summaryrefslogtreecommitdiffstats
path: root/ChangeLog.txt
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-02-18 02:04:34 +0000
committer Eric Hameleers <alien@slackware.com>2023-02-18 13:30:11 +0100
commitf3eb859afcec1996ea955cb993c3ab8fd441d605 (patch)
treebd2715d397df4f175f2131e5317694744d45e72b /ChangeLog.txt
parent1ae65ae489cb3581a1231fb71008e3240788be74 (diff)
downloadcurrent-f3eb859afcec1996ea955cb993c3ab8fd441d605.tar.gz
current-f3eb859afcec1996ea955cb993c3ab8fd441d605.tar.xz
Sat Feb 18 02:04:34 UTC 202320230218020434_15.0
patches/packages/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded. patches/packages/linux-5.15.80/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.81: https://www.cve.org/CVERecord?id=CVE-2022-47519 https://www.cve.org/CVERecord?id=CVE-2022-47518 https://www.cve.org/CVERecord?id=CVE-2022-47520 https://www.cve.org/CVERecord?id=CVE-2022-47521 https://www.cve.org/CVERecord?id=CVE-2022-3344 Fixed in 5.15.82: https://www.cve.org/CVERecord?id=CVE-2022-45869 https://www.cve.org/CVERecord?id=CVE-2022-4378 Fixed in 5.15.83: https://www.cve.org/CVERecord?id=CVE-2022-3643 Fixed in 5.15.84: https://www.cve.org/CVERecord?id=CVE-2022-3545 Fixed in 5.15.85: https://www.cve.org/CVERecord?id=CVE-2022-45934 Fixed in 5.15.86: https://www.cve.org/CVERecord?id=CVE-2022-3534 https://www.cve.org/CVERecord?id=CVE-2022-3424 Fixed in 5.15.87: https://www.cve.org/CVERecord?id=CVE-2022-41218 https://www.cve.org/CVERecord?id=CVE-2023-23455 https://www.cve.org/CVERecord?id=CVE-2023-23454 https://www.cve.org/CVERecord?id=CVE-2023-0045 https://www.cve.org/CVERecord?id=CVE-2023-0210 https://www.cve.org/CVERecord?id=CVE-2022-36280 Fixed in 5.15.88: https://www.cve.org/CVERecord?id=CVE-2023-0266 https://www.cve.org/CVERecord?id=CVE-2022-47929 Fixed in 5.15.89: https://www.cve.org/CVERecord?id=CVE-2023-0179 https://www.cve.org/CVERecord?id=CVE-2023-0394 Fixed in 5.15.90: https://www.cve.org/CVERecord?id=CVE-2022-4382 https://www.cve.org/CVERecord?id=CVE-2022-4842 Fixed in 5.15.91: https://www.cve.org/CVERecord?id=CVE-2022-4129 https://www.cve.org/CVERecord?id=CVE-2023-23559 (* Security fix *)
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt49
1 files changed, 49 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 5d7eb92e9..a5f9475f5 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,52 @@
+Sat Feb 18 02:04:34 UTC 2023
+patches/packages/kernel-firmware-20230214_a253a37-noarch-1.txz: Upgraded.
+patches/packages/linux-5.15.80/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.81:
+ https://www.cve.org/CVERecord?id=CVE-2022-47519
+ https://www.cve.org/CVERecord?id=CVE-2022-47518
+ https://www.cve.org/CVERecord?id=CVE-2022-47520
+ https://www.cve.org/CVERecord?id=CVE-2022-47521
+ https://www.cve.org/CVERecord?id=CVE-2022-3344
+ Fixed in 5.15.82:
+ https://www.cve.org/CVERecord?id=CVE-2022-45869
+ https://www.cve.org/CVERecord?id=CVE-2022-4378
+ Fixed in 5.15.83:
+ https://www.cve.org/CVERecord?id=CVE-2022-3643
+ Fixed in 5.15.84:
+ https://www.cve.org/CVERecord?id=CVE-2022-3545
+ Fixed in 5.15.85:
+ https://www.cve.org/CVERecord?id=CVE-2022-45934
+ Fixed in 5.15.86:
+ https://www.cve.org/CVERecord?id=CVE-2022-3534
+ https://www.cve.org/CVERecord?id=CVE-2022-3424
+ Fixed in 5.15.87:
+ https://www.cve.org/CVERecord?id=CVE-2022-41218
+ https://www.cve.org/CVERecord?id=CVE-2023-23455
+ https://www.cve.org/CVERecord?id=CVE-2023-23454
+ https://www.cve.org/CVERecord?id=CVE-2023-0045
+ https://www.cve.org/CVERecord?id=CVE-2023-0210
+ https://www.cve.org/CVERecord?id=CVE-2022-36280
+ Fixed in 5.15.88:
+ https://www.cve.org/CVERecord?id=CVE-2023-0266
+ https://www.cve.org/CVERecord?id=CVE-2022-47929
+ Fixed in 5.15.89:
+ https://www.cve.org/CVERecord?id=CVE-2023-0179
+ https://www.cve.org/CVERecord?id=CVE-2023-0394
+ Fixed in 5.15.90:
+ https://www.cve.org/CVERecord?id=CVE-2022-4382
+ https://www.cve.org/CVERecord?id=CVE-2022-4842
+ Fixed in 5.15.91:
+ https://www.cve.org/CVERecord?id=CVE-2022-4129
+ https://www.cve.org/CVERecord?id=CVE-2023-23559
+ (* Security fix *)
++--------------------------+
Thu Feb 16 22:07:06 UTC 2023
patches/packages/mozilla-thunderbird-102.8.0-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.