From 5a7ce2ee4bcd9a1b23eaee34748e0f19cc1b1022 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Fri, 5 Apr 2019 20:26:51 +0000 Subject: Fri Apr 5 20:26:51 UTC 2019 ap/vim-8.1.1119-x86_64-1.txz: Upgraded. l/openjpeg-2.3.1-x86_64-1.txz: Upgraded. Includes many bug fixes (including security fixes). (* Security fix *) n/links-2.19-x86_64-1.txz: Upgraded. n/stunnel-5.51-x86_64-1.txz: Upgraded. n/wget-1.20.3-x86_64-1.txz: Upgraded. Fixed a buffer overflow vulnerability: src/iri.c(do_conversion): Reallocate the output buffer to a larger size if it is already full. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953 (* Security fix *) xap/vim-gvim-8.1.1119-x86_64-1.txz: Upgraded. --- source/l/readline/readline.SlackBuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'source/l/readline') diff --git a/source/l/readline/readline.SlackBuild b/source/l/readline/readline.SlackBuild index 382e3607..670b44f4 100755 --- a/source/l/readline/readline.SlackBuild +++ b/source/l/readline/readline.SlackBuild @@ -59,7 +59,7 @@ rm -rf $PKG mkdir -p $TMP $PKG # Determine readline patchlevel: -PATCHLEVEL="$( cd $CWD/readline-${VERSION}-patches ; /bin/ls readline7?-??? 2> /dev/null | tail -1 | cut -f 2 -d - 2> /dev/null )" +PATCHLEVEL="$( cd $CWD/readline-${VERSION}-patches ; /bin/ls readline??-??? 2> /dev/null | tail -1 | cut -f 2 -d - 2> /dev/null )" if [ "$PATCHLEVEL" = "" ]; then PATCHLEVEL=000 fi -- cgit v1.2.3