diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-12-23 02:48:56 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-12-23 13:30:45 +0100 |
commit | d46ef1440f426d37b8e6935991e5c5808e558d66 (patch) | |
tree | a77e740580aa496881bdff4b765b7f6711beb742 /recompress.sh | |
parent | 7bbe71feeaf755f8126ea2880faa06c2f520eeaf (diff) | |
download | current-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.gz current-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.xz |
Sat Dec 23 02:48:56 UTC 202320231223024856_15.0
patches/packages/glibc-zoneinfo-2023d-noarch-1_slack15.0.txz: Upgraded.
This package provides the latest timezone updates.
patches/packages/postfix-3.6.13-x86_64-1_slack15.0.txz: Upgraded.
Security: this release adds support to defend against an email spoofing
attack (SMTP smuggling) on recipients at a Postfix server. Sites
concerned about SMTP smuggling attacks should enable this feature on
Internet-facing Postfix servers. For compatibility with non-standard
clients, Postfix by default excludes clients in mynetworks from this
countermeasure.
The recommended settings are:
# Optionally disconnect remote SMTP clients that send bare newlines,
# but allow local clients with non-standard SMTP implementations
# such as netcat, fax machines, or load balancer health checks.
#
smtpd_forbid_bare_newline = yes
smtpd_forbid_bare_newline_exclusions = $mynetworks
The smtpd_forbid_bare_newline feature is disabled by default.
For more information, see:
https://www.postfix.org/smtp-smuggling.html
(* Security fix *)
Diffstat (limited to 'recompress.sh')
-rwxr-xr-x | recompress.sh | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh index fe01ceb49..62bc762e1 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1258,6 +1258,9 @@ gzip ./patches/source/sdl/CVE-2021-33657.patch gzip ./patches/source/sdl/SDL_ttf.shaded.text.diff gzip ./patches/source/sdl/SDL_mixer.usrlocal.diff gzip ./patches/source/sdl/libsdl-1.2.15-resizing.patch +gzip ./patches/source/postfix/postfix.script.starting.message.diff +gzip ./patches/source/postfix/postfix.only.warn.regular.files.diff +gzip ./patches/source/postfix/doinst.sh gzip ./patches/source/emacs/d48bb4874bc6cd3e69c7a15fc3c91cc141025c51.patch gzip ./patches/source/emacs/doinst.sh gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46342.patch |