Fedora 22 update for kernel



| Updated: 2025-04-24
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2016-4470
CVE-2016-1583
CVE-2016-4998
CVE-2016-4997
CWE-ID CWE-19
CWE-400
CWE-119
Exploitation vector Local
Public exploit Public exploit code for vulnerability #2 is available.
Public exploit code for vulnerability #4 is available.
Vulnerable software
Fedora
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Data handling

EUVDB-ID: #VU3800

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2016-4470

CWE-ID: CWE-19 - Data Handling

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the key_reject_and_link function in security/keys/key.c due to it does not ensure that a certain data structure is initialized. A local attacker can cause the service to crash via vectors involving a crafted keyctl request2 command.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 22

kernel: before 4.4.14-200.fc22

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2016-63ee0999e4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource exhaustion

EUVDB-ID: #VU4062

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2016-1583

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: Yes

Description

The vulnerability allows a local attacker to cause DoS condition and gain elevated privileges on the target system.

The weakness exists in the ecryptfs_privileged_open function in fs/ecryptfs/kthread.c due to stack memory consumption. A local attacker can cause the service to crash and gain elevated privileges via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 22

kernel: before 4.4.14-200.fc22

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2016-63ee0999e4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

3) Memory corruption

EUVDB-ID: #VU28

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2016-4998

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to cause denial of service conditions on the target system.

The vulnerability exists due to memory access error. A local user can cause the target sysetm to crash by issuing a specially crafted IPT_SO_SET_REPLACE setsockopt() call.

Successful exploitation of this vulnerability may result in the crash of the target sysetm.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 22

kernel: before 4.4.14-200.fc22

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2016-63ee0999e4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory corruption

EUVDB-ID: #VU27

Risk: High

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2016-4997

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a local user to obtain elevated privileges on the target system.

The vulnerability exists due to a memory corruption error in the IPT_SO_SET_REPLACE compat_setsockopt() function.

Successful exploitation of this vulnerability may lead to arbitrary code execution with kernel-level privileges.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 22

kernel: before 4.4.14-200.fc22

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2016-63ee0999e4


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###