{"id":"MGASA-2016-0415","summary":"Updated kernel packages fixes security vulnerabilities","details":"This update is based on upstream 4.4.36 and fixes at least the following\nsecurity issues:\n\nThe TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation,\nwhich allows local users to cause a denial of service (system crash) via\na crafted application that makes sendto system calls, related to \nnet/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (CVE-2016-8645).\n\nThe mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through\n4.8.11 does not ensure that memory is allocated for limb data, which allows\nlocal users to cause a denial of service (stack memory corruption and panic)\nvia an add_key system call for an RSA key with a zero exponent\n(CVE-2016-8650).\n\nA race condition issue leading to a use-after-free flaw was found in the\nway the raw packet sockets implementation in the Linux kernel networking\nsubsystem handled synchronization while creating the TPACKET_V3 ring\nbuffer. A local user able to open a raw packet socket (requires the\nCAP_NET_RAW capability) could use this flaw to elevate their privileges\non the system (CVE-2016-8655).\n\nLinux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM)\nsupport is vulnerable to an information leakage issue. It could occur\non x86 platform, while emulating instructions in 32bit mode. A \nuser/process could use this flaw to leak host kernel memory bytes\n(CVE-2016-9756).\n\nA bug in SO_{SND|RCV}BUFFORCE setsockopt() implementation allows\nCAP_NET_ADMIN users to set negative sk_sndbuf or sk_rcvbuf values.\nA user could use this flaw to cause various memory corruptions,\ncrashes and OOM (CVE-2016-9793).\n\nFor other fixes in this update, see the referenced changelogs.\n","modified":"2026-01-30T03:45:45.795730Z","published":"2016-12-08T07:33:24Z","related":["CVE-2016-8645","CVE-2016-8650","CVE-2016-8655","CVE-2016-9756","CVE-2016-9793"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0415.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19906"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.33"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.34"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.35"},{"type":"REPORT","url":"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.36"}],"affected":[{"package":{"name":"kernel","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kernel?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.36-2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0415.json"}},{"package":{"name":"kernel-userspace-headers","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kernel-userspace-headers?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.36-2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0415.json"}},{"package":{"name":"kmod-vboxadditions","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kmod-vboxadditions?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.10-2.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0415.json"}},{"package":{"name":"kmod-virtualbox","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kmod-virtualbox?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.1.10-2.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0415.json"}},{"package":{"name":"kmod-xtables-addons","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/kmod-xtables-addons?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.10-17.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0415.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}