summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2024-01-31 21:19:19 +0000
committer Eric Hameleers <alien@slackware.com>2024-02-01 13:30:49 +0100
commit4af705d201f28b1b12ac1ba92fb9afea3b88fe29 (patch)
tree50fc9ebf6279b33289c54ada5da78ce044cd5c17 /ChangeLog.rss
parent71cfddeb9faf318dd1d2b11c61a2202fd580b653 (diff)
downloadcurrent-4af705d201f28b1b12ac1ba92fb9afea3b88fe29.tar.gz
current-4af705d201f28b1b12ac1ba92fb9afea3b88fe29.tar.xz
Wed Jan 31 21:19:19 UTC 202420240131211919_15.0
extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz: Upgraded. sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-51765 (* Security fix *) extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded. patches/packages/curl-8.6.0-x86_64-1_slack15.0.txz: Upgraded. This is a bugfix release. patches/packages/libmilter-8.18.1-x86_64-1_slack15.0.txz: Upgraded. This is a bugfix release.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss29
1 files changed, 27 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 28494c62f..b0b0ff751 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,35 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Fri, 26 Jan 2024 20:59:27 GMT</pubDate>
- <lastBuildDate>Sat, 27 Jan 2024 12:30:24 GMT</lastBuildDate>
+ <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate>
+ <lastBuildDate>Thu, 1 Feb 2024 12:30:34 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Wed, 31 Jan 2024 21:19:19 GMT</title>
+ <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20240131211919</link>
+ <guid isPermaLink="false">20240131211919</guid>
+ <description>
+ <![CDATA[<pre>
+extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz: Upgraded.
+ sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
+ Remote attackers can use a published exploitation technique to inject e-mail
+ messages with a spoofed MAIL FROM address, allowing bypass of an SPF
+ protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
+ but some other popular e-mail servers do not. This is resolved in 8.18 and
+ later versions with 'o' in srv_features.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2023-51765
+ (* Security fix *)
+extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded.
+patches/packages/curl-8.6.0-x86_64-1_slack15.0.txz: Upgraded.
+ This is a bugfix release.
+patches/packages/libmilter-8.18.1-x86_64-1_slack15.0.txz: Upgraded.
+ This is a bugfix release.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Fri, 26 Jan 2024 20:59:27 GMT</title>
<pubDate>Fri, 26 Jan 2024 20:59:27 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20240126205927</link>