Описание
Security update for the Linux Kernel
The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654).
- CVE-2015-7509: fs/ext4/namei.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015 (bnc#956707).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB driver could be used by physical local attackers to crash the kernel (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel did not properly use a semaphore, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls (bnc#958951).
- CVE-2015-7566: A malicious USB device could cause kernel crashes in the visor device driver (bnc#961512).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8215: net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel did not validate attempted changes to the MTU value, which allowed context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product (bnc#955354).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel did not validate protocol identifiers for certain protocol families, which allowed local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application (bnc#958886).
- CVE-2015-8550: Optimizations introduced by the compiler could have lead to double fetch vulnerabilities, potentially possibly leading to arbitrary code execution in backend (bsc#957988). (bsc#957988 XSA-155).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel do not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel did not verify an address length, which allowed local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application (bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not properly manage the relationship between a lock and a socket, which allowed local users to cause a denial of service (deadlock) via a crafted sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A flaw was found in the CXGB3 kernel driver when the network was considered congested. The kernel would incorrectly misinterpret the congestion as an error condition and incorrectly free/clean up the skb. When the device would then send the skb's queued, these structures would be referenced and may panic the system or allow an attacker to escalate privileges in a use-after-free scenario.(bsc#966437).
- CVE-2015-8816: A malicious USB device could cause kernel crashes in the in hub_activate() function (bnc#968010).
- CVE-2016-0723: Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: A race in invalidating paging structures that were not in use locally could have lead to disclosoure of information or arbitrary code exectution (bnc#963767).
- CVE-2016-2143: On zSeries a fork of a large process could have caused memory corruption due to incorrect page table handling. (bnc#970504, LTC#138810).
- CVE-2016-2184: A malicious USB device could cause kernel crashes in the alsa usb-audio device driver (bsc#971125).
- CVE-2016-2185: A malicious USB device could cause kernel crashes in the usb_driver_claim_interface function (bnc#971124).
- CVE-2016-2186: A malicious USB device could cause kernel crashes in the powermate device driver (bnc#970958).
- CVE-2016-2384: A double free on the ALSA umidi object was fixed. (bsc#966693).
- CVE-2016-2543: A missing NULL check at remove_events ioctl in the ALSA seq driver was fixed. (bsc#967972).
- CVE-2016-2544: Fix race at timer setup and close in the ALSA seq driver was fixed. (bsc#967973).
- CVE-2016-2545: A double unlink of active_list in the ALSA timer driver was fixed. (bsc#967974).
- CVE-2016-2546: A race among ALSA timer ioctls was fixed (bsc#967975).
- CVE-2016-2547,CVE-2016-2548: The ALSA slave timer list handling was hardened against hangs and races. (CVE-2016-2547,CVE-2016-2548,bsc#968011,bsc#968012).
- CVE-2016-2549: A stall in ALSA hrtimer handling was fixed (bsc#968013).
- CVE-2016-2782: A malicious USB device could cause kernel crashes in the visor device driver (bnc#968670).
- CVE-2016-3137: A malicious USB device could cause kernel crashes in the cypress_m8 device driver (bnc#970970).
- CVE-2016-3139: A malicious USB device could cause kernel crashes in the wacom device driver (bnc#970909).
- CVE-2016-3140: A malicious USB device could cause kernel crashes in the digi_acceleport device driver (bnc#970892).
- CVE-2016-3156: A quadratic algorithm could lead to long kernel ipv4 hangs when removing a device with a large number of addresses. (bsc#971360).
- CVE-2016-3955: A remote buffer overflow in the usbip driver could be used by authenticated attackers to crash the kernel. (bsc#975945)
- CVE-2016-2847: A local user could exhaust kernel memory by pushing lots of data into pipes. (bsc#970948).
- CVE-2016-2188: A malicious USB device could cause kernel crashes in the iowarrior device driver (bnc#970956).
- CVE-2016-3138: A malicious USB device could cause kernel crashes in the cdc-acm device driver (bnc#970911).
The following non-security bugs were fixed:
- af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- cifs: Schedule on hard mount retry (bsc#941514).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dcache: use IS_ROOT to decide where dentry is hashed (bsc#949752).
- driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: make fib6 serial number per namespace (bsc#965319).
- ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs (bsc#956852).
- ipv6: per netns fib6 walkers (bsc#965319).
- ipv6: per netns FIB garbage collection (bsc#965319).
- ipv6: replace global gc_args with local variable (bsc#965319).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi: protect struct netns_ipv6 after FIB6 GC series (bsc#965319).
- kbuild: create directory for dir/file.o (bsc#959312).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mld, igmp: Fix reserved tailroom calculation (bsc#956852).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- nfs4: treat lock owners as opaque values (bnc#968141).
- nfs: Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfs: use smaller allocations for 'struct id_map' (bsc#965923).
- nfsv4: Fix two infinite loops in the mount code (bsc#954628).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pciback: do not allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
- pciback: for XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled.
- pciback: return error on XEN_PCI_OP_enable_msi when device has MSI or MSI-X enabled.
- pciback: return error on XEN_PCI_OP_enable_msix when device has MSI or MSI-X enabled.
- pci: Update VPD size with correct length (bsc#958906).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rdma/ucma: Fix AB-BA deadlock (bsc#963998).
- README.BRANCH: Switch to LTSS mode
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Restore kabi after lock-owner change (bnc#968141).
- s390/pageattr: Do a single TLB flush for change_page_attr (bsc#940413).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- scsi: mpt2sas: Rearrange the the code so that the completion queues are initialized prior to sending the request to controller firmware (bsc#967863).
- skb: Add inline helper for getting the skb end offset from head (bsc#956852).
- sunrcp: restore fair scheduling to priority queues (bsc#955308).
- sunrpc: refactor rpcauth_checkverf error returns (bsc#955673).
- tcp: avoid order-1 allocations on wifi and tx path (bsc#956852).
- tcp: fix skb_availroom() (bsc#956852).
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- vmxnet3: fix netpoll race condition (bsc#958912).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: fix maintenance of guest/host xcr0 state (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mce: Fix return value of mce_chrdev_read() when erst is disabled (bsc#934787).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfrm: do not segment UFO packets (bsc#946122).
- xhci: silence TD warning (bnc#939955).
Список пакетов
SUSE Linux Enterprise Server 11 SP3-LTSS
SUSE Manager 2.1
SUSE Manager Proxy 2.1
SUSE OpenStack Cloud 5
Ссылки
- Link for SUSE-SU-2016:1203-1
- E-Mail link for SUSE-SU-2016:1203-1
- SUSE Security Ratings
- SUSE Bug 758040
- SUSE Bug 781018
- SUSE Bug 879378
- SUSE Bug 879381
- SUSE Bug 904035
- SUSE Bug 924919
- SUSE Bug 934787
- SUSE Bug 935123
- SUSE Bug 937444
- SUSE Bug 939955
- SUSE Bug 940017
- SUSE Bug 940413
- SUSE Bug 940913
- SUSE Bug 940946
- SUSE Bug 941514
- SUSE Bug 942082
- SUSE Bug 946122
Описание
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
Затронутые продукты
Ссылки
- CVE-2013-7446
- SUSE Bug 1020452
- SUSE Bug 955654
- SUSE Bug 955837
Описание
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.
Затронутые продукты
Ссылки
- CVE-2015-7509
- SUSE Bug 1020452
- SUSE Bug 956707
- SUSE Bug 956709
- SUSE Bug 956766
Описание
The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.
Затронутые продукты
Ссылки
- CVE-2015-7515
- SUSE Bug 1020452
- SUSE Bug 956708
Описание
The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
Затронутые продукты
Ссылки
- CVE-2015-7550
- SUSE Bug 1020452
- SUSE Bug 1052256
- SUSE Bug 958951
Описание
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
Затронутые продукты
Ссылки
- CVE-2015-7566
- SUSE Bug 1020452
- SUSE Bug 961512
Описание
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
Затронутые продукты
Ссылки
- CVE-2015-7799
- SUSE Bug 1020452
- SUSE Bug 1052256
- SUSE Bug 949936
- SUSE Bug 951638
Описание
net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
Затронутые продукты
Ссылки
- CVE-2015-8215
- SUSE Bug 1020452
- SUSE Bug 1052256
- SUSE Bug 944296
- SUSE Bug 951638
- SUSE Bug 955354
Описание
The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
Затронутые продукты
Ссылки
- CVE-2015-8539
- SUSE Bug 1115893
- SUSE Bug 781018
- SUSE Bug 958463
- SUSE Bug 958601
Описание
The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
Затронутые продукты
Ссылки
- CVE-2015-8543
- SUSE Bug 1020452
- SUSE Bug 1052256
- SUSE Bug 1115893
- SUSE Bug 923755
- SUSE Bug 958886
- SUSE Bug 963994
- SUSE Bug 969522
Описание
Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
Затронутые продукты
Ссылки
- CVE-2015-8550
- SUSE Bug 1020452
- SUSE Bug 1052256
- SUSE Bug 957988
Описание
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
Затронутые продукты
Ссылки
- CVE-2015-8551
- SUSE Bug 1020452
- SUSE Bug 957990
Описание
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
Затронутые продукты
Ссылки
- CVE-2015-8552
- SUSE Bug 1020452
- SUSE Bug 957990
Описание
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
Затронутые продукты
Ссылки
- CVE-2015-8569
- SUSE Bug 1020452
- SUSE Bug 923755
- SUSE Bug 959190
- SUSE Bug 959399
- SUSE Bug 963994
Описание
The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
Затронутые продукты
Ссылки
- CVE-2015-8575
- SUSE Bug 1020452
- SUSE Bug 959190
- SUSE Bug 959399
Описание
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
Затронутые продукты
Ссылки
- CVE-2015-8767
- SUSE Bug 1020452
- SUSE Bug 1115893
- SUSE Bug 961509
Описание
The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
Затронутые продукты
Ссылки
- CVE-2015-8785
- SUSE Bug 1020452
- SUSE Bug 963765
Описание
drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
Затронутые продукты
Ссылки
- CVE-2015-8812
- SUSE Bug 1020452
- SUSE Bug 1115893
- SUSE Bug 966437
- SUSE Bug 966683
Описание
The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
Затронутые продукты
Ссылки
- CVE-2015-8816
- SUSE Bug 1020452
- SUSE Bug 968010
- SUSE Bug 979064
Описание
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-0723
- SUSE Bug 1020452
- SUSE Bug 961500
Описание
Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
Затронутые продукты
Ссылки
- CVE-2016-2069
- SUSE Bug 1020452
- SUSE Bug 1115893
- SUSE Bug 870618
- SUSE Bug 963767
Описание
The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
Затронутые продукты
Ссылки
- CVE-2016-2143
- SUSE Bug 1115893
- SUSE Bug 970504
- SUSE Bug 993872
Описание
The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-2184
- SUSE Bug 1020452
- SUSE Bug 971125
Описание
The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-2185
- SUSE Bug 1020452
- SUSE Bug 971124
Описание
The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-2186
- SUSE Bug 1020452
- SUSE Bug 970958
Описание
The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-2188
- SUSE Bug 1020452
- SUSE Bug 1067912
- SUSE Bug 1132190
- SUSE Bug 970956
Описание
Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
Затронутые продукты
Ссылки
- CVE-2016-2384
- SUSE Bug 1020452
- SUSE Bug 966693
- SUSE Bug 967773
Описание
The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-2543
- SUSE Bug 1020452
- SUSE Bug 967972
Описание
Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.
Затронутые продукты
Ссылки
- CVE-2016-2544
- SUSE Bug 1020452
- SUSE Bug 967973
Описание
The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-2545
- SUSE Bug 1020452
- SUSE Bug 967974
Описание
sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-2546
- SUSE Bug 1020452
- SUSE Bug 967975
Описание
sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-2547
- SUSE Bug 1020452
- SUSE Bug 968011
Описание
sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
Затронутые продукты
Ссылки
- CVE-2016-2548
- SUSE Bug 1020452
- SUSE Bug 968012
Описание
sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.
Затронутые продукты
Ссылки
- CVE-2016-2549
- SUSE Bug 1020452
- SUSE Bug 968013
Описание
The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
Затронутые продукты
Ссылки
- CVE-2016-2782
- SUSE Bug 1020452
- SUSE Bug 961512
- SUSE Bug 968670
Описание
fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
Затронутые продукты
Ссылки
- CVE-2016-2847
- SUSE Bug 1020452
- SUSE Bug 970948
- SUSE Bug 974646
Описание
drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
Затронутые продукты
Ссылки
- CVE-2016-3137
- SUSE Bug 1020452
- SUSE Bug 970970
Описание
The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
Затронутые продукты
Ссылки
- CVE-2016-3138
- SUSE Bug 1020452
- SUSE Bug 970911
- SUSE Bug 970970
Описание
The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-3139
- SUSE Bug 1020452
- SUSE Bug 970909
Описание
The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
Затронутые продукты
Ссылки
- CVE-2016-3140
- SUSE Bug 1020452
- SUSE Bug 970892
Описание
The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
Затронутые продукты
Ссылки
- CVE-2016-3156
- SUSE Bug 1020452
- SUSE Bug 971360
Описание
The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
Затронутые продукты
Ссылки
- CVE-2016-3955
- SUSE Bug 1115893
- SUSE Bug 975945
- SUSE Bug 986225