slackware-current/source/l/opencv
Patrick J Volkerding f2dca0d8e5 Wed Jun 8 19:15:34 UTC 2022
ap/sudo-1.9.11p1-x86_64-1.txz:  Upgraded.
kde/digikam-7.6.0-x86_64-2.txz:  Rebuilt.
  Recompiled against opencv-4.6.0.
l/gst-plugins-bad-free-1.20.2-x86_64-2.txz:  Rebuilt.
  Recompiled against opencv-4.6.0.
l/opencv-4.6.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/NetworkManager-1.36.6-x86_64-1.txz:  Upgraded.
n/epic5-2.1.11-x86_64-1.txz:  Upgraded.
n/httpd-2.4.54-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism.
  Information Disclosure in mod_lua with websockets.
  mod_sed denial of service.
  Denial of service in mod_lua r:parsebody.
  Read beyond bounds in ap_strcmp_match().
  Read beyond bounds via ap_rwrite().
  Read beyond bounds in mod_isapi.
  mod_proxy_ajp: Possible request smuggling.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.54
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
  (* Security fix *)
n/libnftnl-1.2.2-x86_64-1.txz:  Upgraded.
n/nftables-1.0.4-x86_64-1.txz:  Upgraded.
2022-06-09 07:00:13 +02:00
..
opencv.SlackBuild Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
opencv.url Mon Dec 7 21:49:58 UTC 2020 2020-12-08 08:59:51 +01:00
slack-desc Mon Dec 7 21:49:58 UTC 2020 2020-12-08 08:59:51 +01:00