summaryrefslogtreecommitdiffstats
path: root/slackware64-current/source/a/ed
diff options
context:
space:
mode:
authorAdrien Nader <adrien@notk.org>2013-06-28 03:52:09 +0200
committerAdrien Nader <adrien@notk.org>2013-06-28 03:52:09 +0200
commitd97cd1d56b936360d4188f514ee72bd3b803752d (patch)
tree60a600790d3dc7fa0653be273f70659dc7c9b61c /slackware64-current/source/a/ed
parentee5391a4273274ac8d2c00aab7fdc9898b5785be (diff)
Thu Jun 27 23:56:34 UTC 2013
a/ed-1.9-x86_64-1.txz: Upgraded. a/procps-3.2.8-x86_64-4.txz: Rebuilt. Include header files. Thanks to mancha. ap/pm-utils-1.4.1-x86_64-4.txz: Rebuilt. In the 49bluetooth-generic hook, don't take action unless the kernel supports rfkill, the rfkill binary is present, and rc.bluetooth is executable. Thanks to Grifulkin and Darth Vader for the bug report. d/ruby-1.9.3_p448-x86_64-1.txz: Upgraded. This update patches a vulnerability in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via a valid certificate issued by a trusted certification authority. For more information, see: http://www.ruby-lang.org/en/news/2013/06/27/hostname-check-bypassing-vulnerability-in-openssl-client-cve-2013-4073/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 (* Security fix *)
Diffstat (limited to 'slackware64-current/source/a/ed')
-rw-r--r--slackware64-current/source/a/ed/ed-1.7.tar.xz1
-rw-r--r--slackware64-current/source/a/ed/ed-1.9.tar.xz1
2 files changed, 1 insertions, 1 deletions
diff --git a/slackware64-current/source/a/ed/ed-1.7.tar.xz b/slackware64-current/source/a/ed/ed-1.7.tar.xz
deleted file mode 100644
index 6428516a0..000000000
--- a/slackware64-current/source/a/ed/ed-1.7.tar.xz
+++ /dev/null
@@ -1 +0,0 @@
-8f4e3881ff77cd9a4ac06cd603d31086901beb0d
diff --git a/slackware64-current/source/a/ed/ed-1.9.tar.xz b/slackware64-current/source/a/ed/ed-1.9.tar.xz
new file mode 100644
index 000000000..a93e4092c
--- /dev/null
+++ b/slackware64-current/source/a/ed/ed-1.9.tar.xz
@@ -0,0 +1 @@
+5f818cb4f0ab8c0458754f267126fe4952b8c4c7