Debian Bug report logs -
#875881
linux: CVE-2017-1000251
Package:
src:linux;
Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>;
Reported by: Christoph Anton Mitterer <calestyo@scientianet>
Date: Fri, 15 Sep 2017 14:42:01 UTC
Severity: critical
Tags: confirmed, fixed-upstream, security, ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVS ...
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Several vulnerabilities have been discovered in the Linux kernel that
may lead to privilege escalation, denial of service or information
leaks
CVE-2017-7518
Andy Lutomirski discovered that KVM is prone to an incorrect debug
exception (#DB) error occurring while emulating a syscall
instruction A process inside a guest can take advanta ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Exploitable memory corruption due to UFO to non-UFO path switch (CVE-2017-1000112)
heap out-of-bounds in AF_PACKET sockets (CVE-2017-1000111)
The mq_notify function in the Linux kernel does not set the sock pointer to NULL upon entry into the retry logic During a user-space close of a Netlink socket, it allows attackers to possibly cause a situati ...
A race condition issue was found in the way the raw packet socket implementation in the Linux kernel networking subsystem handled synchronization A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this to waste resources in the kernel's ring buffer or possibly cause an out-of-bounds read on the heap leadi ...
heap out-of-bounds in AF_PACKET sockets This new issue is analogous to previously disclosed CVE-2016-8655 In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring Previously with PACKET_VERSION This time with PACKET_RESERVE The solution is similar: lock the socket for the update This issue may be ...