First published: Thu Aug 03 2017(Updated: )
USN-3378-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Fan Wu and Shixiong Zhao discovered a race condition between inotify events and vfs rename operations in the Linux kernel. An unprivileged local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2017-7533) It was discovered that the Linux kernel did not properly restrict RLIMIT_STACK size. A local attacker could use this in conjunction with another vulnerability to possibly execute arbitrary code. (CVE-2017-1000365) 李强 discovered that the Virtio GPU driver in the Linux kernel did not properly free memory in some situations. A local attacker could use this to cause a denial of service (memory consumption). (CVE-2017-10810) 石磊 discovered that the RxRPC Kerberos 5 ticket handling code in the Linux kernel did not properly verify metadata. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7482)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-89-generic | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-generic-lpae | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-lowlatency | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-powerpc-e500mc | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-powerpc-smp | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-powerpc64-emb | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-89-powerpc64-smp | <4.4.0-89.112~14.04.1 | 4.4.0-89.112~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3378-2 is high.
To fix USN-3378-2, update your Ubuntu 14.04 LTS system to the latest kernel version available.
Yes, there are known exploits for USN-3378-2.
The CVE identifiers for USN-3378-2 are CVE-2017-1000365, CVE-2017-10810, and CVE-2017-7482.
No, USN-3378-2 only affects Ubuntu 14.04 LTS systems.