summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-10-25 18:38:58 +0000
committer Eric Hameleers <alien@slackware.com>2022-10-26 07:00:17 +0200
commit387b2bc525d80b10c96f2f6ab17e50635dd0effc (patch)
tree63c279048be8e22681aff4847a10bae899424a59 /ChangeLog.rss
parent1214d3810791ea9561cb7816e030604bf67baed5 (diff)
downloadcurrent-387b2bc525d80b10c96f2f6ab17e50635dd0effc.tar.gz
current-387b2bc525d80b10c96f2f6ab17e50635dd0effc.tar.xz
Tue Oct 25 18:38:58 UTC 202220221025183858
ap/alsa-utils-1.2.8-x86_64-1.txz: Upgraded. l/alsa-lib-1.2.8-x86_64-1.txz: Upgraded. l/expat-2.5.0-x86_64-1.txz: Upgraded. This update fixes a security issue: Fix heap use-after-free after overeager destruction of a shared DTD in function XML_ExternalEntityParserCreate in out-of-memory situations. Expected impact is denial of service or potentially arbitrary code execution. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680 (* Security fix *) n/samba-4.17.2-x86_64-1.txz: Upgraded. This update fixes the following security issues: There is a limited write heap buffer overflow in the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal (included in Samba). A malicious client can use a symlink to escape the exported directory. For more information, see: https://www.samba.org/samba/security/CVE-2022-3437.html https://www.samba.org/samba/security/CVE-2022-3592.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3592 (* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss36
1 files changed, 34 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index bb4f7f153..6047fd25f 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,42 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Mon, 24 Oct 2022 18:57:53 GMT</pubDate>
- <lastBuildDate>Tue, 25 Oct 2022 05:00:15 GMT</lastBuildDate>
+ <pubDate>Tue, 25 Oct 2022 18:38:58 GMT</pubDate>
+ <lastBuildDate>Wed, 26 Oct 2022 05:00:15 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Tue, 25 Oct 2022 18:38:58 GMT</title>
+ <pubDate>Tue, 25 Oct 2022 18:38:58 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20221025183858</link>
+ <guid isPermaLink="false">20221025183858</guid>
+ <description>
+ <![CDATA[<pre>
+ap/alsa-utils-1.2.8-x86_64-1.txz: Upgraded.
+l/alsa-lib-1.2.8-x86_64-1.txz: Upgraded.
+l/expat-2.5.0-x86_64-1.txz: Upgraded.
+ This update fixes a security issue:
+ Fix heap use-after-free after overeager destruction of a shared DTD in
+ function XML_ExternalEntityParserCreate in out-of-memory situations.
+ Expected impact is denial of service or potentially arbitrary code
+ execution.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
+ (* Security fix *)
+n/samba-4.17.2-x86_64-1.txz: Upgraded.
+ This update fixes the following security issues:
+ There is a limited write heap buffer overflow in the GSSAPI unwrap_des()
+ and unwrap_des3() routines of Heimdal (included in Samba).
+ A malicious client can use a symlink to escape the exported directory.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2022-3437.html
+ https://www.samba.org/samba/security/CVE-2022-3592.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3592
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Mon, 24 Oct 2022 18:57:53 GMT</title>
<pubDate>Mon, 24 Oct 2022 18:57:53 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20221024185753</link>