| Errata ID | 68 |
|---|---|
| Date | 2017-06-28 |
| Source package | linux |
| Fixed in version | 4.9.30-2A~4.2.0.201706171152 |
| Description | This update of the Linux kernel to version 4.9.33 addresses the following
issues:
* tty: n_hdlc: get rid of racy n_hdlc.tbuf (CVE-2017-2636)
* ucount: Remove the atomicity from ucount->count (CVE-2017-6874)
* USB: iowarrior: fix NULL-deref at probe (CVE-2016-2188)
* scsi: sg: check length passed to SG_NEXT_CMD_LEN (CVE-2017-7187)
* The built-in keyrings for security tokens can be joined as a session and
then modified by the root user (CVE-2016-9604)
* The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c improperly
emulates the VMXON instruction, which allows KVM L1 guest OS users to cause
a denial of service (host OS memory consumption) by leveraging the
mishandling of page references (CVE-2017-2596)
* The ping_unhash function in net/ipv4/ping.c is too late in obtaining a
certain lock and consequently cannot ensure that disconnect function calls
are safe, which allows local users to cause a denial of service (panic) by
leveraging access to the protocol value of IPPROTO_ICMP in a socket system
call (CVE-2017-2671)
* net/sctp/socket.c does not properly restrict association peel-off
operations during certain wait states, which allows local users to cause a
denial of service (invalid unlock and double free) via a multithreaded
application. NOTE: this vulnerability exists because of an incorrect fix
for CVE-2017-5986 (CVE-2017-6353)
* The keyring_search_aux function in security/keys/keyring.c allows local
users to cause a denial of service (NULL pointer dereference and OOPS) via
a request_key system call for the "dead" type (CVE-2017-6951)
* The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c does not
validate certain size data after an XFRM_MSG_NEWAE update, which allows
local users to obtain root privileges or cause a denial of service
(heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN
capability (CVE-2017-7184)
* The vmw_surface_define_ioctl function in
drivers/gpu/drm/vmwgfx/vmwgfx_surface.c does not check for a zero value of
certain levels data, which allows local users to cause a denial of service
(ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl
call for a /dev/dri/renderD* device (CVE-2017-7261)
* The vmw_surface_define_ioctl function in
drivers/gpu/drm/vmwgfx/vmwgfx_surface.c does not validate addition of
certain levels data, which allows local users to trigger an integer
overflow and out-of-bounds write, and cause a denial of service (system
hang or crash) or possibly gain privileges, via a crafted ioctl call for a
/dev/dri/renderD* device (CVE-2017-7294)
* The packet_set_ring function in net/packet/af_packet.c does not properly
validate certain block-size data, which allows local users to cause a
denial of service (integer signedness error and out-of-bounds write), or
gain privileges (if the CAP_NET_RAW capability is held), via crafted system
calls (CVE-2017-7308)
* Use-after-free vulnerability in fs/crypto/ allows local users to cause a
denial of service (NULL pointer dereference) or possibly gain privileges by
revoking keyring keys being used for ext4, f2fs, or ubifs encryption,
causing cryptographic transform objects to be freed prematurely
(CVE-2017-7374)
* The KEYS subsystem allows local users to cause a denial of service (memory
consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING
keyctl_set_reqkey_keyring calls (CVE-2017-7472)
* Heap-based buffer overflow in drivers/net/macsec.c in the MACsec module
allows attackers to cause a denial of service or possibly have unspecified
other impact by leveraging the use of a MAX_SKB_FRAGS+1 size in conjunction
with the NETIF_F_FRAGLIST feature, leading to an error in the skb_to_sgvec
function (CVE-2017-7477)
* The ipxitf_ioctl function in net/ipx/af_ipx.c mishandles reference counts,
which allows local users to cause a denial of service (use-after-free) or
possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call
for an IPX interface (CVE-2017-7487)
* crypto/ahash.c allows attackers to cause a denial of service (API operation
calling its own callback, and infinite recursion) by triggering EBUSY on a
full queue (CVE-2017-7618)
* The NFSv2/NFSv3 server in the nfsd subsystem allows remote attackers to
cause a denial of service (system crash) via a long RPC reply, related to
net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (CVE-2017-7645)
* The mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM
protection mechanism, which allows local users to read or write to kernel
memory locations in the first megabyte (and bypass slab-allocation access
restrictions) via an application that opens the /dev/mem file, related to
arch/x86/mm/init.c and drivers/char/mem.c (CVE-2017-7889)
* drivers/media/usb/dvb-usb/dvb-usb-firmware.c interacts incorrectly with the
CONFIG_VMAP_STACK option, which allows local users to cause a denial of
service (system crash or memory corruption) or possibly have unspecified
other impact by leveraging use of more than one virtual page for a DMA
scatterlist (CVE-2017-8061)
* drivers/media/usb/dvb-usb/cxusb.c interacts incorrectly with the
CONFIG_VMAP_STACK option, which allows local users to cause a denial of
service (system crash) or possibly have unspecified other impact by
leveraging use of more than one virtual page for a DMA scatterlist
(CVE-2017-8063)
* drivers/media/usb/dvb-usb-v2/dvb_usb_core.c interacts incorrectly with the
CONFIG_VMAP_STACK option, which allows local users to cause a denial of
service (system crash or memory corruption) or possibly have unspecified
other impact by leveraging use of more than one virtual page for a DMA
scatterlist (CVE-2017-8064)
* drivers/char/virtio_console.c interacts incorrectly with the
CONFIG_VMAP_STACK option, which allows local users to cause a denial of
service (system crash or memory corruption) or possibly have unspecified
other impact by leveraging use of more than one virtual page for a DMA
scatterlist (CVE-2017-8067)
* The do_check function in kernel/bpf/verifier.c does not make the
allow_ptr_leaks value available for restricting the output of the
print_bpf_insn function, which allows local users to obtain sensitive
address information via crafted bpf system calls (CVE-2017-9150)
* lp.c Out-of-Bounds Write via Kernel Command-line (CVE-2017-1000363)
* dccp/tcp: do not inherit mc_list from parent (CVE-2017-8890)
* ipv6: Prevent overrun when parsing v6 header options (CVE-2017-9074)
* sctp: do not inherit ipv6_{mc|ac|fl}_list from parent (CVE-2017-9075)
* ipv6/dccp: do not inherit ipv6_mc_list from parent
(dccp_v6_request_recv_sock) (CVE-2017-9076)
* ipv6/dccp: do not inherit ipv6_mc_list from parent (tcp_v6_syn_recv_sock)
(CVE-2017-9077)
* ipv6: fix out of bound writes in __ip6_append_data() (CVE-2017-9242)
* crypto: skcipher - Add missing API setkey checks (CVE-2017-9211)
* drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
(CVE-2017-7346)
* drm/vmwgfx: Make sure backup_handle is always valid (CVE-2017-9605)
* infoleak due to a data race in ALSA timer (CVE-2017-1000380)
* A buffer overflow flaw was discovered in the trace subsystem
(CVE-2017-0605)
* The NFSv2 and NFSv3 server implementations do not properly handle payload
bounds checking of WRITE requests. A remote attacker with write access to a
NFS mount can take advantage of this flaw to read chunks of arbitrary
memory from both kernel-space and user-space (CVE-2017-7895)
* The io_ti USB serial driver could leak sensitive information if a malicious
USB device was connected (CVE-2017-8924)
* A reference counter leak in the omninet USB serial driver, resulting in a
use-after-free vulnerability. This can be triggered by a local user
permitted to open tty devices (CVE-2017-8925)
* The stack guard page is not sufficiently large. The stack-pointer can jump
over the guard-page and moving from the stack into another memory region
without accessing the guard-page. In this case no page-fault exception is
raised and the stack extends into the other memory region. An attacker can
exploit this flaw for privilege escalation (CVE-2017-1000364) |
| Additional notes | This is the first part of the update. |
| CVE ID | CVE-2017-2636 CVE-2017-6874 CVE-2016-2188 CVE-2017-7184 CVE-2017-7187 CVE-2017-7261 CVE-2017-7294 CVE-2017-7308 CVE-2016-9604 CVE-2017-2596 CVE-2017-2671 CVE-2017-5986 CVE-2017-6353 CVE-2017-6951 CVE-2017-7374 CVE-2017-7472 CVE-2017-7477 CVE-2017-7487 CVE-2017-7618 CVE-2017-7645 CVE-2017-7889 CVE-2017-8061 CVE-2017-8063 CVE-2017-8064 CVE-2017-8067 CVE-2017-9150 CVE-2017-1000363 CVE-2017-8890 CVE-2017-9074 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 CVE-2017-9242 CVE-2017-9211 CVE-2017-7346 CVE-2017-9605 CVE-2017-1000380 CVE-2017-0605 CVE-2017-7895 CVE-2017-8924 CVE-2017-8925 CVE-2017-1000364 |
| UCS Bug number | #44416 |
