First published: Tue Oct 10 2017(Updated: )
Eyal Itkin discovered that the IP over IEEE 1394 (FireWire) implementation in the Linux kernel contained a buffer overflow when handling fragmented packets. A remote attacker could use this to possibly execute arbitrary code with administrative privileges. (CVE-2016-8633) Andrey Konovalov discovered that a divide-by-zero error existed in the TCP stack implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-14106)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-133-generic | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-generic-lpae | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-lowlatency | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-powerpc-e500 | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-powerpc-e500mc | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-powerpc-smp | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-powerpc64-emb | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-powerpc64-smp | <3.13.0-133.182 | 3.13.0-133.182 |
Ubuntu gir1.2-packagekitglib-1.0 | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for USN-3445-1 is CVE-2016-8633.
The severity of CVE-2016-8633 is high.
The vulnerability CVE-2016-8633 is a buffer overflow in the IP over IEEE 1394 implementation in the Linux kernel, which allows a remote attacker to execute arbitrary code with administrative privileges.
To fix CVE-2016-8633, update the Linux kernel to version 3.13.0-133.182 or later.
You can find more information about CVE-2016-8633 on the Ubuntu security website: https://ubuntu.com/security/CVE-2016-8633