ALT-BU-2017-2938-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 4.9.10-alt1 for branch sisyphus in task 178247.
Closed vulnerabilities
BDU:2018-00378
Уязвимость функции mem_check_range (drivers/infiniband/sw/rxe/rxe_mr.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2016-8636
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10
- http://www.openwall.com/lists/oss-security/2017/02/11/9
- http://www.securityfocus.com/bid/96189
- https://bugzilla.redhat.com/show_bug.cgi?id=1421981
- https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/
- https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10
- http://www.openwall.com/lists/oss-security/2017/02/11/9
- http://www.securityfocus.com/bid/96189
- https://bugzilla.redhat.com/show_bug.cgi?id=1421981
- https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/
- https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
Modified: 2024-11-21
CVE-2017-2618
A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
- http://www.securityfocus.com/bid/96272
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
- https://marc.info/?l=selinux&m=148588165923772&w=2
- https://www.debian.org/security/2017/dsa-3791
- http://www.securityfocus.com/bid/96272
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
- https://marc.info/?l=selinux&m=148588165923772&w=2
- https://www.debian.org/security/2017/dsa-3791
Modified: 2025-04-20
CVE-2017-5967
The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
- http://www.securityfocus.com/bid/96271
- https://bugzilla.kernel.org/show_bug.cgi?id=193921
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
- http://www.securityfocus.com/bid/96271
- https://bugzilla.kernel.org/show_bug.cgi?id=193921
Modified: 2025-04-20
CVE-2017-5970
The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/12/3
- http://www.securityfocus.com/bid/96233
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1421638
- https://github.com/torvalds/linux/commit/34b2cef20f19c87999fff3da4071e66937db9644
- https://patchwork.ozlabs.org/patch/724136/
- https://source.android.com/security/bulletin/2017-07-01
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/12/3
- http://www.securityfocus.com/bid/96233
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1421638
- https://github.com/torvalds/linux/commit/34b2cef20f19c87999fff3da4071e66937db9644
- https://patchwork.ozlabs.org/patch/724136/
- https://source.android.com/security/bulletin/2017-07-01
Package LibreOffice updated to version 5.3.0.3-alt1 for branch sisyphus in task 178229.
Closed vulnerabilities
BDU:2017-01193
Уязвимость функции ReadJPEG пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-01264
Уязвимость функции EnhWMFReader::ReadEnhWMF пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
BDU:2017-01548
Уязвимость функции HWPFile::TagsRead пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01549
Уязвимость функции tools::Polygon::Insert пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01555
Уязвимость функции SVMConverter::ImplConvertFromSVM1 пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2016-10327
LibreOffice before 2016-12-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the EnhWMFReader::ReadEnhWMF function in vcl/source/filter/wmf/enhwmf.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/
- http://www.securityfocus.com/bid/97668
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313
- https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416
- https://security.gentoo.org/glsa/201706-28
- http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/
- http://www.securityfocus.com/bid/97668
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313
- https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416
- https://security.gentoo.org/glsa/201706-28
Modified: 2025-04-20
CVE-2017-7856
LibreOffice before 2017-03-11 has an out-of-bounds write caused by a heap-based buffer overflow in the SVMConverter::ImplConvertFromSVM1 function in vcl/source/gdi/svmconverter.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
- http://www.securityfocus.com/bid/97667
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
- https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
- http://www.securityfocus.com/bid/97667
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
- https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
Modified: 2025-04-20
CVE-2017-7870
LibreOffice before 2017-01-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tools::Polygon::Insert function in tools/source/generic/poly.cxx.
- http://www.debian.org/security/2017/dsa-3837
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/
- http://www.securityfocus.com/bid/97671
- http://www.securitytracker.com/id/1039029
- https://access.redhat.com/errata/RHSA-2017:1975
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372
- https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722
- https://security.gentoo.org/glsa/201706-28
- http://www.debian.org/security/2017/dsa-3837
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/
- http://www.securityfocus.com/bid/97671
- http://www.securitytracker.com/id/1039029
- https://access.redhat.com/errata/RHSA-2017:1975
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372
- https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722
- https://security.gentoo.org/glsa/201706-28
Modified: 2025-04-20
CVE-2017-7882
LibreOffice before 2017-03-14 has an out-of-bounds write related to the HWPFile::TagsRead function in hwpfilter/source/hwpfile.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
- http://www.securityfocus.com/bid/97684
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
- https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
- http://www.securityfocus.com/bid/97684
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
- https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
Modified: 2025-04-20
CVE-2017-8358
LibreOffice before 2017-03-17 has an out-of-bounds write caused by a heap-based buffer overflow related to the ReadJPEG function in vcl/source/filter/jpeg/jpegc.cxx.
- http://www.securityfocus.com/bid/98395
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
- https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c
- http://www.securityfocus.com/bid/98395
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
- https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c