summaryrefslogtreecommitdiff
path: root/ChangeLog.txt
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r--ChangeLog.txt50
1 files changed, 50 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 5b4bc4dd..52edf80e 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,53 @@
+Wed Mar 27 20:37:56 UTC 2019
+a/kernel-generic-4.19.32-x86_64-1.txz: Upgraded.
+a/kernel-huge-4.19.32-x86_64-1.txz: Upgraded.
+a/kernel-modules-4.19.32-x86_64-1.txz: Upgraded.
+ap/hplip-3.19.3-x86_64-1.txz: Upgraded.
+d/kernel-headers-4.19.32-x86-1.txz: Upgraded.
+d/python3-3.7.3-x86_64-1.txz: Upgraded.
+ Fixed bugs and the following security issues:
+ bpo-36216: Changes urlsplit() to raise ValueError when the URL contains
+ characters that decompose under IDNA encoding (NFKC-normalization) into
+ characters that affect how the URL is parsed.
+ bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The
+ cert parser did not handle CRL distribution points with empty DP or URI
+ correctly. A malicious or buggy certificate can result into segfault.
+ Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet
+ of Cisco.
+ bpo-35121: Don't send cookies of domain A without Domain attribute to
+ domain B when domain A is a suffix match of domain B while using a
+ cookiejar with http.cookiejar.DefaultCookiePolicy policy.
+ Patch by Karthikeyan Singaravelan.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010
+ (* Security fix *)
+d/scons-3.0.5-x86_64-1.txz: Upgraded.
+k/kernel-source-4.19.32-noarch-1.txz: Upgraded.
+n/curl-7.64.1-x86_64-1.txz: Upgraded.
+n/gnutls-3.6.7-x86_64-1.txz: Upgraded.
+ Fixes security issues:
+ libgnutls, gnutls tools: Every gnutls_free() will automatically set
+ the free'd pointer to NULL. This prevents possible use-after-free and
+ double free issues. Use-after-free will be turned into NULL dereference.
+ The counter-measure does not extend to applications using gnutls_free().
+ libgnutls: Fixed a memory corruption (double free) vulnerability in the
+ certificate verification API. Reported by Tavis Ormandy; addressed with
+ the change above. [GNUTLS-SA-2019-03-27, #694]
+ libgnutls: Fixed an invalid pointer access via malformed TLS1.3 async
+ messages; Found using tlsfuzzer. [GNUTLS-SA-2019-03-27, #704]
+ libgnutls: enforce key usage limitations on certificates more actively.
+ Previously we would enforce it for TLS1.2 protocol, now we enforce it
+ even when TLS1.3 is negotiated, or on client certificates as well. When
+ an inappropriate for TLS1.3 certificate is seen on the credentials
+ structure GnuTLS will disable TLS1.3 support for that session (#690).
+ libgnutls: enforce the equality of the two signature parameters fields
+ in a certificate. We were already enforcing the signature algorithm,
+ but there was a bug in parameter checking code.
+ (* Security fix *)
+isolinux/initrd.img: Rebuilt.
+kernels/*: Upgraded.
+usb-and-pxe-installers/usbboot.img: Rebuilt.
++--------------------------+
Tue Mar 26 23:04:49 UTC 2019
ap/cups-filters-1.22.3-x86_64-1.txz: Upgraded.
ap/lsscsi-0.30-x86_64-1.txz: Upgraded.