diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 45 |
1 files changed, 43 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 1b77bc7bb..99346763d 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,51 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 27 Mar 2024 19:16:09 GMT</pubDate> - <lastBuildDate>Thu, 28 Mar 2024 12:30:25 GMT</lastBuildDate> + <pubDate>Fri, 29 Mar 2024 02:25:21 GMT</pubDate> + <lastBuildDate>Fri, 29 Mar 2024 12:30:28 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Fri, 29 Mar 2024 02:25:21 GMT</title> + <pubDate>Fri, 29 Mar 2024 02:25:21 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20240329022521</link> + <guid isPermaLink="false">20240329022521</guid> + <description> + <![CDATA[<pre> +patches/packages/coreutils-9.5-x86_64-1_slack15.0.txz: Upgraded. + chmod -R now avoids a race where an attacker may replace a traversed file + with a symlink, causing chmod to operate on an unintended file. + [This bug was present in "the beginning".] + split --line-bytes with a mixture of very long and short lines no longer + overwrites the heap. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2024-0684 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> + <title>Thu, 28 Mar 2024 21:40:08 GMT</title> + <pubDate>Thu, 28 Mar 2024 21:40:08 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20240328214008</link> + <guid isPermaLink="false">20240328214008</guid> + <description> + <![CDATA[<pre> +patches/packages/seamonkey-2.53.18.2-x86_64-1_slack15.0.txz: Upgraded. + This update contains security fixes and improvements. + For more information, see: + https://www.seamonkey-project.org/releases/seamonkey2.53.18.2 + (* Security fix *) +patches/packages/util-linux-2.37.4-x86_64-3_slack15.0.txz: Rebuilt. + This release fixes a vulnerability where the wall command did not filter + escape sequences from command line arguments, allowing unprivileged users + to put arbitrary text on other users terminals. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2024-28085 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 27 Mar 2024 19:16:09 GMT</title> <pubDate>Wed, 27 Mar 2024 19:16:09 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20240327191609</link> |