Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.843399
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3507-1)
Summary:The remote host is missing an update for the 'linux, linux-raspi2' package(s) announced via the USN-3507-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-raspi2' package(s) announced via the USN-3507-1 advisory.

Vulnerability Insight:
Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
implementation in the Linux kernel sometimes did not properly handle adding
a new entry. A local attacker could use this to cause a denial of service
(system crash). (CVE-2017-12193)

Eric Biggers discovered that the key management subsystem in the Linux
kernel did not properly restrict adding a key that already exists but is
uninstantiated. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-15299)

It was discovered that a null pointer dereference error existed in the
PowerPC KVM implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2017-15306)

Eric Biggers discovered a race condition in the key management subsystem of
the Linux kernel around keys in a negative state. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15951)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16535)

Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
driver for the Linux kernel. A physically proximate attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16643)

Affected Software/OS:
'linux, linux-raspi2' package(s) on Ubuntu 17.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000405
BugTraq ID: 102032
http://www.securityfocus.com/bid/102032
https://www.exploit-db.com/exploits/43199/
https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0
RedHat Security Advisories: RHSA-2018:0180
https://access.redhat.com/errata/RHSA-2018:0180
http://www.securitytracker.com/id/1040020
Common Vulnerability Exposure (CVE) ID: CVE-2017-12193
101678
http://www.securityfocus.com/bid/101678
RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0151
USN-3698-1
https://usn.ubuntu.com/3698-1/
USN-3698-2
https://usn.ubuntu.com/3698-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea6789980fdaa610d7eb63602c746bf6ec70cd2b
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
https://bugzilla.redhat.com/show_bug.cgi?id=1501215
https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b
Common Vulnerability Exposure (CVE) ID: CVE-2017-15299
https://bugzilla.redhat.com/show_bug.cgi?id=1498016
https://marc.info/?t=150654188100001&r=1&w=2
https://marc.info/?t=150783958600011&r=1&w=2
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
RedHat Security Advisories: RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0654
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-15306
BugTraq ID: 101693
http://www.securityfocus.com/bid/101693
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac64115a66c18c01745bbd3c47a36b124e5fd8c0
http://openwall.com/lists/oss-security/2017/11/06/6
https://github.com/torvalds/linux/commit/ac64115a66c18c01745bbd3c47a36b124e5fd8c0
Common Vulnerability Exposure (CVE) ID: CVE-2017-15951
BugTraq ID: 101621
http://www.securityfocus.com/bid/101621
Common Vulnerability Exposure (CVE) ID: CVE-2017-16535
BugTraq ID: 102022
http://www.securityfocus.com/bid/102022
https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e
https://groups.google.com/d/msg/syzkaller/tzdz2fTB1K0/OvjIgLSTAgAJ
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16643
BugTraq ID: 101769
http://www.securityfocus.com/bid/101769
https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
Common Vulnerability Exposure (CVE) ID: CVE-2017-16939
BugTraq ID: 101954
http://www.securityfocus.com/bid/101954
Debian Security Information: DSA-4082 (Google Search)
https://www.debian.org/security/2018/dsa-4082
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2
http://seclists.org/fulldisclosure/2017/Nov/40
https://blogs.securiteam.com/index.php/archives/3535
https://bugzilla.suse.com/show_bug.cgi?id=1069702
https://github.com/torvalds/linux/commit/1137b5e2529a8f5ca8ee709288ecba3e68044df2
RedHat Security Advisories: RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1318
RedHat Security Advisories: RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:1355
RedHat Security Advisories: RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
RedHat Security Advisories: RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.