ChangeLog for: 2016-06-25 00:37:19

Sorry about the delay, but we had to wait for this kernel. At least we were able to get some other good fixes in this week while we were waiting. :-) a/aaa_elflibs-14.2-x86_64-23.txz: Rebuilt. a/kernel-generic-4.4.14-x86_64-1.txz: Upgraded. a/kernel-huge-4.4.14-x86_64-1.txz: Upgraded. a/kernel-modules-4.4.14-x86_64-1.txz: Upgraded. ap/mariadb-10.0.26-x86_64-1.txz: Upgraded. d/kernel-headers-4.4.14-x86-1.txz: Upgraded. k/kernel-source-4.4.14-noarch-1.txz: Upgraded. This kernel release fixes two security issues: Corrupted offset allows for arbitrary decrements in compat IPT_SO_SET_REPLACE setsockopt. Risk: High. Impact: Kernel memory corruption, leading to elevation of privileges or kernel code execution. This occurs in a compat_setsockopt() call that is normally restricted to root, however, Linux 3/4 kernels that support user and network namespaces can allow an unprivileged user to trigger this functionality. This is exploitable from inside a container. Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt. Risk: Medium. Impact: Out of bounds heap memory access, leading to a Denial of Service (or possibly heap disclosure or further impact). This occurs in a setsockopt() call that is normally restricted to root, however, Linux 3/4 kernels that support user and network namespaces can allow an unprivileged user to trigger this functionality. This is exploitable from inside a container. For more information, see: http://www.openwall.com/lists/oss-security/2016/06/24/5 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998 (* Security fix *) l/libpng-1.6.23-x86_64-1.txz: Upgraded. l/librsvg-2.40.16-x86_64-1.txz: Upgraded. n/php-5.6.23-x86_64-1.txz: Upgraded. This release fixes bugs and security issues. For more information, see: http://php.net/ChangeLog-5.php#5.6.23 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.