diff options
Diffstat (limited to 'ChangeLog.txt')
-rw-r--r-- | ChangeLog.txt | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/ChangeLog.txt b/ChangeLog.txt index 5b4bc4dd..52edf80e 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,53 @@ +Wed Mar 27 20:37:56 UTC 2019 +a/kernel-generic-4.19.32-x86_64-1.txz: Upgraded. +a/kernel-huge-4.19.32-x86_64-1.txz: Upgraded. +a/kernel-modules-4.19.32-x86_64-1.txz: Upgraded. +ap/hplip-3.19.3-x86_64-1.txz: Upgraded. +d/kernel-headers-4.19.32-x86-1.txz: Upgraded. +d/python3-3.7.3-x86_64-1.txz: Upgraded. + Fixed bugs and the following security issues: + bpo-36216: Changes urlsplit() to raise ValueError when the URL contains + characters that decompose under IDNA encoding (NFKC-normalization) into + characters that affect how the URL is parsed. + bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The + cert parser did not handle CRL distribution points with empty DP or URI + correctly. A malicious or buggy certificate can result into segfault. + Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet + of Cisco. + bpo-35121: Don't send cookies of domain A without Domain attribute to + domain B when domain A is a suffix match of domain B while using a + cookiejar with http.cookiejar.DefaultCookiePolicy policy. + Patch by Karthikeyan Singaravelan. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010 + (* Security fix *) +d/scons-3.0.5-x86_64-1.txz: Upgraded. +k/kernel-source-4.19.32-noarch-1.txz: Upgraded. +n/curl-7.64.1-x86_64-1.txz: Upgraded. +n/gnutls-3.6.7-x86_64-1.txz: Upgraded. + Fixes security issues: + libgnutls, gnutls tools: Every gnutls_free() will automatically set + the free'd pointer to NULL. This prevents possible use-after-free and + double free issues. Use-after-free will be turned into NULL dereference. + The counter-measure does not extend to applications using gnutls_free(). + libgnutls: Fixed a memory corruption (double free) vulnerability in the + certificate verification API. Reported by Tavis Ormandy; addressed with + the change above. [GNUTLS-SA-2019-03-27, #694] + libgnutls: Fixed an invalid pointer access via malformed TLS1.3 async + messages; Found using tlsfuzzer. [GNUTLS-SA-2019-03-27, #704] + libgnutls: enforce key usage limitations on certificates more actively. + Previously we would enforce it for TLS1.2 protocol, now we enforce it + even when TLS1.3 is negotiated, or on client certificates as well. When + an inappropriate for TLS1.3 certificate is seen on the credentials + structure GnuTLS will disable TLS1.3 support for that session (#690). + libgnutls: enforce the equality of the two signature parameters fields + in a certificate. We were already enforcing the signature algorithm, + but there was a bug in parameter checking code. + (* Security fix *) +isolinux/initrd.img: Rebuilt. +kernels/*: Upgraded. +usb-and-pxe-installers/usbboot.img: Rebuilt. ++--------------------------+ Tue Mar 26 23:04:49 UTC 2019 ap/cups-filters-1.22.3-x86_64-1.txz: Upgraded. ap/lsscsi-0.30-x86_64-1.txz: Upgraded. |