ALT-PU-2017-2647-1
Package kernel-image-un-def updated to version 4.1.46-alt0.M70P.1 for branch p7 in task 194626.
Closed vulnerabilities
BDU:2017-02571
Уязвимость ядра операционной системы Linux (drivers/uwb/uwbd.c), позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2019-01417
Уязвимость функции sk_clone_lock операционных систем Linux и Android, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2017-0786
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.
Modified: 2024-11-21
CVE-2017-12153
A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
- http://seclists.org/oss-sec/2017/q3/437
- http://seclists.org/oss-sec/2017/q3/437
- DSA-3981
- DSA-3981
- 100855
- 100855
- https://bugzilla.novell.com/show_bug.cgi?id=1058410
- https://bugzilla.novell.com/show_bug.cgi?id=1058410
- https://bugzilla.redhat.com/show_bug.cgi?id=1491046
- https://bugzilla.redhat.com/show_bug.cgi?id=1491046
- https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
- https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
- https://marc.info/?t=150525503100001&r=1&w=2
- https://marc.info/?t=150525503100001&r=1&w=2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
Modified: 2024-11-21
CVE-2017-12154
The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- DSA-3981
- DSA-3981
- 100856
- 100856
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1946
- RHSA-2019:1946
- https://bugzilla.redhat.com/show_bug.cgi?id=1491224
- https://bugzilla.redhat.com/show_bug.cgi?id=1491224
- https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- https://www.spinics.net/lists/kvm/msg155414.html
- https://www.spinics.net/lists/kvm/msg155414.html
Modified: 2024-11-21
CVE-2017-12193
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- 101678
- 101678
- RHSA-2018:0151
- RHSA-2018:0151
- https://bugzilla.redhat.com/show_bug.cgi?id=1501215
- https://bugzilla.redhat.com/show_bug.cgi?id=1501215
- https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
Modified: 2024-11-21
CVE-2017-15265
Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
- [alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port
- [alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
- [oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265
- [oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265
- 101288
- 101288
- 1039561
- 1039561
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:2390
- RHSA-2018:2390
- RHSA-2018:3822
- RHSA-2018:3822
- RHSA-2018:3823
- RHSA-2018:3823
- https://bugzilla.suse.com/show_bug.cgi?id=1062520
- https://bugzilla.suse.com/show_bug.cgi?id=1062520
- https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
- https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- https://source.android.com/security/bulletin/2018-02-01
- https://source.android.com/security/bulletin/2018-02-01
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2017-16526
drivers/uwb/uwbd.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device.
- https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
- https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
- https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
- https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3754-1
- USN-3754-1
- DSA-4187
- DSA-4187
Modified: 2024-11-21
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
- RHSA-2019:0512
- RHSA-2019:0512
- RHSA-2019:0514
- RHSA-2019:0514
- RHSA-2019:2696
- RHSA-2019:2696
- RHSA-2019:2730
- RHSA-2019:2730
- RHSA-2019:2736
- RHSA-2019:2736
- RHSA-2019:3967
- RHSA-2019:3967
- RHSA-2019:4056
- RHSA-2019:4056
- RHSA-2019:4159
- RHSA-2019:4159
- RHSA-2019:4164
- RHSA-2019:4164
- RHSA-2019:4255
- RHSA-2019:4255
- https://source.android.com/security/bulletin/2018-12-01
- https://source.android.com/security/bulletin/2018-12-01
- USN-3880-1
- USN-3880-1
- USN-3880-2
- USN-3880-2