mirror of
git://slackware.nl/current.git
synced 2024-12-27 09:59:16 +01:00
07449d94af
a/kernel-generic-6.10.9-x86_64-1.txz: Upgraded. a/kernel-huge-6.10.9-x86_64-1.txz: Upgraded. a/kernel-modules-6.10.9-x86_64-1.txz: Upgraded. ap/texinfo-7.1.1-x86_64-1.txz: Upgraded. d/kernel-headers-6.10.9-x86-1.txz: Upgraded. d/python3-3.11.10-x86_64-1.txz: Upgraded. This update fixes security issues: Bundled libexpat was updated to 2.6.3. Fix quadratic complexity in parsing "-quoted cookie values with backslashes by http.cookies. Fixed various false positives and false negatives in IPv4Address.is_private, IPv4Address.is_global, IPv6Address.is_private, IPv6Address.is_global. Fix urllib.parse.urlunparse() and urllib.parse.urlunsplit() for URIs with path starting with multiple slashes and no authority. Remove backtracking from tarfile header parsing for hdrcharset, PAX, and GNU sparse headers. email.utils.getaddresses() and email.utils.parseaddr() now return ('', '') 2-tuples in more situations where invalid email addresses are encountered instead of potentially inaccurate values. Add optional strict parameter to these two functions: use strict=False to get the old behavior, accept malformed inputs. getattr(email.utils, 'supports_strict_parsing', False) can be used to check if the strict paramater is available. Sanitize names in zipfile.Path to avoid infinite loops (gh-122905) without breaking contents using legitimate characters. Email headers with embedded newlines are now quoted on output. The generator will now refuse to serialize (write) headers that are unsafely folded or delimited; see verify_generated_headers. For more information, see: https://pythoninsider.blogspot.com/2024/09/python-3130rc2-3126-31110-31015-3920.html https://www.cve.org/CVERecord?id=CVE-2024-28757 https://www.cve.org/CVERecord?id=CVE-2024-45490 https://www.cve.org/CVERecord?id=CVE-2024-45491 https://www.cve.org/CVERecord?id=CVE-2024-45492 https://www.cve.org/CVERecord?id=CVE-2024-7592 https://www.cve.org/CVERecord?id=CVE-2024-4032 https://www.cve.org/CVERecord?id=CVE-2015-2104 https://www.cve.org/CVERecord?id=CVE-2024-6232 https://www.cve.org/CVERecord?id=CVE-2023-27043 https://www.cve.org/CVERecord?id=CVE-2024-8088 https://www.cve.org/CVERecord?id=CVE-2024-6923 (* Security fix *) k/kernel-source-6.10.9-noarch-1.txz: Upgraded. TEE n -> m +AMDTEE m +AMD_PMF m +AMD_PMF_DEBUG n Thanks to nick8325 for the suggestion. l/qt5-5.15.15_20240903_363456a6-x86_64-1.txz: Upgraded. x/noto-emoji-2.042-noarch-1.txz: Added. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
19 lines
921 B
Text
19 lines
921 B
Text
# HOW TO EDIT THIS FILE:
|
|
# The "handy ruler" below makes it easier to edit a package description.
|
|
# Line up the first '|' above the ':' following the base package name, and
|
|
# the '|' on the right side marks the last column you can put a character in.
|
|
# You must make exactly 11 lines for the formatting to be correct. It's also
|
|
# customary to leave one space after the ':' except on otherwise blank lines.
|
|
|
|
|-----handy-ruler------------------------------------------------------|
|
|
noto-emoji: noto-emoji (Google's Noto Emoji fonts)
|
|
noto-emoji:
|
|
noto-emoji: Google's Noto Emoji is an open source font that has you covered for
|
|
noto-emoji: all your emoji needs, including support for the latest Unicode
|
|
noto-emoji: emoji specification. It has multiple weights and features thousands
|
|
noto-emoji: of emoji.
|
|
noto-emoji:
|
|
noto-emoji: Homepage: https://github.com/googlei18n/noto-emoji
|
|
noto-emoji:
|
|
noto-emoji:
|
|
noto-emoji:
|