ALT-PU-2017-2425-2
Package kernel-image-un-def updated to version 4.13.6-alt1 for branch sisyphus in task 190746.
Closed vulnerabilities
Modified: 2024-03-01
BDU:2017-02563
Уязвимость функции cdc_parse_cdc_header ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-05-16
BDU:2017-02566
Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-05-16
BDU:2017-02567
Уязвимость драйвера uas ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-05-16
BDU:2017-02568
Уязвимость функции snd_usb_create_streams ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-05-16
BDU:2017-02571
Уязвимость ядра операционной системы Linux (drivers/uwb/uwbd.c), позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-05-16
BDU:2018-00518
Уязвимость ядра операционной системы Linux (fs/userfaultfd.c), связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2019-01417
Уязвимость функции sk_clone_lock операционных систем Linux и Android, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-20
CVE-2017-0786
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.
Modified: 2025-04-20
CVE-2017-1000255
On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
Modified: 2024-11-21
CVE-2017-15126
A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252
- http://www.securityfocus.com/bid/102516
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/security/cve/CVE-2017-15126
- https://bugzilla.redhat.com/show_bug.cgi?id=1523481
- https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252
- http://www.securityfocus.com/bid/102516
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/security/cve/CVE-2017-15126
- https://bugzilla.redhat.com/show_bug.cgi?id=1523481
- https://github.com/torvalds/linux/commit/384632e67e0829deb8015ee6ad916b180049d252
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
Modified: 2025-04-20
CVE-2017-15649
net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
- http://patchwork.ozlabs.org/patch/813945/
- http://patchwork.ozlabs.org/patch/818726/
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
- http://www.securityfocus.com/bid/101573
- https://access.redhat.com/errata/RHSA-2018:0151
- https://access.redhat.com/errata/RHSA-2018:0152
- https://access.redhat.com/errata/RHSA-2018:0181
- https://blogs.securiteam.com/index.php/archives/3484
- https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
- https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
- http://patchwork.ozlabs.org/patch/813945/
- http://patchwork.ozlabs.org/patch/818726/
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
- http://www.securityfocus.com/bid/101573
- https://access.redhat.com/errata/RHSA-2018:0151
- https://access.redhat.com/errata/RHSA-2018:0152
- https://access.redhat.com/errata/RHSA-2018:0181
- https://blogs.securiteam.com/index.php/archives/3484
- https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
- https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
Modified: 2025-04-20
CVE-2017-16526
drivers/uwb/uwbd.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device.
- https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
- https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
- https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
- https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3754-1/
- https://www.debian.org/security/2018/dsa-4187
Modified: 2025-04-20
CVE-2017-16529
The snd_usb_create_streams function in sound/usb/card.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
- http://www.securityfocus.com/bid/103284
- https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
- https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- http://www.securityfocus.com/bid/103284
- https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
- https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
Modified: 2025-04-20
CVE-2017-16530
The uas driver in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to drivers/usb/storage/uas-detect.h and drivers/usb/storage/uas.c.
Modified: 2025-04-20
CVE-2017-16531
drivers/usb/core/config.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to the USB_DT_INTERFACE_ASSOCIATION descriptor.
- http://www.securityfocus.com/bid/102025
- https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb
- https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- http://www.securityfocus.com/bid/102025
- https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb
- https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3754-1/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Modified: 2025-04-20
CVE-2017-16534
The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb
- https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb
- https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ
Modified: 2024-11-21
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
- https://access.redhat.com/errata/RHSA-2019:0512
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://access.redhat.com/errata/RHSA-2019:2736
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4056
- https://access.redhat.com/errata/RHSA-2019:4159
- https://access.redhat.com/errata/RHSA-2019:4164
- https://access.redhat.com/errata/RHSA-2019:4255
- https://source.android.com/security/bulletin/2018-12-01
- https://usn.ubuntu.com/3880-1/
- https://usn.ubuntu.com/3880-2/
- https://access.redhat.com/errata/RHSA-2019:0512
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://access.redhat.com/errata/RHSA-2019:2736
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4056
- https://access.redhat.com/errata/RHSA-2019:4159
- https://access.redhat.com/errata/RHSA-2019:4164
- https://access.redhat.com/errata/RHSA-2019:4255
- https://source.android.com/security/bulletin/2018-12-01
- https://usn.ubuntu.com/3880-1/
- https://usn.ubuntu.com/3880-2/
