Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2017.0136
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2017-0136)
Summary:The remote host is missing an update for the 'kernel, kernel-userspace-headers, kmod-vboxadditions, kmod-virtualbox, kmod-xtables-addons' package(s) announced via the MGASA-2017-0136 advisory.
Description:Summary:
The remote host is missing an update for the 'kernel, kernel-userspace-headers, kmod-vboxadditions, kmod-virtualbox, kmod-xtables-addons' package(s) announced via the MGASA-2017-0136 advisory.

Vulnerability Insight:
This kernel update is based on upstream 4.4.65 and fixes at least
the following security issues:

fs/namespace.c in the Linux kernel before 4.9 does not restrict how many
mounts may exist in a mount namespace, which allows local users to cause
a denial of service (memory consumption and deadlock) via MS_BIND mount
system calls, as demonstrated by a loop that triggers exponential growth
in the number of mounts (CVE-2016-6213).

The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in
the Linux kernel before 4.6 allows local users to gain privileges or cause
a denial of service (use-after-free) via vectors involving omission of the
firmware name from a certain data structure (CVE-2016-7913).

The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux
kernel before 4.5 does not check whether a batch message's length field is
large enough, which allows local users to obtain sensitive information from
kernel memory or cause a denial of service (infinite loop or out-of-bounds
read) by leveraging the CAP_NET_ADMIN capability (CVE-2016-7917).

The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through
4.8.11 does not validate the relationship between the minimum fragment
length and the maximum packet size, which allows local users to gain
privileges or cause a denial of service (heap-based buffer overflow) by
leveraging the CAP_NET_ADMIN capability (CVE-2016-8632).

drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local
users to bypass integer overflow checks, and cause a denial of service
(memory corruption) or have unspecified other impact, by leveraging access
to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a
'state machine confusion bug' (CVE-2016-9083).

drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11
misuses the kzalloc function, which allows local users to cause a denial
of service (integer overflow) or have unspecified other impact by
leveraging access to a vfio PCI device file (CVE-2016-9084).

It was discovered that root can gain direct access to an internal keyring,
such as '.builtin_trusted_keys' upstream, by joining it as its session
keyring. This allows root to bypass module signature verification by adding
a new public key of its own devising to the keyring (CVE-2016-9604).

The ping_unhash function in net/ipv4/ping.c in the Linux kernel through
4.10.8 is too late in obtaining a certain lock and consequently cannot
ensure that disconnect function calls are safe, which allows local users
to cause a denial of service (panic) by leveraging access to the protocol
value of IPPROTO_ICMP in a socket system call (CVE-2017-2671).

Race condition in kernel/events/core.c in the Linux kernel before 4.9.7
allows local users to gain privileges via a crafted application that makes
concurrent perf_event_open system calls for moving a software group into a
hardware ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel, kernel-userspace-headers, kmod-vboxadditions, kmod-virtualbox, kmod-xtables-addons' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-6213
BugTraq ID: 91754
http://www.securityfocus.com/bid/91754
http://www.openwall.com/lists/oss-security/2016/07/13/8
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
Common Vulnerability Exposure (CVE) ID: CVE-2016-7913
BugTraq ID: 94201
http://www.securityfocus.com/bid/94201
RedHat Security Advisories: RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RedHat Security Advisories: RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
Common Vulnerability Exposure (CVE) ID: CVE-2016-7917
BugTraq ID: 94147
http://www.securityfocus.com/bid/94147
Common Vulnerability Exposure (CVE) ID: CVE-2016-8632
94211
http://www.securityfocus.com/bid/94211
[netdev] 20161018 [PATCH net] tipc: Guard against tiny MTU in tipc_msg_build()
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html
[oss-security] 20161108 CVE-2016-8632 -- Linux kernel: tipc_msg_build() doesn't validate MTU that can trigger heap overflow
http://www.openwall.com/lists/oss-security/2016/11/08/5
https://bugzilla.redhat.com/show_bug.cgi?id=1390832
Common Vulnerability Exposure (CVE) ID: CVE-2016-9083
BugTraq ID: 93929
http://www.securityfocus.com/bid/93929
http://www.openwall.com/lists/oss-security/2016/10/26/11
RedHat Security Advisories: RHSA-2017:0386
http://rhn.redhat.com/errata/RHSA-2017-0386.html
RedHat Security Advisories: RHSA-2017:0387
http://rhn.redhat.com/errata/RHSA-2017-0387.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9084
BugTraq ID: 93930
http://www.securityfocus.com/bid/93930
Common Vulnerability Exposure (CVE) ID: CVE-2016-9120
BugTraq ID: 94669
http://www.securityfocus.com/bid/94669
Common Vulnerability Exposure (CVE) ID: CVE-2016-9604
BugTraq ID: 102135
http://www.securityfocus.com/bid/102135
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
Common Vulnerability Exposure (CVE) ID: CVE-2017-2671
42135
https://www.exploit-db.com/exploits/42135/
97407
http://www.securityfocus.com/bid/97407
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
USN-3754-1
https://usn.ubuntu.com/3754-1/
[oss-security] 20170404 Re: Linux kernel ping socket / AF_LLC connect() sin_family race
http://openwall.com/lists/oss-security/2017/04/04/8
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/ipv4/ping.c?id=43a6684519ab0a6c52024b5e25322476cabad893
https://github.com/danieljiang0415/android_kernel_crash_poc
https://github.com/torvalds/linux/commit/43a6684519ab0a6c52024b5e25322476cabad893
https://twitter.com/danieljiang0415/status/845116665184497664
Common Vulnerability Exposure (CVE) ID: CVE-2017-6001
BugTraq ID: 96264
http://www.securityfocus.com/bid/96264
Debian Security Information: DSA-3791 (Google Search)
http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2017/02/16/1
RedHat Security Advisories: RHSA-2018:1854
Common Vulnerability Exposure (CVE) ID: CVE-2017-6951
BugTraq ID: 96943
http://www.securityfocus.com/bid/96943
http://www.spinics.net/lists/keyrings/msg01845.html
http://www.spinics.net/lists/keyrings/msg01846.html
http://www.spinics.net/lists/keyrings/msg01849.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-7308
BugTraq ID: 97234
http://www.securityfocus.com/bid/97234
https://www.exploit-db.com/exploits/41994/
https://www.exploit-db.com/exploits/44654/
https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
RedHat Security Advisories: RHSA-2017:1297
https://access.redhat.com/errata/RHSA-2017:1297
RedHat Security Advisories: RHSA-2017:1298
https://access.redhat.com/errata/RHSA-2017:1298
RedHat Security Advisories: RHSA-2017:1308
https://access.redhat.com/errata/RHSA-2017:1308
Common Vulnerability Exposure (CVE) ID: CVE-2017-7472
1038471
http://www.securitytracker.com/id/1038471
42136
https://www.exploit-db.com/exploits/42136/
98422
http://www.securityfocus.com/bid/98422
RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0151
RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0152
RHSA-2018:0181
https://access.redhat.com/errata/RHSA-2018:0181
SUSE-SU-2018:0011
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c9f838d104fed6f2f61d68164712e3204bf5271b
http://openwall.com/lists/oss-security/2017/05/11/1
https://bugzilla.novell.com/show_bug.cgi?id=1034862
https://bugzilla.redhat.com/show_bug.cgi?id=1442086
https://github.com/torvalds/linux/commit/c9f838d104fed6f2f61d68164712e3204bf5271b
https://lkml.org/lkml/2017/4/1/235
https://lkml.org/lkml/2017/4/3/724
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.13
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.