ALT-BU-2015-2675-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 4.2.3-alt1 for branch sisyphus in task 150562.
Closed vulnerabilities
BDU:2018-00574
Уязвимость функции stub_send_ret_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00575
Уязвимость функции stub_recv_cmd_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00576
Уязвимость функции get_pipe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-5156
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1978.html
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76230
- http://www.securitytracker.com/id/1034045
- http://www.ubuntu.com/usn/USN-2773-1
- http://www.ubuntu.com/usn/USN-2774-1
- http://www.ubuntu.com/usn/USN-2777-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1243852
- https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1978.html
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76230
- http://www.securitytracker.com/id/1034045
- http://www.ubuntu.com/usn/USN-2773-1
- http://www.ubuntu.com/usn/USN-2774-1
- http://www.ubuntu.com/usn/USN-2777-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1243852
- https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
Modified: 2025-04-12
CVE-2015-5283
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://patchwork.ozlabs.org/patch/515996/
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77058
- http://www.securitytracker.com/id/1033808
- http://www.ubuntu.com/usn/USN-2823-1
- http://www.ubuntu.com/usn/USN-2826-1
- http://www.ubuntu.com/usn/USN-2829-1
- http://www.ubuntu.com/usn/USN-2829-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1257528
- https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
- https://security-tracker.debian.org/tracker/CVE-2015-5283
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://patchwork.ozlabs.org/patch/515996/
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77058
- http://www.securitytracker.com/id/1033808
- http://www.ubuntu.com/usn/USN-2823-1
- http://www.ubuntu.com/usn/USN-2826-1
- http://www.ubuntu.com/usn/USN-2829-1
- http://www.ubuntu.com/usn/USN-2829-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1257528
- https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
- https://security-tracker.debian.org/tracker/CVE-2015-5283
Modified: 2025-04-12
CVE-2015-7799
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.openwall.com/lists/oss-security/2015/10/10/3
- http://www.securityfocus.com/bid/77033
- http://www.securitytracker.com/id/1033809
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- http://www.ubuntu.com/usn/USN-2844-1
- http://www.ubuntu.com/usn/USN-2886-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1271134
- https://code.google.com/p/android/issues/detail?id=187973
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.openwall.com/lists/oss-security/2015/10/10/3
- http://www.securityfocus.com/bid/77033
- http://www.securitytracker.com/id/1033809
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- http://www.ubuntu.com/usn/USN-2844-1
- http://www.ubuntu.com/usn/USN-2886-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1271134
- https://code.google.com/p/android/issues/detail?id=187973
Modified: 2025-04-12
CVE-2015-8746
fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2
- http://www.openwall.com/lists/oss-security/2016/01/05/9
- http://www.securitytracker.com/id/1034594
- https://bugzilla.redhat.com/show_bug.cgi?id=1295802
- https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2
- http://www.openwall.com/lists/oss-security/2016/01/05/9
- http://www.securitytracker.com/id/1034594
- https://bugzilla.redhat.com/show_bug.cgi?id=1295802
- https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da
Modified: 2025-04-12
CVE-2015-8956
The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=951b6a0717db97ce420547222647bcc40bf1eacd
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://source.android.com/security/bulletin/2016-10-01.html
- http://www.securityfocus.com/bid/93326
- https://github.com/torvalds/linux/commit/951b6a0717db97ce420547222647bcc40bf1eacd
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=951b6a0717db97ce420547222647bcc40bf1eacd
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://source.android.com/security/bulletin/2016-10-01.html
- http://www.securityfocus.com/bid/93326
- https://github.com/torvalds/linux/commit/951b6a0717db97ce420547222647bcc40bf1eacd
Modified: 2025-04-20
CVE-2017-15116
The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://bugzilla.redhat.com/show_bug.cgi?id=1485815
- https://bugzilla.redhat.com/show_bug.cgi?id=1514609
- https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://bugzilla.redhat.com/show_bug.cgi?id=1485815
- https://bugzilla.redhat.com/show_bug.cgi?id=1514609
- https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
Modified: 2024-11-21
CVE-2017-16912
The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/77000/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/77000/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
Modified: 2024-11-21
CVE-2017-16913
The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=c6688ef9f29762e65bce325ef4acd6c675806366
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/80601/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=c6688ef9f29762e65bce325ef4acd6c675806366
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/80601/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
Modified: 2024-11-21
CVE-2017-16914
The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/80722/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
- http://www.securityfocus.com/bid/102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/80722/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
Modified: 2024-11-21
CVE-2018-5803
In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
- https://access.redhat.com/errata/RHSA-2018:1854
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2019:0641
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/81331/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188
- https://www.spinics.net/lists/linux-sctp/msg07036.html
- https://www.spinics.net/lists/netdev/msg482523.html
- https://access.redhat.com/errata/RHSA-2018:1854
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2019:0641
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://secuniaresearch.flexerasoftware.com/advisories/81331/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3698-1/
- https://usn.ubuntu.com/3698-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188
- https://www.spinics.net/lists/linux-sctp/msg07036.html
- https://www.spinics.net/lists/netdev/msg482523.html
Package kernel-modules-nvidia-un-def updated to version 352.41-alt3.262659.1 for branch sisyphus in task 150562.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-5950
The NVIDIA display driver R352 before 353.82 and R340 before 341.81 on Windows; R304 before 304.128, R340 before 340.93, and R352 before 352.41 on Linux; and R352 before 352.46 on GRID vGPU and vSGA allows local users to write to an arbitrary kernel memory location and consequently gain privileges via a crafted ioctl call.
- http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia
- http://www.securitytracker.com/id/1033662
- http://www.ubuntu.com/usn/USN-2747-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04815468
- https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04815468
- https://support.lenovo.com/us/en/product_security/len_3313
- http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia
- http://www.securitytracker.com/id/1033662
- http://www.ubuntu.com/usn/USN-2747-1
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04815468
- https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04815468
- https://support.lenovo.com/us/en/product_security/len_3313
Package alterator-root updated to version 1.1-alt3 for branch sisyphus in task 150868.
Closed bugs
Нерабочие тесты в составе исходников
Closed bugs
tmpfiles для ceph