漏洞类别:Ubuntu
漏洞等级:
漏洞信息
It was discovered that the netfilter netlink implementation in the Linux kernel did not properly validate batch messages.
A heap-based buffer overflow in the tipc_msg_build() function in the Linux kernel.
It was discovered that the keyring implementation in the Linux kernel in some situations did not prevent special internal keyrings from being joined by userspace keyrings.
It was discovered that a buffer overflow existed in the trace subsystem in the Linux kernel.
It was discovered that KVM implementation in the Linux kernel improperly emulated the VMXON instruction.
A race condition existed in the ipv4 ping socket implementation in the Linux kernel.
A race condition existed in the perf subsystem of the Linux kernel.
A memory leak in the keyring implementation in the Linux kernel.
It was discovered that the asynchronous cryptographic hash (ahash) implementation in the Linux kernel did not properly handle a full request queue.
It was discovered that the NFSv2 and NFSv3 server implementations in the Linux kernel did not properly handle certain long RPC replies.
It was discovered that the memory manager in the Linux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism.
It was discovered that the NFSv2 and NFSv3 server implementations in the Linux kernel did not properly check for the end of buffer.
It was discovered that a use-after-free vulnerability existed in the device driver for XCeive xc2028/xc3028 tuners in the Linux kernel.
An integer overflow vulnerability in the VFIO PCI driver for the Linux kernel.
漏洞危害
A local attacker with the CAP_NET_ADMIN capability could use this to expose sensitive information or cause a denial of service. (CVE-2016-7917)
A local attacker could use to cause a denial of service (system crash) or possibly execute arbitrary code with administrative privileges. (CVE-2016-8632)
A privileged local attacker could use this to bypass module verification. (CVE-2016-9604)
A privileged local attacker could use this to execute arbitrary code. (CVE-2017-0605)
A local attacker in a guest OS could use this to cause a denial of service (memory consumption) in the host OS. (CVE-2017-2596)
A local privileged attacker could use this to cause a denial of service (system crash). (CVE-2017-2671)
A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2017-6001)
A local attacker could use this to cause a denial of service (memory consumption). (CVE-2017-7472)
A local attacker could use this to cause a denial of service (infinite recursion). (CVE-2017-7618)
A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-7645)
A local attacker with access to /dev/mem could use this to expose sensitive information or possibly execute arbitrary code. (CVE-2017-7889)
A remote attacker could use this to craft requests that cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7895)
A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-7913)
A local attacker with access to a vfio PCI device file could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-9083, CVE-2016-9084)
解决方案
Refer to Ubuntu advisory USN-3312-1 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
USN-3312-1: 16.04 (Xenial) on src (linux-image-virtual)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-generic-lpae)
USN-3312-1: 16.04 (Xenial) on src (linux-image-powerpc-smp)
USN-3312-1: 16.04 (Xenial) on src (linux-image-powerpc64-smp)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-generic)
USN-3312-1: 16.04 (Xenial) on src (linux-image-raspi2)
USN-3312-1: 16.04 (Xenial) on src (linux-image-aws)
USN-3312-1: 16.04 (Xenial) on src (linux-image-generic)
USN-3312-1: 16.04 (Xenial) on src (linux-image-snapdragon)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-1057-raspi2)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-lowlatency)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-1018-aws)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-1014-gke)
USN-3312-1: 16.04 (Xenial) on src (linux-image-gke)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-powerpc-smp)
USN-3312-1: 16.04 (Xenial) on src (linux-image-powerpc-e500mc)
USN-3312-1: 16.04 (Xenial) on src (linux-image-generic-lpae)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-powerpc-e500mc)
USN-3312-1: 16.04 (Xenial) on src (linux-image-powerpc64-emb)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-1059-snapdragon)
USN-3312-1: 16.04 (Xenial) on src (linux-image-4.4.0-79-powerpc64-smp)
USN-3312-1: 16.04 (Xenial) on src (linux-image-lowlatency)
0daybank
文章评论