ALT-BU-2018-3496-1
Branch c7.1 update bulletin.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-4130
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- http://rhn.redhat.com/errata/RHSA-2013-1260.html
- http://seclists.org/oss-sec/2013/q3/115
- http://www.debian.org/security/2014/dsa-2839
- http://www.ubuntu.com/usn/USN-1926-1
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- http://rhn.redhat.com/errata/RHSA-2013-1260.html
- http://seclists.org/oss-sec/2013/q3/115
- http://www.debian.org/security/2014/dsa-2839
- http://www.ubuntu.com/usn/USN-1926-1
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
Modified: 2025-04-12
CVE-2015-5260
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://security.gentoo.org/glsa/201606-05
Modified: 2025-04-12
CVE-2015-5261
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securitytracker.com/id/1033753
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://security.gentoo.org/glsa/201606-05
Package kernel-image-std-def updated to version 4.4.158-alt0.M70C.1 for branch c7.1 in task 213696.
Closed vulnerabilities
Modified: 2021-03-25
BDU:2018-01144
Уязвимость функции vmacache_flush_all() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2021-03-25
BDU:2019-02508
Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании
Modified: 2021-03-23
BDU:2021-01415
Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-17053
The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- http://www.securityfocus.com/bid/102010
- https://access.redhat.com/errata/RHSA-2018:0676
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- http://www.securityfocus.com/bid/102010
- https://access.redhat.com/errata/RHSA-2018:0676
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Modified: 2024-11-21
CVE-2018-17182
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- http://www.securityfocus.com/bid/105417
- http://www.securityfocus.com/bid/106503
- http://www.securitytracker.com/id/1041748
- https://access.redhat.com/errata/RHSA-2018:3656
- https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://security.netapp.com/advisory/ntap-20190204-0001/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.exploit-db.com/exploits/45497/
- https://www.openwall.com/lists/oss-security/2018/09/18/4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- http://www.securityfocus.com/bid/105417
- http://www.securityfocus.com/bid/106503
- http://www.securitytracker.com/id/1041748
- https://access.redhat.com/errata/RHSA-2018:3656
- https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://security.netapp.com/advisory/ntap-20190204-0001/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.exploit-db.com/exploits/45497/
- https://www.openwall.com/lists/oss-security/2018/09/18/4
Modified: 2024-11-21
CVE-2018-6554
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
- http://www.securityfocus.com/bid/105302
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/stable/msg255030.html
- https://www.spinics.net/lists/stable/msg255034.html
- http://www.securityfocus.com/bid/105302
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/stable/msg255030.html
- https://www.spinics.net/lists/stable/msg255034.html
Modified: 2024-11-21
CVE-2018-6555
The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
- http://www.securityfocus.com/bid/105304
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/stable/msg255031.html
- https://www.spinics.net/lists/stable/msg255035.html
- http://www.securityfocus.com/bid/105304
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3775-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/stable/msg255031.html
- https://www.spinics.net/lists/stable/msg255035.html