diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-12-14 21:19:34 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-12-15 13:30:52 +0100 |
commit | b5eac9957be4752168e21dd2ff7c280a05d7e76f (patch) | |
tree | e02efd5ab8b168a3bc78aeac3798710cba30499e /recompress.sh | |
parent | 012399c1c57f63fd382b8dd5093aef9800eaff4a (diff) | |
download | current-b5eac9957be4752168e21dd2ff7c280a05d7e76f.tar.gz current-b5eac9957be4752168e21dd2ff7c280a05d7e76f.tar.xz |
Wed Dec 14 21:19:34 UTC 202220221214211934_15.0
patches/packages/mozilla-firefox-102.6.0esr-x86_64-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.6.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-52/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
patches/packages/mozilla-thunderbird-102.6.0-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.6.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-53/
https://www.cve.org/CVERecord?id=CVE-2022-46880
https://www.cve.org/CVERecord?id=CVE-2022-46872
https://www.cve.org/CVERecord?id=CVE-2022-46881
https://www.cve.org/CVERecord?id=CVE-2022-46874
https://www.cve.org/CVERecord?id=CVE-2022-46875
https://www.cve.org/CVERecord?id=CVE-2022-46882
https://www.cve.org/CVERecord?id=CVE-2022-46878
(* Security fix *)
patches/packages/xorg-server-1.20.14-x86_64-5_slack15.0.txz: Rebuilt.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
patches/packages/xorg-server-xephyr-1.20.14-x86_64-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xnest-1.20.14-x86_64-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xvfb-1.20.14-x86_64-5_slack15.0.txz: Rebuilt.
patches/packages/xorg-server-xwayland-21.1.4-x86_64-4_slack15.0.txz: Rebuilt.
This release fixes 6 recently reported security vulnerabilities in
various extensions.
For more information, see:
https://lists.x.org/archives/xorg-announce/2022-December/003302.html
https://www.cve.org/CVERecord?id=CVE-2022-46340
https://www.cve.org/CVERecord?id=CVE-2022-46341
https://www.cve.org/CVERecord?id=CVE-2022-46342
https://www.cve.org/CVERecord?id=CVE-2022-46343
https://www.cve.org/CVERecord?id=CVE-2022-46344
https://www.cve.org/CVERecord?id=CVE-2022-4283
(* Security fix *)
Diffstat (limited to 'recompress.sh')
-rwxr-xr-x | recompress.sh | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh index 830820ad3..25b08355e 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1182,8 +1182,14 @@ gzip ./patches/source/python3/python3.readline.set_pre_input_hook.diff gzip ./patches/source/python3/python3.setup.py.x86_64.diff gzip ./patches/source/python3/python3.distutils.x86_64.diff gzip ./patches/source/sysstat/doinst.sh +gzip ./patches/source/xorg-server-xwayland/CVE-2022-46342.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2022-46343.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2022-46340.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2022-46344.patch gzip ./patches/source/xorg-server-xwayland/0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch gzip ./patches/source/xorg-server-xwayland/CVE-2022-3551.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2022-4283.patch +gzip ./patches/source/xorg-server-xwayland/CVE-2022-46341.patch gzip ./patches/source/xorg-server-xwayland/0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch gzip ./patches/source/xorg-server-xwayland/CVE-2022-3550.patch gzip ./patches/source/xorg-server-xwayland/0001-f1070c01d616c5f21f939d5ebc533738779451ac.patch @@ -1214,15 +1220,21 @@ gzip ./patches/source/ca-certificates/update-ca-certificates.c_rehash.diff gzip ./patches/source/krb5/doinst.sh gzip ./patches/source/emacs/d48bb4874bc6cd3e69c7a15fc3c91cc141025c51.patch gzip ./patches/source/emacs/doinst.sh +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46342.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46343.patch gzip ./patches/source/xorg-server/patch/xorg-server/xorg-server.combo.mouse.keyboard.layout.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-3553.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46340.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46344.patch gzip ./patches/source/xorg-server/patch/xorg-server/0001-autobind-GPUs-to-the-screen.patch gzip ./patches/source/xorg-server/patch/xorg-server/0001-xfree86-use-modesetting-driver-by-default-on-GeForce.patch gzip ./patches/source/xorg-server/patch/xorg-server/0003-6907b6ea2b4ce949cb07271f5b678d5966d9df42.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-3551.patch +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-4283.patch gzip ./patches/source/xorg-server/patch/xorg-server/fix-nouveau-segfault.diff gzip ./patches/source/xorg-server/patch/xorg-server/fix-pci-segfault.diff gzip ./patches/source/xorg-server/patch/xorg-server/x11.startwithblackscreen.diff +gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46341.patch gzip ./patches/source/xorg-server/patch/xorg-server/0002-dd8caf39e9e15d8f302e54045dd08d8ebf1025dc.patch gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-3550.patch gzip ./patches/source/xorg-server/patch/xorg-server/06_use-intel-only-on-pre-gen4.diff |