Debian Bug report logs -
#875881
linux: CVE-2017-1000251
Package:
src:linux;
Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>;
Reported by: Christoph Anton Mitterer <calestyo@scientianet>
Date: Fri, 15 Sep 2017 14:42:01 UTC
Severity: critical
Tags: confirmed, fixed-upstream, security, ...
Several vulnerabilities have been discovered in the Linux kernel that
may lead to privilege escalation, denial of service or information
leaks
CVE-2017-7518
Andy Lutomirski discovered that KVM is prone to an incorrect debug
exception (#DB) error occurring while emulating a syscall
instruction A process inside a guest can take advanta ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVS ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 73 Advanced Update Support, Red Hat Enterprise Linux 73 Telco Extended Update Support, and Red Hat Enterprise Linux 73 Update Services ...
Synopsis
Important: kernel-rt security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis
Important: kernel security update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 59 Long LifeRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis
Important: kernel security and bug fix update
Type/Severity
Security Advisory: Important
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabil ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Exploitable memory corruption due to UFO to non-UFO path switch (CVE-2017-1000112)
heap out-of-bounds in AF_PACKET sockets (CVE-2017-1000111)
The mq_notify function in the Linux kernel does not set the sock pointer to NULL upon entry into the retry logic During a user-space close of a Netlink socket, it allows attackers to possibly cause a situati ...
An exploitable memory corruption flaw was found in the Linux kernel The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges ...
Exploitable memory corruption due to UFO to non-UFO path switch When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption In case UFO packet lengths exceeds MTU, copy = maxfraglen ...