ChangeLog for: 2017-08-15 23:16:12
a/aaa_elflibs-14.2-x86_64-31.txz: Rebuilt.
a/kernel-generic-4.9.43-x86_64-1.txz: Upgraded.
a/kernel-huge-4.9.43-x86_64-1.txz: Upgraded.
a/kernel-modules-4.9.43-x86_64-1.txz: Upgraded.
ap/cups-2.2.4-x86_64-2.txz: Rebuilt.
Don't return an empty printer list when there is no default printer.
Thanks to Jurgen Van Ham.
d/gcc-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-brig-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-g++-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-gfortran-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-gnat-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-go-7.2.0-x86_64-1.txz: Upgraded.
d/gcc-objc-7.2.0-x86_64-1.txz: Upgraded.
d/kernel-headers-4.9.43-x86-1.txz: Upgraded.
d/libtool-2.4.6-x86_64-6.txz: Rebuilt.
Recompiled to update embedded GCC version number.
k/kernel-source-4.9.43-noarch-1.txz: Upgraded.
l/poppler-data-0.4.8-noarch-1.txz: Upgraded.
x/xorg-server-1.19.3-x86_64-2.txz: Rebuilt.
This update fixes two security issues:
A user authenticated to an X Session could crash or execute code in the
context of the X Server by exploiting a stack overflow in the endianness
conversion of X Events.
Uninitialized data in endianness conversion in the XEvent handling of the
X.Org X Server allowed authenticated malicious users to access potentially
privileged data from the X server.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972
(* Security fix *)
x/xorg-server-xephyr-1.19.3-x86_64-2.txz: Rebuilt.
x/xorg-server-xnest-1.19.3-x86_64-2.txz: Rebuilt.
x/xorg-server-xvfb-1.19.3-x86_64-2.txz: Rebuilt.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.