summaryrefslogtreecommitdiffstats
path: root/source/l/liburing (follow)
Commit message (Expand)AuthorAgeFilesLines
* Tue Jun 28 19:16:08 UTC 2022...ap/mpg123-1.30.0-x86_64-1.txz: Upgraded. d/git-2.37.0-x86_64-1.txz: Upgraded. d/llvm-14.0.6-x86_64-1.txz: Upgraded. Shared library .so-version bump. d/rust-1.61.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. kde/bluedevil-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.2-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.2-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.2-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.2-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.2-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.2-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.2-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.2-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.2-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.2-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.2-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.2-x86_64-1.txz: Upgraded. kde/kscreen-5.25.2-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.2-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.2-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.2-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.2-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.2-x86_64-1.txz: Upgraded. kde/kwin-5.25.2-x86_64-1.txz: Upgraded. kde/kwrited-5.25.2-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.2-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.2-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.2-x86_64-1.txz: Upgraded. kde/milou-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-5.25.2-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.2-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.2-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.2-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.2-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.2-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.2-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.2-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.2-x86_64-1.txz: Upgraded. l/harfbuzz-4.4.0-x86_64-1.txz: Upgraded. l/libidn-1.41-x86_64-1.txz: Upgraded. l/liburing-2.2-x86_64-1.txz: Upgraded. l/libzip-1.9.1-x86_64-1.txz: Upgraded. l/openal-soft-1.22.2-x86_64-1.txz: Upgraded. l/spirv-llvm-translator-14.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Compiled against llvm-14.0.6. n/ModemManager-1.18.10-x86_64-1.txz: Upgraded. n/curl-7.84.0-x86_64-1.txz: Upgraded. This update fixes security issues: Set-Cookie denial of service. HTTP compression denial of service. Unpreserved file permissions. FTP-KRB bad message verification. For more information, see: https://curl.se/docs/CVE-2022-32205.html https://curl.se/docs/CVE-2022-32206.html https://curl.se/docs/CVE-2022-32207.html https://curl.se/docs/CVE-2022-32208.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208 (* Security fix *) t/texlive-2022.220522-x86_64-1.txz: Upgraded. Thanks to Johannes Schoepfer. x/mesa-21.3.8-x86_64-2.txz: Rebuilt. Recompiled against llvm-14.0.6. xap/mozilla-firefox-102.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/102.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2022-24/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34478 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34480 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34475 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34485 (* Security fix *) 20220628191608 Patrick J Volkerding2022-06-291-1/+1
* Sat Oct 16 18:12:37 UTC 2021...ap/pamixer-1.5-x86_64-1.txz: Upgraded. l/librsvg-2.52.2-x86_64-1.txz: Upgraded. l/liburing-2.1-x86_64-2.txz: Rebuilt. Don't package the examples. l/spirv-llvm-translator-13.0.0-x86_64-1.txz: Upgraded. 20211016181237 Patrick J Volkerding2021-10-171-2/+1
* Sat Aug 7 19:04:04 UTC 2021...a/aaa_glibc-solibs-2.33-x86_64-3.txz: Rebuilt. a/usbutils-014-x86_64-1.txz: Upgraded. ap/mariadb-10.6.4-x86_64-1.txz: Upgraded. ap/nvme-cli-1.15-x86_64-1.txz: Upgraded. l/glibc-2.33-x86_64-3.txz: Rebuilt. Since glibc-2.34 makes a potentially risky change of moving all functions into the main library, and another inconvenient (for us) change of renaming the library files, we'll stick with glibc-2.33 for Slackware 15.0 and test the newer glibc in the next release cycle. But we'll backport the security fixes from glibc-2.34 with this update: The nameserver caching daemon (nscd), when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. Reported by Chris Schanzle. The mq_notify function has a potential use-after-free issue when using a notification type of SIGEV_THREAD and a thread attribute with a non-default affinity mask. The wordexp function may overflow the positional parameter number when processing the expansion resulting in a crash. Reported by Philippe Antoine. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 (* Security fix *) l/glibc-i18n-2.33-x86_64-3.txz: Rebuilt. l/glibc-profile-2.33-x86_64-3.txz: Rebuilt. l/liburing-2.0-x86_64-1.txz: Added. This is needed by mariadb, and provides increased performance on high speed devices such as NVMe. n/dovecot-2.3.16-x86_64-1.txz: Upgraded. xap/blueman-2.2.2-x86_64-1.txz: Upgraded. 20210807190404 Patrick J Volkerding2021-08-083-0/+155