diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-10-25 18:38:58 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-10-26 07:00:17 +0200 |
commit | 387b2bc525d80b10c96f2f6ab17e50635dd0effc (patch) | |
tree | 63c279048be8e22681aff4847a10bae899424a59 /ChangeLog.rss | |
parent | 1214d3810791ea9561cb7816e030604bf67baed5 (diff) | |
download | current-387b2bc525d80b10c96f2f6ab17e50635dd0effc.tar.gz current-387b2bc525d80b10c96f2f6ab17e50635dd0effc.tar.xz |
Tue Oct 25 18:38:58 UTC 202220221025183858
ap/alsa-utils-1.2.8-x86_64-1.txz: Upgraded.
l/alsa-lib-1.2.8-x86_64-1.txz: Upgraded.
l/expat-2.5.0-x86_64-1.txz: Upgraded.
This update fixes a security issue:
Fix heap use-after-free after overeager destruction of a shared DTD in
function XML_ExternalEntityParserCreate in out-of-memory situations.
Expected impact is denial of service or potentially arbitrary code
execution.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
(* Security fix *)
n/samba-4.17.2-x86_64-1.txz: Upgraded.
This update fixes the following security issues:
There is a limited write heap buffer overflow in the GSSAPI unwrap_des()
and unwrap_des3() routines of Heimdal (included in Samba).
A malicious client can use a symlink to escape the exported directory.
For more information, see:
https://www.samba.org/samba/security/CVE-2022-3437.html
https://www.samba.org/samba/security/CVE-2022-3592.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3592
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 36 |
1 files changed, 34 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index bb4f7f153..6047fd25f 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,42 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Mon, 24 Oct 2022 18:57:53 GMT</pubDate> - <lastBuildDate>Tue, 25 Oct 2022 05:00:15 GMT</lastBuildDate> + <pubDate>Tue, 25 Oct 2022 18:38:58 GMT</pubDate> + <lastBuildDate>Wed, 26 Oct 2022 05:00:15 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Tue, 25 Oct 2022 18:38:58 GMT</title> + <pubDate>Tue, 25 Oct 2022 18:38:58 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20221025183858</link> + <guid isPermaLink="false">20221025183858</guid> + <description> + <![CDATA[<pre> +ap/alsa-utils-1.2.8-x86_64-1.txz: Upgraded. +l/alsa-lib-1.2.8-x86_64-1.txz: Upgraded. +l/expat-2.5.0-x86_64-1.txz: Upgraded. + This update fixes a security issue: + Fix heap use-after-free after overeager destruction of a shared DTD in + function XML_ExternalEntityParserCreate in out-of-memory situations. + Expected impact is denial of service or potentially arbitrary code + execution. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680 + (* Security fix *) +n/samba-4.17.2-x86_64-1.txz: Upgraded. + This update fixes the following security issues: + There is a limited write heap buffer overflow in the GSSAPI unwrap_des() + and unwrap_des3() routines of Heimdal (included in Samba). + A malicious client can use a symlink to escape the exported directory. + For more information, see: + https://www.samba.org/samba/security/CVE-2022-3437.html + https://www.samba.org/samba/security/CVE-2022-3592.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3592 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Mon, 24 Oct 2022 18:57:53 GMT</title> <pubDate>Mon, 24 Oct 2022 18:57:53 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20221024185753</link> |