summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-02-01 04:37:04 +0000
committer Eric Hameleers <alien@slackware.com>2022-02-01 08:59:52 +0100
commitbd42aca52dc7532946a93fb3354a8454c4adfe94 (patch)
tree2314fe66b3c943fab158a4a4d9d55f1d012cee39 /ChangeLog.rss
parent84f05e024aee5a7b537c367e56755b48d34f629b (diff)
downloadcurrent-bd42aca52dc7532946a93fb3354a8454c4adfe94.tar.gz
current-bd42aca52dc7532946a93fb3354a8454c4adfe94.tar.xz
Tue Feb 1 04:37:04 UTC 202220220201043704
The sepulchral voice intones, "The cave is now closed." kde/falkon-3.2.0-x86_64-1.txz: Upgraded. kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt. [PATCH] only start programs in user's path. [PATCH] only execute diff in path. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853 (* Security fix *) l/libcanberra-0.30-x86_64-9.txz: Rebuilt. Fix a bug crashing some applications in Wayland desktops. Thanks to 01micko. n/samba-4.15.5-x86_64-1.txz: Upgraded. This is a security release in order to address the following defects: UNIX extensions in SMB1 disclose whether the outside target of a symlink exists. Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit. Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity. For more information, see: https://www.samba.org/samba/security/CVE-2021-44141.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141 https://www.samba.org/samba/security/CVE-2021-44142.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142 https://www.samba.org/samba/security/CVE-2022-0336.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336 (* Security fix *) x/xterm-370-x86_64-7.txz: Rebuilt. Rebuilt with --disable-sixel-graphics to fix a buffer overflow. Thanks to gmgf. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130 (* Security fix *) testing/source/linux-5.16.4-configs/*: Added. Sample config files to build 5.16.4 Linux kernels.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss54
1 files changed, 52 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 150e26382..6eb7f4e8b 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,60 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Sun, 30 Jan 2022 20:48:46 GMT</pubDate>
- <lastBuildDate>Mon, 31 Jan 2022 07:59:42 GMT</lastBuildDate>
+ <pubDate>Tue, 1 Feb 2022 04:37:04 GMT</pubDate>
+ <lastBuildDate>Tue, 1 Feb 2022 07:59:42 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.13</generator>
<item>
+ <title>Tue, 1 Feb 2022 04:37:04 GMT</title>
+ <pubDate>Tue, 1 Feb 2022 04:37:04 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20220201043704</link>
+ <guid isPermaLink="false">20220201043704</guid>
+ <description>
+ <![CDATA[<pre>
+The sepulchral voice intones, "The cave is now closed."
+kde/falkon-3.2.0-x86_64-1.txz: Upgraded.
+kde/ktexteditor-5.90.0-x86_64-2.txz: Rebuilt.
+ [PATCH] only start programs in user's path.
+ [PATCH] only execute diff in path.
+ Thanks to gmgf.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
+ (* Security fix *)
+l/libcanberra-0.30-x86_64-9.txz: Rebuilt.
+ Fix a bug crashing some applications in Wayland desktops.
+ Thanks to 01micko.
+n/samba-4.15.5-x86_64-1.txz: Upgraded.
+ This is a security release in order to address the following defects:
+ UNIX extensions in SMB1 disclose whether the outside target of a symlink
+ exists.
+ Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
+ allows remote attackers to execute arbitrary code as root on affected Samba
+ installations that use the VFS module vfs_fruit.
+ Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
+ the ability to write to an account can exploit this to perform a
+ denial-of-service attack by adding an SPN that matches an existing service.
+ Additionally, an attacker who can intercept traffic can impersonate existing
+ services, resulting in a loss of confidentiality and integrity.
+ For more information, see:
+ https://www.samba.org/samba/security/CVE-2021-44141.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
+ https://www.samba.org/samba/security/CVE-2021-44142.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
+ https://www.samba.org/samba/security/CVE-2022-0336.html
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
+ (* Security fix *)
+x/xterm-370-x86_64-7.txz: Rebuilt.
+ Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
+ Thanks to gmgf.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
+ (* Security fix *)
+testing/source/linux-5.16.4-configs/*: Added.
+ Sample config files to build 5.16.4 Linux kernels.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Sun, 30 Jan 2022 20:48:46 GMT</title>
<pubDate>Sun, 30 Jan 2022 20:48:46 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220130204846</link>