diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-09-30 17:52:21 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-10-01 13:30:35 +0200 |
commit | 3087018ea7a666f6feb8780f5a569da2b5a6d850 (patch) | |
tree | 8d745840b36055f411ad40936bb398989a0a9a1a /source/n/nss-pam-ldapd/b33551895b3c02dc7082363c6aae13f8e336f4e5.patch | |
parent | ef823d82cabc33b5dd73c78fbe3a23caedd88311 (diff) | |
download | current-3087018ea7a666f6feb8780f5a569da2b5a6d850.tar.gz |
Fri Sep 30 17:52:21 UTC 202220220930175221_15.0
extra/php80/php80-8.0.24-x86_64-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues:
phar wrapper: DOS when using quine gzip file.
Don't mangle HTTP variable names that clash with ones that have a specific
semantic meaning.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
(* Security fix *)
extra/php81/php81-8.1.11-x86_64-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues:
phar wrapper: DOS when using quine gzip file.
Don't mangle HTTP variable names that clash with ones that have a specific
semantic meaning.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
(* Security fix *)
patches/packages/mozilla-thunderbird-102.3.1-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/thunderbird/102.3.1/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2022-43/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236
(* Security fix *)
patches/packages/php-7.4.32-x86_64-1_slack15.0.txz: Upgraded.
This update fixes bugs and security issues:
phar wrapper: DOS when using quine gzip file.
Don't mangle HTTP variable names that clash with ones that have a specific
semantic meaning.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629
(* Security fix *)
patches/packages/seamonkey-2.53.14-x86_64-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.seamonkey-project.org/releases/seamonkey2.53.14
(* Security fix *)
patches/packages/vim-9.0.0623-x86_64-1_slack15.0.txz: Upgraded.
Fixed use-after-free and stack-based buffer overflow.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3324
(* Security fix *)
patches/packages/vim-gvim-9.0.0623-x86_64-1_slack15.0.txz: Upgraded.
Diffstat (limited to 'source/n/nss-pam-ldapd/b33551895b3c02dc7082363c6aae13f8e336f4e5.patch')
0 files changed, 0 insertions, 0 deletions