1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-14 08:01:11 +01:00
slackware-current/source/d/python3
Patrick J Volkerding 53b8e9dd39 Wed Nov 10 20:32:37 UTC 2021
d/python3-3.9.8-x86_64-1.txz:  Upgraded.
l/libtasn1-4.18.0-x86_64-1.txz:  Upgraded.
n/curl-7.80.0-x86_64-1.txz:  Upgraded.
n/ethtool-5.15-x86_64-1.txz:  Upgraded.
n/samba-4.15.2-x86_64-1.txz:  Upgraded.
  This is a security release in order to address the following defects:
  SMB1 client connections can be downgraded to plaintext authentication.
  A user on the domain can become root on domain members.
  Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC.
  Samba AD DC did not always rely on the SID and PAC in Kerberos tickets.
  Kerberos acceptors need easy access to stable AD identifiers (eg objectSid).
  Samba AD DC did not do suffienct access and conformance checking of data
  stored.
  Use after free in Samba AD DC RPC server.
  Subsequent DCE/RPC fragment injection vulnerability.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2016-2124.html
    https://www.samba.org/samba/security/CVE-2020-25717.html
    ^^ (PLEASE READ! There are important behaviour changes described)
    https://www.samba.org/samba/security/CVE-2020-25718.html
    https://www.samba.org/samba/security/CVE-2020-25719.html
    https://www.samba.org/samba/security/CVE-2020-25721.html
    https://www.samba.org/samba/security/CVE-2020-25722.html
    https://www.samba.org/samba/security/CVE-2021-3738.html
    https://www.samba.org/samba/security/CVE-2021-23192.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192
  (* Security fix *)
x/xorg-server-xwayland-21.1.3-x86_64-1.txz:  Upgraded.
2021-11-11 08:59:57 +01:00
..
python.sysconfig.py.x86_64.diff Thu Nov 4 04:43:31 UTC 2021 2021-11-04 08:59:59 +01:00
python3.distutils.x86_64.diff Thu Nov 4 04:43:31 UTC 2021 2021-11-04 08:59:59 +01:00
python3.no-static-library.diff Thu Nov 4 04:43:31 UTC 2021 2021-11-04 08:59:59 +01:00
python3.readline.set_pre_input_hook.diff Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
python3.setup.py.x86_64.diff Sun Oct 25 18:05:51 UTC 2020 2020-10-26 08:18:35 +01:00
python3.SlackBuild Wed Nov 10 20:32:37 UTC 2021 2021-11-11 08:59:57 +01:00
python3.url Wed Jul 10 23:56:13 UTC 2019 2019-07-11 08:59:45 +02:00
README Thu Nov 4 04:43:31 UTC 2021 2021-11-04 08:59:59 +01:00
slack-desc Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00

Python is an interpreted, interactive, object-oriented programming
language that combines remarkable power with very clear syntax.
Python's basic power can be extended with your own modules written in C
or C++.  Python is also adaptable as an extension language for existing
applications.

Python 3 (a.k.a. "Python 3000" or "Py3k") is a new version of the
language that is incompatible with the 2.x line of releases.  The
language is mostly the same, but many details, especially how built-in
objects like dictionaries and strings work, have changed considerably,
and a lot of deprecated features have finally been removed.  Also, the
standard library has been reorganized in a few prominent places.

It is safe to install alongside Slackware's Python 2.x.

If you'd like to have HTML docs installed, get them from
<https://docs.python.org/3/download.html> (HTML format, .tar.bz2
archive).