diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-01-18 06:11:54 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-01-18 08:41:55 +0100 |
commit | 9cc1c3b3609f9dadfb87ca32723780a5ba6870dc (patch) | |
tree | 87e4f3dcb5758482f2e9c8e31115c0617fe34f8b /ChangeLog.txt | |
parent | 9e8fdb324d960760cc1b344be8c49fad2c11dc7a (diff) | |
download | current-9cc1c3b3609f9dadfb87ca32723780a5ba6870dc.tar.gz current-9cc1c3b3609f9dadfb87ca32723780a5ba6870dc.tar.xz |
Wed Jan 18 06:11:54 UTC 202320230118061154
ap/diffutils-3.9-x86_64-1.txz: Upgraded.
ap/lsof-4.97.0-x86_64-1.txz: Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz: Upgraded.
d/binutils-2.40-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz: Upgraded.
d/oprofile-1.4.0-x86_64-11.txz: Rebuilt.
Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issues:
mod_proxy allows a backend to trigger HTTP response splitting.
mod_proxy_ajp possible request smuggling.
mod_dav out of bounds read, or write of zero byte.
For more information, see:
https://downloads.apache.org/httpd/CHANGES_2.4.55
https://www.cve.org/CVERecord?id=CVE-2022-37436
https://www.cve.org/CVERecord?id=CVE-2022-36760
https://www.cve.org/CVERecord?id=CVE-2006-20001
(* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded.
Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded.
x/libXpm-3.5.15-x86_64-1.txz: Upgraded.
This update fixes security issues:
Infinite loop on unclosed comments.
Runaway loop with width of 0 and enormous height.
Compression commands depend on $PATH.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-46285
https://www.cve.org/CVERecord?id=CVE-2022-44617
https://www.cve.org/CVERecord?id=CVE-2022-4883
(* Security fix *)
x/libinput-1.22.1-x86_64-1.txz: Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
https://www.cve.org/CVERecord?id=CVE-2023-23597
https://www.cve.org/CVERecord?id=CVE-2023-23598
https://www.cve.org/CVERecord?id=CVE-2023-23599
https://www.cve.org/CVERecord?id=CVE-2023-23600
https://www.cve.org/CVERecord?id=CVE-2023-23601
https://www.cve.org/CVERecord?id=CVE-2023-23602
https://www.cve.org/CVERecord?id=CVE-2023-23603
https://www.cve.org/CVERecord?id=CVE-2023-23604
https://www.cve.org/CVERecord?id=CVE-2023-23605
https://www.cve.org/CVERecord?id=CVE-2023-23606
(* Security fix *)
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r-- | ChangeLog.txt | 54 |
1 files changed, 54 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt index 25900c690..f03a81a3e 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,57 @@ +Wed Jan 18 06:11:54 UTC 2023 +ap/diffutils-3.9-x86_64-1.txz: Upgraded. +ap/lsof-4.97.0-x86_64-1.txz: Upgraded. +ap/mpg123-1.31.2-x86_64-1.txz: Upgraded. +d/binutils-2.40-x86_64-1.txz: Upgraded. + Shared library .so-version bump. +d/git-2.39.1-x86_64-1.txz: Upgraded. +d/oprofile-1.4.0-x86_64-11.txz: Rebuilt. + Recompiled against binutils-2.40. +n/httpd-2.4.55-x86_64-1.txz: Upgraded. + This update fixes bugs and the following security issues: + mod_proxy allows a backend to trigger HTTP response splitting. + mod_proxy_ajp possible request smuggling. + mod_dav out of bounds read, or write of zero byte. + For more information, see: + https://downloads.apache.org/httpd/CHANGES_2.4.55 + https://www.cve.org/CVERecord?id=CVE-2022-37436 + https://www.cve.org/CVERecord?id=CVE-2022-36760 + https://www.cve.org/CVERecord?id=CVE-2006-20001 + (* Security fix *) +x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded. + Compiled against libpinyin-2.8.1. +x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded. +x/libXpm-3.5.15-x86_64-1.txz: Upgraded. + This update fixes security issues: + Infinite loop on unclosed comments. + Runaway loop with width of 0 and enormous height. + Compression commands depend on $PATH. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2022-46285 + https://www.cve.org/CVERecord?id=CVE-2022-44617 + https://www.cve.org/CVERecord?id=CVE-2022-4883 + (* Security fix *) +x/libinput-1.22.1-x86_64-1.txz: Upgraded. +x/libpinyin-2.8.1-x86_64-1.txz: Upgraded. + Shared library .so-version bump. +xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded. + This update contains security fixes and improvements. + Thanks to marav for the build help. + For more information, see: + https://www.mozilla.org/en-US/firefox/109.0/releasenotes/ + https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/ + https://www.cve.org/CVERecord?id=CVE-2023-23597 + https://www.cve.org/CVERecord?id=CVE-2023-23598 + https://www.cve.org/CVERecord?id=CVE-2023-23599 + https://www.cve.org/CVERecord?id=CVE-2023-23600 + https://www.cve.org/CVERecord?id=CVE-2023-23601 + https://www.cve.org/CVERecord?id=CVE-2023-23602 + https://www.cve.org/CVERecord?id=CVE-2023-23603 + https://www.cve.org/CVERecord?id=CVE-2023-23604 + https://www.cve.org/CVERecord?id=CVE-2023-23605 + https://www.cve.org/CVERecord?id=CVE-2023-23606 + (* Security fix *) ++--------------------------+ Sun Jan 15 01:02:36 UTC 2023 a/kernel-generic-6.1.6-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.6-x86_64-1.txz: Upgraded. |