Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-3338-2: Linux kernel regression

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Ubuntu: USN-3338-2: Linux kernel regression

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/29/2017
Created
07/25/2018
Added
06/30/2017
Modified
07/09/2020

Description

USN-3338-1 fixed vulnerabilities in the Linux kernel. However, the fix forCVE-2017-1000364introduced regressions for some Java applications. This update addresses the issue. We apologize for the inconvenience.

Original advisory details:

It was discovered that the stack guard page for processes in the Linux kernel was not sufficiently large enough to prevent overlapping with the heap. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative privileges (CVE-2017-1000364)

Jesse Hertz and Tim Newsham discovered that the Linux netfilter implementation did not correctly perform validation when handling 32 bit compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges. (CVE-2016-4997)

Solution(s)

  • ubuntu-upgrade-linux-image-3-2-0-129-generic
  • ubuntu-upgrade-linux-image-3-2-0-129-generic-pae
  • ubuntu-upgrade-linux-image-3-2-0-129-highbank
  • ubuntu-upgrade-linux-image-3-2-0-129-omap
  • ubuntu-upgrade-linux-image-3-2-0-129-powerpc-smp
  • ubuntu-upgrade-linux-image-3-2-0-129-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-2-0-129-virtual
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-pae
  • ubuntu-upgrade-linux-image-highbank
  • ubuntu-upgrade-linux-image-omap
  • ubuntu-upgrade-linux-image-powerpc
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-virtual

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;