Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2017:1215-1

Опубликовано: 08 мая 2017
Источник: suse-cvrf

Описание

Security update for the Linux Kernel

The openSUSE Leap 42.1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

  • CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).
  • CVE-2016-10318: A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel allowed a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service (bnc#1032435).
  • CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).
  • CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579).
  • CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
  • CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
  • CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
  • CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).

The following non-security bugs were fixed:

  • ata: ahci_xgene: free structure returned by acpi_get_object_info() (bsc#1033518).
  • doc/README.SUSE: update links to KMP manual
  • ext4: do not perform data journaling when data is encrypted (bsc#1012876).
  • ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).
  • ext4: mark inode dirty after converting inline directory (bsc#1012876).
  • ext4: reject inodes with negative size (bsc#1012876).
  • fs, seqfile: always allow oom killer (bsc#1012876).
  • ipv6: make ECMP route replacement less greedy (bsc#930399).
  • l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
  • mm: filemap: do not plant shadow entries without radix tree node (bsc#1012876).
  • netfilter: allow logging from non-init namespaces (bsc#970083).
  • nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670 CVE#2017-7645).
  • nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670 CVE#2017-7645).
  • nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670 CVE#2017-7645).

Список пакетов

openSUSE Leap 42.1
kernel-debug-4.1.39-56.1
kernel-debug-base-4.1.39-56.1
kernel-debug-devel-4.1.39-56.1
kernel-default-4.1.39-56.1
kernel-default-base-4.1.39-56.1
kernel-default-devel-4.1.39-56.1
kernel-devel-4.1.39-56.1
kernel-docs-4.1.39-56.2
kernel-docs-html-4.1.39-56.2
kernel-docs-pdf-4.1.39-56.2
kernel-ec2-4.1.39-56.1
kernel-ec2-base-4.1.39-56.1
kernel-ec2-devel-4.1.39-56.1
kernel-macros-4.1.39-56.1
kernel-obs-build-4.1.39-56.3
kernel-obs-qa-4.1.39-56.1
kernel-pae-4.1.39-56.1
kernel-pae-base-4.1.39-56.1
kernel-pae-devel-4.1.39-56.1
kernel-pv-4.1.39-56.1
kernel-pv-base-4.1.39-56.1
kernel-pv-devel-4.1.39-56.1
kernel-source-4.1.39-56.1
kernel-source-vanilla-4.1.39-56.1
kernel-syms-4.1.39-56.1
kernel-vanilla-4.1.39-56.1
kernel-vanilla-devel-4.1.39-56.1
kernel-xen-4.1.39-56.1
kernel-xen-base-4.1.39-56.1
kernel-xen-devel-4.1.39-56.1

Описание

A missing authorization check in the fscrypt_process_policy function in fs/crypto/policy.c in the ext4 and f2fs filesystem encryption support in the Linux kernel before 4.7.4 allows a user to assign an encryption policy to a directory owned by a different user, potentially creating a denial of service.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки

Описание

crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.


Затронутые продукты
openSUSE Leap 42.1:kernel-debug-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-base-4.1.39-56.1
openSUSE Leap 42.1:kernel-debug-devel-4.1.39-56.1
openSUSE Leap 42.1:kernel-default-4.1.39-56.1

Ссылки
Уязвимость openSUSE-SU-2017:1215-1