summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss119
1 files changed, 117 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 135d10623..b39a7a0a2 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,125 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Sat, 18 Nov 2023 19:26:33 GMT</pubDate>
- <lastBuildDate>Sun, 19 Nov 2023 12:30:19 GMT</lastBuildDate>
+ <pubDate>Tue, 21 Nov 2023 21:15:30 GMT</pubDate>
+ <lastBuildDate>Wed, 22 Nov 2023 12:30:23 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Tue, 21 Nov 2023 21:15:30 GMT</title>
+ <pubDate>Tue, 21 Nov 2023 21:15:30 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20231121211530</link>
+ <guid isPermaLink="false">20231121211530</guid>
+ <description>
+ <![CDATA[<pre>
+patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded.
+ Updated to the latest kernel firmware.
+patches/packages/linux-5.15.139/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.116:
+ https://www.cve.org/CVERecord?id=CVE-2023-35788
+ https://www.cve.org/CVERecord?id=CVE-2022-45887
+ https://www.cve.org/CVERecord?id=CVE-2022-45886
+ https://www.cve.org/CVERecord?id=CVE-2023-3212
+ https://www.cve.org/CVERecord?id=CVE-2022-45919
+ Fixed in 5.15.117:
+ https://www.cve.org/CVERecord?id=CVE-2023-2124
+ https://www.cve.org/CVERecord?id=CVE-2023-34255
+ Fixed in 5.15.118:
+ https://www.cve.org/CVERecord?id=CVE-2023-3609
+ https://www.cve.org/CVERecord?id=CVE-2023-3117
+ https://www.cve.org/CVERecord?id=CVE-2023-3390
+ https://www.cve.org/CVERecord?id=CVE-2023-3338
+ Fixed in 5.15.119:
+ https://www.cve.org/CVERecord?id=CVE-2023-3610
+ Fixed in 5.15.121:
+ https://www.cve.org/CVERecord?id=CVE-2023-31248
+ https://www.cve.org/CVERecord?id=CVE-2023-38432
+ https://www.cve.org/CVERecord?id=CVE-2023-3866
+ https://www.cve.org/CVERecord?id=CVE-2023-2898
+ https://www.cve.org/CVERecord?id=CVE-2023-44466
+ https://www.cve.org/CVERecord?id=CVE-2023-4132
+ https://www.cve.org/CVERecord?id=CVE-2023-3611
+ https://www.cve.org/CVERecord?id=CVE-2022-48502
+ https://www.cve.org/CVERecord?id=CVE-2023-3865
+ https://www.cve.org/CVERecord?id=CVE-2023-35001
+ https://www.cve.org/CVERecord?id=CVE-2023-3776
+ https://www.cve.org/CVERecord?id=CVE-2023-3863
+ Fixed in 5.15.122:
+ https://www.cve.org/CVERecord?id=CVE-2023-20593
+ Fixed in 5.15.123:
+ https://www.cve.org/CVERecord?id=CVE-2023-3777
+ https://www.cve.org/CVERecord?id=CVE-2023-4004
+ Fixed in 5.15.124:
+ https://www.cve.org/CVERecord?id=CVE-2023-4015
+ https://www.cve.org/CVERecord?id=CVE-2023-4147
+ https://www.cve.org/CVERecord?id=CVE-2023-1206
+ Fixed in 5.15.125:
+ https://www.cve.org/CVERecord?id=CVE-2022-40982
+ https://www.cve.org/CVERecord?id=CVE-2023-20569
+ Fixed in 5.15.126:
+ https://www.cve.org/CVERecord?id=CVE-2023-20588
+ https://www.cve.org/CVERecord?id=CVE-2023-4128
+ https://www.cve.org/CVERecord?id=CVE-2023-4208
+ https://www.cve.org/CVERecord?id=CVE-2023-4206
+ https://www.cve.org/CVERecord?id=CVE-2023-4207
+ https://www.cve.org/CVERecord?id=CVE-2023-40283
+ Fixed in 5.15.128:
+ https://www.cve.org/CVERecord?id=CVE-2023-4569
+ https://www.cve.org/CVERecord?id=CVE-2023-39194
+ https://www.cve.org/CVERecord?id=CVE-2023-4273
+ https://www.cve.org/CVERecord?id=CVE-2023-3772
+ Fixed in 5.15.132:
+ https://www.cve.org/CVERecord?id=CVE-2023-4921
+ https://www.cve.org/CVERecord?id=CVE-2023-4623
+ https://www.cve.org/CVERecord?id=CVE-2023-42753
+ https://www.cve.org/CVERecord?id=CVE-2023-42752
+ https://www.cve.org/CVERecord?id=CVE-2023-39189
+ https://www.cve.org/CVERecord?id=CVE-2023-4881
+ https://www.cve.org/CVERecord?id=CVE-2023-45871
+ https://www.cve.org/CVERecord?id=CVE-2023-39193
+ https://www.cve.org/CVERecord?id=CVE-2023-39192
+ Fixed in 5.15.133:
+ https://www.cve.org/CVERecord?id=CVE-2023-42755
+ Fixed in 5.15.134:
+ https://www.cve.org/CVERecord?id=CVE-2023-42754
+ https://www.cve.org/CVERecord?id=CVE-2023-4563
+ https://www.cve.org/CVERecord?id=CVE-2023-4244
+ https://www.cve.org/CVERecord?id=CVE-2023-5197
+ Fixed in 5.15.135:
+ https://www.cve.org/CVERecord?id=CVE-2023-34324
+ https://www.cve.org/CVERecord?id=CVE-2023-31085
+ https://www.cve.org/CVERecord?id=CVE-2023-5158
+ Fixed in 5.15.136:
+ https://www.cve.org/CVERecord?id=CVE-2023-35827
+ Fixed in 5.15.137:
+ https://www.cve.org/CVERecord?id=CVE-2023-46813
+ https://www.cve.org/CVERecord?id=CVE-2023-5717
+ https://www.cve.org/CVERecord?id=CVE-2023-5178
+ (* Security fix *)
+patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ Thanks to zuriel for the taskbar icon fix on Wayland. :-)
+ For more information, see:
+ https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
+ https://www.mozilla.org/security/advisories/mfsa2023-50/
+ https://www.cve.org/CVERecord?id=CVE-2023-6204
+ https://www.cve.org/CVERecord?id=CVE-2023-6205
+ https://www.cve.org/CVERecord?id=CVE-2023-6206
+ https://www.cve.org/CVERecord?id=CVE-2023-6207
+ https://www.cve.org/CVERecord?id=CVE-2023-6208
+ https://www.cve.org/CVERecord?id=CVE-2023-6209
+ https://www.cve.org/CVERecord?id=CVE-2023-6212
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Sat, 18 Nov 2023 19:26:33 GMT</title>
<pubDate>Sat, 18 Nov 2023 19:26:33 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20231118192633</link>