ALT-PU-2015-1924-1
Package kernel-image-un-def updated to version 4.2.4-alt1 for branch sisyphus in task 152011.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-12106
Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-12123
Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2013-7445
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.
Modified: 2025-04-12
CVE-2015-2925
The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=397d425dc26da728396e66d392d5dcb8dac30c37
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cde93be45a8a90d8c264c776fab63487b5038a65
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://permalink.gmane.org/gmane.linux.kernel.containers/29173
- http://permalink.gmane.org/gmane.linux.kernel.containers/29177
- http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f22&id=520b64102de2f184036024b2a53de2b67463bd78
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2016-0068.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
- http://www.openwall.com/lists/oss-security/2015/04/04/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73926
- http://www.ubuntu.com/usn/USN-2792-1
- http://www.ubuntu.com/usn/USN-2794-1
- http://www.ubuntu.com/usn/USN-2795-1
- http://www.ubuntu.com/usn/USN-2798-1
- http://www.ubuntu.com/usn/USN-2799-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1209367
- https://bugzilla.redhat.com/show_bug.cgi?id=1209373
- https://github.com/torvalds/linux/commit/397d425dc26da728396e66d392d5dcb8dac30c37
- https://github.com/torvalds/linux/commit/cde93be45a8a90d8c264c776fab63487b5038a65
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=397d425dc26da728396e66d392d5dcb8dac30c37
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cde93be45a8a90d8c264c776fab63487b5038a65
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://permalink.gmane.org/gmane.linux.kernel.containers/29173
- http://permalink.gmane.org/gmane.linux.kernel.containers/29177
- http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?h=f22&id=520b64102de2f184036024b2a53de2b67463bd78
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2016-0068.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
- http://www.openwall.com/lists/oss-security/2015/04/04/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73926
- http://www.ubuntu.com/usn/USN-2792-1
- http://www.ubuntu.com/usn/USN-2794-1
- http://www.ubuntu.com/usn/USN-2795-1
- http://www.ubuntu.com/usn/USN-2798-1
- http://www.ubuntu.com/usn/USN-2799-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1209367
- https://bugzilla.redhat.com/show_bug.cgi?id=1209373
- https://github.com/torvalds/linux/commit/397d425dc26da728396e66d392d5dcb8dac30c37
- https://github.com/torvalds/linux/commit/cde93be45a8a90d8c264c776fab63487b5038a65
Modified: 2025-04-12
CVE-2015-5257
drivers/usb/serial/whiteheat.c in the Linux kernel before 4.2.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted USB device. NOTE: this ID was incorrectly used for an Apache Cordova issue that has the correct ID of CVE-2015-8320.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
- http://www.openwall.com/lists/oss-security/2015/09/23/1
- http://www.securityfocus.com/bid/76834
- http://www.ubuntu.com/usn/USN-2792-1
- http://www.ubuntu.com/usn/USN-2794-1
- http://www.ubuntu.com/usn/USN-2795-1
- http://www.ubuntu.com/usn/USN-2798-1
- http://www.ubuntu.com/usn/USN-2799-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1265607
- https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4
- http://www.debian.org/security/2015/dsa-3372
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
- http://www.openwall.com/lists/oss-security/2015/09/23/1
- http://www.securityfocus.com/bid/76834
- http://www.ubuntu.com/usn/USN-2792-1
- http://www.ubuntu.com/usn/USN-2794-1
- http://www.ubuntu.com/usn/USN-2795-1
- http://www.ubuntu.com/usn/USN-2798-1
- http://www.ubuntu.com/usn/USN-2799-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1265607
- https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4
Modified: 2025-04-12
CVE-2015-5307
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2015-2645.html
- http://rhn.redhat.com/errata/RHSA-2016-0046.html
- http://support.citrix.com/article/CTX202583
- http://www.debian.org/security/2015/dsa-3396
- http://www.debian.org/security/2015/dsa-3414
- http://www.debian.org/security/2016/dsa-3454
- http://www.openwall.com/lists/oss-security/2015/11/10/6
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/77528
- http://www.securitytracker.com/id/1034105
- http://www.ubuntu.com/usn/USN-2800-1
- http://www.ubuntu.com/usn/USN-2801-1
- http://www.ubuntu.com/usn/USN-2802-1
- http://www.ubuntu.com/usn/USN-2803-1
- http://www.ubuntu.com/usn/USN-2804-1
- http://www.ubuntu.com/usn/USN-2805-1
- http://www.ubuntu.com/usn/USN-2806-1
- http://www.ubuntu.com/usn/USN-2807-1
- http://xenbits.xen.org/xsa/advisory-156.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1277172
- https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed
- https://kb.juniper.net/JSA10783
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2015-2645.html
- http://rhn.redhat.com/errata/RHSA-2016-0046.html
- http://support.citrix.com/article/CTX202583
- http://www.debian.org/security/2015/dsa-3396
- http://www.debian.org/security/2015/dsa-3414
- http://www.debian.org/security/2016/dsa-3454
- http://www.openwall.com/lists/oss-security/2015/11/10/6
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/77528
- http://www.securitytracker.com/id/1034105
- http://www.ubuntu.com/usn/USN-2800-1
- http://www.ubuntu.com/usn/USN-2801-1
- http://www.ubuntu.com/usn/USN-2802-1
- http://www.ubuntu.com/usn/USN-2803-1
- http://www.ubuntu.com/usn/USN-2804-1
- http://www.ubuntu.com/usn/USN-2805-1
- http://www.ubuntu.com/usn/USN-2806-1
- http://www.ubuntu.com/usn/USN-2807-1
- http://xenbits.xen.org/xsa/advisory-156.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1277172
- https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed
- https://kb.juniper.net/JSA10783
Modified: 2025-04-12
CVE-2015-6937
The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.openwall.com/lists/oss-security/2015/09/14/3
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76767
- http://www.securitytracker.com/id/1034453
- http://www.ubuntu.com/usn/USN-2773-1
- http://www.ubuntu.com/usn/USN-2774-1
- http://www.ubuntu.com/usn/USN-2777-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1263139
- https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=74e98eb085889b0d2d4908f59f6e00026063014f
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168447.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168539.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167358.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3364
- http://www.openwall.com/lists/oss-security/2015/09/14/3
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76767
- http://www.securitytracker.com/id/1034453
- http://www.ubuntu.com/usn/USN-2773-1
- http://www.ubuntu.com/usn/USN-2774-1
- http://www.ubuntu.com/usn/USN-2777-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1263139
- https://github.com/torvalds/linux/commit/74e98eb085889b0d2d4908f59f6e00026063014f
Modified: 2025-04-12
CVE-2015-7613
Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://www.debian.org/security/2015/dsa-3372
- http://www.openwall.com/lists/oss-security/2015/10/01/8
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76977
- http://www.securitytracker.com/id/1034094
- http://www.securitytracker.com/id/1034592
- http://www.ubuntu.com/usn/USN-2761-1
- http://www.ubuntu.com/usn/USN-2762-1
- http://www.ubuntu.com/usn/USN-2763-1
- http://www.ubuntu.com/usn/USN-2764-1
- http://www.ubuntu.com/usn/USN-2765-1
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1268270
- https://github.com/torvalds/linux/commit/b9a532277938798b53178d5a66af6e2915cb27cf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10146
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a532277938798b53178d5a66af6e2915cb27cf
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://www.debian.org/security/2015/dsa-3372
- http://www.openwall.com/lists/oss-security/2015/10/01/8
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76977
- http://www.securitytracker.com/id/1034094
- http://www.securitytracker.com/id/1034592
- http://www.ubuntu.com/usn/USN-2761-1
- http://www.ubuntu.com/usn/USN-2762-1
- http://www.ubuntu.com/usn/USN-2763-1
- http://www.ubuntu.com/usn/USN-2764-1
- http://www.ubuntu.com/usn/USN-2765-1
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1268270
- https://github.com/torvalds/linux/commit/b9a532277938798b53178d5a66af6e2915cb27cf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10146
Modified: 2025-04-23
CVE-2015-8104
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2015-2645.html
- http://rhn.redhat.com/errata/RHSA-2016-0046.html
- http://support.citrix.com/article/CTX202583
- http://support.citrix.com/article/CTX203879
- http://www.debian.org/security/2015/dsa-3414
- http://www.debian.org/security/2015/dsa-3426
- http://www.debian.org/security/2016/dsa-3454
- http://www.openwall.com/lists/oss-security/2015/11/10/5
- http://www.openwall.com/lists/oss-security/2023/10/10/4
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/77524
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034105
- http://www.ubuntu.com/usn/USN-2840-1
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2844-1
- http://xenbits.xen.org/xsa/advisory-156.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1278496
- https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
- https://kb.juniper.net/JSA10783
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2015-2636.html
- http://rhn.redhat.com/errata/RHSA-2015-2645.html
- http://rhn.redhat.com/errata/RHSA-2016-0046.html
- http://support.citrix.com/article/CTX202583
- http://support.citrix.com/article/CTX203879
- http://www.debian.org/security/2015/dsa-3414
- http://www.debian.org/security/2015/dsa-3426
- http://www.debian.org/security/2016/dsa-3454
- http://www.openwall.com/lists/oss-security/2015/11/10/5
- http://www.openwall.com/lists/oss-security/2023/10/10/4
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/77524
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034105
- http://www.ubuntu.com/usn/USN-2840-1
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2844-1
- http://xenbits.xen.org/xsa/advisory-156.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1278496
- https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
- https://kb.juniper.net/JSA10783