[USN-3420-1] Linux kernel vulnerabilities
Several security issues were fixed in the Linux kernel.
It was discovered that a buffer overflow existed in the Bluetooth stack of
the Linux kernel when handling L2CAP configuration responses. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2017-1000251)
It was discovered that the Flash-Friendly File System (f2fs) implementation
in the Linux kernel did not properly validate superblock metadata. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2017-10663)
It was discovered that a buffer overflow existed in the ioctl handling code
in the ISDN subsystem of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-12762)
Pengfei Wang discovered that a race condition existed in the NXP SAA7164 TV
Decoder driver for the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-8831)
- ID
- USN-3420-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-3420-1
- Published
-
2017-09-18T22:21:52
(7 years ago) - Modified
-
2017-09-18T22:21:52
(7 years ago) - Other Advisories
-
- ALAS-2017-870
- ALAS-2017-914
- ASA-201709-12
- ASA-201709-4
- ASA-201709-8
- ASA-201709-9
- DSA-3981-1
- ELSA-2017-2679
- ELSA-2017-2681
- ELSA-2017-3620
- ELSA-2017-3621
- ELSA-2017-3622
- ELSA-2017-3636
- ELSA-2017-3637
- FEDORA-2017-7369ea045c
- FEDORA-2017-e07d7fb18e
- FEDORA-2018-4ca01704a2
- FEDORA-2018-6367a17aa3
- FEDORA-2018-884a105c04
- RHSA-2017:2679
- RHSA-2017:2681
- RHSA-2017:2704
- SSA:2017-258-02
- SUSE-SU-2017:2286-1
- SUSE-SU-2017:2459-1
- SUSE-SU-2017:2521-1
- SUSE-SU-2017:2523-1
- SUSE-SU-2017:2525-1
- SUSE-SU-2017:2534-1
- SUSE-SU-2017:2548-1
- SUSE-SU-2017:2694-1
- SUSE-SU-2017:2769-1
- SUSE-SU-2017:2770-1
- SUSE-SU-2017:2771-1
- SUSE-SU-2017:2772-1
- SUSE-SU-2017:2773-1
- SUSE-SU-2017:2774-1
- SUSE-SU-2017:2776-1
- SUSE-SU-2017:2777-1
- SUSE-SU-2017:2778-1
- SUSE-SU-2017:2779-1
- SUSE-SU-2017:2780-1
- SUSE-SU-2017:2781-1
- SUSE-SU-2017:2782-1
- SUSE-SU-2017:2783-1
- SUSE-SU-2017:2784-1
- SUSE-SU-2017:2785-1
- SUSE-SU-2017:2786-1
- SUSE-SU-2017:2787-1
- SUSE-SU-2017:2788-1
- SUSE-SU-2017:2790-1
- SUSE-SU-2017:2792-1
- SUSE-SU-2017:2793-1
- SUSE-SU-2017:2794-1
- SUSE-SU-2017:2796-1
- SUSE-SU-2017:2797-1
- SUSE-SU-2017:2798-1
- SUSE-SU-2017:2799-1
- SUSE-SU-2017:2800-1
- SUSE-SU-2017:2801-1
- SUSE-SU-2017:2802-1
- SUSE-SU-2017:2803-1
- SUSE-SU-2017:2804-1
- SUSE-SU-2017:2805-1
- SUSE-SU-2017:2806-1
- SUSE-SU-2017:2807-1
- SUSE-SU-2017:2809-1
- SUSE-SU-2017:2811-1
- SUSE-SU-2017:2813-1
- SUSE-SU-2017:2816-1
- SUSE-SU-2017:2869-1
- SUSE-SU-2017:2908-1
- SUSE-SU-2017:2920-1
- SUSE-SU-2017:2956-1
- SUSE-SU-2017:3265-1
- SUSE-SU-2018:0040-1
- USN-3419-1
- USN-3419-2
- USN-3420-2
- USN-3422-1
- USN-3422-2
- USN-3423-1
- USN-3468-1
- USN-3468-2
- USN-3468-3
- USN-3470-1
- USN-3470-2
- USN-3620-1
- USN-3620-2
- USN-3754-1
- VU:240311
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-96-generic?distro=xenial | ubuntu | linux-image-extra-4.4.0-96-generic | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-1031-gke?distro=xenial | ubuntu | linux-image-extra-4.4.0-1031-gke | < 4.4.0-1031.31 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-96-powerpc64-smp | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-96-powerpc64-emb | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-96-powerpc-smp | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-96-powerpc-e500mc | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-96-lowlatency | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-generic?distro=xenial | ubuntu | linux-image-4.4.0-96-generic | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-96-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-96-generic-lpae | < 4.4.0-96.119 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1076-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1076-snapdragon | < 4.4.0-1076.81 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1074-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1074-raspi2 | < 4.4.0-1074.82 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1035-aws?distro=xenial | ubuntu | linux-image-4.4.0-1035-aws | < 4.4.0-1035.44 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1031-gke?distro=xenial | ubuntu | linux-image-4.4.0-1031-gke | < 4.4.0-1031.31 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1007-kvm?distro=xenial | ubuntu | linux-image-4.4.0-1007-kvm | < 4.4.0-1007.12 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |