| Errata ID | 288 |
|---|---|
| Date | 2016-10-12 |
| Source package | univention-kernel-image |
| Fixed in version | 9.0.0-11.108.201610071354 |
| Description | This update addresses the following issues:
* unix: properly account for FDs passed over unix sockets (CVE-2013-4312)
* KVM: x86: Reload pit counters for all channels when restoring state
(CVE-2015-7513)
* usbvision: fix crash on detecting device with invalid configuration
(CVE-2015-7833)
* KEYS: Fix handling of stored error in a negatively instantiated user key
(CVE-2015-8539)
* ovl: fix permission checking for setattr (CVE-2015-8660)
* fuse: break infinite loop in fuse_fill_write_pages()(CVE-2015-8785)
* iw_cxgb3: Fix incorrectly returning error on success (CVE-2015-8812)
* include/linux/poison.h: fix LIST_POISON{1,2} offset (CVE-2016-0821)
* ecryptfs: forbid opening files without mmap handler (CVE-2016-1583)
* atl2: Disable unimplemented scatter/gather feature (CVE-2016-2117)
* ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()
(CVE-2016-2184)
* Input: ati_remote2 - fix crashes on detecting device with invalid
descriptor (CVE-2016-2185)
* Input: powermate - fix oops with malicious USB descriptors (CVE-2016-2186)
* Input: gtco - fix crash on detecting device without endpoints
(CVE-2016-2187)
* USB: iowarrior: fix oops with malicious USB descriptors (CVE-2016-2188)
* bpf: fix branch offset adjustment on backjumps after patching ctx expansion
(CVE-2016-2383)
* netfilter: x_tables: fix unconditional helper (CVE-2016-3134)
* USB: mct_u232: add sanity checking in probe (CVE-2016-3136)
* USB: cypress_m8: add endpoint sanity check (CVE-2016-3137)
* USB: cdc-acm: more sanity checking (CVE-2016-3138)
* USB: digi_acceleport: do sanity checking for the number of ports
(CVE-2016-3140)
* ipv4: Don't do expensive useless work during inetdev destroy
(CVE-2016-3156)
* Xen: I/O port access privilege escalation in x86-64 Linux (CVE-2016-3157)
* Input: ims-pcu - sanity check against missing interfaces (CVE-2016-3689)
* usbnet: memory corruption triggered by invalid USB descriptor
(CVE-2016-3951)
* USB: usbip: fix potential out-of-bounds write (CVE-2016-3955)
* xen: hugetlbfs use may crash PV Linux guests (CVE-2016-3961)
* KEYS: potential uninitialized variable (CVE-2016-4470)
* net: fix infoleak in llc (CVE-2016-4485)
* net: fix infoleak in rtnetlink (CVE-2016-4486)
* bpf: fix double-fdput in replace_map_fd_with_map_ptr() (CVE-2016-4557)
* IB/security: Restrict use of the write() interface (CVE-2016-4565)
* net: fix a kernel infoleak in x25 module (CVE-2016-4580)
* propogate_mnt: Handle the first propogated copy being a slave
(CVE-2016-4581)
* percpu: fix synchronization between synchronous map extension and chunk
destruction (CVE-2016-4794)
* ppp: take reference on channels netns (CVE-2016-4805)
* get_rock_ridge_filename(): handle malformed NM entries (CVE-2016-4913)
* tipc: check nl sock before parsing nested attributes (CVE-2016-4951)
* netfilter: x_tables: check for bogus target offset (CVE-2016-4997)
* netfilter: x_tables: make sure e->next_offset covers remaining blob size
(CVE-2016-4998)
* media: fix airspy usb probe error path (CVE-2016-5400)
* tcp: make challenge acks less predictable (CVE-2016-5696)
* powerpc/tm: Always reclaim in start_thread() for exec() class syscalls
(CVE-2016-5828)
* HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands
(CVE-2016-5829)
* Race condition in the audit_log_single_execve_arg function in
kernel/auditsc.c in the Linux kernel through 4.7 allows local users to
bypass intended character-set restrictions or disrupt system-call auditing
by changing a certain string, aka a "double fetch" vulnerability.
(CVE-2016-6136)
* Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows
local users to cause a denial of service (out-of-bounds access or system
crash) by changing a certain size value, aka a "double fetch"
vulnerability. (CVE-2016-6480)
* Linux tcp_xmit_retransmit_queue use after free (CVE-2016-6828)
* USB: serial: visor: fix crash on detecting device without write_urbs
(CVE-2015-7566)
* tty: Fix unsafe ldisc reference via ioctl(TIOCGETD) (CVE-2016-0723)
* ALSA: usb-audio: avoid freeing umidi object twice (CVE-2016-2384)
* unix: correctly track in-flight fds in sending process user_struct
(CVE-2016-2550)
* USB: visor: fix null-deref at probe (CVE-2016-2782)
* ppp, slip: Validate VJ compression slot parameters completely
(CVE-2015-7799)
* [media] media/vivid-osd: fix info leak in ioctl (CVE-2015-7884)
* KVM: svm: unconditionally intercept #DB (CVE-2015-8104)
* Xen: when used on a system providing PV backends, allows local guest OS
administrators to cause a denial of service (host OS crash) or gain
privileges by writing to memory shared between the frontend and backend,
aka a double fetch vulnerability (CVE-2015-8550)
* Xen: Linux pciback missing sanity checks leading to crash (CVE-2015-8551)
* sctp: Prevent soft lockup when sctp_accept() is called during a timeout
event (CVE-2015-8767)
* netfilter: nf_nat_redirect: add missing NULL pointer check (CVE-2015-8787)
* USB: fix invalid memory access in hub_activate() (CVE-2015-8816)
* powerpc/tm: Block signal return setting invalid MSR state (CVE-2015-8844)
* powerpc/tm: Check for already reclaimed tasks (CVE-2015-8845)
* nfsd: check permissions when setting ACLs (CVE-2016-1237)
* x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
(CVE-2016-2069)
* EVM: Use crypto_memneq() for digest comparisons (CVE-2016-2085)
* s390/mm: four page table levels vs. fork (CVE-2016-2143)
* ALSA: seq: Fix missing NULL check at remove_events ioctl (CVE-2016-2543)
* ALSA: seq: Fix race at timer setup and close (CVE-2016-2544)
* ALSA: timer: Fix double unlink of active_list (CVE-2016-2545)
* ALSA: timer: Fix race among timer ioctls (CVE-2016-2546)
* ALSA: timer: Harden slave timer list handling (CVE-2016-2547)
* ALSA: hrtimer: Fix stall by hrtimer_cancel() (CVE-2016-2549)
* ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (CVE-2016-4569)
* ALSA: timer: Fix leak in events via snd_timer_user_ccallback
(CVE-2016-4578)
* KVM: PPC: Book3S HV: Save/restore TM state in H_CEDE (CVE-2016-5412)
* ovl: verify upper dentry before unlink and rename (CVE-2016-6197)
* IB/srpt: Simplify srpt_handle_tsk_mgmt() (CVE-2016-6327)
* net: Fix use after free in the recvmmsg exit path (CVE-2016-7117) |
| Additional notes | This is the third part of three parts of the Linux kernel update. |
| CVE ID | CVE-2013-4312 CVE-2015-7513 CVE-2015-7566 CVE-2015-7799 CVE-2015-7833 CVE-2015-7884 CVE-2015-8104 CVE-2015-8539 CVE-2015-8550 CVE-2015-8551 CVE-2015-8660 CVE-2015-8767 CVE-2015-8785 CVE-2015-8787 CVE-2015-8812 CVE-2015-8816 CVE-2015-8844 CVE-2015-8845 CVE-2016-0723 CVE-2016-0821 CVE-2016-1237 CVE-2016-1583 CVE-2016-2069 CVE-2016-2085 CVE-2016-2117 CVE-2016-2143 CVE-2016-2184 CVE-2016-2185 CVE-2016-2186 CVE-2016-2187 CVE-2016-2188 CVE-2016-2383 CVE-2016-2384 CVE-2016-2543 CVE-2016-2544 CVE-2016-2545 CVE-2016-2546 CVE-2016-2547 CVE-2016-2549 CVE-2016-2550 CVE-2016-2782 CVE-2016-3134 CVE-2016-3136 CVE-2016-3137 CVE-2016-3138 CVE-2016-3140 CVE-2016-3156 CVE-2016-3157 CVE-2016-3689 CVE-2016-3951 CVE-2016-3955 CVE-2016-3961 CVE-2016-4470 CVE-2016-4485 CVE-2016-4486 CVE-2016-4557 CVE-2016-4565 CVE-2016-4569 CVE-2016-4578 CVE-2016-4580 CVE-2016-4581 CVE-2016-4794 CVE-2016-4805 CVE-2016-4913 CVE-2016-4951 CVE-2016-4997 CVE-2016-4998 CVE-2016-5400 CVE-2016-5412 CVE-2016-5696 CVE-2016-5828 CVE-2016-5829 CVE-2016-6136 CVE-2016-6197 CVE-2016-6327 CVE-2016-6480 CVE-2016-6828 CVE-2016-7117 |
| UCS Bug number | #41058 |
