summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-12-19 21:24:05 +0000
committer Eric Hameleers <alien@slackware.com>2023-12-19 23:05:28 +0100
commit90c1d5c2c0b15a877ad7b260895a7815bdd4d03c (patch)
treee83aca23a86ea9853c0f3621b7a8a363071ea235 /ChangeLog.rss
parent1e5164fb6d699f5f0feea33ff1ad0d0468ec6f62 (diff)
downloadcurrent-90c1d5c2c0b15a877ad7b260895a7815bdd4d03c.tar.gz
current-90c1d5c2c0b15a877ad7b260895a7815bdd4d03c.tar.xz
Tue Dec 19 21:24:05 UTC 202320231219212405
a/sysvinit-scripts-15.1-noarch-9.txz: Rebuilt. rc.cpufreq: also default to "performance" for amd-pstate-epp. Thanks to pghvlaans. l/LibRaw-0.21.2-x86_64-1.txz: Upgraded. l/gtk+3-3.24.39-x86_64-1.txz: Upgraded. l/libssh-0.10.6-x86_64-1.txz: Upgraded. This update fixes security issues: Command injection using proxycommand. Potential downgrade attack using strict kex. Missing checks for return values of MD functions. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-6004 https://www.cve.org/CVERecord?id=CVE-2023-48795 https://www.cve.org/CVERecord?id=CVE-2023-6918 (* Security fix *) l/mozilla-nss-3.96.1-x86_64-1.txz: Upgraded. n/bluez-5.71-x86_64-2.txz: Rebuilt. Fix a regression in bluez-5.71: [PATCH] adapter: Fix link key address type for old kernels. Thanks to marav. xap/mozilla-firefox-115.6.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2023-54/ https://www.cve.org/CVERecord?id=CVE-2023-6856 https://www.cve.org/CVERecord?id=CVE-2023-6865 https://www.cve.org/CVERecord?id=CVE-2023-6857 https://www.cve.org/CVERecord?id=CVE-2023-6858 https://www.cve.org/CVERecord?id=CVE-2023-6859 https://www.cve.org/CVERecord?id=CVE-2023-6860 https://www.cve.org/CVERecord?id=CVE-2023-6867 https://www.cve.org/CVERecord?id=CVE-2023-6861 https://www.cve.org/CVERecord?id=CVE-2023-6862 https://www.cve.org/CVERecord?id=CVE-2023-6863 https://www.cve.org/CVERecord?id=CVE-2023-6864 (* Security fix *) xap/mozilla-thunderbird-115.6.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.thunderbird.net/en-US/thunderbird/115.6.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2023-55/ https://www.cve.org/CVERecord?id=CVE-2023-50762 https://www.cve.org/CVERecord?id=CVE-2023-50761 https://www.cve.org/CVERecord?id=CVE-2023-6856 https://www.cve.org/CVERecord?id=CVE-2023-6857 https://www.cve.org/CVERecord?id=CVE-2023-6858 https://www.cve.org/CVERecord?id=CVE-2023-6859 https://www.cve.org/CVERecord?id=CVE-2023-6860 https://www.cve.org/CVERecord?id=CVE-2023-6861 https://www.cve.org/CVERecord?id=CVE-2023-6862 https://www.cve.org/CVERecord?id=CVE-2023-6863 https://www.cve.org/CVERecord?id=CVE-2023-6864 (* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss68
1 files changed, 66 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index f79ab06c6..6b8d5f9f8 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,74 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Mon, 18 Dec 2023 20:22:40 GMT</pubDate>
- <lastBuildDate>Mon, 18 Dec 2023 20:59:14 GMT</lastBuildDate>
+ <pubDate>Tue, 19 Dec 2023 21:24:05 GMT</pubDate>
+ <lastBuildDate>Tue, 19 Dec 2023 22:05:23 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Tue, 19 Dec 2023 21:24:05 GMT</title>
+ <pubDate>Tue, 19 Dec 2023 21:24:05 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20231219212405</link>
+ <guid isPermaLink="false">20231219212405</guid>
+ <description>
+ <![CDATA[<pre>
+a/sysvinit-scripts-15.1-noarch-9.txz: Rebuilt.
+ rc.cpufreq: also default to "performance" for amd-pstate-epp.
+ Thanks to pghvlaans.
+l/LibRaw-0.21.2-x86_64-1.txz: Upgraded.
+l/gtk+3-3.24.39-x86_64-1.txz: Upgraded.
+l/libssh-0.10.6-x86_64-1.txz: Upgraded.
+ This update fixes security issues:
+ Command injection using proxycommand.
+ Potential downgrade attack using strict kex.
+ Missing checks for return values of MD functions.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2023-6004
+ https://www.cve.org/CVERecord?id=CVE-2023-48795
+ https://www.cve.org/CVERecord?id=CVE-2023-6918
+ (* Security fix *)
+l/mozilla-nss-3.96.1-x86_64-1.txz: Upgraded.
+n/bluez-5.71-x86_64-2.txz: Rebuilt.
+ Fix a regression in bluez-5.71:
+ [PATCH] adapter: Fix link key address type for old kernels.
+ Thanks to marav.
+xap/mozilla-firefox-115.6.0esr-x86_64-1.txz: Upgraded.
+ This update contains security fixes and improvements.
+ For more information, see:
+ https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/
+ https://www.mozilla.org/security/advisories/mfsa2023-54/
+ https://www.cve.org/CVERecord?id=CVE-2023-6856
+ https://www.cve.org/CVERecord?id=CVE-2023-6865
+ https://www.cve.org/CVERecord?id=CVE-2023-6857
+ https://www.cve.org/CVERecord?id=CVE-2023-6858
+ https://www.cve.org/CVERecord?id=CVE-2023-6859
+ https://www.cve.org/CVERecord?id=CVE-2023-6860
+ https://www.cve.org/CVERecord?id=CVE-2023-6867
+ https://www.cve.org/CVERecord?id=CVE-2023-6861
+ https://www.cve.org/CVERecord?id=CVE-2023-6862
+ https://www.cve.org/CVERecord?id=CVE-2023-6863
+ https://www.cve.org/CVERecord?id=CVE-2023-6864
+ (* Security fix *)
+xap/mozilla-thunderbird-115.6.0-x86_64-1.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ https://www.thunderbird.net/en-US/thunderbird/115.6.0/releasenotes/
+ https://www.mozilla.org/en-US/security/advisories/mfsa2023-55/
+ https://www.cve.org/CVERecord?id=CVE-2023-50762
+ https://www.cve.org/CVERecord?id=CVE-2023-50761
+ https://www.cve.org/CVERecord?id=CVE-2023-6856
+ https://www.cve.org/CVERecord?id=CVE-2023-6857
+ https://www.cve.org/CVERecord?id=CVE-2023-6858
+ https://www.cve.org/CVERecord?id=CVE-2023-6859
+ https://www.cve.org/CVERecord?id=CVE-2023-6860
+ https://www.cve.org/CVERecord?id=CVE-2023-6861
+ https://www.cve.org/CVERecord?id=CVE-2023-6862
+ https://www.cve.org/CVERecord?id=CVE-2023-6863
+ https://www.cve.org/CVERecord?id=CVE-2023-6864
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Mon, 18 Dec 2023 20:22:40 GMT</title>
<pubDate>Mon, 18 Dec 2023 20:22:40 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20231218202240</link>