Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2017:0541-1

Опубликовано: 22 фев. 2017
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The openSUSE Leap 42.2 kernel was updated to 4.4.49 to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2017-5986: A userlevel triggerable BUG_ON on sctp_wait_for_sndbuf was fixed. (bsc#1025235)
  • CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).
  • CVE-2017-5897: A potential remote denial of service within the IPv6 GRE protocol was fixed. (bsc#1023762)
  • CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to cause a denial of service (invalid free) or possibly have unspecified other impact via an application that makes an IPV6_RECVPKTINFO setsockopt system call. (bsc#1026024).

The following non-security bugs were fixed:

  • btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
  • iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).
  • kabi: protect struct tcp_fastopen_cookie (kabi).
  • md: ensure md devices are freed before module is unloaded (bsc#1022304).
  • md: Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch (bsc#982783,bsc#998106,bsc#1020048).
  • net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634).
  • net: implement netif_cond_dbg macro (bsc#1019168).
  • sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
  • sfc: refactor debug-or-warnings printks (bsc#1019168).
  • xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
  • xfs: do not allow di_size with high bit set (bsc#1024234).
  • xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
  • xfs: fix broken multi-fsb buffer logging (bsc#1024081).
  • xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
  • xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
  • xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
  • xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).

Список пакетов

openSUSE Leap 42.2
kernel-debug-4.4.49-16.1
kernel-debug-base-4.4.49-16.1
kernel-debug-devel-4.4.49-16.1
kernel-default-4.4.49-16.1
kernel-default-base-4.4.49-16.1
kernel-default-devel-4.4.49-16.1
kernel-devel-4.4.49-16.1
kernel-docs-4.4.49-16.2
kernel-docs-html-4.4.49-16.2
kernel-docs-pdf-4.4.49-16.2
kernel-macros-4.4.49-16.1
kernel-obs-build-4.4.49-16.1
kernel-obs-qa-4.4.49-16.1
kernel-source-4.4.49-16.1
kernel-source-vanilla-4.4.49-16.1
kernel-syms-4.4.49-16.1
kernel-vanilla-4.4.49-16.1
kernel-vanilla-base-4.4.49-16.1
kernel-vanilla-devel-4.4.49-16.1

Описание

The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.


Затронутые продукты
openSUSE Leap 42.2:kernel-debug-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-base-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-devel-4.4.49-16.1
openSUSE Leap 42.2:kernel-default-4.4.49-16.1

Ссылки

Описание

The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.


Затронутые продукты
openSUSE Leap 42.2:kernel-debug-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-base-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-devel-4.4.49-16.1
openSUSE Leap 42.2:kernel-default-4.4.49-16.1

Ссылки

Описание

Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.


Затронутые продукты
openSUSE Leap 42.2:kernel-debug-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-base-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-devel-4.4.49-16.1
openSUSE Leap 42.2:kernel-default-4.4.49-16.1

Ссылки

Описание

The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.


Затронутые продукты
openSUSE Leap 42.2:kernel-debug-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-base-4.4.49-16.1
openSUSE Leap 42.2:kernel-debug-devel-4.4.49-16.1
openSUSE Leap 42.2:kernel-default-4.4.49-16.1

Ссылки
Уязвимость openSUSE-SU-2017:0541-1