summaryrefslogtreecommitdiffstats
path: root/ChangeLog.txt
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt107
1 files changed, 107 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 83e82b6ac..0e1e23529 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,110 @@
+Tue Nov 21 21:15:30 UTC 2023
+patches/packages/kernel-firmware-20231120_9552083-noarch-1.txz: Upgraded.
+ Updated to the latest kernel firmware.
+patches/packages/linux-5.15.139/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.116:
+ https://www.cve.org/CVERecord?id=CVE-2023-35788
+ https://www.cve.org/CVERecord?id=CVE-2022-45887
+ https://www.cve.org/CVERecord?id=CVE-2022-45886
+ https://www.cve.org/CVERecord?id=CVE-2023-3212
+ https://www.cve.org/CVERecord?id=CVE-2022-45919
+ Fixed in 5.15.117:
+ https://www.cve.org/CVERecord?id=CVE-2023-2124
+ https://www.cve.org/CVERecord?id=CVE-2023-34255
+ Fixed in 5.15.118:
+ https://www.cve.org/CVERecord?id=CVE-2023-3609
+ https://www.cve.org/CVERecord?id=CVE-2023-3117
+ https://www.cve.org/CVERecord?id=CVE-2023-3390
+ https://www.cve.org/CVERecord?id=CVE-2023-3338
+ Fixed in 5.15.119:
+ https://www.cve.org/CVERecord?id=CVE-2023-3610
+ Fixed in 5.15.121:
+ https://www.cve.org/CVERecord?id=CVE-2023-31248
+ https://www.cve.org/CVERecord?id=CVE-2023-38432
+ https://www.cve.org/CVERecord?id=CVE-2023-3866
+ https://www.cve.org/CVERecord?id=CVE-2023-2898
+ https://www.cve.org/CVERecord?id=CVE-2023-44466
+ https://www.cve.org/CVERecord?id=CVE-2023-4132
+ https://www.cve.org/CVERecord?id=CVE-2023-3611
+ https://www.cve.org/CVERecord?id=CVE-2022-48502
+ https://www.cve.org/CVERecord?id=CVE-2023-3865
+ https://www.cve.org/CVERecord?id=CVE-2023-35001
+ https://www.cve.org/CVERecord?id=CVE-2023-3776
+ https://www.cve.org/CVERecord?id=CVE-2023-3863
+ Fixed in 5.15.122:
+ https://www.cve.org/CVERecord?id=CVE-2023-20593
+ Fixed in 5.15.123:
+ https://www.cve.org/CVERecord?id=CVE-2023-3777
+ https://www.cve.org/CVERecord?id=CVE-2023-4004
+ Fixed in 5.15.124:
+ https://www.cve.org/CVERecord?id=CVE-2023-4015
+ https://www.cve.org/CVERecord?id=CVE-2023-4147
+ https://www.cve.org/CVERecord?id=CVE-2023-1206
+ Fixed in 5.15.125:
+ https://www.cve.org/CVERecord?id=CVE-2022-40982
+ https://www.cve.org/CVERecord?id=CVE-2023-20569
+ Fixed in 5.15.126:
+ https://www.cve.org/CVERecord?id=CVE-2023-20588
+ https://www.cve.org/CVERecord?id=CVE-2023-4128
+ https://www.cve.org/CVERecord?id=CVE-2023-4208
+ https://www.cve.org/CVERecord?id=CVE-2023-4206
+ https://www.cve.org/CVERecord?id=CVE-2023-4207
+ https://www.cve.org/CVERecord?id=CVE-2023-40283
+ Fixed in 5.15.128:
+ https://www.cve.org/CVERecord?id=CVE-2023-4569
+ https://www.cve.org/CVERecord?id=CVE-2023-39194
+ https://www.cve.org/CVERecord?id=CVE-2023-4273
+ https://www.cve.org/CVERecord?id=CVE-2023-3772
+ Fixed in 5.15.132:
+ https://www.cve.org/CVERecord?id=CVE-2023-4921
+ https://www.cve.org/CVERecord?id=CVE-2023-4623
+ https://www.cve.org/CVERecord?id=CVE-2023-42753
+ https://www.cve.org/CVERecord?id=CVE-2023-42752
+ https://www.cve.org/CVERecord?id=CVE-2023-39189
+ https://www.cve.org/CVERecord?id=CVE-2023-4881
+ https://www.cve.org/CVERecord?id=CVE-2023-45871
+ https://www.cve.org/CVERecord?id=CVE-2023-39193
+ https://www.cve.org/CVERecord?id=CVE-2023-39192
+ Fixed in 5.15.133:
+ https://www.cve.org/CVERecord?id=CVE-2023-42755
+ Fixed in 5.15.134:
+ https://www.cve.org/CVERecord?id=CVE-2023-42754
+ https://www.cve.org/CVERecord?id=CVE-2023-4563
+ https://www.cve.org/CVERecord?id=CVE-2023-4244
+ https://www.cve.org/CVERecord?id=CVE-2023-5197
+ Fixed in 5.15.135:
+ https://www.cve.org/CVERecord?id=CVE-2023-34324
+ https://www.cve.org/CVERecord?id=CVE-2023-31085
+ https://www.cve.org/CVERecord?id=CVE-2023-5158
+ Fixed in 5.15.136:
+ https://www.cve.org/CVERecord?id=CVE-2023-35827
+ Fixed in 5.15.137:
+ https://www.cve.org/CVERecord?id=CVE-2023-46813
+ https://www.cve.org/CVERecord?id=CVE-2023-5717
+ https://www.cve.org/CVERecord?id=CVE-2023-5178
+ (* Security fix *)
+patches/packages/mozilla-firefox-115.5.0esr-x86_64-1_slack15.0.txz: Upgraded.
+ This update contains security fixes and improvements.
+ Thanks to zuriel for the taskbar icon fix on Wayland. :-)
+ For more information, see:
+ https://www.mozilla.org/en-US/firefox/115.5.0/releasenotes/
+ https://www.mozilla.org/security/advisories/mfsa2023-50/
+ https://www.cve.org/CVERecord?id=CVE-2023-6204
+ https://www.cve.org/CVERecord?id=CVE-2023-6205
+ https://www.cve.org/CVERecord?id=CVE-2023-6206
+ https://www.cve.org/CVERecord?id=CVE-2023-6207
+ https://www.cve.org/CVERecord?id=CVE-2023-6208
+ https://www.cve.org/CVERecord?id=CVE-2023-6209
+ https://www.cve.org/CVERecord?id=CVE-2023-6212
+ (* Security fix *)
++--------------------------+
Sat Nov 18 19:26:33 UTC 2023
patches/packages/ca-certificates-20231117-noarch-1_slack15.0.txz: Upgraded.
This update provides the latest CA certificates to check for the