ALT-BU-2018-3252-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-00916
Уязвимость программного средства для взаимодействия с серверами cURL, вызванная переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01424
Уязвимость программного средства для взаимодействия с серверами curl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1000300
curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl < 7.54.1 and curl >= 7.60.0.
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104207
- 104207
- 1040933
- 1040933
- https://curl.haxx.se/docs/adv_2018-82c2.html
- https://curl.haxx.se/docs/adv_2018-82c2.html
- GLSA-201806-05
- GLSA-201806-05
- USN-3648-1
- USN-3648-1
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Modified: 2024-11-21
CVE-2018-1000301
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 104225
- 104225
- 1040931
- 1040931
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2018:3157
- RHSA-2018:3157
- RHSA-2018:3558
- RHSA-2018:3558
- RHSA-2020:0544
- RHSA-2020:0544
- RHSA-2020:0594
- RHSA-2020:0594
- https://curl.haxx.se/docs/adv_2018-b138.html
- https://curl.haxx.se/docs/adv_2018-b138.html
- [debian-lts-announce] 20180516 [SECURITY] [DLA 1379-1] curl security update
- [debian-lts-announce] 20180516 [SECURITY] [DLA 1379-1] curl security update
- GLSA-201806-05
- GLSA-201806-05
- USN-3598-2
- USN-3598-2
- USN-3648-1
- USN-3648-1
- DSA-4202
- DSA-4202
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Closed bugs
Новая версия
Package jackson-databind updated to version 2.9.4-alt1_3jpp8 for branch sisyphus in task 206492.
Closed vulnerabilities
BDU:2019-04797
Уязвимость библиотеки Jackson-databind, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код
BDU:2021-01382
Уязвимость метода readValue класса ObjectMapper библиотеки Jackson-databind, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01394
Уязвимость метода readValue класса ObjectMapper библиотеки Jackson-databind, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15095
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 103880
- 103880
- 1039769
- 1039769
- RHSA-2017:3189
- RHSA-2017:3189
- RHSA-2017:3190
- RHSA-2017:3190
- RHSA-2018:0342
- RHSA-2018:0342
- RHSA-2018:0478
- RHSA-2018:0478
- RHSA-2018:0479
- RHSA-2018:0479
- RHSA-2018:0480
- RHSA-2018:0480
- RHSA-2018:0481
- RHSA-2018:0481
- RHSA-2018:0576
- RHSA-2018:0576
- RHSA-2018:0577
- RHSA-2018:0577
- RHSA-2018:1447
- RHSA-2018:1447
- RHSA-2018:1448
- RHSA-2018:1448
- RHSA-2018:1449
- RHSA-2018:1449
- RHSA-2018:1450
- RHSA-2018:1450
- RHSA-2018:1451
- RHSA-2018:1451
- RHSA-2018:2927
- RHSA-2018:2927
- RHSA-2019:2858
- RHSA-2019:2858
- RHSA-2019:3149
- RHSA-2019:3149
- RHSA-2019:3892
- RHSA-2019:3892
- https://github.com/FasterXML/jackson-databind/issues/1680
- https://github.com/FasterXML/jackson-databind/issues/1680
- https://github.com/FasterXML/jackson-databind/issues/1737
- https://github.com/FasterXML/jackson-databind/issues/1737
- [lucene-solr-user] 20191219 Re: CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20191219 Re: CVE-2017-7525 fix for Solr 7.7.x
- [debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update
- [debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update
- https://security.netapp.com/advisory/ntap-20171214-0003/
- https://security.netapp.com/advisory/ntap-20171214-0003/
- DSA-4037
- DSA-4037
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2024-11-21
CVE-2017-17485
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
- 20180109 CVE-2017-17485: one more way of rce in jackson-databind when defaultTyping+objects are used
- 20180109 CVE-2017-17485: one more way of rce in jackson-databind when defaultTyping+objects are used
- RHSA-2018:0116
- RHSA-2018:0116
- RHSA-2018:0342
- RHSA-2018:0342
- RHSA-2018:0478
- RHSA-2018:0478
- RHSA-2018:0479
- RHSA-2018:0479
- RHSA-2018:0480
- RHSA-2018:0480
- RHSA-2018:0481
- RHSA-2018:0481
- RHSA-2018:1447
- RHSA-2018:1447
- RHSA-2018:1448
- RHSA-2018:1448
- RHSA-2018:1449
- RHSA-2018:1449
- RHSA-2018:1450
- RHSA-2018:1450
- RHSA-2018:1451
- RHSA-2018:1451
- RHSA-2018:2930
- RHSA-2018:2930
- RHSA-2019:1782
- RHSA-2019:1782
- RHSA-2019:1797
- RHSA-2019:1797
- RHSA-2019:2858
- RHSA-2019:2858
- RHSA-2019:3149
- RHSA-2019:3149
- RHSA-2019:3892
- RHSA-2019:3892
- https://github.com/FasterXML/jackson-databind/issues/1855
- https://github.com/FasterXML/jackson-databind/issues/1855
- https://github.com/irsl/jackson-rce-via-spel/
- https://github.com/irsl/jackson-rce-via-spel/
- https://security.netapp.com/advisory/ntap-20180201-0003/
- https://security.netapp.com/advisory/ntap-20180201-0003/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- DSA-4114
- DSA-4114
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2017-7525
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 99623
- 99623
- 1039744
- 1039744
- 1039947
- 1039947
- 1040360
- 1040360
- RHSA-2017:1834
- RHSA-2017:1834
- RHSA-2017:1835
- RHSA-2017:1835
- RHSA-2017:1836
- RHSA-2017:1836
- RHSA-2017:1837
- RHSA-2017:1837
- RHSA-2017:1839
- RHSA-2017:1839
- RHSA-2017:1840
- RHSA-2017:1840
- RHSA-2017:2477
- RHSA-2017:2477
- RHSA-2017:2546
- RHSA-2017:2546
- RHSA-2017:2547
- RHSA-2017:2547
- RHSA-2017:2633
- RHSA-2017:2633
- RHSA-2017:2635
- RHSA-2017:2635
- RHSA-2017:2636
- RHSA-2017:2636
- RHSA-2017:2637
- RHSA-2017:2637
- RHSA-2017:2638
- RHSA-2017:2638
- RHSA-2017:3141
- RHSA-2017:3141
- RHSA-2017:3454
- RHSA-2017:3454
- RHSA-2017:3455
- RHSA-2017:3455
- RHSA-2017:3456
- RHSA-2017:3456
- RHSA-2017:3458
- RHSA-2017:3458
- RHSA-2018:0294
- RHSA-2018:0294
- RHSA-2018:0342
- RHSA-2018:0342
- RHSA-2018:1449
- RHSA-2018:1449
- RHSA-2018:1450
- RHSA-2018:1450
- RHSA-2019:0910
- RHSA-2019:0910
- RHSA-2019:2858
- RHSA-2019:2858
- RHSA-2019:3149
- RHSA-2019:3149
- https://bugzilla.redhat.com/show_bug.cgi?id=1462702
- https://bugzilla.redhat.com/show_bug.cgi?id=1462702
- https://cwiki.apache.org/confluence/display/WW/S2-055
- https://cwiki.apache.org/confluence/display/WW/S2-055
- https://github.com/FasterXML/jackson-databind/issues/1599
- https://github.com/FasterXML/jackson-databind/issues/1599
- https://github.com/FasterXML/jackson-databind/issues/1723
- https://github.com/FasterXML/jackson-databind/issues/1723
- [lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [lucene-solr-user] 20191218 CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20191218 CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report
- [lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report
- [druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities
- [druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities
- [lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Resolved] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Resolved] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Assigned] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Assigned] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-solr-user] 20191218 Re: CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20191218 Re: CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20191219 Re: CVE-2017-7525 fix for Solr 7.7.x
- [lucene-solr-user] 20191219 Re: CVE-2017-7525 fix for Solr 7.7.x
- [lucene-dev] 20190325 [jira] [Closed] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [lucene-dev] 20190325 [jira] [Closed] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
- [cassandra-commits] 20210927 [jira] [Updated] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [cassandra-commits] 20210927 [jira] [Updated] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [spark-issues] 20210223 [jira] [Created] (SPARK-34511) Current Security vulnerabilities in spark libraries
- [spark-issues] 20210223 [jira] [Created] (SPARK-34511) Current Security vulnerabilities in spark libraries
- [cassandra-commits] 20210927 [jira] [Commented] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [cassandra-commits] 20210927 [jira] [Commented] (CASSANDRA-15416) CVE-2017-7525 ( jackson-databind is vulnerable to Remote Code Execution) on version 3.11.4
- [debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update
- [debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update
- [debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update
- [debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update
- https://security.netapp.com/advisory/ntap-20171214-0002/
- https://security.netapp.com/advisory/ntap-20171214-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- DSA-4004
- DSA-4004
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Modified: 2024-11-21
CVE-2018-5968
FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
- RHSA-2018:0478
- RHSA-2018:0478
- RHSA-2018:0479
- RHSA-2018:0479
- RHSA-2018:0480
- RHSA-2018:0480
- RHSA-2018:0481
- RHSA-2018:0481
- RHSA-2018:1525
- RHSA-2018:1525
- RHSA-2019:2858
- RHSA-2019:2858
- RHSA-2019:3149
- RHSA-2019:3149
- https://github.com/FasterXML/jackson-databind/issues/1899
- https://github.com/FasterXML/jackson-databind/issues/1899
- https://security.netapp.com/advisory/ntap-20180423-0002/
- https://security.netapp.com/advisory/ntap-20180423-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us
- DSA-4114
- DSA-4114
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Package kernel-image-un-def updated to version 4.16.9-alt1 for branch sisyphus in task 206454.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1000200
The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
- [oss-security] 20180424 CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
- [oss-security] 20180424 CVE-2018-1000200 (Linux): Bad memory access on oom kill of large mlocked process
- 104397
- 104397
- RHSA-2018:2948
- RHSA-2018:2948
- https://access.redhat.com/security/cve/cve-2018-1000200
- https://access.redhat.com/security/cve/cve-2018-1000200
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
- [linux-kernel] 20180417 [patch] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180417 [patch] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180424 [patch v3 for-4.17] mm, oom: fix concurrent munlock and oom reaper unmap
- [linux-kernel] 20180424 [patch v3 for-4.17] mm, oom: fix concurrent munlock and oom reaper unmap
- USN-3752-1
- USN-3752-1
- USN-3752-2
- USN-3752-2
- USN-3752-3
- USN-3752-3
Modified: 2024-11-21
CVE-2018-11508
The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95
- 104292
- 104292
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1574
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1574
- https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95
- https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- 46208
- 46208
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9