MGASA-2016-0284

Source
https://advisories.mageia.org/MGASA-2016-0284.html
Import Source
https://advisories.mageia.org/MGASA-2016-0284.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0284
Related
Published
2016-08-31T15:32:33Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-linus packages fix security vulnerabilities
Details

This update is based on the upstream 4.4.16 kernel and fixes at least theese security issues:

nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c. (CVE-2016-1237).

The ecryptfsprivilegedopen function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (CVE-2016-1583).

The keyrejectand_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (CVE-2016-4470).

Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls (CVE-2016-4794).

The tipcnlpubl_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation (CVE-2016-4951).

The compat IPTSOSET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement. (CVE-2016-4997).

The IPTSOSET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (CVE-2016-4998).

Multiple heap-based buffer overflows in the hiddevioctlusage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (CVE-2016-5829).

For other fixes in this update, see the referenced changelogs.

References
Credits

Affected packages

Mageia:5 / kernel-linus

Package

Name
kernel-linus
Purl
pkg:rpm/mageia/kernel-linus?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.16-1.mga5

Ecosystem specific

{
    "section": "core"
}