summaryrefslogtreecommitdiffstats
path: root/source/l/python-requests/python-requests.SlackBuild
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2019-04-26 18:55:10 +0000
committer Eric Hameleers <alien@slackware.com>2019-04-27 08:59:45 +0200
commitbfbeefa9c9825dde624e544beb29c62b4e467602 (patch)
tree42713cc236cc2e30722396feaa11aecdb7b8818f /source/l/python-requests/python-requests.SlackBuild
parent9bf8733ad9a320562d951cb923f7136652154f70 (diff)
downloadcurrent-bfbeefa9c9825dde624e544beb29c62b4e467602.tar.gz
current-bfbeefa9c9825dde624e544beb29c62b4e467602.tar.xz
Fri Apr 26 18:55:10 UTC 201920190426185510
ap/tmux-2.9-x86_64-1.txz: Upgraded. d/python-pip-19.1-x86_64-1.txz: Upgraded. d/rust-1.34.1-x86_64-1.txz: Upgraded. d/subversion-1.12.0-x86_64-1.txz: Upgraded. n/bind-9.14.1-x86_64-1.txz: Upgraded. This update fixes security issues: The TCP client quota set using the tcp-clients option could be exceeded in some cases. This could lead to exhaustion of file descriptors. In certain configurations, named could crash with an assertion failure if nxdomain-redirect was in use and a redirected query resulted in an NXDOMAIN from the cache. For more information, see: https://kb.isc.org/docs/cve-2018-5743 https://kb.isc.org/docs/cve-2019-6467 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6467 (* Security fix *) n/dhcpcd-7.2.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/l/python-requests/python-requests.SlackBuild')
0 files changed, 0 insertions, 0 deletions