Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:13.2:Update
patchinfo.5227
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5227
<patchinfo incident="5227"> <issue id="901754" tracker="bnc">[backlight] After switch to terminal (CTRL+ALT+F2) brightness are very low</issue> <issue id="941113" tracker="bnc">Brightness will automatically dim after account log out and re-login</issue> <issue id="945219" tracker="bnc">Network issues with openvswitch and VLAN interface</issue> <issue id="955654" tracker="bnc">VUL-0: CVE-2013-7446: kernel: Unix sockets use after free - peer_wait_queue prematurely freed</issue> <issue id="957052" tracker="bnc">BTRFS: Transaction aborted (error -17) - __btrfs_abort_transaction+0x4b/0x110</issue> <issue id="957988" tracker="bnc">VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155)</issue> <issue id="959709" tracker="bnc">VUL-0: kernel: privilege escalation in user namespaces</issue> <issue id="960561" tracker="bnc">VUL-0: CVE-2015-8709: kernel: ptrace: potential privilege escalation in user namespaces</issue> <issue id="961512" tracker="bnc">VUL-1: CVE-2015-7566: kernel: Crash on invalid USB device descriptors in visor driver</issue> <issue id="963762" tracker="bnc">VUL-0: CVE-2016-2053: kernel: Kernel panic and system lockup by triggering BUG_ON() in public_key_verify_signature()</issue> <issue id="963765" tracker="bnc">VUL-0: CVE-2015-8785: kernel: fuse: possible denial of service in fuse_fill_write_pages()</issue> <issue id="966245" tracker="bnc">L3-Question: GSO-TSO Settings not reporting on the VLAN Interface for SLES 12</issue> <issue id="966437" tracker="bnc">VUL-0: CVE-2015-8812: kernel: CXGB3: Logic bug in return code handling prematurely frees key structures causing Use after free or kernel panic.</issue> <issue id="966693" tracker="bnc">VUL-0: CVE-2016-2384: kernel: ALSA: usb-audio: double-free triggered by invalid USB descriptor</issue> <issue id="966849" tracker="bnc">[syzkaller] vhci WARNING: at kernel/workqueue.c:4042</issue> <issue id="967972" tracker="bnc">VUL-0: CVE-2016-2543: kernel: ALSA: seq: Fix missing NULL check at remove_events ioctl</issue> <issue id="967973" tracker="bnc">VUL-0: CVE-2016-2544: kernel: ALSA: seq: Fix race at timer setup and close</issue> <issue id="967974" tracker="bnc">VUL-0: CVE-2016-2545: kernel: ALSA: timer: Fix double unlink of active_list</issue> <issue id="967975" tracker="bnc">VUL-0: CVE-2016-2546: kernel: ALSA: timer: Fix race among timer ioctls</issue> <issue id="968010" tracker="bnc">VUL-0: CVE-2015-8816: kernel: USB: fix invalid memory access in hub_activate()</issue> <issue id="968011" tracker="bnc">VUL-0: CVE-2016-2547: kernel: ALSA: timer: Harden slave timer list handling</issue> <issue id="968012" tracker="bnc">VUL-0: CVE-2016-2548: kernel: ALSA: timer: Harden slave timer list handling (2nd CVE)</issue> <issue id="968013" tracker="bnc">VUL-0: CVE-2016-2549: kernel: ALSA: hrtimer: Fix stall by hrtimer_cancel()</issue> <issue id="968018" tracker="bnc">VUL-1: kernel: ALSA core issues reported by syzkaller fuzzer</issue> <issue id="968670" tracker="bnc">VUL-0: CVE-2016-2782: kernel: visor: crash on invalid USB device descriptors in treo_attach() in visor driver</issue> <issue id="969354" tracker="bnc">VUL-0: CVE-2012-6701: kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access</issue> <issue id="969355" tracker="bnc">VUL-0: CVE-2015-8830: kernel: AIO write triggers integer overflow in some protocols</issue> <issue id="970892" tracker="bnc">VUL-0: CVE-2016-3140: kernel-source: crash on invalid USB device descriptors (digi_acceleport driver)</issue> <issue id="970909" tracker="bnc">VUL-0: CVE-2016-3139: kernel-source: crash on invalid USB device descriptors (wacom driver)</issue> <issue id="970911" tracker="bnc">VUL-0: CVE-2016-3138: kernel-source: crash on invalid USB device descriptors (cdc_acm driver)</issue> <issue id="970948" tracker="bnc">VUL-0: CVE-2016-2847: kernel-source: limit the per-user amount of pages allocated in pipes</issue> <issue id="970955" tracker="bnc">VUL-1: CVE-2016-3136: kernel-source: Crash on invalid USB device descriptors (mct_u232 driver)</issue> <issue id="970956" tracker="bnc">VUL-0: CVE-2016-2188: kernel-source: Kernel panic on invalid USB device descriptor (iowarrior driver)</issue> <issue id="970958" tracker="bnc">VUL-0: CVE-2016-2186: kernel-source: Kernel panic on invalid USB device descriptor (powermate driver)</issue> <issue id="970970" tracker="bnc">VUL-1: CVE-2016-3137: kernel-source: Crash on invalid USB device descriptors (cypress_m8 driver)</issue> <issue id="971124" tracker="bnc">VUL-1: CVE-2016-2185: kernel: Kernel panic on invalid USB device descriptor (ati_remote2 driver)</issue> <issue id="971125" tracker="bnc">VUL-1: CVE-2016-2184: kernel: Kernel panic on invalid USB device descriptor (snd_usb_audio driver)</issue> <issue id="971126" tracker="bnc">VUL-0: CVE-2016-3134: kernel: netfilter: missing bounds check in ipt_entry structure</issue> <issue id="971360" tracker="bnc">VUL-0: CVE-2016-3156: kernel-source: ipv4: denial of service when destroying a network interface</issue> <issue id="971628" tracker="bnc">VUL-1: CVE-2016-3689: kernel: ims-pcu driver can be oopsed by malicious device</issue> <issue id="971799" tracker="bnc">[syzkaller] bluetooth BUG: KASAN: use-after-free in vhci_send_frame</issue> <issue id="971919" tracker="bnc">crash by forged gtco devices</issue> <issue id="971944" tracker="bnc">VUL-0: CVE-2016-2187: kernel-source: Kernel panic on invalid USB device descriptor (gtco driver)</issue> <issue id="972174" tracker="bnc">VUL-1: CVE-2015-8839: kernel: ext4 data corruption due to punch hole races</issue> <issue id="973378" tracker="bnc">[syzkaller] snd_timer BUG: KASAN: use-after-free in snd_timer_interrupt</issue> <issue id="973570" tracker="bnc">smbd locks up the kernel</issue> <issue id="974308" tracker="bnc">VUL-1: CVE-2016-3672: kernel: Unlimiting the stack not longer disables ASLR</issue> <issue id="974418" tracker="bnc">VUL-0: CVE-2016-3951: kernel: usbnet: memory corruption triggered by invalid USB descriptor allowing for DoS</issue> <issue id="974646" tracker="bnc">PTF request for SLES 11 SP3 kernel-default containing fixes for bsc#960857 and bsc#963998</issue> <issue id="975945" tracker="bnc">VUL-0: CVE-2016-3955: kernel: buffer overflow in usbip by trusting length of incoming packets</issue> <issue id="978401" tracker="bnc">VUL-1: CVE-2016-4482: kernel: information leak in devio of Linux kernel</issue> <issue id="978445" tracker="bnc">VUL-1: CVE-2016-4482: kernel: usbfs leaking three bytes per syscall to user space</issue> <issue id="978821" tracker="bnc">VUL-0: CVE-2016-4485: kernel: Information leak in llc module</issue> <issue id="978822" tracker="bnc">VUL-0: CVE-2016-4486: kernel: Information leak in rtnetlink</issue> <issue id="979021" tracker="bnc">VUL-0: CVE-2015-3288: kernel: zero page memory arbitrary modification</issue> <issue id="979213" tracker="bnc">VUL-1: CVE-2016-4569: kernel: information leak vulnerability in Linux sound module</issue> <issue id="979548" tracker="bnc">VUL-0: CVE-2016-4565: kernel: infiniband: Using write() instead of bi-directional ioctl() allows writing into user specified kernel memory</issue> <issue id="979867" tracker="bnc">VUL-0: CVE-2016-0758: kernel: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length()</issue> <issue id="979879" tracker="bnc">VUL-1: CVE-2016-4578: kernel: Information leak in events in timer.c</issue> <issue id="979913" tracker="bnc">VUL-0: CVE-2016-4581: kernel: Slave being first propagated copy causes oops in propagate_mnt</issue> <issue id="980348" tracker="bnc">btrfs: possible to crash using BTRFS_IOC_SNAP_CREATE_V2 ioctl w/ non-btrfs file descriptor</issue> <issue id="980363" tracker="bnc">VUL-0: CVE-2016-2189: kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko</issue> <issue id="980725" tracker="bnc">VUL-0: CVE-2016-4913: kernel: Information leak when handling NM entries containing NUL</issue> <issue id="981267" tracker="bnc">VUL-1: CVE-2016-4580: kernel: Information leak in x25 module</issue> <issue id="982706" tracker="bnc">use of streams with UAS on Frescologic device id 1009 can brick motherboards</issue> <issue id="983143" tracker="bnc">VUL-0: CVE-2016-1583: kernel: ecryptfs: stack overflow in ecryptfs with /proc/pid/environ could lead to root</issue> <issue id="942702" tracker="bnc">VUL-0: CVE-2015-6526: kernel: perf on ppp64 - unbounded checks in perf_callchain_user_64 denial of service.</issue> <issue id="970114" tracker="bnc">L3-Question: IPVS “least connection” distribution algorithm doesn't weight TCP SYNs correctly</issue> <issue id="970275" tracker="bnc">xenbus deadlock</issue> <issue id="978469" tracker="bnc">L3: kernel BUG at ../drivers/xen/netback/netback.c:658</issue> <issue id="980371" tracker="bnc">VUL-0: CVE-2016-4805: kernel: Use after free vulnerability in ppp_unregister_channel</issue> <issue id="983213" tracker="bnc">VUL-1: CVE-2016-5244: kernel-source: rds: fix an infoleak in rds_inc_info_copy</issue> <issue id="984464" tracker="bnc">Bluetooth stop to work after a few minute</issue> <issue id="984755" tracker="bnc">VUL-0: CVE-2016-4470: kernel-source: Uninitialized variable in request_key handling causes kernel crash in error handling path</issue> <issue id="984764" tracker="bnc">VUL-0: CVE-2016-4470: kernel live patch: Uninitialized variable in request_key handling causes kernel crash in error handling path</issue> <issue id="986362" tracker="bnc">VUL-0: CVE-2016-4997: kernel: Linux local privilege escalation in compat_setsockopt</issue> <issue id="986365" tracker="bnc">VUL-0: CVE-2016-4998: kernel: OOB read / Denial of Service in setsockopt()</issue> <issue id="986377" tracker="bnc">VUL-0: CVE-2016-4997: kernel live patch: Linux local privilege escalation in compat_setsockopt</issue> <issue id="986572" tracker="bnc">VUL-0: CVE-2016-5829: kernel-source: HID: hiddev buffer overflows</issue> <issue id="986573" tracker="bnc">VUL-0: CVE-2016-5829: kernel live patch: HID: hiddev buffer overflows</issue> <issue id="986811" tracker="bnc">VUL-0: CVE-2014-9904: kernel-source: The snd_compress_check_input function in sound/core/compress_offload.cin the ALSA subsystem in the ...</issue> <issue id="2012-6701" tracker="cve" /> <issue id="2014-9904" tracker="cve" /> <issue id="2015-6526" tracker="cve" /> <issue id="2016-4470" tracker="cve" /> <issue id="2016-4805" tracker="cve" /> <issue id="2016-4997" tracker="cve" /> <issue id="2016-5244" tracker="cve" /> <issue id="2016-5829" tracker="cve" /> <issue id="2016-1583" tracker="cve" /> <issue id="2016-4913" tracker="cve" /> <issue id="2016-4580" tracker="cve" /> <issue id="2016-0758" tracker="cve" /> <issue id="2016-2053" tracker="cve" /> <issue id="2016-2187" tracker="cve" /> <issue id="2016-4482" tracker="cve" /> <issue id="2016-4565" tracker="cve" /> <issue id="2016-3672" tracker="cve" /> <issue id="2016-4581" tracker="cve" /> <issue id="2016-4485" tracker="cve" /> <issue id="2015-3288" tracker="cve" /> <issue id="2016-4578" tracker="cve" /> <issue id="2016-3134" tracker="cve" /> <issue id="2016-4486" tracker="cve" /> <issue id="2013-7446" tracker="cve" /> <issue id="2016-4569" tracker="cve" /> <issue id="2016-2847" tracker="cve" /> <issue id="2016-3136" tracker="cve" /> <issue id="2016-2188" tracker="cve" /> <issue id="2016-3138" tracker="cve" /> <issue id="2016-3137" tracker="cve" /> <issue id="2016-3951" tracker="cve" /> <issue id="2016-3140" tracker="cve" /> <issue id="2016-2186" tracker="cve" /> <issue id="2016-2185" tracker="cve" /> <issue id="2016-3689" tracker="cve" /> <issue id="2016-3156" tracker="cve" /> <issue id="2016-2184" tracker="cve" /> <issue id="2016-3139" tracker="cve" /> <issue id="2015-8830" tracker="cve" /> <issue id="2016-2782" tracker="cve" /> <issue id="2015-8816" tracker="cve" /> <issue id="2015-7566" tracker="cve" /> <issue id="2016-2549" tracker="cve" /> <issue id="2016-2547" tracker="cve" /> <issue id="2016-2548" tracker="cve" /> <issue id="2016-2546" tracker="cve" /> <issue id="2016-2545" tracker="cve" /> <issue id="2016-2544" tracker="cve" /> <issue id="2016-2543" tracker="cve" /> <issue id="2015-8709" tracker="cve" /> <issue id="2015-8812" tracker="cve" /> <issue id="2016-2384" tracker="cve" /> <issue id="2015-8785" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>jeff_mahoney</packager> <reboot_needed/> <description> The openSUSE 13.2 kernel was updated to fix various bugs and security issues. The following security bugs were fixed: - CVE-2016-1583: Prevent the usage of mmap when the lower file system does not allow it. This could have lead to local privilege escalation when ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid (bsc#983143). - CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandles NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725). - CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267). - CVE-2016-0758: Tags with indefinite length could have corrupted pointers in asn1_find_indefinite_length (bsc#979867). - CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762). - CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971919 971944). - CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401 bsc#978445). - CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548 bsc#980363). - CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308). - CVE-2016-4581: fs/pnode.c in the Linux kernel did not properly traverse a mount propagation tree in a certain case involving a slave mount, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls (bnc#979913). - CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821). - CVE-2015-3288: A security flaw was found in the Linux kernel that there was a way to arbitrary change zero page memory. (bnc#979021). - CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879). - CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126). - CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822). - CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel allowed local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls (bnc#955654). - CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213). - CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948 974646). - CVE-2016-3136: The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors (bnc#970955). - CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956). - CVE-2016-3138: The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor (bnc#970911). - CVE-2016-3137: drivers/usb/serial/cypress_m8.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions (bnc#970970). - CVE-2016-3951: Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor (bnc#974418). - CVE-2016-3140: The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970892). - CVE-2016-2186: The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970958). - CVE-2016-2185: The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971124). - CVE-2016-3689: The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface (bnc#971628). - CVE-2016-3156: The IPv4 implementation in the Linux kernel mishandles destruction of device objects, which allowed guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses (bnc#971360). - CVE-2016-2184: The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971125). - CVE-2016-3139: The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970909). - CVE-2015-8830: Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allowed local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression (bnc#969354 bsc#969355). - CVE-2016-2782: The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint (bnc#968670). - CVE-2015-8816: The hub_activate function in drivers/usb/core/hub.c in the Linux kernel did not properly maintain a hub-interface data structure, which allowed physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device (bnc#968010). - CVE-2015-7566: The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint (bnc#961512). - CVE-2016-2549: sound/core/hrtimer.c in the Linux kernel did not prevent recursive callback access, which allowed local users to cause a denial of service (deadlock) via a crafted ioctl call (bnc#968013). - CVE-2016-2547: sound/core/timer.c in the Linux kernel employs a locking approach that did not consider slave timer instances, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#968011). - CVE-2016-2548: sound/core/timer.c in the Linux kernel retains certain linked lists after a close or stop action, which allowed local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions (bnc#968012). - CVE-2016-2546: sound/core/timer.c in the Linux kernel uses an incorrect type of mutex, which allowed local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call (bnc#967975). - CVE-2016-2545: The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel did not properly maintain a certain linked list, which allowed local users to cause a denial of service (race condition and system crash) via a crafted ioctl call (bnc#967974). - CVE-2016-2544: Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time (bnc#967973). - CVE-2016-2543: The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel did not verify FIFO assignment before proceeding with FIFO clearing, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call (bnc#967972). - CVE-2015-8709: ** DISPUTED ** kernel/ptrace.c in the Linux kernel mishandles uid and gid mappings, which allowed local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here (bnc#959709 960561 ). - CVE-2015-8812: drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel did not properly identify error conditions, which allowed remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets (bnc#966437). - CVE-2016-2384: Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor (bnc#966693). - CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel allowed local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov (bnc#963765). - CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811). - CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572 986573). - CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362 986365 986377). - CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371). - CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755 984764). - CVE-2015-6526: The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel on ppc64 platforms allowed local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace (bnc#942702). - CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213). The following non-security bugs were fixed: - ALSA: hrtimer: Handle start/stop more properly (bsc#973378). - ALSA: pcm: Fix potential deadlock in OSS emulation (bsc#968018). - ALSA: rawmidi: Fix race at copying & updating the position (bsc#968018). - ALSA: rawmidi: Make snd_rawmidi_transmit() race-free (bsc#968018). - ALSA: seq: Fix double port list deletion (bsc#968018). - ALSA: seq: Fix incorrect sanity check at snd_seq_oss_synth_cleanup() (bsc#968018). - ALSA: seq: Fix leak of pool buffer at concurrent writes (bsc#968018). - ALSA: seq: Fix lockdep warnings due to double mutex locks (bsc#968018). - ALSA: seq: Fix race at closing in virmidi driver (bsc#968018). - ALSA: seq: Fix yet another races among ALSA timer accesses (bsc#968018). - ALSA: timer: Call notifier in the same spinlock (bsc#973378). - ALSA: timer: Code cleanup (bsc#968018). - ALSA: timer: Fix leftover link at closing (bsc#968018). - ALSA: timer: Fix link corruption due to double start or stop (bsc#968018). - ALSA: timer: Fix race between stop and interrupt (bsc#968018). - ALSA: timer: Fix wrong instance passed to slave callbacks (bsc#968018). - ALSA: timer: Protect the whole snd_timer_close() with open race (bsc#973378). - ALSA: timer: Sync timer deletion at closing the system timer (bsc#973378). - ALSA: timer: Use mod_timer() for rearming the system timer (bsc#973378). - Bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849). - Bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849). - Bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849). - Btrfs: do not use src fd for printk (bsc#980348). - Refresh patches.drivers/ALSA-hrtimer-Handle-start-stop-more-properly. Fix the build error on 32bit architectures. - Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469). - Refresh patches.xen/xen3-patch-3.14: Suppress atomic file position updates on /proc/xen/xenbus (bsc#970275). - Subject: [PATCH] USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982706). - USB: usbip: fix potential out-of-bounds write (bnc#975945). - af_unix: Guard against other == sk in unix_dgram_sendmsg (bsc#973570). - backends: guarantee one time reads of shared ring contents (bsc#957988). - btrfs: do not go readonly on existing qgroup items (bsc#957052). - btrfs: remove error message from search ioctl for nonexistent tree. - drm/i915: Fix missing backlight update during panel disablement (bsc#941113 boo#901754). - enic: set netdev->vlan_features (bsc#966245). - ext4: fix races between buffered IO and collapse / insert range (bsc#972174). - ext4: fix races between page faults and hole punching (bsc#972174). - ext4: fix races of writeback with punch hole and zero range (bsc#972174). - ext4: move unlocked dio protection from ext4_alloc_file_blocks() (bsc#972174). - ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360). - ipvs: count pre-established TCP states as active (bsc#970114). - net: core: Correct an over-stringent device loop detection (bsc#945219). - netback: do not use last request to determine minimum Tx credit (bsc#957988). - pciback: Check PF instead of VF for PCI_COMMAND_MEMORY. - pciback: Save the number of MSI-X entries to be copied later. - pciback: guarantee one time reads of shared ring contents (bsc#957988). - series.conf: move cxgb3 patch to network drivers section - usb: quirk to stop runtime PM for Intel 7260 (bnc#984464). - x86: standardize mmap_rnd() usage (bnc#974308). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor