diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 97 |
1 files changed, 95 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index ab0f3473..78ece23f 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,103 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 14 Aug 2018 22:56:09 GMT</pubDate> - <lastBuildDate>Wed, 15 Aug 2018 07:00:26 GMT</lastBuildDate> + <pubDate>Sat, 18 Aug 2018 02:09:51 GMT</pubDate> + <lastBuildDate>Sat, 18 Aug 2018 07:00:29 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.10</generator> <item> + <title>Sat, 18 Aug 2018 02:09:51 GMT</title> + <pubDate>Sat, 18 Aug 2018 02:09:51 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20180818020951</link> + <guid isPermaLink="false">20180818020951</guid> + <description> + <![CDATA[<pre> +a/kernel-generic-4.14.64-x86_64-1.txz: Upgraded. +a/kernel-huge-4.14.64-x86_64-1.txz: Upgraded. +a/kernel-modules-4.14.64-x86_64-1.txz: Upgraded. +d/kernel-headers-4.14.64-x86-1.txz: Upgraded. +k/kernel-source-4.14.64-noarch-1.txz: Upgraded. +isolinux/initrd.img: Rebuilt. +kernels/*: Upgraded. +usb-and-pxe-installers/usbboot.img: Rebuilt. + </pre>]]> + </description> + </item> + <item> + <title>Fri, 17 Aug 2018 16:52:04 GMT</title> + <pubDate>Fri, 17 Aug 2018 16:52:04 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20180817165204</link> + <guid isPermaLink="false">20180817165204</guid> + <description> + <![CDATA[<pre> +a/kernel-firmware-20180814_f1b95fe-noarch-1.txz: Upgraded. +a/kernel-generic-4.14.63-x86_64-1.txz: Upgraded. +a/kernel-huge-4.14.63-x86_64-1.txz: Upgraded. +a/kernel-modules-4.14.63-x86_64-1.txz: Upgraded. +ap/jove-4.16.0.73-x86_64-5.txz: Rebuilt. + Avoid a namespace conflict with glibc's getline() function. + Increase some hardcoded buffer sizes. + Thanks to TTK. +ap/mariadb-10.3.9-x86_64-1.txz: Upgraded. + This update fixes bugs and security issues. + For more information, see: + https://mariadb.com/kb/en/mariadb-1039-release-notes/ + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3060 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066 + (* Security fix *) +d/kernel-headers-4.14.63-x86-1.txz: Upgraded. +k/kernel-source-4.14.63-noarch-1.txz: Upgraded. +l/expat-2.2.6-x86_64-1.txz: Upgraded. +n/ntp-4.2.8p12-x86_64-1.txz: Upgraded. + This release improves on one security fix in ntpd: + LOW/MEDIUM: Sec 3012: Sybil vulnerability: ephemeral association attack + While fixed in ntp-4.2.8p7 and with significant additional protections for + this issue in 4.2.8p11, ntp-4.2.8p12 includes a fix for an edge case in + the new noepeer support. Originally reported by Matt Van Gundy of Cisco. + Edge-case hole reported by Martin Burnicki of Meinberg. + And fixes another security issue in ntpq and ntpdc: + LOW: Sec 3505: The openhost() function used during command-line hostname + processing by ntpq and ntpdc can write beyond its buffer limit, which + could allow an attacker to achieve code execution or escalate to higher + privileges via a long string as the argument for an IPv4 or IPv6 + command-line parameter. NOTE: It is unclear whether there are any common + situations in which ntpq or ntpdc is used with a command line from an + untrusted source. Reported by Fakhri Zulkifli. + For more information, see: + http://support.ntp.org/bin/view/Main/SecurityNotice#August_2018_ntp_4_2_8p12_NTP_Rel + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327 + (* Security fix *) +n/samba-4.8.4-x86_64-1.txz: Upgraded. + This is a security update in order to patch the following defects: + Weak authentication protocol allowed. + Denial of Service Attack on DNS and LDAP server. + Insufficient input validation on client directory listing in libsmbclient. + Denial of Service Attack on AD DC DRSUAPI server. + Confidential attribute disclosure from the AD LDAP server. + For more information, see: + https://www.samba.org/samba/security/CVE-2018-1139.html + https://www.samba.org/samba/security/CVE-2018-1140.html + https://www.samba.org/samba/security/CVE-2018-10858.html + https://www.samba.org/samba/security/CVE-2018-10918.html + https://www.samba.org/samba/security/CVE-2018-10919.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1140 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10918 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919 + (* Security fix *) +x/xf86-video-v4l-0.3.0-x86_64-1.txz: Upgraded. +x/xterm-335-x86_64-1.txz: Upgraded. +isolinux/initrd.img: Rebuilt. +kernels/*: Upgraded. +usb-and-pxe-installers/usbboot.img: Rebuilt. + </pre>]]> + </description> + </item> + <item> <title>Tue, 14 Aug 2018 22:56:09 GMT</title> <pubDate>Tue, 14 Aug 2018 22:56:09 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20180814225609</link> |