Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware64-current ChangeLog (2017-07-14) ====== ====== Fri Jul 14 22:11:58 UTC 2017 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware64.current>ap/mariadb-10.0.31-x86_64-1.txz]] \\ This update fixes bugs and security issues. \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464 \\ (* Security fix *) * [[slackware64.current>l/gst-plugins-base-1.12.2-x86_64-1.txz]] * [[slackware64.current>l/gst-plugins-good-1.12.2-x86_64-1.txz]] * [[slackware64.current>l/gst-plugins-libav-1.12.2-x86_64-1.txz]] * [[slackware64.current>l/gstreamer-1.12.2-x86_64-1.txz]] * [[slackware64.current>l/libjpeg-turbo-1.5.2-x86_64-1.txz]] * [[slackware64.current>n/samba-4.6.6-x86_64-1.txz]] \\ This update fixes an authentication validation bypass security issue: \\ "Orpheus' Lyre mutual authentication validation bypass" \\ All versions of Samba from 4.0.0 onwards using embedded Heimdal \\ Kerberos are vulnerable to a man-in-the-middle attack impersonating \\ a trusted server, who may gain elevated access to the domain by \\ returning malicious replication or authorization data. \\ Samba binaries built against MIT Kerberos are not vulnerable. \\ For more information, see: \\ https://www.samba.org/samba/security/CVE-2017-11103.html \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 \\ (* Security fix *) * [[slackware64.current>x/mesa-17.1.5-x86_64-1.txz]] {{tag>slackware changelog slackware64-current 2017/07}} news/2017/07/14/slackware64-current-changelog.txt Last modified: 7 years agoby Giuseppe Di Terlizzi Log In