DescriptionThe LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
Overall state of this security issue: Pending
This issue is currently rated as having low severity.
|National Vulnerability Database||SUSE|
|National Vulnerability Database|
Note from the SUSE Security TeamThis problem should only affect 32bit kernels, and is a hardening measure and not a direct exploitable issue. We currently do not plan to fix this issue. SUSE Bugzilla entry: 994624 [RESOLVED / WONTFIX] No SUSE Security Announcements cross referenced.
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Desktop 11 SP3||kernel-source||Released|
|SUSE Linux Enterprise Desktop 11 SP4||kernel-source||Released|
|SUSE Linux Enterprise Desktop 12 SP1||kernel-source||Affected|
|SUSE Linux Enterprise Server 11 SP2 LTSS||kernel-source||Released|
|SUSE Linux Enterprise Server 11 SP3||kernel-source||Released|
|SUSE Linux Enterprise Server 11 SP3 LTSS||kernel-source||Released|
|SUSE Linux Enterprise Server 11 SP4||kernel-source||Released|
|SUSE Linux Enterprise Server 12 GA LTSS||kernel-source||Affected|
|SUSE Linux Enterprise Server 12 SP1||kernel-source||Affected|
|SUSE Linux Enterprise Server for VMWare 11 SP3||kernel-source||Released|