Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:30230
[Eng]
Version
5
Class
patch
ALTXid
178730
Language
Russian
Severity
Medium
Title
Обновление openSUSE-SU-2016:2290-1 -- обновление безопасности для Linux Kernel
Description
The openSUSE Leap 42.1 kernel was updated to 4.1.31 to receive various security and bugfixes
Family
unix
Platform
openSUSE Leap 42.1
Product
drbd
Reference
VENDOR: openSUSE-SU-2016:2290-1
VENDOR: openSUSE-SU-2016:2290-1
Id:
openSUSE-SU-2016:2290-1
Reference:
https://lists.opensuse.org/opensuse-updates/2016-09/msg00046.html
CVE: CVE-2015-8787
CVE: CVE-2015-8787
Id:
CVE-2015-8787
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8787
Comment
: The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.
CVSSv2 Score:
10
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
476 (NULL Pointer Dereference)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f9cd81436c85d8c3a318ba92e236ede73752fc (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1300731 (CONFIRM)
https://github.com/torvalds/linux/commit/94f9cd81436c85d8c3a318ba92e236ede73752fc (CONFIRM)
[oss-security] 20160127 CVE Request: Linux: NULL pointer dereference netfilter/nf_nat_redirect.c in nf_nat_redirect_ipv4 function (MLIST)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
openSUSE-SU-2016:1008 (SUSE)
USN-2889-1 (UBUNTU)
FEDORA-2016-5d43766e33 (FEDORA)
FEDORA-2016-2f25d12c51 (FEDORA)
USN-2890-1 (UBUNTU)
USN-2890-3 (UBUNTU)
USN-2890-2 (UBUNTU)
USN-2889-2 (UBUNTU)
CVE: CVE-2016-1237
CVE: CVE-2016-1237
Id:
CVE-2016-1237
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237
Comment
: nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
284 (Improper Access Control)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1350845 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=999653786df6954a31044528ac3f7a5dadca08f4 (CONFIRM)
[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it (MLIST)
https://github.com/torvalds/linux/commit/999653786df6954a31044528ac3f7a5dadca08f4 (CONFIRM)
USN-3070-2 (UBUNTU)
91456 (BID)
USN-3070-1 (UBUNTU)
USN-3053-1 (UBUNTU)
DSA-3607 (DEBIAN)
USN-3070-3 (UBUNTU)
USN-3070-4 (UBUNTU)
CVE: CVE-2016-2847
CVE: CVE-2016-2847
Id:
CVE-2016-2847
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847
Comment
: fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
6.2
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
399 (Resource Management Errors)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1313428 (CONFIRM)
[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes (MLIST)
https://github.com/torvalds/linux/commit/759c01142a5d0f364a462346168a56de28a80f52 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=759c01142a5d0f364a462346168a56de28a80f52 (CONFIRM)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1707 (SUSE)
SUSE-SU-2016:1937 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
83870 (BID)
SUSE-SU-2016:2074 (SUSE)
openSUSE-SU-2016:1382 (SUSE)
DSA-3503 (DEBIAN)
USN-2967-1 (UBUNTU)
USN-2967-2 (UBUNTU)
USN-2946-2 (UBUNTU)
USN-2947-3 (UBUNTU)
USN-2948-2 (UBUNTU)
USN-2947-1 (UBUNTU)
USN-2949-1 (UBUNTU)
USN-2947-2 (UBUNTU)
USN-2946-1 (UBUNTU)
USN-2948-1 (UBUNTU)
RHSA-2017:0217 (REDHAT)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
CVE: CVE-2016-3134
CVE: CVE-2016-3134
Id:
CVE-2016-3134
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
Comment
: The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.4
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
SUSE-SU-2016:1690 ()
https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309 ()
https://code.google.com/p/google-security-research/issues/detail?id=758 ()
SUSE-SU-2016:2010 ()
USN-2930-1 ()
SUSE-SU-2016:1696 ()
https://bugzilla.redhat.com/show_bug.cgi?id=1317383 ()
SUSE-SU-2016:1994 ()
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html ()
SUSE-SU-2016:1961 ()
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html ()
USN-2930-2 ()
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d83fc74aa9ec72794373cb47432c5f7fb1a309 ()
SUSE-SU-2016:2001 ()
SUSE-SU-2016:1985 ()
RHSA-2016:1847 ()
SUSE-SU-2016:2006 ()
USN-3049-1 ()
RHSA-2016:1875 ()
SUSE-SU-2016:2014 ()
openSUSE-SU-2016:1641 ()
SUSE-SU-2016:1764 ()
USN-2930-3 ()
DSA-3607 ()
1036763 ()
SUSE-SU-2016:1672 ()
SUSE-SU-2016:2009 ()
USN-2929-1 ()
USN-2932-1 ()
USN-3050-1 ()
SUSE-SU-2016:2005 ()
SUSE-SU-2016:2007 ()
SUSE-SU-2016:2074 ()
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html ()
SUSE-SU-2016:2000 ()
RHSA-2016:1883 ()
SUSE-SU-2016:1995 ()
SUSE-SU-2016:2002 ()
USN-2931-1 ()
USN-2929-2 ()
84305 ()
CVE: CVE-2016-3156
CVE: CVE-2016-3156
Id:
CVE-2016-3156
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
Comment
: The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
399 (Resource Management Errors)
References:
[oss-security] 20160315 CVE request: ipv4: Don't do expensive useless work during inetdev destroy (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2 (CONFIRM)
https://github.com/torvalds/linux/commit/fbd40ea0180a2d328c5adc61414dc8bab9335ce2 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1318172 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1707 (SUSE)
SUSE-SU-2016:1764 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2074 (SUSE)
84428 (BID)
openSUSE-SU-2016:1382 (SUSE)
USN-2968-1 (UBUNTU)
USN-2969-1 (UBUNTU)
USN-2971-1 (UBUNTU)
USN-2971-2 (UBUNTU)
USN-2970-1 (UBUNTU)
USN-2971-3 (UBUNTU)
USN-2968-2 (UBUNTU)
SUSE-SU-2016:1019 (SUSE)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
CVE: CVE-2016-4485
CVE: CVE-2016-4485
Id:
CVE-2016-4485
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
Comment
: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
[oss-security] 20160503 CVE Request: kernel information leak vulnerability in llc module (MLIST)
https://github.com/torvalds/linux/commit/b8670c09f37bdf2847cc44f36511a53afc6161fd (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8670c09f37bdf2847cc44f36511a53afc6161fd (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1333309 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
USN-3006-1 (UBUNTU)
openSUSE-SU-2016:1641 (SUSE)
DSA-3607 (DEBIAN)
90015 (BID)
SUSE-SU-2016:1985 (SUSE)
CVE: CVE-2016-4486
CVE: CVE-2016-4486
Id:
CVE-2016-4486
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
Comment
: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE:
200 (Information Exposure)
References:
[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6 (CONFIRM)
https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1333316 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
USN-2997-1 (UBUNTU)
USN-2996-1 (UBUNTU)
USN-3002-1 (UBUNTU)
USN-3001-1 (UBUNTU)
USN-3004-1 (UBUNTU)
USN-2989-1 (UBUNTU)
USN-3000-1 (UBUNTU)
USN-2998-1 (UBUNTU)
USN-3003-1 (UBUNTU)
USN-3005-1 (UBUNTU)
USN-3007-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
USN-3006-1 (UBUNTU)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2074 (SUSE)
90051 (BID)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
SUSE-SU-2016:2105 (SUSE)
46006 (EXPLOIT-DB)
CVE: CVE-2016-4557
CVE: CVE-2016-4557
Id:
CVE-2016-4557
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557
Comment
: The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
CWE-Other ()
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1334307 (CONFIRM)
https://github.com/torvalds/linux/commit/8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 (CONFIRM)
https://bugs.chromium.org/p/project-zero/issues/detail?id=808 (MISC)
https://bugs.debian.org/823603 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation) (MLIST)
openSUSE-SU-2016:1641 (SUSE)
40759 (EXPLOIT-DB)
CVE: CVE-2016-4569
CVE: CVE-2016-4569
Id:
CVE-2016-4569
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
Comment
: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cec8f96e49d9be372fdb0c3836dcf31ec71e457e (CONFIRM)
https://github.com/torvalds/linux/commit/cec8f96e49d9be372fdb0c3836dcf31ec71e457e (CONFIRM)
[oss-security] 20160509 Re: CVE Request: kernel information leak vulnerability in Linux sound module (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1334643 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1696 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
90347 (BID)
SUSE-SU-2016:2105 (SUSE)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
CVE: CVE-2016-4578
CVE: CVE-2016-4578
Id:
CVE-2016-4578
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
Comment
: sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 (CONFIRM)
https://github.com/torvalds/linux/commit/e4ec8cc8039a7063e24204299b462bd1383184a5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1335215 (CONFIRM)
[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer (MLIST)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4ec8cc8039a7063e24204299b462bd1383184a5 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
SUSE-SU-2016:1937 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
SUSE-SU-2016:2105 (SUSE)
90535 (BID)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
46529 (EXPLOIT-DB)
CVE: CVE-2016-4580
CVE: CVE-2016-4580
Id:
CVE-2016-4580
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
Comment
: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8 (CONFIRM)
[oss-security] 20160510 CVE Request: x25: a kernel infoleak in x25_negotiate_facilities() (MLIST)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
USN-3021-1 (UBUNTU)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
openSUSE-SU-2016:1641 (SUSE)
90528 (BID)
DSA-3607 (DEBIAN)
SUSE-SU-2016:1985 (SUSE)
CVE: CVE-2016-4805
CVE: CVE-2016-4805
Id:
CVE-2016-4805
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
Comment
: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89 (CONFIRM)
https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1335803 (CONFIRM)
[oss-security] 20160515 Re: CVE Requests: Linux: use-after-free issue for ppp channel (MLIST)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2 (CONFIRM)
USN-3021-1 (UBUNTU)
SUSE-SU-2016:1672 (SUSE)
SUSE-SU-2016:1690 (SUSE)
USN-3021-2 (UBUNTU)
SUSE-SU-2016:1937 (SUSE)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
openSUSE-SU-2016:1641 (SUSE)
openSUSE-SU-2016:2184 (SUSE)
DSA-3607 (DEBIAN)
SUSE-SU-2016:2105 (SUSE)
90605 (BID)
SUSE-SU-2016:1985 (SUSE)
1036763 (SECTRACK)
CVE: CVE-2016-4951
CVE: CVE-2016-4951
Id:
CVE-2016-4951
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951
Comment
: The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
CWE-Other ()
References:
[oss-security] 20160521 Re: CVE request: -- Linux kernel: Null pointer dereference in tipc_nl_publ_dump (MLIST)
https://github.com/torvalds/linux/commit/45e093ae2830cd1264677d47ff9a95a71f5d9f9c (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45e093ae2830cd1264677d47ff9a95a71f5d9f9c (CONFIRM)
[netdev] 20160514 BUG: net/tipc: NULL-ptr dereference in tipc_nl_publ_dump (MLIST)
USN-3016-3 (UBUNTU)
USN-3017-2 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3017-1 (UBUNTU)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
openSUSE-SU-2016:1641 (SUSE)
CVE: CVE-2016-4998
CVE: CVE-2016-4998
Id:
CVE-2016-4998
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
Comment
: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
CVSSv2 Score:
5.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:C
CVSSv3 Score:
7.1
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) (MLIST)
https://bugzilla.redhat.com/show_bug.cgi?id=1349886 (CONFIRM)
https://github.com/torvalds/linux/commit/6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91 (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6e94e0cfb0887e4013b3b930fa6ab1fe6bb6ba91 (CONFIRM)
USN-3017-2 (UBUNTU)
USN-3018-2 (UBUNTU)
USN-3016-4 (UBUNTU)
USN-3016-1 (UBUNTU)
USN-3016-2 (UBUNTU)
USN-3016-3 (UBUNTU)
USN-3018-1 (UBUNTU)
USN-3019-1 (UBUNTU)
USN-3017-3 (UBUNTU)
USN-3020-1 (UBUNTU)
USN-3017-1 (UBUNTU)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html (CONFIRM)
openSUSE-SU-2016:2184 (SUSE)
DSA-3607 (DEBIAN)
1036171 (SECTRACK)
SUSE-SU-2016:2105 (SUSE)
91451 (BID)
RHSA-2017:0036 (REDHAT)
RHSA-2016:1883 (REDHAT)
RHSA-2016:1875 (REDHAT)
RHSA-2016:1847 (REDHAT)
CVE: CVE-2016-5696
CVE: CVE-2016-5696
Id:
CVE-2016-5696
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
Comment
: net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
CVSSv3 Score:
4.8
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
CWE:
200 (Information Exposure)
References:
https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1354708 (CONFIRM)
[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak. (MLIST)
http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html (CONFIRM)
https://github.com/Gnoxter/mountain_goat (MISC)
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html (CONFIRM)
http://source.android.com/security/bulletin/2016-10-01.html (CONFIRM)
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf (MISC)
USN-3072-2 (UBUNTU)
USN-3071-1 (UBUNTU)
RHSA-2016:1657 (REDHAT)
91704 (BID)
1036625 (SECTRACK)
USN-3070-3 (UBUNTU)
USN-3070-2 (UBUNTU)
RHSA-2016:1633 (REDHAT)
RHSA-2016:1631 (REDHAT)
RHSA-2016:1632 (REDHAT)
USN-3072-1 (UBUNTU)
https://kc.mcafee.com/corporate/index?page=content&id=SB10167 (CONFIRM)
USN-3070-4 (UBUNTU)
RHSA-2016:1664 (REDHAT)
USN-3070-1 (UBUNTU)
RHSA-2016:1814 (REDHAT)
RHSA-2016:1815 (REDHAT)
USN-3071-2 (UBUNTU)
https://bto.bluecoat.com/security-advisory/sa131 (CONFIRM)
RHSA-2016:1939 (REDHAT)
https://security.paloaltonetworks.com/CVE-2016-5696 (CONFIRM)
https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23 (MISC)
CVE: CVE-2016-6480
CVE: CVE-2016-6480
Id:
CVE-2016-6480
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480
Comment
: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.1
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
20160801 [CVE-2016-6480] Double-Fetch Vulnerability in Linux-4.5/drivers/scsi/aacraid/commctrl.c (BUGTRAQ)
https://bugzilla.redhat.com/show_bug.cgi?id=1362466 (CONFIRM)
SUSE-SU-2016:2230 (SUSE)
SUSE-SU-2016:2175 (SUSE)
SUSE-SU-2016:2177 (SUSE)
SUSE-SU-2016:2178 (SUSE)
SUSE-SU-2016:2181 (SUSE)
SUSE-SU-2016:2179 (SUSE)
SUSE-SU-2016:2180 (SUSE)
92214 (BID)
SUSE-SU-2016:2174 (SUSE)
RHSA-2017:0817 (REDHAT)
RHSA-2016:2584 (REDHAT)
RHSA-2016:2574 (REDHAT)
CVE: CVE-2016-6828
CVE: CVE-2016-6828
Id:
CVE-2016-6828
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828
Comment
: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
416 (Use After Free)
References:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb1fceca22492109be12640d49f5ea5a544c6bb4 (CONFIRM)
[oss-security] 20160815 Linux tcp_xmit_retransmit_queue use after free on 4.8-rc1 / master (MLIST)
https://github.com/torvalds/linux/commit/bb1fceca22492109be12640d49f5ea5a544c6bb4 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1367091 (CONFIRM)
92452 (BID)
https://source.android.com/security/bulletin/2016-11-01.html (CONFIRM)
https://marcograss.github.io/security/linux/2016/08/18/cve-2016-6828-linux-kernel-tcp-uaf.html (MISC)
RHSA-2017:0113 (REDHAT)
RHSA-2017:0091 (REDHAT)
RHSA-2017:0086 (REDHAT)
RHSA-2017:0036 (REDHAT)
Content available only for registered users!
ovaldb@altx-soft.com