From: QA Team Robot <qa@altlinux.org> To: sisyphus-cybertalk@lists.altlinux.org Subject: [cyber] I: p10/branch packages: +5! +16 (18734) Date: Sat, 2 Mar 2024 00:18:23 +0000 Message-ID: <ZeJwT6mJPKMSlgig@beehive.mskdc.altlinux.org> (raw) 5 ADDED packages dotnet-aspnetcore-8.0 - ASP.NET is a cross-platform .NET framework for building modern cloud-based web application * Sun Feb 18 2024 Vitaly Lipatov <lav@altlinux> 8.0.2-alt1 - ASP.NET 8.0.2 release * Mon Jan 08 2024 Vitaly Lipatov <lav@altlinux> 8.0.0.rc.2.23502.2-alt1 - ASP.NET 8.0.0 RC2 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 8.0.0.preview.6.23330.14-alt1 dotnet-bootstrap-8.0 - .NET 8 SDK binaries [258M] * Sun Feb 18 2024 Vitaly Lipatov <lav@altlinux> 8.0.2-alt1 - The .NET 8.0.2 and .NET SDK 8.0.2 release - CVE-2023-36038: .NET Denial of Service Vulnerability - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2024-0056: Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data provider Information Disclosure Vulnerability - CVE-2024-0057: .NET Security Feature bypass Vulnerability - CVE-2024-21319: .NET Denial of Service Vulnerability - CVE-2024-21386: .NET Denial of Service Vulnerability - CVE-2024-21404: .NET Denial of Service Vulnerability * Mon Jan 08 2024 Vitaly Lipatov <lav@altlinux> 8.0.0.rc.2.23502.2-alt1 - The .NET 8.0 and .NET SDK 8.0.0 RC2 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 8.0.0.preview.6.23330.14-alt1 dotnet-runtime-8.0 - Microsoft .NET Runtime and Microsoft.NETCore.App [50M] * Sun Feb 18 2024 Vitaly Lipatov <lav@altlinux> 8.0.2-alt1 - .NET 8.0.2 release - CVE-2023-36038: .NET Denial of Service Vulnerability - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2024-0056: Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data provider Information Disclosure Vulnerability - CVE-2024-0057: .NET Security Feature bypass Vulnerability - CVE-2024-21319: .NET Denial of Service Vulnerability - CVE-2024-21386: .NET Denial of Service Vulnerability - CVE-2024-21404: .NET Denial of Service Vulnerability * Mon Jan 08 2024 Vitaly Lipatov <lav@altlinux> 8.0.0.rc.2.23502.2-alt1 - .NET 8.0.0 RC2 - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 8.0.0.preview.6.23330.14-alt1 dotnet-sdk-8.0 - SDK for the .NET 8 * Sun Feb 18 2024 Vitaly Lipatov <lav@altlinux> 8.0.102-alt1 - .NET SDK 8.0.102 release - CVE-2023-36038: .NET Denial of Service Vulnerability - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2024-0056: Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data provider Information Disclosure Vulnerability - CVE-2024-0057: .NET Security Feature bypass Vulnerability - CVE-2024-21319: .NET Denial of Service Vulnerability - CVE-2024-21386: .NET Denial of Service Vulnerability - CVE-2024-21404: .NET Denial of Service Vulnerability * Mon Jan 08 2024 Vitaly Lipatov <lav@altlinux> 8.0.100.rc.2.23502.2-alt1 - .NET SDK 8.0.100 RC2 - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 8.0.100.preview.6.23330.14-alt1 python3-module-osc-placement - OpenStackClient plugin for the Placement service * Fri Feb 09 2024 Ilfat Aminov <aminov@altlinux> 4.1.0-alt1.p10 - Initial packaging 16 UPDATED packages docs-alt-kworkstation - ALT KWorkstation documentation [33M] * Mon Feb 19 2024 Elena Mishina <lepata@altlinux> 10.3-alt1 - update to ALT Kworkstation 10.3 * Wed Sep 27 2023 Elena Mishina <lepata@altlinux> 10.2-alt10 dotnet-aspnetcore-6.0 - ASP.NET is a cross-platform .NET framework for building modern cloud-based web application * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 6.0.25-alt1 - ASP.NET 6.0.25 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 6.0.20-alt1 dotnet-aspnetcore-7.0 - ASP.NET is a cross-platform .NET framework for building modern cloud-based web application * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 7.0.14-alt1 - ASP.NET 7.0.14 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 7.0.9-alt1 dotnet-bootstrap-6.0 - .NET Core SDK binaries [210M] * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 6.0.25-alt1 - The .NET 6.0.25 and .NET SDK 6.0.125 releases - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-35390: .NET Remote Code Execution Vulnerability - CVE-2023-38180: .NET Denial of Service Vulnerability - CVE-2023-35391: .NET Information Disclosure Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 6.0.20-alt1 dotnet-bootstrap-7.0 - .NET Core SDK binaries [236M] * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 7.0.14-alt1 - The .NET 7.0.14 and .NET SDK 7.0.114 releases - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-38178: .NET Denial of Service Vulnerability - CVE-2023-35390: .NET Remote Code Execution Vulnerability - CVE-2023-38180: .NET Denial of Service Vulnerability - CVE-2023-35391: .NET Information Disclosure Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 7.0.9-alt1 dotnet-runtime-6.0 - Microsoft .NET Runtime and Microsoft.NETCore.App [45M] * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 6.0.25-alt1 - .NET 6.0.25 - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-35390: .NET Remote Code Execution Vulnerability - CVE-2023-38180: .NET Denial of Service Vulnerability - CVE-2023-35391: .NET Information Disclosure Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 6.0.20-alt1 dotnet-runtime-7.0 - Microsoft .NET Runtime and Microsoft.NETCore.App [47M] * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 7.0.14-alt1 - .NET 7.0.14 - CVE-2023-36049: .NET Elevation of Privilege Vulnerability - CVE-2023-36558: .NET Security Feature Bypass Vulnerability - CVE-2023-36792: .NET Remote Code Execution Vulnerability - CVE-2023-36793: .NET Remote Code Execution Vulnerability - CVE-2023-36794: .NET Remote Code Execution Vulnerability - CVE-2023-36796: .NET Remote Code Execution Vulnerability - CVE-2023-36799: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-44487: .NET Denial of Service Vulnerability - CVE-2023-38171: .NET Denial of Service Vulnerability - CVE-2023-36435: .NET Denial of Service Vulnerability - CVE-2023-38178: .NET Denial of Service Vulnerability - CVE-2023-35390: .NET Remote Code Execution Vulnerability - CVE-2023-38180: .NET Denial of Service Vulnerability - CVE-2023-35391: .NET Information Disclosure Vulnerability * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 7.0.9-alt1 dotnet-sdk-6.0 - SDK for the .NET 6 * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 6.0.125-alt1 - .NET SDK 6.0.125 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 6.0.120-alt2 dotnet-sdk-7.0 - SDK for the .NET 7 * Tue Jan 09 2024 Vitaly Lipatov <lav@altlinux> 7.0.114-alt1 - .NET SDK 7.0.114 * Fri Jul 28 2023 Vitaly Lipatov <lav@altlinux> 7.0.109-alt1 kde5-colord - Colord support for KDE * Fri Feb 16 2024 Sergey V Turchin <zerg@altlinux> 23.08.4-alt4 - fix icc profile delete (thanks krf10@alt) * Wed Jan 17 2024 Sergey V Turchin <zerg@altlinux> 23.08.4-alt3 - fix russian translation * Tue Jan 16 2024 Sergey V Turchin <zerg@altlinux> 23.08.4-alt2 - require icc-profiles * Tue Dec 12 2023 Sergey V Turchin <zerg@altlinux> 23.08.4-alt1 - new version * Fri Nov 10 2023 Sergey V Turchin <zerg@altlinux> 23.08.3-alt1 - new version * Mon Oct 16 2023 Sergey V Turchin <zerg@altlinux> 23.08.2-alt1 - new version * Fri Jul 14 2023 Sergey V Turchin <zerg@altlinux> 23.04.3-alt1 - new version * Thu Jun 29 2023 Sergey V Turchin <zerg@altlinux> 23.04.2-alt1 - new version * Mon Sep 12 2022 Sergey V Turchin <zerg@altlinux> 0.5.0-alt1 openrgb - Open source RGB lighting control that doesn't depend on manufacturer software [24M] * Thu Feb 15 2024 Nazarov Denis <nenderus@altlinux> 0.9-alt1.p10.1 - Build for branch p10 * Mon Feb 12 2024 Vitaly Lipatov <lav@altlinux> 0.9-alt2 - fix path to udev rules (thanks, nenderus@!) * Sat Feb 03 2024 Nazarov Denis <nenderus@altlinux> 0.9-alt0.p10.1 openstack-placement - OpenStack resource provider inventory allocation service * Tue Feb 13 2024 Ilfat Aminov <aminov@altlinux> 9.0.0-alt2.p10 - build with tests * Fri Dec 29 2023 Ilfat Aminov <aminov@altlinux> 9.0.0-alt1.p10 portproton - Installer for PortProton * Tue Feb 13 2024 Mikhail Tergoev <fidel@altlinux> 1.5-alt1 - updated to v1.5 - drop requires: libMesaOpenCL * Fri Feb 09 2024 Mikhail Tergoev <fidel@altlinux> 1.4-alt1 - updated to v1.4 - update requires - drop meta package 32-bit dependencies (it does not work as intended) * Sun Dec 24 2023 Mikhail Tergoev <fidel@altlinux> 1.3-alt2 - added meta package for installation 32-bit dependencies - update requires * Fri Nov 24 2023 Mikhail Tergoev <fidel@altlinux> 1.3-alt1 python3-module-gabbi - Declarative HTTP testing library * Mon Feb 12 2024 Ilfat Aminov <aminov@altlinux> 2.7.2-alt1 - 2.7.2 * Fri Apr 10 2020 Andrey Bychkov <mrdrew@altlinux> 1.34.0-alt2 python3-module-hacking - OpenStack Hacking Guideline Enforcement * Tue Feb 13 2024 Ilfat Aminov <aminov@altlinux> 4.0.0-alt1.p10 - build 4.0.0 for p10 * Thu Jun 24 2021 Sergey Bolshakov <sbolshakov@altlinux> 3.2.0-alt2 python3-module-wsgi_intercept - wsgi_intercept installs a WSGI application in place of a real URI for testing * Mon Feb 12 2024 Ilfat Aminov <aminov@altlinux> 1.13.0-alt1 - 1.13.0 * Mon May 31 2021 Grigory Ustinov <grenka@altlinux> 1.5.0-alt2 Total 18734 source packages.
reply other threads:[~2024-03-02 0:18 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=ZeJwT6mJPKMSlgig@beehive.mskdc.altlinux.org \ --to=qa@altlinux.org \ --cc=devel@lists.altlinux.org \ --cc=sisyphus-cybertalk@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Sisyphus cybertalk This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-cybertalk/0 sisyphus-cybertalk/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-cybertalk sisyphus-cybertalk/ http://lore.altlinux.org/sisyphus-cybertalk \ sisyphus-cybertalk@lists.altlinux.org sisyphus-cybertalk@lists.altlinux.ru sisyphus-cybertalk@lists.altlinux.com public-inbox-index sisyphus-cybertalk Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-cybertalk AGPL code for this site: git clone https://public-inbox.org/public-inbox.git