diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-05-04 19:02:58 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-05-05 13:39:54 +0200 |
commit | 023fbe6eef1cdbb0b2c5a219c4353e7c263fc777 (patch) | |
tree | fc51e371d88babaa20fd5dd424db4e30a52254b0 /ChangeLog.rss | |
parent | 9fce1d79778463ff186961b6c9c3cd9b6c8489fd (diff) | |
download | current-023fbe6eef1cdbb0b2c5a219c4353e7c263fc777.tar.gz current-023fbe6eef1cdbb0b2c5a219c4353e7c263fc777.tar.xz |
Thu May 4 19:02:58 UTC 202320230504190258_15.0
patches/packages/libssh-0.10.5-x86_64-1_slack15.0.txz: Upgraded.
This update fixes security issues:
A NULL dereference during rekeying with algorithm guessing.
A possible authorization bypass in pki_verify_data_signature under
low-memory conditions.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-1667
https://www.cve.org/CVERecord?id=CVE-2023-2283
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 23 |
1 files changed, 21 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index b314671ff..678ea7dfa 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,29 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 3 May 2023 19:33:18 GMT</pubDate> - <lastBuildDate>Thu, 4 May 2023 11:30:23 GMT</lastBuildDate> + <pubDate>Thu, 4 May 2023 19:02:58 GMT</pubDate> + <lastBuildDate>Fri, 5 May 2023 11:39:22 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Thu, 4 May 2023 19:02:58 GMT</title> + <pubDate>Thu, 4 May 2023 19:02:58 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20230504190258</link> + <guid isPermaLink="false">20230504190258</guid> + <description> + <![CDATA[<pre> +patches/packages/libssh-0.10.5-x86_64-1_slack15.0.txz: Upgraded. + This update fixes security issues: + A NULL dereference during rekeying with algorithm guessing. + A possible authorization bypass in pki_verify_data_signature under + low-memory conditions. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-1667 + https://www.cve.org/CVERecord?id=CVE-2023-2283 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 3 May 2023 19:33:18 GMT</title> <pubDate>Wed, 3 May 2023 19:33:18 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20230503193318</link> |