mirror of
git://slackware.nl/current.git
synced 2024-11-16 07:48:02 +01:00
f2dca0d8e5
ap/sudo-1.9.11p1-x86_64-1.txz: Upgraded. kde/digikam-7.6.0-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.6.0. l/gst-plugins-bad-free-1.20.2-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.6.0. l/opencv-4.6.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.36.6-x86_64-1.txz: Upgraded. n/epic5-2.1.11-x86_64-1.txz: Upgraded. n/httpd-2.4.54-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism. Information Disclosure in mod_lua with websockets. mod_sed denial of service. Denial of service in mod_lua r:parsebody. Read beyond bounds in ap_strcmp_match(). Read beyond bounds via ap_rwrite(). Read beyond bounds in mod_isapi. mod_proxy_ajp: Possible request smuggling. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.54 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377 (* Security fix *) n/libnftnl-1.2.2-x86_64-1.txz: Upgraded. n/nftables-1.0.4-x86_64-1.txz: Upgraded. |
||
---|---|---|
.. | ||
doinst.sh | ||
httpd.runasapache.diff | ||
httpd.SlackBuild | ||
httpd.url | ||
logrotate.httpd | ||
rc.httpd | ||
slack-desc |