summaryrefslogtreecommitdiffstats
path: root/ChangeLog.txt
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt76
1 files changed, 76 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 98b2ef3fe..01aa92cc2 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,79 @@
+Tue Nov 29 20:56:03 UTC 2022
+patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded.
+patches/packages/linux-5.15.80/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.63:
+ https://www.cve.org/CVERecord?id=CVE-2022-3629
+ https://www.cve.org/CVERecord?id=CVE-2022-3635
+ https://www.cve.org/CVERecord?id=CVE-2022-3633
+ https://www.cve.org/CVERecord?id=CVE-2022-3625
+ Fixed in 5.15.64:
+ https://www.cve.org/CVERecord?id=CVE-2022-39190
+ https://www.cve.org/CVERecord?id=CVE-2022-3028
+ https://www.cve.org/CVERecord?id=CVE-2022-2905
+ Fixed in 5.15.65:
+ https://www.cve.org/CVERecord?id=CVE-2022-42703
+ https://www.cve.org/CVERecord?id=CVE-2022-3176
+ Fixed in 5.15.66:
+ https://www.cve.org/CVERecord?id=CVE-2022-4095
+ https://www.cve.org/CVERecord?id=CVE-2022-20421
+ Fixed in 5.15.68:
+ https://www.cve.org/CVERecord?id=CVE-2022-3303
+ https://www.cve.org/CVERecord?id=CVE-2022-2663
+ https://www.cve.org/CVERecord?id=CVE-2022-40307
+ https://www.cve.org/CVERecord?id=CVE-2022-3586
+ Fixed in 5.15.70:
+ https://www.cve.org/CVERecord?id=CVE-2022-0171
+ https://www.cve.org/CVERecord?id=CVE-2022-39842
+ https://www.cve.org/CVERecord?id=CVE-2022-3061
+ Fixed in 5.15.72:
+ https://www.cve.org/CVERecord?id=CVE-2022-2308
+ Fixed in 5.15.73:
+ https://www.cve.org/CVERecord?id=CVE-2022-2978
+ https://www.cve.org/CVERecord?id=CVE-2022-43750
+ Fixed in 5.15.74:
+ https://www.cve.org/CVERecord?id=CVE-2022-40768
+ https://www.cve.org/CVERecord?id=CVE-2022-42721
+ https://www.cve.org/CVERecord?id=CVE-2022-3621
+ https://www.cve.org/CVERecord?id=CVE-2022-42722
+ https://www.cve.org/CVERecord?id=CVE-2022-42719
+ https://www.cve.org/CVERecord?id=CVE-2022-41674
+ https://www.cve.org/CVERecord?id=CVE-2022-3649
+ https://www.cve.org/CVERecord?id=CVE-2022-3646
+ https://www.cve.org/CVERecord?id=CVE-2022-42720
+ Fixed in 5.15.75:
+ https://www.cve.org/CVERecord?id=CVE-2022-43945
+ https://www.cve.org/CVERecord?id=CVE-2022-41849
+ https://www.cve.org/CVERecord?id=CVE-2022-3535
+ https://www.cve.org/CVERecord?id=CVE-2022-3594
+ https://www.cve.org/CVERecord?id=CVE-2022-2602
+ https://www.cve.org/CVERecord?id=CVE-2022-41850
+ https://www.cve.org/CVERecord?id=CVE-2022-3565
+ https://www.cve.org/CVERecord?id=CVE-2022-3542
+ Fixed in 5.15.77:
+ https://www.cve.org/CVERecord?id=CVE-2022-3524
+ Fixed in 5.15.78:
+ https://www.cve.org/CVERecord?id=CVE-2022-3628
+ https://www.cve.org/CVERecord?id=CVE-2022-3623
+ https://www.cve.org/CVERecord?id=CVE-2022-42896
+ https://www.cve.org/CVERecord?id=CVE-2022-42895
+ https://www.cve.org/CVERecord?id=CVE-2022-3543
+ https://www.cve.org/CVERecord?id=CVE-2022-3564
+ https://www.cve.org/CVERecord?id=CVE-2022-3619
+ Fixed in 5.15.80:
+ https://www.cve.org/CVERecord?id=CVE-2022-3521
+ https://www.cve.org/CVERecord?id=CVE-2022-3169
+ (* Security fix *)
+patches/packages/openssl-1.1.1s-x86_64-1_slack15.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/openssl-solibs-1.1.1s-x86_64-1_slack15.0.txz: Upgraded.
++--------------------------+
Thu Nov 24 20:55:37 UTC 2022
patches/packages/ruby-3.0.5-x86_64-1_slack15.0.txz: Upgraded.
This release includes a security fix: