ALT-PU-2017-1137-1
Package kernel-image-un-def updated to version 4.9.8-alt0.M80P.1 for branch p8 in task 177668.
Closed vulnerabilities
BDU:2017-01188
Уязвимость DRM драйвера операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01557
Уязвимость компонента kernel/events/core.c ядра операционной системы, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2017-5576
Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f2ff82e11c86c05d051cae32b58226392d33bbf
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f2ff82e11c86c05d051cae32b58226392d33bbf
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- [oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
- [oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
- 95767
- 95767
- https://bugzilla.redhat.com/show_bug.cgi?id=1416436
- https://bugzilla.redhat.com/show_bug.cgi?id=1416436
- https://github.com/torvalds/linux/commit/0f2ff82e11c86c05d051cae32b58226392d33bbf
- https://github.com/torvalds/linux/commit/0f2ff82e11c86c05d051cae32b58226392d33bbf
- [linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout.
- [linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout.
Modified: 2024-11-21
CVE-2017-5577
The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8ac63847bc2f958dd93c09edc941a0118992d9
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8ac63847bc2f958dd93c09edc941a0118992d9
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- [oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
- [oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
- 95765
- 95765
- https://bugzilla.redhat.com/show_bug.cgi?id=1416437
- https://bugzilla.redhat.com/show_bug.cgi?id=1416437
- https://github.com/torvalds/linux/commit/6b8ac63847bc2f958dd93c09edc941a0118992d9
- https://github.com/torvalds/linux/commit/6b8ac63847bc2f958dd93c09edc941a0118992d9
- [linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing.
- [linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing.
Modified: 2024-11-21
CVE-2017-6001
Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290
- DSA-3791
- DSA-3791
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- [oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
- [oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
- 96264
- 96264
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- RHSA-2017:2669
- RHSA-2017:2669
- RHSA-2018:1854
- RHSA-2018:1854
- https://bugzilla.redhat.com/show_bug.cgi?id=1422825
- https://bugzilla.redhat.com/show_bug.cgi?id=1422825
- https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290
- https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://source.android.com/security/bulletin/pixel/2017-11-01