Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.843497
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3619-2)
Summary:The remote host is missing an update for the 'linux-aws, linux-lts-xenial' package(s) announced via the USN-3619-2 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-aws, linux-lts-xenial' package(s) announced via the USN-3619-2 advisory.

Vulnerability Insight:
USN-3619-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel improperly performed sign extension in some situations.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-16995)

It was discovered that a race condition leading to a use-after-free
vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-0861)

It was discovered that the KVM implementation in the Linux kernel allowed
passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM
could use this to cause a denial of service (system crash) in the host OS.
(CVE-2017-1000407)

It was discovered that an information disclosure vulnerability existed in
the ACPI implementation of the Linux kernel. A local attacker could use
this to expose sensitive information (kernel memory addresses).
(CVE-2017-11472)

It was discovered that a use-after-free vulnerability existed in the
network namespaces implementation in the Linux kernel. A local attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2017-15129)

It was discovered that the Advanced Linux Sound Architecture (ALSA)
subsystem in the Linux kernel contained a use-after-free when handling
device removal. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-16528)

Andrey Konovalov discovered that the usbtest device driver in the Linux
kernel did not properly validate endpoint metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2017-16532)

Andrey Konovalov discovered that the Conexant cx231xx USB video capture
driver in the Linux kernel did not properly validate interface descriptors.
A physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2017-16536)

Andrey Konovalov discovered that the SoundGraph iMON USB driver in the
Linux kernel did not properly validate device metadata. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-16537)

Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver
in the Linux kernel did not properly validate device descriptors. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2017-16645)

Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the
Linux kernel did not properly handle detach events. A physically proximate
attacker ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-aws, linux-lts-xenial' package(s) on Ubuntu 14.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-0861
BugTraq ID: 102329
http://www.securityfocus.com/bid/102329
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://security-tracker.debian.org/tracker/CVE-2017-0861
https://source.android.com/security/bulletin/pixel/2017-11-01
Debian Security Information: DSA-4187 (Google Search)
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html
RedHat Security Advisories: RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2390
RedHat Security Advisories: RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3083
RedHat Security Advisories: RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3096
RedHat Security Advisories: RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0036
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-1000407
BugTraq ID: 102038
http://www.securityfocus.com/bid/102038
Debian Security Information: DSA-4073 (Google Search)
https://www.debian.org/security/2017/dsa-4073
Debian Security Information: DSA-4082 (Google Search)
https://www.debian.org/security/2018/dsa-4082
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://www.spinics.net/lists/kvm/msg159809.html
http://www.openwall.com/lists/oss-security/2017/12/04/2
RedHat Security Advisories: RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:0676
RedHat Security Advisories: RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1062
RedHat Security Advisories: RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1170
Common Vulnerability Exposure (CVE) ID: CVE-2017-11472
https://usn.ubuntu.com/3754-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-15129
102485
http://www.securityfocus.com/bid/102485
RHSA-2018:0654
https://access.redhat.com/errata/RHSA-2018:0654
RHSA-2018:0676
RHSA-2018:1062
RHSA-2019:1946
https://access.redhat.com/errata/RHSA-2019:1946
USN-3617-1
USN-3617-2
USN-3617-3
USN-3619-1
USN-3619-2
USN-3632-1
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0
http://seclists.org/oss-sec/2018/q1/7
https://access.redhat.com/security/cve/CVE-2017-15129
https://bugzilla.redhat.com/show_bug.cgi?id=1531174
https://github.com/torvalds/linux/commit/21b5944350052d2583e82dd59b19a9ba94a007f0
https://marc.info/?l=linux-netdev&m=151370451121029&w=2
https://marc.info/?t=151370468900001&r=1&w=2
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11
Common Vulnerability Exposure (CVE) ID: CVE-2017-16528
https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57
https://groups.google.com/d/msg/syzkaller/kuZzDHGkQu8/5du20rZEAAAJ
Common Vulnerability Exposure (CVE) ID: CVE-2017-16532
https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
Common Vulnerability Exposure (CVE) ID: CVE-2017-16536
https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
https://patchwork.kernel.org/patch/9963527/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16537
https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ
https://patchwork.kernel.org/patch/9994017/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16645
BugTraq ID: 101768
http://www.securityfocus.com/bid/101768
https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ
Common Vulnerability Exposure (CVE) ID: CVE-2017-16646
BugTraq ID: 101846
http://www.securityfocus.com/bid/101846
https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
https://patchwork.linuxtv.org/patch/45291/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16649
BugTraq ID: 101761
http://www.securityfocus.com/bid/101761
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://patchwork.ozlabs.org/patch/834771/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16650
BugTraq ID: 101791
http://www.securityfocus.com/bid/101791
https://patchwork.ozlabs.org/patch/834770/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16911
BugTraq ID: 102156
http://www.securityfocus.com/bid/102156
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=2f2d0088eb93db5c649d2a5e34a3800a8a935fc5
https://secuniaresearch.flexerasoftware.com/advisories/80454/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-20/
https://www.spinics.net/lists/linux-usb/msg163480.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-16912
BugTraq ID: 102150
http://www.securityfocus.com/bid/102150
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
https://secuniaresearch.flexerasoftware.com/advisories/77000/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16913
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=c6688ef9f29762e65bce325ef4acd6c675806366
https://secuniaresearch.flexerasoftware.com/advisories/80601/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16914
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a
https://secuniaresearch.flexerasoftware.com/advisories/80722/
Common Vulnerability Exposure (CVE) ID: CVE-2017-16994
BugTraq ID: 101969
http://www.securityfocus.com/bid/101969
https://www.exploit-db.com/exploits/43178/
RedHat Security Advisories: RHSA-2018:0502
https://access.redhat.com/errata/RHSA-2018:0502
Common Vulnerability Exposure (CVE) ID: CVE-2017-16995
BugTraq ID: 102288
http://www.securityfocus.com/bid/102288
https://www.exploit-db.com/exploits/44298/
https://www.exploit-db.com/exploits/45010/
https://www.exploit-db.com/exploits/45058/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
http://openwall.com/lists/oss-security/2017/12/21/2
https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f
https://usn.ubuntu.com/usn/usn-3523-2/
https://usn.ubuntu.com/3633-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-17448
BugTraq ID: 102117
http://www.securityfocus.com/bid/102117
https://patchwork.kernel.org/patch/10089373/
RedHat Security Advisories: RHSA-2018:0654
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-17449
BugTraq ID: 102122
http://www.securityfocus.com/bid/102122
https://lkml.org/lkml/2017/12/5/950
RedHat Security Advisories: RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1130
RedHat Security Advisories: RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:1170
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3657-1/
Common Vulnerability Exposure (CVE) ID: CVE-2017-17450
BugTraq ID: 102110
http://www.securityfocus.com/bid/102110
https://lkml.org/lkml/2017/12/5/982
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-17558
http://openwall.com/lists/oss-security/2017/12/12/7
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.spinics.net/lists/linux-usb/msg163644.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
RedHat Security Advisories: RHSA-2019:1190
https://access.redhat.com/errata/RHSA-2019:1190
Common Vulnerability Exposure (CVE) ID: CVE-2017-17741
BugTraq ID: 102227
http://www.securityfocus.com/bid/102227
https://www.spinics.net/lists/kvm/msg160796.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-17805
BugTraq ID: 102291
http://www.securityfocus.com/bid/102291
RedHat Security Advisories: RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:2948
RedHat Security Advisories: RHSA-2019:2473
https://access.redhat.com/errata/RHSA-2019:2473
SuSE Security Announcement: SUSE-SU-2018:0010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
SuSE Security Announcement: SUSE-SU-2018:0012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
SuSE Security Announcement: openSUSE-SU-2018:0022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
SuSE Security Announcement: openSUSE-SU-2018:0023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-17806
BugTraq ID: 102293
http://www.securityfocus.com/bid/102293
Common Vulnerability Exposure (CVE) ID: CVE-2017-17807
BugTraq ID: 102301
http://www.securityfocus.com/bid/102301
Common Vulnerability Exposure (CVE) ID: CVE-2017-17862
BugTraq ID: 102325
http://www.securityfocus.com/bid/102325
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467
https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-fix-branch-pruning-logic.patch?h=stretch-security
https://github.com/torvalds/linux/commit/c131187db2d3fa2f8bf32fdf4e9a4ef805168467
https://www.spinics.net/lists/stable/msg206984.html
http://www.securitytracker.com/id/1040057
Common Vulnerability Exposure (CVE) ID: CVE-2017-18075
BugTraq ID: 102813
http://www.securityfocus.com/bid/102813
Common Vulnerability Exposure (CVE) ID: CVE-2017-18203
BugTraq ID: 103184
http://www.securityfocus.com/bid/103184
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed
https://github.com/torvalds/linux/commit/b9a41d21dceadf8104812626ef85dc56ee8a60ed
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.3
RedHat Security Advisories: RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1854
RedHat Security Advisories: RHSA-2019:4154
https://access.redhat.com/errata/RHSA-2019:4154
Common Vulnerability Exposure (CVE) ID: CVE-2017-18204
BugTraq ID: 103183
http://www.securityfocus.com/bid/103183
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
https://github.com/torvalds/linux/commit/28f5a8a7c033cbf3e32277f4cc9c6afd74f05300
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.2
Common Vulnerability Exposure (CVE) ID: CVE-2017-18208
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
https://github.com/torvalds/linux/commit/6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.4
RedHat Security Advisories: RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:3967
RedHat Security Advisories: RHSA-2019:4057
https://access.redhat.com/errata/RHSA-2019:4057
RedHat Security Advisories: RHSA-2019:4058
https://access.redhat.com/errata/RHSA-2019:4058
Common Vulnerability Exposure (CVE) ID: CVE-2017-7518
BugTraq ID: 99263
http://www.securityfocus.com/bid/99263
Debian Security Information: DSA-3981 (Google Search)
https://www.debian.org/security/2017/dsa-3981
https://www.spinics.net/lists/kvm/msg151817.html
http://www.openwall.com/lists/oss-security/2017/06/23/5
RedHat Security Advisories: RHSA-2018:0395
https://access.redhat.com/errata/RHSA-2018:0395
RedHat Security Advisories: RHSA-2018:0412
https://access.redhat.com/errata/RHSA-2018:0412
http://www.securitytracker.com/id/1038782
Common Vulnerability Exposure (CVE) ID: CVE-2018-1000026
https://patchwork.ozlabs.org/patch/859410/
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
http://lists.openwall.net/netdev/2018/01/16/40
http://lists.openwall.net/netdev/2018/01/18/96
Common Vulnerability Exposure (CVE) ID: CVE-2018-5332
BugTraq ID: 102507
http://www.securityfocus.com/bid/102507
RedHat Security Advisories: RHSA-2018:0470
https://access.redhat.com/errata/RHSA-2018:0470
Common Vulnerability Exposure (CVE) ID: CVE-2018-5333
BugTraq ID: 102510
http://www.securityfocus.com/bid/102510
http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-5344
BugTraq ID: 102503
http://www.securityfocus.com/bid/102503
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
Common Vulnerability Exposure (CVE) ID: CVE-2018-6927
BugTraq ID: 103023
http://www.securityfocus.com/bid/103023
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
https://usn.ubuntu.com/3697-1/
https://usn.ubuntu.com/3697-2/
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-7492
BugTraq ID: 103185
http://www.securityfocus.com/bid/103185
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
https://bugzilla.redhat.com/show_bug.cgi?id=1527393
https://github.com/torvalds/linux/commit/f3069c6d33f6ae63a1668737bc78aaaa51bff7ca
https://patchwork.kernel.org/patch/10096441/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.7
https://xorl.wordpress.com/2017/12/18/linux-kernel-rdma-null-pointer-dereference/
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
https://usn.ubuntu.com/3677-1/
https://usn.ubuntu.com/3677-2/
Common Vulnerability Exposure (CVE) ID: CVE-2018-8043
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5
http://www.securitytracker.com/id/1040749
https://usn.ubuntu.com/3630-1/
https://usn.ubuntu.com/3630-2/
CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.