ALT-PU-2016-1137-1
Package kernel-image-un-def updated to version 4.4.2-alt1 for branch sisyphus in task 159699.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- FEDORA-2016-26e19f042a
- FEDORA-2016-26e19f042a
- FEDORA-2016-b59fd603be
- FEDORA-2016-b59fd603be
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1707
- SUSE-SU-2016:1707
- SUSE-SU-2016:1764
- SUSE-SU-2016:1764
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- DSA-3448
- DSA-3448
- DSA-3503
- DSA-3503
- 20160309 OS-S 2016-09 Linux visor clie_5_attach Nullpointer Dereference CVE-2015-7566
- 20160309 OS-S 2016-09 Linux visor clie_5_attach Nullpointer Dereference CVE-2015-7566
- 82975
- 82975
- USN-2929-1
- USN-2929-1
- USN-2929-2
- USN-2929-2
- USN-2930-1
- USN-2930-1
- USN-2930-2
- USN-2930-2
- USN-2930-3
- USN-2930-3
- USN-2932-1
- USN-2932-1
- USN-2948-1
- USN-2948-1
- USN-2948-2
- USN-2948-2
- USN-2967-1
- USN-2967-1
- USN-2967-2
- USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1283371
- https://bugzilla.redhat.com/show_bug.cgi?id=1283371
- https://bugzilla.redhat.com/show_bug.cgi?id=1296466
- https://bugzilla.redhat.com/show_bug.cgi?id=1296466
- https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
- https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
- https://security-tracker.debian.org/tracker/CVE-2015-7566
- https://security-tracker.debian.org/tracker/CVE-2015-7566
- 39540
- 39540
Modified: 2024-11-21
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- openSUSE-SU-2016:1008
- openSUSE-SU-2016:1008
- SUSE-SU-2016:1019
- SUSE-SU-2016:1019
- SUSE-SU-2016:1031
- SUSE-SU-2016:1031
- SUSE-SU-2016:1032
- SUSE-SU-2016:1032
- SUSE-SU-2016:1033
- SUSE-SU-2016:1033
- SUSE-SU-2016:1034
- SUSE-SU-2016:1034
- SUSE-SU-2016:1035
- SUSE-SU-2016:1035
- SUSE-SU-2016:1037
- SUSE-SU-2016:1037
- SUSE-SU-2016:1038
- SUSE-SU-2016:1038
- SUSE-SU-2016:1039
- SUSE-SU-2016:1039
- SUSE-SU-2016:1040
- SUSE-SU-2016:1040
- SUSE-SU-2016:1041
- SUSE-SU-2016:1041
- SUSE-SU-2016:1045
- SUSE-SU-2016:1045
- SUSE-SU-2016:1046
- SUSE-SU-2016:1046
- SUSE-SU-2016:1764
- SUSE-SU-2016:1764
- [linux-kernel] 20160106 Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
- [linux-kernel] 20160106 Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
- [linux-kernel] 20160106 Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
- [linux-kernel] 20160106 Re: [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
- DSA-3434
- DSA-3434
- [oss-security] 20151217 CVE Request: Linux kernel: privilege escalation in user namespaces
- [oss-security] 20151217 CVE Request: Linux kernel: privilege escalation in user namespaces
- [oss-security] 20151231 Re: CVE Request: Linux kernel: privilege escalation in user namespaces
- [oss-security] 20151231 Re: CVE Request: Linux kernel: privilege escalation in user namespaces
- 79899
- 79899
- 1034899
- 1034899
- https://bugzilla.redhat.com/show_bug.cgi?id=1295287
- https://bugzilla.redhat.com/show_bug.cgi?id=1295287
- [linux-kernel] 20151226 [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
- [linux-kernel] 20151226 [PATCH] ptrace: being capable wrt a process requires mapped uids/gids
Modified: 2024-11-21
CVE-2015-8970
crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd504589577d8e8e70f51f997ad487a4cb6c026f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd504589577d8e8e70f51f997ad487a4cb6c026f
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2
- [oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref
- [oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref
- 94217
- 94217
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- RHSA-2017:2437
- RHSA-2017:2437
- RHSA-2017:2444
- RHSA-2017:2444
- https://bugzilla.redhat.com/show_bug.cgi?id=1386286
- https://bugzilla.redhat.com/show_bug.cgi?id=1386286
- https://github.com/torvalds/linux/commit/dd504589577d8e8e70f51f997ad487a4cb6c026f
- https://github.com/torvalds/linux/commit/dd504589577d8e8e70f51f997ad487a4cb6c026f
- https://groups.google.com/forum/#%21msg/syzkaller/frb2XrB5aWk/xCXzkIBcDAAJ
- https://groups.google.com/forum/#%21msg/syzkaller/frb2XrB5aWk/xCXzkIBcDAAJ
Modified: 2024-11-21
CVE-2016-0723
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
- FEDORA-2016-2f25d12c51
- FEDORA-2016-2f25d12c51
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- SUSE-SU-2016:0911
- SUSE-SU-2016:0911
- openSUSE-SU-2016:1008
- openSUSE-SU-2016:1008
- SUSE-SU-2016:1102
- SUSE-SU-2016:1102
- SUSE-SU-2016:1764
- SUSE-SU-2016:1764
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- DSA-3448
- DSA-3448
- DSA-3503
- DSA-3503
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 82950
- 82950
- 1035695
- 1035695
- USN-2929-1
- USN-2929-1
- USN-2929-2
- USN-2929-2
- USN-2930-1
- USN-2930-1
- USN-2930-2
- USN-2930-2
- USN-2930-3
- USN-2930-3
- USN-2932-1
- USN-2932-1
- USN-2948-1
- USN-2948-1
- USN-2948-2
- USN-2948-2
- USN-2967-1
- USN-2967-1
- USN-2967-2
- USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1296253
- https://bugzilla.redhat.com/show_bug.cgi?id=1296253
- https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
- https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
- https://security-tracker.debian.org/tracker/CVE-2016-0723
- https://security-tracker.debian.org/tracker/CVE-2016-0723
- https://support.f5.com/csp/article/K43650115
- https://support.f5.com/csp/article/K43650115