summaryrefslogtreecommitdiff
path: root/CHANGES_AND_HINTS.TXT
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2018-11-29 05:53:27 +0000
committerEric Hameleers <alien@slackware.com>2018-11-29 17:59:45 +0100
commit7284497dcf1ed750a9703553209d899a8c111149 (patch)
treed28ab1c79f228cb433fd739f28cd225fdcdae42d /CHANGES_AND_HINTS.TXT
parent388986876373b8d6d9053c36196978464bd3362e (diff)
downloadcurrent-7284497dcf1ed750a9703553209d899a8c111149.tar.gz
Thu Nov 29 05:53:27 UTC 201820181129055327
a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
Diffstat (limited to 'CHANGES_AND_HINTS.TXT')
-rw-r--r--CHANGES_AND_HINTS.TXT8
1 files changed, 5 insertions, 3 deletions
diff --git a/CHANGES_AND_HINTS.TXT b/CHANGES_AND_HINTS.TXT
index 8a6ba660..d4b2bf3b 100644
--- a/CHANGES_AND_HINTS.TXT
+++ b/CHANGES_AND_HINTS.TXT
@@ -16,6 +16,7 @@ Note that upgrading from a Slackware version earlier than 14.2 is NOT
*** PACKAGE ADDITIONS SINCE 14.2 ***
a/efivar
+a/f2fs-tools
a/haveged
a/hostname (split from n/net-tools)
a/lbzip2
@@ -48,6 +49,7 @@ l/SDL2_ttf
l/ffmpeg
l/fluidsynth
l/gexiv2
+l/graphite2
l/gst-plugins-libav
l/id3lib
l/jansson
@@ -92,7 +94,7 @@ n/nghttp2
n/npth
n/openssl10 (compat development package for openssl-1.0.2)
n/postfix
-n/s-nail
+n/s-nail (replaces mailx)
n/sshfs
n/wireless_tools (renamed from n/wireless-tools)
t/fig2dev (replaces t/transfig)
@@ -139,7 +141,7 @@ l/pyrex
l/virtuoso-ose
n/dirmngr
n/idnkit
-n/mailx (replaced by s-nail)
+n/mailx (replaced by n/s-nail)
n/pth
n/rfkill (included in a/util-linux)
n/sendmail (moved to /extra ; replaced by n/postfix and n/libmilter)
@@ -265,7 +267,7 @@ Use one of the provided generic kernels for daily use. Do not report
ATI proprietary drivers) if you use the SMP kernel.
If you decide to use one of the non-SMP kernels, you will need to follow the
- instructions in /extra/linux-4.19.4-nosmp-sdk/README.TXT to modify your
+ instructions in /extra/linux-4.19.5-nosmp-sdk/README.TXT to modify your
kernel sources for non-SMP usage. Note that this only applies if you are
using the Slackware-provided non-SMP kernel - if you build a custom kernel,
the symlinks at /lib/modules/$(uname -r)/{build,source} will point to the