summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-11-29 20:56:03 +0000
committer Eric Hameleers <alien@slackware.com>2022-11-30 13:30:31 +0100
commitcd369db34258015c83a2a2fb68f75dff0237f748 (patch)
tree3b4efffbe5ef1e3f2156011df183ddffbcb516ab /ChangeLog.rss
parent52b2b8f314bf13b8191b38b453dba1c0db6dd9b1 (diff)
downloadcurrent-cd369db34258015c83a2a2fb68f75dff0237f748.tar.gz
current-cd369db34258015c83a2a2fb68f75dff0237f748.tar.xz
Tue Nov 29 20:56:03 UTC 202220221129205603_15.0
patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded. patches/packages/linux-5.15.80/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.63: https://www.cve.org/CVERecord?id=CVE-2022-3629 https://www.cve.org/CVERecord?id=CVE-2022-3635 https://www.cve.org/CVERecord?id=CVE-2022-3633 https://www.cve.org/CVERecord?id=CVE-2022-3625 Fixed in 5.15.64: https://www.cve.org/CVERecord?id=CVE-2022-39190 https://www.cve.org/CVERecord?id=CVE-2022-3028 https://www.cve.org/CVERecord?id=CVE-2022-2905 Fixed in 5.15.65: https://www.cve.org/CVERecord?id=CVE-2022-42703 https://www.cve.org/CVERecord?id=CVE-2022-3176 Fixed in 5.15.66: https://www.cve.org/CVERecord?id=CVE-2022-4095 https://www.cve.org/CVERecord?id=CVE-2022-20421 Fixed in 5.15.68: https://www.cve.org/CVERecord?id=CVE-2022-3303 https://www.cve.org/CVERecord?id=CVE-2022-2663 https://www.cve.org/CVERecord?id=CVE-2022-40307 https://www.cve.org/CVERecord?id=CVE-2022-3586 Fixed in 5.15.70: https://www.cve.org/CVERecord?id=CVE-2022-0171 https://www.cve.org/CVERecord?id=CVE-2022-39842 https://www.cve.org/CVERecord?id=CVE-2022-3061 Fixed in 5.15.72: https://www.cve.org/CVERecord?id=CVE-2022-2308 Fixed in 5.15.73: https://www.cve.org/CVERecord?id=CVE-2022-2978 https://www.cve.org/CVERecord?id=CVE-2022-43750 Fixed in 5.15.74: https://www.cve.org/CVERecord?id=CVE-2022-40768 https://www.cve.org/CVERecord?id=CVE-2022-42721 https://www.cve.org/CVERecord?id=CVE-2022-3621 https://www.cve.org/CVERecord?id=CVE-2022-42722 https://www.cve.org/CVERecord?id=CVE-2022-42719 https://www.cve.org/CVERecord?id=CVE-2022-41674 https://www.cve.org/CVERecord?id=CVE-2022-3649 https://www.cve.org/CVERecord?id=CVE-2022-3646 https://www.cve.org/CVERecord?id=CVE-2022-42720 Fixed in 5.15.75: https://www.cve.org/CVERecord?id=CVE-2022-43945 https://www.cve.org/CVERecord?id=CVE-2022-41849 https://www.cve.org/CVERecord?id=CVE-2022-3535 https://www.cve.org/CVERecord?id=CVE-2022-3594 https://www.cve.org/CVERecord?id=CVE-2022-2602 https://www.cve.org/CVERecord?id=CVE-2022-41850 https://www.cve.org/CVERecord?id=CVE-2022-3565 https://www.cve.org/CVERecord?id=CVE-2022-3542 Fixed in 5.15.77: https://www.cve.org/CVERecord?id=CVE-2022-3524 Fixed in 5.15.78: https://www.cve.org/CVERecord?id=CVE-2022-3628 https://www.cve.org/CVERecord?id=CVE-2022-3623 https://www.cve.org/CVERecord?id=CVE-2022-42896 https://www.cve.org/CVERecord?id=CVE-2022-42895 https://www.cve.org/CVERecord?id=CVE-2022-3543 https://www.cve.org/CVERecord?id=CVE-2022-3564 https://www.cve.org/CVERecord?id=CVE-2022-3619 Fixed in 5.15.80: https://www.cve.org/CVERecord?id=CVE-2022-3521 https://www.cve.org/CVERecord?id=CVE-2022-3169 (* Security fix *) patches/packages/openssl-1.1.1s-x86_64-1_slack15.0.txz: Upgraded. This is a bugfix release. patches/packages/openssl-solibs-1.1.1s-x86_64-1_slack15.0.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss88
1 files changed, 86 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 62897ee29..1340c4577 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,94 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Thu, 24 Nov 2022 20:55:37 GMT</pubDate>
- <lastBuildDate>Fri, 25 Nov 2022 12:30:45 GMT</lastBuildDate>
+ <pubDate>Tue, 29 Nov 2022 20:56:03 GMT</pubDate>
+ <lastBuildDate>Wed, 30 Nov 2022 12:30:18 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Tue, 29 Nov 2022 20:56:03 GMT</title>
+ <pubDate>Tue, 29 Nov 2022 20:56:03 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20221129205603</link>
+ <guid isPermaLink="false">20221129205603</guid>
+ <description>
+ <![CDATA[<pre>
+patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded.
+patches/packages/linux-5.15.80/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.63:
+ https://www.cve.org/CVERecord?id=CVE-2022-3629
+ https://www.cve.org/CVERecord?id=CVE-2022-3635
+ https://www.cve.org/CVERecord?id=CVE-2022-3633
+ https://www.cve.org/CVERecord?id=CVE-2022-3625
+ Fixed in 5.15.64:
+ https://www.cve.org/CVERecord?id=CVE-2022-39190
+ https://www.cve.org/CVERecord?id=CVE-2022-3028
+ https://www.cve.org/CVERecord?id=CVE-2022-2905
+ Fixed in 5.15.65:
+ https://www.cve.org/CVERecord?id=CVE-2022-42703
+ https://www.cve.org/CVERecord?id=CVE-2022-3176
+ Fixed in 5.15.66:
+ https://www.cve.org/CVERecord?id=CVE-2022-4095
+ https://www.cve.org/CVERecord?id=CVE-2022-20421
+ Fixed in 5.15.68:
+ https://www.cve.org/CVERecord?id=CVE-2022-3303
+ https://www.cve.org/CVERecord?id=CVE-2022-2663
+ https://www.cve.org/CVERecord?id=CVE-2022-40307
+ https://www.cve.org/CVERecord?id=CVE-2022-3586
+ Fixed in 5.15.70:
+ https://www.cve.org/CVERecord?id=CVE-2022-0171
+ https://www.cve.org/CVERecord?id=CVE-2022-39842
+ https://www.cve.org/CVERecord?id=CVE-2022-3061
+ Fixed in 5.15.72:
+ https://www.cve.org/CVERecord?id=CVE-2022-2308
+ Fixed in 5.15.73:
+ https://www.cve.org/CVERecord?id=CVE-2022-2978
+ https://www.cve.org/CVERecord?id=CVE-2022-43750
+ Fixed in 5.15.74:
+ https://www.cve.org/CVERecord?id=CVE-2022-40768
+ https://www.cve.org/CVERecord?id=CVE-2022-42721
+ https://www.cve.org/CVERecord?id=CVE-2022-3621
+ https://www.cve.org/CVERecord?id=CVE-2022-42722
+ https://www.cve.org/CVERecord?id=CVE-2022-42719
+ https://www.cve.org/CVERecord?id=CVE-2022-41674
+ https://www.cve.org/CVERecord?id=CVE-2022-3649
+ https://www.cve.org/CVERecord?id=CVE-2022-3646
+ https://www.cve.org/CVERecord?id=CVE-2022-42720
+ Fixed in 5.15.75:
+ https://www.cve.org/CVERecord?id=CVE-2022-43945
+ https://www.cve.org/CVERecord?id=CVE-2022-41849
+ https://www.cve.org/CVERecord?id=CVE-2022-3535
+ https://www.cve.org/CVERecord?id=CVE-2022-3594
+ https://www.cve.org/CVERecord?id=CVE-2022-2602
+ https://www.cve.org/CVERecord?id=CVE-2022-41850
+ https://www.cve.org/CVERecord?id=CVE-2022-3565
+ https://www.cve.org/CVERecord?id=CVE-2022-3542
+ Fixed in 5.15.77:
+ https://www.cve.org/CVERecord?id=CVE-2022-3524
+ Fixed in 5.15.78:
+ https://www.cve.org/CVERecord?id=CVE-2022-3628
+ https://www.cve.org/CVERecord?id=CVE-2022-3623
+ https://www.cve.org/CVERecord?id=CVE-2022-42896
+ https://www.cve.org/CVERecord?id=CVE-2022-42895
+ https://www.cve.org/CVERecord?id=CVE-2022-3543
+ https://www.cve.org/CVERecord?id=CVE-2022-3564
+ https://www.cve.org/CVERecord?id=CVE-2022-3619
+ Fixed in 5.15.80:
+ https://www.cve.org/CVERecord?id=CVE-2022-3521
+ https://www.cve.org/CVERecord?id=CVE-2022-3169
+ (* Security fix *)
+patches/packages/openssl-1.1.1s-x86_64-1_slack15.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/openssl-solibs-1.1.1s-x86_64-1_slack15.0.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Thu, 24 Nov 2022 20:55:37 GMT</title>
<pubDate>Thu, 24 Nov 2022 20:55:37 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20221124205537</link>