diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-03-24 19:42:46 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-03-25 13:30:35 +0100 |
commit | 694953a02401ef2e4b4ee493a3ad3a1cc50e32bb (patch) | |
tree | a421ea19056d5286278c14af4f50e81e6873f3c6 /recompress.sh | |
parent | 8ea2d785646a6912efbd3bdce75cbff0adafe60b (diff) | |
download | current-694953a02401ef2e4b4ee493a3ad3a1cc50e32bb.tar.gz current-694953a02401ef2e4b4ee493a3ad3a1cc50e32bb.tar.xz |
Fri Mar 24 19:42:46 UTC 202320230324194246_15.0
patches/packages/glibc-zoneinfo-2023b-noarch-1_slack15.0.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/tar-1.34-x86_64-2_slack15.0.txz: Rebuilt.
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use
of uninitialized memory for a conditional jump. Exploitation to change the
flow of control has not been demonstrated. The issue occurs in from_header
in list.c via a V7 archive in which mtime has approximately 11 whitespace
characters.
Thanks to marav for the heads-up.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-48303
(* Security fix *)
Diffstat (limited to 'recompress.sh')
-rwxr-xr-x | recompress.sh | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh index 084bd9531..aeae3b802 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1214,6 +1214,9 @@ gzip ./patches/source/net-snmp/net-snmp-5.8-modern-rpm-api.patch gzip ./patches/source/openssl/doinst.sh-openssl-solibs gzip ./patches/source/openssl/doinst.sh-openssl gzip ./patches/source/openssl/certwatch +gzip ./patches/source/tar/CVE-2022-48303.patch +gzip ./patches/source/tar/tar-1.13.bzip2.diff +gzip ./patches/source/tar/tar.nolonezero.diff gzip ./patches/source/glibc-zoneinfo/doinst.sh gzip ./patches/source/glibc-zoneinfo/zic.default.fat.diff gzip ./patches/source/sudo/doinst.sh |