From: QA Team Robot <qa@altlinux.org>
To: sisyphus-cybertalk@lists.altlinux.org
Subject: [cyber] I: p10/branch packages: +4 (19076)
Date: Tue, 11 Nov 2025 00:22:56 +0000
Message-ID: <aRKB4BS/dolbi8mX@beehive.mskdc.altlinux.org> (raw)
4 UPDATED packages
freecol - FreeCol is opensource Colonization clone. [534M]
* Fri Oct 24 2025 Aleksandr Shamaraev <shad@altlinux> 1.2.0-alt2
- fix version number
* Tue Jul 08 2025 Aleksandr Shamaraev <shad@altlinux> 1.2.0-alt1
- 1.1.0 -> 1.2.0
* Thu Jun 26 2025 Aleksandr Shamaraev <shad@altlinux> 1.1.0-alt2
- fixed launch via application shortcut in Plasma
- fixed the display of the icon application shortcut in the Gnome
* Wed Jun 25 2025 Aleksandr Shamaraev <shad@altlinux> 1.1.0-alt1
- 0.11.6 -> 1.1.0
* Mon Oct 19 2020 Aleksei Nikiforov <darktemplar@altlinux> 0.11.6-alt2
java-1.8.0-openjdk - OpenJDK Runtime Environment 8 [58M]
* Fri Oct 31 2025 Andrey Cherepanov <cas@altlinux> 0:1.8.0.472.b08-alt1
- New version (fixes: CVE-2025-53057, CVE-2025-53066).
* Fri Jul 18 2025 Andrey Cherepanov <cas@altlinux> 0:1.8.0.462.b08-alt1
tomcat - Apache Servlet/JSP Engine, RI for Servlet 4.0/JSP 2.3 API [15M]
* Fri Nov 07 2025 Sergey Gvozdetskiy <serjigva@altlinux> 1:9.0.98-alt0_1jpp17.p10.6
- security fixes:
+ CVE-2025-48976: Denial of Service
+ CVE-2025-49125: Security constraint bypass
+ CVE-2025-53506: Denial of Service
+ CVE-2025-52520: Denial of Service
+ CVE-2025-52434: Denial of Service
+ CVE-2025-55752: Remote code execution
+ CVE-2025-55754: Console manipulation via escape sequences
* Fri Sep 26 2025 Sergey Gvozdetskiy <serjigva@altlinux> 1:9.0.98-alt0_1jpp17.p10.5
tomcat10 - Apache Servlet/JSP Engine, RI for Servlet 6.0/JSP 3.1 API [22M]
* Thu Nov 06 2025 Sergey Gvozdetskiy <serjigva@altlinux> 1:10.1.20-alt2_jvm17.p10.1
- security fixes:
+ CVE-2024-34750: Denial of service
+ CVE-2024-52316: Authentication Bypass
+ CVE-2024-50379: Remote Code Execution
+ CVE-2024-54677: Denial of service
+ CVE-2025-24813: Remote Code Execution
+ CVE-2025-31650: Denial of service
+ CVE-2025-31651: Rewrite rule bypass
+ CVE-2025-46701: Security Constraint Bypass
+ CVE-2025-48976: Denial of service
+ CVE-2025-48988: Denial of service
- cherry-picked ref a7e91ee2 unresolved deps when 9.0 subpks installed (Closes: #53333)
* Tue Aug 19 2025 Sergey Gvozdetskiy <serjigva@altlinux> 1:10.1.20-alt2_jvm17.p10
Total 19076 source packages.
reply other threads:[~2025-11-11 0:22 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aRKB4BS/dolbi8mX@beehive.mskdc.altlinux.org \
--to=qa@altlinux.org \
--cc=devel@lists.altlinux.org \
--cc=sisyphus-cybertalk@lists.altlinux.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
ALT Linux Sisyphus cybertalk
This inbox may be cloned and mirrored by anyone:
git clone --mirror http://lore.altlinux.org/sisyphus-cybertalk/0 sisyphus-cybertalk/git/0.git
# If you have public-inbox 1.1+ installed, you may
# initialize and index your mirror using the following commands:
public-inbox-init -V2 sisyphus-cybertalk sisyphus-cybertalk/ http://lore.altlinux.org/sisyphus-cybertalk \
sisyphus-cybertalk@lists.altlinux.org sisyphus-cybertalk@lists.altlinux.ru sisyphus-cybertalk@lists.altlinux.com
public-inbox-index sisyphus-cybertalk
Example config snippet for mirrors.
Newsgroup available over NNTP:
nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-cybertalk
AGPL code for this site: git clone https://public-inbox.org/public-inbox.git