ChangeLog for: 2026-02-28 00:53:06

a/intel-microcode-20260227-noarch-1.txz: Upgraded. a/kernel-firmware-20260226_d8e138d-noarch-1.txz: Upgraded. ap/lxc-6.0.6-x86_64-1.txz: Upgraded. ap/vim-9.2.0078-x86_64-1.txz: Upgraded. kde/marble-23.08.5-x86_64-12.txz: Rebuilt. Recompiled against protobuf-34.0. l/gst-plugins-libav-1.28.1-x86_64-1.txz: Upgraded. l/protobuf-34.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/python-scikit-build-core-0.12.1-x86_64-1.txz: Upgraded. l/qt6-6.10.2_20260125_abfb3788-x86_64-3.txz: Rebuilt. Recompiled against protobuf-34.0. n/bind-9.20.20-x86_64-1.txz: Upgraded. n/mosh-1.4.0-x86_64-18.txz: Rebuilt. Recompiled against protobuf-34.0. n/samba-4.23.6-x86_64-1.txz: Upgraded. x/labwc-0.9.4-x86_64-1.txz: Upgraded. x/wlroots-0.19.2-x86_64-3.txz: Rebuilt. Applied upstream patches for the new libinput. Thanks to Willy Sudiarto Raharjo. xap/geeqie-2.7-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-140.8.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/140.8.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-17/ https://www.cve.org/CVERecord?id=CVE-2026-2757 https://www.cve.org/CVERecord?id=CVE-2026-2758 https://www.cve.org/CVERecord?id=CVE-2026-2759 https://www.cve.org/CVERecord?id=CVE-2026-2760 https://www.cve.org/CVERecord?id=CVE-2026-2761 https://www.cve.org/CVERecord?id=CVE-2026-2762 https://www.cve.org/CVERecord?id=CVE-2026-2763 https://www.cve.org/CVERecord?id=CVE-2026-2764 https://www.cve.org/CVERecord?id=CVE-2026-2765 https://www.cve.org/CVERecord?id=CVE-2026-2766 https://www.cve.org/CVERecord?id=CVE-2026-2767 https://www.cve.org/CVERecord?id=CVE-2026-2768 https://www.cve.org/CVERecord?id=CVE-2026-2769 https://www.cve.org/CVERecord?id=CVE-2026-2770 https://www.cve.org/CVERecord?id=CVE-2026-2771 https://www.cve.org/CVERecord?id=CVE-2026-2772 https://www.cve.org/CVERecord?id=CVE-2026-2773 https://www.cve.org/CVERecord?id=CVE-2026-2774 https://www.cve.org/CVERecord?id=CVE-2026-2775 https://www.cve.org/CVERecord?id=CVE-2026-2776 https://www.cve.org/CVERecord?id=CVE-2026-2777 https://www.cve.org/CVERecord?id=CVE-2026-2778 https://www.cve.org/CVERecord?id=CVE-2026-2779 https://www.cve.org/CVERecord?id=CVE-2026-2780 https://www.cve.org/CVERecord?id=CVE-2026-2781 https://www.cve.org/CVERecord?id=CVE-2026-2782 https://www.cve.org/CVERecord?id=CVE-2026-2783 https://www.cve.org/CVERecord?id=CVE-2026-2784 https://www.cve.org/CVERecord?id=CVE-2026-2785 https://www.cve.org/CVERecord?id=CVE-2026-2786 https://www.cve.org/CVERecord?id=CVE-2026-2787 https://www.cve.org/CVERecord?id=CVE-2026-2788 https://www.cve.org/CVERecord?id=CVE-2026-2789 https://www.cve.org/CVERecord?id=CVE-2026-2790 https://www.cve.org/CVERecord?id=CVE-2026-2791 https://www.cve.org/CVERecord?id=CVE-2026-2792 https://www.cve.org/CVERecord?id=CVE-2026-2793 (* Security fix *) xap/vim-gvim-9.2.0078-x86_64-1.txz: Upgraded. extra/xv/xv-6.2.0-x86_64-1.txz: Upgraded. testing/packages/linux-6.18.x/kernel-generic-6.18.15-x86_64-1.txz: Upgraded. testing/packages/linux-6.18.x/kernel-headers-6.18.15-x86-1.txz: Upgraded. testing/packages/linux-6.18.x/kernel-source-6.18.15-noarch-1.txz: Upgraded.