| Summary: | Local user can increase his privileges (CVE-2017-2636) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Marja Van Waes <marja11> |
| Component: | Security | Assignee: | Thomas Backlund <tmb> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | makowski.mageia |
| Version: | 5 | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636 | ||
| See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1428319 | ||
| Whiteboard: | |||
| Source RPM: | CVE: | ||
| Status comment: | |||
| Bug Depends on: | 20527, 20528, 20529 | ||
| Bug Blocks: | |||
|
Description
Marja Van Waes
2017-03-22 11:22:34 CET
Marja Van Waes
2017-03-22 15:07:25 CET
CC:
(none) =>
makowski.mageia according to RedHat : Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=82f2341c94d270421f383641b7cd670e474db56b and Mitigation: The n_hdlc kernel module will be automatically loaded when an application attempts to use the HDLC line discipline from userspace. This module can be prevented from being loaded by using the system-wide modprobe rules. The following command, run as root, will prevent accidental or intentional loading of the module. Red Hat Product Security believe this method is a robust method to prevent accidental loading of the module, even by privileged users. รข# echo "install n_hdlc /bin/true" >> /etc/modprobe.d/disable-n_hdlc.conf Yes, Cauldron is fixed as of kernel 4.9.15 Mga5 kernel 4.4 series is fixed upstream as of 4.4.54 I have 4.4.55-1 sets assigned to QA since 2017-03-19 https://bugs.mageia.org/show_bug.cgi?id=20527 https://bugs.mageia.org/show_bug.cgi?id=20528 https://bugs.mageia.org/show_bug.cgi?id=20529 (In reply to Thomas Backlund from comment #2) > Yes, Cauldron is fixed as of kernel 4.9.15 > > Mga5 kernel 4.4 series is fixed upstream as of 4.4.54 > > I have 4.4.55-1 sets assigned to QA since 2017-03-19 > > https://bugs.mageia.org/show_bug.cgi?id=20527 > https://bugs.mageia.org/show_bug.cgi?id=20528 > https://bugs.mageia.org/show_bug.cgi?id=20529 Thanks, Thomas :-) Version:
Cauldron =>
5 Mga5 kernels now pushed Status:
NEW =>
RESOLVED This got fixed long ago, there's no need to keep this report hidden. So removing the tick that made it only visible to secteam. Group:
secteam =>
(none) |