diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 119 |
1 files changed, 117 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 135d10623..b39a7a0a2 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,125 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Sat, 18 Nov 2023 19:26:33 GMT</pubDate> - <lastBuildDate>Sun, 19 Nov 2023 12:30:19 GMT</lastBuildDate> + <pubDate>Tue, 21 Nov 2023 21:15:30 GMT</pubDate> + <lastBuildDate>Wed, 22 Nov 2023 12:30:23 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Tue, 21 Nov 2023 21:15:30 GMT</title> + <pubDate>Tue, 21 Nov 2023 21:15:30 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20231121211530</link> + <guid isPermaLink="false">20231121211530</guid> + <description> + <![CDATA[<pre> +patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded. + Updated to the latest kernel firmware. +patches/packages/linux-5.15.139/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.116: + https://www.cve.org/CVERecord?id=CVE-2023-35788 + https://www.cve.org/CVERecord?id=CVE-2022-45887 + https://www.cve.org/CVERecord?id=CVE-2022-45886 + https://www.cve.org/CVERecord?id=CVE-2023-3212 + https://www.cve.org/CVERecord?id=CVE-2022-45919 + Fixed in 5.15.117: + https://www.cve.org/CVERecord?id=CVE-2023-2124 + https://www.cve.org/CVERecord?id=CVE-2023-34255 + Fixed in 5.15.118: + https://www.cve.org/CVERecord?id=CVE-2023-3609 + https://www.cve.org/CVERecord?id=CVE-2023-3117 + https://www.cve.org/CVERecord?id=CVE-2023-3390 + https://www.cve.org/CVERecord?id=CVE-2023-3338 + Fixed in 5.15.119: + https://www.cve.org/CVERecord?id=CVE-2023-3610 + Fixed in 5.15.121: + https://www.cve.org/CVERecord?id=CVE-2023-31248 + https://www.cve.org/CVERecord?id=CVE-2023-38432 + https://www.cve.org/CVERecord?id=CVE-2023-3866 + https://www.cve.org/CVERecord?id=CVE-2023-2898 + https://www.cve.org/CVERecord?id=CVE-2023-44466 + https://www.cve.org/CVERecord?id=CVE-2023-4132 + https://www.cve.org/CVERecord?id=CVE-2023-3611 + https://www.cve.org/CVERecord?id=CVE-2022-48502 + https://www.cve.org/CVERecord?id=CVE-2023-3865 + https://www.cve.org/CVERecord?id=CVE-2023-35001 + https://www.cve.org/CVERecord?id=CVE-2023-3776 + https://www.cve.org/CVERecord?id=CVE-2023-3863 + Fixed in 5.15.122: + https://www.cve.org/CVERecord?id=CVE-2023-20593 + Fixed in 5.15.123: + https://www.cve.org/CVERecord?id=CVE-2023-3777 + https://www.cve.org/CVERecord?id=CVE-2023-4004 + Fixed in 5.15.124: + https://www.cve.org/CVERecord?id=CVE-2023-4015 + https://www.cve.org/CVERecord?id=CVE-2023-4147 + https://www.cve.org/CVERecord?id=CVE-2023-1206 + Fixed in 5.15.125: + https://www.cve.org/CVERecord?id=CVE-2022-40982 + https://www.cve.org/CVERecord?id=CVE-2023-20569 + Fixed in 5.15.126: + https://www.cve.org/CVERecord?id=CVE-2023-20588 + https://www.cve.org/CVERecord?id=CVE-2023-4128 + https://www.cve.org/CVERecord?id=CVE-2023-4208 + https://www.cve.org/CVERecord?id=CVE-2023-4206 + https://www.cve.org/CVERecord?id=CVE-2023-4207 + https://www.cve.org/CVERecord?id=CVE-2023-40283 + Fixed in 5.15.128: + https://www.cve.org/CVERecord?id=CVE-2023-4569 + https://www.cve.org/CVERecord?id=CVE-2023-39194 + https://www.cve.org/CVERecord?id=CVE-2023-4273 + https://www.cve.org/CVERecord?id=CVE-2023-3772 + Fixed in 5.15.132: + https://www.cve.org/CVERecord?id=CVE-2023-4921 + https://www.cve.org/CVERecord?id=CVE-2023-4623 + https://www.cve.org/CVERecord?id=CVE-2023-42753 + https://www.cve.org/CVERecord?id=CVE-2023-42752 + https://www.cve.org/CVERecord?id=CVE-2023-39189 + https://www.cve.org/CVERecord?id=CVE-2023-4881 + https://www.cve.org/CVERecord?id=CVE-2023-45871 + https://www.cve.org/CVERecord?id=CVE-2023-39193 + https://www.cve.org/CVERecord?id=CVE-2023-39192 + Fixed in 5.15.133: + https://www.cve.org/CVERecord?id=CVE-2023-42755 + Fixed in 5.15.134: + https://www.cve.org/CVERecord?id=CVE-2023-42754 + https://www.cve.org/CVERecord?id=CVE-2023-4563 + https://www.cve.org/CVERecord?id=CVE-2023-4244 + https://www.cve.org/CVERecord?id=CVE-2023-5197 + Fixed in 5.15.135: + https://www.cve.org/CVERecord?id=CVE-2023-34324 + https://www.cve.org/CVERecord?id=CVE-2023-31085 + https://www.cve.org/CVERecord?id=CVE-2023-5158 + Fixed in 5.15.136: + https://www.cve.org/CVERecord?id=CVE-2023-35827 + Fixed in 5.15.137: + https://www.cve.org/CVERecord?id=CVE-2023-46813 + https://www.cve.org/CVERecord?id=CVE-2023-5717 + https://www.cve.org/CVERecord?id=CVE-2023-5178 + (* Security fix *) +patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txz: Upgraded. + This update contains security fixes and improvements. + Thanks to zuriel for the taskbar icon fix on Wayland. :-) + For more information, see: + https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/ + https://www.mozilla.org/security/advisories/mfsa2023-50/ + https://www.cve.org/CVERecord?id=CVE-2023-6204 + https://www.cve.org/CVERecord?id=CVE-2023-6205 + https://www.cve.org/CVERecord?id=CVE-2023-6206 + https://www.cve.org/CVERecord?id=CVE-2023-6207 + https://www.cve.org/CVERecord?id=CVE-2023-6208 + https://www.cve.org/CVERecord?id=CVE-2023-6209 + https://www.cve.org/CVERecord?id=CVE-2023-6212 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Sat, 18 Nov 2023 19:26:33 GMT</title> <pubDate>Sat, 18 Nov 2023 19:26:33 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20231118192633</link> |