diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 54 |
1 files changed, 52 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 150e2638..6eb7f4e8 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,60 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Sun, 30 Jan 2022 20:48:46 GMT</pubDate> - <lastBuildDate>Mon, 31 Jan 2022 07:59:42 GMT</lastBuildDate> + <pubDate>Tue, 1 Feb 2022 04:37:04 GMT</pubDate> + <lastBuildDate>Tue, 1 Feb 2022 07:59:42 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.13</generator> <item> + <title>Tue, 1 Feb 2022 04:37:04 GMT</title> + <pubDate>Tue, 1 Feb 2022 04:37:04 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220201043704</link> + <guid isPermaLink="false">20220201043704</guid> + <description> + <![CDATA[<pre> +The sepulchral voice intones, "The cave is now closed." +kde/falkon-3.2.0-x86_64-1.txz: Upgraded. +kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt. + [PATCH] only start programs in user's path. + [PATCH] only execute diff in path. + Thanks to gmgf. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853 + (* Security fix *) +l/libcanberra-0.30-x86_64-9.txz: Rebuilt. + Fix a bug crashing some applications in Wayland desktops. + Thanks to 01micko. +n/samba-4.15.5-x86_64-1.txz: Upgraded. + This is a security release in order to address the following defects: + UNIX extensions in SMB1 disclose whether the outside target of a symlink + exists. + Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability + allows remote attackers to execute arbitrary code as root on affected Samba + installations that use the VFS module vfs_fruit. + Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has + the ability to write to an account can exploit this to perform a + denial-of-service attack by adding an SPN that matches an existing service. + Additionally, an attacker who can intercept traffic can impersonate existing + services, resulting in a loss of confidentiality and integrity. + For more information, see: + https://www.samba.org/samba/security/CVE-2021-44141.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141 + https://www.samba.org/samba/security/CVE-2021-44142.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 + https://www.samba.org/samba/security/CVE-2022-0336.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 + (* Security fix *) +x/xterm-370-x86_64-7.txz: Rebuilt. + Rebuilt with --disable-sixel-graphics to fix a buffer overflow. + Thanks to gmgf. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130 + (* Security fix *) +testing/source/linux-5.16.4-configs/*: Added. + Sample config files to build 5.16.4 Linux kernels. + </pre>]]> + </description> + </item> + <item> <title>Sun, 30 Jan 2022 20:48:46 GMT</title> <pubDate>Sun, 30 Jan 2022 20:48:46 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220130204846</link> |