ALT-BU-2017-3328-1
Branch sisyphus update bulletin.
Package kernel-image-std-def updated to version 4.9.46-alt1 for branch sisyphus in task 187625.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- 102009
- 102009
- https://github.com/torvalds/linux/commit/2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- https://github.com/torvalds/linux/commit/2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Modified: 2024-11-21
CVE-2017-17053
The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- 102010
- 102010
- RHSA-2018:0676
- RHSA-2018:0676
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Package kernel-image-un-def updated to version 4.12.10-alt1 for branch sisyphus in task 187626.
Closed vulnerabilities
Modified: 2024-12-18
CVE-2017-13693
The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
- 100502
- 100502
- https://github.com/acpica/acpica/pull/295
- https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
- https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
- https://patchwork.kernel.org/patch/9919053/
- https://patchwork.kernel.org/patch/9919053/
Modified: 2024-12-18
CVE-2017-13694
The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
- 100500
- 100500
- https://github.com/acpica/acpica/pull/278
- https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
- https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
- https://patchwork.kernel.org/patch/9806085/
- https://patchwork.kernel.org/patch/9806085/
Modified: 2024-11-21
CVE-2017-13695
The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
- 100497
- 100497
- https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
- https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
- https://patchwork.kernel.org/patch/9850567/
- https://patchwork.kernel.org/patch/9850567/
- USN-3696-1
- USN-3696-1
- USN-3696-2
- USN-3696-2
- USN-3762-1
- USN-3762-1
- USN-3762-2
- USN-3762-2
Modified: 2024-11-21
CVE-2017-17052
The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the ->exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- 102009
- 102009
- https://github.com/torvalds/linux/commit/2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- https://github.com/torvalds/linux/commit/2b7e8665b4ff51c034c55df3cff76518d1a9ee3a
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Modified: 2024-11-21
CVE-2017-17053
The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccd5b3235180eef3cfec337df1c8554ab151b5cc
- 102010
- 102010
- RHSA-2018:0676
- RHSA-2018:0676
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://github.com/torvalds/linux/commit/ccd5b3235180eef3cfec337df1c8554ab151b5cc
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.10
Closed vulnerabilities
BDU:2017-02094
Уязвимость диспетчера соединений Connman («dnsproxy.c»), позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2017-12865
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
- DSA-3956
- DSA-3956
- 100498
- 100498
- https://01.org/security/intel-oss-10001/intel-oss-10001
- https://01.org/security/intel-oss-10001/intel-oss-10001
- https://bugzilla.redhat.com/show_bug.cgi?id=1483720
- https://bugzilla.redhat.com/show_bug.cgi?id=1483720
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71
- GLSA-201812-02
- GLSA-201812-02
- https://www.nri-secure.com/blog/new-iot-vulnerability-connmando
- https://www.nri-secure.com/blog/new-iot-vulnerability-connmando