ALT-BU-2017-2868-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-5180
Firejail before 0.9.44.4 and 0.9.38.x LTS before 0.9.38.8 LTS does not consider the .Xauthority case during its attempt to prevent accessing user files with an euid of zero, which allows local users to conduct sandbox-escape attacks via vectors involving a symlink and the --private option.
Modified: 2024-11-21
CVE-2017-5206
Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, allows context-dependent attackers to bypass a seccomp-based sandbox protection mechanism via the --allow-debuggers argument.
- [oss-security] 20170107 Re: Firejail local root exploit
- [oss-security] 20170107 Re: Firejail local root exploit
- 97120
- 97120
- https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51
- https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51
- https://firejail.wordpress.com/download-2/release-notes/
- https://firejail.wordpress.com/download-2/release-notes/
- https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e
- https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e
- GLSA-201701-62
- GLSA-201701-62
Modified: 2024-11-21
CVE-2017-5207
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.
- [oss-security] 20170107 Re: Firejail local root exploit
- [oss-security] 20170107 Re: Firejail local root exploit
- 97385
- 97385
- https://firejail.wordpress.com/download-2/release-notes/
- https://firejail.wordpress.com/download-2/release-notes/
- https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc
- https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc
- https://github.com/netblue30/firejail/issues/1023
- https://github.com/netblue30/firejail/issues/1023
- GLSA-201701-62
- GLSA-201701-62
Package kernel-image-un-def updated to version 4.8.16-alt0.M80P.1 for branch p8 in task 175879.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-6213
fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d29216842a85c7970c536108e093963f02714498
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d29216842a85c7970c536108e093963f02714498
- [oss-security] 20160713 Re: cve request: local DoS by overflowing kernel mount table using shared bind mount
- [oss-security] 20160713 Re: cve request: local DoS by overflowing kernel mount table using shared bind mount
- 91754
- 91754
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1356471
- https://bugzilla.redhat.com/show_bug.cgi?id=1356471
- https://github.com/torvalds/linux/commit/d29216842a85c7970c536108e093963f02714498
- https://github.com/torvalds/linux/commit/d29216842a85c7970c536108e093963f02714498
Modified: 2024-11-21
CVE-2016-9755
The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- [oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6
- [oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6
- 94626
- 94626
- https://bugzilla.redhat.com/show_bug.cgi?id=1400904
- https://bugzilla.redhat.com/show_bug.cgi?id=1400904
- https://github.com/torvalds/linux/commit/9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- https://github.com/torvalds/linux/commit/9b57da0630c9fd36ed7a20fc0f98dc82cc0777fa
- https://groups.google.com/forum/#%21topic/syzkaller/GFbGpX7nTEo
- https://groups.google.com/forum/#%21topic/syzkaller/GFbGpX7nTEo
- [netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error
- [netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error