{"id":24237,"date":"2017-07-19T17:31:17","date_gmt":"2017-07-19T09:31:17","guid":{"rendered":"https:\/\/www.deepin.org\/?p=24237"},"modified":"2017-07-19T17:32:09","modified_gmt":"2017-07-19T09:32:09","slug":"deepin-security-updates-cve-2017-8890-cve-2017-9445","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/deepin-security-updates-cve-2017-8890-cve-2017-9445\/","title":{"rendered":"deepin Security Updates (CVE-2017-8890 &#038;CVE-2017-9445)"},"content":{"rendered":"<img loading=\"lazy\" class=\"aligncenter size-full wp-image-24243\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2017\/07\/en-1.jpg\" alt=\"en\" width=\"749\" height=\"321\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1.jpg 749w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-600x257.jpg 600w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-150x64.jpg 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-300x129.jpg 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-24x10.jpg 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-36x15.jpg 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/07\/en-1-48x21.jpg 48w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The security updates of\u00a0systemd and linux kernal.<\/p>\n<h2>Vulnerability Information<\/h2>\n<p><strong><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2017-9445\">CVE-2017-9445<\/a> \u2014Security Updates<\/strong><\/p>\n<p>Security database details:<\/p>\n<p>In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2017-8890\">CVE-2017-8890<\/a> \u2014Security Updates<\/strong><\/p>\n<p>Security database details:<br \/>\nThe inet_csk_clone_lock function in net\/ipv4\/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.<\/p>\n<ul>\n<li><\/li>\n<li>\n<h2>Fixing Status<\/h2>\n<\/li>\n<\/ul>\n<p>We recommend that you upgrade the system to obtain the patches to fix the vulnerabilities.","protected":false},"excerpt":{"rendered":"<p>The security updates of\u00a0systemd and linux kernal. Vulnerability Information CVE-2017-9445 \u2014Security Updates Security database details: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. &nbsp; CVE-2017-8890 \u2014Security Updates Security database details: The inet_csk_clone_lock function in net\/ipv4\/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) ...<a href=https:\/\/www.deepin.org.cn\/en\/deepin-security-updates-cve-2017-8890-cve-2017-9445\/>Read more<\/a><\/p>\n","protected":false},"author":141,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/24237"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=24237"}],"version-history":[{"count":9,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/24237\/revisions"}],"predecessor-version":[{"id":24248,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/24237\/revisions\/24248"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=24237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=24237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=24237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}