vulnerability
SUSE: CVE-2017-7294: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Mar 28, 2017 | Apr 19, 2017 | Feb 4, 2022 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Mar 28, 2017
Added
Apr 19, 2017
Modified
Feb 4, 2022
Description
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
Solution(s)
suse-upgrade-cluster-md-kmp-defaultsuse-upgrade-cluster-network-kmp-defaultsuse-upgrade-dlm-kmp-defaultsuse-upgrade-gfs2-kmp-defaultsuse-upgrade-kernel-defaultsuse-upgrade-kernel-docssuse-upgrade-kernel-ec2suse-upgrade-kernel-ec2-develsuse-upgrade-kernel-ec2-extrasuse-upgrade-kernel-obs-buildsuse-upgrade-ocfs2-kmp-default
References
- SUSE-SUSE-SU-2017:1059-1
- SUSE-SUSE-SU-2017:1060-1
- SUSE-SUSE-SU-2017:1064-1
- SUSE-SUSE-SU-2017:1183-1
- SUSE-SUSE-SU-2017:1247-1
- SUSE-SUSE-SU-2017:1277-1
- SUSE-SUSE-SU-2017:1279-1
- SUSE-SUSE-SU-2017:1280-1
- SUSE-SUSE-SU-2017:1283-1
- SUSE-SUSE-SU-2017:1284-1
- SUSE-SUSE-SU-2017:1288-1
- SUSE-SUSE-SU-2017:1289-1
- SUSE-SUSE-SU-2017:1290-1
- SUSE-SUSE-SU-2017:1293-1
- SUSE-SUSE-SU-2017:1294-1
- SUSE-SUSE-SU-2017:1295-1
- SUSE-SUSE-SU-2017:1297-1
- SUSE-SUSE-SU-2017:1301-1
- SUSE-SUSE-SU-2017:1303-1
- SUSE-SUSE-SU-2017:1308-1
- SUSE-SUSE-SU-2017:1360-1
- SUSE-SUSE-SU-2017:1990-1
- SUSE-SUSE-SU-2017:2342-1
- SUSE-SUSE-SU-2017:2525-1
- BID-97177
- REDHAT-RHSA-2018:0676
- REDHAT-RHSA-2018:1062
- NVD-CVE-2017-7294
- DEBIAN-DLA-922-1
- UBUNTU-USN-3291-1
- UBUNTU-USN-3291-2
- UBUNTU-USN-3291-3
- UBUNTU-USN-3293-1
- UBUNTU-USN-3335-1
- UBUNTU-USN-3342-1
- UBUNTU-USN-3342-2
- UBUNTU-USN-3343-1
- UBUNTU-USN-3343-2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.