ALT-PU-2017-1137-1
Package kernel-image-un-def updated to version 4.9.8-alt0.M80P.1 for branch p8 in task 177668.
Closed vulnerabilities
BDU:2017-01188
Уязвимость DRM драйвера операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01557
Уязвимость компонента kernel/events/core.c ядра операционной системы, позволяющая нарушителю повысить свои привилегии
Modified: 2025-04-20
CVE-2017-5576
Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f2ff82e11c86c05d051cae32b58226392d33bbf
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/01/21/7
- http://www.securityfocus.com/bid/95767
- https://bugzilla.redhat.com/show_bug.cgi?id=1416436
- https://github.com/torvalds/linux/commit/0f2ff82e11c86c05d051cae32b58226392d33bbf
- https://lkml.org/lkml/2017/1/17/761
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f2ff82e11c86c05d051cae32b58226392d33bbf
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/01/21/7
- http://www.securityfocus.com/bid/95767
- https://bugzilla.redhat.com/show_bug.cgi?id=1416436
- https://github.com/torvalds/linux/commit/0f2ff82e11c86c05d051cae32b58226392d33bbf
- https://lkml.org/lkml/2017/1/17/761
Modified: 2025-04-20
CVE-2017-5577
The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8ac63847bc2f958dd93c09edc941a0118992d9
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/01/21/7
- http://www.securityfocus.com/bid/95765
- https://bugzilla.redhat.com/show_bug.cgi?id=1416437
- https://github.com/torvalds/linux/commit/6b8ac63847bc2f958dd93c09edc941a0118992d9
- https://lkml.org/lkml/2017/1/17/759
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b8ac63847bc2f958dd93c09edc941a0118992d9
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/01/21/7
- http://www.securityfocus.com/bid/95765
- https://bugzilla.redhat.com/show_bug.cgi?id=1416437
- https://github.com/torvalds/linux/commit/6b8ac63847bc2f958dd93c09edc941a0118992d9
- https://lkml.org/lkml/2017/1/17/759
Modified: 2025-04-20
CVE-2017-6001
Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290
- http://www.debian.org/security/2017/dsa-3791
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/02/16/1
- http://www.securityfocus.com/bid/96264
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://access.redhat.com/errata/RHSA-2018:1854
- https://bugzilla.redhat.com/show_bug.cgi?id=1422825
- https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290
- https://source.android.com/security/bulletin/pixel/2017-11-01
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=321027c1fe77f892f4ea07846aeae08cefbbb290
- http://www.debian.org/security/2017/dsa-3791
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.7
- http://www.openwall.com/lists/oss-security/2017/02/16/1
- http://www.securityfocus.com/bid/96264
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://access.redhat.com/errata/RHSA-2018:1854
- https://bugzilla.redhat.com/show_bug.cgi?id=1422825
- https://github.com/torvalds/linux/commit/321027c1fe77f892f4ea07846aeae08cefbbb290
- https://source.android.com/security/bulletin/pixel/2017-11-01