summaryrefslogtreecommitdiffstats
path: root/recompress.sh
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-12-23 02:48:56 +0000
committer Eric Hameleers <alien@slackware.com>2023-12-23 13:30:45 +0100
commitd46ef1440f426d37b8e6935991e5c5808e558d66 (patch)
treea77e740580aa496881bdff4b765b7f6711beb742 /recompress.sh
parent7bbe71feeaf755f8126ea2880faa06c2f520eeaf (diff)
downloadcurrent-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.gz
current-d46ef1440f426d37b8e6935991e5c5808e558d66.tar.xz
Sat Dec 23 02:48:56 UTC 202320231223024856_15.0
patches/packages/glibc-zoneinfo-2023d-noarch-1_slack15.0.txz: Upgraded. This package provides the latest timezone updates. patches/packages/postfix-3.6.13-x86_64-1_slack15.0.txz: Upgraded. Security: this release adds support to defend against an email spoofing attack (SMTP smuggling) on recipients at a Postfix server. Sites concerned about SMTP smuggling attacks should enable this feature on Internet-facing Postfix servers. For compatibility with non-standard clients, Postfix by default excludes clients in mynetworks from this countermeasure. The recommended settings are: # Optionally disconnect remote SMTP clients that send bare newlines, # but allow local clients with non-standard SMTP implementations # such as netcat, fax machines, or load balancer health checks. # smtpd_forbid_bare_newline = yes smtpd_forbid_bare_newline_exclusions = $mynetworks The smtpd_forbid_bare_newline feature is disabled by default. For more information, see: https://www.postfix.org/smtp-smuggling.html (* Security fix *)
Diffstat (limited to 'recompress.sh')
-rwxr-xr-xrecompress.sh3
1 files changed, 3 insertions, 0 deletions
diff --git a/recompress.sh b/recompress.sh
index fe01ceb49..62bc762e1 100755
--- a/recompress.sh
+++ b/recompress.sh
@@ -1258,6 +1258,9 @@ gzip ./patches/source/sdl/CVE-2021-33657.patch
gzip ./patches/source/sdl/SDL_ttf.shaded.text.diff
gzip ./patches/source/sdl/SDL_mixer.usrlocal.diff
gzip ./patches/source/sdl/libsdl-1.2.15-resizing.patch
+gzip ./patches/source/postfix/postfix.script.starting.message.diff
+gzip ./patches/source/postfix/postfix.only.warn.regular.files.diff
+gzip ./patches/source/postfix/doinst.sh
gzip ./patches/source/emacs/d48bb4874bc6cd3e69c7a15fc3c91cc141025c51.patch
gzip ./patches/source/emacs/doinst.sh
gzip ./patches/source/xorg-server/patch/xorg-server/CVE-2022-46342.patch