diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-11-29 05:53:27 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-11-29 17:59:45 +0100 |
commit | 7284497dcf1ed750a9703553209d899a8c111149 (patch) | |
tree | d28ab1c79f228cb433fd739f28cd225fdcdae42d /source/x/vulkan-sdk/fetch-sources.sh | |
parent | 388986876373b8d6d9053c36196978464bd3362e (diff) | |
download | current-7284497dcf1ed750a9703553209d899a8c111149.tar.gz |
Thu Nov 29 05:53:27 UTC 201820181129055327
a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt.
rc.S: simplify test for F2FS filesystem on /. Thanks to GazL.
ap/soma-3.2.0-noarch-1.txz: Upgraded.
d/cmake-3.13.1-x86_64-1.txz: Upgraded.
l/jansson-2.12-x86_64-1.txz: Upgraded.
n/rp-pppoe-3.13-x86_64-1.txz: Upgraded.
n/samba-4.9.3-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues:
CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD
Internal DNS server
CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT
CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server
CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers
CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos
configuration (unsupported)
CVE-2018-16857: Bad password count in AD DC not always effective
For more information, see:
https://www.samba.org/samba/security/CVE-2018-14629.html
https://www.samba.org/samba/security/CVE-2018-16841.html
https://www.samba.org/samba/security/CVE-2018-16851.html
https://www.samba.org/samba/security/CVE-2018-16852.html
https://www.samba.org/samba/security/CVE-2018-16853.html
https://www.samba.org/samba/security/CVE-2018-16857.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857
(* Security fix *)
x/mesa-18.2.6-x86_64-1.txz: Upgraded.
x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/x/vulkan-sdk/fetch-sources.sh')
-rwxr-xr-x | source/x/vulkan-sdk/fetch-sources.sh | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/source/x/vulkan-sdk/fetch-sources.sh b/source/x/vulkan-sdk/fetch-sources.sh index 67ec96b9..4a15b10e 100755 --- a/source/x/vulkan-sdk/fetch-sources.sh +++ b/source/x/vulkan-sdk/fetch-sources.sh @@ -25,10 +25,10 @@ # github, and then look at the revisions listed in the external_revisions # directory to fetch the proper glslang, SPIRV-Headers, and SPIRV-Tools. # -# Example: VERSION=1.1.85.0 ./fetch-sources.sh +# Example: VERSION=1.1.92.1 ./fetch-sources.sh -VERSION=${VERSION:-1.1.85.0} -BRANCH=${BRANCH:-sdk-1.1.85} +VERSION=${VERSION:-1.1.92.1} +BRANCH=${BRANCH:-sdk-1.1.92} rm -rf Vulkan-*-*.tar.?z glslang* SPIRV-Tools* SPIRV-Headers* \ Vulkan-Headers-sdk-${VERSION}* \ @@ -52,7 +52,7 @@ GLSLANG_COMMIT=$(python3 - << EOF import json import tarfile with tarfile.open('Vulkan-ValidationLayers-sdk-$VERSION.tar') as layers: - known_good = layers.extractfile('Vulkan-ValidationLayers-sdk-1.1.85.0/scripts/known_good.json') + known_good = layers.extractfile('Vulkan-ValidationLayers-sdk-1.1.92.1/scripts/known_good.json') known_good_info = json.loads(known_good.read()) glslang = next(repo for repo in known_good_info['repos'] if repo['name'] == 'glslang') print(glslang['commit']) |