ALT-PU-2017-1366-1
Package kernel-image-un-def updated to version 4.4.57-alt0.M70C.2 for branch c7 in task 180888.
Closed vulnerabilities
BDU:2016-02353
Уязвимость компонента net/packet/af_packet.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2017-00294
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01463
Уязвимость функции ip6gre_err операционной системы Linux, позволяющая нарушителю оказать неопределенное воздействие
BDU:2017-01556
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии суперпользователя
BDU:2018-00379
Уязвимость функции ip_cmsg_recv_checksum (net/ipv4/ip_sockglue.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2016-10088
The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=128394eff343fc6d2f32172f03e24829539c5835
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.openwall.com/lists/oss-security/2016/12/30/1
- http://www.securityfocus.com/bid/95169
- http://www.securitytracker.com/id/1037538
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://github.com/torvalds/linux/commit/128394eff343fc6d2f32172f03e24829539c5835
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=128394eff343fc6d2f32172f03e24829539c5835
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.openwall.com/lists/oss-security/2016/12/30/1
- http://www.securityfocus.com/bid/95169
- http://www.securitytracker.com/id/1037538
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://github.com/torvalds/linux/commit/128394eff343fc6d2f32172f03e24829539c5835
Modified: 2025-04-20
CVE-2016-10200
Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=32c231164b762dddefa13af5a0101032c70b50ef
- http://source.android.com/security/bulletin/2017-03-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.securityfocus.com/bid/101783
- http://www.securitytracker.com/id/1037965
- http://www.securitytracker.com/id/1037968
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://github.com/torvalds/linux/commit/32c231164b762dddefa13af5a0101032c70b50ef
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=32c231164b762dddefa13af5a0101032c70b50ef
- http://source.android.com/security/bulletin/2017-03-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.securityfocus.com/bid/101783
- http://www.securitytracker.com/id/1037965
- http://www.securitytracker.com/id/1037968
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://github.com/torvalds/linux/commit/32c231164b762dddefa13af5a0101032c70b50ef
Modified: 2025-04-12
CVE-2016-8655
Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html
- http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html
- http://rhn.redhat.com/errata/RHSA-2017-0386.html
- http://rhn.redhat.com/errata/RHSA-2017-0387.html
- http://rhn.redhat.com/errata/RHSA-2017-0402.html
- http://www.openwall.com/lists/oss-security/2016/12/06/1
- http://www.securityfocus.com/bid/94692
- http://www.securitytracker.com/id/1037403
- http://www.securitytracker.com/id/1037968
- http://www.ubuntu.com/usn/USN-3149-1
- http://www.ubuntu.com/usn/USN-3149-2
- http://www.ubuntu.com/usn/USN-3150-1
- http://www.ubuntu.com/usn/USN-3150-2
- http://www.ubuntu.com/usn/USN-3151-1
- http://www.ubuntu.com/usn/USN-3151-2
- http://www.ubuntu.com/usn/USN-3151-3
- http://www.ubuntu.com/usn/USN-3151-4
- http://www.ubuntu.com/usn/USN-3152-1
- http://www.ubuntu.com/usn/USN-3152-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1400019
- https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c
- https://source.android.com/security/bulletin/2017-03-01.html
- https://www.exploit-db.com/exploits/40871/
- https://www.exploit-db.com/exploits/44696/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=84ac7260236a49c79eede91617700174c2c19b0c
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html
- http://packetstormsecurity.com/files/140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html
- http://rhn.redhat.com/errata/RHSA-2017-0386.html
- http://rhn.redhat.com/errata/RHSA-2017-0387.html
- http://rhn.redhat.com/errata/RHSA-2017-0402.html
- http://www.openwall.com/lists/oss-security/2016/12/06/1
- http://www.securityfocus.com/bid/94692
- http://www.securitytracker.com/id/1037403
- http://www.securitytracker.com/id/1037968
- http://www.ubuntu.com/usn/USN-3149-1
- http://www.ubuntu.com/usn/USN-3149-2
- http://www.ubuntu.com/usn/USN-3150-1
- http://www.ubuntu.com/usn/USN-3150-2
- http://www.ubuntu.com/usn/USN-3151-1
- http://www.ubuntu.com/usn/USN-3151-2
- http://www.ubuntu.com/usn/USN-3151-3
- http://www.ubuntu.com/usn/USN-3151-4
- http://www.ubuntu.com/usn/USN-3152-1
- http://www.ubuntu.com/usn/USN-3152-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1400019
- https://github.com/torvalds/linux/commit/84ac7260236a49c79eede91617700174c2c19b0c
- https://source.android.com/security/bulletin/2017-03-01.html
- https://www.exploit-db.com/exploits/40871/
- https://www.exploit-db.com/exploits/44696/
Modified: 2025-04-12
CVE-2016-9576
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.openwall.com/lists/oss-security/2016/12/08/19
- http://www.securityfocus.com/bid/94821
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1403145
- https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ac402cfcdc904f9772e1762b3fda112dcc56a0
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2017-0817.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.openwall.com/lists/oss-security/2016/12/08/19
- http://www.securityfocus.com/bid/94821
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2669
- https://bugzilla.redhat.com/show_bug.cgi?id=1403145
- https://github.com/torvalds/linux/commit/a0ac402cfcdc904f9772e1762b3fda112dcc56a0
Modified: 2025-04-12
CVE-2016-9793
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.openwall.com/lists/oss-security/2016/12/03/1
- http://www.securityfocus.com/bid/94655
- http://www.securitytracker.com/id/1037968
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://bugzilla.redhat.com/show_bug.cgi?id=1402013
- https://github.com/torvalds/linux/commit/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
- https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
- https://source.android.com/security/bulletin/2017-03-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.14
- http://www.openwall.com/lists/oss-security/2016/12/03/1
- http://www.securityfocus.com/bid/94655
- http://www.securitytracker.com/id/1037968
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://bugzilla.redhat.com/show_bug.cgi?id=1402013
- https://github.com/torvalds/linux/commit/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
- https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
- https://source.android.com/security/bulletin/2017-03-01.html
Modified: 2025-04-12
CVE-2016-9794
Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/12/03/2
- http://www.securityfocus.com/bid/94654
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://patchwork.kernel.org/patch/8752621/
- https://source.android.com/security/bulletin/2017-05-01
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://www.openwall.com/lists/oss-security/2016/12/03/2
- http://www.securityfocus.com/bid/94654
- https://bugzilla.redhat.com/show_bug.cgi?id=1401494
- https://github.com/torvalds/linux/commit/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4
- https://patchwork.kernel.org/patch/8752621/
- https://source.android.com/security/bulletin/2017-05-01
Modified: 2025-04-20
CVE-2017-2636
Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
- http://www.debian.org/security/2017/dsa-3804
- http://www.openwall.com/lists/oss-security/2017/03/07/6
- http://www.securityfocus.com/bid/96732
- http://www.securitytracker.com/id/1037963
- https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
- https://access.redhat.com/errata/RHSA-2017:0892
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://access.redhat.com/errata/RHSA-2017:0986
- https://access.redhat.com/errata/RHSA-2017:1125
- https://access.redhat.com/errata/RHSA-2017:1126
- https://access.redhat.com/errata/RHSA-2017:1232
- https://access.redhat.com/errata/RHSA-2017:1233
- https://access.redhat.com/errata/RHSA-2017:1488
- https://bugzilla.redhat.com/show_bug.cgi?id=1428319
- http://www.debian.org/security/2017/dsa-3804
- http://www.openwall.com/lists/oss-security/2017/03/07/6
- http://www.securityfocus.com/bid/96732
- http://www.securitytracker.com/id/1037963
- https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
- https://access.redhat.com/errata/RHSA-2017:0892
- https://access.redhat.com/errata/RHSA-2017:0931
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0933
- https://access.redhat.com/errata/RHSA-2017:0986
- https://access.redhat.com/errata/RHSA-2017:1125
- https://access.redhat.com/errata/RHSA-2017:1126
- https://access.redhat.com/errata/RHSA-2017:1232
- https://access.redhat.com/errata/RHSA-2017:1233
- https://access.redhat.com/errata/RHSA-2017:1488
- https://bugzilla.redhat.com/show_bug.cgi?id=1428319
Modified: 2025-04-20
CVE-2017-5547
drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d104af38b570d37aa32a5803b04c354f8ed513d
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
- http://www.openwall.com/lists/oss-security/2017/01/21/3
- http://www.securityfocus.com/bid/95709
- https://bugzilla.redhat.com/show_bug.cgi?id=1416096
- https://github.com/torvalds/linux/commit/6d104af38b570d37aa32a5803b04c354f8ed513d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d104af38b570d37aa32a5803b04c354f8ed513d
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
- http://www.openwall.com/lists/oss-security/2017/01/21/3
- http://www.securityfocus.com/bid/95709
- https://bugzilla.redhat.com/show_bug.cgi?id=1416096
- https://github.com/torvalds/linux/commit/6d104af38b570d37aa32a5803b04c354f8ed513d
Modified: 2025-04-20
CVE-2017-5897
The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/07/2
- http://www.securityfocus.com/bid/96037
- http://www.securitytracker.com/id/1037794
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
- https://source.android.com/security/bulletin/2017-09-01
- https://usn.ubuntu.com/3754-1/
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/07/2
- http://www.securityfocus.com/bid/96037
- http://www.securitytracker.com/id/1037794
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
- https://source.android.com/security/bulletin/2017-09-01
- https://usn.ubuntu.com/3754-1/
Modified: 2025-04-20
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
- http://rhn.redhat.com/errata/RHSA-2017-0293.html
- http://rhn.redhat.com/errata/RHSA-2017-0294.html
- http://rhn.redhat.com/errata/RHSA-2017-0295.html
- http://rhn.redhat.com/errata/RHSA-2017-0316.html
- http://rhn.redhat.com/errata/RHSA-2017-0323.html
- http://rhn.redhat.com/errata/RHSA-2017-0324.html
- http://rhn.redhat.com/errata/RHSA-2017-0345.html
- http://rhn.redhat.com/errata/RHSA-2017-0346.html
- http://rhn.redhat.com/errata/RHSA-2017-0347.html
- http://rhn.redhat.com/errata/RHSA-2017-0365.html
- http://rhn.redhat.com/errata/RHSA-2017-0366.html
- http://rhn.redhat.com/errata/RHSA-2017-0403.html
- http://rhn.redhat.com/errata/RHSA-2017-0501.html
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/22/3
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/96310
- http://www.securitytracker.com/id/1037876
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:1209
- https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
- https://source.android.com/security/bulletin/2017-07-01
- https://www.exploit-db.com/exploits/41457/
- https://www.exploit-db.com/exploits/41458/
- https://www.tenable.com/security/tns-2017-07
- http://rhn.redhat.com/errata/RHSA-2017-0293.html
- http://rhn.redhat.com/errata/RHSA-2017-0294.html
- http://rhn.redhat.com/errata/RHSA-2017-0295.html
- http://rhn.redhat.com/errata/RHSA-2017-0316.html
- http://rhn.redhat.com/errata/RHSA-2017-0323.html
- http://rhn.redhat.com/errata/RHSA-2017-0324.html
- http://rhn.redhat.com/errata/RHSA-2017-0345.html
- http://rhn.redhat.com/errata/RHSA-2017-0346.html
- http://rhn.redhat.com/errata/RHSA-2017-0347.html
- http://rhn.redhat.com/errata/RHSA-2017-0365.html
- http://rhn.redhat.com/errata/RHSA-2017-0366.html
- http://rhn.redhat.com/errata/RHSA-2017-0403.html
- http://rhn.redhat.com/errata/RHSA-2017-0501.html
- http://www.debian.org/security/2017/dsa-3791
- http://www.openwall.com/lists/oss-security/2017/02/22/3
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/96310
- http://www.securitytracker.com/id/1037876
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:1209
- https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
- https://source.android.com/security/bulletin/2017-07-01
- https://www.exploit-db.com/exploits/41457/
- https://www.exploit-db.com/exploits/41458/
- https://www.tenable.com/security/tns-2017-07
Modified: 2025-04-20
CVE-2017-6346
Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b
- http://www.debian.org/security/2017/dsa-3804
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13
- http://www.openwall.com/lists/oss-security/2017/02/28/6
- http://www.securityfocus.com/bid/96508
- https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b
- https://source.android.com/security/bulletin/2017-09-01
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d199fab63c11998a602205f7ee7ff7c05c97164b
- http://www.debian.org/security/2017/dsa-3804
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.13
- http://www.openwall.com/lists/oss-security/2017/02/28/6
- http://www.securityfocus.com/bid/96508
- https://github.com/torvalds/linux/commit/d199fab63c11998a602205f7ee7ff7c05c97164b
- https://source.android.com/security/bulletin/2017-09-01
Modified: 2025-04-20
CVE-2017-6347
The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca4ef4574f1ee5252e2cd365f8f5d5bafd048f32
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.1
- http://www.openwall.com/lists/oss-security/2017/02/28/5
- http://www.securityfocus.com/bid/96487
- https://bugzilla.redhat.com/show_bug.cgi?id=1427984
- https://github.com/torvalds/linux/commit/ca4ef4574f1ee5252e2cd365f8f5d5bafd048f32
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca4ef4574f1ee5252e2cd365f8f5d5bafd048f32
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.1
- http://www.openwall.com/lists/oss-security/2017/02/28/5
- http://www.securityfocus.com/bid/96487
- https://bugzilla.redhat.com/show_bug.cgi?id=1427984
- https://github.com/torvalds/linux/commit/ca4ef4574f1ee5252e2cd365f8f5d5bafd048f32