slackware-current/source/l/glibc/patches
Patrick J Volkerding 353496a7b2 Wed Aug 17 20:41:53 UTC 2022
a/aaa_glibc-solibs-2.36-x86_64-2.txz:  Rebuilt.
a/kernel-generic-5.19.2-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.19.2-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.19.2-x86_64-1.txz:  Upgraded.
ap/vim-9.0.0223-x86_64-1.txz:  Upgraded.
  Fix use after free, out-of-bounds read, and heap based buffer overflow.
  Thanks to marav for the heads-up.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
  (* Security fix *)
d/kernel-headers-5.19.2-x86-1.txz:  Upgraded.
k/kernel-source-5.19.2-noarch-1.txz:  Upgraded.
l/glibc-2.36-x86_64-2.txz:  Rebuilt.
  Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since
  the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on
  board with this approach, but since DT_GNU_HASH remains and is still used,
  I guess I'll go along with it for now. Hopefully EAC will be patched and we
  can back this out.
  Thanks to Swaggajackin for the notice and for providing links to the glibc
  bug discussion as well as the patch.
  If anything else needs a rebuild after this, let me know in the LQ thread.
l/glibc-i18n-2.36-x86_64-2.txz:  Rebuilt.
l/glibc-profile-2.36-x86_64-2.txz:  Rebuilt.
xap/vim-gvim-9.0.0223-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-08-18 07:00:13 +02:00
..
reenable_DT_HASH.patch Wed Aug 17 20:41:53 UTC 2022 2022-08-18 07:00:13 +02:00