From 7a10b39e8f036460e7ea52ed953ac0fa75a76cd4 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Wed, 24 Nov 2021 20:49:02 +0000 Subject: Wed Nov 24 20:49:02 UTC 2021 kde/kopeninghours-21.08.3-x86_64-2.txz: Rebuilt. Repect $LIBDIRSUFFIX when installing the Python module. Thanks to qunying. --- ChangeLog.txt | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) (limited to 'ChangeLog.txt') diff --git a/ChangeLog.txt b/ChangeLog.txt index d4c94d51c..79838c4d2 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,24 @@ +Wed Nov 24 20:49:02 UTC 2021 +kde/kopeninghours-21.08.3-x86_64-2.txz: Rebuilt. + Repect $LIBDIRSUFFIX when installing the Python module. + Thanks to qunying. ++--------------------------+ +Wed Nov 24 19:22:57 UTC 2021 +d/ruby-3.0.3-x86_64-1.txz: Upgraded. + This update fixes bugs and security issues: + Regular Expression Denial of Service Vulnerability of Date Parsing Methods. + Buffer Overrun in CGI.escape_html. + Cookie Prefix Spoofing in CGI::Cookie.parse. + For more information, see: + http://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/ + http://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/ + http://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/ + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41816 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41819 + (* Security fix *) +l/Mako-1.1.6-x86_64-1.txz: Upgraded. ++--------------------------+ Tue Nov 23 19:44:27 UTC 2021 a/btrfs-progs-5.15.1-x86_64-1.txz: Upgraded. a/kernel-firmware-20211123_b0e898f-noarch-1.txz: Upgraded. -- cgit v1.2.3-79-gdb01