summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2018-11-29 05:53:27 +0000
committer Eric Hameleers <alien@slackware.com>2018-11-29 17:59:45 +0100
commit7284497dcf1ed750a9703553209d899a8c111149 (patch)
treed28ab1c79f228cb433fd739f28cd225fdcdae42d /ChangeLog.rss
parent388986876373b8d6d9053c36196978464bd3362e (diff)
downloadcurrent-7284497dcf1ed750a9703553209d899a8c111149.tar.gz
current-7284497dcf1ed750a9703553209d899a8c111149.tar.xz
Thu Nov 29 05:53:27 UTC 201820181129055327
a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss70
1 files changed, 56 insertions, 14 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 9b00e09d8..4e6db02fb 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,52 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Wed, 28 Nov 2018 07:25:32 GMT</pubDate>
- <lastBuildDate>Wed, 28 Nov 2018 16:59:41 GMT</lastBuildDate>
+ <pubDate>Thu, 29 Nov 2018 05:53:27 GMT</pubDate>
+ <lastBuildDate>Thu, 29 Nov 2018 16:59:42 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.10</generator>
<item>
+ <title>Thu, 29 Nov 2018 05:53:27 GMT</title>
+ <pubDate>Thu, 29 Nov 2018 05:53:27 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20181129055327</link>
+ <guid isPermaLink="false">20181129055327</guid>
+ <description>
+ <![CDATA[<pre>
+a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt.
+ rc.S: simplify test for F2FS filesystem on /. Thanks to GazL.
+ap/soma-3.2.0-noarch-1.txz: Upgraded.
+d/cmake-3.13.1-x86_64-1.txz: Upgraded.
+l/jansson-2.12-x86_64-1.txz: Upgraded.
+n/rp-pppoe-3.13-x86_64-1.txz: Upgraded.
+n/samba-4.9.3-x86_64-1.txz: Upgraded.
+ This update fixes bugs and security issues:
+ CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD
+ Internal DNS server
+ CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT
+ CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server
+ CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers
+ CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos
+ configuration (unsupported)
+ CVE-2018-16857: Bad password count in AD DC not always effective
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2018-14629.html
+ https://www.samba.org/samba/security/CVE-2018-16841.html
+ https://www.samba.org/samba/security/CVE-2018-16851.html
+ https://www.samba.org/samba/security/CVE-2018-16852.html
+ https://www.samba.org/samba/security/CVE-2018-16853.html
+ https://www.samba.org/samba/security/CVE-2018-16857.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857
+ (* Security fix *)
+x/mesa-18.2.6-x86_64-1.txz: Upgraded.
+x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Wed, 28 Nov 2018 07:25:32 GMT</title>
<pubDate>Wed, 28 Nov 2018 07:25:32 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20181128072532</link>
@@ -164,18 +206,18 @@ ap/mariadb-10.3.11-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues.
For more information, see:
https://mariadb.com/kb/en/library/mariadb-10311-release-notes/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-9843
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3174
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3143
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3156
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3185
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3162
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3284
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3185
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3277
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3162
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3173
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3200
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3284
(* Security fix *)
d/cmake-3.13.0-x86_64-1.txz: Upgraded.
d/git-2.19.2-x86_64-1.txz: Upgraded.