diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-02-07 20:48:57 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-02-07 22:33:34 +0100 |
commit | 33256c9b313396185fadd98f32053d1d3629bfc7 (patch) | |
tree | 78ab89749e4cf0d10199f89e9d46d25a514b6a6d /ChangeLog.rss | |
parent | f46babcb81d4c4fa0c17677b16a509b890b4bd00 (diff) | |
download | current-33256c9b313396185fadd98f32053d1d3629bfc7.tar.gz current-33256c9b313396185fadd98f32053d1d3629bfc7.tar.xz |
Tue Feb 7 20:48:57 UTC 202320230207204857
a/openssl-solibs-1.1.1t-x86_64-1.txz: Upgraded.
ap/mariadb-10.6.12-x86_64-1.txz: Upgraded.
l/SDL2_image-2.6.3-x86_64-1.txz: Upgraded.
l/SDL2_mixer-2.6.3-x86_64-1.txz: Upgraded.
l/SDL2_ttf-2.20.2-x86_64-1.txz: Upgraded.
n/openssl-1.1.1t-x86_64-1.txz: Upgraded.
This update fixes security issues:
X.400 address type confusion in X.509 GeneralName.
Timing Oracle in RSA Decryption.
Use-after-free following BIO_new_NDEF.
Double free after calling PEM_read_bio_ex.
For more information, see:
https://www.openssl.org/news/secadv/20230207.txt
https://www.cve.org/CVERecord?id=CVE-2023-0286
https://www.cve.org/CVERecord?id=CVE-2022-4304
https://www.cve.org/CVERecord?id=CVE-2023-0215
https://www.cve.org/CVERecord?id=CVE-2022-4450
(* Security fix *)
x/xorg-server-21.1.7-x86_64-1.txz: Upgraded.
[PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0494
(* Security fix *)
x/xorg-server-xephyr-21.1.7-x86_64-1.txz: Upgraded.
x/xorg-server-xnest-21.1.7-x86_64-1.txz: Upgraded.
x/xorg-server-xvfb-21.1.7-x86_64-1.txz: Upgraded.
x/xorg-server-xwayland-22.1.8-x86_64-1.txz: Upgraded.
[PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-0494
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 45 |
1 files changed, 43 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 8544f3d8a..1b07a5ef4 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,51 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Mon, 6 Feb 2023 20:47:34 GMT</pubDate> - <lastBuildDate>Mon, 6 Feb 2023 21:37:33 GMT</lastBuildDate> + <pubDate>Tue, 7 Feb 2023 20:48:57 GMT</pubDate> + <lastBuildDate>Tue, 7 Feb 2023 21:33:30 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Tue, 7 Feb 2023 20:48:57 GMT</title> + <pubDate>Tue, 7 Feb 2023 20:48:57 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20230207204857</link> + <guid isPermaLink="false">20230207204857</guid> + <description> + <![CDATA[<pre> +a/openssl-solibs-1.1.1t-x86_64-1.txz: Upgraded. +ap/mariadb-10.6.12-x86_64-1.txz: Upgraded. +l/SDL2_image-2.6.3-x86_64-1.txz: Upgraded. +l/SDL2_mixer-2.6.3-x86_64-1.txz: Upgraded. +l/SDL2_ttf-2.20.2-x86_64-1.txz: Upgraded. +n/openssl-1.1.1t-x86_64-1.txz: Upgraded. + This update fixes security issues: + X.400 address type confusion in X.509 GeneralName. + Timing Oracle in RSA Decryption. + Use-after-free following BIO_new_NDEF. + Double free after calling PEM_read_bio_ex. + For more information, see: + https://www.openssl.org/news/secadv/20230207.txt + https://www.cve.org/CVERecord?id=CVE-2023-0286 + https://www.cve.org/CVERecord?id=CVE-2022-4304 + https://www.cve.org/CVERecord?id=CVE-2023-0215 + https://www.cve.org/CVERecord?id=CVE-2022-4450 + (* Security fix *) +x/xorg-server-21.1.7-x86_64-1.txz: Upgraded. + [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-0494 + (* Security fix *) +x/xorg-server-xephyr-21.1.7-x86_64-1.txz: Upgraded. +x/xorg-server-xnest-21.1.7-x86_64-1.txz: Upgraded. +x/xorg-server-xvfb-21.1.7-x86_64-1.txz: Upgraded. +x/xorg-server-xwayland-22.1.8-x86_64-1.txz: Upgraded. + [PATCH] Xi: fix potential use-after-free in DeepCopyPointerClasses. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-0494 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Mon, 6 Feb 2023 20:47:34 GMT</title> <pubDate>Mon, 6 Feb 2023 20:47:34 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20230206204734</link> |