diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2018-11-29 05:53:27 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2018-11-29 17:59:45 +0100 |
commit | 7284497dcf1ed750a9703553209d899a8c111149 (patch) | |
tree | d28ab1c79f228cb433fd739f28cd225fdcdae42d /source/a/sysvinit-scripts | |
parent | 388986876373b8d6d9053c36196978464bd3362e (diff) | |
download | current-7284497dcf1ed750a9703553209d899a8c111149.tar.gz current-7284497dcf1ed750a9703553209d899a8c111149.tar.xz |
Thu Nov 29 05:53:27 UTC 201820181129055327
a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt.
rc.S: simplify test for F2FS filesystem on /. Thanks to GazL.
ap/soma-3.2.0-noarch-1.txz: Upgraded.
d/cmake-3.13.1-x86_64-1.txz: Upgraded.
l/jansson-2.12-x86_64-1.txz: Upgraded.
n/rp-pppoe-3.13-x86_64-1.txz: Upgraded.
n/samba-4.9.3-x86_64-1.txz: Upgraded.
This update fixes bugs and security issues:
CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD
Internal DNS server
CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT
CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server
CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers
CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos
configuration (unsupported)
CVE-2018-16857: Bad password count in AD DC not always effective
For more information, see:
https://www.samba.org/samba/security/CVE-2018-14629.html
https://www.samba.org/samba/security/CVE-2018-16841.html
https://www.samba.org/samba/security/CVE-2018-16851.html
https://www.samba.org/samba/security/CVE-2018-16852.html
https://www.samba.org/samba/security/CVE-2018-16853.html
https://www.samba.org/samba/security/CVE-2018-16857.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857
(* Security fix *)
x/mesa-18.2.6-x86_64-1.txz: Upgraded.
x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'source/a/sysvinit-scripts')
-rw-r--r-- | source/a/sysvinit-scripts/scripts/rc.S | 2 | ||||
-rwxr-xr-x | source/a/sysvinit-scripts/sysvinit-scripts.SlackBuild | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/source/a/sysvinit-scripts/scripts/rc.S b/source/a/sysvinit-scripts/scripts/rc.S index a382bd556..e53cd96da 100644 --- a/source/a/sysvinit-scripts/scripts/rc.S +++ b/source/a/sysvinit-scripts/scripts/rc.S @@ -231,7 +231,7 @@ fi # If we're using F2FS for the root filesystem, don't check it as it doesn't # allow checking a read-only filesystem: -if [ "$(cat /etc/fstab | tr '\t' ' ' | tr -s ' ' | grep ' / ' | cut -f 3 -d ' ')" = "f2fs" ]; then +if grep -q ' / f2fs ' /proc/mounts ; then echo "Remounting root device with read-write enabled." /sbin/mount -w -v -n -o remount / elif [ ! $READWRITE = yes ]; then diff --git a/source/a/sysvinit-scripts/sysvinit-scripts.SlackBuild b/source/a/sysvinit-scripts/sysvinit-scripts.SlackBuild index aafd0143a..c5b91f4b0 100755 --- a/source/a/sysvinit-scripts/sysvinit-scripts.SlackBuild +++ b/source/a/sysvinit-scripts/sysvinit-scripts.SlackBuild @@ -25,7 +25,7 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=sysvinit-scripts VERSION=${VERSION:-2.1} ARCH=noarch -BUILD=${BUILD:-22} +BUILD=${BUILD:-23} # If the variable PRINT_PACKAGE_NAME is set, then this script will report what # the name of the created package would be, and then exit. This information |