ALT-PU-2018-1020-1
Package kernel-image-un-def updated to version 4.14.12-alt0.M80P.1 for branch p8 in task 197928.
Closed vulnerabilities
BDU:2018-00614
Уязвимость функции __oom_reap_task_mm ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2019-00772
Уязвимость подсистемы cleancache ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00974
Уязвимость обработчика RAW-сокетов AF_PACKET ядра Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-02785
Уязвимость функции __netlink_ns_capable () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03748
Уязвимость реализации функции waitid ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2021-01426
Уязвимость функции touch_pmd() ядра операционных систем Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2023-11-07
CVE-2011-1161
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-1160, CVE-2011-1162. Reason: This candidate was withdrawn by its CNA. Further investigation showed that only two candidates, CVE-2011-1160 and CVE-2011-1162, were needed for the set of security issues in question. Notes: none
Modified: 2024-11-21
CVE-2017-0786
A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37351060. References: B-V2017060101.
Modified: 2024-11-21
CVE-2017-0861
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
- [secure-testing-commits] 20171206 r58306 - data/CVE
- [secure-testing-commits] 20171206 r58306 - data/CVE
- 102329
- 102329
- RHSA-2018:2390
- RHSA-2018:2390
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2020:0036
- RHSA-2020:0036
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- https://security-tracker.debian.org/tracker/CVE-2017-0861
- https://security-tracker.debian.org/tracker/CVE-2017-0861
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://source.android.com/security/bulletin/pixel/2017-11-01
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- DSA-4187
- DSA-4187
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2017-1000252
The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- DSA-3981
- DSA-3981
- http://www.openwall.com/lists/oss-security/2017/09/15/4
- http://www.openwall.com/lists/oss-security/2017/09/15/4
- 101022
- 101022
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- https://bugzilla.redhat.com/show_bug.cgi?id=1490781
- https://bugzilla.redhat.com/show_bug.cgi?id=1490781
- https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- https://marc.info/?l=kvm&m=150549145711115&w=2
- https://marc.info/?l=kvm&m=150549145711115&w=2
- https://marc.info/?l=kvm&m=150549146311117&w=2
- https://marc.info/?l=kvm&m=150549146311117&w=2
Modified: 2024-11-21
CVE-2017-1000255
On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
Modified: 2024-11-21
CVE-2017-1000405
The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
- 102032
- 102032
- 1040020
- 1040020
- RHSA-2018:0180
- RHSA-2018:0180
- https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
- https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
- https://source.android.com/security/bulletin/pixel/2018-02-01
- https://source.android.com/security/bulletin/pixel/2018-02-01
- 43199
- 43199
Modified: 2024-11-21
CVE-2017-1000407
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
- [oss-security] 20171204 CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
- [oss-security] 20171204 CVE-2017-1000407 Kernel: KVM: DoS via write flood to I/O port 0x80
- 102038
- 102038
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1170
- RHSA-2019:1170
- https://access.redhat.com/security/cve/cve-2017-1000407
- https://access.redhat.com/security/cve/cve-2017-1000407
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- [kvm] 20171201 [PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
- [kvm] 20171201 [PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
Modified: 2024-11-21
CVE-2017-12153
A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
- http://seclists.org/oss-sec/2017/q3/437
- http://seclists.org/oss-sec/2017/q3/437
- DSA-3981
- DSA-3981
- 100855
- 100855
- https://bugzilla.novell.com/show_bug.cgi?id=1058410
- https://bugzilla.novell.com/show_bug.cgi?id=1058410
- https://bugzilla.redhat.com/show_bug.cgi?id=1491046
- https://bugzilla.redhat.com/show_bug.cgi?id=1491046
- https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
- https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
- https://marc.info/?t=150525503100001&r=1&w=2
- https://marc.info/?t=150525503100001&r=1&w=2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
Modified: 2024-11-21
CVE-2017-12154
The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- DSA-3981
- DSA-3981
- 100856
- 100856
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1946
- RHSA-2019:1946
- https://bugzilla.redhat.com/show_bug.cgi?id=1491224
- https://bugzilla.redhat.com/show_bug.cgi?id=1491224
- https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- https://www.spinics.net/lists/kvm/msg155414.html
- https://www.spinics.net/lists/kvm/msg155414.html
Modified: 2024-11-21
CVE-2017-12188
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
- 101267
- 101267
- RHSA-2018:0395
- RHSA-2018:0395
- RHSA-2018:0412
- RHSA-2018:0412
- https://bugzilla.redhat.com/show_bug.cgi?id=1500380
- https://bugzilla.redhat.com/show_bug.cgi?id=1500380
- https://patchwork.kernel.org/patch/9996579/
- https://patchwork.kernel.org/patch/9996579/
- https://patchwork.kernel.org/patch/9996587/
- https://patchwork.kernel.org/patch/9996587/
Modified: 2024-11-21
CVE-2017-12193
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
- 101678
- 101678
- RHSA-2018:0151
- RHSA-2018:0151
- https://bugzilla.redhat.com/show_bug.cgi?id=1501215
- https://bugzilla.redhat.com/show_bug.cgi?id=1501215
- https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
Modified: 2024-11-21
CVE-2017-15129
A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
- http://seclists.org/oss-sec/2018/q1/7
- http://seclists.org/oss-sec/2018/q1/7
- 102485
- 102485
- RHSA-2018:0654
- RHSA-2018:0654
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1946
- RHSA-2019:1946
- https://access.redhat.com/security/cve/CVE-2017-15129
- https://access.redhat.com/security/cve/CVE-2017-15129
- https://bugzilla.redhat.com/show_bug.cgi?id=1531174
- https://bugzilla.redhat.com/show_bug.cgi?id=1531174
- https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
- https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
- https://marc.info/?l=linux-netdev&m=151370451121029&w=2
- https://marc.info/?l=linux-netdev&m=151370451121029&w=2
- https://marc.info/?t=151370468900001&r=1&w=2
- https://marc.info/?t=151370468900001&r=1&w=2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
Modified: 2024-11-21
CVE-2017-15265
Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
- [alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port
- [alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
- [oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265
- [oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265
- 101288
- 101288
- 1039561
- 1039561
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:2390
- RHSA-2018:2390
- RHSA-2018:3822
- RHSA-2018:3822
- RHSA-2018:3823
- RHSA-2018:3823
- https://bugzilla.suse.com/show_bug.cgi?id=1062520
- https://bugzilla.suse.com/show_bug.cgi?id=1062520
- https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
- https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- https://source.android.com/security/bulletin/2018-02-01
- https://source.android.com/security/bulletin/2018-02-01
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2017-16994
The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=373c4557d2aa362702c4c2d41288fb1e54990b7c
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
- 101969
- 101969
- RHSA-2018:0502
- RHSA-2018:0502
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1431
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1431
- https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c
- https://github.com/torvalds/linux/commit/373c4557d2aa362702c4c2d41288fb1e54990b7c
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- 43178
- 43178
Modified: 2024-11-21
CVE-2017-16995
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
- http://openwall.com/lists/oss-security/2017/12/21/2
- http://openwall.com/lists/oss-security/2017/12/21/2
- 102288
- 102288
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=a6132276ab5dcc38b3299082efeb25b948263adb
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=a6132276ab5dcc38b3299082efeb25b948263adb
- https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f
- https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3633-1
- USN-3633-1
- USN-3523-2
- USN-3523-2
- DSA-4073
- DSA-4073
- 44298
- 44298
- 45010
- 45010
- 45058
- 45058
Modified: 2024-11-21
CVE-2017-16996
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958
- http://openwall.com/lists/oss-security/2017/12/21/2
- http://openwall.com/lists/oss-security/2017/12/21/2
- 102267
- 102267
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://github.com/torvalds/linux/commit/0c17d1d2c61936401f4702e1846e2c19b200f958
- https://github.com/torvalds/linux/commit/0c17d1d2c61936401f4702e1846e2c19b200f958
Modified: 2024-11-21
CVE-2017-17448
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
- 102117
- 102117
- RHSA-2018:0654
- RHSA-2018:0654
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- https://patchwork.kernel.org/patch/10089373/
- https://patchwork.kernel.org/patch/10089373/
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3620-1
- USN-3620-1
- USN-3620-2
- USN-3620-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
Modified: 2024-11-21
CVE-2017-17449
The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.
- 102122
- 102122
- RHSA-2018:0654
- RHSA-2018:0654
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- https://lkml.org/lkml/2017/12/5/950
- https://lkml.org/lkml/2017/12/5/950
- https://source.android.com/security/bulletin/pixel/2018-04-01
- https://source.android.com/security/bulletin/pixel/2018-04-01
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3653-1
- USN-3653-1
- USN-3653-2
- USN-3653-2
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- USN-3657-1
- USN-3657-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
Modified: 2024-11-21
CVE-2017-17450
net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- 102110
- 102110
- https://lkml.org/lkml/2017/12/5/982
- https://lkml.org/lkml/2017/12/5/982
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
Modified: 2024-11-21
CVE-2017-17558
The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- http://openwall.com/lists/oss-security/2017/12/12/7
- http://openwall.com/lists/oss-security/2017/12/12/7
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2019:1170
- RHSA-2019:1170
- RHSA-2019:1190
- RHSA-2019:1190
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.spinics.net/lists/linux-usb/msg163644.html
- https://www.spinics.net/lists/linux-usb/msg163644.html
Modified: 2024-11-21
CVE-2017-17712
The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- RHSA-2018:0502
- RHSA-2018:0502
- https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://github.com/torvalds/linux/commit/8f659a03a0ba9289b9aeb9b4470e6fb263d6f483
- https://source.android.com/security/bulletin/pixel/2018-04-01
- https://source.android.com/security/bulletin/pixel/2018-04-01
- USN-3581-1
- USN-3581-1
- USN-3581-2
- USN-3581-2
- USN-3581-3
- USN-3581-3
- USN-3582-1
- USN-3582-1
- USN-3582-2
- USN-3582-2
- DSA-4073
- DSA-4073
Modified: 2024-11-21
CVE-2017-17741
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
- 102227
- 102227
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3620-1
- USN-3620-1
- USN-3620-2
- USN-3620-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- https://www.spinics.net/lists/kvm/msg160796.html
- https://www.spinics.net/lists/kvm/msg160796.html
Modified: 2024-11-21
CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
- SUSE-SU-2018:0010
- SUSE-SU-2018:0010
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- SUSE-SU-2018:0012
- SUSE-SU-2018:0012
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0023
- openSUSE-SU-2018:0023
- 102291
- 102291
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2019:2473
- RHSA-2019:2473
- https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
- https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3620-1
- USN-3620-1
- USN-3620-2
- USN-3620-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
Modified: 2024-11-21
CVE-2017-17806
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
- SUSE-SU-2018:0010
- SUSE-SU-2018:0010
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- SUSE-SU-2018:0012
- SUSE-SU-2018:0012
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0022
- openSUSE-SU-2018:0023
- openSUSE-SU-2018:0023
- 102293
- 102293
- RHSA-2018:2948
- RHSA-2018:2948
- https://github.com/torvalds/linux/commit/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
- https://github.com/torvalds/linux/commit/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
Modified: 2024-11-21
CVE-2017-17807
The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b
- 102301
- 102301
- https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
- https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- [debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3620-1
- USN-3620-1
- USN-3620-2
- USN-3620-2
- USN-3632-1
- USN-3632-1
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
Modified: 2024-11-21
CVE-2017-17862
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467
- 102325
- 102325
- 1040057
- 1040057
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-fix-branch-pruning-logic.patch?h=stretch-security
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-fix-branch-pruning-logic.patch?h=stretch-security
- https://github.com/torvalds/linux/commit/c131187db2d3fa2f8bf32fdf4e9a4ef805168467
- https://github.com/torvalds/linux/commit/c131187db2d3fa2f8bf32fdf4e9a4ef805168467
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3523-2
- USN-3523-2
- DSA-4073
- DSA-4073
- https://www.spinics.net/lists/stable/msg206984.html
- https://www.spinics.net/lists/stable/msg206984.html
Modified: 2024-11-21
CVE-2017-17864
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
- 102320
- 102320
- 1040059
- 1040059
- https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0
- https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=stretch-security&id=ad775f6ff7eebb93eedc2f592bc974260e7757b0
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-verifier-fix-states_equal-comparison-of-pointer-and-unknown.patch?h=stretch-security
- USN-3523-2
- USN-3523-2
- DSA-4073
- DSA-4073
Modified: 2024-11-21
CVE-2017-17975
Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.
- http://linuxtesting.org/pipermail/ldv-project/2017-November/001008.html
- http://linuxtesting.org/pipermail/ldv-project/2017-November/001008.html
- 102330
- 102330
- USN-3653-1
- USN-3653-1
- USN-3653-2
- USN-3653-2
- USN-3654-1
- USN-3654-1
- USN-3654-2
- USN-3654-2
- USN-3656-1
- USN-3656-1
- USN-3657-1
- USN-3657-1
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2017-18202
The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=687cb0884a714ff484d038e9190edc874edcf146
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=687cb0884a714ff484d038e9190edc874edcf146
- 103161
- 103161
- RHSA-2018:2772
- RHSA-2018:2772
- https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
- https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
Modified: 2024-11-21
CVE-2017-18203
The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed
- 103184
- 103184
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1854
- RHSA-2018:1854
- RHSA-2019:4154
- RHSA-2019:4154
- https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed
- https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3653-1
- USN-3653-1
- USN-3653-2
- USN-3653-2
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- USN-3657-1
- USN-3657-1
- DSA-4187
- DSA-4187
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3
Modified: 2024-11-21
CVE-2017-18204
The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
- 103183
- 103183
- https://github.com/torvalds/linux/commit/28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
- https://github.com/torvalds/linux/commit/28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
- USN-3617-1
- USN-3617-1
- USN-3617-2
- USN-3617-2
- USN-3617-3
- USN-3617-3
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
Modified: 2024-11-21
CVE-2017-18208
The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2019:3967
- RHSA-2019:3967
- RHSA-2019:4057
- RHSA-2019:4057
- RHSA-2019:4058
- RHSA-2019:4058
- https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
- https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3653-1
- USN-3653-1
- USN-3653-2
- USN-3653-2
- USN-3655-1
- USN-3655-1
- USN-3655-2
- USN-3655-2
- USN-3657-1
- USN-3657-1
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
Modified: 2024-11-21
CVE-2017-18344
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
- 104909
- 104909
- 1041414
- 1041414
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- RHSA-2018:3459
- RHSA-2018:3459
- RHSA-2018:3540
- RHSA-2018:3540
- RHSA-2018:3586
- RHSA-2018:3586
- RHSA-2018:3590
- RHSA-2018:3590
- RHSA-2018:3591
- RHSA-2018:3591
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe
- https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe
- USN-3742-1
- USN-3742-1
- USN-3742-2
- USN-3742-2
- 45175
- 45175
Modified: 2024-11-21
CVE-2017-18379
In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c319d3a144d4b8f1ea2047fd614d2149b68f889
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c319d3a144d4b8f1ea2047fd614d2149b68f889
- https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889
- https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889
- https://support.f5.com/csp/article/K74012105
- https://support.f5.com/csp/article/K74012105
- https://support.f5.com/csp/article/K74012105?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K74012105?utm_source=f5support&%3Butm_medium=RSS
Modified: 2024-11-21
CVE-2017-18595
An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
- openSUSE-SU-2019:2308
- openSUSE-SU-2019:2308
- openSUSE-SU-2019:2307
- openSUSE-SU-2019:2307
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8
Modified: 2024-11-21
CVE-2017-5123
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
- https://crbug.com/772848
- https://crbug.com/772848
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51
- https://security.netapp.com/advisory/ntap-20211223-0003/
- https://security.netapp.com/advisory/ntap-20211223-0003/
Modified: 2024-11-21
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- http://lists.openwall.net/netdev/2017/12/04/224
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- 102056
- 102056
- RHSA-2018:0399
- RHSA-2018:0399
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:1216
- RHSA-2018:1216
- RHSA-2018:1319
- RHSA-2018:1319
- RHSA-2018:3822
- RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3581-1
- USN-3581-1
- USN-3581-2
- USN-3581-2
- USN-3581-3
- USN-3581-3
- USN-3582-1
- USN-3582-1
- USN-3582-2
- USN-3582-2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- 43234
- 43234
Modified: 2024-11-21
CVE-2018-13096
An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.14. A denial of service (out-of-bounds memory access and BUG) can occur upon encountering an abnormal bitmap size when mounting a crafted f2fs image.
- openSUSE-SU-2018:3202
- openSUSE-SU-2018:3202
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://bugzilla.kernel.org/show_bug.cgi?id=200167
- https://bugzilla.kernel.org/show_bug.cgi?id=200167
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e34438c903b653daca2b2a7de95aed46226f8ed3
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- 20190130 [slackware-security] Slackware 14.2 kernel (SSA:2019-030-01)
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-14646
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
- RHSA-2018:3651
- RHSA-2018:3666
- RHSA-2018:3843
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14646
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f428fe4a04cc339166c8bbd489789760de3a0cee
- https://marc.info/?l=linux-netdev&m=151500466401174&w=2
- RHSA-2018:3651
- https://marc.info/?l=linux-netdev&m=151500466401174&w=2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f428fe4a04cc339166c8bbd489789760de3a0cee
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14646
- RHSA-2018:3843
- RHSA-2018:3666
Modified: 2024-11-21
CVE-2018-16862
A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.
- 106009
- 106009
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- https://lore.kernel.org/patchwork/patch/1011367/
- https://lore.kernel.org/patchwork/patch/1011367/
- [oss-security] 20181123 CVE-2018-16862: Linux kernel: cleancache: deleted files infoleak
- [oss-security] 20181123 CVE-2018-16862: Linux kernel: cleancache: deleted files infoleak
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-18386
drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348
- RHSA-2019:0831
- RHSA-2019:0831
- https://bugzilla.suse.com/show_bug.cgi?id=1094825
- https://bugzilla.suse.com/show_bug.cgi?id=1094825
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
- https://github.com/torvalds/linux/commit/966031f340185eddd05affcf72b740549f056348
- https://github.com/torvalds/linux/commit/966031f340185eddd05affcf72b740549f056348
- USN-3849-1
- USN-3849-1
- USN-3849-2
- USN-3849-2
Modified: 2024-11-21
CVE-2018-18559
In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0163
- RHSA-2019:0163
- RHSA-2019:0188
- RHSA-2019:0188
- RHSA-2019:1170
- RHSA-2019:1170
- RHSA-2019:1190
- RHSA-2019:1190
- RHSA-2019:3967
- RHSA-2019:3967
- RHSA-2019:4159
- RHSA-2019:4159
- RHSA-2020:0174
- RHSA-2020:0174
- https://blogs.securiteam.com/index.php/archives/3731
- https://blogs.securiteam.com/index.php/archives/3731
Modified: 2024-11-21
CVE-2018-7492
A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
- 103185
- 103185
- https://bugzilla.redhat.com/show_bug.cgi?id=1527393
- https://bugzilla.redhat.com/show_bug.cgi?id=1527393
- https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
- https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- https://patchwork.kernel.org/patch/10096441/
- https://patchwork.kernel.org/patch/10096441/
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3674-1
- USN-3674-1
- USN-3674-2
- USN-3674-2
- USN-3677-1
- USN-3677-1
- USN-3677-2
- USN-3677-2
- DSA-4187
- DSA-4187
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.7
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.7
- https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/
- https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/