Saturday, June 25, 2016

Security Update: kernel, php

It seems that the release of Slackware 14.2 will have to wait again since Pat just bumped the kernel to 4.4.14 to fix 2 security vulnerabilities which he mentioned in detail in the latest batch of updates:
This kernel release fixes two security issues:
  Corrupted offset allows for arbitrary decrements in compat
  IPT_SO_SET_REPLACE setsockopt.  Risk:  High.  Impact:  Kernel memory
  corruption, leading to elevation of privileges or kernel code execution.
  This occurs in a compat_setsockopt() call that is normally restricted to
  root, however, Linux 3/4 kernels that support user and network namespaces
  can allow an unprivileged user to trigger this functionality.  This is
  exploitable from inside a container.
  Out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt.
  Risk:  Medium.  Impact:  Out of bounds heap memory access, leading to a
  Denial of Service (or possibly heap disclosure or further impact).
  This occurs in a setsockopt() call that is normally restricted to root,
  however, Linux 3/4 kernels that support user and network namespaces can
  allow an unprivileged user to trigger this functionality.  This is
  exploitable from inside a container.
  For more information, see:
    http://www.openwall.com/lists/oss-security/2016/06/24/5
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
  (* Security fix *)
Other than kernel update which was only applied for current, php is also updated to 5.6.23 for Slackware 14.0, 14.1, and current. This update is also considered a security update.

In current, we have more updates coming in:
  • mariadb: Upgraded to 10.0.26
  • libpng: Upgraded to 1.6.23
  • librsvg: Upgraded to 2.40