First published: Tue Nov 21 2017(Updated: )
It was discovered that a race condition existed in the ALSA subsystem of the Linux kernel when creating and deleting a port via ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15265) Eric Biggers discovered that the key management subsystem in the Linux kernel did not properly restrict adding a key that already exists but is uninstantiated. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15299) It was discovered that a race condition existed in the packet fanout implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15649) Eric Biggers discovered a race condition in the key management subsystem of the Linux kernel around keys in a negative state. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15951) Andrey Konovalov discovered a use-after-free vulnerability in the USB serial console driver in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16525) Andrey Konovalov discovered that the Ultra Wide Band driver in the Linux kernel did not properly check for an error condition. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16526) Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16527) Andrey Konovalov discovered that the ALSA subsystem in the Linux kernel did not properly validate USB audio buffer descriptors. A physically proximate attacker could use this cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16529) Andrey Konovalov discovered that the USB unattached storage driver in the Linux kernel contained out-of-bounds error when handling alternative settings. A physically proximate attacker could use to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16530) Andrey Konovalov discovered that the USB subsystem in the Linux kernel did not properly validate USB interface association descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16531) Andrey Konovalov discovered that the USB subsystem in the Linux kernel did not properly validate USB HID descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16533) Andrey Konovalov discovered that the USB subsystem in the Linux kernel did not properly validate CDC metadata. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16534) Andrey Konovalov discovered that the USB subsystem in the Linux kernel did not properly validate USB BOS metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16535)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.4.0-101-generic | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-generic-lpae | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-lowlatency | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-powerpc-e500mc | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-powerpc-smp | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-powerpc64-emb | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-101-powerpc64-smp | <4.4.0-101.124 | 4.4.0-101.124 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1010-kvm | <4.4.0-1010.15 | 4.4.0-1010.15 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1034-gke | <4.4.0-1034.34 | 4.4.0-1034.34 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1041-aws | <4.4.0-1041.50 | 4.4.0-1041.50 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1077-raspi2 | <4.4.0-1077.85 | 4.4.0-1077.85 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 | |
All of | ||
ubuntu/linux-image-4.4.0-1079-snapdragon | <4.4.0-1079.84 | 4.4.0-1079.84 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID of this advisory is CVE-2017-15265.
The CVE-2017-15265 vulnerability can allow a local attacker to cause a denial of service (system crash) or possibly execute arbitrary code.
To fix the CVE-2017-15265 vulnerability on Ubuntu 16.04, update the linux-image-4.4.0-101-generic package to version 4.4.0-101.124 or higher.
Yes, you can find more information about the CVE-2017-15265 vulnerability in the Ubuntu Security Notices: [link](https://ubuntu.com/security/CVE-2017-15265).
The CVE numbers associated with this advisory are CVE-2017-15265, CVE-2017-15299, and CVE-2017-15649.