summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-04-06 20:23:46 +0000
committer Eric Hameleers <alien@slackware.com>2022-04-07 06:59:44 +0200
commitbfece22130a1673e30695d7c5e563b9eace2b915 (patch)
tree41979314035e2fd0ac8460dbb7bf4ed505ad7d51 /ChangeLog.rss
parentdc48df8960b47406124ff6c59af6d6bd54c60eb7 (diff)
downloadcurrent-bfece22130a1673e30695d7c5e563b9eace2b915.tar.gz
current-bfece22130a1673e30695d7c5e563b9eace2b915.tar.xz
Wed Apr 6 20:23:46 UTC 202220220406202346
a/haveged-1.9.17-x86_64-2.txz: Rebuilt. Install /etc/rc.d/rc.haveged as non-executable. For existing installations running a recent kernel, it is safe to turn this off. Back when we added the haveged package we were using the 4.4 kernel, but since Linux 5.4 this same entropy generating algorithm has been built into the kernel, so there's no reason to also run it in userspace. We'll keep the package around (for now, anyway) in case someone might be running an old kernel. Thanks to Jason A. Donenfeld. a/sysvinit-scripts-15.0-noarch-10.txz: Rebuilt. rc.S, rc.6: use the seedrng utility to seed and initialize the kernel random number generator and generate a new seed. If seedrng is missing, we'll attempt to do these things with scripting. Thanks to Jason A. Donenfeld for hints about how to make a modest improvement in that regard (blame me for any problems with my own changes), but because you can't force the kernel RNG to initialize with a script (it needs an ioctl), you won't get the same guarantees that you do when using the new seedrng utility. a/util-linux-2.38-x86_64-2.txz: Rebuilt. Added seedrng utility, used to seed and initialize the kernel random number generator and to generate new seeds for carrying entropy across reboots. Thanks to Jason A. Donenfeld. n/libmnl-1.0.5-x86_64-1.txz: Upgraded. n/libnfnetlink-1.0.2-x86_64-1.txz: Upgraded. xap/mozilla-thunderbird-91.8.0-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289 (* Security fix *)
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss52
1 files changed, 50 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 45f3b940f..df33a607c 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,58 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Tue, 5 Apr 2022 19:16:30 GMT</pubDate>
- <lastBuildDate>Wed, 6 Apr 2022 04:59:43 GMT</lastBuildDate>
+ <pubDate>Wed, 6 Apr 2022 20:23:46 GMT</pubDate>
+ <lastBuildDate>Thu, 7 Apr 2022 04:59:44 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Wed, 6 Apr 2022 20:23:46 GMT</title>
+ <pubDate>Wed, 6 Apr 2022 20:23:46 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20220406202346</link>
+ <guid isPermaLink="false">20220406202346</guid>
+ <description>
+ <![CDATA[<pre>
+a/haveged-1.9.17-x86_64-2.txz: Rebuilt.
+ Install /etc/rc.d/rc.haveged as non-executable. For existing installations
+ running a recent kernel, it is safe to turn this off.
+ Back when we added the haveged package we were using the 4.4 kernel, but
+ since Linux 5.4 this same entropy generating algorithm has been built into
+ the kernel, so there's no reason to also run it in userspace. We'll keep
+ the package around (for now, anyway) in case someone might be running an
+ old kernel. Thanks to Jason A. Donenfeld.
+a/sysvinit-scripts-15.0-noarch-10.txz: Rebuilt.
+ rc.S, rc.6: use the seedrng utility to seed and initialize the kernel
+ random number generator and generate a new seed.
+ If seedrng is missing, we'll attempt to do these things with scripting.
+ Thanks to Jason A. Donenfeld for hints about how to make a modest
+ improvement in that regard (blame me for any problems with my own changes),
+ but because you can't force the kernel RNG to initialize with a script
+ (it needs an ioctl), you won't get the same guarantees that you do when
+ using the new seedrng utility.
+a/util-linux-2.38-x86_64-2.txz: Rebuilt.
+ Added seedrng utility, used to seed and initialize the kernel random number
+ generator and to generate new seeds for carrying entropy across reboots.
+ Thanks to Jason A. Donenfeld.
+n/libmnl-1.0.5-x86_64-1.txz: Upgraded.
+n/libnfnetlink-1.0.2-x86_64-1.txz: Upgraded.
+xap/mozilla-thunderbird-91.8.0-x86_64-1.txz: Upgraded.
+ This release contains security fixes and improvements.
+ For more information, see:
+ https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/
+ https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Tue, 5 Apr 2022 19:16:30 GMT</title>
<pubDate>Tue, 5 Apr 2022 19:16:30 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220405191630</link>