Synopsis: Important: kernel security, bug fix, and enhancement update
Advisory ID: SLSA-2018:1062-1
Issue Date: 2018-04-10
CVE Numbers: CVE-2017-5754
CVE-2017-8824
CVE-2017-12190
CVE-2017-1000410
CVE-2017-17449
CVE-2017-17448
CVE-2017-15129
CVE-2018-1000004
CVE-2018-6927
CVE-2016-3672
CVE-2016-8633
CVE-2016-7913
CVE-2017-7294
CVE-2017-14140
CVE-2017-9725
CVE-2017-1000252
CVE-2017-12154
CVE-2017-15265
CVE-2017-15116
CVE-2017-1000407
CVE-2017-15121
CVE-2017-15126
CVE-2017-15127
CVE-2017-17558
CVE-2017-18017
CVE-2018-5750
CVE-2017-13166
CVE-2017-18203
--
Security Fix(es):
* hw: cpu: speculative execution permission faults handling
(CVE-2017-5754, Important, KVM for Power)
* kernel: Buffer overflow in firewire driver via crafted incoming packets
(CVE-2016-8633, Important)
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824,
Important)
* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
(CVE-2017-12154, Important)
* kernel: v4l2: disabled memory access protection mechanism allowing
privilege escalation (CVE-2017-13166, Important)
* kernel: media: use-after-free in [tuner-xc2028] media driver
(CVE-2016-7913, Moderate)
* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl()
(CVE-2017-7294, Moderate)
* kernel: Incorrect type conversion for size during dma allocation
(CVE-2017-9725, Moderate)
* kernel: memory leak when merging buffers in SCSI IO vectors
(CVE-2017-12190, Moderate)
* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client
(CVE-2017-15121, Moderate)
* kernel: Use-after-free in userfaultfd_event_wait_completion function in
userfaultfd.c (CVE-2017-15126, Moderate)
* kernel: net: double-free and memory corruption in get_net_ns_by_id()
(CVE-2017-15129, Moderate)
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265,
Moderate)
* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c
allows for unprivileged access to systemwide nfnl_cthelper_list structure
(CVE-2017-17448, Moderate)
* kernel: Missing namespace check in net/netlink/af_netlink.c allows for
network monitors to observe systemwide activity (CVE-2017-17449, Moderate)
* kernel: Unallocated memory access by malicious USB device via
bNumInterfaces overflow (CVE-2017-17558, Moderate)
* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in
net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate)
* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows
local users to cause a denial of service (CVE-2017-18203, Moderate)
* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ
(CVE-2017-1000252, Moderate)
* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407,
Moderate)
* kernel: Stack information leak in the EFS element (CVE-2017-1000410,
Moderate)
* kernel: Kernel address information leak in
drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing
KASLR bypass (CVE-2018-5750, Moderate)
* kernel: Race condition in sound system can lead to denial of service
(CVE-2018-1000004, Moderate)
* kernel: multiple Low security impact security issues (CVE-2016-3672,
CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low)
Additional Changes:
--
SL7
x86_64
kernel-3.10.0-862.el7.x86_64.rpm
kernel-debug-3.10.0-862.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debug-devel-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-862.el7.x86_64.rpm
kernel-devel-3.10.0-862.el7.x86_64.rpm
kernel-headers-3.10.0-862.el7.x86_64.rpm
kernel-tools-3.10.0-862.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-3.10.0-862.el7.x86_64.rpm
perf-3.10.0-862.el7.x86_64.rpm
perf-debuginfo-3.10.0-862.el7.x86_64.rpm
python-perf-3.10.0-862.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-862.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm
noarch
kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm
kernel-doc-3.10.0-862.el7.noarch.rpm
- Scientific Linux Development Team
|