ChangeLog for: 2017-11-29 09:15:09
a/coreutils-8.28-x86_64-2.txz:  Rebuilt.
  Removed ancient (1992) aliases "dir, vdir, d, v" from the profile scripts.
a/lzlib-1.9-x86_64-1.txz:  Added.
a/plzip-1.6-x86_64-1.txz:  Added.
ap/man-1.6g-x86_64-3.txz:  Removed.
ap/man-db-2.7.6.1-x86_64-1.txz:  Added.
  This package replaces the good old man package. Thanks to B. Watson.
ap/man-pages-4.14-noarch-2.txz:  Rebuilt.
  Don't ship a whatis database, since man-db doesn't need one.
ap/mariadb-10.2.11-x86_64-1.txz:  Upgraded.
d/git-2.15.1-x86_64-1.txz:  Upgraded.
d/python-setuptools-38.2.3-x86_64-1.txz:  Upgraded.
x/libXcursor-1.1.15-x86_64-1.txz:  Upgraded.
  Fix heap overflows when parsing malicious files. (CVE-2017-16612)
  It is possible to trigger heap overflows due to an integer overflow
  while parsing images and a signedness issue while parsing comments.
  The integer overflow occurs because the chosen limit 0x10000 for
  dimensions is too large for 32 bit systems, because each pixel takes
  4 bytes. Properly chosen values allow an overflow which in turn will
  lead to less allocated memory than needed for subsequent reads.
  The signedness bug is triggered by reading the length of a comment
  as unsigned int, but casting it to int when calling the function
  XcursorCommentCreate. Turning length into a negative value allows the
  check against XCURSOR_COMMENT_MAX_LEN to pass, and the following
  addition of sizeof (XcursorComment) + 1 makes it possible to allocate
  less memory than needed for subsequent reads.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
  (* Security fix *)
x/libXfont-1.5.3-x86_64-1.txz:  Removed.
x/libXfont2-2.0.3-x86_64-1.txz:  Upgraded.
  Open files with O_NOFOLLOW. (CVE-2017-16611)
  A non-privileged X client can instruct X server running under root
  to open any file by creating own directory with "fonts.dir",
  "fonts.alias" or any font file being a symbolic link to any other
  file in the system. X server will then open it. This can be issue
  with special files such as /dev/watchdog (which could then reboot
  the system).
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
  (* Security fix *)
x/xfs-1.2.0-x86_64-1.txz:  Upgraded.
testing/packages/php-7.1.12-x86_64-2.txz:  Rebuilt.
  Load mysqlnd.so before mysqli.so in etc/php.ini*. Thanks to KewlCat.
  Load libphp7.so in mod_php.conf.example. Thanks to Willy Sudiarto Raharjo.