mirror of
git://slackware.nl/current.git
synced 2024-12-27 09:59:16 +01:00
353496a7b2
a/aaa_glibc-solibs-2.36-x86_64-2.txz: Rebuilt. a/kernel-generic-5.19.2-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.2-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.2-x86_64-1.txz: Upgraded. ap/vim-9.0.0223-x86_64-1.txz: Upgraded. Fix use after free, out-of-bounds read, and heap based buffer overflow. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819 (* Security fix *) d/kernel-headers-5.19.2-x86-1.txz: Upgraded. k/kernel-source-5.19.2-noarch-1.txz: Upgraded. l/glibc-2.36-x86_64-2.txz: Rebuilt. Rebuilt with a patch from Arch to reenable DT_HASH in shared objects since the change broke Steam games that use EPIC's EAC. I'm not exactly 100% on board with this approach, but since DT_GNU_HASH remains and is still used, I guess I'll go along with it for now. Hopefully EAC will be patched and we can back this out. Thanks to Swaggajackin for the notice and for providing links to the glibc bug discussion as well as the patch. If anything else needs a rebuild after this, let me know in the LQ thread. l/glibc-i18n-2.36-x86_64-2.txz: Rebuilt. l/glibc-profile-2.36-x86_64-2.txz: Rebuilt. xap/vim-gvim-9.0.0223-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt. |
||
---|---|---|
.. | ||
reenable_DT_HASH.patch |