diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2020-01-31 20:46:25 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2020-02-01 08:59:50 +0100 |
commit | 4e955dc4b6fff43956d47c0286bb698e03f14b11 (patch) | |
tree | 8821f786c06617480dce97b28c23ee78836010c2 /ChangeLog.txt | |
parent | 0012caf61824ffcca7bbe5cd19b79612d6445307 (diff) | |
download | current-4e955dc4b6fff43956d47c0286bb698e03f14b11.tar.gz |
Fri Jan 31 20:46:25 UTC 202020200131204625
a/util-linux-2.35.1-x86_64-1.txz: Upgraded.
a/zerofree-1.1.1-x86_64-1.txz: Added.
Also queued up for the next installer build. Thanks to bifferos.
ap/sudo-1.8.31-x86_64-1.txz: Upgraded.
This update fixes a security issue:
In Sudo before 1.8.31, if pwfeedback is enabled in /etc/sudoers, users can
trigger a stack-based buffer overflow in the privileged sudo process.
(pwfeedback is a default setting in some Linux distributions; however, it
is not the default for upstream or in Slackware, and would exist only if
enabled by an administrator.) The attacker needs to deliver a long string
to the stdin of getln() in tgetpass.c.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634
(* Security fix *)
n/NetworkManager-1.22.6-x86_64-1.txz: Upgraded.
n/openldap-client-2.4.49-x86_64-1.txz: Upgraded.
xfce/Thunar-1.8.11-x86_64-1.txz: Removed.
xfce/thunar-1.8.12-x86_64-1.txz: Added.
Changed package name from "Thunar" to "thunar" to follow upstream's naming.
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r-- | ChangeLog.txt | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt index ceaf908f..59001386 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,24 @@ +Fri Jan 31 20:46:25 UTC 2020 +a/util-linux-2.35.1-x86_64-1.txz: Upgraded. +a/zerofree-1.1.1-x86_64-1.txz: Added. + Also queued up for the next installer build. Thanks to bifferos. +ap/sudo-1.8.31-x86_64-1.txz: Upgraded. + This update fixes a security issue: + In Sudo before 1.8.31, if pwfeedback is enabled in /etc/sudoers, users can + trigger a stack-based buffer overflow in the privileged sudo process. + (pwfeedback is a default setting in some Linux distributions; however, it + is not the default for upstream or in Slackware, and would exist only if + enabled by an administrator.) The attacker needs to deliver a long string + to the stdin of getln() in tgetpass.c. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634 + (* Security fix *) +n/NetworkManager-1.22.6-x86_64-1.txz: Upgraded. +n/openldap-client-2.4.49-x86_64-1.txz: Upgraded. +xfce/Thunar-1.8.11-x86_64-1.txz: Removed. +xfce/thunar-1.8.12-x86_64-1.txz: Added. + Changed package name from "Thunar" to "thunar" to follow upstream's naming. ++--------------------------+ Fri Jan 31 03:36:03 UTC 2020 a/inotify-tools-3.20.2-x86_64-1.txz: Upgraded. d/llvm-9.0.1-x86_64-3.txz: Rebuilt. |