ChangeLog for: 2017-08-15 23:16:12
a/aaa_elflibs-14.2-x86_64-31.txz:  Rebuilt.
a/kernel-generic-4.9.43-x86_64-1.txz:  Upgraded.
a/kernel-huge-4.9.43-x86_64-1.txz:  Upgraded.
a/kernel-modules-4.9.43-x86_64-1.txz:  Upgraded.
ap/cups-2.2.4-x86_64-2.txz:  Rebuilt.
  Don't return an empty printer list when there is no default printer.
  Thanks to Jurgen Van Ham.
d/gcc-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-brig-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-g++-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-gfortran-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-gnat-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-go-7.2.0-x86_64-1.txz:  Upgraded.
d/gcc-objc-7.2.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-4.9.43-x86-1.txz:  Upgraded.
d/libtool-2.4.6-x86_64-6.txz:  Rebuilt.
  Recompiled to update embedded GCC version number.
k/kernel-source-4.9.43-noarch-1.txz:  Upgraded.
l/poppler-data-0.4.8-noarch-1.txz:  Upgraded.
x/xorg-server-1.19.3-x86_64-2.txz:  Rebuilt.
  This update fixes two security issues:
  A user authenticated to an X Session could crash or execute code in the
  context of the X Server by exploiting a stack overflow in the endianness
  conversion of X Events.
  Uninitialized data in endianness conversion in the XEvent handling of the
  X.Org X Server allowed authenticated malicious users to access potentially
  privileged data from the X server. 
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
  (* Security fix *)
x/xorg-server-xephyr-1.19.3-x86_64-2.txz:  Rebuilt.
x/xorg-server-xnest-1.19.3-x86_64-2.txz:  Rebuilt.
x/xorg-server-xvfb-1.19.3-x86_64-2.txz:  Rebuilt.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.