Ubuntu update for Linux kernel



Published: 2017-11-21
Risk High
Patch available YES
Number of vulnerabilities 20
CVE-ID CVE-2017-12188
CVE-2017-1000255
CVE-2017-12153
CVE-2017-12154
CVE-2017-12190
CVE-2017-12192
CVE-2017-14156
CVE-2017-14489
CVE-2017-14954
CVE-2017-15265
CVE-2017-15537
CVE-2017-15649
CVE-2017-16525
CVE-2017-16526
CVE-2017-16527
CVE-2017-16529
CVE-2017-16530
CVE-2017-16531
CVE-2017-16533
CVE-2017-16534
CWE-ID CWE-22
CWE-119
CWE-476
CWE-264
CWE-401
CWE-200
CWE-20
CWE-416
CWE-362
CWE-284
CWE-125
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #8 is available.
Public exploit code for vulnerability #12 is available.
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 20 vulnerabilities.

1) Path traversal

EUVDB-ID: #VU12296

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12188

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in arch/x86/kvm/mmu.c due to improper traversal of guest pagetable entries to resolve a guest virtual address when nested virtualisation is used. An adjacent attacker can cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory corruption

EUVDB-ID: #VU8812

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1000255

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code with escalated privileges.

The vulnerability exists due to a boundary error in the Linux kernel's when handling signal frame on PowerPC systems. A malicious local user process could craft a signal frame allowing an attacker to corrupt memory and execute arbitrary code on the target system with escalated privileges.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU8694

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12153

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper privilege management

EUVDB-ID: #VU8696

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12154

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU10709

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12190

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to an out-of-memory condition. A local attacker can cause a memory leak and possible system lock up.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) NULL pointer dereference

EUVDB-ID: #VU10711

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12192

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the Key Management sub component of the Linux kernel when trying to issue a KEYTCL_READ on a negative key due to a NULL pointer dereference. A local attacker can cause the kernel and service to crash.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Information disclosure

EUVDB-ID: #VU10719

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-14156

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to obtain sensitive information on the target system.

The weakness exists in the drivers/video/fbdev/aty/atyfb_base.c due to improper initialization of a certain data structure. A local attacker can read locations associated with padding bytes and obtain sensitive information from kernel stack memory.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Denial of service

EUVDB-ID: #VU10720

Risk: Low

CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-14489

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the drivers/scsi/scsi_transport_iscsi.c due to leveraging incorrect length validation. A local attacker can cause a denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

9) Information disclosure

EUVDB-ID: #VU8650

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-14954

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due to an error in waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4. A local user can accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU8816

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15265

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to use-after-free error in the ALSA sequencer interface (/dev/snd/seq). A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Information disclosure

EUVDB-ID: #VU12315

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-15537

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The weakness exists in the x86/fpu (Floating Point Unit) subsystem due to incorrect handling of attempts to set reserved bits in the xstate header via the ptrace() or rt_sigreturn() system call when a processor supports the xsave feature but not the xsaves feature. A local attacker can read the FPU registers of other processes on the system, related to arch/x86/kernel/fpu/regset.c and arch/x86/kernel/fpu/signal.c.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Privilege escalation

EUVDB-ID: #VU11119

Risk: Low

CVSSv3.1: 7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-15649

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: Yes

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in net/packet/af_packet.c due to race condition (involving fanout_add and packet_do_bind. A local attacker can supply specially crafted system calls, trigger mishandling of packet_fanout data structures, trigger use-after-free error and gain root privileges.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

13) Use-after-free error

EUVDB-ID: #VU9151

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16525

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to use-after-free error in usb_serial_console_disconnect function in drivers/usb/serial/console.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Denial of service

EUVDB-ID: #VU9152

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16526

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to a flaw in drivers/uwb/uwbd.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use-after-free error

EUVDB-ID: #VU9153

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16527

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to use-after-free error in sound/usb/mixer.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU9155

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16529

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the snd_usb_create_streams function in sound/usb/card.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Out-of-bounds read

EUVDB-ID: #VU9156

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16530

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the drivers/usb/storage/uas-detect.h and drivers/usb/storage/uas.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Out-of-bounds read

EUVDB-ID: #VU9157

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16531

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the drivers/usb/core/config.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Out-of-bounds read

EUVDB-ID: #VU9159

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16533

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the usbhid_parse function in drivers/hid/usbhid/hid-core.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Out-of-bounds read

EUVDB-ID: #VU9160

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16534

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read in the cdc_parse_cdc_header function in drivers/usb/core/message.c. A local attacker can use a specially crafted USB device and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages

Ubuntu 17.10:
linux-image-4.13.0-17-generic 4.13.0-17.20
linux-image-generic 4.13.0.17.18
linux-image-4.13.0-17-lowlatency 4.13.0-17.20
linux-image-generic-lpae 4.13.0.17.18
linux-image-4.13.0-1006-raspi2 4.13.0-1006.6
linux-image-4.13.0-17-generic-lpae 4.13.0-17.20
linux-image-lowlatency 4.13.0.17.18
linux-image-raspi2 4.13.0.1006.4

Vulnerable software versions

Ubuntu: 17.10

External links

http://www.ubuntu.com/usn/usn-3487-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###