USN-3342-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-3342-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3342-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3342-2
Related
Published
2017-06-29T17:56:02.217349Z
Modified
2017-06-29T17:56:02.217349Z
Summary
linux-hwe vulnerabilities
Details

USN-3342-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.

USN-3333-1 fixed a vulnerability in the Linux kernel. However, that fix introduced regressions for some Java applications. This update addresses the issue. We apologize for the inconvenience.

It was discovered that a use-after-free flaw existed in the filesystem encryption subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-7374)

Roee Hay discovered that the parallel port printer driver in the Linux kernel did not properly bounds check passed arguments. A local attacker with write access to the kernel command line arguments could use this to execute arbitrary code. (CVE-2017-1000363)

Ingo Molnar discovered that the VideoCore DRM driver in the Linux kernel did not return an error after detecting certain overflows. A local attacker could exploit this issue to cause a denial of service (OOPS). (CVE-2017-5577)

Li Qiang discovered that an integer overflow vulnerability existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7294)

It was discovered that a double-free vulnerability existed in the IPv4 stack of the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2017-8890)

Andrey Konovalov discovered an IPv6 out-of-bounds read error in the Linux kernel's IPv6 stack. A local attacker could cause a denial of service or potentially other unspecified problems. (CVE-2017-9074)

Andrey Konovalov discovered a flaw in the handling of inheritance in the Linux kernel's IPv6 stack. A local user could exploit this issue to cause a denial of service or possibly other unspecified problems. (CVE-2017-9075)

It was discovered that dccp v6 in the Linux kernel mishandled inheritance. A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9076)

It was discovered that the transmission control protocol (tcp) v6 in the Linux kernel mishandled inheritance. A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9077)

It was discovered that the IPv6 stack in the Linux kernel was performing its over write consistency check after the data was actually overwritten. A local attacker could exploit this flaw to cause a denial of service (system crash). (CVE-2017-9242)

References

Affected packages

Ubuntu:16.04:LTS / linux-hwe

Package

Name
linux-hwe
Purl
pkg:deb/ubuntu/linux-hwe@4.8.0-58.63~16.04.1?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.8.0-58.63~16.04.1

Affected versions

4.*

4.8.0-36.36~16.04.1
4.8.0-39.42~16.04.1
4.8.0-41.44~16.04.1
4.8.0-42.45~16.04.1
4.8.0-44.47~16.04.1
4.8.0-45.48~16.04.1
4.8.0-46.49~16.04.1
4.8.0-49.52~16.04.1
4.8.0-51.54~16.04.1
4.8.0-52.55~16.04.1
4.8.0-53.56~16.04.1
4.8.0-54.57~16.04.1
4.8.0-56.61~16.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "fs-core-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-tools-4.8.0-58-lowlatency": "4.8.0-58.63~16.04.1",
            "linux-cloud-tools-4.8.0-58-generic": "4.8.0-58.63~16.04.1",
            "linux-image-extra-4.8.0-58-generic": "4.8.0-58.63~16.04.1",
            "parport-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nic-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "fs-secondary-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nfs-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nic-shared-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "fs-secondary-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-hwe-udebs-generic-lpae": "4.8.0-58.63~16.04.1",
            "md-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "ipmi-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "crypto-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "message-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "parport-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-hwe-cloud-tools-4.8.0-58": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-generic-lpae-dbgsym": "4.8.0-58.63~16.04.1",
            "linux-hwe-tools-4.8.0-58": "4.8.0-58.63~16.04.1",
            "plip-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "fs-core-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "ppp-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-generic-lpae": "4.8.0-58.63~16.04.1",
            "block-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "dasd-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "mouse-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "nic-usb-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "fat-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "nic-usb-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "usb-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "input-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "sata-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "ppp-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "input-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-tools-4.8.0-58-generic-lpae": "4.8.0-58.63~16.04.1",
            "nic-pcmcia-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "virtio-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "fat-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-generic": "4.8.0-58.63~16.04.1",
            "firewire-core-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "mouse-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-generic-dbgsym": "4.8.0-58.63~16.04.1",
            "irda-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-hwe-udebs-generic": "4.8.0-58.63~16.04.1",
            "kernel-image-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-lowlatency-dbgsym": "4.8.0-58.63~16.04.1",
            "floppy-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "crypto-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "serial-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nfs-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "usb-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "block-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "md-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "pata-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "fb-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-source-4.8.0": "4.8.0-58.63~16.04.1",
            "linux-headers-4.8.0-58-generic": "4.8.0-58.63~16.04.1",
            "linux-tools-4.8.0-58-generic": "4.8.0-58.63~16.04.1",
            "linux-hwe-cloud-tools-4.8.0-58-dbgsym": "4.8.0-58.63~16.04.1",
            "multipath-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-headers-4.8.0-58": "4.8.0-58.63~16.04.1",
            "vlan-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "vlan-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-image-4.8.0-58-lowlatency": "4.8.0-58.63~16.04.1",
            "irda-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "plip-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-cloud-tools-4.8.0-58-lowlatency": "4.8.0-58.63~16.04.1",
            "sata-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "kernel-image-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-headers-4.8.0-58-lowlatency": "4.8.0-58.63~16.04.1",
            "pcmcia-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "storage-core-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "linux-headers-4.8.0-58-generic-lpae": "4.8.0-58.63~16.04.1",
            "multipath-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "scsi-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nic-shared-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "ipmi-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "nic-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "pcmcia-storage-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "storage-core-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "dasd-extra-modules-4.8.0-58-generic-di": "4.8.0-58.63~16.04.1",
            "scsi-modules-4.8.0-58-generic-lpae-di": "4.8.0-58.63~16.04.1",
            "linux-hwe-tools-4.8.0-58-dbgsym": "4.8.0-58.63~16.04.1"
        }
    ]
}