ALT-PU-2018-1007-2
Package kernel-image-std-def updated to version 4.9.75-alt1 for branch sisyphus in task 197858.
Closed vulnerabilities
Published: 2017-12-16
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2017-17712
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
Severity: MEDIUM (6.9)Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Severity: HIGH (7.0)Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://access.redhat.com/errata/RHSA-2018:0502
- https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://source.android.com/security/bulletin/pixel/2018-04-01
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://www.debian.org/security/2017/dsa-4073
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://access.redhat.com/errata/RHSA-2018:0502
- https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://source.android.com/security/bulletin/pixel/2018-04-01
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://www.debian.org/security/2017/dsa-4073
Published: 2019-09-04
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-18595
An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
Severity: HIGH (7.2)Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: HIGH (7.8)Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
