ALT-BU-2018-3496-1
Branch c7.1 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-4130
The (1) red_channel_pipes_add_type and (2) red_channel_pipes_add_empty_msg functions in server/red_channel.c in SPICE before 0.12.4 do not properly perform ring loops, which might allow remote attackers to cause a denial of service (reachable assertion and server exit) by triggering a network error.
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- http://cgit.freedesktop.org/spice/spice/commit/?id=53488f0275d6c8a121af49f7ac817d09ce68090d
- RHSA-2013:1260
- RHSA-2013:1260
- [oss-security] 20130715 Re: CVE Request -- spice: unsafe clients ring access abort
- [oss-security] 20130715 Re: CVE Request -- spice: unsafe clients ring access abort
- DSA-2839
- DSA-2839
- USN-1926-1
- USN-1926-1
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
- https://bugzilla.redhat.com/show_bug.cgi?id=984769
Modified: 2024-11-21
CVE-2015-5260
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
- [Spice-devel] 20151006 Announcing spice 0.12.6
- [Spice-devel] 20151006 Announcing spice 0.12.6
- RHSA-2015:1889
- RHSA-2015:1889
- RHSA-2015:1890
- RHSA-2015:1890
- DSA-3371
- DSA-3371
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77019
- 77019
- 1033753
- 1033753
- USN-2766-1
- USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- GLSA-201606-05
- GLSA-201606-05
Modified: 2024-11-21
CVE-2015-5261
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
- [Spice-devel] 20151006 Announcing spice 0.12.6
- [Spice-devel] 20151006 Announcing spice 0.12.6
- RHSA-2015:1889
- RHSA-2015:1889
- RHSA-2015:1890
- RHSA-2015:1890
- DSA-3371
- DSA-3371
- [oss-security] 20151006 Fwd: [vs-plain] CVE-2015-5261
- [oss-security] 20151006 Fwd: [vs-plain] CVE-2015-5261
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 1033753
- 1033753
- USN-2766-1
- USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- GLSA-201606-05
- GLSA-201606-05
Package kernel-image-std-def updated to version 4.4.158-alt0.M70C.1 for branch c7.1 in task 213696.
Closed vulnerabilities
BDU:2018-01144
Уязвимость функции vmacache_flush_all() ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2019-02508
Уязвимость функции irda_setsockopt ядра операционной системы Linux, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2021-01415
Уязвимость драйвера drivers/staging/irda/net/af_irda.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-17053
The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- 102010
- 102010
- RHSA-2018:0676
- RHSA-2018:0676
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Modified: 2024-11-21
CVE-2018-17182
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- 105417
- 105417
- 106503
- 106503
- 1041748
- 1041748
- RHSA-2018:3656
- RHSA-2018:3656
- https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://security.netapp.com/advisory/ntap-20190204-0001/
- https://security.netapp.com/advisory/ntap-20190204-0001/
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- 45497
- 45497
- https://www.openwall.com/lists/oss-security/2018/09/18/4
- https://www.openwall.com/lists/oss-security/2018/09/18/4
Modified: 2024-11-21
CVE-2018-6554
Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
- 105302
- 105302
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
- [stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
Modified: 2024-11-21
CVE-2018-6555
The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
- 105304
- 105304
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3775-1
- USN-3775-1
- USN-3775-2
- USN-3775-2
- USN-3776-1
- USN-3776-1
- USN-3776-2
- USN-3776-2
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- USN-3777-3
- USN-3777-3
- DSA-4308
- DSA-4308
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
- [stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt