summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-10-31 23:31:36 +0000
committer Eric Hameleers <alien@slackware.com>2022-11-01 13:30:36 +0100
commitbcdf30a8fe54332bcfd46afc2e244869c906b6c1 (patch)
tree935d6918e7f8015d818c2fc9460caeb80d92967e /ChangeLog.rss
parentaf0a59722c8d294fe39530d88693289bef9fc0f2 (diff)
downloadcurrent-bcdf30a8fe54332bcfd46afc2e244869c906b6c1.tar.gz
current-bcdf30a8fe54332bcfd46afc2e244869c906b6c1.tar.xz
Mon Oct 31 23:31:36 UTC 202220221031233136_15.0
extra/php80/php80-8.0.25-x86_64-1_slack15.0.txz: Upgraded. This update fixes security issues: GD: OOB read due to insufficient input validation in imageloadfont(). Hash: buffer overflow in hash_update() on long parameter. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-31630 https://www.cve.org/CVERecord?id=CVE-2022-37454 (* Security fix *) extra/php81/php81-8.1.12-x86_64-1_slack15.0.txz: Upgraded. This update fixes security issues: GD: OOB read due to insufficient input validation in imageloadfont(). Hash: buffer overflow in hash_update() on long parameter. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-31630 https://www.cve.org/CVERecord?id=CVE-2022-37454 (* Security fix *) patches/packages/mozilla-thunderbird-102.4.1-x86_64-1_slack15.0.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/102.4.1/releasenotes/ patches/packages/vim-9.0.0814-x86_64-1_slack15.0.txz: Upgraded. A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. Thanks to marav for the heads-up. For more information, see: https://www.cve.org/CVERecord?id=CVE-2022-3705 (* Security fix *) patches/packages/vim-gvim-9.0.0814-x86_64-1_slack15.0.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss45
1 files changed, 43 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index fbedd0ff3..4955be188 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,51 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Thu, 27 Oct 2022 02:30:15 GMT</pubDate>
- <lastBuildDate>Fri, 28 Oct 2022 11:29:56 GMT</lastBuildDate>
+ <pubDate>Mon, 31 Oct 2022 23:31:36 GMT</pubDate>
+ <lastBuildDate>Tue, 1 Nov 2022 12:30:23 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Mon, 31 Oct 2022 23:31:36 GMT</title>
+ <pubDate>Mon, 31 Oct 2022 23:31:36 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20221031233136</link>
+ <guid isPermaLink="false">20221031233136</guid>
+ <description>
+ <![CDATA[<pre>
+extra/php80/php80-8.0.25-x86_64-1_slack15.0.txz: Upgraded.
+ This update fixes security issues:
+ GD: OOB read due to insufficient input validation in imageloadfont().
+ Hash: buffer overflow in hash_update() on long parameter.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2022-31630
+ https://www.cve.org/CVERecord?id=CVE-2022-37454
+ (* Security fix *)
+extra/php81/php81-8.1.12-x86_64-1_slack15.0.txz: Upgraded.
+ This update fixes security issues:
+ GD: OOB read due to insufficient input validation in imageloadfont().
+ Hash: buffer overflow in hash_update() on long parameter.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2022-31630
+ https://www.cve.org/CVERecord?id=CVE-2022-37454
+ (* Security fix *)
+patches/packages/mozilla-thunderbird-102.4.1-x86_64-1_slack15.0.txz: Upgraded.
+ This is a bugfix release.
+ For more information, see:
+ https://www.mozilla.org/en-US/thunderbird/102.4.1/releasenotes/
+patches/packages/vim-9.0.0814-x86_64-1_slack15.0.txz: Upgraded.
+ A vulnerability was found in vim and classified as problematic. Affected by
+ this issue is the function qf_update_buffer of the file quickfix.c of the
+ component autocmd Handler. The manipulation leads to use after free. The
+ attack may be launched remotely. Upgrading to version 9.0.0805 is able to
+ address this issue.
+ Thanks to marav for the heads-up.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2022-3705
+ (* Security fix *)
+patches/packages/vim-gvim-9.0.0814-x86_64-1_slack15.0.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Thu, 27 Oct 2022 02:30:15 GMT</title>
<pubDate>Thu, 27 Oct 2022 02:30:15 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20221027023015</link>