summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-02-07 20:48:57 +0000
committer Eric Hameleers <alien@slackware.com>2023-02-07 22:33:34 +0100
commit33256c9b313396185fadd98f32053d1d3629bfc7 (patch)
tree78ab89749e4cf0d10199f89e9d46d25a514b6a6d /ChangeLog.rss
parentf46babcb81d4c4fa0c17677b16a509b890b4bd00 (diff)
downloadcurrent-33256c9b313396185fadd98f32053d1d3629bfc7.tar.gz
current-33256c9b313396185fadd98f32053d1d3629bfc7.tar.xz
Tue Feb 7 20:48:57 UTC 202320230207204857
a/openssl-solibs-1.1.1t-x86_64-1.txz: Upgraded. ap/mariadb-10.6.12-x86_64-1.txz: Upgraded. l/SDL2_image-2.6.3-x86_64-1.txz: Upgraded. l/SDL2_mixer-2.6.3-x86_64-1.txz: Upgraded. l/SDL2_ttf-2.20.2-x86_64-1.txz: Upgraded. n/openssl-1.1.1t-x86_64-1.txz: Upgraded. This update fixes security issues: X.400 address type confusion in X.509 GeneralName. Timing Oracle in RSA Decryption. Use-after-free following BIO_new_NDEF. Double free after calling PEM_read_bio_ex. For more information, see: https://www.openssl.org/news/secadv/20230207.txt https://www.cve.org/CVERecord?id=CVE-2023-0286 https://www.cve.org/CVERecord?id=CVE-2022-4304 https://www.cve.org/CVERecord?id=CVE-2023-0215 https://www.cve.org/CVERecord?id=CVE-2022-4450 (* Security fix *) x/xorg-server-21.1.7-x86_64-1.txz: Upgraded. [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0494 (* Security fix *) x/xorg-server-xephyr-21.1.7-x86_64-1.txz: Upgraded. x/xorg-server-xnest-21.1.7-x86_64-1.txz: Upgraded. x/xorg-server-xvfb-21.1.7-x86_64-1.txz: Upgraded. x/xorg-server-xwayland-22.1.8-x86_64-1.txz: Upgraded. [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-0494 (* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss45
1 files changed, 43 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 8544f3d8a..1b07a5ef4 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,51 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Mon, 6 Feb 2023 20:47:34 GMT</pubDate>
- <lastBuildDate>Mon, 6 Feb 2023 21:37:33 GMT</lastBuildDate>
+ <pubDate>Tue, 7 Feb 2023 20:48:57 GMT</pubDate>
+ <lastBuildDate>Tue, 7 Feb 2023 21:33:30 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Tue, 7 Feb 2023 20:48:57 GMT</title>
+ <pubDate>Tue, 7 Feb 2023 20:48:57 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20230207204857</link>
+ <guid isPermaLink="false">20230207204857</guid>
+ <description>
+ <![CDATA[<pre>
+a/openssl-solibs-1.1.1t-x86_64-1.txz: Upgraded.
+ap/mariadb-10.6.12-x86_64-1.txz: Upgraded.
+l/SDL2_image-2.6.3-x86_64-1.txz: Upgraded.
+l/SDL2_mixer-2.6.3-x86_64-1.txz: Upgraded.
+l/SDL2_ttf-2.20.2-x86_64-1.txz: Upgraded.
+n/openssl-1.1.1t-x86_64-1.txz: Upgraded.
+ This update fixes security issues:
+ X.400 address type confusion in X.509 GeneralName.
+ Timing Oracle in RSA Decryption.
+ Use-after-free following BIO_new_NDEF.
+ Double free after calling PEM_read_bio_ex.
+ For more information, see:
+ https://www.openssl.org/news/secadv/20230207.txt
+ https://www.cve.org/CVERecord?id=CVE-2023-0286
+ https://www.cve.org/CVERecord?id=CVE-2022-4304
+ https://www.cve.org/CVERecord?id=CVE-2023-0215
+ https://www.cve.org/CVERecord?id=CVE-2022-4450
+ (* Security fix *)
+x/xorg-server-21.1.7-x86_64-1.txz: Upgraded.
+ [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2023-0494
+ (* Security fix *)
+x/xorg-server-xephyr-21.1.7-x86_64-1.txz: Upgraded.
+x/xorg-server-xnest-21.1.7-x86_64-1.txz: Upgraded.
+x/xorg-server-xvfb-21.1.7-x86_64-1.txz: Upgraded.
+x/xorg-server-xwayland-22.1.8-x86_64-1.txz: Upgraded.
+ [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2023-0494
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Mon, 6 Feb 2023 20:47:34 GMT</title>
<pubDate>Mon, 6 Feb 2023 20:47:34 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20230206204734</link>