diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-01-18 06:11:54 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-01-18 08:41:55 +0100 |
commit | 9cc1c3b3609f9dadfb87ca32723780a5ba6870dc (patch) | |
tree | 87e4f3dcb5758482f2e9c8e31115c0617fe34f8b /source/a/elilo/elilo.double.kernel.size.limit.diff | |
parent | 9e8fdb324d960760cc1b344be8c49fad2c11dc7a (diff) | |
download | current-9cc1c3b3609f9dadfb87ca32723780a5ba6870dc.tar.gz current-9cc1c3b3609f9dadfb87ca32723780a5ba6870dc.tar.xz |
Wed Jan 18 06:11:54 UTC 202320230118061154
ap/diffutils-3.9-x86_64-1.txz: Upgraded.
ap/lsof-4.97.0-x86_64-1.txz: Upgraded.
ap/mpg123-1.31.2-x86_64-1.txz: Upgraded.
d/binutils-2.40-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
d/git-2.39.1-x86_64-1.txz: Upgraded.
d/oprofile-1.4.0-x86_64-11.txz: Rebuilt.
Recompiled against binutils-2.40.
n/httpd-2.4.55-x86_64-1.txz: Upgraded.
This update fixes bugs and the following security issues:
mod_proxy allows a backend to trigger HTTP response splitting.
mod_proxy_ajp possible request smuggling.
mod_dav out of bounds read, or write of zero byte.
For more information, see:
https://downloads.apache.org/httpd/CHANGES_2.4.55
https://www.cve.org/CVERecord?id=CVE-2022-37436
https://www.cve.org/CVERecord?id=CVE-2022-36760
https://www.cve.org/CVERecord?id=CVE-2006-20001
(* Security fix *)
x/ibus-libpinyin-1.15.0-x86_64-1.txz: Upgraded.
Compiled against libpinyin-2.8.1.
x/igt-gpu-tools-1.27-x86_64-1.txz: Upgraded.
x/libXpm-3.5.15-x86_64-1.txz: Upgraded.
This update fixes security issues:
Infinite loop on unclosed comments.
Runaway loop with width of 0 and enormous height.
Compression commands depend on $PATH.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2022-46285
https://www.cve.org/CVERecord?id=CVE-2022-44617
https://www.cve.org/CVERecord?id=CVE-2022-4883
(* Security fix *)
x/libinput-1.22.1-x86_64-1.txz: Upgraded.
x/libpinyin-2.8.1-x86_64-1.txz: Upgraded.
Shared library .so-version bump.
xap/mozilla-firefox-109.0-x86_64-1.txz: Upgraded.
This update contains security fixes and improvements.
Thanks to marav for the build help.
For more information, see:
https://www.mozilla.org/en-US/firefox/109.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/
https://www.cve.org/CVERecord?id=CVE-2023-23597
https://www.cve.org/CVERecord?id=CVE-2023-23598
https://www.cve.org/CVERecord?id=CVE-2023-23599
https://www.cve.org/CVERecord?id=CVE-2023-23600
https://www.cve.org/CVERecord?id=CVE-2023-23601
https://www.cve.org/CVERecord?id=CVE-2023-23602
https://www.cve.org/CVERecord?id=CVE-2023-23603
https://www.cve.org/CVERecord?id=CVE-2023-23604
https://www.cve.org/CVERecord?id=CVE-2023-23605
https://www.cve.org/CVERecord?id=CVE-2023-23606
(* Security fix *)
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions