|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0411 (kernel-linus-4.4.32)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0411: Updated kernel-linus-4.4.32 packages fix security vulnerability
Date:  Wed, 7 Dec 2016 12:49:05 +0100
Message-ID:  <20161207114905.910DF9F7AD@duvel.mageia.org>

MGASA-2016-0411 - Updated kernel-linus-4.4.32 packages fix security vulnerability Publication date: 07 Dec 2016 URL: http://advisories.mageia.org/MGASA-2016-0411.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-7039, CVE-2016-7042, CVE-2016-7425, CVE-2016-8630, CVE-2016-8633 Description: This update is based on upstream 4.4.32 and fixes alteast the following security issues: Vladimir Bene discovered an unbounded recursion in the VLAN and TEB Generic Receive Offload (GRO) processing implementations in the Linux kernel, A remote attacker could use this to cause a stack corruption, leading to a denial of service (system crash). (CVE-2016-7039) The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (CVE-2016-7042). The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (CVE-2016-7425). Null pointer dereference in kvm/emulate.c (CVE-2016-8630). A buffer overflow vulnerability due to a lack of input filtering of incoming fragmented datagrams was found in the IP-over-1394 driver [firewire-net] in a fragment handling code in the Linux kernel. A maliciously formed fragment with a respectively large datagram offset would cause a memcpy() past the datagram buffer, which would cause a system panic or possible arbitrary code execution. The flaw requires [firewire-net] module to be loaded and is remotely exploitable from connected firewire devices, but not over a local network (CVE-2016-8633). For other fixes in this update, see the referenced changelogs. References: - https://bugs.mageia.org/show_bug.cgi?id=19794 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633 SRPMS: - 5/core/kernel-linus-4.4.32-1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds