MGASA-2016-0372

Source
https://advisories.mageia.org/MGASA-2016-0372.html
Import Source
https://advisories.mageia.org/MGASA-2016-0372.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0372
Related
Published
2016-11-10T14:07:23Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel packages fix security vulnerabilities
Details

This update is based on the upstream 4.4.30 kernel and fixes at least these security issues:

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (CVE-2016-7097).

Stack-based buffer overflow in the brcmfcfg80211start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (CVE-2016-8658).

The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (CVE-2016-8666).

The fix for CVE-2016-7039 added in MGASA-2016-0347 has been updated to the final version merged upstream.

This update also resolves a regression where amdgpu and radeon users would not get any display when using displayport (upstream regression introduced in 4.4.21, mga#19707)

For other upstream fixes in this update, read the referenced changelogs.

References
Credits

Affected packages

Mageia:5 / kernel

Package

Name
kernel
Purl
pkg:rpm/mageia/kernel?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.30-2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kernel-userspace-headers

Package

Name
kernel-userspace-headers
Purl
pkg:rpm/mageia/kernel-userspace-headers?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.30-2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-vboxadditions

Package

Name
kmod-vboxadditions
Purl
pkg:rpm/mageia/kmod-vboxadditions?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.2-10.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-virtualbox

Package

Name
kmod-virtualbox
Purl
pkg:rpm/mageia/kmod-virtualbox?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.2-10.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-xtables-addons

Package

Name
kmod-xtables-addons
Purl
pkg:rpm/mageia/kmod-xtables-addons?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-15.mga5

Ecosystem specific

{
    "section": "core"
}