summaryrefslogtreecommitdiffstats
path: root/slackware64-current/source/a
diff options
context:
space:
mode:
authorAdrien Nader <adrien@notk.org>2016-06-25 04:40:11 +0200
committerAdrien Nader <adrien@notk.org>2016-06-25 04:40:11 +0200
commit679bb5913b3de6d2fab320d8964b6d9f92c3875b (patch)
tree21215dae103c780ab4144f8d6573c712e68b78a8 /slackware64-current/source/a
parent6dd286346b2569724c9da57b05c98e138b25871f (diff)
Fri Jun 24 23:37:19 UTC 2016
Sorry about the delay, but we had to wait for this kernel. At least we were able to get some other good fixes in this week while we were waiting. :-) a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt. a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded. a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded. a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded. ap/mariadb-10.0.26-x86_64-1.txz: Upgraded. d/kernel-headers-4.4.14-x86-1.txz: Upgraded. k/kernel-source-4.4.14-noarch-1.txz: Upgraded. This kernel release fixes two security issues: Corrupted offset allows for arbitrary decrements in compat IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory corruption, leading to elevation of privileges or kernel code execution. This occurs in a compat_setsockopt() call that is normally restricted to root, however, Linux 3/4 kernels that support user and network namespaces can allow an unprivileged user to trigger this functionality. This is exploitable from inside a container. Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt. Risk: Medium. Impact: Out of bounds heap memory access, leading to a Denial of Service (or possibly heap disclosure or further impact). This occurs in a setsockopt() call that is normally restricted to root, however, Linux 3/4 kernels that support user and network namespaces can allow an unprivileged user to trigger this functionality. This is exploitable from inside a container. For more information, see: http://www.openwall.com/lists/oss-security/2016/06/24/5 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998 (* Security fix *) l/libpng-1.6.23-x86_64-1.txz: Upgraded. l/librsvg-2.40.16-x86_64-1.txz: Upgraded. n/php-5.6.23-x86_64-1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.23 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'slackware64-current/source/a')
-rwxr-xr-xslackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild2
1 files changed, 1 insertions, 1 deletions
diff --git a/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild b/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild
index f88425ac0..f71a2374b 100755
--- a/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild
+++ b/slackware64-current/source/a/aaa_elflibs/aaa_elflibs.SlackBuild
@@ -22,7 +22,7 @@
PKGNAM=aaa_elflibs
VERSION=${VERSION:-14.2}
-BUILD=${BUILD:-22}
+BUILD=${BUILD:-23}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then