ChangeLog for: 2020-08-21 21:23:38
a/kernel-generic-5.4.60-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.4.60-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.4.60-x86_64-1.txz:  Upgraded.
d/cmake-3.18.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.4.60-x86-1.txz:  Upgraded.
d/nasm-2.15.04-x86_64-1.txz:  Upgraded.
k/kernel-source-5.4.60-noarch-1.txz:  Upgraded.
l/xapian-core-1.4.17-x86_64-1.txz:  Upgraded.
n/bind-9.16.6-x86_64-1.txz:  Upgraded.
  This update fixes five security issues:
  "update-policy" rules of type "subdomain" were incorrectly treated as
  "zonesub" rules, which allowed keys used in "subdomain" rules to update
  names outside of the specified subdomains. The problem was fixed by making
  sure "subdomain" rules are again processed as described in the ARM.
  When BIND 9 was compiled with native PKCS#11 support, it was possible to
  trigger an assertion failure in code determining the number of bits in the
  PKCS#11 RSA public key with a specially crafted packet.
  named could crash in certain query resolution scenarios where QNAME
  minimization and forwarding were both enabled.
  It was possible to trigger an assertion failure by sending a specially
  crafted large TCP DNS message.
  It was possible to trigger an assertion failure when verifying the response
  to a TSIG-signed request.
  For more information, see:
    https://kb.isc.org/docs/cve-2020-8624
    https://kb.isc.org/docs/cve-2020-8623
    https://kb.isc.org/docs/cve-2020-8621
    https://kb.isc.org/docs/cve-2020-8620
    https://kb.isc.org/docs/cve-2020-8622
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
  (* Security fix *)
n/getmail-6.03-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.