USN-3358-1: Linux kernel vulnerabilities
Publication date
20 July 2017
Overview
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux - Linux kernel
- linux-raspi2 - Linux kernel for Raspberry Pi 2
Details
It was discovered that the Linux kernel did not properly initialize a Wake-
on-Lan data structure. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2014-9900)
Alexander Potapenko discovered a race condition in the Advanced Linux Sound
Architecture (ALSA) subsystem in the Linux kernel. A local attacker could
use this to expose sensitive information (kernel memory).
(CVE-2017-1000380)
Li Qiang discovered that the DRM driver for VMware Virtual GPUs in the
Linux kernel did not properly validate some ioctl arguments. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-7346)
Murray McAllister discovered that the DRM driver for VMware Virtual GPUs in
the Linux kernel did not properly initialize memory. A local attacker could
use this to...
It was discovered that the Linux kernel did not properly initialize a Wake-
on-Lan data structure. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2014-9900)
Alexander Potapenko discovered a race condition in the Advanced Linux Sound
Architecture (ALSA) subsystem in the Linux kernel. A local attacker could
use this to expose sensitive information (kernel memory).
(CVE-2017-1000380)
Li Qiang discovered that the DRM driver for VMware Virtual GPUs in the
Linux kernel did not properly validate some ioctl arguments. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-7346)
Murray McAllister discovered that the DRM driver for VMware Virtual GPUs in
the Linux kernel did not properly initialize memory. A local attacker could
use this to expose sensitive information (kernel memory). (CVE-2017-9605)
Update instructions
After a standard system update you need to reboot your computer to make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
17.04 zesty | linux-image-4.10.0-28-generic-lpae – 4.10.0-28.32 | ||
linux-image-generic-lpae – 4.10.0.28.29 | |||
linux-image-4.10.0-28-generic – 4.10.0-28.32 | |||
linux-image-generic – 4.10.0.28.29 | |||
linux-image-4.10.0-28-lowlatency – 4.10.0-28.32 | |||
linux-image-4.10.0-1011-raspi2 – 4.10.0-1011.14 | |||
linux-image-lowlatency – 4.10.0.28.29 | |||
linux-image-raspi2 – 4.10.0.1011.13 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.
References
Have additional questions?