First published: Thu Dec 07 2017(Updated: )
Mohamed Ghannam discovered that a use-after-free vulnerability existed in the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16939) It was discovered that the Linux kernel did not properly handle copy-on- write of transparent huge pages. A local attacker could use this to cause a denial of service (application crashes) or possibly gain administrative privileges. (CVE-2017-1000405) Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array implementation in the Linux kernel sometimes did not properly handle adding a new entry. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-12193) Eric Biggers discovered that the key management subsystem in the Linux kernel did not properly restrict adding a key that already exists but is uninstantiated. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15299) It was discovered that a null pointer dereference error existed in the PowerPC KVM implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-15306) Eric Biggers discovered a race condition in the key management subsystem of the Linux kernel around keys in a negative state. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15951) Andrey Konovalov discovered that the USB subsystem in the Linux kernel did not properly validate USB BOS metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16535) Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16643)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.13.0-19-generic | <4.13.0-19.22 | 4.13.0-19.22 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-19-generic-lpae | <4.13.0-19.22 | 4.13.0-19.22 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.13.0.19.20 | 4.13.0.19.20 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-19-lowlatency | <4.13.0-19.22 | 4.13.0-19.22 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-generic | <4.13.0.19.20 | 4.13.0.19.20 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-4.13.0-1008-raspi2 | <4.13.0-1008.8 | 4.13.0-1008.8 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.13.0.19.20 | 4.13.0.19.20 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.13.0.1008.6 | 4.13.0.1008.6 |
Ubuntu gir1.2-packagekitglib-1.0 | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3507-1 is high.
The use-after-free vulnerability in the Linux kernel (CVE-2017-16939) can allow a local attacker to cause a denial of service or execute arbitrary code.
To fix the use-after-free vulnerability in the Linux kernel (CVE-2017-16939), update to version 4.13.0-19.22 or later.
USN-3507-1 also addresses CVE-2017-1000405, CVE-2017-12193, and CVE-2017-15299.
You can find more information about USN-3507-1 at the following link: [link]