slackware-current/source/d/guile
Patrick J Volkerding 5fd1151343 Thu Jan 26 00:34:41 UTC 2023
ap/cups-filters-1.28.17-x86_64-1.txz:  Upgraded.
ap/vim-9.0.1241-x86_64-1.txz:  Upgraded.
  Fixed a security issue:
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
  Thanks to marav for the heads-up.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0433
  (* Security fix *)
d/guile-3.0.9-x86_64-1.txz:  Upgraded.
d/poke-3.0-x86_64-1.txz:  Upgraded.
l/nodejs-19.5.0-x86_64-1.txz:  Upgraded.
n/bind-9.18.11-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An UPDATE message flood could cause :iscman:`named` to exhaust all
  available memory. This flaw was addressed by adding a new
  :any:`update-quota` option that controls the maximum number of
  outstanding DNS UPDATE messages that :iscman:`named` can hold in a
  queue at any given time (default: 100).
  :iscman:`named` could crash with an assertion failure when an RRSIG
  query was received and :any:`stale-answer-client-timeout` was set to a
  non-zero value. This has been fixed.
  :iscman:`named` running as a resolver with the
  :any:`stale-answer-client-timeout` option set to any value greater
  than ``0`` could crash with an assertion failure, when the
  :any:`recursive-clients` soft quota was reached. This has been fixed.
  For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
  (* Security fix *)
n/openvpn-2.6.0-x86_64-1.txz:  Upgraded.
xap/vim-gvim-9.0.1241-x86_64-1.txz:  Upgraded.
2023-01-26 02:33:14 +01:00
..
guile.SlackBuild Thu Jan 26 00:34:41 UTC 2023 2023-01-26 02:33:14 +01:00
slack-desc Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00