This website requires JavaScript.
Explore
Help
Sign in
Miroirs
/
slackware-current
Watch
1
Star
0
Fork
You've already forked slackware-current
0
mirror of
git://slackware.nl/current.git
synced
2024-12-28 09:59:53 +01:00
Code
Issues
Projects
Releases
Packages
Wiki
Activity
Actions
a58659e043
slackware-current
/
source
/
x
/
intel-vaapi-driver
/
intel-vaapi-driver.url
2 lines
44 B
Text
Raw
Normal View
History
Unescape
Escape
Sat Dec 22 04:38:27 UTC 2018 a/coreutils-8.30-x86_64-3.txz: Rebuilt. Support tmux terms in DIR_COLORS. Thanks to qunying. a/grep-3.3-x86_64-1.txz: Upgraded. a/kernel-generic-4.19.12-x86_64-1.txz: Upgraded. a/kernel-huge-4.19.12-x86_64-1.txz: Upgraded. a/kernel-modules-4.19.12-x86_64-1.txz: Upgraded. a/sed-4.7-x86_64-1.txz: Upgraded. d/kernel-headers-4.19.12-x86-1.txz: Upgraded. d/rust-1.31.1-x86_64-1.txz: Upgraded. k/kernel-source-4.19.12-noarch-1.txz: Upgraded. l/graphite2-1.3.13-x86_64-1.txz: Upgraded. l/harfbuzz-2.3.0-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_19-x86_64-1.txz: Upgraded. l/lmdb-0.9.23-x86_64-1.txz: Upgraded. l/v4l-utils-1.16.3-x86_64-1.txz: Upgraded. n/netatalk-3.1.12-x86_64-1.txz: Upgraded. Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160 (* Security fix *) n/openldap-client-2.4.47-x86_64-1.txz: Upgraded. n/samba-4.9.4-x86_64-1.txz: Upgraded. x/intel-vaapi-driver-2.3.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-12-22 05:38:27 +01:00
https://github.com/intel/intel-vaapi-driver
Reference in a new issue
Copy permalink