update 9.62 (2021-05-10) to 9.63 (2022-01-10)
updates since 9.62:
- new --sanitize-overwrite-passes flag, courtesy Michal Grzedzicki.
- applied "Plurals patch" from Martin Guy.
update 4.0.36 (2021-11-21) to 4.0.37 (2022-01-08)
Improvements since the 4.0.36 release are:
- Removed mclasserase commands, which doesn't fit the coding
structure of the rest of mtools
- Add support to -i option to mcd
- Document -i flag in mtools.1
- Fix a missing command error in floppyd_io.c
announcement:
- https://lists.gnu.org/archive/html/info-mtools/2022-01/msg00000.html
update 11.1 (2021-09-13) to 11.2 (2022-01-16)
Release Notes:
- https://www.sourceware.org/gdb/download/ANNOUNCEMENT
- https://www.sourceware.org/gdb/
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=gdb-11.2-release
January 16th, 2022: GDB 11.2 Released!
The latest version of GDB, version 11.2, is available for download.
This is a minor corrective release over GDB 11.1, fixing the following issues:
- PR sim/28302 (gdb fails to build with glibc 2.34)
- PR build/28318 (std::thread support configure check does not use CXX_DIALECT)
- PR gdb/28405 (arm-none-eabi: internal-error: ptid_t remote_target::select_thread_for_ambiguous_stop_reply(const target_waitstatus*): Assertion `first_resumed_thread != nullptr' failed)
- PR tui/28483 ([gdb/tui] breakpoint creation not displayed)
- PR build/28555 (uclibc compile failure since commit 4655f8509fd44e6efabefa373650d9982ff37fd6)
- PR rust/28637 (Rust characters will be encoded using DW_ATE_UTF)
- PR gdb/28758 (GDB 11 doesn't work correctly on binaries with a SHT_RELR (.relr.dyn) section)
- PR gdb/28785 (Support SHT_RELR (.relr.dyn) section)
update 2.37.2 (2021-08-16) to 2.37.3 (2022-01-24)
Changelog:
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ChangeLog
util-linux 2.37.3 Release Notes
===============================
This release fixes two security mount(8) and umount(8) issues:
CVE-2021-3996
Improper UID check in libmount allows an unprivileged user to unmount FUSE
filesystems of users with similar UID.
CVE-2021-3995
This issue is related to parsing the /proc/self/mountinfo file allows an
unprivileged user to unmount other user's filesystems that are either
world-writable themselves or mounted in a world-writable directory.