ALT-BU-2014-3175-1
Branch t7 update bulletin.
Closed bugs
Безусловно включает режим отладки для dhcpcd
Неработоспособность human syntax и ipset
Использовать --release для остановки dhcpcd
Некорректно устанавливается родитель фильтра
Меняет systemd на sysvinit
Package kernel-image-un-def updated to version 3.18.0-alt1 for branch t7 in task 137190.
Closed vulnerabilities
BDU:2017-00542
Уязвимость драйвера Wi-Fi Qualcomm операционных систем Android, позволяющая нарушителю выполнить произвольный код
BDU:2017-01546
Уязвимость операционной системы Android, позволяющая нарушителю повысить свои привилегии
BDU:2017-01573
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2025-04-12
CVE-2014-8134
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-8134.html
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://secunia.com/advisories/62336
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/71650
- http://www.spinics.net/lists/kvm/msg111458.html
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314
- https://bugzilla.novell.com/show_bug.cgi?id=909078
- https://bugzilla.redhat.com/show_bug.cgi?id=1172765
- https://support.f5.com/csp/article/K17120
- https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-8134.html
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://secunia.com/advisories/62336
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/71650
- http://www.spinics.net/lists/kvm/msg111458.html
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314
- https://bugzilla.novell.com/show_bug.cgi?id=909078
- https://bugzilla.redhat.com/show_bug.cgi?id=1172765
- https://support.f5.com/csp/article/K17120
- https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS
Modified: 2025-04-12
CVE-2014-8160
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2015-0284.html
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://rhn.redhat.com/errata/RHSA-2015-0674.html
- http://www.debian.org/security/2015/dsa-3170
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:057
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://www.openwall.com/lists/oss-security/2015/01/14/3
- http://www.securityfocus.com/bid/72061
- http://www.spinics.net/lists/netfilter-devel/msg33430.html
- http://www.ubuntu.com/usn/USN-2513-1
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.ubuntu.com/usn/USN-2518-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1182059
- https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2015-0284.html
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://rhn.redhat.com/errata/RHSA-2015-0674.html
- http://www.debian.org/security/2015/dsa-3170
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:057
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://www.openwall.com/lists/oss-security/2015/01/14/3
- http://www.securityfocus.com/bid/72061
- http://www.spinics.net/lists/netfilter-devel/msg33430.html
- http://www.ubuntu.com/usn/USN-2513-1
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.ubuntu.com/usn/USN-2518-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1182059
- https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b
Modified: 2025-04-12
CVE-2014-8480
The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 lacks intended decoder-table flags for certain RIP-relative instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f6f1480d86bf9fc16c160d803ab1d006e3058d5
- http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427
- http://www.openwall.com/lists/oss-security/2014/10/23/7
- http://www.securityfocus.com/bid/70710
- https://bugzilla.redhat.com/show_bug.cgi?id=1156615
- https://github.com/torvalds/linux/commit/3f6f1480d86bf9fc16c160d803ab1d006e3058d5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3f6f1480d86bf9fc16c160d803ab1d006e3058d5
- http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427
- http://www.openwall.com/lists/oss-security/2014/10/23/7
- http://www.securityfocus.com/bid/70710
- https://bugzilla.redhat.com/show_bug.cgi?id=1156615
- https://github.com/torvalds/linux/commit/3f6f1480d86bf9fc16c160d803ab1d006e3058d5
Modified: 2025-04-12
CVE-2014-8481
The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 does not properly handle invalid instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a crafted application that triggers (1) an improperly fetched instruction or (2) an instruction that occupies too many bytes. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8480.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a430c9166312e1aa3d80bce32374233bdbfeba32
- http://secunia.com/advisories/62042
- http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427
- http://www.openwall.com/lists/oss-security/2014/10/23/7
- https://bugzilla.redhat.com/show_bug.cgi?id=1156615
- https://github.com/torvalds/linux/commit/a430c9166312e1aa3d80bce32374233bdbfeba32
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a430c9166312e1aa3d80bce32374233bdbfeba32
- http://secunia.com/advisories/62042
- http://thread.gmane.org/gmane.comp.emulators.kvm.devel/128427
- http://www.openwall.com/lists/oss-security/2014/10/23/7
- https://bugzilla.redhat.com/show_bug.cgi?id=1156615
- https://github.com/torvalds/linux/commit/a430c9166312e1aa3d80bce32374233bdbfeba32
Modified: 2025-04-20
CVE-2014-9922
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=69c433ed2ecd2d3264efd7afec4439524b319121
- http://source.android.com/security/bulletin/2017-04-01.html
- http://www.securityfocus.com/bid/97354
- http://www.securitytracker.com/id/1038201
- https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=69c433ed2ecd2d3264efd7afec4439524b319121
- http://source.android.com/security/bulletin/2017-04-01.html
- http://www.securityfocus.com/bid/97354
- http://www.securitytracker.com/id/1038201
- https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121
Modified: 2025-04-12
CVE-2015-3332
A certain backport in the TCP Fast Open implementation for the Linux kernel before 3.18 does not properly maintain a count value, which allow local users to cause a denial of service (system crash) via the Fast Open feature, as demonstrated by visiting the chrome://flags/#enable-tcp-fast-open URL when using certain 3.10.x through 3.16.x kernel builds, including longterm-maintenance releases and ckt (aka Canonical Kernel Team) builds.
- http://article.gmane.org/gmane.linux.network/359588
- http://www.debian.org/security/2015/dsa-3237
- http://www.openwall.com/lists/oss-security/2015/04/14/14
- https://bugs.debian.org/782515
- https://bugzilla.redhat.com/show_bug.cgi?id=1213951
- http://article.gmane.org/gmane.linux.network/359588
- http://www.debian.org/security/2015/dsa-3237
- http://www.openwall.com/lists/oss-security/2015/04/14/14
- https://bugs.debian.org/782515
- https://bugzilla.redhat.com/show_bug.cgi?id=1213951
Modified: 2025-04-20
CVE-2017-0523
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-32835279. References: QC-CR#1096945.
- http://www.securityfocus.com/bid/96735
- http://www.securitytracker.com/id/1037968
- https://source.android.com/security/bulletin/2017-03-01
- https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=5bb646471da76d3d5cd02cf3da7a03ce6e3cb582
- https://source.android.com/security/bulletin/2017-03-01.html
- http://www.securityfocus.com/bid/96735
- http://www.securitytracker.com/id/1037968
- https://source.android.com/security/bulletin/2017-03-01
- https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=5bb646471da76d3d5cd02cf3da7a03ce6e3cb582
Modified: 2025-04-20
CVE-2017-2647
The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81
- http://www.securityfocus.com/bid/97258
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://bugzilla.redhat.com/show_bug.cgi?id=1428353
- https://github.com/torvalds/linux/commit/c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81
- https://usn.ubuntu.com/3849-1/
- https://usn.ubuntu.com/3849-2/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81
- http://www.securityfocus.com/bid/97258
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://bugzilla.redhat.com/show_bug.cgi?id=1428353
- https://github.com/torvalds/linux/commit/c06cfb08b88dfbe13be44a69ae2fdc3a7c902d81
- https://usn.ubuntu.com/3849-1/
- https://usn.ubuntu.com/3849-2/