Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-current ChangeLog (2020-08-21) ====== ====== Fri Aug 21 20:23:38 UTC 2020 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware.current>a/kernel-generic-5.4.60-i586-1.txz]] * [[slackware.current>a/kernel-generic-smp-5.4.60_smp-i686-1.txz]] * [[slackware.current>a/kernel-huge-5.4.60-i586-1.txz]] * [[slackware.current>a/kernel-huge-smp-5.4.60_smp-i686-1.txz]] * [[slackware.current>a/kernel-modules-5.4.60-i586-1.txz]] * [[slackware.current>a/kernel-modules-smp-5.4.60_smp-i686-1.txz]] * [[slackware.current>d/cmake-3.18.2-i586-1.txz]] * [[slackware.current>d/kernel-headers-5.4.60_smp-x86-1.txz]] * [[slackware.current>d/nasm-2.15.04-i586-1.txz]] * [[slackware.current>k/kernel-source-5.4.60_smp-noarch-1.txz]] * [[slackware.current>l/xapian-core-1.4.17-i586-1.txz]] * [[slackware.current>n/bind-9.16.6-i586-1.txz]] \\ This update fixes five security issues: \\ "update-policy" rules of type "subdomain" were incorrectly treated as \\ "zonesub" rules, which allowed keys used in "subdomain" rules to update \\ names outside of the specified subdomains. The problem was fixed by making \\ sure "subdomain" rules are again processed as described in the ARM. \\ When BIND 9 was compiled with native PKCS#11 support, it was possible to \\ trigger an assertion failure in code determining the number of bits in the \\ PKCS#11 RSA public key with a specially crafted packet. \\ named could crash in certain query resolution scenarios where QNAME \\ minimization and forwarding were both enabled. \\ It was possible to trigger an assertion failure by sending a specially \\ crafted large TCP DNS message. \\ It was possible to trigger an assertion failure when verifying the response \\ to a TSIG-signed request. \\ For more information, see: \\ https://kb.isc.org/docs/cve-2020-8624 \\ https://kb.isc.org/docs/cve-2020-8623 \\ https://kb.isc.org/docs/cve-2020-8621 \\ https://kb.isc.org/docs/cve-2020-8620 \\ https://kb.isc.org/docs/cve-2020-8622 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622 \\ (* Security fix *) * [[slackware.current>n/getmail-6.03-i586-1.txz]] * [[slackware.current>extra/linux-5.4.60-nosmp-sdk/*]] * [[slackware.current>kernels/*]] ==== Rebuilt ==== * [[slackware.current>isolinux/initrd.img]] * [[slackware.current>usb-and-pxe-installers/usbboot.img]] {{tag>slackware changelog slackware-current 2020/08}} news/2020/08/21/slackware-current-changelog.txt Last modified: 4 years agoby Giuseppe Di Terlizzi Log In