#4012: linux-4.8.13 (CVE-2016-7596 CVE-2016-9919 CVE-2016-9793 CVE-2016-9794
CVE-2016-9806)
---------------------+------------------------
Reporter: renodr | Owner: lfs-book@…
Type: task | Status: new
Priority: highest | Milestone: 7.11
Component: Book | Version: SVN
Severity: normal | Keywords:
---------------------+------------------------
New minor version.
Security update with some critical fixes.
----
[http://seclists.org/oss-sec/2016/q4/644]
CVE-2016-7596: Linux Kernel use-after-free in SCSI generic device
interface
----
The linux kernel contains a bug where a fragmented IPv6 packet causes a
panic after a timeout (seems to be roughly 60 seconds). This can be
triggered remotely via the internet and results in a DoS (kernel panic).
[http://seclists.org/oss-sec/2016/q4/640]
[http://seclists.org/oss-sec/2016/q4/641]
CVE-2016-9919
----
CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE
Memory corruption.
[http://seclists.org/oss-sec/2016/q4/573]
[http://seclists.org/oss-sec/2016/q4/574]
Affects all kernels back to 3.5 series, with a different CVE being
assigned all the way back to 2.6.x.
{{{
Use CVE-2016-9793. This affects, for example, 4.8.12.
We might not completely understand the CVE implications of the "Note
that before
https://github.com/torvalds/linux/commit/82981930125abfd39d7c8378a9cfdf5e1be2002b
the bug was even more serious, since SO_SNDBUF and SO_RCVBUF were
vulnerable" comment within the
b98b0bc8c431e3ceb4b26b0dfc8db509518fb290 commit message.
82981930125abfd39d7c8378a9cfdf5e1be2002b is a commit from 2012. The
3.5 release has this, whereas the 3.4 release does not.
For now, we are assigning CVE-2012-6704 to mean the analogous
vulnerability involving SO_SNDBUF and SO_RCVBUF that affects "before
3.5" kernels.
}}}
----
CVE request: -- Linux kernel: ALSA: use-after-free in,kill_fasync
[http://seclists.org/oss-sec/2016/q4/575]
[http://seclists.org/oss-sec/2016/q4/576]
CVE-2016-9794
----
CVE Request: -- Linux kernel: double free in netlink_dump
[http://seclists.org/oss-sec/2016/q4/577]
[http://seclists.org/oss-sec/2016/q4/580]
CVE-2016-9806
----
My personal advice is to put out an advisory to the list as soon as we are
done updating this package, and make a change to the errata for both
books. This is serious and is worse than Dirty CoW.
--
Ticket URL: <http://wiki.linuxfromscratch.org/lfs/ticket/4012>
LFS Trac <http://wiki.linuxfromscratch.org/lfs/>
Linux From Scratch: Your Distro, Your Rules.
--
http://lists.linuxfromscratch.org/listinfo/lfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page