Ubuntu update for Linux kernel

Published: 2017-08-10 00:00:00 | Updated: 2017-08-16 16:13:20
Severity Low
Patch available YES
Number of vulnerabilities 2
CVSSv2 5.3 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 (AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 7.5 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.5 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-1000112
CVE-2017-1000111
CWE ID CWE-119
CWE-362
Exploitation vector Local
Public exploit Not available
Vulnerable software Ubuntu
Vulnerable software versions Ubuntu 14.04 LTS
Vendor URL Canonical Ltd.
Advisory type Public

Security Advisory

1) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to race condition in the UDP Fragmentation Offload (UFO) code. A local attacker can send specially crafted UFO packets, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update the affected packages.

Ubuntu 14.04 LTS:
linux-image-4.4.0-91-powerpc-smp 4.4.0-91.114~14.04.1
linux-image-generic-lpae-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-generic-lpae 4.4.0-91.114~14.04.1
linux-image-generic-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-powerpc-e500mc 4.4.0-91.114~14.04.1
linux-image-4.4.0-91-powerpc64-emb 4.4.0-91.114~14.04.1
linux-image-4.4.0-91-generic 4.4.0-91.114~14.04.1
linux-image-lowlatency-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-powerpc64-smp 4.4.0-91.114~14.04.1
linux-image-powerpc-smp-lts-xenial 4.4.0.91.75
linux-image-powerpc64-smp-lts-xenial 4.4.0.91.75
linux-image-powerpc64-emb-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-lowlatency 4.4.0-91.114~14.04.1
linux-image-powerpc-e500mc-lts-xenial 4.4.0.91.75

External links

http://www.ubuntu.com/usn/usn-3385-2/

2) Privilege escalation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the packet_set_ring function due to improper implementation of raw packet sockets in the networking subsystem of the affected software that handles synchronization. A local attacker with CAP_NET_RAW permissions can open a raw packet socket, trigger a race condition, eventually cause use-after-free error and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update the affected packages.

Ubuntu 14.04 LTS:
linux-image-4.4.0-91-powerpc-smp 4.4.0-91.114~14.04.1
linux-image-generic-lpae-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-generic-lpae 4.4.0-91.114~14.04.1
linux-image-generic-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-powerpc-e500mc 4.4.0-91.114~14.04.1
linux-image-4.4.0-91-powerpc64-emb 4.4.0-91.114~14.04.1
linux-image-4.4.0-91-generic 4.4.0-91.114~14.04.1
linux-image-lowlatency-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-powerpc64-smp 4.4.0-91.114~14.04.1
linux-image-powerpc-smp-lts-xenial 4.4.0.91.75
linux-image-powerpc64-smp-lts-xenial 4.4.0.91.75
linux-image-powerpc64-emb-lts-xenial 4.4.0.91.75
linux-image-4.4.0-91-lowlatency 4.4.0-91.114~14.04.1
linux-image-powerpc-e500mc-lts-xenial 4.4.0.91.75

External links

http://www.ubuntu.com/usn/usn-3385-2/

Back to List