MGASA-2016-0412

Source
https://advisories.mageia.org/MGASA-2016-0412.html
Import Source
https://advisories.mageia.org/MGASA-2016-0412.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0412
Related
Published
2016-12-07T11:48:35Z
Modified
2016-12-07T11:38:15Z
Summary
Updated kernel-tmb-4.4.32 packages fix security vulnerability
Details

This update is based on upstream 4.4.32 and fixes alteast the following security issues:

The prockeysshow function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (CVE-2016-7042).

The arcmsriopmessagexfer function in drivers/scsi/arcmsr/arcmsrhba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSRMESSAGEWRITE_WQBUFFER control code (CVE-2016-7425).

Null pointer dereference in kvm/emulate.c (CVE-2016-8630).

A buffer overflow vulnerability due to a lack of input filtering of incoming fragmented datagrams was found in the IP-over-1394 driver [firewire-net] in a fragment handling code in the Linux kernel. A maliciously formed fragment with a respectively large datagram offset would cause a memcpy() past the datagram buffer, which would cause a system panic or possible arbitrary code execution. The flaw requires [firewire-net] module to be loaded and is remotely exploitable from connected firewire devices, but not over a local network (CVE-2016-8633).

For other fixes in this update, see the referenced changelogs.

References
Credits

Affected packages

Mageia:5 / kernel-tmb

Package

Name
kernel-tmb
Purl
pkg:rpm/mageia/kernel-tmb?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.32-1.mga5

Ecosystem specific

{
    "section": "core"
}