CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-7533 Ubuntu Security Notification for Linux, Linux-aws, Linux-gke, Linux-raspi2, Linux-snapdragon Regression (USN-3392-1)

2017年8月19日 898点热度 0人点赞 0条评论

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

USN-3378-1 fixed vulnerabilities in the Linux kernel. Unfortunately, a regression was introduced that prevented conntrack from working correctly in some situations. This update fixes the problem.

A race condition between inotify events and vfs rename operations in the Linux kernel.

It was discovered that the Linux kernel did not properly restrict RLIMIT_STACK size.

It was discovered that the Virtio GPU driver in the Linux kernel did not properly free memory in some situations.

It was discovered that the RxRPC Kerberos 5 ticket handling code in the Linux kernel did not properly verify metadata.

漏洞危害

An unprivileged local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2017-7533)

A local attacker could use this in conjunction with another vulnerability to possibly execute arbitrary code. (CVE-2017-1000365)

A local attacker could use this to cause a denial of service (memory consumption). (CVE-2017-10810)

A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7482)

解决方案

Refer to Ubuntu advisory USN-3392-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3392-1: 16.04 (Xenial) on src (linux-image-snapdragon)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-generic-lpae)

USN-3392-1: 16.04 (Xenial) on src (linux-image-powerpc-e500mc)

USN-3392-1: 16.04 (Xenial) on src (linux-image-powerpc64-emb)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-generic)

USN-3392-1: 16.04 (Xenial) on src (linux-image-powerpc64-smp)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-powerpc64-smp)

USN-3392-1: 16.04 (Xenial) on src (linux-image-aws)

USN-3392-1: 16.04 (Xenial) on src (linux-image-raspi2)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-1070-raspi2)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-lowlatency)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-1031-aws)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-1027-gke)

USN-3392-1: 16.04 (Xenial) on src (linux-image-generic-lpae)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-powerpc-smp)

USN-3392-1: 16.04 (Xenial) on src (linux-image-lowlatency)

USN-3392-1: 16.04 (Xenial) on src (linux-image-generic)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-powerpc-e500mc)

USN-3392-1: 16.04 (Xenial) on src (linux-image-powerpc-smp)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-1072-snapdragon)

USN-3392-1: 16.04 (Xenial) on src (linux-image-4.4.0-92-powerpc64-emb)

USN-3392-1: 16.04 (Xenial) on src (linux-image-gke)

0daybank

标签: 暂无
最后更新:2017年8月19日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me