GCVE-VVD-MAGEIA-2017-384
Advisory Published
Vulnetix · Advisory published October 24, 2017
This kernel-tmb update is based on upstream 4.9.56 and fixes at least the following security issues: A flaw was found in the way the Linux KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest (CVE-2017-7518). A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace (CVE-2017-7558). A security flaw was discovered in nl80211_set_rekey_data() function in the Linux kernel since v3.1-rc1 through v4.13. This function does not check whether the required attributes are present in a netlink request. This request can be issued by a user with CAP_NET_ADMIN privilege and may result in NULL dereference and a system crash (CVE-2017-12153). Linux kernel built with the KVM visualization support (CONFIG_KVM), with nested visualization (nVMX) feature enabled (nested=1), is vulnerable to a crash due to disabled external interrupts. As L2 guest could acce s (r/w) hardware CR8 register of the host(L0). In a nested visualization setup, L2 guest user could use this flaw to potentially crash the host(L0) resulting in DoS (CVE-2017-12154). The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path (CVE-2017-14106). The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes (CVE-2017-14156). It was found that the iscsi_if_rx() function in scsi_transport_iscsi.c in the Linux kernel since v2.6.24-rc1 through 4.13.2 allows local users to cause a denial of service (a system panic) by making a number of certain syscalls by leveraging incorrect length validation in the kernel code (CVE-2017-14489). The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0 (CVE-2017-14991). The tpacket_rcv() function in 'net/packet/af_packet.c' file in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls (CVE-2017-14497). A reachable assertion failure flaw was found in the Linux kernel built with KVM virtualisation(CONFIG_KVM) support with Virtual Function I/O feature (CONFIG_VFIO) enabled. This failure could occur if a malicious guest device sent a virtual interrupt (guest IRQ) with a larger (>1024) index value (CVE-2017-1000252). For other upstream fixes in this update, read the referenced changelogs.

Affected Products

VendorProductVersionsPlatforms
Mageiakernel-tmb0 (affected), 4.9.56-1.mga6 (unaffected)

Aliases

Transitive aliases

CVE-2017-13084EUVD-2017-4604CVE-2017-13215EUVD-2018-1874GHSA-899p-w494-v855ALAS2-2018-1050VVD-MAGEIA-2018-296VVD-MAGEIA-2018-337EUVD-2018-20957GHSA-2wr3-w5rh-2qx4GHSA-hwr9-p63p-wq87VVD-MAGEIA-2018-63CVE-2017-17857EUVD-2018-6524VVD-MAGEIA-2018-374CVE-2018-8897GHSA-2gc2-cm86-3pjxVVD-CERTCC-2017-228519EUVD-2017-9011EUVD-2017-9009BDU:2019-01059BDU:2019-01056CVE-2018-14641GHSA-5qx2-85hg-v5crSUSE-SU-2018:2940-1CVE-2017-17855CVE-2017-13079CNVD-2017-30397EUVD-2017-4600BDU:2017-02267BDU:2020-00735SUSE-SU-2018:2787-1CVE-2017-13086GHSA-vhcx-55j8-pv9cCVE-2018-14678GSD-2018-10902EUVD-2017-5667CVE-2018-15594EUVD-2018-6536GHSA-wjj9-4g79-4c2cGHSA-grv8-gqh3-fmc9CNVD-2018-07889SUSE-SU-2018:2775-1CVE-2017-16996GHSA-fhr3-fj6p-xhpfCVE-2018-5391ALAS-2019-1280CVE-2018-13094GSD-2018-6412EUVD-2018-11741SUSE-SU-2018:2962-1CVE-2017-17856EUVD-2017-9010EUVD-2017-0915EUVD-2018-2946CVE-2018-1000199CVE-2018-3615GHSA-2jfx-4v33-68mfSUSE-SU-2018:2538-1GHSA-cr4j-59jc-xqhgCVE-2018-10877EUVD-2018-18169BDU:2019-01344GHSA-mxm3-6wfv-q9qgCVE-2017-17863CVE-2018-10883GHSA-5fh3-v3jw-rc9hGHSA-qv83-77rj-635jGHSA-4jqv-ffjp-jw6vEUVD-2017-4606EUVD-2018-17160EUVD-2018-2941CVE-2018-10901BDU:2019-02397SUSE-SU-2018:1048-1EUVD-2018-2958GHSA-8x9x-6w2w-w9h8CVE-2018-13405SUSE-SU-2018:2862-1cisco-sa-20171016-wpaEUVD-2017-9000BDU:2017-02264ALAS2-2018-1058GHSA-9c72-6vp8-jx77CVE-2017-17864GHSA-j9fr-8f9m-c9qcCVE-2018-10853EUVD-2018-5042GHSA-pvv9-p2gj-w426BDU:2019-02512GHSA-vx6h-cqmq-qj84CNVD-2017-30405CVE-2017-16995BDU:2017-02269EUVD-2018-18306EUVD-2017-9469CNVD-2017-30398GHSA-6q2v-x4cv-ghqxCVE-2018-6412CVE-2017-18216GHSA-gffw-ppmc-p7r6EUVD-2018-15469GHSA-j2cv-h77g-5p95VVD-MAGEIA-2018-64CVE-2017-13082CVE-2018-16658GHSA-88jq-244c-4xj3EUVD-2018-4849RHSA-2019:0415EUVD-2018-11754BDU:2019-03124EUVD-2017-3737H1-286740GHSA-9x5q-ww2j-jw9xALAS-2018-1087EUVD-2018-2942BDU:2019-00977GHSA-xfrv-5h7j-4qvxGHSA-j658-wqr4-q3w7CVE-2017-13077CVE-2017-0561BDU:2017-02265BDU:2017-02263EUVD-2018-8460BDU:2019-02783GHSA-cc5r-x8fh-jwv3EUVD-2017-9001CVE-2018-16276GHSA-qvr8-f9g3-wv5xBDU:2019-01058GHSA-p95m-33p3-2qfrEUVD-2018-2922EUVD-2017-8108CVE-2017-13088CVE-2018-10881CNVD-2017-14425GHSA-hwv5-xg68-86fhEUVD-2018-20505EUVD-2018-10016EUVD-2018-7349SUSE-SU-2018:2858-1EUVD-2017-9002CVE-2018-10876CVE-2018-9363EUVD-2018-11720VVD-MAGEIA-2017-467EUVD-2018-6537CVE-2018-12896CVE-2018-10882BDU:2017-02271BDU:2017-02268BDU:2021-01436GHSA-rhjq-jcf3-f32gEUVD-2017-3763EUVD-2017-8999CVE-2018-10902CVE-2018-12904CVE-2018-7995VVD-MAGEIA-2017-463EUVD-2018-10173EUVD-2017-4602GHSA-fr39-wf38-f5w3SUSE-SU-2018:3084-1GHSA-84fm-f9m3-wc94EUVD-2017-1513CVE-2017-18344EUVD-2017-4596VVD-MAGEIA-2018-340SUSE-SU-2021:0452-1GHSA-h9mf-j5vf-pc99GHSA-3rm8-9cxg-8m49VVD-MAGEIA-2018-341EUVD-2018-2746CVE-2018-10879GHSA-4994-8w6g-9jvwGHSA-gh8r-7rf7-w4rgSUSE-SU-2018:2960-1GHSA-jq36-53qv-7v3mCVE-2018-6555BDU:2017-02270VVD-MAGEIA-2018-419EUVD-2018-19707VVD-MAGEIA-2018-418CVE-2017-13080EUVD-2018-2992CVE-2018-20856CVE-2018-3646GHSA-r277-gjg9-h48hALAS-2018-1023EUVD-2018-5348GHSA-c688-2x49-65h9GHSA-8j5h-gvcc-pfhwVVD-MAGEIA-2017-379ALAS2-2018-1051BDU:2021-01415BDU:2021-01420GHSA-873h-38h4-56jxGSD-2017-17863EUVD-2017-4595CNVD-2017-30406EUVD-2016-0812ALAS-2018-1086ALAS-2018-1048GHSA-289m-2pf5-x59pCNVD-2018-03941CVE-2017-13087EUVD-2017-4599EUVD-2018-7468BDU:2019-00978GHSA-mq9x-53x3-39h5SUSE-SU-2018:3029-1BDU:2019-00979CVE-2018-10840CVE-2018-18445VVD-MAGEIA-2018-417VVD-MAGEIA-2018-62BDU:2019-02508CVE-2017-16939CVE-2018-18281CVE-2018-3620EUVD-2018-6572CVE-2018-13093BDU:2017-02272CNVD-2017-30404EUVD-2018-11737EUVD-2018-15500GHSA-xpjw-vcgc-qx6pGHSA-wxv4-3q58-w3mxBDU:2019-01055BDU:2019-01054GHSA-mw8q-cf75-7f35GHSA-p6x5-xg7h-fj5hGSD-2018-1091SUSE-SU-2018:2961-1VVD-MAGEIA-2017-383VVD-MAGEIA-2017-386CVE-2017-0786EUVD-2017-9003GHSA-45mv-5p9c-6w7cEUVD-2018-2909EUVD-2017-5992BDU:2017-00893GHSA-qwp3-c8jm-p6v6EUVD-2018-13396EUVD-2018-6541RHSA-2019:0641CNVD-2018-17431CVE-2018-14634GHSA-fwvw-9m43-mj3mEUVD-2017-1140GHSA-55f7-p7jv-3448CNVD-2017-30401GHSA-f9jm-8gc5-4v7gGHSA-h6c2-frm7-53hmGHSA-rgw3-fq9h-vvg7VVD-MAGEIA-2017-466CVE-2017-15265CVE-2017-17854CVE-2017-17862GHSA-p984-v28j-p56qCVE-2018-10878CNVD-2017-30400CVE-2018-1068BDU:2017-02266EUVD-2017-9004CVE-2018-14734GHSA-9jqj-q3v6-cv9hGHSA-229x-53vm-m4f4CVE-2017-13081CVE-2018-17182EUVD-2017-5618GHSA-mxrv-cp62-8842GHSA-c3vm-qh5c-27gqCVE-2018-5390EUVD-2018-2943GHSA-4hq8-f3mj-m9wcCVE-2018-1091EUVD-2018-11762GHSA-qj7r-58vw-6wwwBDU:2019-01057ALAS-2018-1049BDU:2021-01418EUVD-2017-4732SUSE-SU-2018:2539-1GHSA-3xm5-vf98-cwqxGHSA-8r3h-6rgp-rrqmVVD-MAGEIA-2018-324ALAS2-2018-994CVE-2018-15471EUVD-2018-4857ALAS2-2018-1023VVD-MAGEIA-2017-381CVE-2017-17852CVE-2017-9417CVE-2018-10675GHSA-gwvj-5r5w-vc2gBDU:2019-01060ALAS-2018-1058EUVD-2017-9348CVE-2017-13078GHSA-gcfj-hpmm-x9xfSUSE-SU-2018:2776-1EUVD-2017-4598GHSA-v67j-hmh5-9qhgGHSA-ggjw-r373-gj64GHSA-jw6w-m4jf-m6xpEUVD-2018-8128EUVD-2018-15474GHSA-9w6j-7396-jgw4CVE-2018-14633EUVD-2017-4605EUVD-2017-4597EUVD-2018-2944ALAS2-2018-971GHSA-f8g5-rmc4-j74gCVE-2018-1108SUSE-SU-2018:2963-1GHSA-q7q6-h2q3-86p9CVE-2018-6554CVE-2018-10940GHSA-fx3c-8pqx-5v4cGHSA-jrh4-2f65-vc34EUVD-2018-2947EUVD-2018-18307EUVD-2018-6620EUVD-2017-16535CVE-2018-14617EUVD-2017-18352ALAS2-2019-1280GHSA-68p5-hvhw-rpc8EUVD-2018-17161GHSA-88p5-45fx-5x87CVE-2018-1087GHSA-fr9c-f69x-fpvfCVE-2017-17853CVE-2018-10880GHSA-752f-2m5c-7473EUVD-2018-2940EUVD-2018-2945EUVD-2018-5043SUSE-SU-2018:1217-1VVD-MAGEIA-2017-472CNVD-2017-38518GHSA-9pwc-v5p9-3c37VVD-MAGEIA-2018-373CVE-2018-1118GHSA-496w-f8vc-3275GHSA-mmph-rg95-j757SUSE-SU-2018:2860-1CVE-2017-12188EUVD-2017-8163CNVD-2017-30399CNVD-2017-30402EUVD-2018-7446GHSA-v788-jmxr-wgj9ALAS-2018-971VVD-MAGEIA-2018-391VVD-MAGEIA-2018-323CNVD-2017-30403EUVD-2018-8956ALAS2-2019-1281SUSE-SU-2018:2864-1GHSA-5p56-pcgw-42mfGHSA-87xr-wmm8-4mx3GHSA-843x-7h9r-xpf8EUVD-2017-6725EUVD-2017-8164CVE-2016-0801CVE-2018-15572BDU:2017-01325GHSA-fw8c-q6fq-37rgEUVD-2018-2959ALAS2-2018-1086GHSA-rm5p-g62j-4fc3VVD-MAGEIA-2017-387VVD-MAGEIA-2017-388

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.