[kernel-sec-discuss] r5818 - dsa-texts
Ben Hutchings
benh at moszumanska.debian.org
Sat Dec 23 04:35:51 UTC 2017
Author: benh
Date: 2017-12-23 04:35:51 +0000 (Sat, 23 Dec 2017)
New Revision: 5818
Modified:
dsa-texts/4.9.65-3+deb9u1
Log:
Fill in descriptions of all issues, and some mitigations
Modified: dsa-texts/4.9.65-3+deb9u1
===================================================================
--- dsa-texts/4.9.65-3+deb9u1 2017-12-22 22:40:44 UTC (rev 5817)
+++ dsa-texts/4.9.65-3+deb9u1 2017-12-23 04:35:51 UTC (rev 5818)
@@ -21,28 +21,111 @@
CVE-2017-16538
+ Andrey Konovalov reported that the dvb-usb-lmedm04 media driver
+ did not correctly handle some error conditions during
+ initialisation. A physically present user with a specially
+ designed USB device can use this to cause a denial of service
+ (crash).
+
CVE-2017-16644
+ Andrey Konovalov reported that the hdpvr media driver did not
+ correctly handle some error conditions during initialisation. A
+ physically present user with a specially designed USB device can
+ use this to cause a denial of service (crash).
+
CVE-2017-16995
+ Jann Horn discovered that the Extended BPF verifier did not
+ correctly model the behaviour of 32-bit load instructions. A
+ local user can use this for privilege escalation.
+
+CVE-2017-XXXXX
+
+ Alexei Starovoitov discovered that the Extended BPF verifier
+ ignored unreachable code, even though it would still be processed
+ by JIT compilers. This could possibly be used by local users for
+ denial of service. It also increases the severity of bugs in
+ determining unreachable code.
+
+CVE-2017-XXXXX
+
+ Jann Horn discovered that the Extended BPF verifier did not
+ correctly model pointer arithmetic on the stack frame pointer.
+ A local user can use this for privilege escalation.
+
+CVE-2017-XXXXX
+
+ Jann Horn discovered that the Extended BPF verifier could fail to
+ detect pointer leaks from conditional code. A local user could
+ use this to obtain sensitive information in order to exploit
+ other vulnerabilities.
+
CVE-2017-17448
+ Kevin Cernekee discovered that the netfilter subsystem allowed
+ users with the CAP_NET_ADMIN capability in any user namespace, not
+ just the root namespace, to enable and disable connection tracking
+ helpers. This could lead to denial of service, violation of
+ network security policy, or have other impact.
+
CVE-2017-17449
+ Kevin Cernekee discovered that the netlink subsystem allowed
+ users with the CAP_NET_ADMIN capability in any user namespace
+ to monitor netlink traffic in all net namespaces, not just
+ those owned by that user namespace. This could lead to
+ exposure of sensitive information.
+
CVE-2017-17450
+ Kevin Cernekee discovered that the xt_osf module allowed users
+ with the CAP_NET_ADMIN capability in any user namespace to modify
+ the global OS fingerprint list.
+
CVE-2017-17558
+ Andrey Konovalov reported that that USB core did not correctly
+ handle some error conditions during initialisation. A physically
+ present user with a specially designed USB device can use this to
+ cause a denial of service (crash or memory corruption), or
+ possibly for privilege escalation.
+
CVE-2017-17712
+ Mohamed Ghannam discovered a race condition in the IPv4 raw socket
+ implementation. A local user could use this to obtain sensitive
+ information from the kernel.
+
CVE-2017-17741
+ Dmitry Vyukov reported that the KVM implementation for x86 would
+ over-read data from memory when emulating an MMIO write if the
+ kvm_mmio tracepoint was enabled. A guest virtual machine might be
+ able to use this to cause a denial of service (crash).
+
CVE-2017-17805
+ It was discovered that some implementations of the Salsa20 block
+ cipher did not correctly handle zero-length input. A local user
+ could use this to cause a denial of service (crash) or possibly
+ have other security impact.
+
CVE-2017-17806
+ It was discovered that the HMAC implementation could be used with
+ an underlying hash algorithm that requires a key, which was not
+ intended. A local user could use this to cause a denial of
+ service (crash or memory corruption), or possibly for privilege
+ escalation.
+
CVE-2017-17807
+ Eric Biggers discovered that the KEYS subsystem lacked a check for
+ write permission when adding keys to a process's default keyring.
+ A local user could use this to cause a denial of service or to
+ obtain sensitive information.
+
CVE-2017-1000407
Andrew Honig reported that the KVM implementation for Intel
@@ -52,6 +135,19 @@
CVE-2017-1000410
+ Ben Seri reported that the Bluetooth subsystem did not correctly
+ handle short EFS information elements in L2CAP messages. An
+ attacker able to communicate over Bluetooth could use this to
+ obtain sensitive information from the kernel.
+
+The various problems in the Extended BPF verifier can be mitigated by
+disabling use of Extended BPF by unprivileged users:
+sysctl kernel.unprivileged_bpf_disabled=1
+
+Debian disables unprivileged user namespaces by default, but if they
+are enabled (via the kernel.unprivileged_userns_clone sysctl) then
+CVE-2017-17448 can be exploited by any local user.
+
For the stable distribution (stretch), these problems have been fixed
in 4.9.65-3+deb9u1.
More information about the kernel-sec-discuss
mailing list