ALT-PU-2016-1352-1
Package kernel-image-un-def updated to version 4.5.2-alt1 for branch sisyphus in task 163508.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-3156
The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2
- SUSE-SU-2016:1019
- SUSE-SU-2016:1019
- openSUSE-SU-2016:1382
- openSUSE-SU-2016:1382
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1707
- SUSE-SU-2016:1707
- SUSE-SU-2016:1764
- SUSE-SU-2016:1764
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- DSA-3607
- DSA-3607
- [oss-security] 20160315 CVE request: ipv4: Don't do expensive useless work during inetdev destroy
- [oss-security] 20160315 CVE request: ipv4: Don't do expensive useless work during inetdev destroy
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 84428
- 84428
- USN-2968-1
- USN-2968-1
- USN-2968-2
- USN-2968-2
- USN-2969-1
- USN-2969-1
- USN-2970-1
- USN-2970-1
- USN-2971-1
- USN-2971-1
- USN-2971-2
- USN-2971-2
- USN-2971-3
- USN-2971-3
- USN-2996-1
- USN-2996-1
- USN-2997-1
- USN-2997-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1318172
- https://bugzilla.redhat.com/show_bug.cgi?id=1318172
- https://github.com/torvalds/linux/commit/fbd40ea0180a2d328c5adc61414dc8bab9335ce2
- https://github.com/torvalds/linux/commit/fbd40ea0180a2d328c5adc61414dc8bab9335ce2
Modified: 2024-11-21
CVE-2016-4805
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1937
- SUSE-SU-2016:1937
- SUSE-SU-2016:1985
- SUSE-SU-2016:1985
- SUSE-SU-2016:2105
- SUSE-SU-2016:2105
- openSUSE-SU-2016:2184
- openSUSE-SU-2016:2184
- DSA-3607
- DSA-3607
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
- [oss-security] 20160515 Re: CVE Requests: Linux: use-after-free issue for ppp channel
- [oss-security] 20160515 Re: CVE Requests: Linux: use-after-free issue for ppp channel
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 90605
- 90605
- 1036763
- 1036763
- USN-3021-1
- USN-3021-1
- USN-3021-2
- USN-3021-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1335803
- https://bugzilla.redhat.com/show_bug.cgi?id=1335803
- https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
- https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
Modified: 2024-11-21
CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d
- RHSA-2016:2962
- RHSA-2016:2962
- RHSA-2017:0031
- RHSA-2017:0031
- RHSA-2017:0036
- RHSA-2017:0036
- RHSA-2017:0065
- RHSA-2017:0065
- RHSA-2017:0086
- RHSA-2017:0086
- RHSA-2017:0091
- RHSA-2017:0091
- RHSA-2017:0113
- RHSA-2017:0113
- RHSA-2017:0196
- RHSA-2017:0196
- RHSA-2017:0215
- RHSA-2017:0215
- RHSA-2017:0216
- RHSA-2017:0216
- RHSA-2017:0217
- RHSA-2017:0217
- RHSA-2017:0270
- RHSA-2017:0270
- http://source.android.com/security/bulletin/2016-10-01.html
- http://source.android.com/security/bulletin/2016-10-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
- 93304
- 93304
- https://bugzilla.novell.com/show_bug.cgi?id=1003077
- https://bugzilla.novell.com/show_bug.cgi?id=1003077
- https://bugzilla.redhat.com/show_bug.cgi?id=1382268
- https://bugzilla.redhat.com/show_bug.cgi?id=1382268
- https://github.com/torvalds/linux/commit/34b88a68f26a75e4fded796f1a49c40f82234b7d
- https://github.com/torvalds/linux/commit/34b88a68f26a75e4fded796f1a49c40f82234b7d
- https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7117.html
- https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7117.html
- https://security-tracker.debian.org/tracker/CVE-2016-7117
- https://security-tracker.debian.org/tracker/CVE-2016-7117