Slackware64-14.2 ChangeLog (2016-08-23)

Tue Aug 23 19:45:33 UTC 2016

  • patches/packages/gnupg-1.4.21-x86_64-1_slack14.2.txz
    Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
    obtains 580 bytes from the standard RNG can trivially predict the next
    20 bytes of output. (This is according to the NEWS file included in the
    source. According to the annoucement linked below, an attacker who obtains
    4640 bits from the RNG can trivially predict the next 160 bits of output.)
    Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
    For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
    (* Security fix *)
  • patches/packages/libgcrypt-1.7.3-x86_64-1_slack14.2.txz
    Fix critical security bug in the RNG [CVE-2016-6313]. An attacker who
    obtains 580 bytes from the standard RNG can trivially predict the next
    20 bytes of output. (This is according to the NEWS file included in the
    source. According to the annoucement linked below, an attacker who obtains
    4640 bits from the RNG can trivially predict the next 160 bits of output.)
    Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
    For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
    (* Security fix *)
  • patches/packages/linux-4.4.19/*
    A flaw was found in the implementation of the Linux kernels handling of
    networking challenge ack where an attacker is able to determine the shared
    counter. This may allow an attacker located on different subnet to inject
    or take over a TCP connection between a server and client without having to
    be a traditional Man In the Middle (MITM) style attack.
    Be sure to upgrade your initrd after upgrading the kernel packages.
    If you use lilo to boot your machine, be sure lilo.conf points to the correct
    kernel and initrd and run lilo as root to update the bootloader.
    If you use elilo to boot your machine, you should run eliloconfig to copy the
    kernel and initrd to the EFI System Partition.
    For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
    (* Security fix *)
  • patches/packages/glib2-2.46.2-x86_64-3_slack14.2.txz
    Applied upstream patch to fix a use-before-allocate bug in libgio. Without
    this fix, Thunar will crash if $HOME is on an NFS volume.
    Thanks to Jonathan Woithe.
  • patches/packages/screen-4.4.0-x86_64-2_slack14.2.txz
    Reverted a change to /etc/screenrc.new that prevented the console from being
    cleared when a screen session was detached. Thanks to Stuart Winter.
  • patches/packages/stunnel-5.35-x86_64-2_slack14.2.txz
    Fixed incorrect config file name in generate-stunnel-key.sh.
    Thanks to Ebben Aries.
  • news/2016/08/23/slackware64-14.2-changelog.txt
  • Last modified: 5 months ago
  • by Giuseppe Di Terlizzi