ALT-PU-2017-1169-1
Package kernel-image-un-def updated to version 4.9.10-alt1 for branch sisyphus in task 178247.
Closed vulnerabilities
BDU:2018-00378
Уязвимость функции mem_check_range (drivers/infiniband/sw/rxe/rxe_mr.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-8636
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=647bf3d8a8e5777319da92af672289b2a6c4dc66
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.10
- [oss-security] 20170211 CVE publication request - CVE 2016-8636
- [oss-security] 20170211 CVE publication request - CVE 2016-8636
- 96189
- 96189
- https://bugzilla.redhat.com/show_bug.cgi?id=1421981
- https://bugzilla.redhat.com/show_bug.cgi?id=1421981
- https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/
- https://eyalitkin.wordpress.com/2017/02/11/cve-publication-cve-2016-8636/
- https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
- https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
Modified: 2024-11-21
CVE-2017-2618
A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
- 96272
- 96272
- RHSA-2017:0931
- RHSA-2017:0931
- RHSA-2017:0932
- RHSA-2017:0932
- RHSA-2017:0933
- RHSA-2017:0933
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
- [selinux] 20170131 [PATCH] selinux: fix off-by-one in setprocattr
- [selinux] 20170131 [PATCH] selinux: fix off-by-one in setprocattr
- DSA-3791
- DSA-3791
Modified: 2024-11-21
CVE-2017-5967
The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
- http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
- 96271
- 96271
- https://bugzilla.kernel.org/show_bug.cgi?id=193921
- https://bugzilla.kernel.org/show_bug.cgi?id=193921
Modified: 2024-11-21
CVE-2017-5970
The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b2cef20f19c87999fff3da4071e66937db9644
- DSA-3791
- DSA-3791
- [oss-security] 20170212 Fwd: [scr293903] Linux kernel - upstream
- [oss-security] 20170212 Fwd: [scr293903] Linux kernel - upstream
- 96233
- 96233
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- RHSA-2017:2669
- RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1421638
- https://bugzilla.redhat.com/show_bug.cgi?id=1421638
- https://github.com/torvalds/linux/commit/34b2cef20f19c87999fff3da4071e66937db9644
- https://github.com/torvalds/linux/commit/34b2cef20f19c87999fff3da4071e66937db9644
- https://patchwork.ozlabs.org/patch/724136/
- https://patchwork.ozlabs.org/patch/724136/
- https://source.android.com/security/bulletin/2017-07-01
- https://source.android.com/security/bulletin/2017-07-01