CVE-2017-8061
https://notcve.org/view.php?id=CVE-2017-8061
drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. drivers/media/usb/dvb-usb/dvb-usb-firmware.c en el kernel de Linux 4.9.x y 4.10.x en versiones anteriores a 4.10.7 interactúa incorrectamente con la opción CONFIG_VMAP_STACK, que permite a usuarios locales provocar una denegación de servicio (bloqueo del sistema o corrupción de memoria) o posiblemente tiene otro impacto no especificado aprovechando el uso de más de una página virtual para la lista de dispersión DMA. • http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.7 http://www.openwall.com/lists/oss-security/2017/04/16/4 http://www.securityfocus.com/bid/97972 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67b0503db9c29b04eadfeede6bebbfe5ddad94ef https://github.com/torvalds/linux/commit/67b0503db9c29b04eadfeede6bebbfe5ddad94ef • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-8071
https://notcve.org/view.php?id=CVE-2017-8071
drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors. drivers/hid/hid-cp2112.c en el kernel de Linux 4.9.x en versiones anteriores a 4.9.9 utiliza un spinlock sin considerar que es posible el sleeping en una solicitud de devolución de llamada en HID USB, lo que permite a los usuarios locales provocar una denegación de servicio (punto muerto) a través de vectores no especificados. • http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9 http://www.openwall.com/lists/oss-security/2017/04/16/4 http://www.securityfocus.com/bid/97991 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a7b5df84b6b4e5d599c7289526eed96541a0654 https://github.com/torvalds/linux/commit/7a7b5df84b6b4e5d599c7289526eed96541a0654 • CWE-404: Improper Resource Shutdown or Release •
CVE-2017-8069
https://notcve.org/view.php?id=CVE-2017-8069
drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. drivers/net/usb/rtl8150.c en el kernel de Linux 4.9.x en versiones anteriores a 4.9.11 interactúa incorrectamente con la opción CONFIG_VMAP_STACK, que permite a usuarios locales provocar una denegación de servicio (bloqueo del sistema o corrupción de memoria) o posiblemente tiene otro impacto no especificado aprovechando el uso de más de una página virtual para la lista de dispersión DMA. • http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.11 http://www.openwall.com/lists/oss-security/2017/04/16/4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7926aff5c57b577ab0f43364ff0c59d968f6a414 https://github.com/torvalds/linux/commit/7926aff5c57b577ab0f43364ff0c59d968f6a414 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2017-8072
https://notcve.org/view.php?id=CVE-2017-8072
The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. La función cp2112_gpio_direction_input en drivers/hid/hid-cp2112.c en el kernel de Linux 4.9.x en versiones anteriores a 4.9.9 no tiene el estado de error EIO esperado para un informe de longitud cero, lo que permite a los usuarios locales tener un impacto no especificado a través de vectores desconocidos. • http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.9 http://www.openwall.com/lists/oss-security/2017/04/16/4 http://www.securityfocus.com/bid/98010 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8e9faa15469ed7c7467423db4c62aeed3ff4cae3 https://github.com/torvalds/linux/commit/8e9faa15469ed7c7467423db4c62aeed3ff4cae3 • CWE-388: 7PK - Errors •
CVE-2017-7645 – kernel: nfsd: Incorrect handling of long RPC replies
https://notcve.org/view.php?id=CVE-2017-7645
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. El servidor NFSv2/NFSv3 en el subsistema nfsd en el Kernel de Linux hasta la versión 4.10.11 permite a atacantes remotos provocar una denegación de servicio (caída de sistema) a través de una respuesta RPC larga, relacionada con net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c y fs/nfsd/nfsxdr.c. The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. • http://www.debian.org/security/2017/dsa-3886 http://www.securityfocus.com/bid/97950 https://access.redhat.com/errata/RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2018:1319 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e https://help.ecostruxur • CWE-20: Improper Input Validation CWE-130: Improper Handling of Length Parameter Inconsistency •