diff options
author | Adrien Nader <adrien@notk.org> | 2016-06-25 04:40:11 +0200 |
---|---|---|
committer | Adrien Nader <adrien@notk.org> | 2016-06-25 04:40:11 +0200 |
commit | 679bb5913b3de6d2fab320d8964b6d9f92c3875b (patch) | |
tree | 21215dae103c780ab4144f8d6573c712e68b78a8 /slackware64-current/source/a | |
parent | 6dd286346b2569724c9da57b05c98e138b25871f (diff) |
Fri Jun 24 23:37:19 UTC 2016
Sorry about the delay, but we had to wait for this kernel. At least we were
able to get some other good fixes in this week while we were waiting. :-)
a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt.
a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded.
ap/mariadb-10.0.26-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.14-x86-1.txz: Upgraded.
k/kernel-source-4.4.14-noarch-1.txz: Upgraded.
This kernel release fixes two security issues:
Corrupted offset allows for arbitrary decrements in compat
IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory
corruption, leading to elevation of privileges or kernel code execution.
This occurs in a compat_setsockopt() call that is normally restricted to
root, however, Linux 3/4 kernels that support user and network namespaces
can allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
Risk: Medium. Impact: Out of bounds heap memory access, leading to a
Denial of Service (or possibly heap disclosure or further impact).
This occurs in a setsockopt() call that is normally restricted to root,
however, Linux 3/4 kernels that support user and network namespaces can
allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
For more information, see:
http://www.openwall.com/lists/oss-security/2016/06/24/5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
(* Security fix *)
l/libpng-1.6.23-x86_64-1.txz: Upgraded.
l/librsvg-2.40.16-x86_64-1.txz: Upgraded.
n/php-5.6.23-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'slackware64-current/source/a')
-rwxr-xr-x | slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild b/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild index f88425ac0..f71a2374b 100755 --- a/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild +++ b/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild @@ -22,7 +22,7 @@ PKGNAM=aaa_elflibs VERSION=${VERSION:-14.2} -BUILD=${BUILD:-22} +BUILD=${BUILD:-23} # Automatically determine the architecture we're building on: if [ -z "$ARCH" ]; then |