diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-10-31 23:31:36 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-11-01 07:00:17 +0100 |
commit | f866235e9a78fbc4e112f5d1357692540eae60c0 (patch) | |
tree | 2e19b062bcafa20fc25555bb57b3c397401d55b4 /ChangeLog.rss | |
parent | 58dca1653169fdce6ef81dbafb30b594f087fb9b (diff) | |
download | current-f866235e9a78fbc4e112f5d1357692540eae60c0.tar.gz current-f866235e9a78fbc4e112f5d1357692540eae60c0.tar.xz |
Mon Oct 31 23:31:36 UTC 202220221031233136
a/ntfs-3g-2022.10.3-x86_64-1.txz: Upgraded.
ap/mpg123-1.31.0-x86_64-1.txz: Upgraded.
ap/vim-9.0.0814-x86_64-1.txz: Upgraded.
A vulnerability was found in vim and classified as problematic. Affected by
this issue is the function qf_update_buffer of the file quickfix.c of the
component autocmd Handler. The manipulation leads to use after free. The
attack may be launched remotely. Upgrading to version 9.0.0805 is able to
address this issue.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-3705
(* Security fix *)
d/ccache-4.7.2-x86_64-1.txz: Upgraded.
d/make-4.4-x86_64-1.txz: Upgraded.
d/patchelf-0.16.1-x86_64-1.txz: Upgraded.
d/strace-6.0-x86_64-1.txz: Upgraded.
kde/kwin-5.26.2.1-x86_64-2.txz: Rebuilt.
[PATCH] x11window: revert more from 3a28c02f.
Thanks to Heinz Wiesinger.
[PATCH] x11: Don't force QT_NO_GLIB=1.
[PATCH] x11: Don't force QT_QPA_PLATFORM=xcb.
Thanks to marav.
l/libedit-20221030_3.1-x86_64-1.txz: Upgraded.
l/python-importlib_metadata-5.0.0-x86_64-1.txz: Upgraded.
l/taglib-1.13-x86_64-1.txz: Upgraded.
l/utf8proc-2.8.0-x86_64-1.txz: Upgraded.
n/openvpn-2.5.8-x86_64-1.txz: Upgraded.
n/socat-1.7.4.4-x86_64-1.txz: Upgraded.
x/libXext-1.3.5-x86_64-1.txz: Upgraded.
x/libXinerama-1.1.5-x86_64-1.txz: Upgraded.
x/makedepend-1.0.7-x86_64-1.txz: Upgraded.
x/rgb-1.1.0-x86_64-1.txz: Upgraded.
x/sessreg-1.1.3-x86_64-1.txz: Upgraded.
x/x11perf-1.6.2-x86_64-1.txz: Upgraded.
x/xsetroot-1.1.3-x86_64-1.txz: Upgraded.
xap/mozilla-firefox-106.0.3-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/firefox/106.0.3/releasenotes/
xap/mozilla-thunderbird-102.4.1-x86_64-1.txz: Upgraded.
This is a bugfix release.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.4.1/releasenotes/
xap/vim-gvim-9.0.0814-x86_64-1.txz: Upgraded.
extra/php80/php80-8.0.25-x86_64-1.txz: Upgraded.
This update fixes security issues:
GD: OOB read due to insufficient input validation in imageloadfont().
Hash: buffer overflow in hash_update() on long parameter.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-31630
https://www.cve.org/CVERecord?id=CVE-2022-37454
(* Security fix *)
extra/php81/php81-8.1.12-x86_64-1.txz: Upgraded.
This update fixes security issues:
GD: OOB read due to insufficient input validation in imageloadfont().
Hash: buffer overflow in hash_update() on long parameter.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-31630
https://www.cve.org/CVERecord?id=CVE-2022-37454
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 74 |
1 files changed, 72 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 336938384..8bbe7d821 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,80 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Thu, 27 Oct 2022 02:30:15 GMT</pubDate> - <lastBuildDate>Thu, 27 Oct 2022 07:00:15 GMT</lastBuildDate> + <pubDate>Mon, 31 Oct 2022 23:31:36 GMT</pubDate> + <lastBuildDate>Tue, 1 Nov 2022 06:00:15 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Mon, 31 Oct 2022 23:31:36 GMT</title> + <pubDate>Mon, 31 Oct 2022 23:31:36 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20221031233136</link> + <guid isPermaLink="false">20221031233136</guid> + <description> + <![CDATA[<pre> +a/ntfs-3g-2022.10.3-x86_64-1.txz: Upgraded. +ap/mpg123-1.31.0-x86_64-1.txz: Upgraded. +ap/vim-9.0.0814-x86_64-1.txz: Upgraded. + A vulnerability was found in vim and classified as problematic. Affected by + this issue is the function qf_update_buffer of the file quickfix.c of the + component autocmd Handler. The manipulation leads to use after free. The + attack may be launched remotely. Upgrading to version 9.0.0805 is able to + address this issue. + Thanks to marav for the heads-up. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2022-3705 + (* Security fix *) +d/ccache-4.7.2-x86_64-1.txz: Upgraded. +d/make-4.4-x86_64-1.txz: Upgraded. +d/patchelf-0.16.1-x86_64-1.txz: Upgraded. +d/strace-6.0-x86_64-1.txz: Upgraded. +kde/kwin-5.26.2.1-x86_64-2.txz: Rebuilt. + [PATCH] x11window: revert more from 3a28c02f. + Thanks to Heinz Wiesinger. + [PATCH] x11: Don't force QT_NO_GLIB=1. + [PATCH] x11: Don't force QT_QPA_PLATFORM=xcb. + Thanks to marav. +l/libedit-20221030_3.1-x86_64-1.txz: Upgraded. +l/python-importlib_metadata-5.0.0-x86_64-1.txz: Upgraded. +l/taglib-1.13-x86_64-1.txz: Upgraded. +l/utf8proc-2.8.0-x86_64-1.txz: Upgraded. +n/openvpn-2.5.8-x86_64-1.txz: Upgraded. +n/socat-1.7.4.4-x86_64-1.txz: Upgraded. +x/libXext-1.3.5-x86_64-1.txz: Upgraded. +x/libXinerama-1.1.5-x86_64-1.txz: Upgraded. +x/makedepend-1.0.7-x86_64-1.txz: Upgraded. +x/rgb-1.1.0-x86_64-1.txz: Upgraded. +x/sessreg-1.1.3-x86_64-1.txz: Upgraded. +x/x11perf-1.6.2-x86_64-1.txz: Upgraded. +x/xsetroot-1.1.3-x86_64-1.txz: Upgraded. +xap/mozilla-firefox-106.0.3-x86_64-1.txz: Upgraded. + This is a bugfix release. + For more information, see: + https://www.mozilla.org/en-US/firefox/106.0.3/releasenotes/ +xap/mozilla-thunderbird-102.4.1-x86_64-1.txz: Upgraded. + This is a bugfix release. + For more information, see: + https://www.mozilla.org/en-US/thunderbird/102.4.1/releasenotes/ +xap/vim-gvim-9.0.0814-x86_64-1.txz: Upgraded. +extra/php80/php80-8.0.25-x86_64-1.txz: Upgraded. + This update fixes security issues: + GD: OOB read due to insufficient input validation in imageloadfont(). + Hash: buffer overflow in hash_update() on long parameter. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2022-31630 + https://www.cve.org/CVERecord?id=CVE-2022-37454 + (* Security fix *) +extra/php81/php81-8.1.12-x86_64-1.txz: Upgraded. + This update fixes security issues: + GD: OOB read due to insufficient input validation in imageloadfont(). + Hash: buffer overflow in hash_update() on long parameter. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2022-31630 + https://www.cve.org/CVERecord?id=CVE-2022-37454 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Thu, 27 Oct 2022 02:30:15 GMT</title> <pubDate>Thu, 27 Oct 2022 02:30:15 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20221027023015</link> |