First published: Tue Oct 10 2017(Updated: )
USN-3444-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Jan H. Schönherr discovered that the Xen subsystem did not properly handle block IO merges correctly in some situations. An attacker in a guest vm could use this to cause a denial of service (host crash) or possibly gain administrative privileges in the host. (CVE-2017-12134) Andrey Konovalov discovered that a divide-by-zero error existed in the TCP stack implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-14106) Otto Ebeling discovered that the memory manager in the Linux kernel did not properly check the effective UID in some situations. A local attacker could use this to expose sensitive information. (CVE-2017-14140)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-97-generic | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-generic-lpae | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-lowlatency | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-powerpc-e500mc | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-powerpc-smp | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-powerpc64-emb | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-4.4.0-97-powerpc64-smp | <4.4.0-97.120~14.04.1 | 4.4.0-97.120~14.04.1 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3444-2 is high.
To fix USN-3444-2, update to version 4.4.0-97.120~14.04.1 of the Linux kernel.
The affected software of USN-3444-2 is Ubuntu 14.04 LTS with the Linux kernel versions 4.4.0-97-generic, 4.4.0-97-generic-lpae, 4.4.0-97-lowlatency, 4.4.0-97-powerpc-e500mc, 4.4.0-97-powerpc-smp, 4.4.0-97-powerpc64-emb, and 4.4.0-97-powerpc64-smp.
USN-3444-2 fixes the following vulnerabilities: CVE-2017-12134, CVE-2017-14106, and CVE-2017-14140.
You can find more information about USN-3444-2 at the following links: - [CVE-2017-12134](https://ubuntu.com/security/CVE-2017-12134) - [CVE-2017-14106](https://ubuntu.com/security/CVE-2017-14106) - [CVE-2017-14140](https://ubuntu.com/security/CVE-2017-14140)