ID UB:CVE-2017-8061
Type ubuntucve
Reporter ubuntu.com
Modified 2017-04-23T00:00:00
Description
drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and
4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK
option, which allows local users to cause a denial of service (system crash
or memory corruption) or possibly have unspecified other impact by
leveraging use of more than one virtual page for a DMA scatterlist.
Notes
Author| Note
---|---
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
{"id": "UB:CVE-2017-8061", "vendorId": null, "type": "ubuntucve", "bulletinFamily": "info", "title": "CVE-2017-8061", "description": "drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and\n4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK\noption, which allows local users to cause a denial of service (system crash\nor memory corruption) or possibly have unspecified other impact by\nleveraging use of more than one virtual page for a DMA scatterlist.\n\n#### Notes\n\nAuthor| Note \n---|--- \n[jdstrand](<https://launchpad.net/~jdstrand>) | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support\n", "published": "2017-04-23T00:00:00", "modified": "2017-04-23T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://ubuntu.com/security/CVE-2017-8061", "reporter": "ubuntu.com", "references": ["https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8061", "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.7", "http://www.openwall.com/lists/oss-security/2017/04/16/4", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67b0503db9c29b04eadfeede6bebbfe5ddad94ef", "https://github.com/torvalds/linux/commit/67b0503db9c29b04eadfeede6bebbfe5ddad94ef", "https://nvd.nist.gov/vuln/detail/CVE-2017-8061", "https://launchpad.net/bugs/cve/CVE-2017-8061", "https://security-tracker.debian.org/tracker/CVE-2017-8061"], "cvelist": ["CVE-2017-8061"], "immutableFields": [], "lastseen": "2021-11-22T21:42:21", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-8061"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-8061"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-8061"]}], "rev": 4}, "score": {"value": 5.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2017-8061"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-8061"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-8061"]}]}, "exploitation": null, "vulnersScore": 5.3}, "affectedPackage": [{"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-armadaxp"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-aws"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-flo"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-gke"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-goldfish"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-grouper"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-hwe"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-hwe-edge"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-linaro-omap"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-linaro-shared"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-linaro-vexpress"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-quantal"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-raring"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-saucy"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-trusty"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-utopic"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-vivid"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-wily"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-lts-xenial"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-maguro"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-mako"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-manta"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-qcm-msm"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-raspi2"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-snapdragon"}, {"OS": "ubuntu", "OSVersion": "Upstream", "arch": "noarch", "packageVersion": "4.11~rc4", "packageFilename": "UNKNOWN", "operator": "lt", "status": "released", "packageName": "linux-ti-omap4"}], "bugs": [], "_state": {"dependencies": 1646303645}}
{"redhatcve": [{"lastseen": "2021-09-02T22:51:09", "description": "drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-04-25T13:48:42", "type": "redhatcve", "title": "CVE-2017-8061", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8061"], "modified": "2020-04-08T19:26:02", "id": "RH:CVE-2017-8061", "href": "https://access.redhat.com/security/cve/cve-2017-8061", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T18:43:40", "description": "drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2017-04-23T05:59:00", "type": "cve", "title": "CVE-2017-8061", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8061"], "modified": "2017-04-27T19:05:00", "cpe": ["cpe:/o:linux:linux_kernel:4.10.4", "cpe:/o:linux:linux_kernel:4.9.10", "cpe:/o:linux:linux_kernel:4.9.12", "cpe:/o:linux:linux_kernel:4.9.16", "cpe:/o:linux:linux_kernel:4.9.14", "cpe:/o:linux:linux_kernel:4.9.1", "cpe:/o:linux:linux_kernel:4.9.5", "cpe:/o:linux:linux_kernel:4.9.18", "cpe:/o:linux:linux_kernel:4.9.2", "cpe:/o:linux:linux_kernel:4.9", "cpe:/o:linux:linux_kernel:4.10", "cpe:/o:linux:linux_kernel:4.10.2", "cpe:/o:linux:linux_kernel:4.9.4", "cpe:/o:linux:linux_kernel:4.10.6", "cpe:/o:linux:linux_kernel:4.9.3", "cpe:/o:linux:linux_kernel:4.9.15", "cpe:/o:linux:linux_kernel:4.9.6", "cpe:/o:linux:linux_kernel:4.9.11", "cpe:/o:linux:linux_kernel:4.9.13", "cpe:/o:linux:linux_kernel:4.9.9", "cpe:/o:linux:linux_kernel:4.10.5", "cpe:/o:linux:linux_kernel:4.9.17", "cpe:/o:linux:linux_kernel:4.9.19", "cpe:/o:linux:linux_kernel:4.9.8", "cpe:/o:linux:linux_kernel:4.10.1"], "id": "CVE-2017-8061", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8061", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:linux:linux_kernel:4.10.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2022-05-11T23:36:21", "description": "drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2017-04-23T05:59:00", "type": "debiancve", "title": "CVE-2017-8061", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8061"], "modified": "2017-04-23T05:59:00", "id": "DEBIANCVE:CVE-2017-8061", "href": "https://security-tracker.debian.org/tracker/CVE-2017-8061", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}