ALT-PU-2017-1050-1
Package kernel-image-un-def updated to version 4.9.3-alt1 for branch sisyphus in task 176490.
Closed vulnerabilities
BDU:2016-02350
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10741
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598
- 106822
- 106822
- https://bugzilla.suse.com/show_bug.cgi?id=1124010
- https://bugzilla.suse.com/show_bug.cgi?id=1124010
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.3
- https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
- https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
Modified: 2024-11-21
CVE-2016-9083
drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05692d7005a364add85c6e25a6c4447ce08f913a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05692d7005a364add85c6e25a6c4447ce08f913a
- RHSA-2017:0386
- RHSA-2017:0386
- RHSA-2017:0387
- RHSA-2017:0387
- [oss-security] 20161027 kernel: low-severity vfio driver integer overflow
- [oss-security] 20161027 kernel: low-severity vfio driver integer overflow
- 93929
- 93929
- https://bugzilla.redhat.com/show_bug.cgi?id=1389258
- https://bugzilla.redhat.com/show_bug.cgi?id=1389258
- https://github.com/torvalds/linux/commit/05692d7005a364add85c6e25a6c4447ce08f913a
- https://github.com/torvalds/linux/commit/05692d7005a364add85c6e25a6c4447ce08f913a
- https://patchwork.kernel.org/patch/9373631/
- https://patchwork.kernel.org/patch/9373631/
Modified: 2024-11-21
CVE-2016-9588
arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef85b67385436ddc1998f45f1d6a210f935b3388
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef85b67385436ddc1998f45f1d6a210f935b3388
- DSA-3804
- DSA-3804
- [oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
- [oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
- 94933
- 94933
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1404924
- https://bugzilla.redhat.com/show_bug.cgi?id=1404924
- https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
- https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
- USN-3822-1
- USN-3822-1
- USN-3822-2
- USN-3822-2
Modified: 2024-11-21
CVE-2016-9919
The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- [oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
- [oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
- 94824
- 94824
- https://github.com/torvalds/linux/commit/79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2
- https://github.com/torvalds/linux/commit/79dc7e3f1cd323be4c81aa1a94faa1b3ed987fb2