ALT-BU-2017-3422-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 4.13.7-alt1 for branch sisyphus in task 190832.
Closed vulnerabilities
BDU:2018-00518
Уязвимость ядра операционной системы Linux (fs/userfaultfd.c), связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-03748
Уязвимость реализации функции waitid ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2017-15126
A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252
- 102516
- 102516
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- https://access.redhat.com/security/cve/CVE-2017-15126
- https://access.redhat.com/security/cve/CVE-2017-15126
- https://bugzilla.redhat.com/show_bug.cgi?id=1523481
- https://bugzilla.redhat.com/show_bug.cgi?id=1523481
- https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252
- https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
Modified: 2024-11-21
CVE-2017-15299
The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted system call.
- RHSA-2018:0654
- RHSA-2018:0654
- https://bugzilla.redhat.com/show_bug.cgi?id=1498016
- https://bugzilla.redhat.com/show_bug.cgi?id=1498016
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- https://marc.info/?t=150654188100001&r=1&w=2
- https://marc.info/?t=150654188100001&r=1&w=2
- https://marc.info/?t=150783958600011&r=1&w=2
- https://marc.info/?t=150783958600011&r=1&w=2
- USN-3798-1
- USN-3798-1
- USN-3798-2
- USN-3798-2
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1499828.html
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1499828.html
Modified: 2024-11-21
CVE-2017-5123
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
- https://crbug.com/772848
- https://crbug.com/772848
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51
- https://security.netapp.com/advisory/ntap-20211223-0003/
- https://security.netapp.com/advisory/ntap-20211223-0003/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-15189
In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements.
- 101228
- 101228
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080
- https://code.wireshark.org/review/23663
- https://code.wireshark.org/review/23663
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=625bab309d9dd21db2d8ae2aa3511810d32842a8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=625bab309d9dd21db2d8ae2aa3511810d32842a8
- https://www.wireshark.org/security/wnpa-sec-2017-46.html
- https://www.wireshark.org/security/wnpa-sec-2017-46.html
Modified: 2024-11-21
CVE-2017-15190
In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. This was addressed in epan/dissectors/packet-rtsp.c by correcting the scope of a variable.
- 101229
- 101229
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077
- https://code.wireshark.org/review/23635
- https://code.wireshark.org/review/23635
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e27870eaa6efa1c2dac08aa41a67fe9f0839e6e0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e27870eaa6efa1c2dac08aa41a67fe9f0839e6e0
- https://www.wireshark.org/security/wnpa-sec-2017-45.html
- https://www.wireshark.org/security/wnpa-sec-2017-45.html
Modified: 2024-11-21
CVE-2017-15191
In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
- 101227
- 101227
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068
- https://code.wireshark.org/review/23591
- https://code.wireshark.org/review/23591
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dbb21dfde14221dab09b6b9c7719b9067c1f06e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dbb21dfde14221dab09b6b9c7719b9067c1f06e
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-44.html
- https://www.wireshark.org/security/wnpa-sec-2017-44.html
Modified: 2024-11-21
CVE-2017-15192
In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
- 101235
- 101235
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049
- https://code.wireshark.org/review/23470
- https://code.wireshark.org/review/23470
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3689dc1db36037436b1616715f9a3f888fc9a0f6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3689dc1db36037436b1616715f9a3f888fc9a0f6
- https://www.wireshark.org/security/wnpa-sec-2017-42.html
- https://www.wireshark.org/security/wnpa-sec-2017-42.html
Modified: 2024-11-21
CVE-2017-15193
In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
- 101240
- 101240
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056
- https://code.wireshark.org/review/23537
- https://code.wireshark.org/review/23537
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afb9ff7982971aba6e42472de0db4c1bedfc641b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afb9ff7982971aba6e42472de0db4c1bedfc641b
- https://www.wireshark.org/security/wnpa-sec-2017-43.html
- https://www.wireshark.org/security/wnpa-sec-2017-43.html
Closed bugs
indilib: update to 1.5