diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 52 |
1 files changed, 50 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 45f3b940f..df33a607c 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,58 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 5 Apr 2022 19:16:30 GMT</pubDate> - <lastBuildDate>Wed, 6 Apr 2022 04:59:43 GMT</lastBuildDate> + <pubDate>Wed, 6 Apr 2022 20:23:46 GMT</pubDate> + <lastBuildDate>Thu, 7 Apr 2022 04:59:44 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Wed, 6 Apr 2022 20:23:46 GMT</title> + <pubDate>Wed, 6 Apr 2022 20:23:46 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220406202346</link> + <guid isPermaLink="false">20220406202346</guid> + <description> + <![CDATA[<pre> +a/haveged-1.9.17-x86_64-2.txz: Rebuilt. + Install /etc/rc.d/rc.haveged as non-executable. For existing installations + running a recent kernel, it is safe to turn this off. + Back when we added the haveged package we were using the 4.4 kernel, but + since Linux 5.4 this same entropy generating algorithm has been built into + the kernel, so there's no reason to also run it in userspace. We'll keep + the package around (for now, anyway) in case someone might be running an + old kernel. Thanks to Jason A. Donenfeld. +a/sysvinit-scripts-15.0-noarch-10.txz: Rebuilt. + rc.S, rc.6: use the seedrng utility to seed and initialize the kernel + random number generator and generate a new seed. + If seedrng is missing, we'll attempt to do these things with scripting. + Thanks to Jason A. Donenfeld for hints about how to make a modest + improvement in that regard (blame me for any problems with my own changes), + but because you can't force the kernel RNG to initialize with a script + (it needs an ioctl), you won't get the same guarantees that you do when + using the new seedrng utility. +a/util-linux-2.38-x86_64-2.txz: Rebuilt. + Added seedrng utility, used to seed and initialize the kernel random number + generator and to generate new seeds for carrying entropy across reboots. + Thanks to Jason A. Donenfeld. +n/libmnl-1.0.5-x86_64-1.txz: Upgraded. +n/libnfnetlink-1.0.2-x86_64-1.txz: Upgraded. +xap/mozilla-thunderbird-91.8.0-x86_64-1.txz: Upgraded. + This release contains security fixes and improvements. + For more information, see: + https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/ + https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/ + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Tue, 5 Apr 2022 19:16:30 GMT</title> <pubDate>Tue, 5 Apr 2022 19:16:30 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220405191630</link> |