SCIENTIFIC-LINUX-ERRATA Archives

April 2018

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Scott Reid <[log in to unmask]>
Reply To:
Date:
Mon, 30 Apr 2018 18:38:06 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (136 lines)
Synopsis:          Important: kernel security, bug fix, and enhancement update
Advisory ID:       SLSA-2018:1062-1
Issue Date:        2018-04-10
CVE Numbers:       CVE-2017-5754
                   CVE-2017-8824
                   CVE-2017-12190
                   CVE-2017-1000410
                   CVE-2017-17449
                   CVE-2017-17448
                   CVE-2017-15129
                   CVE-2018-1000004
                   CVE-2018-6927
                   CVE-2016-3672
                   CVE-2016-8633
                   CVE-2016-7913
                   CVE-2017-7294
                   CVE-2017-14140
                   CVE-2017-9725
                   CVE-2017-1000252
                   CVE-2017-12154
                   CVE-2017-15265
                   CVE-2017-15116
                   CVE-2017-1000407
                   CVE-2017-15121
                   CVE-2017-15126
                   CVE-2017-15127
                   CVE-2017-17558
                   CVE-2017-18017
                   CVE-2018-5750
                   CVE-2017-13166
                   CVE-2017-18203
--

Security Fix(es):

* hw: cpu: speculative execution permission faults handling
(CVE-2017-5754, Important, KVM for Power)

* kernel: Buffer overflow in firewire driver via crafted incoming packets
(CVE-2016-8633, Important)

* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824,
Important)

* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
(CVE-2017-12154, Important)

* kernel: v4l2: disabled memory access protection mechanism allowing
privilege escalation (CVE-2017-13166, Important)

* kernel: media: use-after-free in [tuner-xc2028] media driver
(CVE-2016-7913, Moderate)

* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
(CVE-2017-7294, Moderate)

* kernel: Incorrect type conversion for size during dma allocation
(CVE-2017-9725, Moderate)

* kernel: memory leak when merging buffers in SCSI IO vectors
(CVE-2017-12190, Moderate)

* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
(CVE-2017-15121, Moderate)

* kernel: Use-after-free in userfaultfd_event_wait_completion function in
userfaultfd.c (CVE-2017-15126, Moderate)

* kernel: net: double-free and memory corruption in get_net_ns_by_id()
(CVE-2017-15129, Moderate)

* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265,
Moderate)

* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c
allows for unprivileged access to systemwide nfnl_cthelper_list structure
(CVE-2017-17448, Moderate)

* kernel: Missing namespace check in net/netlink/af_netlink.c allows for
network monitors to observe systemwide activity (CVE-2017-17449, Moderate)

* kernel: Unallocated memory access by malicious USB device via
bNumInterfaces overflow (CVE-2017-17558, Moderate)

* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)

* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows
local users to cause a denial of service (CVE-2017-18203, Moderate)

* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
(CVE-2017-1000252, Moderate)

* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407,
Moderate)

* kernel: Stack information leak in the EFS element (CVE-2017-1000410,
Moderate)

* kernel: Kernel address information leak in
drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing
KASLR bypass (CVE-2018-5750, Moderate)

* kernel: Race condition in sound system can lead to denial of service
(CVE-2018-1000004, Moderate)

* kernel: multiple Low security impact security issues (CVE-2016-3672,
CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)

Additional Changes:
--

SL7
  x86_64
    kernel-3.10.0-862.el7.x86_64.rpm
    kernel-debug-3.10.0-862.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
    kernel-devel-3.10.0-862.el7.x86_64.rpm
    kernel-headers-3.10.0-862.el7.x86_64.rpm
    kernel-tools-3.10.0-862.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
    perf-3.10.0-862.el7.x86_64.rpm
    perf-debuginfo-3.10.0-862.el7.x86_64.rpm
    python-perf-3.10.0-862.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
    kernel-doc-3.10.0-862.el7.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2