Kernel Update Version:
Release Date:
2022-03-02 08:28:02
  • PSBM-57010

    Fuse: potential lockup in fuse_wait_on_page_writeback().

    Fuse: potential lockup in fuse_wait_on_page_writeback().
  • PSBM-56703

    User-triggerable WARN_ON() in the page allocator.

    It was found that a user may trigger WARN_ON() in page allocator by requesting too many groups.
  • PSBM-56606

    Lockdep: suspicious rcu_dereference_protected() usage in af_netlink.c.

    Lockdep: suspicious rcu_dereference_protected() usage in af_netlink.c.
  • PSBM-55919

    Fuse: performance problems in the implementation of fsync/fdatasync.

    1. There is no need for mtime flush on fdatasync(). 2. Excessive locking in fuse_fsync().
  • PSBM-56474

    Fuse: lockup in invalidate_inode_pages2_range().

    Fuse: lockup in invalidate_inode_pages2_range().
  • PSBM-56609

    Out-of-bounds memory read in keyring_compare_object().

    A problem was found in the implementation of assoc_array that may cause an out-of-bounds read access in keyring_compare_object().
  • PSBM-56839

    Some operations with btrfs subvolumes may consume all kernel memory.

    An unprivileged user with the read-write access to more than one btrfs subvolume may easily consume all kernel memory (eventually triggering oom-killer).
  • CVE-2016-9806

    Potential double free in netlink_dump().

    A double free vulnerability was found in netlink_dump(), which could cause a denial of service or possibly other unspecified impact.
  • CVE-2016-8645

    A BUG() statement can be hit in net/ipv4/tcp_input.c.

    It was discovered that the Linux kernel since 3.6-rc1 with net.ipv4.tcp_fastopen set to 1 can hit BUG() statement in tcp_collapse() function after making a number of certain syscalls leading to a possible system crash.
  • CVE-2016-8655

    Race condition in net/packet/af_packet.c which leads to a use-after-free.

    A race-condition was found in net/packet/af_packet.c. It can be exploited to gain kernel code execution from unprivileged processes.
  • CVE-2016-9555

    Slab out-of-bounds access in sctp_sf_ootb().

    A bug was found in the Linux kernel sctp implementation which allows a remote attacker to trigger a slab-out-of-bounds access with an offset up to 64K bytes and cause a system crash.
  • CVE-2016-0723

    Kernel memory disclosure and crash in tty layer.

    A use-after-free flaw was discovered in the Linux kernel's tty subsystem, which allows for the disclosure of uncontrolled memory location and possible kernel panic. The information leak is caused by a race condition when attempting to set and read the tty line discipline. A local attacker could use the TIOCSETD (via tty_set_ldisc) to switch to a new line discipline; a concurrent call to a TIOCGETD ioctl performing a read on a given tty could then access previously allocated memory. Up to 4 bytes could be leaked when querying the line discipline or the kernel could panic with a NULL-pointer dereference.
  • CVE-2016-8650

    Null pointer dereference via keyctl.

    A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key.
  • CVE-2016-7911

    block: fix use-after-free in sys_ioprio_get().

    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
  • CVE-2016-7910

    block: fix use-after-free in seq file.

    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
  • CVE-2016-8630

    kvm: x86: NULL pointer dereference during instruction decode.

    An error was found in the x86 instruction decoder in KVM that may result in the kernel crash on the host. Trying to process some invalid instructions may trigger a NULL pointer dereference.
  • CVE-2016-7097

    Setting a POSIX ACL via setxattr doesn't clear the setgid bit.

    When file permissions are modified via chmod and the user is not in the owning group or capable of CAP_FSETID, the setgid bit is cleared in inode_change_ok(). Setting a POSIX ACL via setxattr sets the file permissions as well as the new ACL, but doesn't clear the setgid bit in a similar way; this allows to bypass the check in chmod.
  • PSBM-54126

    Out of bounds access in sctp_add_bind_addr.

    It was found that sctp_add_bind_addr() may read more bytes than expected in case the parameter is a IPv4 address supplied by the user. The kernel might crash as a result.!msg/syzkaller/BhOYz2ZBraw/-k3iDvD8BAAJ
  • CVE-2016-5195

    mm: privilege escalation via MAP_PRIVATE COW breakage.

    A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
  • PSBM-52390

    virtio-net: tx stall due to failed allocations of large skbs.

    virtio-net: tx stall due to failed allocations of large skbs.
  • CVE-2016-3070

    Null pointer dereference in trace_writeback_dirty_page().

    An attempt to move page mapped by AIO ring buffer to the other node triggers NULL pointer dereference at trace_writeback_dirty_page(), because is 0.
  • CVE-2016-6828

    Use after free in tcp_xmit_retransmit_queue.

    A use after free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. Patch:
  • CVE-2016-6136

    audit: Race condition vulnerability in execve argv arguments.

    Race condition in the audit_log_single_execve_arg function in the Linux kernel allows local users to bypass intended character-set restrictions or disrupt audit of the system calls. Patch: