ALT-BU-2017-3371-1
Branch t7 update bulletin.
Package kernel-image-un-def updated to version 4.1.44-alt0.M70P.1 for branch t7 in task 188627.
Closed vulnerabilities
BDU:2017-01748
Уязвимость функции mp_override_legacy_irq ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2017-02025
Уязвимость функции sanity_check_ckpt операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2017-02488
Уязвимость функции packet_set_ring (net/packet/af_packet.c) ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии, вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00521
Уязвимость драйвера контроллера i8042 операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2017-1000111
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
Modified: 2024-11-21
CVE-2017-10663
The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15d3042a937c13f5d9244241c7a9c8416ff6e82a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15d3042a937c13f5d9244241c7a9c8416ff6e82a
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
- 100215
- 100215
- https://bugzilla.redhat.com/show_bug.cgi?id=1481149
- https://bugzilla.redhat.com/show_bug.cgi?id=1481149
- https://github.com/torvalds/linux/commit/15d3042a937c13f5d9244241c7a9c8416ff6e82a
- https://github.com/torvalds/linux/commit/15d3042a937c13f5d9244241c7a9c8416ff6e82a
- https://source.android.com/security/bulletin/2017-08-01
- https://source.android.com/security/bulletin/2017-08-01
Modified: 2024-11-21
CVE-2017-11473
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
- 100010
- 100010
- RHSA-2018:0654
- RHSA-2018:0654
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
- https://source.android.com/security/bulletin/pixel/2018-01-01
- https://source.android.com/security/bulletin/pixel/2018-01-01
- USN-3754-1
- USN-3754-1
Modified: 2024-11-21
CVE-2017-18079
drivers/input/serio/i8042.c in the Linux kernel before 4.12.4 allows attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact because the port->exists value can change after it is validated.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226
- 102895
- 102895
- https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226
- https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4