slackware-current/slackware64
Patrick J Volkerding 07449d94af Mon Sep 9 00:53:17 UTC 2024
a/kernel-generic-6.10.9-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.10.9-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.10.9-x86_64-1.txz:  Upgraded.
ap/texinfo-7.1.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.10.9-x86-1.txz:  Upgraded.
d/python3-3.11.10-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Bundled libexpat was updated to 2.6.3.
  Fix quadratic complexity in parsing "-quoted cookie values with backslashes
  by http.cookies.
  Fixed various false positives and false negatives in IPv4Address.is_private,
  IPv4Address.is_global, IPv6Address.is_private, IPv6Address.is_global.
  Fix urllib.parse.urlunparse() and urllib.parse.urlunsplit() for URIs with
  path starting with multiple slashes and no authority.
  Remove backtracking from tarfile header parsing for hdrcharset, PAX, and
  GNU sparse headers.
  email.utils.getaddresses() and email.utils.parseaddr() now return ('', '')
  2-tuples in more situations where invalid email addresses are encountered
  instead of potentially inaccurate values. Add optional strict parameter to
  these two functions: use strict=False to get the old behavior, accept
  malformed inputs. getattr(email.utils, 'supports_strict_parsing', False) can
  be used to check if the strict paramater is available.
  Sanitize names in zipfile.Path to avoid infinite loops (gh-122905) without
  breaking contents using legitimate characters.
  Email headers with embedded newlines are now quoted on output. The generator
  will now refuse to serialize (write) headers that are unsafely folded or
  delimited; see verify_generated_headers.
  For more information, see:
    https://pythoninsider.blogspot.com/2024/09/python-3130rc2-3126-31110-31015-3920.html
    https://www.cve.org/CVERecord?id=CVE-2024-28757
    https://www.cve.org/CVERecord?id=CVE-2024-45490
    https://www.cve.org/CVERecord?id=CVE-2024-45491
    https://www.cve.org/CVERecord?id=CVE-2024-45492
    https://www.cve.org/CVERecord?id=CVE-2024-7592
    https://www.cve.org/CVERecord?id=CVE-2024-4032
    https://www.cve.org/CVERecord?id=CVE-2015-2104
    https://www.cve.org/CVERecord?id=CVE-2024-6232
    https://www.cve.org/CVERecord?id=CVE-2023-27043
    https://www.cve.org/CVERecord?id=CVE-2024-8088
    https://www.cve.org/CVERecord?id=CVE-2024-6923
  (* Security fix *)
k/kernel-source-6.10.9-noarch-1.txz:  Upgraded.
   TEE n -> m
  +AMDTEE m
  +AMD_PMF m
  +AMD_PMF_DEBUG n
  Thanks to nick8325 for the suggestion.
l/qt5-5.15.15_20240903_363456a6-x86_64-1.txz:  Upgraded.
x/noto-emoji-2.042-noarch-1.txz:  Added.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2024-09-09 04:00:54 +02:00
..
a Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
ap Sat Aug 17 18:14:54 UTC 2024 2024-08-17 20:30:46 +02:00
d Sun Aug 4 14:47:52 UTC 2024 2024-08-04 17:37:18 +02:00
e Wed Jul 29 04:46:21 UTC 2020 2020-07-29 17:59:53 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
k Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
kde Fri Jul 12 18:35:06 UTC 2024 2024-07-12 21:00:45 +02:00
l Mon Jun 3 19:49:25 UTC 2024 2024-06-03 22:29:38 +02:00
n Wed Aug 21 18:08:47 UTC 2024 2024-08-21 20:30:25 +02:00
t Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
tcl Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
x Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
xap Fri May 31 18:49:48 UTC 2024 2024-05-31 21:34:09 +02:00
xfce Mon Dec 7 21:49:58 UTC 2020 2020-12-08 08:59:51 +01:00
y Wed Dec 30 21:56:42 UTC 2020 2020-12-31 08:59:47 +01:00