Patrick J Volkerding
|
39de96c169
|
Wed May 17 20:59:51 UTC 2023
a/etc-15.1-x86_64-3.txz: Rebuilt.
/etc/group: Added kvm (GID 36).
a/eudev-3.2.12-x86_64-2.txz: Rebuilt.
In 50-udev-default.rules, comment out the lines for SGX.
a/kernel-firmware-20230517_601c181-noarch-1.txz: Upgraded.
a/kernel-generic-6.1.29-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.29-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.29-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.29-x86-1.txz: Upgraded.
d/llvm-16.0.4-x86_64-1.txz: Upgraded.
k/kernel-source-6.1.29-noarch-1.txz: Upgraded.
kde/kde-cli-tools-5.27.5.1-x86_64-1.txz: Upgraded.
l/fribidi-1.0.13-x86_64-1.txz: Upgraded.
l/pipewire-0.3.71-x86_64-1.txz: Upgraded.
n/bind-9.18.15-x86_64-1.txz: Upgraded.
This is a bugfix release.
n/curl-8.1.0-x86_64-1.txz: Upgraded.
This update fixes security issues:
more POST-after-PUT confusion.
IDN wildcard match.
siglongjmp race condition.
UAF in SSH sha256 fingerprint check.
For more information, see:
https://curl.se/docs/CVE-2023-28322.html
https://curl.se/docs/CVE-2023-28321.html
https://curl.se/docs/CVE-2023-28320.html
https://curl.se/docs/CVE-2023-28319.html
https://www.cve.org/CVERecord?id=CVE-2023-28322
https://www.cve.org/CVERecord?id=CVE-2023-28321
https://www.cve.org/CVERecord?id=CVE-2023-28320
https://www.cve.org/CVERecord?id=CVE-2023-28319
(* Security fix *)
x/libwacom-2.7.0-x86_64-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
|
2023-05-17 23:46:29 +02:00 |
|