Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware64-current ChangeLog (2021-11-10) ====== ====== Wed Nov 10 20:32:37 UTC 2021 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware64.current>d/python3-3.9.8-x86_64-1.txz]] * [[slackware64.current>l/libtasn1-4.18.0-x86_64-1.txz]] * [[slackware64.current>n/curl-7.80.0-x86_64-1.txz]] * [[slackware64.current>n/ethtool-5.15-x86_64-1.txz]] * [[slackware64.current>n/samba-4.15.2-x86_64-1.txz]] \\ This is a security release in order to address the following defects: \\ SMB1 client connections can be downgraded to plaintext authentication. \\ A user on the domain can become root on domain members. \\ Samba AD DC did not correctly sandbox Kerberos tickets issued by an RODC. \\ Samba AD DC did not always rely on the SID and PAC in Kerberos tickets. \\ Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). \\ Samba AD DC did not do suffienct access and conformance checking of data \\ stored. \\ Use after free in Samba AD DC RPC server. \\ Subsequent DCE/RPC fragment injection vulnerability. \\ For more information, see: \\ https://www.samba.org/samba/security/CVE-2016-2124.html \\ https://www.samba.org/samba/security/CVE-2020-25717.html \\ ^^ (PLEASE READ! There are important behaviour changes described) \\ https://www.samba.org/samba/security/CVE-2020-25718.html \\ https://www.samba.org/samba/security/CVE-2020-25719.html \\ https://www.samba.org/samba/security/CVE-2020-25721.html \\ https://www.samba.org/samba/security/CVE-2020-25722.html \\ https://www.samba.org/samba/security/CVE-2021-3738.html \\ https://www.samba.org/samba/security/CVE-2021-23192.html \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25718 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25721 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25722 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3738 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23192 \\ (* Security fix *) * [[slackware64.current>x/xorg-server-xwayland-21.1.3-x86_64-1.txz]] {{tag>slackware changelog slackware64-current 2021-11}} news/2021/11/10/slackware64-current-changelog.txt Last modified: 2 years agoby Giuseppe Di Terlizzi Log In