diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-11-16 20:51:47 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-11-17 13:30:41 +0100 |
commit | 65d9c1e075af3943292ff2187303f6951ddd6ba6 (patch) | |
tree | 8834f4db84cdc5b0e90fe5b9d43e0b9ed7aa034b /ChangeLog.rss | |
parent | 2aa4bf659d5d93805e81f555da0ec5455357f040 (diff) | |
download | current-65d9c1e075af3943292ff2187303f6951ddd6ba6.tar.gz current-65d9c1e075af3943292ff2187303f6951ddd6ba6.tar.xz |
Thu Nov 16 20:51:47 UTC 202320231116205147_15.0
patches/packages/gegl-0.4.46-x86_64-1_slack15.0.txz: Upgraded.
This is a bugfix release, needed by the GIMP upgrade.
patches/packages/gimp-2.10.36-x86_64-1_slack15.0.txz: Upgraded.
This release fixes security issues:
If a user loads a malicious DDS, PSD, or PSP file, this could result in a
program crash or possibly the execution of arbitrary code.
Please note that this package also requires the updated gegl package.
Thanks to henca for the heads-up.
For more information, see:
https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/
https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
https://www.zerodayinitiative.com/advisories/ZDI-23-1592/
https://www.zerodayinitiative.com/advisories/ZDI-23-1593/
https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 33 |
1 files changed, 31 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index c6bd79695..3efad66e7 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,39 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 15 Nov 2023 22:01:26 GMT</pubDate> - <lastBuildDate>Thu, 16 Nov 2023 12:39:15 GMT</lastBuildDate> + <pubDate>Thu, 16 Nov 2023 20:51:47 GMT</pubDate> + <lastBuildDate>Fri, 17 Nov 2023 12:30:27 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Thu, 16 Nov 2023 20:51:47 GMT</title> + <pubDate>Thu, 16 Nov 2023 20:51:47 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20231116205147</link> + <guid isPermaLink="false">20231116205147</guid> + <description> + <![CDATA[<pre> +patches/packages/gegl-0.4.46-x86_64-1_slack15.0.txz: Upgraded. + This is a bugfix release, needed by the GIMP upgrade. +patches/packages/gimp-2.10.36-x86_64-1_slack15.0.txz: Upgraded. + This release fixes security issues: + If a user loads a malicious DDS, PSD, or PSP file, this could result in a + program crash or possibly the execution of arbitrary code. + Please note that this package also requires the updated gegl package. + Thanks to henca for the heads-up. + For more information, see: + https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/ + https://www.zerodayinitiative.com/advisories/ZDI-23-1591/ + https://www.zerodayinitiative.com/advisories/ZDI-23-1592/ + https://www.zerodayinitiative.com/advisories/ZDI-23-1593/ + https://www.zerodayinitiative.com/advisories/ZDI-23-1594/ + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 15 Nov 2023 22:01:26 GMT</title> <pubDate>Wed, 15 Nov 2023 22:01:26 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20231115220126</link> |