ChangeLog for: 2016-02-23 20:31:59

a/glibc-solibs-2.23-x86_64-1.txz: Upgraded. a/kernel-generic-4.4.2-x86_64-1.txz: Upgraded. a/kernel-huge-4.4.2-x86_64-1.txz: Upgraded. a/kernel-modules-4.4.2-x86_64-1.txz: Upgraded. a/procps-ng-3.3.10-x86_64-5.txz: Rebuilt. Restored FROM field in w. Thanks to Stuart Winter. ap/cups-2.1.3-x86_64-2.txz: Rebuilt. Corrected CXXFLAGS to fix build for older CPUs. Thanks to ecd102. ap/mc-4.8.15-x86_64-2.txz: Rebuilt. Patched to fix displaying man pages. Thanks to DarkVision. d/kernel-headers-4.4.2-x86-1.txz: Upgraded. k/kernel-source-4.4.2-noarch-1.txz: Upgraded. Key .config changes for this kernel update: CHECKPOINT_RESTORE n -> y DEBUG_KERNEL n -> y EXPERT n -> y NR_CPUS 128 -> 256 KALLSYMS_ALL y LIVEPATCH y l/GConf-3.2.6-x86_64-3.txz: Rebuilt. Patched "GConf-WARNING **: Client failed to connect to the D-BUS daemon:" and added a couple other patches from git. Thanks to Robby Workman. l/alsa-lib-1.1.0-x86_64-3.txz: Rebuilt. Changed the default /etc/asound.conf.new to use a different configuration for PulseAudio that is less likely to cause issues than the previous one, especially on machines where the analog output is not recognized as card 0 by the BIOS. Thanks to Ryan P.C. McQuen who went above and beyond on this bug report by convincing upstream to recommend this on their website in order to convince me to make the change. :-) l/glibc-2.23-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. Of the security fixes, the most important and well-publicized is the stack-based buffer overflow in libresolv that could allow specially crafted DNS responses to seize control of execution flow in the DNS client (CVE-2015-7547). However, due to a patch applied to Slackware's glibc back in 2009 (don't use the gethostbyname4() lookup method as it was causing some cheap routers to misbehave), we were not vulnerable to that issue. The rest of the fixed security issues are less critical. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547 (* Security fix *) l/glibc-i18n-2.23-x86_64-1.txz: Upgraded. l/glibc-profile-2.23-x86_64-1.txz: Upgraded. l/libproxy-0.4.12-x86_64-1.txz: Upgraded. n/bind-9.10.3_P3-x86_64-1.txz: Upgraded. This release fixes two possible denial-of-service issues: render_ecs errors were mishandled when printing out a OPT record resulting in a assertion failure. (CVE-2015-8705) [RT #41397] Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396] For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705 (* Security fix *) n/libgcrypt-1.6.5-x86_64-1.txz: Upgraded. Mitigate side-channel attack on ECDH with Weierstrass curves. For more information, see: http://www.cs.tau.ac.IL/~tromer/ecdh/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511 (* Security fix *) n/nmap-7.01-x86_64-1.txz: Upgraded. n/ntp-4.2.8p6-x86_64-1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several low and medium severity vulnerabilities. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158 (* Security fix *) x/xf86-video-amdgpu-1.0.1-x86_64-1.txz: Upgraded. xap/blueman-2.0.3-x86_64-2.txz: Rebuilt. Rewrite launcher scripts to use #!/usr/bin/python2.7 rather than #!/usr/bin/env python. For details, see: https://github.com/blueman-project/blueman/issues/435 Thanks to zakame and Robby Workman. extra/tigervnc/tigervnc-1.6.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.