ALT-BU-2017-2896-1
Branch p8 update bulletin.
Package kernel-image-un-def updated to version 4.9.5-alt0.M80P.1 for branch p8 in task 176943.
Closed vulnerabilities
BDU:2016-02350
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00291
Уязвимость операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию
BDU:2017-00292
Уязвимость операционной системы Linux, позволяющая нарушителю получить конфиденциальную информацию
BDU:2017-00295
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-00297
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10741
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598
- 106822
- 106822
- https://bugzilla.suse.com/show_bug.cgi?id=1124010
- https://bugzilla.suse.com/show_bug.cgi?id=1124010
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3
- https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
- https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
Modified: 2024-11-21
CVE-2016-9083
drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05692d7005a364add85c6e25a6c4447ce08f913a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05692d7005a364add85c6e25a6c4447ce08f913a
- RHSA-2017:0386
- RHSA-2017:0386
- RHSA-2017:0387
- RHSA-2017:0387
- [oss-security] 20161027 kernel: low-severity vfio driver integer overflow
- [oss-security] 20161027 kernel: low-severity vfio driver integer overflow
- 93929
- 93929
- https://bugzilla.redhat.com/show_bug.cgi?id=1389258
- https://bugzilla.redhat.com/show_bug.cgi?id=1389258
- https://github.com/torvalds/linux/commit/05692d7005a364add85c6e25a6c4447ce08f913a
- https://github.com/torvalds/linux/commit/05692d7005a364add85c6e25a6c4447ce08f913a
- https://patchwork.kernel.org/patch/9373631/
- https://patchwork.kernel.org/patch/9373631/
Modified: 2024-11-21
CVE-2016-9588
arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef85b67385436ddc1998f45f1d6a210f935b3388
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef85b67385436ddc1998f45f1d6a210f935b3388
- DSA-3804
- DSA-3804
- [oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
- [oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
- 94933
- 94933
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1404924
- https://bugzilla.redhat.com/show_bug.cgi?id=1404924
- https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
- https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
- USN-3822-1
- USN-3822-1
- USN-3822-2
- USN-3822-2
Modified: 2024-11-21
CVE-2016-9919
The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- [oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
- [oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
- 94824
- 94824
- https://github.com/torvalds/linux/commit/79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- https://github.com/torvalds/linux/commit/79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
Modified: 2024-11-21
CVE-2017-2583
The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=33ab91103b3415e12457e3104f0e4517ce12d0f3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=33ab91103b3415e12457e3104f0e4517ce12d0f3
- DSA-3791
- DSA-3791
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- [oss-security] 20170119 CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
- [oss-security] 20170119 CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
- 95673
- 95673
- RHSA-2017:1615
- RHSA-2017:1615
- RHSA-2017:1616
- RHSA-2017:1616
- https://bugzilla.redhat.com/show_bug.cgi?id=1414735
- https://bugzilla.redhat.com/show_bug.cgi?id=1414735
- https://github.com/torvalds/linux/commit/33ab91103b3415e12457e3104f0e4517ce12d0f3
- https://github.com/torvalds/linux/commit/33ab91103b3415e12457e3104f0e4517ce12d0f3
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-2584
arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74d
- DSA-3791
- DSA-3791
- [oss-security] 20170113 CVE-2017-2584 Kernel: kvm: use after free in complete_emulated_mmio
- [oss-security] 20170113 CVE-2017-2584 Kernel: kvm: use after free in complete_emulated_mmio
- 95430
- 95430
- 1037603
- 1037603
- https://bugzilla.redhat.com/show_bug.cgi?id=1413001
- https://bugzilla.redhat.com/show_bug.cgi?id=1413001
- https://github.com/torvalds/linux/commit/129a72a0d3c8e139a04512325384fe5ac119e74d
- https://github.com/torvalds/linux/commit/129a72a0d3c8e139a04512325384fe5ac119e74d
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-5546
The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- 95711
- 95711
- https://bugzilla.redhat.com/show_bug.cgi?id=1415733
- https://bugzilla.redhat.com/show_bug.cgi?id=1415733
- https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
- https://github.com/torvalds/linux/commit/c4e490cf148e85ead0d1b1c2caaba833f1d5b29f
Modified: 2024-11-21
CVE-2017-5549
The klsi_105_get_line_state function in drivers/usb/serial/kl5kusb105.c in the Linux kernel before 4.9.5 places uninitialized heap-memory contents into a log entry upon a failure to read the line status, which allows local users to obtain sensitive information by reading the log.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410
- DSA-3791
- DSA-3791
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- 95715
- 95715
- https://bugzilla.redhat.com/show_bug.cgi?id=1416114
- https://bugzilla.redhat.com/show_bug.cgi?id=1416114
- https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410
- https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-5550
Off-by-one error in the pipe_advance function in lib/iov_iter.c in the Linux kernel before 4.9.5 allows local users to obtain sensitive information from uninitialized heap-memory locations in opportunistic circumstances by reading from a pipe after an incorrect buffer-release decision.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- [oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
- 95716
- 95716
- https://bugzilla.redhat.com/show_bug.cgi?id=1416116
- https://bugzilla.redhat.com/show_bug.cgi?id=1416116
- https://github.com/torvalds/linux/commit/b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb
- https://github.com/torvalds/linux/commit/b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb
Modified: 2024-11-21
CVE-2017-7273
The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- 97190
- 97190
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110