vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-11089): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Nov 16, 2017 | Apr 25, 2018 | Apr 25, 2025 |
Description
It was discovered that the netlink 802.11 configuration interface in the
Linux kernel did not properly validate some attributes passed from
userspace. A local attacker with the CAP_NET_ADMIN privilege could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-11089)
It was discovered that a buffer overflow existed in the ioctl handling code
in the ISDN subsystem of the Linux kernel. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-12762)
It was discovered that the netfilter component of the Linux did not
properly restrict access to the connection tracking helpers list. A local
attacker could use this to bypass intended access restrictions.
(CVE-2017-17448)
Dmitry Vyukov discovered that the KVM implementation in the Linux kernel
contained an out-of-bounds read when handling memory-mapped I/O. A local
attacker could use this to expose sensitive information. (CVE-2017-17741)
It was discovered that the Salsa20 encryption algorithm implementations in
the Linux kernel did not properly handle zero-length inputs. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2017-17805)
It was discovered that the keyring implementation in the Linux kernel did
not properly check permissions when a key request was performed on a
task's default keyring. A local attacker could use this to add keys to
unauthorized keyrings. (CVE-2017-17807)
It was discovered that the Broadcom NetXtremeII ethernet driver in the
Linux kernel did not properly validate Generic Segment Offload (GSO) packet
sizes. An attacker could use this to cause a denial of service (interface
unavailability). (CVE-2018-1000026)
It was discovered that the Reliable Datagram Socket (RDS) implementation in
the Linux kernel contained an out-of-bounds write during RDMA page
allocation. An attacker could use this to cause a denial of service (system
crash) or possibly execute arbitrary code. (CVE-2018-5332)
Solution(s)
References
- CVE-2017-11089
- https://attackerkb.com/topics/CVE-2017-11089
- NVD-CVE-2017-11089
- UBUNTU-USN-3420-1
- UBUNTU-USN-3420-2
- UBUNTU-USN-3516-1
- UBUNTU-USN-3530-1
- UBUNTU-USN-3531-1
- UBUNTU-USN-3531-3
- UBUNTU-USN-3540-1
- UBUNTU-USN-3540-2
- UBUNTU-USN-3541-1
- UBUNTU-USN-3541-2
- UBUNTU-USN-3542-1
- UBUNTU-USN-3542-2
- UBUNTU-USN-3549-1
- UBUNTU-USN-3560-1
- UBUNTU-USN-3561-1
- UBUNTU-USN-3580-1
- UBUNTU-USN-3581-1
- UBUNTU-USN-3581-2
- UBUNTU-USN-3582-1
- UBUNTU-USN-3582-2
- UBUNTU-USN-3594-1
- UBUNTU-USN-3597-1
- UBUNTU-USN-3597-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3620-1
- UBUNTU-USN-3620-2
- UBUNTU-USN-3632-1
- UBUNTU-USN-3690-1
- UBUNTU-USN-3777-3

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.