diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2021-10-21 19:36:32 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2021-10-22 08:59:59 +0200 |
commit | 1bb03caa091f9fa14d1e6120ad2bd1dfa25c76c5 (patch) | |
tree | 221809562de7738cdbec0c41c8e986d5d5f7210b /ChangeLog.rss | |
parent | 710e4856cfbc7bd60e022472779a298df5036fc0 (diff) | |
download | current-1bb03caa091f9fa14d1e6120ad2bd1dfa25c76c5.tar.gz current-1bb03caa091f9fa14d1e6120ad2bd1dfa25c76c5.tar.xz |
Thu Oct 21 19:36:32 UTC 202120211021193632
a/lvm2-2.03.13-x86_64-1.txz: Upgraded.
Reverted to working version.
d/rust-1.56.0-x86_64-1.txz: Upgraded.
l/pipewire-0.3.39-x86_64-1.txz: Upgraded.
n/krb5-1.19.2-x86_64-2.txz: Rebuilt.
[PATCH] Fix KDC null deref on TGS inner body null server.
This fixes an issue where an authenticated attacker can cause a denial of
service in the KDC by sending a FAST TGS request with no server field.
Thanks to nobodino.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
(* Security fix *)
x/ibus-m17n-1.4.8-x86_64-1.txz: Upgraded.
x/libinput-1.19.2-x86_64-1.txz: Upgraded.
xap/freerdp-2.4.1-x86_64-1.txz: Upgraded.
This update fixes two security issues:
Improper client input validation for gateway connections allows to overwrite
memory.
Improper region checks in all clients allow out of bound write to memory.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160
(* Security fix *)
xap/gftp-2.7.1b-x86_64-1.txz: Upgraded.
extra/php8/php8-8.0.12-x86_64-1.txz: Upgraded.
This update fixes bugs and a security issue:
FPM: PHP-FPM oob R/W in root process leading to privilege escalation.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703
(* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 44 |
1 files changed, 42 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 25300410f..6ea9c2ba1 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,50 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 20 Oct 2021 19:29:55 GMT</pubDate> - <lastBuildDate>Thu, 21 Oct 2021 06:59:46 GMT</lastBuildDate> + <pubDate>Thu, 21 Oct 2021 19:36:32 GMT</pubDate> + <lastBuildDate>Fri, 22 Oct 2021 06:59:49 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.12</generator> <item> + <title>Thu, 21 Oct 2021 19:36:32 GMT</title> + <pubDate>Thu, 21 Oct 2021 19:36:32 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20211021193632</link> + <guid isPermaLink="false">20211021193632</guid> + <description> + <![CDATA[<pre> +a/lvm2-2.03.13-x86_64-1.txz: Upgraded. + Reverted to working version. +d/rust-1.56.0-x86_64-1.txz: Upgraded. +l/pipewire-0.3.39-x86_64-1.txz: Upgraded. +n/krb5-1.19.2-x86_64-2.txz: Rebuilt. + [PATCH] Fix KDC null deref on TGS inner body null server. + This fixes an issue where an authenticated attacker can cause a denial of + service in the KDC by sending a FAST TGS request with no server field. + Thanks to nobodino. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 + (* Security fix *) +x/ibus-m17n-1.4.8-x86_64-1.txz: Upgraded. +x/libinput-1.19.2-x86_64-1.txz: Upgraded. +xap/freerdp-2.4.1-x86_64-1.txz: Upgraded. + This update fixes two security issues: + Improper client input validation for gateway connections allows to overwrite + memory. + Improper region checks in all clients allow out of bound write to memory. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160 + (* Security fix *) +xap/gftp-2.7.1b-x86_64-1.txz: Upgraded. +extra/php8/php8-8.0.12-x86_64-1.txz: Upgraded. + This update fixes bugs and a security issue: + FPM: PHP-FPM oob R/W in root process leading to privilege escalation. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21703 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 20 Oct 2021 19:29:55 GMT</title> <pubDate>Wed, 20 Oct 2021 19:29:55 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20211020192955</link> |