From 7284497dcf1ed750a9703553209d899a8c111149 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Thu, 29 Nov 2018 05:53:27 +0000 Subject: Thu Nov 29 05:53:27 UTC 2018 a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded. --- ChangeLog.txt | 58 ++++++++++++++++++++++++++++++++++++++++++++++------------ 1 file changed, 46 insertions(+), 12 deletions(-) (limited to 'ChangeLog.txt') diff --git a/ChangeLog.txt b/ChangeLog.txt index 7fb48c6f1..713db0c31 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,37 @@ +Thu Nov 29 05:53:27 UTC 2018 +a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. + rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. +ap/soma-3.2.0-noarch-1.txz: Upgraded. +d/cmake-3.13.1-x86_64-1.txz: Upgraded. +l/jansson-2.12-x86_64-1.txz: Upgraded. +n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. +n/samba-4.9.3-x86_64-1.txz: Upgraded. + This update fixes bugs and security issues: + CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD + Internal DNS server + CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT + CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server + CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers + CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos + configuration (unsupported) + CVE-2018-16857: Bad password count in AD DC not always effective + For more information, see: + https://www.samba.org/samba/security/CVE-2018-14629.html + https://www.samba.org/samba/security/CVE-2018-16841.html + https://www.samba.org/samba/security/CVE-2018-16851.html + https://www.samba.org/samba/security/CVE-2018-16852.html + https://www.samba.org/samba/security/CVE-2018-16853.html + https://www.samba.org/samba/security/CVE-2018-16857.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 + (* Security fix *) +x/mesa-18.2.6-x86_64-1.txz: Upgraded. +x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded. ++--------------------------+ Wed Nov 28 07:25:32 UTC 2018 a/elilo-3.16-x86_64-9.txz: Rebuilt. eliloconfig: don't assume that mount output lists the / partition first. @@ -102,18 +136,18 @@ ap/mariadb-10.3.11-x86_64-1.txz: Upgraded. This update fixes bugs and security issues. For more information, see: https://mariadb.com/kb/en/library/mariadb-10311-release-notes/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3282 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-9843 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3174 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3143 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3156 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3251 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3185 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3277 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3162 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3173 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3200 - https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2018-3284 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3185 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3277 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3162 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3173 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3200 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3284 (* Security fix *) d/cmake-3.13.0-x86_64-1.txz: Upgraded. d/git-2.19.2-x86_64-1.txz: Upgraded. -- cgit v1.2.3