ChangeLog for: 2017-08-15 23:16:12

a/aaa_elflibs-14.2-x86_64-31.txz: Rebuilt. a/kernel-generic-4.9.43-x86_64-1.txz: Upgraded. a/kernel-huge-4.9.43-x86_64-1.txz: Upgraded. a/kernel-modules-4.9.43-x86_64-1.txz: Upgraded. ap/cups-2.2.4-x86_64-2.txz: Rebuilt. Don't return an empty printer list when there is no default printer. Thanks to Jurgen Van Ham. d/gcc-7.2.0-x86_64-1.txz: Upgraded. d/gcc-brig-7.2.0-x86_64-1.txz: Upgraded. d/gcc-g++-7.2.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-7.2.0-x86_64-1.txz: Upgraded. d/gcc-gnat-7.2.0-x86_64-1.txz: Upgraded. d/gcc-go-7.2.0-x86_64-1.txz: Upgraded. d/gcc-objc-7.2.0-x86_64-1.txz: Upgraded. d/kernel-headers-4.9.43-x86-1.txz: Upgraded. d/libtool-2.4.6-x86_64-6.txz: Rebuilt. Recompiled to update embedded GCC version number. k/kernel-source-4.9.43-noarch-1.txz: Upgraded. l/poppler-data-0.4.8-noarch-1.txz: Upgraded. x/xorg-server-1.19.3-x86_64-2.txz: Rebuilt. This update fixes two security issues: A user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server allowed authenticated malicious users to access potentially privileged data from the X server. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972 (* Security fix *) x/xorg-server-xephyr-1.19.3-x86_64-2.txz: Rebuilt. x/xorg-server-xnest-1.19.3-x86_64-2.txz: Rebuilt. x/xorg-server-xvfb-1.19.3-x86_64-2.txz: Rebuilt. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.