Errata ALT-PU-2016-1071-1: Information
Package name: kernel-image-std-def
Version: 3.14.59-alt1.M70C.3
Bulletin updated: Feb. 1, 2016
Task: #157034
Fixes
Published: Jan. 19, 2016
BDU:2016-00187
Уязвимость ядра Linux, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код на целевой системе
Severity: HIGH (7.2)
Links:
Published: Dec. 28, 2015
BDU:2021-01293
Уязвимость ядра операционных систем Linux, связанная с ошибками разыменования указателей, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Severity: HIGH (7.0) Vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Links:
Published: Dec. 28, 2015
Modified: June 7, 2023
Modified: June 7, 2023
CVE-2015-8543
The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
Severity: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Links:
- [oss-security] 20151209 Re: CVE request - Android kernel - IPv6 connect cause a denial of service
- https://bugzilla.redhat.com/show_bug.cgi?id=1290475
- https://github.com/torvalds/linux/commit/79462ad02e861803b3840cc782248c7359451cd9
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79462ad02e861803b3840cc782248c7359451cd9
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- RHSA-2016:0855
- SUSE-SU-2016:2074
- 79698
- SUSE-SU-2016:0911
- SUSE-SU-2016:1102
- USN-2890-1
- USN-2890-3
- 1034892
- USN-2890-2
- USN-2888-1
- USN-2886-1
- DSA-3426
- DSA-3434
- RHSA-2016:2584
- RHSA-2016:2574
Published: Nov. 16, 2016
Modified: Jan. 19, 2023
Modified: Jan. 19, 2023
CVE-2015-8961
The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
Severity: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Links:
- https://github.com/torvalds/linux/commit/6934da9238da947628be83635e365df41064b09b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6934da9238da947628be83635e365df41064b09b
- https://source.android.com/security/bulletin/2016-11-01.html
- 94135
Published: Feb. 8, 2016
Modified: Feb. 13, 2023
Modified: Feb. 13, 2023
CVE-2016-0728
The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
Severity: HIGH (7.8) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Links:
- [oss-security] 20160119 Linux kernel: use after free in keyring facility.
- https://bugzilla.redhat.com/show_bug.cgi?id=1297475
- https://github.com/torvalds/linux/commit/23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23567fd052a9abb6d67fe8e7a9ccdd9800a540f2
- http://source.android.com/security/bulletin/2016-03-01.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- HPSBHF03436
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 81054
- SUSE-SU-2016:0757
- SUSE-SU-2016:0756
- SUSE-SU-2016:0755
- SUSE-SU-2016:0747
- SUSE-SU-2016:0746
- SUSE-SU-2016:0745
- SUSE-SU-2016:0752
- SUSE-SU-2016:0753
- SUSE-SU-2016:0750
- https://bto.bluecoat.com/security-advisory/sa112
- SUSE-SU-2016:0751
- RHSA-2016:0065
- FEDORA-2016-5d43766e33
- USN-2870-2
- USN-2872-1
- RHSA-2016:0068
- DSA-3448
- SUSE-SU-2016:0341
- USN-2872-3
- RHSA-2016:0064
- USN-2871-2
- USN-2870-1
- USN-2873-1
- FEDORA-2016-b59fd603be
- SUSE-SU-2016:0205
- USN-2871-1
- 39277
- USN-2872-2
- 1034701
- https://security.netapp.com/advisory/ntap-20160211-0001/