ChangeLog for: 2017-09-18 20:15:03

a/eudev-3.2.4-x86_64-1.txz: Upgraded. a/libgudev-232-x86_64-1.txz: Upgraded. a/usb_modeswitch-2.5.1-x86_64-1.txz: Upgraded. ap/man-pages-4.13-noarch-1.txz: Upgraded. d/cmake-3.9.2-x86_64-1.txz: Upgraded. d/ruby-2.4.2-x86_64-1.txz: Upgraded. This release includes several security fixes. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064 (* Security fix *) l/akonadi-1.13.0-x86_64-6.txz: Rebuilt. Fixed using akonadi with an external database. Thanks to Heinz Wiesinger. l/freetype-2.8.1-x86_64-1.txz: Upgraded. n/httpd-2.4.27-x86_64-3.txz: Rebuilt. This update patches a security issue ("Optionsbleed") with the OPTIONS http method which may leak arbitrary pieces of memory to a potential attacker. Thanks to Hanno Bo:ck. For more information, see: http://seclists.org/oss-sec/2017/q3/477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798 (* Security fix *) x/fontconfig-2.12.5-x86_64-1.txz: Upgraded. x/mesa-17.2.1-x86_64-1.txz: Upgraded. x/xf86-input-libinput-0.26.0-x86_64-1.txz: Upgraded.