slackware-current/source/d
Patrick J Volkerding 6f8b2b4fab Wed Jul 19 20:36:46 UTC 2023
a/kernel-firmware-20230707_d3f6606-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.39-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.39-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.39-x86_64-1.txz:  Upgraded.
a/xfsprogs-6.4.0-x86_64-1.txz:  Upgraded.
d/cmake-3.27.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.39-x86-1.txz:  Upgraded.
k/kernel-source-6.1.39-noarch-1.txz:  Upgraded.
l/mpfr-4.2.0p12-x86_64-1.txz:  Upgraded.
n/bind-9.18.17-x86_64-1.txz:  Upgraded.
n/curl-8.2.0-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  fopen race condition.
  For more information, see:
    https://curl.se/docs/CVE-2023-32001.html
    https://www.cve.org/CVERecord?id=CVE-2023-32001
  (* Security fix *)
n/dhcpcd-10.0.2-x86_64-1.txz:  Upgraded.
n/openssh-9.3p2-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  ssh-agent(1) in OpenSSH between and 5.5 and 9.3p1 (inclusive): remote code
  execution relating to PKCS#11 providers.
  The PKCS#11 support ssh-agent(1) could be abused to achieve remote code
  execution via a forwarded agent socket if the following conditions are met:
  * Exploitation requires the presence of specific libraries on the victim
    system.
  * Remote exploitation requires that the agent was forwarded to an
    attacker-controlled system.
  Exploitation can also be prevented by starting ssh-agent(1) with an empty
  PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring an allowlist that
  contains only specific provider libraries.
  This vulnerability was discovered and demonstrated to be exploitable by the
  Qualys Security Advisory team.
  Potentially-incompatible changes:
  * ssh-agent(8): the agent will now refuse requests to load PKCS#11 modules
  issued by remote clients by default. A flag has been added to restore the
  previous behaviour: "-Oallow-remote-pkcs11".
  For more information, see:
    https://www.openssh.com/txt/release-9.3p2
    https://www.cve.org/CVERecord?id=CVE-2023-38408
  (* Security fix *)
n/samba-4.18.5-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  When winbind is used for NTLM authentication, a maliciously crafted request
  can trigger an out-of-bounds read in winbind and possibly crash it.
  SMB2 packet signing is not enforced if an admin configured
  "server signing = required" or for SMB2 connections to Domain Controllers
  where SMB2 packet signing is mandatory.
  An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be
  triggered by an unauthenticated attacker by issuing a malformed RPC request.
  Missing type validation in Samba's mdssvc RPC service for Spotlight can be
  used by an unauthenticated attacker to trigger a process crash in a shared
  RPC mdssvc worker process.
  As part of the Spotlight protocol Samba discloses the server-side absolute
  path of shares and files and directories in search results.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2022-2127.html
    https://www.samba.org/samba/security/CVE-2023-3347.html
    https://www.samba.org/samba/security/CVE-2023-34966.html
    https://www.samba.org/samba/security/CVE-2023-34967.html
    https://www.samba.org/samba/security/CVE-2023-34968.html
    https://www.cve.org/CVERecord?id=CVE-2022-2127
    https://www.cve.org/CVERecord?id=CVE-2023-3347
    https://www.cve.org/CVERecord?id=CVE-2023-34966
    https://www.cve.org/CVERecord?id=CVE-2023-34967
    https://www.cve.org/CVERecord?id=CVE-2023-34968
  (* Security fix *)
xap/mozilla-firefox-115.0.3esr-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/115.0.3esr/releasenotes/
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-07-19 23:51:30 +02:00
..
autoconf Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
autoconf-archive Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
automake Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
binutils Wed Jan 18 06:11:54 UTC 2023 2023-01-18 08:41:55 +01:00
bison Wed Mar 10 01:30:34 UTC 2021 2021-03-10 08:59:55 +01:00
cargo-vendor-filterer Wed Apr 19 19:17:14 UTC 2023 2023-04-19 22:38:27 +02:00
cbindgen Thu Jun 22 01:54:11 UTC 2023 2023-06-22 04:39:09 +02:00
ccache Sat Aug 21 04:38:34 UTC 2021 2021-08-21 17:59:54 +02:00
check Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
clisp Wed Oct 19 20:06:33 UTC 2022 2022-10-20 17:00:19 +02:00
cmake Wed Jul 19 20:36:46 UTC 2023 2023-07-19 23:51:30 +02:00
cscope Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
cvs Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
Cython Tue Dec 7 21:02:41 UTC 2021 2021-12-08 08:59:52 +01:00
dev86 Mon Nov 21 20:23:13 UTC 2022 2022-11-22 07:00:14 +01:00
distcc Thu Nov 4 04:43:31 UTC 2021 2021-11-04 08:59:59 +01:00
doxygen Sat Aug 27 18:13:36 UTC 2022 2022-08-28 07:00:12 +02:00
flex Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
gcc Tue Jun 6 20:26:59 UTC 2023 2023-06-07 00:59:33 +02:00
gdb Sun Feb 19 20:11:11 UTC 2023 2023-02-19 21:34:24 +01:00
git Tue Mar 14 20:42:47 UTC 2023 2023-03-14 23:43:27 +01:00
gnucobol Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
gperf Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
guile Thu Jan 26 00:34:41 UTC 2023 2023-01-26 02:33:14 +01:00
gyp Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
help2man Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
icecream Mon Nov 21 20:23:13 UTC 2022 2022-11-22 07:00:14 +01:00
indent Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
intltool Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
libtool Tue Jun 6 20:26:59 UTC 2023 2023-06-07 00:59:33 +02:00
llvm Wed Jun 14 21:43:32 UTC 2023 2023-06-15 00:46:37 +02:00
m4 Mon May 31 23:21:18 UTC 2021 2021-06-01 09:00:03 +02:00
make Mon Feb 27 20:41:05 UTC 2023 2023-02-27 22:41:55 +01:00
mercurial Fri Mar 24 19:42:46 UTC 2023 2023-03-24 21:33:23 +01:00
meson Tue Nov 8 22:21:43 UTC 2022 2022-11-09 07:00:18 +01:00
nasm Thu Dec 22 03:40:55 UTC 2022 2022-12-22 06:39:00 +01:00
ninja Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
opencl-headers Wed Jun 16 01:06:18 UTC 2021 2021-06-16 08:59:50 +02:00
oprofile Wed Jan 18 06:11:54 UTC 2023 2023-01-18 08:41:55 +01:00
p2c Tue Dec 20 20:40:18 UTC 2022 2022-12-20 22:34:22 +01:00
pahole Mon Jun 6 20:57:15 UTC 2022 2022-06-07 07:00:10 +02:00
parallel Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
patchelf Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
perl Mon Jul 3 20:19:22 UTC 2023 2023-07-03 22:58:10 +02:00
pkg-config Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
pmake Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
poke Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
python-pip Sat Aug 27 18:13:36 UTC 2022 2022-08-28 07:00:12 +02:00
python-setuptools Sun Aug 21 18:58:29 UTC 2022 2022-08-22 01:00:18 +02:00
python2 Mon Mar 6 02:21:57 UTC 2023 2023-03-06 04:41:59 +01:00
python3 Fri Jun 9 01:06:21 UTC 2023 2023-06-09 04:46:43 +02:00
rcs Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
re2c Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
rinutils Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
ruby Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
rust Thu Jul 13 19:53:09 UTC 2023 2023-07-13 22:28:43 +02:00
rust-bindgen Thu Jun 22 01:54:11 UTC 2023 2023-06-22 04:39:09 +02:00
sassc Sat Apr 8 19:01:35 UTC 2023 2023-04-08 21:35:38 +02:00
scons Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
slacktrack Thu Sep 8 01:33:19 UTC 2022 2022-09-08 07:00:15 +02:00
strace Thu Feb 18 20:47:35 UTC 2021 2021-02-19 08:59:50 +01:00
subversion Mon Jul 3 20:19:22 UTC 2023 2023-07-03 22:58:10 +02:00
swig Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
vala Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
yasm Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
FTBFSlog Wed Jan 18 06:11:54 UTC 2023 2023-01-18 08:41:55 +01:00
gettext-tools Slackware 13.37 2018-05-31 22:45:18 +02:00