summaryrefslogtreecommitdiffstats
path: root/ChangeLog.txt
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt87
1 files changed, 86 insertions, 1 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index dfb1e7121..e2bfaba29 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,7 +1,92 @@
+Fri Aug 26 04:02:20 UTC 2022
+patches/packages/linux-5.15.63/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.39:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
+ Fixed in 5.15.40:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943
+ Fixed in 5.15.41:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
+ Fixed in 5.15.42:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
+ Fixed in 5.15.44:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
+ Fixed in 5.15.45:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
+ Fixed in 5.15.46:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973
+ Fixed in 5.15.47:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981
+ Fixed in 5.15.48:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
+ Fixed in 5.15.53:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
+ Fixed in 5.15.54:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
+ Fixed in 5.15.56:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123
+ Fixed in 5.15.57:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
+ Fixed in 5.15.58:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
+ Fixed in 5.15.59:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
+ Fixed in 5.15.60:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
+ Fixed in 5.15.61:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
+ (* Security fix *)
+patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
+ We're just going to move to vim-9 instead of continuing to backport patches
+ to the vim-8 branch. Most users will be better served by this.
+ Fixed use after free and null pointer dereference.
+ Thanks to marav for the heads-up.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
+ (* Security fix *)
+patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
++--------------------------+
Tue Aug 23 19:27:56 UTC 2022
extra/sendmail/sendmail-8.17.1-x86_64-3_slack15.0.txz: Rebuilt.
In recent versions of glibc, USE_INET6 has been removed which caused sendmail
- to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the
+ to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the
site.config.m4 allows the reverse lookups to work again fixing this issue.
Thanks to talo.
extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt.