summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2024-01-31 21:19:19 +0000
committer Eric Hameleers <alien@slackware.com>2024-01-31 23:07:15 +0100
commitf75fcd750efad1d366cce38d805a708abb4f3af6 (patch)
treebaa185c434dc07e0028d12a9cdbe7ffb6b247ba6 /ChangeLog.rss
parent7b9b973e94adeb7444208efdd7ad577fce430e53 (diff)
downloadcurrent-f75fcd750efad1d366cce38d805a708abb4f3af6.tar.gz
current-f75fcd750efad1d366cce38d805a708abb4f3af6.tar.xz
Wed Jan 31 21:19:19 UTC 202420240131211919
ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded. l/libnvme-1.7.1-x86_64-1.txz: Added. This is required by nvme-cli. l/pipewire-1.0.2-x86_64-1.txz: Upgraded. n/curl-8.6.0-x86_64-1.txz: Upgraded. n/libmilter-8.18.1-x86_64-1.txz: Upgraded. extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded. sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-51765 (* Security fix *) extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss31
1 files changed, 29 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 9189c21d5..d3640f545 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,37 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Tue, 30 Jan 2024 22:01:28 GMT</pubDate>
- <lastBuildDate>Tue, 30 Jan 2024 22:34:28 GMT</lastBuildDate>
+ <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate>
+ <lastBuildDate>Wed, 31 Jan 2024 22:07:01 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Wed, 31 Jan 2024 21:19:19 GMT</title>
+ <pubDate>Wed, 31 Jan 2024 21:19:19 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20240131211919</link>
+ <guid isPermaLink="false">20240131211919</guid>
+ <description>
+ <![CDATA[<pre>
+ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded.
+l/libnvme-1.7.1-x86_64-1.txz: Added.
+ This is required by nvme-cli.
+l/pipewire-1.0.2-x86_64-1.txz: Upgraded.
+n/curl-8.6.0-x86_64-1.txz: Upgraded.
+n/libmilter-8.18.1-x86_64-1.txz: Upgraded.
+extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded.
+ sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
+ Remote attackers can use a published exploitation technique to inject e-mail
+ messages with a spoofed MAIL FROM address, allowing bypass of an SPF
+ protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
+ but some other popular e-mail servers do not. This is resolved in 8.18 and
+ later versions with 'o' in srv_features.
+ For more information, see:
+ https://www.cve.org/CVERecord?id=CVE-2023-51765
+ (* Security fix *)
+extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Tue, 30 Jan 2024 22:01:28 GMT</title>
<pubDate>Tue, 30 Jan 2024 22:01:28 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20240130220128</link>