summaryrefslogtreecommitdiffstats
path: root/ChangeLog.txt
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-06-08 19:15:34 +0000
committer Eric Hameleers <alien@slackware.com>2022-06-09 07:00:13 +0200
commitf2dca0d8e5bb1a775ec7d38701ed85451913b31f (patch)
treec9f0e10709bbc664ee98c4c90780d9ff3dcb718d /ChangeLog.txt
parent0c63f7504daccbf4cc384855d9728d40e8c64eae (diff)
downloadcurrent-f2dca0d8e5bb1a775ec7d38701ed85451913b31f.tar.gz
current-f2dca0d8e5bb1a775ec7d38701ed85451913b31f.tar.xz
Wed Jun 8 19:15:34 UTC 202220220608191534
ap/sudo-1.9.11p1-x86_64-1.txz: Upgraded. kde/digikam-7.6.0-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.6.0. l/gst-plugins-bad-free-1.20.2-x86_64-2.txz: Rebuilt. Recompiled against opencv-4.6.0. l/opencv-4.6.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/NetworkManager-1.36.6-x86_64-1.txz: Upgraded. n/epic5-2.1.11-x86_64-1.txz: Upgraded. n/httpd-2.4.54-x86_64-1.txz: Upgraded. This update fixes bugs and the following security issues: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism. Information Disclosure in mod_lua with websockets. mod_sed denial of service. Denial of service in mod_lua r:parsebody. Read beyond bounds in ap_strcmp_match(). Read beyond bounds via ap_rwrite(). Read beyond bounds in mod_isapi. mod_proxy_ajp: Possible request smuggling. For more information, see: https://downloads.apache.org/httpd/CHANGES_2.4.54 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377 (* Security fix *) n/libnftnl-1.2.2-x86_64-1.txz: Upgraded. n/nftables-1.0.4-x86_64-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt34
1 files changed, 34 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index c78195ccb..c888b9fe3 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,37 @@
+Wed Jun 8 19:15:34 UTC 2022
+ap/sudo-1.9.11p1-x86_64-1.txz: Upgraded.
+kde/digikam-7.6.0-x86_64-2.txz: Rebuilt.
+ Recompiled against opencv-4.6.0.
+l/gst-plugins-bad-free-1.20.2-x86_64-2.txz: Rebuilt.
+ Recompiled against opencv-4.6.0.
+l/opencv-4.6.0-x86_64-1.txz: Upgraded.
+ Shared library .so-version bump.
+n/NetworkManager-1.36.6-x86_64-1.txz: Upgraded.
+n/epic5-2.1.11-x86_64-1.txz: Upgraded.
+n/httpd-2.4.54-x86_64-1.txz: Upgraded.
+ This update fixes bugs and the following security issues:
+ mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism.
+ Information Disclosure in mod_lua with websockets.
+ mod_sed denial of service.
+ Denial of service in mod_lua r:parsebody.
+ Read beyond bounds in ap_strcmp_match().
+ Read beyond bounds via ap_rwrite().
+ Read beyond bounds in mod_isapi.
+ mod_proxy_ajp: Possible request smuggling.
+ For more information, see:
+ https://downloads.apache.org/httpd/CHANGES_2.4.54
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
+ (* Security fix *)
+n/libnftnl-1.2.2-x86_64-1.txz: Upgraded.
+n/nftables-1.0.4-x86_64-1.txz: Upgraded.
++--------------------------+
Mon Jun 6 20:57:15 UTC 2022
a/btrfs-progs-5.18.1-x86_64-1.txz: Upgraded.
a/kernel-generic-5.17.13-x86_64-1.txz: Upgraded.