Updated kernel-tmb-4.4.32 packages fix security vulnerability
Publication date: 07 Dec 2016Modification date: 07 Dec 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-7042 , CVE-2016-7425 , CVE-2016-8630 , CVE-2016-8633
Description
This update is based on upstream 4.4.32 and fixes alteast the following
security issues:
The proc_keys_show function in security/keys/proc.c in the Linux kernel
through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is
enabled, uses an incorrect buffer size for certain timeout data, which
allows local users to cause a denial of service (stack memory corruption
and panic) by reading the /proc/keys file (CVE-2016-7042).
The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c
in the Linux kernel through 4.8.2 does not restrict a certain length
field, which allows local users to gain privileges or cause a denial of
service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER
control code (CVE-2016-7425).
Null pointer dereference in kvm/emulate.c (CVE-2016-8630).
A buffer overflow vulnerability due to a lack of input filtering of
incoming fragmented datagrams was found in the IP-over-1394 driver
[firewire-net] in a fragment handling code in the Linux kernel. A
maliciously formed fragment with a respectively large datagram offset
would cause a memcpy() past the datagram buffer, which would cause a
system panic or possible arbitrary code execution. The flaw requires
[firewire-net] module to be loaded and is remotely exploitable from
connected firewire devices, but not over a local network (CVE-2016-8633).
For other fixes in this update, see the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=19796
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.27
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.28
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.29
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.30
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.31
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.32
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633
SRPMS
5/core
- kernel-tmb-4.4.32-1.mga5