summaryrefslogtreecommitdiffstats
path: root/source/n/wpa_supplicant/patches/8e6485a1bcb0baffdea9e55255a81270b768439c.patch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Tue Jul 23 18:54:25 UTC 2024...Hey folks, we got a new glibc and are beginning the process of baking the new default compile flags into the toolchain, the graphics stack, and whatever else happens along. Enjoy! :-) a/aaa_glibc-solibs-2.40-x86_64-1.txz: Upgraded. a/libblockdev-3.1.1_1-x86_64-2.txz: Rebuilt. Fix build against recent ext2fs.h. Thanks to shipujin. a/xfsprogs-6.9.0-x86_64-1.txz: Upgraded. ap/rpm-4.19.1.1-x86_64-3.txz: Rebuilt. ap/slackpkg-15.0.10-noarch-4.txz: Rebuilt. Prefer gpg1 again. Going with the modern gpg with more dependencies was a mistake in this case. (now we know why gnupg-1 is still around :-) Thanks to Petri Kaukasoina. d/binutils-2.42-x86_64-3.txz: Rebuilt. d/cargo-vendor-filterer-0.5.14-x86_64-2.txz: Rebuilt. d/cbindgen-0.26.0-x86_64-2.txz: Rebuilt. d/ccache-4.10.2-x86_64-1.txz: Upgraded. d/cmake-3.30.1-x86_64-2.txz: Rebuilt. d/gcc-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-g++-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gdc-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gfortran-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gm2-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-gnat-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-go-14.1.0-x86_64-2.txz: Rebuilt. d/gcc-objc-14.1.0-x86_64-2.txz: Rebuilt. d/libgccjit-14.1.0-x86_64-2.txz: Rebuilt. d/libtool-2.4.7-x86_64-8.txz: Rebuilt. d/parallel-20240722-noarch-1.txz: Upgraded. d/pkg-config-0.29.2-x86_64-5.txz: Rebuilt. d/python-setuptools-71.1.0-x86_64-1.txz: Upgraded. d/ruby-3.3.4-x86_64-2.txz: Rebuilt. d/rust-bindgen-0.69.4-x86_64-2.txz: Rebuilt. d/strace-6.10-x86_64-1.txz: Upgraded. d/subversion-1.14.3-x86_64-3.txz: Rebuilt. e/emacs-29.4-x86_64-2.txz: Rebuilt. l/PyQt-builder-1.16.4-x86_64-2.txz: Rebuilt. l/PyQt5-5.15.11-x86_64-1.txz: Upgraded. l/PyQt5_sip-12.15.0-x86_64-2.txz: Rebuilt. l/argon2-20190702-x86_64-6.txz: Rebuilt. l/ffmpeg-6.1.1-x86_64-5.txz: Rebuilt. l/glibc-2.40-x86_64-1.txz: Upgraded. This update fixes security issues: nscd: Stack-based buffer overflow in netgroup cache. nscd: Null pointer crash after notfound response. nscd: netgroup cache may terminate daemon on memory allocation failure. nscd: netgroup cache assumes NSS callback uses in-buffer strings. These vulnerabilities were only present in the nscd binary. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-33599 https://www.cve.org/CVERecord?id=CVE-2024-33600 https://www.cve.org/CVERecord?id=CVE-2024-33601 https://www.cve.org/CVERecord?id=CVE-2024-33602 (* Security fix *) l/glibc-i18n-2.40-x86_64-1.txz: Upgraded. l/glibc-profile-2.40-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.24.5-x86_64-2.txz: Rebuilt. l/libcdio-paranoia-10.2+2.0.2-x86_64-1.txz: Upgraded. l/libclc-18.1.8-x86_64-3.txz: Rebuilt. l/libproxy-0.5.8-x86_64-1.txz: Upgraded. l/lz4-1.10.0-x86_64-1.txz: Upgraded. l/poppler-24.07.0-x86_64-2.txz: Rebuilt. l/python-importlib_metadata-8.1.0-x86_64-1.txz: Upgraded. l/python-sphinx-7.4.7-x86_64-1.txz: Upgraded. l/qt5-5.15.14_20240716_ae0c8451-x86_64-1.txz: Upgraded. l/qt5-webkit-5.212.0_alpha4-x86_64-13.txz: Rebuilt. l/qt6-6.7.2_20240610_3f005f1e-x86_64-3.txz: Rebuilt. l/sip-6.8.6-x86_64-2.txz: Rebuilt. l/spirv-llvm-translator-18.1.2-x86_64-2.txz: Rebuilt. l/v4l-utils-1.28.0-x86_64-1.txz: Upgraded. n/bind-9.18.28-x86_64-1.txz: Upgraded. This update fixes security issues: Remove SIG(0) support from named as a countermeasure for CVE-2024-1975. qctx-zversion was not being cleared when it should have been leading to an assertion failure if it needed to be reused. An excessively large number of rrtypes per owner can slow down database query processing, so a limit has been placed on the number of rrtypes that can be stored per owner (node) in a cache or zone database. This is configured with the new "max-rrtypes-per-name" option, and defaults to 100. Excessively large rdatasets can slow down database query processing, so a limit has been placed on the number of records that can be stored per rdataset in a cache or zone database. This is configured with the new "max-records-per-type" option, and defaults to 100. Malicious DNS client that sends many queries over TCP but never reads responses can cause server to respond slowly or not respond at all for other clients. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-1975 https://www.cve.org/CVERecord?id=CVE-2024-4076 https://www.cve.org/CVERecord?id=CVE-2024-1737 https://www.cve.org/CVERecord?id=CVE-2024-0760 (* Security fix *) n/fetchmail-6.4.39-x86_64-1.txz: Upgraded. n/obexftp-0.24.2-x86_64-13.txz: Rebuilt. n/pinentry-1.3.1-x86_64-2.txz: Rebuilt. n/wpa_supplicant-2.11-x86_64-1.txz: Upgraded. x/fcitx5-qt-5.1.6-x86_64-3.txz: Rebuilt. x/ibus-m17n-1.4.30-x86_64-1.txz: Upgraded. x/libdrm-2.4.122-x86_64-2.txz: Rebuilt. x/marisa-0.2.6-x86_64-10.txz: Rebuilt. x/mesa-24.1.4-x86_64-2.txz: Rebuilt. x/vulkan-sdk-1.3.275.0-x86_64-3.txz: Rebuilt. xap/audacious-4.4-x86_64-2.txz: Rebuilt. xap/audacious-plugins-4.4-x86_64-2.txz: Rebuilt. xap/mozilla-thunderbird-128.0.1esr-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.0.1esr/releasenotes/ xap/xaos-4.3.2-x86_64-2.txz: Rebuilt. extra/emacs-regular-build/emacs-29.4-x86_64-2_regular.txz: Rebuilt. 20240723185425 Patrick J Volkerding2024-07-231-210/+0
* Wed Feb 28 18:36:48 UTC 2024...d/parallel-20240222-noarch-1.txz: Upgraded. kde/krita-5.2.2-x86_64-4.txz: Rebuilt. Recompiled against libunibreak-6.0. l/accountsservice-23.13.9-x86_64-1.txz: Upgraded. Thanks to reddog83. l/libass-0.17.1-x86_64-2.txz: Rebuilt. Recompiled against libunibreak-6.0. l/libunibreak-6.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. l/orc-0.4.38-x86_64-1.txz: Upgraded. l/python-requests-2.31.0-x86_64-1.txz: Upgraded. l/python-urllib3-2.2.1-x86_64-1.txz: Upgraded. l/qt6-6.6.2_20240210_15b7e743-x86_64-1.txz: Added. n/wpa_supplicant-2.10-x86_64-3.txz: Rebuilt. Patched the implementation of PEAP in wpa_supplicant to prevent an authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-52160 (* Security fix *) xap/gparted-1.6.0-x86_64-1.txz: Upgraded. 20240228183648 Patrick J Volkerding2024-02-281-0/+210