ALT-BU-2015-2445-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 3.19.7-alt1 for branch sisyphus in task 144099.
Closed vulnerabilities
BDU:2017-02405
Уязвимость функции load_elf_binary ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2025-01-22
CVE-2017-1000253
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
- 101010
- 101010
- 1039434
- 1039434
- RHSA-2017:2793
- RHSA-2017:2793
- RHSA-2017:2794
- RHSA-2017:2794
- RHSA-2017:2795
- RHSA-2017:2795
- RHSA-2017:2796
- RHSA-2017:2796
- RHSA-2017:2797
- RHSA-2017:2797
- RHSA-2017:2798
- RHSA-2017:2798
- RHSA-2017:2799
- RHSA-2017:2799
- RHSA-2017:2800
- RHSA-2017:2800
- RHSA-2017:2801
- RHSA-2017:2801
- RHSA-2017:2802
- RHSA-2017:2802
- https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
- https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
Package kernel-image-std-def updated to version 3.14.41-alt1 for branch sisyphus in task 144103.
Closed vulnerabilities
BDU:2017-02405
Уязвимость функции load_elf_binary ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2025-01-22
CVE-2017-1000253
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
- 101010
- 101010
- 1039434
- 1039434
- RHSA-2017:2793
- RHSA-2017:2793
- RHSA-2017:2794
- RHSA-2017:2794
- RHSA-2017:2795
- RHSA-2017:2795
- RHSA-2017:2796
- RHSA-2017:2796
- RHSA-2017:2797
- RHSA-2017:2797
- RHSA-2017:2798
- RHSA-2017:2798
- RHSA-2017:2799
- RHSA-2017:2799
- RHSA-2017:2800
- RHSA-2017:2800
- RHSA-2017:2801
- RHSA-2017:2801
- RHSA-2017:2802
- RHSA-2017:2802
- https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
- https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-3627
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
- openSUSE-SU-2015:0905
- openSUSE-SU-2015:0905
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
Modified: 2024-11-21
CVE-2015-3629
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
- openSUSE-SU-2015:0905
- openSUSE-SU-2015:0905
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 74558
- 74558
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
Modified: 2024-11-21
CVE-2015-3630
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
- openSUSE-SU-2015:0905
- openSUSE-SU-2015:0905
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 74566
- 74566
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
Modified: 2024-11-21
CVE-2015-3631
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
- openSUSE-SU-2015:0905
- openSUSE-SU-2015:0905
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- 20150508 Docker 1.6.1 - Security Advisory [150507]
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
- https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ