|
The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.49 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in
net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary
code via vectors involving a recvmmsg system call that was mishandled during
error processing (bnc#1003077).
- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in
drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel
allowed local users to cause a denial of service or possibly have unspecified
other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call
(bnc#1021294).
- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in
the VideoCore DRM driver in the Linux kernel did not set an errno value upon
certain overflow detections, which allowed local users to cause a denial of
service (incorrect pointer dereference and OOPS) via inconsistent size values
in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux
kernel preserved the setgid bit during a setxattr call involving a tmpfs
filesystem, which allowed local users to gain group privileges by leveraging
the existence of a setgid program with restrictions on execute permissions.
(bnc#1021258).
- CVE-2017-2583: The load_segment_descriptor implementation in
arch/x86/kvm/emulate.c in the Linux kernel improperly emulated a "MOV SS,
NULL selector" instruction, which allowed guest OS users to cause a denial of
service (guest OS crash) or gain guest OS privileges via a crafted
application (bnc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users
to obtain sensitive information from kernel memory or cause a denial of
service (use-after-free) via a crafted application that leverages instruction
emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2015-8709: kernel/ptrace.c in the Linux kernel mishandled uid and gid
mappings, which allowed local users to gain privileges by establishing a user
namespace, waiting for a root process to enter that namespace with an unsafe
uid or gid, and then using the ptrace system call. NOTE: the vendor states
"there is no kernel bug here" (bnc#1010933).
- CVE-2016-9806: Race condition in the netlink_dump function in
net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a
denial of service (double free) or possibly have unspecified other impact via
a crafted application that made sendmsg system calls, leading to a free
operation associated with a new dump that started earlier than anticipated
(bnc#1013540).
- CVE-2017-5897: fixed a bug in the Linux kernel IPv6 implementation which
allowed remote attackers to trigger an out-of-bounds access, leading to a
denial-of-service attack (bnc#1023762).
- CVE-2017-5970: Fixed a possible denial-of-service that could have been
triggered by sending bad IP options on a socket (bsc#1024938).
- CVE-2017-5986: an application could have triggered a BUG_ON() in
sctp_wait_for_sndbuf() if the socket TX buffer was full, a thread was waiting
on it to queue more data, and meanwhile another thread peeled off the
association being used by the first thread (bsc#1025235).
The following non-security bugs were fixed:
|