diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-12-19 21:24:05 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-12-19 23:05:28 +0100 |
commit | 90c1d5c2c0b15a877ad7b260895a7815bdd4d03c (patch) | |
tree | e83aca23a86ea9853c0f3621b7a8a363071ea235 /ChangeLog.rss | |
parent | 1e5164fb6d699f5f0feea33ff1ad0d0468ec6f62 (diff) | |
download | current-90c1d5c2c0b15a877ad7b260895a7815bdd4d03c.tar.gz current-90c1d5c2c0b15a877ad7b260895a7815bdd4d03c.tar.xz |
Tue Dec 19 21:24:05 UTC 202320231219212405
a/sysvinit-scripts-15.1-noarch-9.txz: Rebuilt.
rc.cpufreq: also default to "performance" for amd-pstate-epp.
Thanks to pghvlaans.
l/LibRaw-0.21.2-x86_64-1.txz: Upgraded.
l/gtk+3-3.24.39-x86_64-1.txz: Upgraded.
l/libssh-0.10.6-x86_64-1.txz: Upgraded.
This update fixes security issues:
Command injection using proxycommand.
Potential downgrade attack using strict kex.
Missing checks for return values of MD functions.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-6004
https://www.cve.org/CVERecord?id=CVE-2023-48795
https://www.cve.org/CVERecord?id=CVE-2023-6918
(* Security fix *)
l/mozilla-nss-3.96.1-x86_64-1.txz: Upgraded.
n/bluez-5.71-x86_64-2.txz: Rebuilt.
Fix a regression in bluez-5.71:
[PATCH] adapter: Fix link key address type for old kernels.
Thanks to marav.
xap/mozilla-firefox-115.6.0esr-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-54/
https://www.cve.org/CVERecord?id=CVE-2023-6856
https://www.cve.org/CVERecord?id=CVE-2023-6865
https://www.cve.org/CVERecord?id=CVE-2023-6857
https://www.cve.org/CVERecord?id=CVE-2023-6858
https://www.cve.org/CVERecord?id=CVE-2023-6859
https://www.cve.org/CVERecord?id=CVE-2023-6860
https://www.cve.org/CVERecord?id=CVE-2023-6867
https://www.cve.org/CVERecord?id=CVE-2023-6861
https://www.cve.org/CVERecord?id=CVE-2023-6862
https://www.cve.org/CVERecord?id=CVE-2023-6863
https://www.cve.org/CVERecord?id=CVE-2023-6864
(* Security fix *)
xap/mozilla-thunderbird-115.6.0-x86_64-1.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.thunderbird.net/en-US/thunderbird/115.6.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-55/
https://www.cve.org/CVERecord?id=CVE-2023-50762
https://www.cve.org/CVERecord?id=CVE-2023-50761
https://www.cve.org/CVERecord?id=CVE-2023-6856
https://www.cve.org/CVERecord?id=CVE-2023-6857
https://www.cve.org/CVERecord?id=CVE-2023-6858
https://www.cve.org/CVERecord?id=CVE-2023-6859
https://www.cve.org/CVERecord?id=CVE-2023-6860
https://www.cve.org/CVERecord?id=CVE-2023-6861
https://www.cve.org/CVERecord?id=CVE-2023-6862
https://www.cve.org/CVERecord?id=CVE-2023-6863
https://www.cve.org/CVERecord?id=CVE-2023-6864
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 68 |
1 files changed, 66 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index f79ab06c6..6b8d5f9f8 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,74 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Mon, 18 Dec 2023 20:22:40 GMT</pubDate> - <lastBuildDate>Mon, 18 Dec 2023 20:59:14 GMT</lastBuildDate> + <pubDate>Tue, 19 Dec 2023 21:24:05 GMT</pubDate> + <lastBuildDate>Tue, 19 Dec 2023 22:05:23 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Tue, 19 Dec 2023 21:24:05 GMT</title> + <pubDate>Tue, 19 Dec 2023 21:24:05 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20231219212405</link> + <guid isPermaLink="false">20231219212405</guid> + <description> + <![CDATA[<pre> +a/sysvinit-scripts-15.1-noarch-9.txz: Rebuilt. + rc.cpufreq: also default to "performance" for amd-pstate-epp. + Thanks to pghvlaans. +l/LibRaw-0.21.2-x86_64-1.txz: Upgraded. +l/gtk+3-3.24.39-x86_64-1.txz: Upgraded. +l/libssh-0.10.6-x86_64-1.txz: Upgraded. + This update fixes security issues: + Command injection using proxycommand. + Potential downgrade attack using strict kex. + Missing checks for return values of MD functions. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-6004 + https://www.cve.org/CVERecord?id=CVE-2023-48795 + https://www.cve.org/CVERecord?id=CVE-2023-6918 + (* Security fix *) +l/mozilla-nss-3.96.1-x86_64-1.txz: Upgraded. +n/bluez-5.71-x86_64-2.txz: Rebuilt. + Fix a regression in bluez-5.71: + [PATCH] adapter: Fix link key address type for old kernels. + Thanks to marav. +xap/mozilla-firefox-115.6.0esr-x86_64-1.txz: Upgraded. + This update contains security fixes and improvements. + For more information, see: + https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/ + https://www.mozilla.org/security/advisories/mfsa2023-54/ + https://www.cve.org/CVERecord?id=CVE-2023-6856 + https://www.cve.org/CVERecord?id=CVE-2023-6865 + https://www.cve.org/CVERecord?id=CVE-2023-6857 + https://www.cve.org/CVERecord?id=CVE-2023-6858 + https://www.cve.org/CVERecord?id=CVE-2023-6859 + https://www.cve.org/CVERecord?id=CVE-2023-6860 + https://www.cve.org/CVERecord?id=CVE-2023-6867 + https://www.cve.org/CVERecord?id=CVE-2023-6861 + https://www.cve.org/CVERecord?id=CVE-2023-6862 + https://www.cve.org/CVERecord?id=CVE-2023-6863 + https://www.cve.org/CVERecord?id=CVE-2023-6864 + (* Security fix *) +xap/mozilla-thunderbird-115.6.0-x86_64-1.txz: Upgraded. + This release contains security fixes and improvements. + For more information, see: + https://www.thunderbird.net/en-US/thunderbird/115.6.0/releasenotes/ + https://www.mozilla.org/en-US/security/advisories/mfsa2023-55/ + https://www.cve.org/CVERecord?id=CVE-2023-50762 + https://www.cve.org/CVERecord?id=CVE-2023-50761 + https://www.cve.org/CVERecord?id=CVE-2023-6856 + https://www.cve.org/CVERecord?id=CVE-2023-6857 + https://www.cve.org/CVERecord?id=CVE-2023-6858 + https://www.cve.org/CVERecord?id=CVE-2023-6859 + https://www.cve.org/CVERecord?id=CVE-2023-6860 + https://www.cve.org/CVERecord?id=CVE-2023-6861 + https://www.cve.org/CVERecord?id=CVE-2023-6862 + https://www.cve.org/CVERecord?id=CVE-2023-6863 + https://www.cve.org/CVERecord?id=CVE-2023-6864 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Mon, 18 Dec 2023 20:22:40 GMT</title> <pubDate>Mon, 18 Dec 2023 20:22:40 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20231218202240</link> |