The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Linux kernel

vulnerability announce CVE-2016-4470

Linux kernel: use after free via key_reject_and_link

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via key_reject_and_link of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, Android OS, NSM Central Manager, NSMXpress, Linux, openSUSE, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 16/06/2016.
Identifiers: CERTFR-2016-AVI-267, CERTFR-2016-AVI-278, CERTFR-2016-AVI-329, CERTFR-2017-AVI-034, CERTFR-2017-AVI-053, CVE-2016-4470, DLA-609-1, DSA-3607-1, FEDORA-2016-1c409313f4, FEDORA-2016-63ee0999e4, FEDORA-2016-73a733f4d9, JSA10853, openSUSE-SU-2016:1798-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2184-1, RHSA-2016:1532-02, RHSA-2016:1539-01, RHSA-2016:1541-03, RHSA-2016:1657-01, RHSA-2016:2006-01, RHSA-2016:2074-01, RHSA-2016:2076-01, RHSA-2016:2128-01, RHSA-2016:2133-01, SOL55672042, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2018-1, SUSE-SU-2016:2105-1, SUSE-SU-2016:2245-1, SUSE-SU-2017:0333-1, SUSE-SU-2017:0471-1, USN-3049-1, USN-3050-1, USN-3051-1, USN-3052-1, USN-3053-1, USN-3054-1, USN-3055-1, USN-3056-1, USN-3057-1, VIGILANCE-VUL-19912.

Description of the vulnerability

The Linux kernel can manage cryptographic keys.

However, when the registration of a key fails, an uninitialized variable is used, which lead to early freeing a of a memory area which will be reused.

An attacker can therefore force the usage of a freed memory area via key_reject_and_link of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-1583

Linux kernel: memory corruption via eCryptfs

Synthesis of the vulnerability

An attacker can generate a memory corruption via eCryptfs of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Android OS, NSM Central Manager, NSMXpress, Linux, openSUSE, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 10/06/2016.
Revision date: 13/06/2016.
Identifiers: 836, CERTFR-2016-AVI-199, CERTFR-2016-AVI-267, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, CERTFR-2017-AVI-034, CVE-2016-1583, DLA-516-1, DSA-3607-1, FEDORA-2016-1c409313f4, FEDORA-2016-63ee0999e4, FEDORA-2016-73a733f4d9, JSA10774, JSA10853, openSUSE-SU-2016:1641-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2184-1, RHSA-2016:2124-01, RHSA-2016:2126-01, RHSA-2016:2127-01, RHSA-2016:2766-01, RHSA-2017:2760-01, SUSE-SU-2016:1596-1, SUSE-SU-2016:1672-1, SUSE-SU-2016:1696-1, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2105-1, SUSE-SU-2016:2245-1, SUSE-SU-2017:0333-1, USN-2996-1, USN-2997-1, USN-2998-1, USN-2999-1, USN-3000-1, USN-3001-1, USN-3002-1, USN-3003-1, USN-3004-1, USN-3005-1, USN-3006-1, USN-3007-1, USN-3008-1, VIGILANCE-VUL-19861.

Description of the vulnerability

The Linux kernel implements eCryptfs, to encrypt user data.

However, the mmap() system call is performed on a low level filesystem not supporting it, which corrupts the memory.

An attacker can therefore generate a memory corruption via eCryptfs of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-5243

Linux kernel: information disclosure via tipc_nl_compat_link_dump

Synthesis of the vulnerability

A local attacker can read a memory fragment via tipc_nl_compat_link_dump() on the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Fedora, Linux, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 03/06/2016.
Identifiers: CERTFR-2016-AVI-278, CERTFR-2017-AVI-162, CERTFR-2017-AVI-282, CERTFR-2017-AVI-311, CVE-2016-5243, DLA-516-1, DSA-3607-1, FEDORA-2016-3daf782dfa, FEDORA-2016-80edb9d511, FEDORA-2016-e14374472f, SUSE-SU-2017:1247-1, SUSE-SU-2017:1301-1, SUSE-SU-2017:1360-1, SUSE-SU-2017:2342-1, SUSE-SU-2017:2525-1, USN-3049-1, USN-3050-1, USN-3051-1, USN-3052-1, USN-3053-1, USN-3054-1, USN-3055-1, USN-3056-1, USN-3057-1, VIGILANCE-VUL-19794.

Description of the vulnerability

The Linux kernel implements TIPC (Transparent Inter Process Communication).

However, the tipc_nl_compat_link_dump() function of the net/tipc/netlink_compat.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via tipc_nl_compat_link_dump() on the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-5244

Linux kernel: information disclosure via rds_inc_info_copy

Synthesis of the vulnerability

A local attacker can read a memory fragment via rds_inc_info_copy() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Fedora, Linux, openSUSE, openSUSE Leap, Solaris, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 03/06/2016.
Identifiers: CERTFR-2016-AVI-267, CERTFR-2016-AVI-289, CERTFR-2017-AVI-034, cpuoct2018, CVE-2016-5244, DLA-516-1, DSA-3607-1, FEDORA-2016-3daf782dfa, FEDORA-2016-80edb9d511, FEDORA-2016-e14374472f, openSUSE-SU-2016:1641-1, openSUSE-SU-2016:2144-1, openSUSE-SU-2016:2184-1, SUSE-SU-2016:1672-1, SUSE-SU-2016:1690-1, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2105-1, SUSE-SU-2016:2245-1, SUSE-SU-2017:0333-1, USN-3070-1, USN-3070-2, USN-3070-3, USN-3070-4, USN-3071-1, USN-3071-2, USN-3072-1, USN-3072-2, VIGILANCE-VUL-19793.

Description of the vulnerability

The Linux kernel implements RDS (Reliable Datagram Sockets).

However, the rds_inc_info_copy() function of the net/rds/recv.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via rds_inc_info_copy() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin 19763

Linux kernel: denial of service via a Frescologic PCI device of type 0x1009

Synthesis of the vulnerability

An attacker can use a Frescologic device of PCI type 0x1009 by the Linux kernel, in order to trigger a denial of service.
Impacted products: Linux.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: physical access.
Creation date: 02/06/2016.
Identifiers: VIGILANCE-VUL-19763.

Description of the vulnerability

The Linux kernel manages Frescologic devices.

The PCI device of type number 1009 hexadecimal can exchange data with the main memory with the DMA controller. However, when the access is done in the mode "XHCI STREAMS", the DMA access are invalid and the device corrupt the main memory.

An attacker can therefore use a Frescologic device of PCI type 0x1009 by the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 19687

Linux kernel: information disclosure via PACKET_DIAG_MCLIST

Synthesis of the vulnerability

A local attacker can read a memory fragment via PACKET_DIAG_MCLIST on the Linux kernel, in order to obtain sensitive information.
Impacted products: Linux.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 24/05/2016.
Identifiers: VIGILANCE-VUL-19687.

Description of the vulnerability

The Linux kernel uses the PACKET_DIAG_MCLIST command to obtain information about packets.

However, the packet_mc_add() function of the net/packet/af_packet.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via PACKET_DIAG_MCLIST on the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-4951

Linux kernel: NULL pointer dereference via tipc_nl_publ_dump

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced via tipc_nl_publ_dump() on the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, openSUSE Leap, Ubuntu.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 23/05/2016.
Identifiers: CERTFR-2016-AVI-220, CVE-2016-4951, FEDORA-2016-2363b37a98, FEDORA-2016-c1faf6005c, openSUSE-SU-2016:1641-1, openSUSE-SU-2016:2290-1, USN-3016-1, USN-3016-2, USN-3016-3, USN-3016-4, USN-3017-1, USN-3017-2, USN-3017-3, USN-3020-1, VIGILANCE-VUL-19674.

Description of the vulnerability

An attacker can force a NULL pointer to be dereferenced via tipc_nl_publ_dump() on the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-4440

Linux kernel: privilege escalation via MSR

Synthesis of the vulnerability

A local attacker can alter the MSR on the Linux kernel with KVM, in order to escalate his privileges.
Impacted products: Fedora, Linux.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 20/05/2016.
Identifiers: CVE-2016-4440, FEDORA-2016-06f1572324, VIGILANCE-VUL-19671.

Description of the vulnerability

The Linux kernel can be configured with CONFIG_KVM and SynIC (Hyper-v Synthetic Interrupt Controller).

However, in this configuration, a local attacker can alter the MSR (Machine Specific Register).

A local attacker can therefore alter the MSR on the Linux kernel with KVM, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-4913

Linux kernel: information disclosure via get_rock_ridge_filename

Synthesis of the vulnerability

A local attacker can read a memory fragment via get_rock_ridge_filename() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Fedora, Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 18/05/2016.
Identifiers: CERTFR-2016-AVI-220, CERTFR-2016-AVI-267, CERTFR-2017-AVI-034, CVE-2016-4913, DLA-516-1, DSA-3607-1, FEDORA-2016-06f1572324, FEDORA-2016-2363b37a98, FEDORA-2016-c1faf6005c, openSUSE-SU-2016:2144-1, RHSA-2018:3083-01, RHSA-2018:3096-01, SUSE-SU-2016:1672-1, SUSE-SU-2016:1985-1, SUSE-SU-2016:2245-1, SUSE-SU-2017:0333-1, USN-3016-1, USN-3016-2, USN-3016-3, USN-3016-4, USN-3017-1, USN-3017-2, USN-3017-3, USN-3018-1, USN-3018-2, USN-3019-1, USN-3020-1, USN-3021-1, USN-3021-2, VIGILANCE-VUL-19650.

Description of the vulnerability

The Linux kernel supports Rock Ridge extensions for ISO9660.

However, the get_rock_ridge_filename() function of the fs/isofs/rock.c file returns too many data when an entry contains the nul ('\0') character.

A local attacker can therefore read a memory fragment via get_rock_ridge_filename() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2016-3707

Linux kernel RT: denial of service via Ping SysRq

Synthesis of the vulnerability

An attacker can send a Ping packet to use a SysRq command on the Linux kernel with the RT patch, in order to trigger a denial of service.
Impacted products: Linux, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: intranet client.
Creation date: 17/05/2016.
Identifiers: CERTFR-2016-AVI-267, CERTFR-2016-AVI-275, CVE-2016-3707, RHSA-2016:1341-01, SUSE-SU-2016:1764-1, SUSE-SU-2016:1937-1, SUSE-SU-2016:1985-1, VIGILANCE-VUL-19618.

Description of the vulnerability

The kernel-rt patch can be applied on the Linux kernel.

This patch contains a debugging feature enabled via /sys/kernel/debug/network_sysrq_enable. It allows to remotely send an ICMP Echo (ping) packet containing a SysRq command to run (stop processes, reboot, etc.).

This sysRq command is only executed if the ICMP packet contains the expected cookie. However, a remote attacker can perform a brute force to find this cookie (a local attacker can merely read the /sys/kernel/debug/network_sysrq_magic file).

An attacker can therefore send a Ping packet to use a SysRq command on the Linux kernel with the RT patch, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Linux kernel: