changelog_14.2
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
changelog_14.2 [2020/05/18 19:37] – [2020-04-21] connie | changelog_14.2 [2020/06/14 18:58] – [2020-05-19] connie | ||
---|---|---|---|
Line 2: | Line 2: | ||
Slackware upstream ChangeLog entries are courtesy of Patrick Volkerding. | Slackware upstream ChangeLog entries are courtesy of Patrick Volkerding. | ||
+ | |||
+ | ==== 2020-06-14 ==== | ||
+ | |||
+ | **linux-libre-*-4.4.227**: | ||
+ | These updates fix various bugs and security issues, including a mitigation | ||
+ | for SRBDS (Special Register Buffer Data Sampling). SRBDS is an MDS-like | ||
+ | speculative side channel that can leak bits from the random number generator | ||
+ | (RNG) across cores and threads. | ||
+ | Be sure to upgrade your initrd after upgrading the kernel packages. | ||
+ | If you use lilo to boot your machine, be sure lilo.conf points to the correct | ||
+ | kernel and initrd and run lilo as root to update the bootloader. | ||
+ | If you use elilo to boot your machine, you should run eliloconfig to copy the | ||
+ | kernel and initrd to the EFI System Partition. | ||
+ | For more information, | ||
+ | |||
+ | Fixed in 4.4.218: | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | Fixed in 4.4.219: | ||
+ | * https:// | ||
+ | * https:// | ||
+ | Fixed in 4.4.220: | ||
+ | * https:// | ||
+ | Fixed in 4.4.221: | ||
+ | * https:// | ||
+ | * https:// | ||
+ | Fixed in 4.4.222: | ||
+ | * https:// | ||
+ | Fixed in 4.4.224: | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | Fixed in 4.4.225: | ||
+ | * https:// | ||
+ | Fixed in 4.4.226: | ||
+ | * https:// | ||
+ | Fixed in 4.4.227: | ||
+ | * https:// | ||
+ | (**Security fix**) | ||
+ | |||
+ | **gnutls-3.6.14**: | ||
+ | Fixed insecure session ticket key construction, | ||
+ | would not bind the session ticket encryption key with a value supplied by | ||
+ | the application until the initial key rotation, allowing attacker to bypass | ||
+ | authentication in TLS 1.3 and recover previous conversations in TLS 1.2. | ||
+ | [GNUTLS-SA-2020-06-03, | ||
+ | (**Security fix**) | ||
+ | |||
+ | **ca-certificates-20200602**: | ||
+ | This update provides the latest CA certificates to check for the | ||
+ | authenticity of SSL connections. | ||
+ | |||
+ | **proftpd-1.3.6d**: | ||
+ | This is a bugfix release: | ||
+ | Fixed issue with FTPS uploads of large files using TLSv1.3 (Issue #959). | ||
+ | |||
+ | ==== 2020-05-19 ==== | ||
+ | |||
+ | **bind-9.11.19**: | ||
+ | This update fixes security issues: | ||
+ | A malicious actor who intentionally exploits the lack of effective | ||
+ | limitation on the number of fetches performed when processing referrals | ||
+ | can, through the use of specially crafted referrals, cause a recursing | ||
+ | server to issue a very large number of fetches in an attempt to process | ||
+ | the referral. This has at least two potential effects: The performance of | ||
+ | the recursing server can potentially be degraded by the additional work | ||
+ | required to perform these fetches, and the attacker can exploit this | ||
+ | behavior to use the recursing server as a reflector in a reflection attack | ||
+ | with a high amplification factor. | ||
+ | Replaying a TSIG BADTIME response as a request could trigger an assertion | ||
+ | failure. | ||
+ | For more information, | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | (**Security fix**) | ||
+ | |||
+ | **libexif-0.6.22**: | ||
+ | This update fixes bugs and security issues: | ||
+ | * CVE-2018-20030: | ||
+ | * CVE-2020-13114: | ||
+ | * CVE-2020-13113: | ||
+ | * CVE-2020-13112: | ||
+ | * CVE-2020-0093: | ||
+ | * CVE-2019-9278: | ||
+ | * CVE-2020-12767: | ||
+ | * CVE-2016-6328: | ||
+ | * CVE-2017-7544: | ||
+ | For more information, | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | (**Security fix**) | ||
==== 2020-05-18 ==== | ==== 2020-05-18 ==== |
changelog_14.2.txt · Last modified: 2023/12/23 13:40 by connie