ChangeLog for: 2017-11-29 09:15:09
a/coreutils-8.28-x86_64-2.txz: Rebuilt.
Removed ancient (1992) aliases "dir, vdir, d, v" from the profile scripts.
a/lzlib-1.9-x86_64-1.txz: Added.
a/plzip-1.6-x86_64-1.txz: Added.
ap/man-1.6g-x86_64-3.txz: Removed.
ap/man-db-2.7.6.1-x86_64-1.txz: Added.
This package replaces the good old man package. Thanks to B. Watson.
ap/man-pages-4.14-noarch-2.txz: Rebuilt.
Don't ship a whatis database, since man-db doesn't need one.
ap/mariadb-10.2.11-x86_64-1.txz: Upgraded.
d/git-2.15.1-x86_64-1.txz: Upgraded.
d/python-setuptools-38.2.3-x86_64-1.txz: Upgraded.
x/libXcursor-1.1.15-x86_64-1.txz: Upgraded.
Fix heap overflows when parsing malicious files. (CVE-2017-16612)
It is possible to trigger heap overflows due to an integer overflow
while parsing images and a signedness issue while parsing comments.
The integer overflow occurs because the chosen limit 0x10000 for
dimensions is too large for 32 bit systems, because each pixel takes
4 bytes. Properly chosen values allow an overflow which in turn will
lead to less allocated memory than needed for subsequent reads.
The signedness bug is triggered by reading the length of a comment
as unsigned int, but casting it to int when calling the function
XcursorCommentCreate. Turning length into a negative value allows the
check against XCURSOR_COMMENT_MAX_LEN to pass, and the following
addition of sizeof (XcursorComment) + 1 makes it possible to allocate
less memory than needed for subsequent reads.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
(* Security fix *)
x/libXfont-1.5.3-x86_64-1.txz: Removed.
x/libXfont2-2.0.3-x86_64-1.txz: Upgraded.
Open files with O_NOFOLLOW. (CVE-2017-16611)
A non-privileged X client can instruct X server running under root
to open any file by creating own directory with "fonts.dir",
"fonts.alias" or any font file being a symbolic link to any other
file in the system. X server will then open it. This can be issue
with special files such as /dev/watchdog (which could then reboot
the system).
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611
(* Security fix *)
x/xfs-1.2.0-x86_64-1.txz: Upgraded.
testing/packages/php-7.1.12-x86_64-2.txz: Rebuilt.
Load mysqlnd.so before mysqli.so in etc/php.ini*. Thanks to KewlCat.
Load libphp7.so in mod_php.conf.example. Thanks to Willy Sudiarto Raharjo.