Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:2245-1

Опубликовано: 06 сент. 2016
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
  • CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
  • CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
  • CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
  • CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
  • CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
  • CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
  • CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
  • CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
  • CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
  • CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
  • CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
  • CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
  • CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
  • CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
  • CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
  • CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
  • CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
  • CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
  • CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
  • CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
  • CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
  • CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
  • CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
  • CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)

The following non-security bugs were fixed:

  • Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
  • Update PCI VPD size patch to upstream:
    • PCI: Determine actual VPD size on first access (bsc#971729).
    • PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
  • Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
  • cgroups: do not attach task to subsystem if migration failed (bnc#979274).
  • cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
  • fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
  • fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
  • hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
  • hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
  • hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
  • hid-elo: kill not flush the work.
  • ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
  • ipv4: fix ineffective source address selection (bsc#980788).
  • ipvs: count pre-established TCP states as active (bsc#970114).
  • kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
  • mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
  • mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
  • mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
  • nfs: Do not attempt to decode missing directory entries (bsc#980931).
  • nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
  • nfs: reduce access cache shrinker locking (bnc#866130).
  • ppp: defer netns reference release for ppp channel (bsc#980371).
  • s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
  • s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
  • s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
  • s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
  • usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
  • usbhid: more mice with ALWAYS_POLL (bsc#919351).
  • usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
  • veth: do not modify ip_summed (bsc#969149).
  • virtio_scsi: Implement eh_timed_out callback.
  • vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
  • xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
  • xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
  • xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
kernel-default-3.0.101-0.47.86.1
kernel-default-base-3.0.101-0.47.86.1
kernel-default-devel-3.0.101-0.47.86.1
kernel-ec2-3.0.101-0.47.86.1
kernel-ec2-base-3.0.101-0.47.86.1
kernel-ec2-devel-3.0.101-0.47.86.1
kernel-pae-3.0.101-0.47.86.1
kernel-pae-base-3.0.101-0.47.86.1
kernel-pae-devel-3.0.101-0.47.86.1
kernel-source-3.0.101-0.47.86.1
kernel-syms-3.0.101-0.47.86.1
kernel-trace-3.0.101-0.47.86.1
kernel-trace-base-3.0.101-0.47.86.1
kernel-trace-devel-3.0.101-0.47.86.1
kernel-xen-3.0.101-0.47.86.1
kernel-xen-base-3.0.101-0.47.86.1
kernel-xen-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Server 11 SP3-LTSS
kernel-bigsmp-3.0.101-0.47.86.1
kernel-bigsmp-base-3.0.101-0.47.86.1
kernel-bigsmp-devel-3.0.101-0.47.86.1
kernel-default-3.0.101-0.47.86.1
kernel-default-base-3.0.101-0.47.86.1
kernel-default-devel-3.0.101-0.47.86.1
kernel-default-man-3.0.101-0.47.86.1
kernel-ec2-3.0.101-0.47.86.1
kernel-ec2-base-3.0.101-0.47.86.1
kernel-ec2-devel-3.0.101-0.47.86.1
kernel-pae-3.0.101-0.47.86.1
kernel-pae-base-3.0.101-0.47.86.1
kernel-pae-devel-3.0.101-0.47.86.1
kernel-source-3.0.101-0.47.86.1
kernel-syms-3.0.101-0.47.86.1
kernel-trace-3.0.101-0.47.86.1
kernel-trace-base-3.0.101-0.47.86.1
kernel-trace-devel-3.0.101-0.47.86.1
kernel-xen-3.0.101-0.47.86.1
kernel-xen-base-3.0.101-0.47.86.1
kernel-xen-devel-3.0.101-0.47.86.1
SUSE Manager 2.1
kernel-bigsmp-3.0.101-0.47.86.1
kernel-bigsmp-base-3.0.101-0.47.86.1
kernel-bigsmp-devel-3.0.101-0.47.86.1
kernel-default-3.0.101-0.47.86.1
kernel-default-base-3.0.101-0.47.86.1
kernel-default-devel-3.0.101-0.47.86.1
kernel-default-man-3.0.101-0.47.86.1
kernel-ec2-3.0.101-0.47.86.1
kernel-ec2-base-3.0.101-0.47.86.1
kernel-ec2-devel-3.0.101-0.47.86.1
kernel-source-3.0.101-0.47.86.1
kernel-syms-3.0.101-0.47.86.1
kernel-trace-3.0.101-0.47.86.1
kernel-trace-base-3.0.101-0.47.86.1
kernel-trace-devel-3.0.101-0.47.86.1
kernel-xen-3.0.101-0.47.86.1
kernel-xen-base-3.0.101-0.47.86.1
kernel-xen-devel-3.0.101-0.47.86.1
SUSE Manager Proxy 2.1
kernel-bigsmp-3.0.101-0.47.86.1
kernel-bigsmp-base-3.0.101-0.47.86.1
kernel-bigsmp-devel-3.0.101-0.47.86.1
kernel-default-3.0.101-0.47.86.1
kernel-default-base-3.0.101-0.47.86.1
kernel-default-devel-3.0.101-0.47.86.1
kernel-ec2-3.0.101-0.47.86.1
kernel-ec2-base-3.0.101-0.47.86.1
kernel-ec2-devel-3.0.101-0.47.86.1
kernel-source-3.0.101-0.47.86.1
kernel-syms-3.0.101-0.47.86.1
kernel-trace-3.0.101-0.47.86.1
kernel-trace-base-3.0.101-0.47.86.1
kernel-trace-devel-3.0.101-0.47.86.1
kernel-xen-3.0.101-0.47.86.1
kernel-xen-base-3.0.101-0.47.86.1
kernel-xen-devel-3.0.101-0.47.86.1
SUSE OpenStack Cloud 5
kernel-bigsmp-3.0.101-0.47.86.1
kernel-bigsmp-base-3.0.101-0.47.86.1
kernel-bigsmp-devel-3.0.101-0.47.86.1
kernel-default-3.0.101-0.47.86.1
kernel-default-base-3.0.101-0.47.86.1
kernel-default-devel-3.0.101-0.47.86.1
kernel-ec2-3.0.101-0.47.86.1
kernel-ec2-base-3.0.101-0.47.86.1
kernel-ec2-devel-3.0.101-0.47.86.1
kernel-source-3.0.101-0.47.86.1
kernel-syms-3.0.101-0.47.86.1
kernel-trace-3.0.101-0.47.86.1
kernel-trace-base-3.0.101-0.47.86.1
kernel-trace-devel-3.0.101-0.47.86.1
kernel-xen-3.0.101-0.47.86.1
kernel-xen-base-3.0.101-0.47.86.1
kernel-xen-devel-3.0.101-0.47.86.1

Описание

The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки

Описание

Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1
SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1

Ссылки
Уязвимость SUSE-SU-2016:2245-1