ALT-PU-2017-1013-1
Package kernel-image-un-def updated to version 4.8.16-alt0.M80P.1 for branch p8 in task 175879.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-6213
fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d29216842a85c7970c536108e093963f02714498
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d29216842a85c7970c536108e093963f02714498
- [oss-security] 20160713 Re: cve request: local DoS by overflowing kernel mount table using shared bind mount
- [oss-security] 20160713 Re: cve request: local DoS by overflowing kernel mount table using shared bind mount
- 91754
- 91754
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1356471
- https://bugzilla.redhat.com/show_bug.cgi?id=1356471
- https://github.com/torvalds/linux/commit/d29216842a85c7970c536108e093963f02714498
- https://github.com/torvalds/linux/commit/d29216842a85c7970c536108e093963f02714498
Modified: 2024-11-21
CVE-2016-9755
The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- [oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6
- [oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6
- 94626
- 94626
- https://bugzilla.redhat.com/show_bug.cgi?id=1400904
- https://bugzilla.redhat.com/show_bug.cgi?id=1400904
- https://github.com/torvalds/linux/commit/9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- https://github.com/torvalds/linux/commit/9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- https://groups.google.com/forum/#%21topic/syzkaller/GFbGpX7nTEo
- https://groups.google.com/forum/#%21topic/syzkaller/GFbGpX7nTEo
- [netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error
- [netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error