ALT-PU-2015-1018-1
Package kernel-image-un-def updated to version 3.18.2-alt1 for branch sisyphus in task 138252.
Closed vulnerabilities
BDU:2015-09846
Уязвимости операционной системы Ubuntu, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-4322
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application.
Modified: 2024-11-21
CVE-2014-8133
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=41bdc78544b8a93a9c6814b8bbbfef966272abbe
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=41bdc78544b8a93a9c6814b8bbbfef966272abbe
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- RHSA-2015:1272
- RHSA-2015:1272
- 62801
- 62801
- DSA-3128
- DSA-3128
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
- [oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
- 71684
- 71684
- USN-2490-1
- USN-2490-1
- USN-2491-1
- USN-2491-1
- USN-2492-1
- USN-2492-1
- USN-2493-1
- USN-2493-1
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1172797
- https://bugzilla.redhat.com/show_bug.cgi?id=1172797
- https://github.com/torvalds/linux/commit/41bdc78544b8a93a9c6814b8bbbfef966272abbe
- https://github.com/torvalds/linux/commit/41bdc78544b8a93a9c6814b8bbbfef966272abbe
Modified: 2024-11-21
CVE-2014-9419
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e
- FEDORA-2015-0517
- FEDORA-2015-0517
- FEDORA-2015-0515
- FEDORA-2015-0515
- SUSE-SU-2015:0529
- SUSE-SU-2015:0529
- openSUSE-SU-2015:0714
- openSUSE-SU-2015:0714
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- RHSA-2015:1081
- RHSA-2015:1081
- DSA-3128
- DSA-3128
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20141225 Re: CVE Request: Linux x86_64 userspace address leak
- [oss-security] 20141225 Re: CVE Request: Linux x86_64 userspace address leak
- 71794
- 71794
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- USN-2541-1
- USN-2541-1
- USN-2542-1
- USN-2542-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1177260
- https://bugzilla.redhat.com/show_bug.cgi?id=1177260
- https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e
- https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e
Modified: 2024-11-21
CVE-2014-9420
The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f54e18f1b831c92f6512d2eedb224cd63d607d3d
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f54e18f1b831c92f6512d2eedb224cd63d607d3d
- FEDORA-2015-0517
- FEDORA-2015-0517
- FEDORA-2015-0515
- FEDORA-2015-0515
- SUSE-SU-2015:0178
- SUSE-SU-2015:0178
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- openSUSE-SU-2015:0714
- openSUSE-SU-2015:0714
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2015:1081
- RHSA-2015:1081
- RHSA-2015:1137
- RHSA-2015:1137
- RHSA-2015:1138
- RHSA-2015:1138
- 62801
- 62801
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
- [oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- USN-2490-1
- USN-2490-1
- USN-2491-1
- USN-2491-1
- USN-2492-1
- USN-2492-1
- USN-2493-1
- USN-2493-1
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1175235
- https://bugzilla.redhat.com/show_bug.cgi?id=1175235
- https://github.com/torvalds/linux/commit/f54e18f1b831c92f6512d2eedb224cd63d607d3d
- https://github.com/torvalds/linux/commit/f54e18f1b831c92f6512d2eedb224cd63d607d3d
- https://source.android.com/security/bulletin/2017-01-01.html
- https://source.android.com/security/bulletin/2017-01-01.html
Modified: 2024-11-21
CVE-2014-9584
The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696
- SUSE-SU-2015:0481
- SUSE-SU-2015:0481
- SUSE-SU-2015:0529
- SUSE-SU-2015:0529
- openSUSE-SU-2015:0566
- openSUSE-SU-2015:0566
- SUSE-SU-2015:0652
- SUSE-SU-2015:0652
- openSUSE-SU-2015:0714
- openSUSE-SU-2015:0714
- SUSE-SU-2015:0736
- SUSE-SU-2015:0736
- SUSE-SU-2015:0812
- SUSE-SU-2015:0812
- RHSA-2015:0864
- RHSA-2015:0864
- RHSA-2015:1137
- RHSA-2015:1137
- RHSA-2015:1138
- RHSA-2015:1138
- DSA-3128
- DSA-3128
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records
- [oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 71883
- 71883
- USN-2511-1
- USN-2511-1
- USN-2512-1
- USN-2512-1
- USN-2513-1
- USN-2513-1
- USN-2514-1
- USN-2514-1
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1180119
- https://bugzilla.redhat.com/show_bug.cgi?id=1180119
- https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696
- https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696
Modified: 2024-11-21
CVE-2014-9683
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=942080643bce061c3dd9d5718d3b745dcb39a8bc
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=942080643bce061c3dd9d5718d3b745dcb39a8bc
- SUSE-SU-2015:1478
- SUSE-SU-2015:1478
- RHSA-2015:1272
- RHSA-2015:1272
- DSA-3170
- DSA-3170
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20150217 Re: CVE request: Linux kernel ecryptfs 1-byte overwrite
- [oss-security] 20150217 Re: CVE request: Linux kernel ecryptfs 1-byte overwrite
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 72643
- 72643
- 1031860
- 1031860
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- USN-2541-1
- USN-2541-1
- USN-2542-1
- USN-2542-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1193830
- https://bugzilla.redhat.com/show_bug.cgi?id=1193830
- https://github.com/torvalds/linux/commit/942080643bce061c3dd9d5718d3b745dcb39a8bc
- https://github.com/torvalds/linux/commit/942080643bce061c3dd9d5718d3b745dcb39a8bc
Modified: 2024-11-21
CVE-2014-9728
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
- SUSE-SU-2015:1224
- SUSE-SU-2015:1224
- SUSE-SU-2015:1324
- SUSE-SU-2015:1324
- openSUSE-SU-2015:1382
- openSUSE-SU-2015:1382
- SUSE-SU-2015:1592
- SUSE-SU-2015:1592
- SUSE-SU-2015:1611
- SUSE-SU-2015:1611
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- 74964
- 74964
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
- https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
- https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
- https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
Modified: 2024-11-21
CVE-2014-9729
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- SUSE-SU-2015:1224
- SUSE-SU-2015:1224
- SUSE-SU-2015:1324
- SUSE-SU-2015:1324
- openSUSE-SU-2015:1382
- openSUSE-SU-2015:1382
- SUSE-SU-2015:1592
- SUSE-SU-2015:1592
- SUSE-SU-2015:1611
- SUSE-SU-2015:1611
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- 74964
- 74964
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
- https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
Modified: 2024-11-21
CVE-2014-9730
The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
- SUSE-SU-2015:1224
- SUSE-SU-2015:1224
- SUSE-SU-2015:1324
- SUSE-SU-2015:1324
- openSUSE-SU-2015:1382
- openSUSE-SU-2015:1382
- SUSE-SU-2015:1592
- SUSE-SU-2015:1592
- SUSE-SU-2015:1611
- SUSE-SU-2015:1611
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- [oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
- 74964
- 74964
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://bugzilla.redhat.com/show_bug.cgi?id=1228229
- https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
- https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
Modified: 2024-11-21
CVE-2014-9731
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
- SUSE-SU-2015:1224
- SUSE-SU-2015:1224
- SUSE-SU-2015:1324
- SUSE-SU-2015:1324
- openSUSE-SU-2015:1382
- openSUSE-SU-2015:1382
- SUSE-SU-2015:1592
- SUSE-SU-2015:1592
- SUSE-SU-2015:1611
- SUSE-SU-2015:1611
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- [oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
- [oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
- 75001
- 75001
- https://bugzilla.redhat.com/show_bug.cgi?id=1228220
- https://bugzilla.redhat.com/show_bug.cgi?id=1228220
- https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
- https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
- https://source.android.com/security/bulletin/2017-07-01
- https://source.android.com/security/bulletin/2017-07-01