ALT-PU-2016-1878-1
Package kernel-image-un-def updated to version 4.7.2-alt0.M80P.1 for branch p8 in task 168775.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-01985
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
Modified: 2021-03-25
BDU:2016-01998
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
Modified: 2021-03-23
BDU:2016-02006
Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию
Modified: 2025-04-12
CVE-2014-9892
The snd_compr_tstamp function in sound/core/compress_offload.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not properly initialize a timestamp data structure, which allows attackers to obtain sensitive information via a crafted application, aka Android internal bug 28770164 and Qualcomm internal bug CR568717.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
Modified: 2025-04-12
CVE-2014-9900
The ethtool_get_wol function in net/core/ethtool.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices, does not initialize a certain data structure, which allows local users to obtain sensitive information via a crafted application, aka Android internal bug 28803952 and Qualcomm internal bug CR570754.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
Modified: 2025-04-12
CVE-2015-8944
The ioresources_init function in kernel/resource.c in the Linux kernel through 4.7, as used in Android before 2016-08-05 on Nexus 6 and 7 (2013) devices, uses weak permissions for /proc/iomem, which allows local users to obtain sensitive information by reading this file, aka Android internal bug 28814213 and Qualcomm internal bug CR786116. NOTE: the permissions may be intentional in most non-Android contexts.
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.openwall.com/lists/kernel-hardening/2016/04/06/22
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=e758417e7c31b975c862aa55d0ceef28f3cc9104
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.openwall.com/lists/kernel-hardening/2016/04/06/22
- http://www.securityfocus.com/bid/92222
- https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=e758417e7c31b975c862aa55d0ceef28f3cc9104
Modified: 2025-04-12
CVE-2016-4440
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- http://www.openwall.com/lists/oss-security/2016/05/20/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337806
- https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
- http://www.openwall.com/lists/oss-security/2016/05/20/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1337806
- https://github.com/torvalds/linux/commit/3ce424e45411cf5a13105e0386b6ecf6eeb4f66f
Modified: 2025-04-12
CVE-2016-5412
arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=93d17397e4e2182fdaad503e2f9da46202c0f1c3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f024ee098476a3e620232e4a78cfac505f121245
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/07/28/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1349916
- https://github.com/torvalds/linux/commit/93d17397e4e2182fdaad503e2f9da46202c0f1c3
- https://github.com/torvalds/linux/commit/f024ee098476a3e620232e4a78cfac505f121245
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=93d17397e4e2182fdaad503e2f9da46202c0f1c3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f024ee098476a3e620232e4a78cfac505f121245
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/07/28/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1349916
- https://github.com/torvalds/linux/commit/93d17397e4e2182fdaad503e2f9da46202c0f1c3
- https://github.com/torvalds/linux/commit/f024ee098476a3e620232e4a78cfac505f121245
Modified: 2025-04-12
CVE-2016-6136
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.securityfocus.com/archive/1/538835/30/0/threaded
- http://www.securityfocus.com/bid/91558
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://source.android.com/security/bulletin/2016-11-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.securityfocus.com/archive/1/538835/30/0/threaded
- http://www.securityfocus.com/bid/91558
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2025-04-12
CVE-2016-6480
Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.securityfocus.com/archive/1/539074/30/0/threaded
- http://www.securityfocus.com/bid/92214
- https://bugzilla.redhat.com/show_bug.cgi?id=1362466
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.securityfocus.com/archive/1/539074/30/0/threaded
- http://www.securityfocus.com/bid/92214
- https://bugzilla.redhat.com/show_bug.cgi?id=1362466
Modified: 2025-04-12
CVE-2016-6516
Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a "double fetch" vulnerability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10eec60ce79187686e052092e5383c99b4420a20
- http://www.openwall.com/lists/oss-security/2016/07/31/6
- http://www.securityfocus.com/bid/92259
- https://bugzilla.redhat.com/show_bug.cgi?id=1362457
- https://github.com/torvalds/linux/commit/10eec60ce79187686e052092e5383c99b4420a20
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10eec60ce79187686e052092e5383c99b4420a20
- http://www.openwall.com/lists/oss-security/2016/07/31/6
- http://www.securityfocus.com/bid/92259
- https://bugzilla.redhat.com/show_bug.cgi?id=1362457
- https://github.com/torvalds/linux/commit/10eec60ce79187686e052092e5383c99b4420a20
Modified: 2025-04-12
CVE-2016-9794
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/12/03/2
- http://www.securityfocus.com/bid/94654
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://patchwork.kernel.org/patch/8752621/
- https://source.android.com/security/bulletin/2017-05-01
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/12/03/2
- http://www.securityfocus.com/bid/94654
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://patchwork.kernel.org/patch/8752621/
- https://source.android.com/security/bulletin/2017-05-01
Modified: 2024-11-21
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=251e22abde21833b3d29577e4d8c7aaccd650eee
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
- https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://usn.ubuntu.com/3848-1/
- https://usn.ubuntu.com/3848-2/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=251e22abde21833b3d29577e4d8c7aaccd650eee
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
- https://github.com/torvalds/linux/commit/8dca4a41f1ad65043a78c2338d9725f859c8d2c3
- https://usn.ubuntu.com/3848-1/
- https://usn.ubuntu.com/3848-2/
Modified: 2025-04-20
CVE-2017-7273
The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- http://www.securityfocus.com/bid/97190
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
- http://www.securityfocus.com/bid/97190
- https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110