diff options
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r-- | ChangeLog.txt | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt index e4b6b17b..b421783e 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,40 @@ +Wed Nov 10 20:32:37 UTC 2021 +d/python3-3.9.8-x86_64-1.txz: Upgraded. +l/libtasn1-4.18.0-x86_64-1.txz: Upgraded. +n/curl-7.80.0-x86_64-1.txz: Upgraded. +n/ethtool-5.15-x86_64-1.txz: Upgraded. +n/samba-4.15.2-x86_64-1.txz: Upgraded. + This is a security release in order to address the following defects: + SMB1 client connections can be downgraded to plaintext authentication. + A user on the domain can become root on domain members. + Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC. + Samba AD DC did not always rely on the SID and PAC in Kerberos tickets. + Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). + Samba AD DC did not do suffienct access and conformance checking of data + stored. + Use after free in Samba AD DC RPC server. + Subsequent DCE/RPC fragment injection vulnerability. + For more information, see: + https://www.samba.org/samba/security/CVE-2016-2124.html + https://www.samba.org/samba/security/CVE-2020-25717.html + ^^ (PLEASE READ! There are important behaviour changes described) + https://www.samba.org/samba/security/CVE-2020-25718.html + https://www.samba.org/samba/security/CVE-2020-25719.html + https://www.samba.org/samba/security/CVE-2020-25721.html + https://www.samba.org/samba/security/CVE-2020-25722.html + https://www.samba.org/samba/security/CVE-2021-3738.html + https://www.samba.org/samba/security/CVE-2021-23192.html + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 + (* Security fix *) +x/xorg-server-xwayland-21.1.3-x86_64-1.txz: Upgraded. ++--------------------------+ Tue Nov 9 20:22:27 UTC 2021 a/dialog-1.3_20211107-x86_64-1.txz: Upgraded. ap/mariadb-10.5.13-x86_64-1.txz: Upgraded. |