594
edits
Changes
Created page with "== Changes == Since {{kernel link|rhel6|042stab120.6}}: * Stack overflow via ecryptfs and /proc/$pid/environ. (CVE-2016-1583) It was found that stacking a file system over p..."
== Changes ==
Since {{kernel link|rhel6|042stab120.6}}:
* Stack overflow via ecryptfs and /proc/$pid/environ. (CVE-2016-1583)
It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.
* Use after free in tcp_xmit_retransmit_queue. (CVE-2016-6828)
A use after free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.
* block: fix use-after-free in seq file. (CVE-2016-7910)
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
* block: fix use-after-free in sys_ioprio_get(). (CVE-2016-7911)
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
* Creation of a network bridge can break IPv6 setup on host. (PSBM-50920) Kernels from 042stab117.x are affected.
* Fixed host crash in ixgbe driver (10Gb NIC Intel) due to iptables TCP REJECT rule. ({{OVZ|6811}}) Kernels from 042stab117.x are affected
* CPT restore of containers with Unix sockets can crash the host. ({{OVZ|6823}}) All 042stab* kernels are affected.
* Removed WARN_ON in d_delete/unhash_offsprings generated false alert messages. ({{OVZ|6827}}) 042stab112+ kernels are affected
* Other internal improvements.
=== See also ===
* {{CVE|2016-1583}}
* https://source.android.com/security/bulletin/2016-11-01.html
* {{CVE|2016-6828}}
* {{CVE|2016-7910}}
* {{CVE|2016-7911}}
* https://access.redhat.com/solutions/2374831
Since {{kernel link|rhel6|042stab120.6}}:
* Stack overflow via ecryptfs and /proc/$pid/environ. (CVE-2016-1583)
It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.
* Use after free in tcp_xmit_retransmit_queue. (CVE-2016-6828)
A use after free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection.
* block: fix use-after-free in seq file. (CVE-2016-7910)
Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
* block: fix use-after-free in sys_ioprio_get(). (CVE-2016-7911)
Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
* Creation of a network bridge can break IPv6 setup on host. (PSBM-50920) Kernels from 042stab117.x are affected.
* Fixed host crash in ixgbe driver (10Gb NIC Intel) due to iptables TCP REJECT rule. ({{OVZ|6811}}) Kernels from 042stab117.x are affected
* CPT restore of containers with Unix sockets can crash the host. ({{OVZ|6823}}) All 042stab* kernels are affected.
* Removed WARN_ON in d_delete/unhash_offsprings generated false alert messages. ({{OVZ|6827}}) 042stab112+ kernels are affected
* Other internal improvements.
=== See also ===
* {{CVE|2016-1583}}
* https://source.android.com/security/bulletin/2016-11-01.html
* {{CVE|2016-6828}}
* {{CVE|2016-7910}}
* {{CVE|2016-7911}}
* https://access.redhat.com/solutions/2374831