ChangeLog for: 2016-06-25 00:37:19
Sorry about the delay, but we had to wait for this kernel. At least we were
able to get some other good fixes in this week while we were waiting. :-)
a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt.
a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded.
a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded.
ap/mariadb-10.0.26-x86_64-1.txz: Upgraded.
d/kernel-headers-4.4.14-x86-1.txz: Upgraded.
k/kernel-source-4.4.14-noarch-1.txz: Upgraded.
This kernel release fixes two security issues:
Corrupted offset allows for arbitrary decrements in compat
IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory
corruption, leading to elevation of privileges or kernel code execution.
This occurs in a compat_setsockopt() call that is normally restricted to
root, however, Linux 3/4 kernels that support user and network namespaces
can allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
Risk: Medium. Impact: Out of bounds heap memory access, leading to a
Denial of Service (or possibly heap disclosure or further impact).
This occurs in a setsockopt() call that is normally restricted to root,
however, Linux 3/4 kernels that support user and network namespaces can
allow an unprivileged user to trigger this functionality. This is
exploitable from inside a container.
For more information, see:
http://www.openwall.com/lists/oss-security/2016/06/24/5
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
(* Security fix *)
l/libpng-1.6.23-x86_64-1.txz: Upgraded.
l/librsvg-2.40.16-x86_64-1.txz: Upgraded.
n/php-5.6.23-x86_64-1.txz: Upgraded.
This release fixes bugs and security issues.
For more information, see:
http://php.net/ChangeLog-5.php#5.6.23
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773
(* Security fix *)
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.