summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-12-23 02:48:56 +0000
committer Eric Hameleers <alien@slackware.com>2023-12-23 13:30:45 +0100
commitd46ef1440f426d37b8e6935991e5c5808e558d66 (patch)
treea77e740580aa496881bdff4b765b7f6711beb742 /ChangeLog.rss
parent7bbe71feeaf755f8126ea2880faa06c2f520eeaf (diff)
downloadcurrent-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.gz
current-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.xz
Sat Dec 23 02:48:56 UTC 202320231223024856_15.0
patches/packages/glibc-zoneinfo-2023d-noarch-1_slack15.0.txz: Upgraded. This package provides the latest timezone updates. patches/packages/postfix-3.6.13-x86_64-1_slack15.0.txz: Upgraded. Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. Sites concerned about SMTP smuggling attacks should enable this feature on Internet-facing Postfix servers. For compatibility with non-standard clients, Postfix by default excludes clients in mynetworks from this countermeasure. The recommended settings are: # Optionally disconnect remote SMTP clients that send bare newlines, # but allow local clients with non-standard SMTP implementations # such as netcat, fax machines, or load balancer health checks. # smtpd_forbid_bare_newline = yes smtpd_forbid_bare_newline_exclusions = $mynetworks The smtpd_forbid_bare_newline feature is disabled by default. For more information, see: https://www.postfix.org/smtp-smuggling.html (* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss34
1 files changed, 32 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 165ed69d4..b41329281 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,40 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Thu, 21 Dec 2023 20:46:11 GMT</pubDate>
- <lastBuildDate>Fri, 22 Dec 2023 12:30:24 GMT</lastBuildDate>
+ <pubDate>Sat, 23 Dec 2023 02:48:56 GMT</pubDate>
+ <lastBuildDate>Sat, 23 Dec 2023 12:30:31 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Sat, 23 Dec 2023 02:48:56 GMT</title>
+ <pubDate>Sat, 23 Dec 2023 02:48:56 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20231223024856</link>
+ <guid isPermaLink="false">20231223024856</guid>
+ <description>
+ <![CDATA[<pre>
+patches/packages/glibc-zoneinfo-2023d-noarch-1_slack15.0.txz: Upgraded.
+ This package provides the latest timezone updates.
+patches/packages/postfix-3.6.13-x86_64-1_slack15.0.txz: Upgraded.
+ Security: this release adds support to defend against an email spoofing
+ attack (SMTP smuggling) on recipients at a Postfix server. Sites
+ concerned about SMTP smuggling attacks should enable this feature on
+ Internet-facing Postfix servers. For compatibility with non-standard
+ clients, Postfix by default excludes clients in mynetworks from this
+ countermeasure.
+ The recommended settings are:
+ # Optionally disconnect remote SMTP clients that send bare newlines,
+ # but allow local clients with non-standard SMTP implementations
+ # such as netcat, fax machines, or load balancer health checks.
+ #
+ smtpd_forbid_bare_newline = yes
+ smtpd_forbid_bare_newline_exclusions = $mynetworks
+ The smtpd_forbid_bare_newline feature is disabled by default.
+ For more information, see:
+ https://www.postfix.org/smtp-smuggling.html
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Thu, 21 Dec 2023 20:46:11 GMT</title>
<pubDate>Thu, 21 Dec 2023 20:46:11 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20231221204611</link>