Slackwarearm-current ChangeLog (2017-09-21)
Thu Sep 21 08:08:08 UTC 2017
The mini root filesystem for -current has been updated:
ftp://ftp.arm.slackware.com/slackwarearm/slackwarearm-devtools/minirootfs/
Packages
Upgraded
- a/libgudev-232-arm-1.txz
- a/usb_modeswitch-2.5.1-arm-1.txz
- ap/man-pages-4.13-noarch-1.txz
- d/cmake-3.9.2-arm-1.txz
- d/ruby-2.4.2-arm-1.txz
This release includes several security fixes.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
(* Security fix *) - n/samba-4.6.8-arm-1.txz
This is a security release in order to address the following defects:
SMB1/2/3 connections may not require signing where they should. A man in the
middle attack may hijack client connections.
SMB3 connections don't keep encryption across DFS redirects. A man in the
middle attack can read and may alter confidential documents transferred via
a client connection, which are reached via DFS redirect when the original
connection used SMB3.
Server memory information leak over SMB1. Client with write access to a share
can cause server memory contents to be written into a file or printer.
For more information, see:
https://www.samba.org/samba/security/CVE-2017-12150.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150
https://www.samba.org/samba/security/CVE-2017-12151.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151
https://www.samba.org/samba/security/CVE-2017-12163.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
(* Security fix *) - x/fontconfig-2.12.5-arm-1.txz
- x/libinput-1.8.2-arm-1.txz
- x/mesa-17.2.1-arm-1.txz
- x/xf86-input-libinput-0.26.0-arm-1.txz
Rebuilt
- l/akonadi-1.13.0-arm-6.txz
Fixed using akonadi with an external database. Thanks to Heinz Wiesinger. - n/httpd-2.4.27-arm-3.txz
This update patches a security issue (“Optionsbleed”) with the OPTIONS http
method which may leak arbitrary pieces of memory to a potential attacker.
Thanks to Hanno Bo:ck.
For more information, see:
http://seclists.org/oss-sec/2017/q3/477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
(* Security fix *)