From f75fcd750efad1d366cce38d805a708abb4f3af6 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Wed, 31 Jan 2024 21:19:19 +0000 Subject: Wed Jan 31 21:19:19 UTC 2024 ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded. l/libnvme-1.7.1-x86_64-1.txz: Added. This is required by nvme-cli. l/pipewire-1.0.2-x86_64-1.txz: Upgraded. n/curl-8.6.0-x86_64-1.txz: Upgraded. n/libmilter-8.18.1-x86_64-1.txz: Upgraded. extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded. sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports . but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-51765 (* Security fix *) extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded. --- ChangeLog.rss | 31 +++++++++++++++++++++++++++++-- 1 file changed, 29 insertions(+), 2 deletions(-) (limited to 'ChangeLog.rss') diff --git a/ChangeLog.rss b/ChangeLog.rss index 9189c21d5..d3640f545 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,9 +11,36 @@ Tracking Slackware development in git. en-us urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f - Tue, 30 Jan 2024 22:01:28 GMT - Tue, 30 Jan 2024 22:34:28 GMT + Wed, 31 Jan 2024 21:19:19 GMT + Wed, 31 Jan 2024 22:07:01 GMT maintain_current_git.sh v 1.17 + + Wed, 31 Jan 2024 21:19:19 GMT + Wed, 31 Jan 2024 21:19:19 GMT + https://git.slackware.nl/current/tag/?h=20240131211919 + 20240131211919 + + +ap/nvme-cli-2.7.1-x86_64-1.txz: Upgraded. +l/libnvme-1.7.1-x86_64-1.txz: Added. + This is required by nvme-cli. +l/pipewire-1.0.2-x86_64-1.txz: Upgraded. +n/curl-8.6.0-x86_64-1.txz: Upgraded. +n/libmilter-8.18.1-x86_64-1.txz: Upgraded. +extra/sendmail/sendmail-8.18.1-x86_64-1.txz: Upgraded. + sendmail through 8.17.2 allows SMTP smuggling in certain configurations. + Remote attackers can use a published exploitation technique to inject e-mail + messages with a spoofed MAIL FROM address, allowing bypass of an SPF + protection mechanism. This occurs because sendmail supports . + but some other popular e-mail servers do not. This is resolved in 8.18 and + later versions with 'o' in srv_features. + For more information, see: + https://www.cve.org/CVERecord?id=CVE-2023-51765 + (* Security fix *) +extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz: Upgraded. + ]]> + + Tue, 30 Jan 2024 22:01:28 GMT Tue, 30 Jan 2024 22:01:28 GMT -- cgit v1.2.3-65-gdbad