diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2024-01-31 21:19:19 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2024-01-31 23:07:15 +0100 |
commit | f75fcd750efad1d366cce38d805a708abb4f3af6 (patch) | |
tree | baa185c434dc07e0028d12a9cdbe7ffb6b247ba6 /ChangeLog.rss | |
parent | 7b9b973e94adeb7444208efdd7ad577fce430e53 (diff) | |
download | current-f75fcd750efad1d366cce38d805a708abb4f3af6.tar.gz current-f75fcd750efad1d366cce38d805a708abb4f3af6.tar.xz |
Wed Jan 31 21:19:19 UTC 202420240131211919
ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded.
l/libnvme-1.7.1-x86_64-1.txz: Added.
This is required by nvme-cli.
l/pipewire-1.0.2-x86_64-1.txz: Upgraded.
n/curl-8.6.0-x86_64-1.txz: Upgraded.
n/libmilter-8.18.1-x86_64-1.txz: Upgraded.
extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded.
sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject e-mail
messages with a spoofed MAIL FROM address, allowing bypass of an SPF
protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
but some other popular e-mail servers do not. This is resolved in 8.18 and
later versions with 'o' in srv_features.
For more information, see:
https://www.cve.org/CVERecord?id=CVE-2023-51765
(* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 31 |
1 files changed, 29 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 9189c21d5..d3640f545 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,37 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 30 Jan 2024 22:01:28 GMT</pubDate> - <lastBuildDate>Tue, 30 Jan 2024 22:34:28 GMT</lastBuildDate> + <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate> + <lastBuildDate>Wed, 31 Jan 2024 22:07:01 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Wed, 31 Jan 2024 21:19:19 GMT</title> + <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20240131211919</link> + <guid isPermaLink="false">20240131211919</guid> + <description> + <![CDATA[<pre> +ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded. +l/libnvme-1.7.1-x86_64-1.txz: Added. + This is required by nvme-cli. +l/pipewire-1.0.2-x86_64-1.txz: Upgraded. +n/curl-8.6.0-x86_64-1.txz: Upgraded. +n/libmilter-8.18.1-x86_64-1.txz: Upgraded. +extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded. + sendmail through 8.17.2 allows SMTP smuggling in certain configurations. + Remote attackers can use a published exploitation technique to inject e-mail + messages with a spoofed MAIL FROM address, allowing bypass of an SPF + protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> + but some other popular e-mail servers do not. This is resolved in 8.18 and + later versions with 'o' in srv_features. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-51765 + (* Security fix *) +extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Tue, 30 Jan 2024 22:01:28 GMT</title> <pubDate>Tue, 30 Jan 2024 22:01:28 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20240130220128</link> |