Updated kernel-linus packages fixes security and other bugs
Publication date: 20 Aug 2017Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 6
CVE: CVE-2017-10663 , CVE-2017-1000112
Description
This kernel-linus update is based on upstream 4.9.43 and fixes at least the following security issues: The curseg->segno call in f2fs driver can be malformed so that it will have a value that triggers an out of boundary write that could cause memory corruption on the affected devices, leading to code execution in the kernel context. This would allow for more data to be accessed and controlled by the malware (CVE-2017-10663). The UDP Fragmentation Offload (UFO) feature is vulnerable to out-of-bounds writes causing exploitable memory corruption. If unprivileged user namespaces are available, this bug can be exploited to gain root privileges (CVE-2017-1000112). For other upstream fixes in this update, read the referenced changelogs.
References
- https://bugs.mageia.org/show_bug.cgi?id=21520
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.41
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.42
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.43
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10663
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
SRPMS
6/core
- kernel-linus-4.9.43-1.mga6