Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Slackware-current ChangeLog (2017-09-08) ====== ====== Fri Sep 8 17:56:01 UTC 2017 ====== ===== Packages ===== ==== Upgraded ==== * [[slackware.current>a/coreutils-8.28-i586-1.txz]] \\ A bug in the embedded gnulib allows "date" and "touch" to overwrite the \\ heap with large user specified TZ values, possibly executing arbitrary \\ code. Bug introduced in coreutils-8.27. \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7476 \\ (* Security fix *) * [[slackware.current>a/file-5.32-i586-1.txz]] * [[slackware.current>ap/sudo-1.8.21p2-i586-1.txz]] * [[slackware.current>d/gdb-8.0.1-i586-1.txz]] * [[slackware.current>d/llvm-5.0.0-i586-1.txz]] \\ Shared library .so-version bump. * [[slackware.current>d/rust-1.20.0-i686-1.txz]] * [[slackware.current>kde/kdelibs-4.14.36-i586-1.txz]] * [[slackware.current>l/harfbuzz-1.5.1-i586-1.txz]] * [[slackware.current>l/jemalloc-4.5.0-i586-1.txz]] \\ Downgraded from version 5.0.1 due to problems with mariadb (which is \\ currently the only thing using jemalloc). Thanks to Heinz Wiesinger. * [[slackware.current>l/libidn2-2.0.4-i586-1.txz]] * [[slackware.current>l/mozilla-nss-3.31.1-i586-1.txz]] \\ Upgraded to nss-3.31.1 and nspr-4.16. * [[slackware.current>l/mpfr-3.1.6-i586-1.txz]] * [[slackware.current>n/iproute2-4.13.0-i586-1.txz]] * [[slackware.current>n/tcpdump-4.9.2-i586-1.txz]] \\ This update fixes bugs and many security issues (see the included \\ CHANGES file). \\ For more information, see: \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690 \\ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725 \\ (* Security fix *) * [[slackware.current>x/mesa-17.2.0-i586-1.txz]] \\ Compiled against llvm-5.0.0. ==== Rebuilt ==== * [[slackware.current>ap/mariadb-10.2.8-i586-2.txz]] * [[slackware.current>x/xf86-video-vmware-13.2.1-i586-4.txz]] \\ Recompiled against llvm-5.0.0. ==== Removed ==== * <del>[[slackware.current>d/gnu-cobol-1.1-i586-2.txz]]</del> ==== Added ==== * [[slackware.current>d/gnucobol-2.2-i586-1.txz]] \\ Package upgraded and renamed to new upstream name "gnucobol". {{tag>slackware changelog slackware-current 2017/09}} news/2017/09/08/slackware-current-changelog.txt Last modified: 7 years agoby Giuseppe Di Terlizzi Log In