ALT-PU-2017-1412-1
Package kernel-image-el-smp updated to version 2.6.32-alt48.M60C.1 for branch c6 in task 180987.
Closed vulnerabilities
BDU:2017-01280
Уязвимость функции sctp_sf_ootb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2025-04-12
CVE-2016-6136
Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.securityfocus.com/archive/1/538835/30/0/threaded
- http://www.securityfocus.com/bid/91558
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://source.android.com/security/bulletin/2016-11-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=43761473c254b45883a64441dd0bc85a42f3645c
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.securityfocus.com/archive/1/538835/30/0/threaded
- http://www.securityfocus.com/bid/91558
- https://bugzilla.kernel.org/show_bug.cgi?id=120681
- https://bugzilla.redhat.com/show_bug.cgi?id=1353533
- https://github.com/linux-audit/audit-kernel/issues/18
- https://github.com/torvalds/linux/commit/43761473c254b45883a64441dd0bc85a42f3645c
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2025-04-12
CVE-2016-9555
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html
- http://rhn.redhat.com/errata/RHSA-2017-0086.html
- http://rhn.redhat.com/errata/RHSA-2017-0091.html
- http://rhn.redhat.com/errata/RHSA-2017-0113.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8
- http://www.openwall.com/lists/oss-security/2016/11/22/18
- http://www.securityfocus.com/bid/94479
- http://www.securitytracker.com/id/1037339
- https://bto.bluecoat.com/security-advisory/sa134
- https://bugzilla.redhat.com/show_bug.cgi?id=1397930
- https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html
- http://rhn.redhat.com/errata/RHSA-2017-0086.html
- http://rhn.redhat.com/errata/RHSA-2017-0091.html
- http://rhn.redhat.com/errata/RHSA-2017-0113.html
- http://rhn.redhat.com/errata/RHSA-2017-0307.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8
- http://www.openwall.com/lists/oss-security/2016/11/22/18
- http://www.securityfocus.com/bid/94479
- http://www.securitytracker.com/id/1037339
- https://bto.bluecoat.com/security-advisory/sa134
- https://bugzilla.redhat.com/show_bug.cgi?id=1397930
- https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk
Modified: 2025-04-20
CVE-2017-2636
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
- http://www.debian.org/security/2017/dsa-3804
- http://www.openwall.com/lists/oss-security/2017/03/07/6
- http://www.securityfocus.com/bid/96732
- http://www.securitytracker.com/id/1037963
- https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
- https://access.redhat.com/errata/RHSA-2017:0892
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://access.redhat.com/errata/RHSA-2017:0986
- https://access.redhat.com/errata/RHSA-2017:1125
- https://access.redhat.com/errata/RHSA-2017:1126
- https://access.redhat.com/errata/RHSA-2017:1232
- https://access.redhat.com/errata/RHSA-2017:1233
- https://access.redhat.com/errata/RHSA-2017:1488
- https://bugzilla.redhat.com/show_bug.cgi?id=1428319
- http://www.debian.org/security/2017/dsa-3804
- http://www.openwall.com/lists/oss-security/2017/03/07/6
- http://www.securityfocus.com/bid/96732
- http://www.securitytracker.com/id/1037963
- https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
- https://access.redhat.com/errata/RHSA-2017:0892
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://access.redhat.com/errata/RHSA-2017:0986
- https://access.redhat.com/errata/RHSA-2017:1125
- https://access.redhat.com/errata/RHSA-2017:1126
- https://access.redhat.com/errata/RHSA-2017:1232
- https://access.redhat.com/errata/RHSA-2017:1233
- https://access.redhat.com/errata/RHSA-2017:1488
- https://bugzilla.redhat.com/show_bug.cgi?id=1428319