0-i586-1.txz: Upgraded.
kde/kjs-5.82.0-i586-1.txz: Upgraded.
kde/kjsembed-5.82.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.82.0-i586-1.txz: Upgraded.
kde/knewstuff-5.82.0-i586-1.txz: Upgraded.
kde/knotifications-5.82.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.82.0-i586-1.txz: Upgraded.
kde/kpackage-5.82.0-i586-1.txz: Upgraded.
kde/kparts-5.82.0-i586-1.txz: Upgraded.
kde/kpeople-5.82.0-i586-1.txz: Upgraded.
kde/kplotting-5.82.0-i586-1.txz: Upgraded.
kde/kpty-5.82.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.82.0-i586-1.txz: Upgraded.
kde/kross-5.82.0-i586-1.txz: Upgraded.
kde/krunner-5.82.0-i586-1.txz: Upgraded.
kde/kservice-5.82.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.82.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.82.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.82.0-i586-1.txz: Upgraded.
kde/kwallet-5.82.0-i586-1.txz: Upgraded.
kde/kwayland-5.82.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.82.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.82.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.82.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.82.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.82.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.82.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.82.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.82.0-i586-1.txz: Upgraded.
kde/prison-5.82.0-i586-1.txz: Upgraded.
kde/purpose-5.82.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.82.0-i586-1.txz: Upgraded.
kde/solid-5.82.0-i586-1.txz: Upgraded.
kde/sonnet-5.82.0-i586-1.txz: Upgraded.
kde/syndication-5.82.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.82.0-i586-1.txz: Upgraded.
kde/threadweaver-5.82.0-i586-1.txz: Upgraded.
+--------------------------+
Sat May 8 00:24:32 UTC 2021
a/kernel-generic-5.10.35-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.35_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.35-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.35_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.35-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.35_smp-i686-1.txz: Upgraded.
a/lvm2-2.03.12-i586-1.txz: Upgraded.
ap/mariadb-10.5.10-i586-1.txz: Upgraded.
ap/mpg123-1.27.0-i586-1.txz: Upgraded.
d/kernel-headers-5.10.35_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.35_smp-noarch-1.txz: Upgraded.
n/httpd-2.4.46-i586-3.txz: Rebuilt.
       Reverted to httpd-2.4.46. Apparently 2.4.47 isn't actually released yet.
       Sorry for any problems this caused.
xfce/thunar-4.16.8-i586-1.txz: Upgraded.
extra/linux-5.10.35-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.2-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.2_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.2-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.2-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.2_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.2_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu May 6 19:40:22 UTC 2021
ap/lsscsi-0.32-i586-1.txz: Upgraded.
l/adwaita-icon-theme-40.1.1-noarch-1.txz: Upgraded.
l/gjs-1.68.1-i586-1.txz: Upgraded.
l/gnome-keyring-40.0-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_11-i586-1.txz: Upgraded.
l/pipewire-0.3.27-i586-1.txz: Upgraded.
xfce/xfce4-panel-4.16.3-i586-1.txz: Upgraded.
+--------------------------+
Wed May 5 19:56:53 UTC 2021
a/bash-5.1.008-i586-1.txz: Upgraded.
d/python-setuptools-56.1.0-i586-1.txz: Upgraded.
l/libgnt-2.14.1-i586-1.txz: Added.
       Thanks to Robby Workman.
l/mozjs78-78.10.1esr-i586-1.txz: Upgraded.
l/python-six-1.16.0-i586-1.txz: Upgraded.
l/readline-8.1.001-i586-1.txz: Upgraded.
n/mutt-2.0.7-i586-1.txz: Upgraded.
n/php-7.4.19-i586-1.txz: Upgraded.
xap/mozilla-firefox-88.0.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/88.0.1/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-20/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29953
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29952
       (* Security fix *)
xap/mozilla-thunderbird-78.10.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.10.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-19/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951
       (* Security fix *)
xap/pidgin-2.14.4-i586-2.txz: Rebuilt.
       Recompiled against libgnt-2.14.1 to restore the finch cli app.
       Thanks to Robby Workman.
xfce/xfce4-clipman-plugin-1.6.2-i586-1.txz: Upgraded.
extra/php8/php8-8.0.6-i586-1.txz: Upgraded.
+--------------------------+
Tue May 4 18:56:00 UTC 2021
a/hwdata-0.347-noarch-1.txz: Upgraded.
a/kernel-firmware-20210503_ecdfcf8-noarch-1.txz: Upgraded.
d/python3-3.9.5-i586-1.txz: Upgraded.
kde/bluedevil-5.21.5-i586-1.txz: Upgraded.
kde/breeze-5.21.5-i586-1.txz: Upgraded.
kde/breeze-grub-5.21.5-i586-1.txz: Upgraded.
kde/breeze-gtk-5.21.5-i586-1.txz: Upgraded.
kde/drkonqi-5.21.5-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.21.5-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.21.5-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.21.5-i586-1.txz: Upgraded.
kde/kdecoration-5.21.5-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.21.5-i586-1.txz: Upgraded.
kde/kgamma5-5.21.5-i586-1.txz: Upgraded.
kde/khotkeys-5.21.5-i586-1.txz: Upgraded.
kde/kinfocenter-5.21.5-i586-1.txz: Upgraded.
kde/kmenuedit-5.21.5-i586-1.txz: Upgraded.
kde/kscreen-5.21.5-i586-1.txz: Upgraded.
kde/kscreenlocker-5.21.5-i586-1.txz: Upgraded.
kde/ksshaskpass-5.21.5-i586-1.txz: Upgraded.
kde/ksysguard-5.21.5-i586-1.txz: Upgraded.
kde/kwallet-pam-5.21.5-i586-1.txz: Upgraded.
kde/kwayland-integration-5.21.5-i586-1.txz: Upgraded.
kde/kwayland-server-5.21.5-i586-1.txz: Upgraded.
kde/kwin-5.21.5-i586-1.txz: Upgraded.
kde/kwrited-5.21.5-i586-1.txz: Upgraded.
kde/libkscreen-5.21.5-i586-1.txz: Upgraded.
kde/libksysguard-5.21.5-i586-1.txz: Upgraded.
kde/milou-5.21.5-i586-1.txz: Upgraded.
kde/oxygen-5.21.5-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.21.5-i586-1.txz: Upgraded.
kde/plasma-desktop-5.21.5-i586-1.txz: Upgraded.
kde/plasma-disks-5.21.5-i586-1.txz: Upgraded.
kde/plasma-firewall-5.21.5-i586-1.txz: Upgraded.
kde/plasma-integration-5.21.5-i586-1.txz: Upgraded.
kde/plasma-nm-5.21.5-i586-1.txz: Upgraded.
kde/plasma-pa-5.21.5-i586-1.txz: Upgraded.
kde/plasma-sdk-5.21.5-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.21.5-i586-1.txz: Upgraded.
kde/plasma-vault-5.21.5-i586-1.txz: Upgraded.
kde/plasma-workspace-5.21.5-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.21.5-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.21.5-i586-1.txz: Upgraded.
kde/powerdevil-5.21.5-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.21.5-i586-1.txz: Upgraded.
kde/sddm-kcm-5.21.5-i586-1.txz: Upgraded.
kde/systemsettings-5.21.5-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.21.5-i586-1.txz: Upgraded.
l/harfbuzz-2.8.1-i586-1.txz: Upgraded.
x/ibus-table-1.12.6-i586-1.txz: Upgraded.
x/liberation-fonts-ttf-2.1.4-noarch-1.txz: Upgraded.
+--------------------------+
Mon May 3 19:58:20 UTC 2021
a/kernel-firmware-20210503_3f23f51-noarch-1.txz: Upgraded.
ap/mariadb-10.5.9-i586-1.txz: Upgraded.
       Reverted to the latest stable release.
d/mercurial-5.8-i586-1.txz: Upgraded.
kde/calligra-3.2.1-i586-8.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/cantor-21.04.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/kfilemetadata-5.81.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/kile-2.9.93-i586-8.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/kitinerary-21.04.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/krita-4.4.3-i586-4.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
kde/okular-21.04.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.05.0.
l/isl-0.24-i586-1.txz: Upgraded.
l/poppler-21.05.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-pygments-2.9.0-i586-1.txz: Upgraded.
n/ethtool-5.12-i586-1.txz: Upgraded.
n/httpd-2.4.47-i586-2.txz: Rebuilt.
       Recompiled against the mariadb-10.5.9 shared libraries.
n/postfix-3.6.0-i586-2.txz: Rebuilt.
       Recompiled against the mariadb-10.5.9 shared libraries.
xap/gparted-1.3.0-i586-1.txz: Upgraded.
testing/packages/mariadb-10.6.0-i586-1.txz: Upgraded.
       Since this is still considered alpha and not production ready, we'll put it
       in /testing for now. Unless you're using an Atom (or other 32-bit processor
       affected by the illegal instruction issue) it's probably best to stick with
       mariadb-10.5.9.
+--------------------------+
Sun May 2 19:41:57 UTC 2021
a/kernel-generic-5.10.34-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.34_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.34-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.34_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.34-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.34_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.34_smp-x86-1.txz: Upgraded.
d/meson-0.58.0-i586-1.txz: Upgraded.
d/vala-0.52.3-i586-1.txz: Upgraded.
k/kernel-source-5.10.34_smp-noarch-1.txz: Upgraded.
kde/plasma-wayland-protocols-1.3.0-i586-1.txz: Upgraded.
l/at-spi2-core-2.40.1-i586-1.txz: Upgraded.
l/libxkbcommon-1.3.0-i586-1.txz: Upgraded.
extra/linux-5.10.34-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.1-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.1_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.1-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.1-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.1_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.1_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sat May 1 18:12:57 UTC 2021
a/mcelog-176-i586-1.txz: Upgraded.
d/python-pip-21.1.1-i586-1.txz: Upgraded.
l/librsvg-2.50.5-i586-1.txz: Upgraded.
l/vte-0.64.1-i586-1.txz: Upgraded.
x/libglvnd-1.3.3-i586-1.txz: Upgraded.
x/wayland-protocols-1.21-noarch-1.txz: Upgraded.
+--------------------------+
Fri Apr 30 18:09:21 UTC 2021
l/gvfs-1.48.1-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_10-i586-1.txz: Upgraded.
n/php-7.4.18-i586-1.txz: Upgraded.
       This update fixes bugs and security issues.
       For more information, see:
       https://www.php.net/ChangeLog-7.php#7.4.18
       (* Security fix *)
n/postfix-3.6.0-i586-1.txz: Upgraded.
x/libepoxy-1.5.7-i586-1.txz: Upgraded.
x/libinput-1.17.2-i586-1.txz: Upgraded.
x/xorgproto-2021.4-i586-1.txz: Upgraded.
xap/pavucontrol-4.0-i586-4.txz: Rebuilt.
       Fix segfault after ctrl-Q. Thanks to Jonathan Woithe and 2slguevH.
xap/pidgin-2.14.4-i586-1.txz: Upgraded.
+--------------------------+
Thu Apr 29 18:49:00 UTC 2021
a/less-581.2-i586-1.txz: Upgraded.
ap/nano-5.7-i586-1.txz: Upgraded.
d/cmake-3.20.2-i586-1.txz: Upgraded.
n/httpd-2.4.47-i586-1.txz: Upgraded.
n/samba-4.14.4-i586-1.txz: Upgraded.
       This is a security release in order to address the following defect:
       Negative idmap cache entries can cause incorrect group entries in the
       Samba file server process token.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254
       https://www.samba.org/samba/security/CVE-2021-20254.html
       (* Security fix *)
extra/php8/php8-8.0.5-i586-1.txz: Upgraded.
+--------------------------+
Thu Apr 29 01:37:15 UTC 2021
n/bind-9.16.15-i586-1.txz: Upgraded.
       This update fixes bugs and the following security issues:
       A specially crafted GSS-TSIG query could cause a buffer overflow in the
       ISC implementation of SPNEGO.
       named crashed when a DNAME record placed in the ANSWER section during DNAME
       chasing turned out to be the final answer to a client query.
       Insufficient IXFR checks could result in named serving a zone without an SOA
       record at the apex, leading to a RUNTIME_CHECK assertion failure when the
       zone was subsequently refreshed. This has been fixed by adding an owner name
       check for all SOA records which are included in a zone transfer.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214
       (* Security fix *)
+--------------------------+
Wed Apr 28 18:40:26 UTC 2021
a/kernel-generic-5.10.33-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.33_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.33-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.33_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.33-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.33_smp-i686-1.txz: Upgraded.
a/less-581-i586-2.txz: Rebuilt.
       lesspipe.sh: support *.tzst, *.tar.zst, *.tar.zstd.
d/guile-3.0.6-i586-1.txz: Upgraded.
d/kernel-headers-5.10.33_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.33_smp-noarch-1.txz: Upgraded.
n/iproute2-5.12.0-i586-1.txz: Upgraded.
x/libwacom-1.10-i586-1.txz: Upgraded.
extra/linux-5.10.33-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Apr 27 19:19:28 UTC 2021
a/mkinitrd-1.4.11-i586-24.txz: Rebuilt.
       Change mkinitrd shebang to #!/bin/bash. Thanks to mumahendras3.
       Still, don't point /bin/sh at a shell other than bash.
       Only include dm-snapshot if LVM is included. Thanks to j12i.
a/tcsh-6.22.04-i586-1.txz: Upgraded.
ap/mariadb-10.6.0-i586-1.txz: Upgraded.
       Removed TokuDB stuff from rc.mysqld. Thanks to gsl.
       This update fixes the illegal instruction regession on 32-bit with processors
       that do not support SSE4.1 instructions.
       Thanks to Noel and Charlie Wilder for reporting the issue upstream
       and Matteo Bernardini for helping with the debugging.
       And of course, thanks to the MariaDB upstream developers. :-)
+--------------------------+
Mon Apr 26 22:04:20 UTC 2021
a/hdparm-9.61-i586-1.txz: Upgraded.
a/kernel-firmware-20210426_fa0efef-noarch-1.txz: Upgraded.
ap/cups-2.3.3-i586-6.txz: Rebuilt.
       Removed /lib/modprobe.d/cups-blacklist-usblp.conf. Thanks to vovim.
ap/vim-8.2.2814-i586-1.txz: Upgraded.
d/strace-5.12-i586-1.txz: Upgraded.
kde/kstars-3.5.3-i586-1.txz: Upgraded.
kde/sddm-0.19.0-i586-7.txz: Rebuilt.
       List X11 sessions before Wayland sessions. Thanks to Heinz Wiesinger.
l/imagemagick-7.0.11_9-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.2814-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.0-i586-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.0_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-headers-5.12.0_smp-x86-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-huge-5.12.0-i586-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.0_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-modules-5.12.0-i586-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.0_smp-i686-2.txz: Rebuilt.
testing/packages/linux-5.12.x/kernel-source-5.12.0_smp-noarch-2.txz: Rebuilt.
       Restore dm-crypt as built-in. Thanks to ctrlaltca.
       DM_CRYPT m -> y
       TCG_TPM m -> y
       TRUSTED_KEYS m -> y
+--------------------------+
Mon Apr 26 04:49:59 UTC 2021
ap/at-3.2.2-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-5.12.0-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-generic-smp-5.12.0_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-headers-5.12.0_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-5.12.0-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-huge-smp-5.12.0_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-5.12.0-i586-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-modules-smp-5.12.0_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.12.x/kernel-source-5.12.0_smp-noarch-1.txz: Upgraded.
+--------------------------+
Sun Apr 25 19:00:34 UTC 2021
d/gdb-10.2-i586-1.txz: Upgraded.
d/python-pip-21.1-i586-1.txz: Upgraded.
n/dnsmasq-2.85-i586-2.txz: Rebuilt.
       rc.dnsmasq: display stop message. Thanks to vineetmehta.
       rc.dnsmasq: kill by .pid file (or at least within the current namespace).
       Thanks to Petri Kaukasoina.
n/wireguard-tools-1.0.20210424-i586-1.txz: Upgraded.
x/fcitx-qt5-1.2.6-i586-1.txz: Upgraded.
+--------------------------+
Sat Apr 24 18:55:05 UTC 2021
a/file-5.40-i586-3.txz: Rebuilt.
       Fix detection of XZ compressed data. Thanks to TommyC7.
a/kernel-firmware-20210423_1334578-noarch-1.txz: Upgraded.
a/pkgtools-15.0-noarch-40.txz: Rebuilt.
       Change several script shebangs to #!/bin/bash. Thanks to mumahendras3.
a/sysvinit-scripts-15.0-noarch-3.txz: Rebuilt.
       inittab: fix label for runlevel 4. Thanks to Fellype.
       rc.4: fix error message for no supported login manager found.
l/libjpeg-turbo-2.1.0-i586-1.txz: Upgraded.
n/fetchmail-6.4.19-i586-1.txz: Upgraded.
+--------------------------+
Fri Apr 23 19:13:09 UTC 2021
a/pkgtools-15.0-noarch-39.txz: Rebuilt.
       upgradepkg: revert change where $ROOT/sbin/installpkg is called instead of
       /sbin/installpkg. Conceptually, this seemed like a nice change (but would
       have also required removepkg to be called the same way), but it seems to
       break an established expectation that the pkgtools can be used without them
       actually being installed in $ROOT. Thanks to alienBOB.
a/sysvinit-scripts-15.0-noarch-2.txz: Rebuilt.
       Use #!/bin/bash for these scripts so that bashisms don't cause script issues
       if /bin/sh is some other shell. Thanks to mumahendras3.
       rc.S: Use GazL's proposals for detecting/mounting /proc and /sys.
d/parallel-20210422-noarch-1.txz: Upgraded.
l/glib-networking-2.68.1-i586-1.txz: Upgraded.
l/gtk+3-3.24.29-i586-1.txz: Upgraded.
x/igt-gpu-tools-1.26-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
       Rebuild with pkgtools-15.0-noarch-39.
usb-and-pxe-installers/usbboot.img: Rebuilt.
       Rebuild with pkgtools-15.0-noarch-39.
+--------------------------+
Fri Apr 23 00:44:22 UTC 2021
a/sdparm-1.12-i586-1.txz: Upgraded.
ap/nvme-cli-1.14-i586-1.txz: Upgraded.
kde/akonadi-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-calendar-tools-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-contacts-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-import-wizard-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-mime-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-notes-21.04.0-i586-1.txz: Upgraded.
kde/akonadi-search-21.04.0-i586-1.txz: Upgraded.
kde/akonadiconsole-21.04.0-i586-1.txz: Upgraded.
kde/akregator-21.04.0-i586-1.txz: Upgraded.
kde/analitza-21.04.0-i586-1.txz: Upgraded.
kde/ark-21.04.0-i586-1.txz: Upgraded.
kde/artikulate-21.04.0-i586-1.txz: Upgraded.
kde/audiocd-kio-21.04.0-i586-1.txz: Upgraded.
kde/baloo-widgets-21.04.0-i586-1.txz: Upgraded.
kde/blinken-21.04.0-i586-1.txz: Upgraded.
kde/bomber-21.04.0-i586-1.txz: Upgraded.
kde/bovo-21.04.0-i586-1.txz: Upgraded.
kde/calendarsupport-21.04.0-i586-1.txz: Upgraded.
kde/cantor-21.04.0-i586-1.txz: Upgraded.
kde/cervisia-21.04.0-i586-1.txz: Upgraded.
kde/dolphin-21.04.0-i586-1.txz: Upgraded.
kde/dolphin-plugins-21.04.0-i586-1.txz: Upgraded.
kde/dragon-21.04.0-i586-1.txz: Upgraded.
kde/elisa-21.04.0-i586-1.txz: Upgraded.
kde/eventviews-21.04.0-i586-1.txz: Upgraded.
kde/ffmpegthumbs-21.04.0-i586-1.txz: Upgraded.
kde/filelight-21.04.0-i586-1.txz: Upgraded.
kde/granatier-21.04.0-i586-1.txz: Upgraded.
kde/grantlee-editor-21.04.0-i586-1.txz: Upgraded.
kde/grantleetheme-21.04.0-i586-1.txz: Upgraded.
kde/gwenview-21.04.0-i586-1.txz: Upgraded.
kde/incidenceeditor-21.04.0-i586-1.txz: Upgraded.
kde/itinerary-21.04.0-i586-1.txz: Upgraded.
kde/juk-21.04.0-i586-1.txz: Upgraded.
kde/k3b-21.04.0-i586-1.txz: Upgraded.
kde/kaddressbook-21.04.0-i586-1.txz: Upgraded.
kde/kalarm-21.04.0-i586-1.txz: Upgraded.
kde/kalarmcal-21.04.0-i586-1.txz: Upgraded.
kde/kalgebra-21.04.0-i586-1.txz: Upgraded.
kde/kalzium-21.04.0-i586-1.txz: Upgraded.
kde/kamera-21.04.0-i586-1.txz: Upgraded.
kde/kamoso-21.04.0-i586-1.txz: Upgraded.
kde/kanagram-21.04.0-i586-1.txz: Upgraded.
kde/kapman-21.04.0-i586-1.txz: Upgraded.
kde/kapptemplate-21.04.0-i586-1.txz: Upgraded.
kde/kate-21.04.0-i586-1.txz: Upgraded.
kde/katomic-21.04.0-i586-1.txz: Upgraded.
kde/kbackup-21.04.0-i586-1.txz: Upgraded.
kde/kblackbox-21.04.0-i586-1.txz: Upgraded.
kde/kblocks-21.04.0-i586-1.txz: Upgraded.
kde/kbounce-21.04.0-i586-1.txz: Upgraded.
kde/kbreakout-21.04.0-i586-1.txz: Upgraded.
kde/kbruch-21.04.0-i586-1.txz: Upgraded.
kde/kcachegrind-21.04.0-i586-1.txz: Upgraded.
kde/kcalc-21.04.0-i586-1.txz: Upgraded.
kde/kcalutils-21.04.0-i586-1.txz: Upgraded.
kde/kcharselect-21.04.0-i586-1.txz: Upgraded.
kde/kcolorchooser-21.04.0-i586-1.txz: Upgraded.
kde/kcron-21.04.0-i586-1.txz: Upgraded.
kde/kde-dev-scripts-21.04.0-i586-1.txz: Upgraded.
kde/kde-dev-utils-21.04.0-i586-1.txz: Upgraded.
kde/kdebugsettings-21.04.0-i586-1.txz: Upgraded.
kde/kdeconnect-kde-21.04.0-i586-1.txz: Upgraded.
kde/kdeedu-data-21.04.0-i586-1.txz: Upgraded.
kde/kdegraphics-mobipocket-21.04.0-i586-1.txz: Upgraded.
kde/kdegraphics-thumbnailers-21.04.0-i586-1.txz: Upgraded.
kde/kdenetwork-filesharing-21.04.0-i586-1.txz: Upgraded.
kde/kdenlive-21.04.0-i586-1.txz: Upgraded.
kde/kdepim-addons-21.04.0-i586-1.txz: Upgraded.
kde/kdepim-runtime-21.04.0-i586-1.txz: Upgraded.
kde/kdesdk-kioslaves-21.04.0-i586-1.txz: Upgraded.
kde/kdesdk-thumbnailers-21.04.0-i586-1.txz: Upgraded.
kde/kdf-21.04.0-i586-1.txz: Upgraded.
kde/kdialog-21.04.0-i586-1.txz: Upgraded.
kde/kdiamond-21.04.0-i586-1.txz: Upgraded.
kde/keditbookmarks-21.04.0-i586-1.txz: Upgraded.
kde/kfind-21.04.0-i586-1.txz: Upgraded.
kde/kfloppy-21.04.0-i586-1.txz: Upgraded.
kde/kfourinline-21.04.0-i586-1.txz: Upgraded.
kde/kgeography-21.04.0-i586-1.txz: Upgraded.
kde/kget-21.04.0-i586-1.txz: Upgraded.
kde/kgoldrunner-21.04.0-i586-1.txz: Upgraded.
kde/kgpg-21.04.0-i586-1.txz: Upgraded.
kde/khangman-21.04.0-i586-1.txz: Upgraded.
kde/khelpcenter-21.04.0-i586-1.txz: Upgraded.
kde/kidentitymanagement-21.04.0-i586-1.txz: Upgraded.
kde/kig-21.04.0-i586-1.txz: Upgraded.
kde/kigo-21.04.0-i586-1.txz: Upgraded.
kde/killbots-21.04.0-i586-1.txz: Upgraded.
kde/kimagemapeditor-21.04.0-i586-1.txz: Upgraded.
kde/kimap-21.04.0-i586-1.txz: Upgraded.
kde/kio-extras-21.04.0-i586-1.txz: Upgraded.
kde/kio-gdrive-21.04.0-i586-1.txz: Upgraded.
kde/kipi-plugins-21.04.0-i586-1.txz: Upgraded.
kde/kirigami-gallery-21.04.0-i586-1.txz: Upgraded.
kde/kiriki-21.04.0-i586-1.txz: Upgraded.
kde/kiten-21.04.0-i586-1.txz: Upgraded.
kde/kitinerary-21.04.0-i586-1.txz: Upgraded.
kde/kjumpingcube-21.04.0-i586-1.txz: Upgraded.
kde/kldap-21.04.0-i586-1.txz: Upgraded.
kde/kleopatra-21.04.0-i586-1.txz: Upgraded.
kde/klickety-21.04.0-i586-1.txz: Upgraded.
kde/klines-21.04.0-i586-1.txz: Upgraded.
kde/kmag-21.04.0-i586-1.txz: Upgraded.
kde/kmahjongg-21.04.0-i586-1.txz: Upgraded.
kde/kmail-21.04.0-i586-1.txz: Upgraded.
kde/kmail-account-wizard-21.04.0-i586-1.txz: Upgraded.
kde/kmailtransport-21.04.0-i586-1.txz: Upgraded.
kde/kmbox-21.04.0-i586-1.txz: Upgraded.
kde/kmime-21.04.0-i586-1.txz: Upgraded.
kde/kmines-21.04.0-i586-1.txz: Upgraded.
kde/kmix-21.04.0-i586-1.txz: Upgraded.
kde/kmousetool-21.04.0-i586-1.txz: Upgraded.
kde/kmouth-21.04.0-i586-1.txz: Upgraded.
kde/kmplot-21.04.0-i586-1.txz: Upgraded.
kde/knavalbattle-21.04.0-i586-1.txz: Upgraded.
kde/knetwalk-21.04.0-i586-1.txz: Upgraded.
kde/knights-21.04.0-i586-1.txz: Upgraded.
kde/knotes-21.04.0-i586-1.txz: Upgraded.
kde/kolf-21.04.0-i586-1.txz: Upgraded.
kde/kollision-21.04.0-i586-1.txz: Upgraded.
kde/kolourpaint-21.04.0-i586-1.txz: Upgraded.
kde/kompare-21.04.0-i586-1.txz: Upgraded.
kde/konqueror-21.04.0-i586-1.txz: Upgraded.
kde/konquest-21.04.0-i586-1.txz: Upgraded.
kde/konsole-21.04.0-i586-1.txz: Upgraded.
kde/kontact-21.04.0-i586-1.txz: Upgraded.
kde/kontactinterface-21.04.0-i586-1.txz: Upgraded.
kde/kontrast-21.04.0-i586-1.txz: Upgraded.
kde/konversation-21.04.0-i586-1.txz: Upgraded.
kde/kopeninghours-21.04.0-i586-1.txz: Added.
kde/kopete-21.04.0-i586-1.txz: Upgraded.
kde/korganizer-21.04.0-i586-1.txz: Upgraded.
kde/kosmindoormap-21.04.0-i586-1.txz: Upgraded.
kde/kpat-21.04.0-i586-1.txz: Upgraded.
kde/kpimtextedit-21.04.0-i586-1.txz: Upgraded.
kde/kpkpass-21.04.0-i586-1.txz: Upgraded.
kde/kpmcore-21.04.0-i586-1.txz: Upgraded.
kde/kpublictransport-21.04.0-i586-1.txz: Upgraded.
kde/kqtquickcharts-21.04.0-i586-1.txz: Upgraded.
kde/krdc-21.04.0-i586-1.txz: Upgraded.
kde/kreversi-21.04.0-i586-1.txz: Upgraded.
kde/krfb-21.04.0-i586-1.txz: Upgraded.
kde/kross-interpreters-21.04.0-i586-1.txz: Upgraded.
kde/kruler-21.04.0-i586-1.txz: Upgraded.
kde/kshisen-21.04.0-i586-1.txz: Upgraded.
kde/ksirk-21.04.0-i586-1.txz: Upgraded.
kde/ksmtp-21.04.0-i586-1.txz: Upgraded.
kde/ksnakeduel-21.04.0-i586-1.txz: Upgraded.
kde/kspaceduel-21.04.0-i586-1.txz: Upgraded.
kde/ksquares-21.04.0-i586-1.txz: Upgraded.
kde/ksudoku-21.04.0-i586-1.txz: Upgraded.
kde/ksystemlog-21.04.0-i586-1.txz: Upgraded.
kde/kteatime-21.04.0-i586-1.txz: Upgraded.
kde/ktimer-21.04.0-i586-1.txz: Upgraded.
kde/ktnef-21.04.0-i586-1.txz: Upgraded.
kde/ktorrent-21.04.0-i586-1.txz: Upgraded.
kde/ktouch-21.04.0-i586-1.txz: Upgraded.
kde/kturtle-21.04.0-i586-1.txz: Upgraded.
kde/kubrick-21.04.0-i586-1.txz: Upgraded.
kde/kwalletmanager-21.04.0-i586-1.txz: Upgraded.
kde/kwave-21.04.0-i586-1.txz: Upgraded.
kde/kwordquiz-21.04.0-i586-1.txz: Upgraded.
kde/libgravatar-21.04.0-i586-1.txz: Upgraded.
kde/libkcddb-21.04.0-i586-1.txz: Upgraded.
kde/libkcompactdisc-21.04.0-i586-1.txz: Upgraded.
kde/libkdcraw-21.04.0-i586-1.txz: Upgraded.
kde/libkdegames-21.04.0-i586-1.txz: Upgraded.
kde/libkdepim-21.04.0-i586-1.txz: Upgraded.
kde/libkeduvocdocument-21.04.0-i586-1.txz: Upgraded.
kde/libkexiv2-21.04.0-i586-1.txz: Upgraded.
kde/libkgapi-21.04.0-i586-1.txz: Upgraded.
kde/libkipi-21.04.0-i586-1.txz: Upgraded.
kde/libkleo-21.04.0-i586-1.txz: Upgraded.
kde/libkmahjongg-21.04.0-i586-1.txz: Upgraded.
kde/libkomparediff2-21.04.0-i586-1.txz: Upgraded.
kde/libksane-21.04.0-i586-1.txz: Upgraded.
kde/libksieve-21.04.0-i586-1.txz: Upgraded.
kde/libktorrent-21.04.0-i586-1.txz: Upgraded.
kde/lokalize-21.04.0-i586-1.txz: Upgraded.
kde/lskat-21.04.0-i586-1.txz: Upgraded.
kde/mailcommon-21.04.0-i586-1.txz: Upgraded.
kde/mailimporter-21.04.0-i586-1.txz: Upgraded.
kde/marble-21.04.0-i586-1.txz: Upgraded.
kde/markdownpart-21.04.0-i586-1.txz: Upgraded.
kde/mbox-importer-21.04.0-i586-1.txz: Upgraded.
kde/messagelib-21.04.0-i586-1.txz: Upgraded.
kde/minuet-21.04.0-i586-1.txz: Upgraded.
kde/okular-21.04.0-i586-1.txz: Upgraded.
kde/palapeli-21.04.0-i586-1.txz: Upgraded.
kde/parley-21.04.0-i586-1.txz: Upgraded.
kde/partitionmanager-21.04.0-i586-1.txz: Upgraded.
kde/picmi-21.04.0-i586-1.txz: Upgraded.
kde/pim-data-exporter-21.04.0-i586-1.txz: Upgraded.
kde/pim-sieve-editor-21.04.0-i586-1.txz: Upgraded.
kde/pimcommon-21.04.0-i586-1.txz: Upgraded.
kde/poxml-21.04.0-i586-1.txz: Upgraded.
kde/print-manager-21.04.0-i586-1.txz: Upgraded.
kde/rocs-21.04.0-i586-1.txz: Upgraded.
kde/spectacle-21.04.0-i586-1.txz: Upgraded.
kde/step-21.04.0-i586-1.txz: Upgraded.
kde/svgpart-21.04.0-i586-1.txz: Upgraded.
kde/sweeper-21.04.0-i586-1.txz: Upgraded.
kde/umbrello-21.04.0-i586-1.txz: Upgraded.
kde/yakuake-21.04.0-i586-1.txz: Upgraded.
kde/zeroconf-ioslave-21.04.0-i586-1.txz: Upgraded.
l/libedit-20210419_3.1-i586-1.txz: Upgraded.
l/pipewire-0.3.26-i586-1.txz: Upgraded.
x/mesa-21.0.3-i586-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
       Fixed ldconfig regression. Thanks to alienBOB and MoZes.
usb-and-pxe-installers/usbboot.img: Rebuilt.
       Fixed ldconfig regression. Thanks to alienBOB and MoZes.
+--------------------------+
Wed Apr 21 20:04:15 UTC 2021
a/exfatprogs-1.1.1-i586-1.txz: Upgraded.
a/kernel-firmware-20210421_cfa004c-noarch-1.txz: Upgraded.
a/kernel-generic-5.10.32-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.32_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.32-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.32_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.32-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.32_smp-i686-1.txz: Upgraded.
a/sysvinit-scripts-15.0-noarch-1.txz: Upgraded.
       rc.S: Check to see if /proc is already mounted before mounting it.
       Thanks to baldzhang.
d/kernel-headers-5.10.32_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.32_smp-noarch-1.txz: Upgraded.
l/libdvdnav-6.1.1-i586-1.txz: Upgraded.
n/openvpn-2.5.2-i586-1.txz: Upgraded.
extra/linux-5.10.32-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.16-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.16_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.16_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.16-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.16_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.16-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.16_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.16_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Apr 20 19:44:02 UTC 2021
ap/slackpkg-15.0.2-noarch-1.txz: Upgraded.
       Fix break error messages (dive)
       Remove now pointless if/then/else (dive)
       Safer config sourcing (dive)
       files/slackpkg: replace #!/bin/sh with #!/bin/bash (Eugen Wissner)
       Don't create blacklist when running update (dive)
       Add show-changelog & help to non-root commands (dive)
       Improve search blacklisting (dive)
       Fix package duplicate bug (PiterPunk)
       Thanks to Robby Workman.
ap/sqlite-3.35.5-i586-1.txz: Upgraded.
kde/kwin-5.21.4-i586-2.txz: Rebuilt.
       Delay closing Wayland streams. Thanks to LuckyCyborg.
kde/okteta-0.26.6-i586-1.txz: Upgraded.
l/libtiff-4.3.0-i586-1.txz: Upgraded.
n/libgcrypt-1.9.3-i586-1.txz: Upgraded.
n/samba-4.14.3-i586-1.txz: Upgraded.
x/xorg-cf-files-1.0.6-i586-6.txz: Rebuilt.
       Patched to fix an incompatibility introduced by binutils-2.36.
       Thanks to BenCollver.
xap/seamonkey-2.53.7.1-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.7.1
       (* Security fix *)
+--------------------------+
Mon Apr 19 21:40:04 UTC 2021
a/aaa_libraries-15.0-i586-6.txz: Rebuilt.
       Temporarily added the shared libraries from icu4c-68.2 and boost-1.75.0 to
       allow some time for things that depend on them to be recompiled.
a/kernel-firmware-20210419_8528618-noarch-1.txz: Upgraded.
a/less-581-i586-1.txz: Upgraded.
a/pkgtools-15.0-noarch-38.txz: Rebuilt.
       upgradepkg: prefix path to installpkg with $ROOT.
       pkgtool.8: typo fix.
       Thanks to slvr32.
a/sdparm-1.11-i586-4.txz: Rebuilt.
       Recompiled against sg3_utils-1.46. Thanks to USUARIONUEVO.
a/udisks-1.0.5-i586-9.txz: Rebuilt.
       Recompiled against sg3_utils-1.46. Thanks to USUARIONUEVO.
a/xfsprogs-5.11.0-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
ap/pamixer-1.4-i586-10.txz: Rebuilt.
       Recompiled against boost-1.76.0.
ap/sqlite-3.35.4-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
d/Cython-0.29.23-i586-1.txz: Upgraded.
d/poke-1.2-i586-1.txz: Upgraded.
kde/kig-20.12.3-i586-2.txz: Rebuilt.
       Recompiled against boost-1.76.0.
kde/krita-4.4.3-i586-3.txz: Rebuilt.
       Recompiled against boost-1.76.0.
kde/plasma-workspace-5.21.4-i586-2.txz: Rebuilt.
       Patched to fix missing GTK+ window decorations and config file reading
       in a wayland session.
       Added "Full Wayland" session type (less stable / more experimental).
       The standard Plasma Wayland session will allow apps to use XCB rather
       than native Wayland, which is currently more stable.
       Thanks to LuckyCyborg.
l/adwaita-icon-theme-40.0-noarch-1.txz: Upgraded.
l/boost-1.76.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
       Compiled against icu4c-69.1.
l/cryfs-0.10.3-i586-2.txz: Rebuilt.
       Recompiled against boost-1.76.0.
l/harfbuzz-2.8.0-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
l/icu4c-69.1-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/imagemagick-7.0.11_8-i586-1.txz: Upgraded.
l/jasper-2.0.32-i586-1.txz: Upgraded.
l/libdvdread-6.1.2-i586-1.txz: Upgraded.
l/libgpod-0.8.3-i586-10.txz: Rebuilt.
       Recompiled against sg3_utils-1.46. Thanks to Toutatis and USUARIONUEVO.
l/libical-3.0.10-i586-1.txz: Upgraded.
       Compiled against icu4c-69.1.
l/libqalculate-3.18.0-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
l/libvisio-0.1.7-i586-7.txz: Rebuilt.
       Recompiled against icu4c-69.1.
l/mozilla-nss-3.64-i586-1.txz: Upgraded.
l/mozjs78-78.10.0esr-i586-1.txz: Upgraded.
l/openexr-2.5.5-i586-3.txz: Rebuilt.
       Recompiled against boost-1.76.0.
l/python-docutils-0.17.1-i586-1.txz: Upgraded.
l/qt5-5.15.2-i586-8.txz: Rebuilt.
       Recompiled against icu4c-69.1.
       Recompiled with options: -qpa "xcb;wayland" -egl -eglfs
       This allows using either XCB (XWayland) or native Wayland for QPA.
       Thanks to LuckyCyborg.
l/qt5-webkit-5.212.0_alpha4-i586-7.txz: Rebuilt.
       Recompiled against icu4c-69.1.
l/vte-0.64.0-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
n/daemon-0.8-i586-1.txz: Added.
       Thanks to ZhaoLin1457 and LuckyCyborg.
n/dovecot-2.3.14-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
n/openssh-8.6p1-i586-1.txz: Upgraded.
n/php-7.4.16-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
n/postfix-3.5.10-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
n/samba-4.14.2-i586-2.txz: Rebuilt.
       Recompiled against icu4c-69.1.
n/tin-2.4.5-i586-3.txz: Rebuilt.
       Recompiled against icu4c-69.1.
t/texlive-2020.200608-i586-5.txz: Rebuilt.
       Recompiled against icu4c-69.1.
x/egl-wayland-1.1.6-i586-1.txz: Added.
       Needed for Wayland EGLstreams support. Thanks to LuckyCyborg.
x/eglexternalplatform-1.1-i586-1.txz: Added.
       Needed for egl-wayland. Thanks to LuckyCyborg.
x/xf86-input-libinput-1.0.1-i586-1.txz: Upgraded.
x/xorg-server-xwayland-21.1.1-i586-1.txz: Upgraded.
       Thanks to LuckyCyborg.
xap/MPlayer-20210418-i586-1.txz: Upgraded.
xap/mozilla-firefox-88.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/88.0/releasenotes/
       https://www.mozilla.org/security/advisories/mfsa2021-16/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23996
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23997
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24000
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24001
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29944
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29947
       (* Security fix *)
xap/mozilla-thunderbird-78.10.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.10.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-14/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
       (* Security fix *)
+--------------------------+
Fri Apr 16 23:29:36 UTC 2021
a/kernel-generic-5.10.31-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.31_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.31-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.31_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.31-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.31_smp-i686-1.txz: Upgraded.
a/mkinitrd-1.4.11-i586-23.txz: Rebuilt.
       Get rid of patch created /sbin/mkinitrd.orig. Thanks to burdi01.
d/kernel-headers-5.10.31_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.31_smp-noarch-1.txz: Upgraded.
l/libusb-1.0.24-i586-4.txz: Rebuilt.
       Fix parsing of descriptors for multi-configuration devices. Thanks to acbff0.
n/network-scripts-15.0-noarch-16.txz: Rebuilt.
       netconfig: fix typo. Thanks to Gerard Lally.
extra/linux-5.10.31-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.15-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.15_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.15_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.15-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.15_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.15-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.15_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.15_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Wed Apr 14 19:46:47 UTC 2021
a/kernel-generic-5.10.30-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.30_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.30-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.30_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.30-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.30_smp-i686-1.txz: Upgraded.
a/mkinitrd-1.4.11-i586-22.txz: Rebuilt.
       When / is on LVM, include the dm-snapshot module. Thanks to I.G.O.R.
d/kernel-headers-5.10.30_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.30_smp-noarch-1.txz: Upgraded.
l/mlt-6.26.1-i586-1.txz: Upgraded.
l/oniguruma-6.9.7-i586-1.txz: Upgraded.
l/sg3_utils-1.46-i586-1.txz: Upgraded.
n/curl-7.76.1-i586-1.txz: Upgraded.
extra/linux-5.10.30-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.14-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.14_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.14_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.14-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.14_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.14-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.14_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.14_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Apr 13 19:35:40 UTC 2021
ap/tmux-3.2-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_7-i586-1.txz: Upgraded.
l/librsvg-2.50.4-i586-1.txz: Upgraded.
n/cifs-utils-6.13-i586-1.txz: Upgraded.
n/snownews-1.7-i586-1.txz: Upgraded.
x/xorg-server-1.20.11-i586-1.txz: Upgraded.
       Insufficient checks on the lengths of the XInput extension
       ChangeFeedbackControl request can lead to out of bounds memory
       accesses in the X server. These issues can lead to privilege
       escalation for authorized clients on systems where the X server
       is running privileged.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472
       (* Security fix *)
x/xorg-server-xephyr-1.20.11-i586-1.txz: Upgraded.
x/xorg-server-xnest-1.20.11-i586-1.txz: Upgraded.
x/xorg-server-xvfb-1.20.11-i586-1.txz: Upgraded.
x/xorg-server-xwayland-1.20.11-i586-1.txz: Upgraded.
+--------------------------+
Mon Apr 12 20:07:12 UTC 2021
I'm going to go ahead and call this a beta even though there's still no fix
for the illegal instruction issue with 32-bit mariadb. But there should be
soon (thanks ponce!) No build regressions noted with the official gcc-10.3
release. Please report any new (or old) issues on the LQ Slackware forum.
Enjoy! :-)
a/kernel-generic-5.10.29-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.29_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.29-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.29_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.29-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.29_smp-i686-1.txz: Upgraded.
d/gcc-10.3.0-i586-1.txz: Upgraded.
d/gcc-brig-10.3.0-i586-1.txz: Upgraded.
d/gcc-g++-10.3.0-i586-1.txz: Upgraded.
d/gcc-gdc-10.3.0-i586-1.txz: Upgraded.
d/gcc-gfortran-10.3.0-i586-1.txz: Upgraded.
d/gcc-gnat-10.3.0-i586-1.txz: Upgraded.
d/gcc-go-10.3.0-i586-1.txz: Upgraded.
d/gcc-objc-10.3.0-i586-1.txz: Upgraded.
d/kernel-headers-5.10.29_smp-x86-1.txz: Upgraded.
d/libtool-2.4.6-i586-17.txz: Rebuilt.
       Recompiled to update embedded GCC version number.
d/meson-0.57.2-i586-1.txz: Upgraded.
d/vala-0.52.2-i586-1.txz: Upgraded.
k/kernel-source-5.10.29_smp-noarch-1.txz: Upgraded.
       CC_VERSION_TEXT "gcc (GCC) 10.2.0" -> "gcc (GCC) 10.3.0"
       GCC_VERSION 100200 -> 100300
kde/attica-5.81.0-i586-1.txz: Upgraded.
kde/baloo-5.81.0-i586-1.txz: Upgraded.
kde/bluez-qt-5.81.0-i586-1.txz: Upgraded.
kde/breeze-icons-5.81.0-noarch-1.txz: Upgraded.
kde/extra-cmake-modules-5.81.0-i586-1.txz: Upgraded.
kde/frameworkintegration-5.81.0-i586-1.txz: Upgraded.
kde/kactivities-5.81.0-i586-1.txz: Upgraded.
kde/kactivities-stats-5.81.0-i586-1.txz: Upgraded.
kde/kapidox-5.81.0-i586-1.txz: Upgraded.
kde/karchive-5.81.0-i586-1.txz: Upgraded.
kde/kauth-5.81.0-i586-1.txz: Upgraded.
kde/kbookmarks-5.81.0-i586-1.txz: Upgraded.
kde/kcalendarcore-5.81.0-i586-1.txz: Upgraded.
kde/kcmutils-5.81.0-i586-1.txz: Upgraded.
kde/kcodecs-5.81.0-i586-1.txz: Upgraded.
kde/kcompletion-5.81.0-i586-1.txz: Upgraded.
kde/kconfig-5.81.0-i586-1.txz: Upgraded.
kde/kconfigwidgets-5.81.0-i586-1.txz: Upgraded.
kde/kcontacts-5.81.0-i586-1.txz: Upgraded.
kde/kcoreaddons-5.81.0-i586-1.txz: Upgraded.
kde/kcrash-5.81.0-i586-1.txz: Upgraded.
kde/kdav-5.81.0-i586-1.txz: Upgraded.
kde/kdbusaddons-5.81.0-i586-1.txz: Upgraded.
kde/kdeclarative-5.81.0-i586-1.txz: Upgraded.
kde/kded-5.81.0-i586-1.txz: Upgraded.
kde/kdelibs4support-5.81.0-i586-1.txz: Upgraded.
kde/kdesignerplugin-5.81.0-i586-1.txz: Upgraded.
kde/kdesu-5.81.0-i586-1.txz: Upgraded.
kde/kdewebkit-5.81.0-i586-1.txz: Upgraded.
kde/kdnssd-5.81.0-i586-1.txz: Upgraded.
kde/kdoctools-5.81.0-i586-1.txz: Upgraded.
kde/kemoticons-5.81.0-i586-1.txz: Upgraded.
kde/kfilemetadata-5.81.0-i586-1.txz: Upgraded.
kde/kglobalaccel-5.81.0-i586-1.txz: Upgraded.
kde/kguiaddons-5.81.0-i586-1.txz: Upgraded.
kde/kholidays-5.81.0-i586-1.txz: Upgraded.
kde/khtml-5.81.0-i586-1.txz: Upgraded.
kde/ki18n-5.81.0-i586-1.txz: Upgraded.
kde/kiconthemes-5.81.0-i586-1.txz: Upgraded.
kde/kidletime-5.81.0-i586-1.txz: Upgraded.
kde/kimageformats-5.81.0-i586-1.txz: Upgraded.
kde/kinit-5.81.0-i586-1.txz: Upgraded.
kde/kio-5.81.0-i586-1.txz: Upgraded.
kde/kirigami2-5.81.0-i586-1.txz: Upgraded.
kde/kitemmodels-5.81.0-i586-1.txz: Upgraded.
kde/kitemviews-5.81.0-i586-1.txz: Upgraded.
kde/kjobwidgets-5.81.0-i586-1.txz: Upgraded.
kde/kjs-5.81.0-i586-1.txz: Upgraded.
kde/kjsembed-5.81.0-i586-1.txz: Upgraded.
kde/kmediaplayer-5.81.0-i586-1.txz: Upgraded.
kde/knewstuff-5.81.0-i586-1.txz: Upgraded.
kde/knotifications-5.81.0-i586-1.txz: Upgraded.
kde/knotifyconfig-5.81.0-i586-1.txz: Upgraded.
kde/kpackage-5.81.0-i586-1.txz: Upgraded.
kde/kparts-5.81.0-i586-1.txz: Upgraded.
kde/kpeople-5.81.0-i586-1.txz: Upgraded.
kde/kplotting-5.81.0-i586-1.txz: Upgraded.
kde/kpty-5.81.0-i586-1.txz: Upgraded.
kde/kquickcharts-5.81.0-i586-1.txz: Upgraded.
kde/kross-5.81.0-i586-1.txz: Upgraded.
kde/krunner-5.81.0-i586-1.txz: Upgraded.
kde/kservice-5.81.0-i586-1.txz: Upgraded.
kde/ktexteditor-5.81.0-i586-1.txz: Upgraded.
kde/ktextwidgets-5.81.0-i586-1.txz: Upgraded.
kde/kunitconversion-5.81.0-i586-1.txz: Upgraded.
kde/kwallet-5.81.0-i586-1.txz: Upgraded.
kde/kwayland-5.81.0-i586-1.txz: Upgraded.
kde/kwidgetsaddons-5.81.0-i586-1.txz: Upgraded.
kde/kwindowsystem-5.81.0-i586-1.txz: Upgraded.
kde/kxmlgui-5.81.0-i586-1.txz: Upgraded.
kde/kxmlrpcclient-5.81.0-i586-1.txz: Upgraded.
kde/modemmanager-qt-5.81.0-i586-1.txz: Upgraded.
kde/networkmanager-qt-5.81.0-i586-1.txz: Upgraded.
kde/oxygen-icons5-5.81.0-noarch-1.txz: Upgraded.
kde/plasma-framework-5.81.0-i586-1.txz: Upgraded.
kde/plasma-wayland-protocols-1.2.1-i586-1.txz: Upgraded.
kde/prison-5.81.0-i586-1.txz: Upgraded.
kde/purpose-5.81.0-i586-1.txz: Upgraded.
kde/qqc2-desktop-style-5.81.0-i586-1.txz: Upgraded.
kde/solid-5.81.0-i586-1.txz: Upgraded.
kde/sonnet-5.81.0-i586-1.txz: Upgraded.
kde/syndication-5.81.0-i586-1.txz: Upgraded.
kde/syntax-highlighting-5.81.0-i586-1.txz: Upgraded.
kde/threadweaver-5.81.0-i586-1.txz: Upgraded.
l/ffmpeg-4.4-i586-1.txz: Upgraded.
       Thanks to Heinz Wiesinger.
l/fuse3-3.10.3-i586-1.txz: Upgraded.
l/mlt-6.26.0-i586-1.txz: Upgraded.
n/dnsmasq-2.85-i586-1.txz: Upgraded.
       Use random source ports where possible if source addresses/interfaces in use.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3448
       (* Security fix *)
n/irssi-1.2.3-i586-1.txz: Upgraded.
       This update fixes bugs and security issues.
       See the NEWS file for details.
       (* Security fix *)
n/postfix-3.5.10-i586-1.txz: Upgraded.
xap/xsnow-3.3.0-i586-1.txz: Upgraded.
       Just in time for tonight's snowstorm here in Minnesota. ;-)
xfce/exo-4.16.2-i586-1.txz: Upgraded.
xfce/xfce4-settings-4.16.1-i586-1.txz: Upgraded.
extra/linux-5.10.29-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.13-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.13_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.13_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.13-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.13_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.13-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.13_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.13_smp-noarch-1.txz: Upgraded.
       CC_VERSION_TEXT "gcc (GCC) 10.2.0" -> "gcc (GCC) 10.3.0"
       GCC_VERSION 100200 -> 100300
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Apr 9 20:21:07 UTC 2021
a/aaa_libraries-15.0-i586-5.txz: Rebuilt.
       Added: libcares.so.2.4.2.
       Upgraded: libexpat.so.1.7.0, libglib-2.0.so.0.6800.1,
       libgmodule-2.0.so.0.6800.1, libgobject-2.0.so.0.6800.1, libgthread-2.0.so.0.6800.1.
d/python-setuptools-56.0.0-i586-1.txz: Upgraded.
kde/kservice-5.80.0-i586-2.txz: Rebuilt.
       In the profile scripts, don't add a directory to the $PATH unless it exists.
       Thanks to Lockywolf and pghvlaans.
l/gdk-pixbuf2-2.42.6-i586-1.txz: Upgraded.
n/c-ares-1.17.1-i586-1.txz: Added.
       Adding this since curl can make use of it, and some programs expect this
       functionality.
n/curl-7.76.0-i586-2.txz: Rebuilt.
       Recompiled to link with c-ares-1.17.1. Thanks to babydr.
xap/mozilla-thunderbird-78.9.1-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.9.1/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-13/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-13/#MOZ-2021-23992
       (* Security fix *)
xap/pidgin-2.14.3-i586-1.txz: Upgraded.
+--------------------------+
Thu Apr 8 18:20:03 UTC 2021
ap/vim-8.2.2735-i586-1.txz: Upgraded.
d/cmake-3.20.1-i586-1.txz: Upgraded.
d/vala-0.52.1-i586-1.txz: Upgraded.
l/glib2-2.68.1-i586-1.txz: Upgraded.
l/gsettings-desktop-schemas-40.0-i586-1.txz: Upgraded.
l/libxkbcommon-1.2.1-i586-1.txz: Upgraded.
l/netpbm-10.94.02-i586-1.txz: Upgraded.
l/ocl-icd-2.3.0-i586-1.txz: Upgraded.
l/poppler-21.04.0-i586-2.txz: Rebuilt.
       Applied a couple of upstream patches. Thanks to th_r.
xap/vim-gvim-8.2.2735-i586-1.txz: Upgraded.
+--------------------------+
Wed Apr 7 20:10:32 UTC 2021
a/kernel-generic-5.10.28-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.28_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.28-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.28_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.28-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.28_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.28_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.28_smp-noarch-1.txz: Upgraded.
       DEVKMEM y -> n
       Thanks to Jonathan Woithe for the suggestion.
l/pipewire-0.3.25-i586-1.txz: Upgraded.
n/libksba-1.5.1-i586-1.txz: Upgraded.
x/ibus-m17n-1.4.5-i586-1.txz: Upgraded.
x/libdrm-2.4.105-i586-1.txz: Upgraded.
x/mesa-21.0.2-i586-1.txz: Upgraded.
extra/linux-5.10.28-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.12-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.12_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.12_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.12-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.12_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.12-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.12_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.12_smp-noarch-1.txz: Upgraded.
       DEVKMEM y -> n
       Thanks to Jonathan Woithe for the suggestion.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Apr 6 22:01:59 UTC 2021
a/sysvinit-scripts-2.1-noarch-41.txz: Rebuilt.
       rc.S: don't clear /var/run. Thanks to upnort.
kde/digikam-7.2.0-i586-2.txz: Rebuilt.
       Recompiled against opencv-4.5.2 (apparently the ABI changed).
       Thanks to etienne.
+--------------------------+
Tue Apr 6 19:54:52 UTC 2021
Thanks to nobodino and ponce for help fixing a few sources that wouldn't
build properly. Overnight I tested recompiling everything using gcc-10.3.0-RC
and had no build failures, so we'll be taking gcc-10.3.0 once it (and new
kernels) arrive probably sometime next week. And then I think we'll be calling
this a beta. Cheers! :-)
a/file-5.40-i586-2.txz: Rebuilt.
kde/bluedevil-5.21.4-i586-1.txz: Upgraded.
kde/breeze-5.21.4-i586-1.txz: Upgraded.
kde/breeze-grub-5.21.4-i586-1.txz: Upgraded.
kde/breeze-gtk-5.21.4-i586-1.txz: Upgraded.
kde/drkonqi-5.21.4-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.21.4-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.21.4-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.21.4-i586-1.txz: Upgraded.
kde/kdecoration-5.21.4-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.21.4-i586-1.txz: Upgraded.
kde/kgamma5-5.21.4-i586-1.txz: Upgraded.
kde/khotkeys-5.21.4-i586-1.txz: Upgraded.
kde/kinfocenter-5.21.4-i586-1.txz: Upgraded.
kde/kmenuedit-5.21.4-i586-1.txz: Upgraded.
kde/kscreen-5.21.4-i586-1.txz: Upgraded.
kde/kscreenlocker-5.21.4-i586-1.txz: Upgraded.
kde/ksshaskpass-5.21.4-i586-1.txz: Upgraded.
kde/ksysguard-5.21.4-i586-1.txz: Upgraded.
kde/kwallet-pam-5.21.4-i586-1.txz: Upgraded.
kde/kwayland-integration-5.21.4-i586-1.txz: Upgraded.
kde/kwayland-server-5.21.4-i586-1.txz: Upgraded.
kde/kwin-5.21.4-i586-1.txz: Upgraded.
kde/kwrited-5.21.4-i586-1.txz: Upgraded.
kde/libkscreen-5.21.4-i586-1.txz: Upgraded.
kde/libksysguard-5.21.4-i586-1.txz: Upgraded.
kde/milou-5.21.4-i586-1.txz: Upgraded.
kde/oxygen-5.21.4-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.21.4-i586-1.txz: Upgraded.
kde/plasma-desktop-5.21.4-i586-1.txz: Upgraded.
kde/plasma-disks-5.21.4-i586-1.txz: Upgraded.
kde/plasma-firewall-5.21.4-i586-1.txz: Upgraded.
kde/plasma-integration-5.21.4-i586-1.txz: Upgraded.
kde/plasma-nm-5.21.4-i586-1.txz: Upgraded.
kde/plasma-pa-5.21.4-i586-1.txz: Upgraded.
kde/plasma-sdk-5.21.4-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.21.4-i586-1.txz: Upgraded.
kde/plasma-vault-5.21.4-i586-1.txz: Upgraded.
kde/plasma-workspace-5.21.4-i586-1.txz: Upgraded.
kde/plasma-workspace-wallpapers-5.21.4-i586-1.txz: Upgraded.
kde/polkit-kde-agent-1-5.21.4-i586-1.txz: Upgraded.
kde/powerdevil-5.21.4-i586-1.txz: Upgraded.
kde/qqc2-breeze-style-5.21.4-i586-1.txz: Upgraded.
kde/sddm-kcm-5.21.4-i586-1.txz: Upgraded.
kde/systemsettings-5.21.4-i586-1.txz: Upgraded.
kde/xdg-desktop-portal-kde-5.21.4-i586-1.txz: Upgraded.
l/graphene-1.10.6-i586-1.txz: Upgraded.
l/libbluray-1.3.0-i586-1.txz: Upgraded.
l/libxkbcommon-1.2.0-i586-1.txz: Upgraded.
n/stunnel-5.59-i586-1.txz: Upgraded.
tcl/tk-8.6.11.1-i586-4.txz: Rebuilt.
x/fcitx-anthy-0.2.4-i586-1.txz: Upgraded.
x/xf86-input-libinput-1.0.0-i586-1.txz: Upgraded.
+--------------------------+
Mon Apr 5 19:04:44 UTC 2021
a/hwdata-0.346-noarch-1.txz: Upgraded.
a/kernel-firmware-20210405_af1ca28-noarch-1.txz: Upgraded.
d/Cython-0.29.22-i586-2.txz: Rebuilt.
       Recompiled to fix building some programs that use Cython. It's possible
       that this was due to an ABI bug that shipped in Python-3.9.3, but we'll
       rebuild to be on the safe side.
       Thanks to PiterPunk who noticed this issue on 32-bit.
d/python3-3.9.4-i586-1.txz: Upgraded.
       This update reverts a change that introduced an unintentional ABI
       incompatibility making some C extensions built with Python 3.9.0 - 3.9.2
       crash with Python 3.9.3 on 32-bit systems.
d/ruby-3.0.1-i586-1.txz: Upgraded.
       This release includes a security fix:
       XML round-trip vulnerability in REXML.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965
       (* Security fix *)
l/cryfs-0.10.3-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_6-i586-1.txz: Upgraded.
l/libqalculate-3.18.0-i586-1.txz: Upgraded.
+--------------------------+
Sat Apr 3 18:28:05 UTC 2021
ap/sqlite-3.35.4-i586-1.txz: Upgraded.
d/python3-3.9.3-i586-1.txz: Upgraded.
l/opencv-4.5.2-i586-1.txz: Upgraded.
l/python-docutils-0.17-i586-1.txz: Upgraded.
n/bluez-5.58-i586-1.txz: Upgraded.
xfce/mousepad-0.5.4-i586-1.txz: Upgraded.
+--------------------------+
Fri Apr 2 20:58:03 UTC 2021
kde/calligra-3.2.1-i586-7.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/cantor-20.12.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/kfilemetadata-5.80.0-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/kile-2.9.93-i586-7.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/kitinerary-20.12.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/krita-4.4.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
kde/okular-20.12.3-i586-2.txz: Rebuilt.
       Recompiled against poppler-21.04.0.
l/poppler-21.04.0-i586-1.txz: Upgraded.
       Shared library .so-version bump.
l/python-pillow-8.2.0-i586-1.txz: Upgraded.
x/libva-utils-2.11.1-i586-1.txz: Upgraded.
xap/pidgin-2.14.2-i586-1.txz: Upgraded.
xap/xscreensaver-6.00-i586-1.txz: Upgraded.
+--------------------------+
Thu Apr 1 23:50:48 UTC 2021
a/aaa_glibc-solibs-2.33-i586-2.txz: Rebuilt.
ap/inxi-20210329_a539c8fd-noarch-1.txz: Upgraded.
l/glibc-2.33-i586-2.txz: Rebuilt.
       Applied upstream patch to fix a performance regression:
       [PATCH] linux: Normalize and return timeout on select (BZ #27651)
       Thanks to Fulalas and Adhemerval Zanella.
l/glibc-i18n-2.33-i586-2.txz: Rebuilt.
l/glibc-profile-2.33-i586-2.txz: Rebuilt.
l/imagemagick-7.0.11_5-i586-1.txz: Upgraded.
n/network-scripts-15.0-noarch-15.txz: Rebuilt.
       netconfig: remove (broken) checks on hostname/domainname validity.
x/libXres-1.2.1-i586-1.txz: Upgraded.
+--------------------------+
Wed Mar 31 23:43:20 UTC 2021
a/file-5.40-i586-1.txz: Upgraded.
ap/ghostscript-9.54.0-i586-1.txz: Upgraded.
d/help2man-1.48.3-i586-1.txz: Upgraded.
l/at-spi2-core-2.40.0-i586-1.txz: Upgraded.
l/dbus-glib-0.112-i586-1.txz: Upgraded.
l/dconf-0.40.0-i586-1.txz: Upgraded.
l/dconf-editor-3.38.3-i586-1.txz: Upgraded.
l/gcr-3.40.0-i586-1.txz: Upgraded.
l/gdk-pixbuf2-2.42.4-i586-1.txz: Upgraded.
l/gjs-1.68.0-i586-1.txz: Upgraded.
l/glib-networking-2.68.0-i586-1.txz: Upgraded.
l/glib2-2.68.0-i586-1.txz: Upgraded.
l/gobject-introspection-1.68.0-i586-1.txz: Upgraded.
l/gtk+3-3.24.28-i586-1.txz: Upgraded.
l/gvfs-1.48.0-i586-1.txz: Upgraded.
l/netpbm-10.94.01-i586-1.txz: Upgraded.
l/pygobject3-3.40.1-i586-1.txz: Upgraded.
l/vte-0.64.0-i586-1.txz: Upgraded.
n/curl-7.76.0-i586-1.txz: Upgraded.
       This update fixes security issues:
       Authentication Bypass by Spoofing.
       Exposure of Private Personal Information to an Unauthorized Actor.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
       (* Security fix *)
xap/gimp-2.10.24-i586-1.txz: Upgraded.
xap/seamonkey-2.53.7-i686-1.txz: Upgraded.
       This update contains security fixes and improvements.
       For more information, see:
       https://www.seamonkey-project.org/releases/seamonkey2.53.7
       (* Security fix *)
+--------------------------+
Tue Mar 30 20:09:09 UTC 2021
a/kernel-generic-5.10.27-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.27_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.27-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.27_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.27-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.27_smp-i686-1.txz: Upgraded.
ap/vim-8.2.2678-i586-1.txz: Upgraded.
d/kernel-headers-5.10.27_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.27_smp-noarch-1.txz: Upgraded.
l/jasper-2.0.28-i586-1.txz: Upgraded.
xap/vim-gvim-8.2.2678-i586-1.txz: Upgraded.
extra/linux-5.10.27-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.11-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.11_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.11_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.11-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.11_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.11-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.11_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.11_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Sun Mar 28 18:58:24 UTC 2021
a/mkinitrd-1.4.11-i586-21.txz: Rebuilt.
       mkinitrd_command_generator.sh: use blkid options to ensure that the correct
       root device is matched. Thanks to eduardr and shruggy.
d/ccache-4.2.1-i586-1.txz: Upgraded.
d/re2c-2.1.1-i586-1.txz: Upgraded.
l/gegl-0.4.30-i586-1.txz: Upgraded.
n/epic5-2.1.4-i586-1.txz: Upgraded.
n/fetchmail-6.4.18-i586-1.txz: Upgraded.
n/whois-5.5.9-i586-1.txz: Upgraded.
t/fig2dev-3.2.8a-i586-1.txz: Upgraded.
t/xfig-3.2.8a-i586-1.txz: Upgraded.
+--------------------------+
Sat Mar 27 20:11:55 UTC 2021
ap/sqlite-3.35.3-i586-1.txz: Upgraded.
d/git-2.31.1-i586-1.txz: Upgraded.
d/re2c-2.1-i586-1.txz: Upgraded.
l/ffmpeg-4.3.2-i586-2.txz: Rebuilt.
       libvpx-1.10.0 seems to have a changed ABI, so recompile against it.
l/gst-plugins-good-1.18.4-i586-2.txz: Rebuilt.
       libvpx-1.10.0 seems to have a changed ABI, so recompile against it.
l/pango-1.48.4-i586-1.txz: Upgraded.
l/qt5-5.15.2-i586-7.txz: Rebuilt.
n/epic5-2.1.3-i586-1.txz: Upgraded.
x/libXaw-1.0.14-i586-1.txz: Upgraded.
x/xterm-367-i586-1.txz: Upgraded.
       This update fixes a security issue:
       xterm before Patch #366 allows remote attackers to execute arbitrary code or
       cause a denial of service (segmentation fault) via a crafted UTF-8 combining
       character sequence.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135
       (* Security fix *)
xap/xine-lib-1.2.11-i586-5.txz: Rebuilt.
       libvpx-1.10.0 seems to have a changed ABI, so recompile against it.
xap/xpaint-3.1.3-i586-1.txz: Upgraded.
xap/xsnow-3.2.3-i586-1.txz: Upgraded.
+--------------------------+
Fri Mar 26 18:05:00 UTC 2021
a/mkinitrd-1.4.11-i586-20.txz: Rebuilt.
       mkinitrd_command_generator.sh: account for the mmc_block module having an
       internal name of "mmcblk". Thanks to Andypoo.
ap/cups-filters-1.28.8-i586-1.txz: Upgraded.
l/expat-2.3.0-i586-1.txz: Upgraded.
l/libvpx-1.10.0-i586-1.txz: Upgraded.
l/netpbm-10.93.03-i586-1.txz: Upgraded.
n/pam-krb5-4.10-i586-1.txz: Upgraded.
+--------------------------+
Fri Mar 26 03:07:35 UTC 2021
a/btrfs-progs-5.11.1-i586-1.txz: Upgraded.
a/dialog-1.3_20210324-i586-1.txz: Upgraded.
a/kernel-generic-5.10.26-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.26_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.26-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.26_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.26-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.26_smp-i686-1.txz: Upgraded.
a/openssl-solibs-1.1.1k-i586-1.txz: Upgraded.
d/kernel-headers-5.10.26_smp-x86-1.txz: Upgraded.
d/rust-1.51.0-i686-1.txz: Upgraded.
e/emacs-27.2-i586-1.txz: Upgraded.
k/kernel-source-5.10.26_smp-noarch-1.txz: Upgraded.
       -ADI_AXI_ADC m
       AD9467 m -> n
       FONT_TER16x32 n -> y
n/openssl-1.1.1k-i586-1.txz: Upgraded.
       This update fixes security issues:
       Fixed a problem with verifying a certificate chain when using the
       X509_V_FLAG_X509_STRICT flag.
       Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
       crafted renegotiation ClientHello message from a client.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
       (* Security fix *)
n/samba-4.14.2-i586-1.txz: Upgraded.
       This is a security release in order to address the following defects:
       Heap corruption via crafted DN strings.
       Out of bounds read in AD DC LDAP server.
       For more information, see:
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277
       (* Security fix *)
x/mesa-21.0.1-i586-1.txz: Upgraded.
extra/linux-5.10.26-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.10-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.10_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.10_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.10-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.10_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.10-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.10_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.10_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Thu Mar 25 01:29:36 UTC 2021
a/dialog-1.3_20210319-i586-2.txz: Rebuilt.
       Install /etc/dialogrc as /etc/dialogrc.new. This won't protect the file with
       this update, but it will moving forward. Thanks to Tonus.
l/libsigc++3-3.0.6-i586-1.txz: Added.
x/libinput-1.17.1-i586-1.txz: Upgraded.
xap/mozilla-firefox-87.0-i686-2.txz: Rebuilt.
       Pass --enable-optimize to let the build handle optimizations (apparently
       which optimizations work best differs throughout the tree). Don't pass
       optimization options in CFLAGS/CXXFLAGS. Build with --enable-rust-simd
       since upstream's binary releases do.
xap/mozilla-thunderbird-78.9.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/thunderbird/78.9.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-12/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987
       (* Security fix *)
testing/packages/linux-5.11.x/kernel-generic-5.11.9-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.9_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.9_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.9-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.9_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.9-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.9_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.9_smp-noarch-1.txz: Upgraded.
       -ADI_AXI_ADC m
       AD9467 m -> n
       FONT_TER16x32 n -> y
+--------------------------+
Wed Mar 24 04:29:15 UTC 2021
ap/mpg123-1.26.5-i586-1.txz: Upgraded.
d/cmake-3.20.0-i586-1.txz: Upgraded.
kde/krita-4.4.3-i586-1.txz: Upgraded.
l/mozjs78-78.9.0esr-i586-1.txz: Upgraded.
n/libassuan-2.5.5-i586-1.txz: Upgraded.
x/libva-2.11.0-i586-1.txz: Upgraded.
x/libva-utils-2.11.0-i586-1.txz: Upgraded.
xap/mozilla-firefox-87.0-i686-1.txz: Upgraded.
       This release contains security fixes and improvements.
       For more information, see:
       https://www.mozilla.org/en-US/firefox/87.0/releasenotes/
       https://www.mozilla.org/en-US/security/advisories/mfsa2021-10/
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23983
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23985
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23986
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987
       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23988
       (* Security fix *)
+--------------------------+
Tue Mar 23 02:15:21 UTC 2021
a/kernel-firmware-20210322_3f026a2-noarch-1.txz: Upgraded.
ap/man-pages-5.11-noarch-1.txz: Upgraded.
ap/rpm-4.16.1.3-i586-1.txz: Upgraded.
d/parallel-20210322-noarch-1.txz: Upgraded.
d/python-setuptools-54.2.0-i586-1.txz: Upgraded.
kde/digikam-7.2.0-i586-1.txz: Upgraded.
l/libsigc++-2.10.6-i586-1.txz: Upgraded.
n/alpine-2.24-i586-4.txz: Rebuilt.
       Rebuilt with maildir patch. Thanks to pisti and Eleksir.
n/getmail-6.15-i586-1.txz: Upgraded.
n/libgpg-error-1.42-i586-1.txz: Upgraded.
+--------------------------+
Mon Mar 22 00:41:10 UTC 2021
a/dialog-1.3_20210319-i586-1.txz: Upgraded.
d/poke-1.1-i586-1.txz: Upgraded.
l/imagemagick-7.0.11_4-i586-1.txz: Upgraded.
n/bridge-utils-1.7.1-i586-1.txz: Upgraded.
n/nettle-3.7.2-i586-1.txz: Upgraded.
xfce/thunar-4.16.6-i586-1.txz: Upgraded.
+--------------------------+
Sat Mar 20 20:06:47 UTC 2021
a/aaa_libraries-15.0-i586-4.txz: Rebuilt.
       Upgraded: libacl.so.1.1.2301, libattr.so.1.1.2501, libcap.so.2.49,
       libzstd.so.1.4.9, libglib-2.0.so.0.6600.8, libgmodule-2.0.so.0.6600.8,
       libgobject-2.0.so.0.6600.8, libgthread-2.0.so.0.6600.8,
       liblber-2.4.so.2.11.6, libldap-2.4.so.2.11.6. And also the krb5 libraries
       that didn't bump their version numbers.
a/kernel-generic-5.10.25-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.25_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.25-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.25_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.25-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.25_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.25_smp-x86-1.txz: Upgraded.
k/kernel-source-5.10.25_smp-noarch-1.txz: Upgraded.
l/glib2-2.66.8-i586-2.txz: Rebuilt.
       Rebuilt using -Dfam=false. Thanks to franzen.
n/samba-4.14.0-i586-2.txz: Rebuilt.
       Rebuilt using --without-fam. Thanks to franzen.
extra/linux-5.10.25-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.8-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.8_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.8-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.8-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.8_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.8_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Fri Mar 19 18:29:25 UTC 2021
ap/vim-8.2.2623-i586-1.txz: Upgraded.
l/jasper-2.0.27-i586-1.txz: Upgraded.
l/mozilla-nss-3.63-i586-1.txz: Upgraded.
l/pipewire-0.3.24-i586-1.txz: Upgraded.
l/pygobject3-3.40.0-i586-1.txz: Upgraded.
n/wireguard-tools-1.0.20210315-i586-1.txz: Added.
       Thanks to dgusev for the suggestion.
xap/vim-gvim-8.2.2623-i586-1.txz: Upgraded.
+--------------------------+
Thu Mar 18 23:54:14 UTC 2021
ap/slackpkg-15.0.1-noarch-1.txz: Upgraded.
       Tweak default blacklist file's help text (thanks, dive).
       Fix display of blacklisted packages.
       Tweaks to slack-desc.
       Note that kernel-headers should not be blacklisted.
       Added Lithuania mirrors (Totoro-kun on LQ).
       Fix exit code for pending updates (dive).
       Avoid matching txz/tgz etc extension when blacklisting (dive).
       Use https for all slackpkg homepage links.
       Update mirror files (14.2 -> 15.0).
       Add blacklist to search option.
       Move applyblacklist to end of makelist().
       Clarify how to blacklist duplicate packages.
       Fix new-config dialog.
       Reduce false positives in DOUBLEFILES detection.
       Remove spaces in awk..
       More blacklisting fixups (see full commit msg).
       Escape plus signs in blacklist regex.
       Convert ${ROOT}/${WORKDIR} > ${WORKDIR} (dive).
       Convert ${ROOT}/${CONF} -> ${CONF} and tweak blacklists (dive).
       Further fixup/enhancement to blacklisting issues.
       Fix "slackpkg blacklist" so that it shows blacklist again.
       Fixup internal blacklist handling.
       Use ERE for sanity_check() function (David Woodfall).
       Remove "slackpkg blacklist" from manual pages.
       Fix aaa_elflibs --> aaa_libraries in sample blacklist file (mozes).
       Split aarch64 and arm mirrors into separate files (mozes).
       Allow new-config after slackpkg upgrade itself (PiterPUNK).
       Modify blacklist regex line ending.
       Thanks to Robby Workman.
ap/sqlite-3.35.2-i586-1.txz: Upgraded.
kde/kid3-3.8.6-i586-1.txz: Upgraded.
l/glib2-2.66.8-i586-1.txz: Upgraded.
l/pango-1.48.3-i586-2.txz: Rebuilt.
       Eliminate dangling symlink. Thanks to upnort.
n/bind-9.16.13-i586-1.txz: Upgraded.
n/links-2.22-i586-1.txz: Upgraded.
n/network-scripts-15.0-noarch-14.txz: Rebuilt.
       Fix discrepancies between rc.inet1.conf versions.
       Move configuration of SLACC before DHCP.
       Don't bring up a bridge interface if it will be brought up later by IP config.
       Fix a typo in br_open when configuring IFOPTS: i->1.
       Add SLAAC security and privacy options.
       Fix typo of 'default'.
       Added debugging output around new SLAAC enhancements.
       Move enabling RA before SLAAC security section. Thanks to davjohn on LQ.
       Fix domain name validation checks. Thanks to xbeastx74 on LQ for the report.
       Thanks to Darren "Tadgy" Austin and Robby Workman.
n/wireless_tools-30.pre9-i586-5.txz: Rebuilt.
       rc.wireless: don't leave interfaces in up state as it prevents SLAAC.
       Take interface down at exit from rc.wireless. Thanks to davjohn.
x/libgee-0.20.4-i586-1.txz: Upgraded.
+--------------------------+
Thu Mar 18 04:01:02 UTC 2021
Hope everyone had a fine St. Paddy's day! :-)
a/kernel-generic-5.10.24-i586-1.txz: Upgraded.
a/kernel-generic-smp-5.10.24_smp-i686-1.txz: Upgraded.
a/kernel-huge-5.10.24-i586-1.txz: Upgraded.
a/kernel-huge-smp-5.10.24_smp-i686-1.txz: Upgraded.
a/kernel-modules-5.10.24-i586-1.txz: Upgraded.
a/kernel-modules-smp-5.10.24_smp-i686-1.txz: Upgraded.
d/kernel-headers-5.10.24_smp-x86-1.txz: Upgraded.
d/vala-0.52.0-i586-1.txz: Upgraded.
k/kernel-source-5.10.24_smp-noarch-1.txz: Upgraded.
l/harfbuzz-2.8.0-i586-1.txz: Upgraded.
l/lmdb-0.9.29-i586-1.txz: Upgraded.
n/openldap-2.4.58-i586-1.txz: Upgraded.
x/xkbcomp-1.4.5-i586-1.txz: Upgraded.
extra/linux-5.10.24-nosmp-sdk/*: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-5.11.7-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-generic-smp-5.11.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-headers-5.11.7_smp-x86-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-5.11.7-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-huge-smp-5.11.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-5.11.7-i586-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-modules-smp-5.11.7_smp-i686-1.txz: Upgraded.
testing/packages/linux-5.11.x/kernel-source-5.11.7_smp-noarch-1.txz: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
+--------------------------+
Tue Mar 16 18:45:39 UTC 2021
a/acl-2.3.1-i586-1.txz: Upgraded.
a/attr-2.5.1-i586-1.txz: Upgraded.
a/libgudev-236-i586-1.txz: Upgraded.
ap/sqlite-3.35.1-i586-1.txz: Upgraded.
ap/sudo-1.9.6p1-i586-1.txz: Upgraded.
d/git-2.31.0-i586-1.txz: Upgraded.
kde/bluedevil-5.21.3-i586-1.txz: Upgraded.
kde/breeze-5.21.3-i586-1.txz: Upgraded.
kde/breeze-grub-5.21.3-i586-1.txz: Upgraded.
kde/breeze-gtk-5.21.3-i586-1.txz: Upgraded.
kde/drkonqi-5.21.3-i586-1.txz: Upgraded.
kde/kactivitymanagerd-5.21.3-i586-1.txz: Upgraded.
kde/kde-cli-tools-5.21.3-i586-1.txz: Upgraded.
kde/kde-gtk-config-5.21.3-i586-1.txz: Upgraded.
kde/kdecoration-5.21.3-i586-1.txz: Upgraded.
kde/kdeplasma-addons-5.21.3-i586-1.txz: Upgraded.
kde/kgamma5-5.21.3-i586-1.txz: Upgraded.
kde/khotkeys-5.21.3-i586-1.txz: Upgraded.
kde/kinfocenter-5.21.3-i586-1.txz: Upgraded.
kde/kio-5.80.1-i586-1.txz: Upgraded.
kde/kmenuedit-5.21.3-i586-1.txz: Upgraded.
kde/kscreen-5.21.3-i586-1.txz: Upgraded.
kde/kscreenlocker-5.21.3-i586-1.txz: Upgraded.
kde/ksshaskpass-5.21.3-i586-1.txz: Upgraded.
kde/ksysguard-5.21.3-i586-1.txz: Upgraded.
kde/kwallet-pam-5.21.3-i586-1.txz: Upgraded.
kde/kwayland-integration-5.21.3-i586-1.txz: Upgraded.
kde/kwayland-server-5.21.3-i586-1.txz: Upgraded.
kde/kwin-5.21.3-i586-1.txz: Upgraded.
kde/kwrited-5.21.3-i586-1.txz: Upgraded.
kde/libkscreen-5.21.3-i586-1.txz: Upgraded.
kde/libksysguard-5.21.3.1-i586-1.txz: Upgraded.
kde/milou-5.21.3-i586-1.txz: Upgraded.
kde/oxygen-5.21.3-i586-1.txz: Upgraded.
kde/plasma-browser-integration-5.21.3-i586-1.txz: Upgraded.
kde/plasma-desktop-5.21.3-i586-1.txz: Upgraded.
kde/plasma-disks-5.21.3-i586-1.txz: Upgraded.
kde/plasma-firewall-5.21.3-i586-1.txz: Upgraded.
kde/plasma-integration-5.21.3-i586-1.txz: Upgraded.
kde/plasma-nm-5.21.3-i586-1.txz: Upgraded.
kde/plasma-pa-5.21.3-i586-1.txz: Upgraded.
kde/plasma-sdk-5.21.3-i586-1.txz: Upgraded.
kde/plasma-systemmonitor-5.2