slackware-current/source/n/openssl11
Patrick J Volkerding 5df6155d42 Wed Jul 17 19:29:24 UTC 2024
a/openssl11-solibs-1.1.1za-x86_64-1.txz:  Upgraded.
ap/vim-9.1.0595-x86_64-1.txz:  Upgraded.
l/python-sphinx-7.4.5-x86_64-1.txz:  Upgraded.
n/iproute2-6.10.0-x86_64-1.txz:  Upgraded.
n/nftables-1.1.0-x86_64-1.txz:  Upgraded.
n/openssl11-1.1.1za-x86_64-1.txz:  Upgraded.
  Apply patches to fix CVEs that were fixed by the 1.1.1{x,y,za} releases that
  were only available to subscribers to OpenSSL's premium extended support.
  These patches were prepared by backporting commits from the OpenSSL-3.0 repo.
  The reported version number has been updated so that vulnerability scanners
  calm down. All of these issues were considered to be of low severity.
  We probably won't keep 1.1.1 in -current for long anyway, but might as well
  patch it first. :-)
  Thanks to Ken Zalewski for the patches!
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-5678
    https://www.cve.org/CVERecord?id=CVE-2024-0727
    https://www.cve.org/CVERecord?id=CVE-2024-2511
    https://www.cve.org/CVERecord?id=CVE-2024-4741
    https://www.cve.org/CVERecord?id=CVE-2024-5535
  (* Security fix *)
x/mesa-24.1.4-x86_64-1.txz:  Upgraded.
xap/vim-gvim-9.1.0595-x86_64-1.txz:  Upgraded.
2024-07-17 22:04:22 +02:00
..
0000-patch-license.txt Wed Jul 17 19:29:24 UTC 2024 2024-07-17 22:04:22 +02:00
0001-openssl-1.1.1x_CVE-2023-5678_CVE-2024-0727.patch Wed Jul 17 19:29:24 UTC 2024 2024-07-17 22:04:22 +02:00
0002-openssl-1.1.1y_CVE-2024-2511_CVE-2024-4741.patch Wed Jul 17 19:29:24 UTC 2024 2024-07-17 22:04:22 +02:00
0003-openssl-1.1.1za_CVE-2024-5535.patch Wed Jul 17 19:29:24 UTC 2024 2024-07-17 22:04:22 +02:00
openssl11.SlackBuild Wed Jul 17 19:29:24 UTC 2024 2024-07-17 22:04:22 +02:00
slack-desc.openssl11 Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
slack-desc.openssl11-solibs Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00