ALT-PU-2016-1862-1
Package kernel-image-un-def updated to version 4.7.1-alt1 for branch sisyphus in task 168588.
Closed vulnerabilities
BDU:2016-01985
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-01998
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-02006
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
Modified: 2024-11-21
CVE-2014-9892
The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- 92222
- 92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
Modified: 2024-11-21
CVE-2014-9900
The ethtool_get_wol function in net/core/ethtool.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not initialize a certain data structure, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28803952 and Qualcomm internal bug CR570754.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- 92222
- 92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
Modified: 2024-11-21
CVE-2015-8944
The ioresources_init function in kernel/resource.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 6 and 7 (2013) devices, uses weak permissions for /proc/iomem, which allows local users to obtain sensitive information by reading this file, aka Android internal bug 28814213 and Qualcomm internal bug CR786116. NOTE: the permissions may be intentional in most non-Android contexts.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- [kernel-hardening] 20160406 Re: [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
- [kernel-hardening] 20160406 Re: [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file
- 92222
- 92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=e758417e7c31b975c862aa55d0ceef28f3cc9104
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=e758417e7c31b975c862aa55d0ceef28f3cc9104
Modified: 2024-11-21
CVE-2016-4440
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- [oss-security] 20160520 CVE-2016-4440 Kernel: kvm: vmx: incorrect state update leading to MSR access
- [oss-security] 20160520 CVE-2016-4440 Kernel: kvm: vmx: incorrect state update leading to MSR access
- https://bugzilla.redhat.com/show_bug.cgi?id=1337806
- https://bugzilla.redhat.com/show_bug.cgi?id=1337806
- https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
Modified: 2024-11-21
CVE-2016-5412
arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=93d17397e4e2182fdaad503e2f9da46202c0f1c3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=93d17397e4e2182fdaad503e2f9da46202c0f1c3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f024ee098476a3e620232e4a78cfac505f121245
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f024ee098476a3e620232e4a78cfac505f121245
- RHSA-2016:2574
- RHSA-2016:2574
- [oss-security] 20160728 CVE-2016-5412 Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode
- [oss-security] 20160728 CVE-2016-5412 Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode
- https://bugzilla.redhat.com/show_bug.cgi?id=1349916
- https://bugzilla.redhat.com/show_bug.cgi?id=1349916
- https://github.com/torvalds/linux/commit/93d17397e4e2182fdaad503e2f9da46202c0f1c3
- https://github.com/torvalds/linux/commit/93d17397e4e2182fdaad503e2f9da46202c0f1c3
- https://github.com/torvalds/linux/commit/f024ee098476a3e620232e4a78cfac505f121245
- https://github.com/torvalds/linux/commit/f024ee098476a3e620232e4a78cfac505f121245
Modified: 2024-11-21
CVE-2016-6136
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- RHSA-2017:0307
- RHSA-2017:0307
- 20160704 [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c
- 20160704 [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c
- 91558
- 91558
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://source.android.com/security/bulletin/2016-11-01.html
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2024-11-21
CVE-2016-6480
Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
- SUSE-SU-2016:2174
- SUSE-SU-2016:2174
- SUSE-SU-2016:2175
- SUSE-SU-2016:2175
- SUSE-SU-2016:2177
- SUSE-SU-2016:2177
- SUSE-SU-2016:2178
- SUSE-SU-2016:2178
- SUSE-SU-2016:2179
- SUSE-SU-2016:2179
- SUSE-SU-2016:2180
- SUSE-SU-2016:2180
- SUSE-SU-2016:2181
- SUSE-SU-2016:2181
- SUSE-SU-2016:2230
- SUSE-SU-2016:2230
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- RHSA-2017:0817
- RHSA-2017:0817
- 20160801 [CVE-2016-6480] Double-Fetch Vulnerability in Linux-4.5/drivers/scsi/aacraid/commctrl.c
- 20160801 [CVE-2016-6480] Double-Fetch Vulnerability in Linux-4.5/drivers/scsi/aacraid/commctrl.c
- 92214
- 92214
- https://bugzilla.redhat.com/show_bug.cgi?id=1362466
- https://bugzilla.redhat.com/show_bug.cgi?id=1362466
Modified: 2024-11-21
CVE-2016-6516
Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a "double fetch" vulnerability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10eec60ce79187686e052092e5383c99b4420a20
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10eec60ce79187686e052092e5383c99b4420a20
- [oss-security] 20160731 CVE Request: Linux <= 4.5 double fetch leading to heap overflow
- [oss-security] 20160731 CVE Request: Linux <= 4.5 double fetch leading to heap overflow
- 92259
- 92259
- https://bugzilla.redhat.com/show_bug.cgi?id=1362457
- https://bugzilla.redhat.com/show_bug.cgi?id=1362457
- https://github.com/torvalds/linux/commit/10eec60ce79187686e052092e5383c99b4420a20
- https://github.com/torvalds/linux/commit/10eec60ce79187686e052092e5383c99b4420a20
Modified: 2024-11-21
CVE-2016-9794
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- openSUSE-SU-2016:3118
- openSUSE-SU-2016:3118
- SUSE-SU-2016:3146
- SUSE-SU-2016:3146
- SUSE-SU-2016:3188
- SUSE-SU-2016:3188
- SUSE-SU-2016:3203
- SUSE-SU-2016:3203
- SUSE-SU-2016:3217
- SUSE-SU-2016:3217
- SUSE-SU-2016:3248
- SUSE-SU-2016:3248
- SUSE-SU-2016:3252
- SUSE-SU-2016:3252
- RHSA-2016:2574
- RHSA-2016:2574
- [oss-security] 20161203 CVE request: -- Linux kernel: ALSA: use-after-free in,kill_fasync
- [oss-security] 20161203 CVE request: -- Linux kernel: ALSA: use-after-free in,kill_fasync
- 94654
- 94654
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://patchwork.kernel.org/patch/8752621/
- https://patchwork.kernel.org/patch/8752621/
- https://source.android.com/security/bulletin/2017-05-01
- https://source.android.com/security/bulletin/2017-05-01
Modified: 2024-11-21
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=251e22abde21833b3d29577e4d8c7aaccd650eee
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=251e22abde21833b3d29577e4d8c7aaccd650eee
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
- https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
- https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- USN-3848-1
- USN-3848-1
- USN-3848-2
- USN-3848-2
Modified: 2024-11-21
CVE-2017-7273
The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- 97190
- 97190
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110