First published: Thu Jun 29 2017(Updated: )
USN 3326-1 fixed a vulnerability in the Linux kernel. However, that fix introduced regressions for some Java applications. This update addresses the issue. We apologize for the inconvenience. It was discovered that a use-after-free flaw existed in the filesystem encryption subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-7374) Roee Hay discovered that the parallel port printer driver in the Linux kernel did not properly bounds check passed arguments. A local attacker with write access to the kernel command line arguments could use this to execute arbitrary code. (CVE-2017-1000363) Ingo Molnar discovered that the VideoCore DRM driver in the Linux kernel did not return an error after detecting certain overflows. A local attacker could exploit this issue to cause a denial of service (OOPS). (CVE-2017-5577) Li Qiang discovered that an integer overflow vulnerability existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7294) It was discovered that a double-free vulnerability existed in the IPv4 stack of the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2017-8890) Andrey Konovalov discovered an IPv6 out-of-bounds read error in the Linux kernel's IPv6 stack. A local attacker could cause a denial of service or potentially other unspecified problems. (CVE-2017-9074) Andrey Konovalov discovered a flaw in the handling of inheritance in the Linux kernel's IPv6 stack. A local user could exploit this issue to cause a denial of service or possibly other unspecified problems. (CVE-2017-9075) It was discovered that dccp v6 in the Linux kernel mishandled inheritance. A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9076) It was discovered that the transmission control protocol (tcp) v6 in the Linux kernel mishandled inheritance. A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9077) It was discovered that the IPv6 stack in the Linux kernel was performing its over write consistency check after the data was actually overwritten. A local attacker could exploit this flaw to cause a denial of service (system crash). (CVE-2017-9242)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.8.0-58-lowlatency | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-smp | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-58-generic-lpae | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-58-generic | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-58-powerpc-e500mc | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-virtual | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-58-powerpc64-emb | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-1042-raspi2 | <4.8.0-1042.46 | 4.8.0-1042.46 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-58-powerpc-smp | <4.8.0-58.63 | 4.8.0-58.63 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.8.0.1042.46 | 4.8.0.1042.46 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-smp | <4.8.0.58.71 | 4.8.0.58.71 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is USN-3342-1.
The severity of USN-3342-1 is not specified in the description.
The affected software for USN-3342-1 is Ubuntu 16.10 with various Linux kernel versions.
To fix USN-3342-1, update the affected software packages to the recommended versions.
You can find more information about USN-3342-1 on the Ubuntu Security website.