MGASA-2017-0296

Source
https://advisories.mageia.org/MGASA-2017-0296.html
Import Source
https://advisories.mageia.org/MGASA-2017-0296.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0296
Related
Published
2017-08-23T15:43:04Z
Modified
2022-02-17T18:21:47Z
Summary
Updated kernel-tmb packages fixes security and other bugs
Details

This kernel-tmb update is based on upstream 4.9.43 and fixes at least the following security issues:

The curseg->segno call in f2fs driver can be malformed so that it will have a value that triggers an out of boundary write that could cause memory corruption on the affected devices, leading to code execution in the kernel context. This would allow for more data to be accessed and controlled by the malware (CVE-2017-10663).

The UDP Fragmentation Offload (UFO) feature is vulnerable to out-of-bounds writes causing exploitable memory corruption. If unprivileged user namespaces are available, this bug can be exploited to gain root privileges (CVE-2017-1000112).

For other upstream fixes in this update, read the referenced changelogs.

References
Credits

Affected packages

Mageia:6 / kernel-tmb

Package

Name
kernel-tmb
Purl
pkg:rpm/mageia/kernel-tmb?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.9.43-1.mga6

Ecosystem specific

{
    "section": "core"
}