| Errata ID | 229 |
|---|---|
| Date | 2017-11-23 |
| Source package | univention-kernel-image-signed |
| Fixed in version | 3.0.2-9A~4.2.0.201711220905 |
| Description | This update of the Linux kernel to version 4.9.64 addresses the following
issues:
* [x86] drm/vmwgfx: limit the number of mip levels in
vmw_gb_surface_define_ioctl() (CVE-2017-7346)
* rxrpc: Fix several cases where a padded len isn't checked in ticket decode
(CVE-2017-7482)
* brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()
(CVE-2017-7541)
* ipv6: avoid overflow of offset in ip6_find_1stfragopt (CVE-2017-7542)
* [x86] drm/vmwgfx: Make sure backup_handle is always valid (CVE-2017-9605)
* drm/virtio: don't leak bo on drm_gem_object_init failure (CVE-2017-10810)
* xen-blkback: don't leak stack data via response ring (CVE-2017-10911)
* mqueue: fix a use-after-free in sys_mq_notify() (CVE-2017-11176)
* fs/exec.c: account for argv/envp pointers (CVE-2017-1000365)
* dentry name snapshots (CVE-2017-7533)
* fs/namespace.c does not restrict how many mounts may exist in a mount
namespace, which allows local users to cause a denial of service (memory
consumption and deadlock) via MS_BIND mount system calls. (CVE-2016-6213)
* The filesystem implementation preserves the setgid bit during a setxattr
call, which allows local users to gain group privileges by leveraging the
existence of a setgid program with restrictions on execute permissions.
(CVE-2016-7097)
* An information disclosure vulnerability in kernel components including the
ION subsystem, Binder, USB driver and networking subsystem could enable a
local malicious application to access data outside of its permission
levels. This issue is rated as Moderate because it first requires
compromising a privileged process. (CVE-2016-8405)
* The cgroup offline implementation mishandles certain drain operations,
which allows local users to cause a denial of service (system hang) by
leveraging access to a container environment for executing a crafted
application. (CVE-2016-9191)
* The load_segment_descriptor implementation in arch/x86/kvm/emulate.c
improperly emulates a "MOV SS, NULL selector" instruction, which allows
guest OS users to cause a denial of service (guest OS crash) or gain guest
OS privileges via a crafted application. (CVE-2017-2583)
* arch/x86/kvm/emulate.c allows local users to obtain sensitive information
from kernel memory or cause a denial of service (use-after-free) via a
crafted application that leverages instruction emulation for fxrstor,
fxsave, sgdt, and sidt. (CVE-2017-2584)
* The keyring_search_aux function in security/keys/keyring.c allows local
users to cause a denial of service (NULL pointer dereference and OOPS) via
a request_key system call for the "dead" type. (CVE-2017-6951)
* The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c does not
validate certain size data after an XFRM_MSG_NEWAE update, which allows
local users to obtain root privileges or cause a denial of service
(heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN
capability. (CVE-2017-7184)
* The KEYS subsystem allows local users to cause a denial of service (memory
consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING
keyctl_set_reqkey_keyring calls. (CVE-2017-7472)
* The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c
allows local users to cause a denial of service (out-of-bounds array
access) or possibly have unspecified other impact by changing a certain
sequence-number value, aka a "double fetch" vulnerability. (CVE-2017-8831)
* The sanity_check_ckpt function in fs/f2fs/super.c does not validate the
blkoff and segno arrays, which allows local users to gain privileges via
unspecified vectors. (CVE-2017-10663)
* Buffer overflow in the mp_override_legacy_irq() function in
arch/x86/kernel/acpi/boot.c allows local users to gain privileges via a
crafted ACPI table. (CVE-2017-11473)
* net/xfrm/xfrm_policy.c, when CONFIG_XFRM_MIGRATE is enabled, does not
ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less,
which allows local users to cause a denial of service (out-of-bounds
access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE
xfrm Netlink message. (CVE-2017-11600)
* In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a
local buffer of constant size using strcpy without a length check which can
cause a buffer overflow. (CVE-2017-12762)
* An issue was discovered in the size of the stack guard page on Linux,
specifically a 4k stack guard page is not sufficiently large and can be
"jumped" over (the stack guard page is bypassed). (CVE-2017-1000364)
* The offset2lib patch contains a vulnerability that allows a PIE binary to
be execve()'ed with 1GB of arguments or environmental strings then the
stack occupies the address 0x80000000 and the PIE binary is mapped above
0x40000000 nullifying the protection of the offset2lib patch. This is a
different issue than CVE-2017-1000371. This issue appears to be limited to
i386 based systems. (CVE-2017-1000370)
* The offset2lib patch contains a vulnerability, if RLIMIT_STACK is set to
RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the
1/4 restriction) then the stack will be grown down to 0x80000000, and as
the PIE binary is mapped above 0x80000000 the minimum distance between the
end of the PIE binary's read-write segment and the start of the stack
becomes small enough that the stack guard page can be jumped over by an
attacker. This is a different issue than CVE-2017-1000370 and
CVE-2017-1000365. This issue appears to be limited to i386 based systems.
(CVE-2017-1000371)
* A kernel data leak due to an out-of-bound read was found in the Linux
kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info()
functions present since version 4.7-rc1 through version 4.13. A data leak
happens when these functions fill in sockaddr data structures used to
export socket's diagnostic information. As a result, up to 100 bytes of the
slab data could be leaked to a userspace. (CVE-2017-7558)
* A flaw was found in the Linux kernel's handling of clearing SELinux
attributes on /proc/pid/attr files. An empty (null) write to this file can
crash the system by causing the system to attempt to access unmapped kernel
memory. (CVE-2017-2618)
* A race condition issue leading to a use-after-free flaw was found in the
way the raw packet sockets are implemented in the Linux kernel networking
subsystem handling synchronization. A local user able to open a raw packet
socket (requires the CAP_NET_RAW capability) could use this flaw to elevate
their privileges on the system. (CVE-2017-1000111)
* Exploitable memory corruption due to UFO (UDP fragment offload) to non-UFO
path switch (CVE-2017-1000112)
* A security flaw was discovered in the nl80211_set_rekey_data() function in
net/wireless/nl80211.c. This function does not check whether the required
attributes are present in a Netlink request. This request can be issued by
a user with the CAP_NET_ADMIN capability and may result in a NULL pointer
dereference and system crash. (CVE-2017-12153)
* The prepare_vmcs02 function in arch/x86/kvm/vmx.c does not ensure that the
"CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in
cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM
L2 guest OS users to obtain read and write access to the hardware CR8
register. (CVE-2017-12154)
* The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c does not
initialize a certain data structure, which allows local users to obtain
sensitive information from kernel stack memory by reading locations
associated with padding bytes. (CVE-2017-14156)
* The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c allows
local users to cause a denial of service (panic) by leveraging incorrect
length validation. (CVE-2017-14489)
* The sg_ioctl function in drivers/scsi/sg.c allows local users to obtain
sensitive information from uninitialized kernel heap-memory locations via
an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0. (CVE-2017-14991)
* The KVM subsystem allows guest OS users to cause a denial of service
(assertion failure, and hypervisor hang or crash) via an out-of bounds
guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
(CVE-2017-1000252)
* arch/x86/kvm/mmu.c when nested virtualisation is used, does not properly
traverse guest pagetable entries to resolve a guest virtual address, which
allows L1 guest OS users to execute arbitrary code on the host OS or cause
a denial of service (incorrect index during page walking, and host OS
crash), aka an "MMU potential stack buffer overrun." (CVE-2017-12188)
* The keyctl_read_key function in security/keys/keyctl.c in the Key
Management subcomponent. (CVE-2017-12192)
* A elevation of privilege vulnerability in the Broadcom wi-fi driver.
(CVE-2017-0786)
* KVM: x86: fix singlestepping over syscall (CVE-2017-7518)
* [PowerPC]: Arbitrary stack overwrite causing oops via crafted signal frame
(CVE-2017-1000255)
* Race condition in the ALSA subsystem allows local users to cause a denial
of service (use-after-free) or possibly have unspecified other impact via
crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c
and sound/core/seq/seq_ports.c. (CVE-2017-15265)
* A flaw was found in the Linux kernel's implementation of associative arrays
(CVE-2017-12193)
* mac80211: reinstallation of the group key in the Group Key handshake
(CVE-2017-13080)
* ALSA: seq: Cancel pending autoload work at unbinding device
(CVE-2017-16528)
* usb: usbtest: fix NULL pointer dereference (CVE-2017-16532)
* Input: ims-psu - check if CDC union descriptor is sane (CVE-2017-16645)
* media: imon: Fix null-ptr-deref in imon_probe (CVE-2017-16537)
* media: dib0700: fix invalid dvb_detach argument (CVE-2017-16646) |
| Additional notes | This is the second of three parts. |
| CVE ID | CVE-2016-7097 CVE-2016-9191 CVE-2016-6213 CVE-2016-8405 CVE-2017-0786 CVE-2017-2583 CVE-2017-2584 CVE-2017-2618 CVE-2017-6951 CVE-2017-7184 CVE-2017-7346 CVE-2017-7472 CVE-2017-7482 CVE-2017-7518 CVE-2017-7533 CVE-2017-7541 CVE-2017-7542 CVE-2017-7558 CVE-2017-8831 CVE-2017-9605 CVE-2017-10663 CVE-2017-10810 CVE-2017-10911 CVE-2017-11176 CVE-2017-11473 CVE-2017-11600 CVE-2017-12153 CVE-2017-12154 CVE-2017-12192 CVE-2017-12762 CVE-2017-14156 CVE-2017-14489 CVE-2017-14991 CVE-2017-15265 CVE-2017-12188 CVE-2017-12193 CVE-2017-13080 CVE-2017-16528 CVE-2017-16532 CVE-2017-16537 CVE-2017-16645 CVE-2017-16646 CVE-2017-1000111 CVE-2017-1000112 CVE-2017-1000252 CVE-2017-1000255 CVE-2017-1000364 CVE-2017-1000365 CVE-2017-1000370 CVE-2017-1000371 |
| UCS Bug number | #45242 |
