diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 88 |
1 files changed, 86 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 62897ee29..1340c4577 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,94 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Thu, 24 Nov 2022 20:55:37 GMT</pubDate> - <lastBuildDate>Fri, 25 Nov 2022 12:30:45 GMT</lastBuildDate> + <pubDate>Tue, 29 Nov 2022 20:56:03 GMT</pubDate> + <lastBuildDate>Wed, 30 Nov 2022 12:30:18 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Tue, 29 Nov 2022 20:56:03 GMT</title> + <pubDate>Tue, 29 Nov 2022 20:56:03 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20221129205603</link> + <guid isPermaLink="false">20221129205603</guid> + <description> + <![CDATA[<pre> +patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded. +patches/packages/linux-5.15.80/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.63: + https://www.cve.org/CVERecord?id=CVE-2022-3629 + https://www.cve.org/CVERecord?id=CVE-2022-3635 + https://www.cve.org/CVERecord?id=CVE-2022-3633 + https://www.cve.org/CVERecord?id=CVE-2022-3625 + Fixed in 5.15.64: + https://www.cve.org/CVERecord?id=CVE-2022-39190 + https://www.cve.org/CVERecord?id=CVE-2022-3028 + https://www.cve.org/CVERecord?id=CVE-2022-2905 + Fixed in 5.15.65: + https://www.cve.org/CVERecord?id=CVE-2022-42703 + https://www.cve.org/CVERecord?id=CVE-2022-3176 + Fixed in 5.15.66: + https://www.cve.org/CVERecord?id=CVE-2022-4095 + https://www.cve.org/CVERecord?id=CVE-2022-20421 + Fixed in 5.15.68: + https://www.cve.org/CVERecord?id=CVE-2022-3303 + https://www.cve.org/CVERecord?id=CVE-2022-2663 + https://www.cve.org/CVERecord?id=CVE-2022-40307 + https://www.cve.org/CVERecord?id=CVE-2022-3586 + Fixed in 5.15.70: + https://www.cve.org/CVERecord?id=CVE-2022-0171 + https://www.cve.org/CVERecord?id=CVE-2022-39842 + https://www.cve.org/CVERecord?id=CVE-2022-3061 + Fixed in 5.15.72: + https://www.cve.org/CVERecord?id=CVE-2022-2308 + Fixed in 5.15.73: + https://www.cve.org/CVERecord?id=CVE-2022-2978 + https://www.cve.org/CVERecord?id=CVE-2022-43750 + Fixed in 5.15.74: + https://www.cve.org/CVERecord?id=CVE-2022-40768 + https://www.cve.org/CVERecord?id=CVE-2022-42721 + https://www.cve.org/CVERecord?id=CVE-2022-3621 + https://www.cve.org/CVERecord?id=CVE-2022-42722 + https://www.cve.org/CVERecord?id=CVE-2022-42719 + https://www.cve.org/CVERecord?id=CVE-2022-41674 + https://www.cve.org/CVERecord?id=CVE-2022-3649 + https://www.cve.org/CVERecord?id=CVE-2022-3646 + https://www.cve.org/CVERecord?id=CVE-2022-42720 + Fixed in 5.15.75: + https://www.cve.org/CVERecord?id=CVE-2022-43945 + https://www.cve.org/CVERecord?id=CVE-2022-41849 + https://www.cve.org/CVERecord?id=CVE-2022-3535 + https://www.cve.org/CVERecord?id=CVE-2022-3594 + https://www.cve.org/CVERecord?id=CVE-2022-2602 + https://www.cve.org/CVERecord?id=CVE-2022-41850 + https://www.cve.org/CVERecord?id=CVE-2022-3565 + https://www.cve.org/CVERecord?id=CVE-2022-3542 + Fixed in 5.15.77: + https://www.cve.org/CVERecord?id=CVE-2022-3524 + Fixed in 5.15.78: + https://www.cve.org/CVERecord?id=CVE-2022-3628 + https://www.cve.org/CVERecord?id=CVE-2022-3623 + https://www.cve.org/CVERecord?id=CVE-2022-42896 + https://www.cve.org/CVERecord?id=CVE-2022-42895 + https://www.cve.org/CVERecord?id=CVE-2022-3543 + https://www.cve.org/CVERecord?id=CVE-2022-3564 + https://www.cve.org/CVERecord?id=CVE-2022-3619 + Fixed in 5.15.80: + https://www.cve.org/CVERecord?id=CVE-2022-3521 + https://www.cve.org/CVERecord?id=CVE-2022-3169 + (* Security fix *) +patches/packages/openssl-1.1.1s-x86_64-1_slack15.0.txz: Upgraded. + This is a bugfix release. +patches/packages/openssl-solibs-1.1.1s-x86_64-1_slack15.0.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Thu, 24 Nov 2022 20:55:37 GMT</title> <pubDate>Thu, 24 Nov 2022 20:55:37 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20221124205537</link> |