Slackware-current ChangeLog (2016-08-23)
Tue Aug 23 19:45:33 UTC 2016
Packages
Rebuilt
- ap/screen-4.4.0-i586-2.txz
Reverted a change to /etc/screenrc.new that prevented the console from being
cleared when a screen session was detached. Thanks to Stuart Winter. - d/binutils-2.27-i586-2.txz
Recompiled with –disable-compressed-debug-sections, since other tools are
not yet capable of parsing that.
Thanks to Vincent Batts, Heinz Wiesinger, and Stuart Winter. - l/glib2-2.46.2-i586-3.txz
Applied upstream patch to fix a use-before-allocate bug in libgio. Without
this fix, Thunar will crash if $HOME is on an NFS volume.
Thanks to Jonathan Woithe. - l/glibc-2.24-i586-2.txz
If libm.so is a linker script, don't clobber it with a symlink.
Thanks to guanx. - n/network-scripts-14.2-noarch-3.txz
In rc.inet1, skip interfaces that are not configured in rc.inet1.conf
to speed up the boot time slightly.
Thanks to Amritpal Bath. - n/stunnel-5.35-i586-2.txz
Fixed incorrect config file name in generate-stunnel-key.sh.
Thanks to Ebben Aries.
Upgraded
- a/kernel-generic-4.4.19-i586-1.txz
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *) - a/kernel-generic-smp-4.4.19_smp-i686-1.txz
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *) - a/kernel-huge-4.4.19-i586-1.txz
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *) - a/kernel-huge-smp-4.4.19_smp-i686-1.txz
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *) - ap/linuxdoc-tools-0.9.72-i586-1.txz
Thanks to Stuart Winter. - k/kernel-source-4.4.19_smp-noarch-1.txz
A flaw was found in the implementation of the Linux kernels handling of
networking challenge ack where an attacker is able to determine the shared
counter. This may allow an attacker located on different subnet to inject
or take over a TCP connection between a server and client without having to
be a traditional Man In the Middle (MITM) style attack.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
(* Security fix *) - n/gnupg-1.4.21-i586-1.txz
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *) - n/libgcrypt-1.7.3-i586-1.txz
Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
obtains 580 bytes from the standard RNG can trivially predict the next
20 bytes of output. (This is according to the NEWS file included in the
source. According to the annoucement linked below, an attacker who obtains
4640 bits from the RNG can trivially predict the next 160 bits of output.)
Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
For more information, see:
https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
(* Security fix *)