mirror of
git://slackware.nl/current.git
synced 2024-12-26 09:58:59 +01:00
39de96c169
a/etc-15.1-x86_64-3.txz: Rebuilt. /etc/group: Added kvm (GID 36). a/eudev-3.2.12-x86_64-2.txz: Rebuilt. In 50-udev-default.rules, comment out the lines for SGX. a/kernel-firmware-20230517_601c181-noarch-1.txz: Upgraded. a/kernel-generic-6.1.29-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.29-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.29-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.29-x86-1.txz: Upgraded. d/llvm-16.0.4-x86_64-1.txz: Upgraded. k/kernel-source-6.1.29-noarch-1.txz: Upgraded. kde/kde-cli-tools-5.27.5.1-x86_64-1.txz: Upgraded. l/fribidi-1.0.13-x86_64-1.txz: Upgraded. l/pipewire-0.3.71-x86_64-1.txz: Upgraded. n/bind-9.18.15-x86_64-1.txz: Upgraded. This is a bugfix release. n/curl-8.1.0-x86_64-1.txz: Upgraded. This update fixes security issues: more POST-after-PUT confusion. IDN wildcard match. siglongjmp race condition. UAF in SSH sha256 fingerprint check. For more information, see: https://curl.se/docs/CVE-2023-28322.html https://curl.se/docs/CVE-2023-28321.html https://curl.se/docs/CVE-2023-28320.html https://curl.se/docs/CVE-2023-28319.html https://www.cve.org/CVERecord?id=CVE-2023-28322 https://www.cve.org/CVERecord?id=CVE-2023-28321 https://www.cve.org/CVERecord?id=CVE-2023-28320 https://www.cve.org/CVERecord?id=CVE-2023-28319 (* Security fix *) x/libwacom-2.7.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. |
||
---|---|---|
.. | ||
a | ||
ap | ||
d | ||
e | ||
f | ||
k | ||
kde | ||
l | ||
n | ||
t | ||
tcl | ||
x | ||
xap | ||
xfce | ||
y |