{"id":15757,"date":"2017-04-25T12:34:11","date_gmt":"2017-04-25T03:34:11","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3266-2-linux-kernel-hwe-vulnerability\/"},"modified":"2017-04-25T12:34:11","modified_gmt":"2017-04-25T03:34:11","slug":"usn-3266-2-linux-kernel-hwe-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3266-2-linux-kernel-hwe-vulnerability\/","title":{"rendered":"USN-3266-2: Linux kernel (HWE) vulnerability"},"content":{"rendered":"<p>USN-3266-2: Linux kernel (HWE) vulnerability<\/p>\n<h2>Ubuntu Security Notice USN-3266-2<\/h2>\n<p><em>24th April, 2017<\/em><\/p>\n<h3>linux-hwe vulnerability<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 16.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>The system could be made to crash under certain conditions.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>linux-hwe<br \/>\n    &#8211; Linux hardware enablement (HWE) kernel<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>USN-3266-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.10.<br \/>This update provides the corresponding updates for the Linux Hardware<br \/>Enablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.<\/p>\n<p>Alexander Popov discovered that a race condition existed in the Stream<br \/>Control Transmission Protocol (SCTP) implementation in the Linux kernel. A<br \/>local attacker could use this to cause a denial of service (system crash).<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-4.8.0-49-generic<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0-49.52~16.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-lowlatency-hwe-16.04<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0.49.21<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-generic-hwe-16.04<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0.49.21<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-4.8.0-49-lowlatency<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0-49.52~16.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-4.8.0-49-generic-lpae<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0-49.52~16.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\">linux-image-generic-lpae-hwe-16.04<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-hwe\/4.8.0-49.52~16.04.1\">4.8.0.49.21<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>all the necessary changes.<\/p>\n<p>ATTENTION: Due to an unavoidable ABI change the kernel updates have<br \/>been given a new version number, which requires you to recompile and<br \/>reinstall all third party kernel modules you might have installed.<br \/>Unless you manually uninstalled the standard kernel metapackages<br \/>(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,<br \/>linux-powerpc), a standard system upgrade will automatically perform<br \/>this as well.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5986\">CVE-2017-5986<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3266-2\/\" target=\"_blank\">USN-3266-2: Linux kernel (HWE) vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3266-2: Linux kernel (HWE) vulnerability Ubuntu Security Notice USN-3266-2 24th April, 2017 linux-hwe vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-hwe &#8211; Linux hardware enablement (HWE) kernel Details USN-3266-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.10.This update provides the corresponding updates for the Linux HardwareEnablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS. Alexander Popov discovered that a race condition existed in the StreamControl Transmission Protocol (SCTP) implementation in the Linux kernel. Alocal attacker could use this to cause a denial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 16.04 LTS: linux-image-4.8.0-49-generic 4.8.0-49.52~16.04.1 linux-image-lowlatency-hwe-16.04 4.8.0.49.21 linux-image-generic-hwe-16.04 4.8.0.49.21 linux-image-4.8.0-49-lowlatency 4.8.0-49.52~16.04.1 linux-image-4.8.0-49-generic-lpae 4.8.0-49.52~16.04.1 linux-image-generic-lpae-hwe-16.04 4.8.0.49.21 <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3266-2-linux-kernel-hwe-vulnerability\/\" title=\"USN-3266-2: Linux kernel (HWE) vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-15757","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=15757"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15757\/revisions"}],"predecessor-version":[{"id":15758,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/15757\/revisions\/15758"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=15757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=15757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=15757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}