Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:1039-1

Опубликовано: 14 апр. 2016
Источник: suse-cvrf

Описание

Security update for Linux Kernel Live Patch 9

This update for the Linux Kernel 3.12.51-52.31.1 fixes the following issues:

  • CVE-2016-2384: A malicious USB device could cause a kernel crash in the alsa usb-audio driver. (bsc#967773)

  • CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the network was considered congested. The kernel would incorrectly misinterpret the congestion as an error condition and incorrectly free/clean up the skb. When the device would then send the skb's queued, these structures would be referenced and may panic the system or allow an attacker to escalate privileges in a use-after-free scenario. (bsc#966683)

  • CVE-2016-0774: A pipe buffer state corruption after unsuccessful atomic read from pipe was fixed (bsc#964732).

  • CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid mappings, which allowed local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states 'there is no kernel bug here.' (bsc#960563)

Список пакетов

SUSE Linux Enterprise Live Patching 12
kgraft-patch-3_12_51-52_31-default-4-2.1
kgraft-patch-3_12_51-52_31-xen-4-2.1

Описание

** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here."


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-4-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-4-2.1

Ссылки

Описание

drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-4-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-4-2.1

Ссылки

Описание

The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport in the linux package before 3.2.73-2+deb7u3 on Debian wheezy and the kernel package before 3.10.0-229.26.2 on Red Hat Enterprise Linux (RHEL) 7.1 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun." NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-1805.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-4-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-4-2.1

Ссылки

Описание

Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.


Затронутые продукты
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-default-4-2.1
SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-52_31-xen-4-2.1

Ссылки