![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.843140 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-3265-2) |
Summary: | The remote host is missing an update for the 'linux-lts-xenial' package(s) announced via the USN-3265-2 advisory. |
Description: | Summary: The remote host is missing an update for the 'linux-lts-xenial' package(s) announced via the USN-3265-2 advisory. Vulnerability Insight: USN-3265-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that a use-after-free flaw existed in the filesystem encryption subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-7374) Andrey Konovalov discovered an out-of-bounds access in the IPv6 Generic Routing Encapsulation (GRE) tunneling implementation in the Linux kernel. An attacker could use this to possibly expose sensitive information. (CVE-2017-5897) Andrey Konovalov discovered that the IPv4 implementation in the Linux kernel did not properly handle invalid IP options in some situations. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2017-5970) Gareth Evans discovered that the shm IPC subsystem in the Linux kernel did not properly restrict mapping page zero. A local privileged attacker could use this to execute arbitrary code. (CVE-2017-5669) Alexander Popov discovered that a race condition existed in the Stream Control Transmission Protocol (SCTP) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-5986) Dmitry Vyukov discovered that the Linux kernel did not properly handle TCP packets with the URG flag. A remote attacker could use this to cause a denial of service. (CVE-2017-6214) Andrey Konovalov discovered that the LLC subsystem in the Linux kernel did not properly set up a destructor in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-6345) It was discovered that a race condition existed in the AF_PACKET handling code in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-6346) Andrey Konovalov discovered that the IP layer in the Linux kernel made improper assumptions about internal data layout when performing checksums. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-6347) Dmitry Vyukov discovered race conditions in the Infrared (IrDA) subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (deadlock). (CVE-2017-6348) Affected Software/OS: 'linux-lts-xenial' package(s) on Ubuntu 14.04. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5669 BugTraq ID: 96754 http://www.securityfocus.com/bid/96754 Debian Security Information: DSA-3804 (Google Search) http://www.debian.org/security/2017/dsa-3804 https://bugzilla.kernel.org/show_bug.cgi?id=192931 https://github.com/torvalds/linux/commit/95e91b831f87ac8e1f8ed50c14d709089b4e01b8 https://github.com/torvalds/linux/commit/e1d35d4dc7f089e6c9c080d556feedf9c706f0c7 http://www.securitytracker.com/id/1037918 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/ Common Vulnerability Exposure (CVE) ID: CVE-2017-5897 BugTraq ID: 96037 http://www.securityfocus.com/bid/96037 Debian Security Information: DSA-3791 (Google Search) http://www.debian.org/security/2017/dsa-3791 http://www.openwall.com/lists/oss-security/2017/02/07/2 http://www.securitytracker.com/id/1037794 https://usn.ubuntu.com/3754-1/ Common Vulnerability Exposure (CVE) ID: CVE-2017-5970 BugTraq ID: 96233 http://www.securityfocus.com/bid/96233 http://www.openwall.com/lists/oss-security/2017/02/12/3 RedHat Security Advisories: RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842 RedHat Security Advisories: RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077 RedHat Security Advisories: RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669 Common Vulnerability Exposure (CVE) ID: CVE-2017-5986 BugTraq ID: 96222 http://www.securityfocus.com/bid/96222 http://www.openwall.com/lists/oss-security/2017/02/14/6 RedHat Security Advisories: RHSA-2017:1308 https://access.redhat.com/errata/RHSA-2017:1308 Common Vulnerability Exposure (CVE) ID: CVE-2017-6214 BugTraq ID: 96421 http://www.securityfocus.com/bid/96421 RedHat Security Advisories: RHSA-2017:1372 https://access.redhat.com/errata/RHSA-2017:1372 RedHat Security Advisories: RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615 RedHat Security Advisories: RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616 RedHat Security Advisories: RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647 http://www.securitytracker.com/id/1037897 Common Vulnerability Exposure (CVE) ID: CVE-2017-6345 BugTraq ID: 96510 http://www.securityfocus.com/bid/96510 http://www.openwall.com/lists/oss-security/2017/02/28/7 Common Vulnerability Exposure (CVE) ID: CVE-2017-6346 BugTraq ID: 96508 http://www.securityfocus.com/bid/96508 http://www.openwall.com/lists/oss-security/2017/02/28/6 Common Vulnerability Exposure (CVE) ID: CVE-2017-6347 BugTraq ID: 96487 http://www.securityfocus.com/bid/96487 http://www.openwall.com/lists/oss-security/2017/02/28/5 Common Vulnerability Exposure (CVE) ID: CVE-2017-6348 BugTraq ID: 96483 http://www.securityfocus.com/bid/96483 http://www.openwall.com/lists/oss-security/2017/02/28/4 Common Vulnerability Exposure (CVE) ID: CVE-2017-7374 BugTraq ID: 97308 http://www.securityfocus.com/bid/97308 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |