ALT Linux Sisyphus cybertalk
 help / color / mirror / Atom feed
* [cyber] I: p10/branch packages: +2! +3 (18930)
@ 2024-09-21  0:17 QA Team Robot
  0 siblings, 0 replies; only message in thread
From: QA Team Robot @ 2024-09-21  0:17 UTC (permalink / raw)
  To: sisyphus-cybertalk

	2 ADDED packages

zabbix-agent2-plugin-mongodb - Provides native Zabbix solution for monitoring MongoDB
* Fri Aug 30 2024 Alexei Takaseev <taf@altlinux> 6.0.33-alt1
- 6.0.33
* Thu Aug 22 2024 Alexei Takaseev <taf@altlinux> 6.0.32-alt1
- Initial build for p10

zabbix-agent2-plugin-mssql - Provides native Zabbix solution for monitoring MS-SQL
* Fri Aug 30 2024 Alexei Takaseev <taf@altlinux> 6.0.33-alt1
- 6.0.33
* Fri Aug 23 2024 Alexei Takaseev <taf@altlinux> 6.0.32-alt1
- Initial build for p10

	3 UPDATED packages

firmware-intel-ucode - Microcode definitions for Intel processors
* Tue Aug 27 2024 L.A. Kostis <lakostis@altlinux> 2:27-alt1.20240813
- Synced with debian/3.20240813.2 (original changelog below):
    + New upstream microcode datafile 20240813:
      - Mitigations for INTEL-SA-01083 (CVE-2024-24853)
        Incorrect behavior order in transition between executive monitor and SMI
        transfer monitor (STM) in some Intel Processors may allow a privileged
        user to potentially enable escalation of privilege via local access.
      - Mitigations for INTEL-SA-01118 (CVE-2024-25939)
        Mirrored regions with different values in 3rd Generation Intel Xeon
        Scalable Processors may allow a privileged user to potentially enable
        denial of service via local access.
      - Mitigations for INTEL-SA-01100 (CVE-2024-24980)
        Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel
        Xeon Processors may allow a privileged user to potentially enable
        escalation of privilege via local access.
      - Mitigations for INTEL-SA-01038 (CVE-2023-42667)
        Improper isolation in the Intel Core Ultra Processor stream cache
        mechanism may allow an authenticated user to potentially enable
        escalation of privilege via local access.
      - Mitigations for INTEL-SA-01046 (CVE-2023-49141)
        Improper isolation in some Intel(R) Processors stream cache mechanism may
        allow an authenticated user to potentially enable escalation of
        privilege via local access.
      - Fix for unspecified functional issues on several processor models
    + Updated microcodes:
      sig 0x00050657, pf_mask 0xbf, 2024-03-01, rev 0x5003707, size 39936
      sig 0x0005065b, pf_mask 0xbf, 2024-04-01, rev 0x7002904, size 30720
      sig 0x000606a6, pf_mask 0x87, 2024-04-01, rev 0xd0003e7, size 308224
      sig 0x000606c1, pf_mask 0x10, 2024-04-03, rev 0x10002b0, size 300032
      sig 0x000706e5, pf_mask 0x80, 2024-02-15, rev 0x00c6, size 114688
      sig 0x000806c1, pf_mask 0x80, 2024-02-15, rev 0x00b8, size 112640
      sig 0x000806c2, pf_mask 0xc2, 2024-02-15, rev 0x0038, size 99328
      sig 0x000806d1, pf_mask 0xc2, 2024-02-15, rev 0x0052, size 104448
      sig 0x000806e9, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 106496
      sig 0x000806e9, pf_mask 0x10, 2024-02-01, rev 0x00f6, size 106496
      sig 0x000806ea, pf_mask 0xc0, 2024-02-01, rev 0x00f6, size 105472
      sig 0x000806eb, pf_mask 0xd0, 2024-02-01, rev 0x00f6, size 106496
      sig 0x000806ec, pf_mask 0x94, 2024-02-05, rev 0x00fc, size 106496
      sig 0x00090661, pf_mask 0x01, 2024-04-05, rev 0x001a, size 20480
      sig 0x000906ea, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 105472
      sig 0x000906eb, pf_mask 0x02, 2024-02-01, rev 0x00f6, size 106496
      sig 0x000906ec, pf_mask 0x22, 2024-02-01, rev 0x00f8, size 106496
      sig 0x000906ed, pf_mask 0x22, 2024-02-05, rev 0x0100, size 106496
      sig 0x000a0652, pf_mask 0x20, 2024-02-01, rev 0x00fc, size 97280
      sig 0x000a0653, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 98304
      sig 0x000a0655, pf_mask 0x22, 2024-02-01, rev 0x00fc, size 97280
      sig 0x000a0660, pf_mask 0x80, 2024-02-01, rev 0x00fe, size 97280
      sig 0x000a0661, pf_mask 0x80, 2024-02-01, rev 0x00fc, size 97280
      sig 0x000a0671, pf_mask 0x02, 2024-03-07, rev 0x0062, size 108544
      sig 0x000a06a4, pf_mask 0xe6, 2024-04-15, rev 0x001e, size 137216
* Sat Jun 01 2024 L.A. Kostis <lakostis@altlinux> 2:26-alt1.20240531

systemd-settings - Settings for systemd
* Mon Sep 09 2024 Vasiliy Kovalev <kovalev@altlinux> 7-alt1
- Added ignore-handle-lid-switch package
* Fri Nov 26 2021 Alexey Shabalin <shaba@altlinux> 6-alt1
- Drop disable-dumpcore package.
* Fri Jul 09 2021 Alexey Shabalin <shaba@altlinux> 5-alt1

zabbix-agent2-plugin-postgresql - Provides native Zabbix solution for monitoring PostgreSQL
* Fri Aug 30 2024 Alexei Takaseev <taf@altlinux> 6.0.33-alt1
- 6.0.33
* Thu Aug 22 2024 Alexei Takaseev <taf@altlinux> 6.0.32-alt1
- 6.0.32
- Update zabbix-agent2-plugin-postgresql-6.0.32-alt-config.patch
* Thu Jul 11 2024 Sergey Gvozdetskiy <serjigva@altlinux> 6.0.13-alt1

Total 18930 source packages.


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2024-09-21  0:17 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-09-21  0:17 [cyber] I: p10/branch packages: +2! +3 (18930) QA Team Robot

ALT Linux Sisyphus cybertalk

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sisyphus-cybertalk/0 sisyphus-cybertalk/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sisyphus-cybertalk sisyphus-cybertalk/ http://lore.altlinux.org/sisyphus-cybertalk \
		sisyphus-cybertalk@lists.altlinux.org sisyphus-cybertalk@lists.altlinux.ru sisyphus-cybertalk@lists.altlinux.com
	public-inbox-index sisyphus-cybertalk

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-cybertalk


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git