Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-current ChangeLog (2016-08-23) ====== ====== Tue Aug 23 19:45:33 UTC 2016 ====== ===== Packages ===== ==== Rebuilt ==== * [[slackware.current>a/glibc-solibs-2.24-i586-2.txz]] * [[slackware.current>ap/screen-4.4.0-i586-2.txz]] \\ Reverted a change to /etc/screenrc.new that prevented the console from being \\ cleared when a screen session was detached. Thanks to Stuart Winter. * [[slackware.current>d/binutils-2.27-i586-2.txz]] \\ Recompiled with --disable-compressed-debug-sections, since other tools are \\ not yet capable of parsing that. \\ Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter. * [[slackware.current>l/glib2-2.46.2-i586-3.txz]] \\ Applied upstream patch to fix a use-before-allocate bug in libgio. Without \\ this fix, Thunar will crash if $HOME is on an NFS volume. \\ Thanks to Jonathan Woithe. * [[slackware.current>l/glibc-2.24-i586-2.txz]] \\ If libm.so is a linker script, don't clobber it with a symlink. \\ Thanks to guanx. * [[slackware.current>l/glibc-i18n-2.24-i586-2.txz]] * [[slackware.current>l/glibc-profile-2.24-i586-2.txz]] * [[slackware.current>n/network-scripts-14.2-noarch-3.txz]] \\ In rc.inet1, skip interfaces that are not configured in rc.inet1.conf \\ to speed up the boot time slightly. \\ Thanks to Amritpal Bath. * [[slackware.current>n/stunnel-5.35-i586-2.txz]] \\ Fixed incorrect config file name in generate-stunnel-key.sh. \\ Thanks to Ebben Aries. * [[slackware.current>isolinux/initrd.img]] * [[slackware.current>usb-and-pxe-installers/usbboot.img]] ==== Upgraded ==== * [[slackware.current>a/kernel-firmware-20160823git-noarch-1.txz]] * [[slackware.current>a/kernel-generic-4.4.19-i586-1.txz]] \\ A flaw was found in the implementation of the Linux kernels handling of \\ networking challenge ack where an attacker is able to determine the shared \\ counter. This may allow an attacker located on different subnet to inject \\ or take over a TCP connection between a server and client without having to \\ be a traditional Man In the Middle (MITM) style attack. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389 \\ (* Security fix *) * [[slackware.current>a/kernel-generic-smp-4.4.19_smp-i686-1.txz]] \\ A flaw was found in the implementation of the Linux kernels handling of \\ networking challenge ack where an attacker is able to determine the shared \\ counter. This may allow an attacker located on different subnet to inject \\ or take over a TCP connection between a server and client without having to \\ be a traditional Man In the Middle (MITM) style attack. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389 \\ (* Security fix *) * [[slackware.current>a/kernel-huge-4.4.19-i586-1.txz]] \\ A flaw was found in the implementation of the Linux kernels handling of \\ networking challenge ack where an attacker is able to determine the shared \\ counter. This may allow an attacker located on different subnet to inject \\ or take over a TCP connection between a server and client without having to \\ be a traditional Man In the Middle (MITM) style attack. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389 \\ (* Security fix *) * [[slackware.current>a/kernel-huge-smp-4.4.19_smp-i686-1.txz]] \\ A flaw was found in the implementation of the Linux kernels handling of \\ networking challenge ack where an attacker is able to determine the shared \\ counter. This may allow an attacker located on different subnet to inject \\ or take over a TCP connection between a server and client without having to \\ be a traditional Man In the Middle (MITM) style attack. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389 \\ (* Security fix *) * [[slackware.current>a/kernel-modules-4.4.19-i586-1.txz]] * [[slackware.current>a/kernel-modules-smp-4.4.19_smp-i686-1.txz]] * [[slackware.current>ap/diffutils-3.5-i586-1.txz]] * [[slackware.current>ap/linuxdoc-tools-0.9.72-i586-1.txz]] \\ Thanks to Stuart Winter. * [[slackware.current>d/kernel-headers-4.4.19_smp-x86-1.txz]] * [[slackware.current>k/kernel-source-4.4.19_smp-noarch-1.txz]] \\ A flaw was found in the implementation of the Linux kernels handling of \\ networking challenge ack where an attacker is able to determine the shared \\ counter. This may allow an attacker located on different subnet to inject \\ or take over a TCP connection between a server and client without having to \\ be a traditional Man In the Middle (MITM) style attack. \\ For more information, see: \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389 \\ (* Security fix *) * [[slackware.current>n/gnupg-1.4.21-i586-1.txz]] \\ Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who \\ obtains 580 bytes from the standard RNG can trivially predict the next \\ 20 bytes of output. (This is according to the NEWS file included in the \\ source. According to the annoucement linked below, an attacker who obtains \\ 4640 bits from the RNG can trivially predict the next 160 bits of output.) \\ Problem detected by Felix Doerre and Vladimir Klebanov, KIT. \\ For more information, see: \\ https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 \\ (* Security fix *) * [[slackware.current>n/libgcrypt-1.7.3-i586-1.txz]] \\ Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who \\ obtains 580 bytes from the standard RNG can trivially predict the next \\ 20 bytes of output. (This is according to the NEWS file included in the \\ source. According to the annoucement linked below, an attacker who obtains \\ 4640 bits from the RNG can trivially predict the next 160 bits of output.) \\ Problem detected by Felix Doerre and Vladimir Klebanov, KIT. \\ For more information, see: \\ https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html \\ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313 \\ (* Security fix *) * [[slackware.current>xap/mozilla-firefox-48.0.1-i586-1.txz]] * [[slackware.current>extra/linux-4.4.19-nosmp-sdk/*]] * [[slackware.current>kernels/*]] {{tag>slackware changelog slackware-current 2016/08}} news/2016/08/23/slackware-current-changelog.txt Last modified: 8 years agoby Giuseppe Di Terlizzi Log In