CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-1000363 Ubuntu Security Notification for Linux-lts-xenial, Linux-meta-lts-xenial Vulnerabilities (USN-3334-1)

2017年6月27日 3233点热度 0人点赞 0条评论

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap.

It was discovered that the parallel port printer driver in the Linux kernel did not properly bounds check passed arguments.

A reference count bug was discovered in the Linux kernel ipx protocol stack.

A double free bug was discovered in the IPv4 stack of the Linux kernel.

An IPv6 out-of-bounds read error in the Linux kernel's IPv6 stack.

A flaw in the handling of inheritance in the Linux kernel's IPv6 stack.

It was discovered that dccp v6 in the Linux kernel mishandled inheritance.

It was discovered that the transmission control protocol (tcp) v6 in the Linux kernel mishandled inheritance.

It was discovered that the IPv6 stack was doing over write consistency check after the data was actually overwritten.

漏洞危害

An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges (CVE-2017-1000364)

A local attacker with write access to the kernel command line arguments could use this to execute arbitrary code. (CVE-2017-1000363)

A local attacker could exploit this flaw to cause a denial of service or possibly other unspecified problems. (CVE-2017-7487)

An attacker could use this to cause a denial of service (system crash). (CVE-2017-8890)

A local attacker could cause a denial of service or potentially other unspecified problems. (CVE-2017-9074)

A local user could exploit this issue to cause a denial of service or possibly other unspecified problems. (CVE-2017-9075)

A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9076)

A local attacker could exploit this issue to cause a denial of service or potentially other unspecified problems. (CVE-2017-9077)

A local attacker could exploit this flaw to cause a denial of service (system crash). (CVE-2017-9242)

解决方案

Refer to Ubuntu advisory USN-3334-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-powerpc64-emb)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-powerpc-smp)

USN-3334-1: 14.04 (Kylin) on src (linux-image-powerpc-e500mc-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-powerpc-smp-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-lowlatency)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-powerpc64-smp)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-generic-lpae)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-generic)

USN-3334-1: 14.04 (Kylin) on src (linux-image-powerpc64-smp-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-generic-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-powerpc64-emb-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-generic-lpae-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-4.4.0-81-powerpc-e500mc)

USN-3334-1: 14.04 (Kylin) on src (linux-image-lowlatency-lts-xenial)

USN-3334-1: 14.04 (Kylin) on src (linux-image-virtual-lts-xenial)

0daybank

标签: 暂无
最后更新:2017年8月4日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me