{"id":25608,"date":"2017-09-25T11:45:52","date_gmt":"2017-09-25T03:45:52","guid":{"rendered":"https:\/\/www.deepin.org\/?p=25608"},"modified":"2018-11-12T14:12:22","modified_gmt":"2018-11-12T06:12:22","slug":"deepin-security-updates-cve-2017-12134-cve-2017-12153-cve-2017-12154-cve-2017-1000252","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/deepin-security-updates-cve-2017-12134-cve-2017-12153-cve-2017-12154-cve-2017-1000252\/","title":{"rendered":"deepin Security Updates (CVE-2017-12134 &#038;CVE-2017-12153 &#038;CVE-2017-12154 \u2026&#038;CVE-2017-1000252)"},"content":{"rendered":"<img loading=\"lazy\" class=\"alignnone size-full wp-image-25620 aligncenter\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2017\/09\/en-7.jpg\" alt=\"en\" width=\"749\" height=\"321\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7.jpg 749w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-600x257.jpg 600w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-150x64.jpg 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-300x129.jpg 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-24x10.jpg 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-36x15.jpg 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en-7-48x21.jpg 48w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The security updates of\u00a0systemd and linux kernal.<\/p>\n<h2>Vulnerability Information<\/h2>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-12134\">CVE-2017-12134<\/a>\u00a0\u2014Security Updates<\/strong><\/p>\n<p>Security database details:<\/p>\n<p>The xen_biovec_phys_mergeable function in drivers\/xen\/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-12153\">CVE-2017-12153<\/a> \u2014Security Updates<\/strong><\/p>\n<p>Security database details:<br \/>\nA security flaw was discovered in the nl80211_set_rekey_data() function in net\/wireless\/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer deference and system crash.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-12154\">CVE-2017-12154<\/a>\u00a0\u2014Security Updates<\/strong>Security database details:<br \/>\nThis candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-14051\">CVE-2017-14051<\/a>\u00a0\u2014Security Updates<\/strong>Security database details:<br \/>\nAn integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers\/scsi\/qla2xxx\/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-14140\">CVE-2017-14140<\/a> \u2014Security Updates<\/strong>Security database details:<br \/>\nThe move_pages system call in mm\/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-14156\">CVE-2017-14156<\/a> \u2014Security Updates<\/strong>Security database details:<br \/>\nThe atyfb_ioctl function in drivers\/video\/fbdev\/aty\/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-14489\">CVE-2017-14489<\/a> \u2014Security Updates<\/strong>Security database details:<br \/>\nThe iscsi_if_rx function in drivers\/scsi\/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-14497\">CVE-2017-14497<\/a> \u2014Security Updates<\/strong><\/p>\n<p>Security database details:<br \/>\nThe tpacket_rcv function in net\/packet\/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-1000251\">CVE-2017-1000251<\/a>\u00a0\u2014Security Updates<\/strong><\/p>\n<p>Security database details:<br \/>\nThe native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 3.3-rc1 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.<\/p>\n<p><strong><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-1000252\">CVE-2017-1000252<\/a>\u00a0\u2014Security Updates<\/strong><\/p>\n<p>Security database details:<br \/>\n'CVE-2017-1000252' is valid CVE-ID syntax, but the entry does not exist.<\/p>\n<h2>Fixing Status<\/h2>\n<p>We recommend that you upgrade the system to obtain the patches to fix the vulnerabilities.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-25621\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2017\/09\/en_s-7.jpg\" alt=\"en_s\" width=\"187\" height=\"96\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en_s-7.jpg 187w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en_s-7-150x77.jpg 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en_s-7-24x12.jpg 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en_s-7-36x18.jpg 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2017\/09\/en_s-7-48x25.jpg 48w\" sizes=\"(max-width: 187px) 100vw, 187px\" \/>","protected":false},"excerpt":{"rendered":"<p>The security updates of\u00a0systemd and linux kernal. Vulnerability Information CVE-2017-12134\u00a0\u2014Security Updates Security database details: The xen_biovec_phys_mergeable function in drivers\/xen\/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. CVE-2017-12153 \u2014Security Updates Security database details: A security flaw was discovered in the nl80211_set_rekey_data() function in net\/wireless\/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by ...<a href=https:\/\/www.deepin.org.cn\/en\/deepin-security-updates-cve-2017-12134-cve-2017-12153-cve-2017-12154-cve-2017-1000252\/>Read more<\/a><\/p>\n","protected":false},"author":141,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75,93],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/25608"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=25608"}],"version-history":[{"count":19,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/25608\/revisions"}],"predecessor-version":[{"id":28531,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/25608\/revisions\/28531"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=25608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=25608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=25608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}