diff options
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 49 |
1 files changed, 47 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 4a7d63c1..8df1af1e 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,55 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 9 Nov 2021 20:22:27 GMT</pubDate> - <lastBuildDate>Wed, 10 Nov 2021 16:59:46 GMT</lastBuildDate> + <pubDate>Wed, 10 Nov 2021 20:32:37 GMT</pubDate> + <lastBuildDate>Thu, 11 Nov 2021 07:59:47 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.13</generator> <item> + <title>Wed, 10 Nov 2021 20:32:37 GMT</title> + <pubDate>Wed, 10 Nov 2021 20:32:37 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20211110203237</link> + <guid isPermaLink="false">20211110203237</guid> + <description> + <![CDATA[<pre> +d/python3-3.9.8-x86_64-1.txz: Upgraded. +l/libtasn1-4.18.0-x86_64-1.txz: Upgraded. +n/curl-7.80.0-x86_64-1.txz: Upgraded. +n/ethtool-5.15-x86_64-1.txz: Upgraded. +n/samba-4.15.2-x86_64-1.txz: Upgraded. + This is a security release in order to address the following defects: + SMB1 client connections can be downgraded to plaintext authentication. + A user on the domain can become root on domain members. + Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC. + Samba AD DC did not always rely on the SID and PAC in Kerberos tickets. + Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). + Samba AD DC did not do suffienct access and conformance checking of data + stored. + Use after free in Samba AD DC RPC server. + Subsequent DCE/RPC fragment injection vulnerability. + For more information, see: + https://www.samba.org/samba/security/CVE-2016-2124.html + https://www.samba.org/samba/security/CVE-2020-25717.html + ^^ (PLEASE READ! There are important behaviour changes described) + https://www.samba.org/samba/security/CVE-2020-25718.html + https://www.samba.org/samba/security/CVE-2020-25719.html + https://www.samba.org/samba/security/CVE-2020-25721.html + https://www.samba.org/samba/security/CVE-2020-25722.html + https://www.samba.org/samba/security/CVE-2021-3738.html + https://www.samba.org/samba/security/CVE-2021-23192.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 + (* Security fix *) +x/xorg-server-xwayland-21.1.3-x86_64-1.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Tue, 9 Nov 2021 20:22:27 GMT</title> <pubDate>Tue, 9 Nov 2021 20:22:27 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20211109202227</link> |