Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2016:2290-1

Опубликовано: 12 сент. 2016
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The openSUSE Leap 42.1 kernel was updated to 4.1.31 to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
  • CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
  • CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandled destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360).
  • CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
  • CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
  • CVE-2016-4557: The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel did not properly maintain an fd data structure, which allowed local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor (bnc#979018).
  • CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
  • CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
  • CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel did not verify socket existence, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation (bnc#981058).
  • CVE-2015-8787: The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel allowed remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604 (bnc#963931).
  • CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
  • CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
  • CVE-2016-6828: A use after free in tcp_xmit_retransmit_queue() was fixed that could be used by local attackers to crash the kernel (bsc#994296).
  • CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
  • CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 986365 990058).
  • CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
  • CVE-2016-1237: nfsd in the Linux kernel allowed local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c (bnc#986570).

The following non-security bugs were fixed:

  • AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
  • KVM: arm/arm64: Handle forward time correction gracefully (bnc#974266).
  • Linux 4.1.29. Refreshed patch: patches.xen/xen3-fixup-xen Deleted patches: patches.fixes/0001-Revert-ecryptfs-forbid-opening-files-without-mmap-ha.patch patches.fixes/0001-ecryptfs-don-t-allow-mmap-when-the-lower-file-system.patch patches.rpmify/Revert-mm-swap.c-flush-lru-pvecs-on-compound-page-ar patches.rpmify/Revert-powerpc-Update-TM-user-feature-bits-in-scan_f
  • Revert 'mm/swap.c: flush lru pvecs on compound page arrival' (boo#989084).
  • Revert 'powerpc: Update TM user feature bits in scan_features()'. Fix the build error of 4.1.28 on ppc.
  • Revive i8042_check_power_owner() for 4.1.31 kabi fix.
  • USB: OHCI: Do not mark EDs as ED_OPER if scheduling fails (bnc#987886).
  • USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
  • Update patches.fixes/0002-nfsd-check-permissions-when-setting-ACLs.patch (bsc#986570 CVE-2016-1237).
  • Update patches.fixes/0001-posix_acl-Add-set_posix_acl.patch (bsc#986570 CVE-2016-1237).
  • netfilter: x_tables: fix 4.1 stable backport (bsc#989176).
  • nfsd: check permissions when setting ACLs (bsc#986570).
  • posix_acl: Add set_posix_acl (bsc#986570).
  • ppp: defer netns reference release for ppp channel (bsc#980371).
  • series.conf: Move a kABI patch to its own section
  • supported.conf: enable i2c-designware driver (bsc#991110)
  • tcp: enable per-socket rate limiting of all 'challenge acks' (bsc#989152).

Список пакетов

openSUSE Leap 42.1
drbd-8.4.6-8.1
drbd-kmp-default-8.4.6_k4.1.31_30-8.1
drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
drbd-kmp-xen-8.4.6_k4.1.31_30-8.1
hdjmod-1.28-24.1
hdjmod-kmp-default-1.28_k4.1.31_30-24.1
hdjmod-kmp-pae-1.28_k4.1.31_30-24.1
hdjmod-kmp-pv-1.28_k4.1.31_30-24.1
hdjmod-kmp-xen-1.28_k4.1.31_30-24.1
ipset-6.25.1-5.1
ipset-devel-6.25.1-5.1
ipset-kmp-default-6.25.1_k4.1.31_30-5.1
ipset-kmp-pae-6.25.1_k4.1.31_30-5.1
ipset-kmp-pv-6.25.1_k4.1.31_30-5.1
ipset-kmp-xen-6.25.1_k4.1.31_30-5.1
kernel-debug-4.1.31-30.2
kernel-debug-base-4.1.31-30.2
kernel-debug-devel-4.1.31-30.2
kernel-default-4.1.31-30.2
kernel-default-base-4.1.31-30.2
kernel-default-devel-4.1.31-30.2
kernel-devel-4.1.31-30.1
kernel-docs-4.1.31-30.3
kernel-docs-html-4.1.31-30.3
kernel-docs-pdf-4.1.31-30.3
kernel-ec2-4.1.31-30.2
kernel-ec2-base-4.1.31-30.2
kernel-ec2-devel-4.1.31-30.2
kernel-macros-4.1.31-30.1
kernel-obs-build-4.1.31-30.3
kernel-obs-qa-4.1.31-30.1
kernel-obs-qa-xen-4.1.31-30.1
kernel-pae-4.1.31-30.2
kernel-pae-base-4.1.31-30.2
kernel-pae-devel-4.1.31-30.2
kernel-pv-4.1.31-30.2
kernel-pv-base-4.1.31-30.2
kernel-pv-devel-4.1.31-30.2
kernel-source-4.1.31-30.1
kernel-source-vanilla-4.1.31-30.1
kernel-syms-4.1.31-30.1
kernel-vanilla-4.1.31-30.2
kernel-vanilla-devel-4.1.31-30.2
kernel-xen-4.1.31-30.2
kernel-xen-base-4.1.31-30.2
kernel-xen-devel-4.1.31-30.2
libipset3-6.25.1-5.1
lttng-modules-2.7.0-2.1
lttng-modules-kmp-default-2.7.0_k4.1.31_30-2.1
lttng-modules-kmp-pv-2.7.0_k4.1.31_30-2.1
pcfclock-0.44-266.1
pcfclock-kmp-default-0.44_k4.1.31_30-266.1
pcfclock-kmp-pae-0.44_k4.1.31_30-266.1
pcfclock-kmp-pv-0.44_k4.1.31_30-266.1
vhba-kmp-20140928-5.1
vhba-kmp-default-20140928_k4.1.31_30-5.1
vhba-kmp-pae-20140928_k4.1.31_30-5.1
vhba-kmp-pv-20140928_k4.1.31_30-5.1
vhba-kmp-xen-20140928_k4.1.31_30-5.1

Описание

The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки

Описание

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.


Затронутые продукты
openSUSE Leap 42.1:drbd-8.4.6-8.1
openSUSE Leap 42.1:drbd-kmp-default-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-pv-8.4.6_k4.1.31_30-8.1
openSUSE Leap 42.1:drbd-kmp-xen-8.4.6_k4.1.31_30-8.1

Ссылки
Уязвимость openSUSE-SU-2016:2290-1