Slackware64-14.2 ChangeLog (2017-09-15)

Fri Sep 15 17:31:57 UTC 2017

  • patches/packages/bluez-5.47-x86_64-1_slack14.2.txz
    Fixed an information disclosure vulnerability which allows remote attackers
    to obtain sensitive information from the bluetoothd process memory. This
    vulnerability lies in the processing of SDP search attribute requests.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250
    (* Security fix *)
  • patches/packages/linux-4.4.88/*
    This update fixes the security vulnerability known as “BlueBorne”.
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at
    Linux kernel version 3.3-rc1 is vulnerable to a stack overflow in
    the processing of L2CAP configuration responses resulting in remote
    code execution in kernel space.
    Be sure to upgrade your initrd after upgrading the kernel packages.
    If you use lilo to boot your machine, be sure lilo.conf points to the correct
    kernel and initrd and run lilo as root to update the bootloader.
    If you use elilo to boot your machine, you should run eliloconfig to copy the
    kernel and initrd to the EFI System Partition.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
    https://www.armis.com/blueborne
    (* Security fix *)
  • news/2017/09/15/slackware64-14.2-changelog.txt
  • Last modified: 3 years ago
  • by Giuseppe Di Terlizzi