summaryrefslogtreecommitdiffstats
path: root/source/ap/sudo/sudo.url (follow)
Commit message (Expand)AuthorAgeFilesLines
* Fri Jun 19 19:59:04 UTC 2020...a/haveged-1.9.12-x86_64-1.txz: Upgraded. a/kernel-firmware-20200619_3890db3-noarch-1.txz: Upgraded. a/sysvinit-scripts-2.1-noarch-34.txz: Rebuilt. rc.M: check for elogind first so that we can ignore a stale CK2 package. ap/sudo-1.9.1-x86_64-1.txz: Upgraded. l/alsa-lib-1.2.3.1-x86_64-1.txz: Upgraded. l/desktop-file-utils-0.26-x86_64-1.txz: Upgraded. n/mutt-1.14.4-x86_64-1.txz: Upgraded. x/libinput-1.15.6-x86_64-1.txz: Upgraded. x/xinit-1.4.1-x86_64-2.txz: Rebuilt. When using elogind, start the session on the current console. Thanks to alienBOB. 20200619195904 Patrick J Volkerding2020-06-191-1/+1
* Fri Jan 31 20:46:25 UTC 2020...a/util-linux-2.35.1-x86_64-1.txz: Upgraded. a/zerofree-1.1.1-x86_64-1.txz: Added. Also queued up for the next installer build. Thanks to bifferos. ap/sudo-1.8.31-x86_64-1.txz: Upgraded. This update fixes a security issue: In Sudo before 1.8.31, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in some Linux distributions; however, it is not the default for upstream or in Slackware, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634 (* Security fix *) n/NetworkManager-1.22.6-x86_64-1.txz: Upgraded. n/openldap-client-2.4.49-x86_64-1.txz: Upgraded. xfce/Thunar-1.8.11-x86_64-1.txz: Removed. xfce/thunar-1.8.12-x86_64-1.txz: Added. Changed package name from "Thunar" to "thunar" to follow upstream's naming. 20200131204625 Patrick J Volkerding2020-02-011-0/+1