ALT-BU-2017-2929-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2016-9085
Multiple integer overflows in libwebp allows attackers to have unspecified impact via unknown vectors.
- http://www.openwall.com/lists/oss-security/2016/10/27/3
- http://www.securityfocus.com/bid/93928
- https://bugzilla.redhat.com/show_bug.cgi?id=1389338
- https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
- https://security.gentoo.org/glsa/201701-61
- http://www.openwall.com/lists/oss-security/2016/10/27/3
- http://www.securityfocus.com/bid/93928
- https://bugzilla.redhat.com/show_bug.cgi?id=1389338
- https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
- https://security.gentoo.org/glsa/201701-61
Package kernel-image-un-def updated to version 4.9.9-alt1 for branch sisyphus in task 177884.
Closed vulnerabilities
Modified: 2024-12-03
BDU:2017-00296
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-05-16
BDU:2017-01080
Уязвимость операционной системы Linux, позволяющая нарушителю оказать произвольное воздействие
Modified: 2024-05-16
BDU:2017-01081
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2016-10208
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe
- http://seclists.org/fulldisclosure/2016/Nov/75
- http://www.openwall.com/lists/oss-security/2017/02/05/3
- http://www.securityfocus.com/bid/94354
- https://access.redhat.com/errata/RHSA-2017:1297
- https://access.redhat.com/errata/RHSA-2017:1298
- https://access.redhat.com/errata/RHSA-2017:1308
- https://bugzilla.redhat.com/show_bug.cgi?id=1395190
- https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a4b77cd47bb837b8557595ec7425f281f2ca1fe
- http://seclists.org/fulldisclosure/2016/Nov/75
- http://www.openwall.com/lists/oss-security/2017/02/05/3
- http://www.securityfocus.com/bid/94354
- https://access.redhat.com/errata/RHSA-2017:1297
- https://access.redhat.com/errata/RHSA-2017:1298
- https://access.redhat.com/errata/RHSA-2017:1308
- https://bugzilla.redhat.com/show_bug.cgi?id=1395190
- https://github.com/torvalds/linux/commit/3a4b77cd47bb837b8557595ec7425f281f2ca1fe
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
Modified: 2025-04-20
CVE-2017-2596
The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/01/31/4
- http://www.securityfocus.com/bid/95878
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1417812
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/01/31/4
- http://www.securityfocus.com/bid/95878
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://bugzilla.redhat.com/show_bug.cgi?id=1417812
Modified: 2025-04-20
CVE-2017-8071
drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors.
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9
- http://www.openwall.com/lists/oss-security/2017/04/16/4
- http://www.securityfocus.com/bid/97991
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a7b5df84b6b4e5d599c7289526eed96541a0654
- https://github.com/torvalds/linux/commit/7a7b5df84b6b4e5d599c7289526eed96541a0654
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9
- http://www.openwall.com/lists/oss-security/2017/04/16/4
- http://www.securityfocus.com/bid/97991
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a7b5df84b6b4e5d599c7289526eed96541a0654
- https://github.com/torvalds/linux/commit/7a7b5df84b6b4e5d599c7289526eed96541a0654
Modified: 2025-04-20
CVE-2017-8072
The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9
- http://www.openwall.com/lists/oss-security/2017/04/16/4
- http://www.securityfocus.com/bid/98010
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8e9faa15469ed7c7467423db4c62aeed3ff4cae3
- https://github.com/torvalds/linux/commit/8e9faa15469ed7c7467423db4c62aeed3ff4cae3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9
- http://www.openwall.com/lists/oss-security/2017/04/16/4
- http://www.securityfocus.com/bid/98010
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8e9faa15469ed7c7467423db4c62aeed3ff4cae3
- https://github.com/torvalds/linux/commit/8e9faa15469ed7c7467423db4c62aeed3ff4cae3