MGASA-2016-0415

Source
https://advisories.mageia.org/MGASA-2016-0415.html
Import Source
https://advisories.mageia.org/MGASA-2016-0415.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2016-0415
Related
Published
2016-12-08T07:33:24Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel packages fixes security vulnerabilities
Details

This update is based on upstream 4.4.36 and fixes at least the following security issues:

The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcpipv4.c and net/ipv6/tcpipv6.c (CVE-2016-8645).

The mpipowm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an addkey system call for an RSA key with a zero exponent (CVE-2016-8650).

A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKETV3 ring buffer. A local user able to open a raw packet socket (requires the CAPNET_RAW capability) could use this flaw to elevate their privileges on the system (CVE-2016-8655).

Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support is vulnerable to an information leakage issue. It could occur on x86 platform, while emulating instructions in 32bit mode. A user/process could use this flaw to leak host kernel memory bytes (CVE-2016-9756).

A bug in SO{SND|RCV}BUFFORCE setsockopt() implementation allows CAPNETADMIN users to set negative sksndbuf or sk_rcvbuf values. A user could use this flaw to cause various memory corruptions, crashes and OOM (CVE-2016-9793).

For other fixes in this update, see the referenced changelogs.

References
Credits

Affected packages

Mageia:5 / kernel

Package

Name
kernel
Purl
pkg:rpm/mageia/kernel?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.36-2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kernel-userspace-headers

Package

Name
kernel-userspace-headers
Purl
pkg:rpm/mageia/kernel-userspace-headers?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.36-2.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-vboxadditions

Package

Name
kmod-vboxadditions
Purl
pkg:rpm/mageia/kmod-vboxadditions?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.10-2.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-virtualbox

Package

Name
kmod-virtualbox
Purl
pkg:rpm/mageia/kmod-virtualbox?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.10-2.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / kmod-xtables-addons

Package

Name
kmod-xtables-addons
Purl
pkg:rpm/mageia/kmod-xtables-addons?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10-17.mga5

Ecosystem specific

{
    "section": "core"
}