ALT-PU-2019-1437-1
Package kernel-image-un-def updated to version 4.20.16-alt1 for branch sisyphus in task 225027.
Closed vulnerabilities
BDU:2017-00767
Уязвимость компонента Kernel Samepage Merging (KSM) операционной системы Linux, позволяющая нарушителю оказать влияние на конфиденциальность информации
Modified: 2024-11-21
CVE-2010-5321
Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf.
- http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
- [oss-security] 20150208 Re: kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() - Linux kernel
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
- https://bugzilla.kernel.org/show_bug.cgi?id=120571
- https://bugzilla.redhat.com/show_bug.cgi?id=620629
- http://linuxtv.org/irc/v4l/index.php?date=2010-07-29
- https://bugzilla.redhat.com/show_bug.cgi?id=620629
- https://bugzilla.kernel.org/show_bug.cgi?id=120571
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
- [oss-security] 20150208 Re: kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() - Linux kernel
Modified: 2024-11-21
CVE-2015-0569
Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.
- http://source.android.com/security/bulletin/2016-05-01.html
- http://source.android.com/security/bulletin/2016-05-01.html
- 77691
- 77691
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
- 39308
- 39308
Modified: 2024-11-21
CVE-2015-0570
Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that uses a long WPS IE element.
- http://source.android.com/security/bulletin/2016-05-01.html
- http://source.android.com/security/bulletin/2016-05-01.html
- 77691
- 77691
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
Modified: 2024-11-21
CVE-2015-0571
The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify authorization for private SET IOCTL calls, which allows attackers to gain privileges via a crafted application, related to wlan_hdd_hostapd.c and wlan_hdd_wext.c.
- http://source.android.com/security/bulletin/2016-05-01.html
- http://source.android.com/security/bulletin/2016-05-01.html
- 77691
- 77691
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
- https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015
Modified: 2024-11-21
CVE-2015-2877
Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states "Basically if you care about this attack vector, disable deduplication." Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities
- http://www.antoniobarresi.com/files/cain_advisory.txt
- http://www.antoniobarresi.com/files/cain_advisory.txt
- VU#935424
- VU#935424
- 76256
- 76256
- https://bugzilla.redhat.com/show_bug.cgi?id=1252096
- https://bugzilla.redhat.com/show_bug.cgi?id=1252096
- https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
- https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
- https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
- https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
- https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
- https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
Modified: 2024-11-21
CVE-2015-7312
Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3-mmap.patch and aufs4-mmap.patch patches for the Linux kernel 3.x and 4.x allow local users to cause a denial of service (use-after-free and BUG) or possibly gain privileges via a (1) madvise or (2) msync system call, related to mm/madvise.c and mm/msync.c.
- [aufs] 20150910 Re: concurrent msync triggers NULL pointer dereference
- [aufs] 20150910 Re: concurrent msync triggers NULL pointer dereference
- DSA-3364
- DSA-3364
- [oss-security] 20150922 Re: CVE request: Use-after-free in Linux kernel with aufs mmap patch
- [oss-security] 20150922 Re: CVE request: Use-after-free in Linux kernel with aufs mmap patch
- USN-2777-1
- USN-2777-1
Modified: 2024-11-21
CVE-2016-2853
The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
- http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
- http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
- [oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
- [oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- 96839
- 96839
- [aufs] 20160219 aufs3 and aufs4 GIT release
- [aufs] 20160219 aufs3 and aufs4 GIT release
Modified: 2024-11-21
CVE-2016-2854
The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
- http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
- http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/
- [oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
- [oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
- 96838
- 96838
- [aufs] 20160219 aufs3 and aufs4 GIT release
- [aufs] 20160219 aufs3 and aufs4 GIT release