{"id":23349,"date":"2018-04-05T03:17:41","date_gmt":"2018-04-04T18:17:41","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3617-3-linux-kernel-raspberry-pi-2-vulnerabilities\/"},"modified":"2018-04-05T05:34:13","modified_gmt":"2018-04-04T20:34:13","slug":"usn-3617-3-linux-kernel-raspberry-pi-2-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3617-3-linux-kernel-raspberry-pi-2-vulnerabilities\/","title":{"rendered":"USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities"},"content":{"rendered":"<p>USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities<\/p>\n<h2 id=\"linux-raspi2-vulnerabilities\">linux-raspi2 vulnerabilities<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.10<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>Several security issues were fixed in the Linux kernel.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>linux-raspi2 &#8211; Linux kernel for Raspberry Pi 2<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>It was discovered that a race condition leading to a use-after-free<br \/>\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A<br \/>\nlocal attacker could use this to cause a denial of service (system crash)<br \/>\nor possibly execute arbitrary code. (CVE-2017-0861)<\/p>\n<p>It was discovered that a use-after-free vulnerability existed in the<br \/>\nnetwork namespaces implementation in the Linux kernel. A local attacker<br \/>\ncould use this to cause a denial of service (system crash) or possibly<br \/>\nexecute arbitrary code. (CVE-2017-15129)<\/p>\n<p>Andrey Konovalov discovered that the usbtest device driver in the Linux<br \/>\nkernel did not properly validate endpoint metadata. A physically proximate<br \/>\nattacker could use this to cause a denial of service (system crash).<br \/>\n(CVE-2017-16532)<\/p>\n<p>Andrey Konovalov discovered that the SoundGraph iMON USB driver in the<br \/>\nLinux kernel did not properly validate device metadata. A physically<br \/>\nproximate attacker could use this to cause a denial of service (system<br \/>\ncrash). (CVE-2017-16537)<\/p>\n<p>Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver<br \/>\nin the Linux kernel did not properly validate device descriptors. A<br \/>\nphysically proximate attacker could use this to cause a denial of service<br \/>\n(system crash). (CVE-2017-16645)<\/p>\n<p>Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the<br \/>\nLinux kernel did not properly handle detach events. A physically proximate<br \/>\nattacker could use this to cause a denial of service (system crash).<br \/>\n(CVE-2017-16646)<\/p>\n<p>Andrey Konovalov discovered that the ASIX Ethernet USB driver in the Linux<br \/>\nkernel did not properly handle suspend and resume events. A physically<br \/>\nproximate attacker could use this to cause a denial of service (system<br \/>\ncrash). (CVE-2017-16647)<\/p>\n<p>Andrey Konovalov discovered that the CDC USB Ethernet driver did not<br \/>\nproperly validate device descriptors. A physically proximate attacker could<br \/>\nuse this to cause a denial of service (system crash). (CVE-2017-16649)<\/p>\n<p>Andrey Konovalov discovered that the QMI WWAN USB driver did not properly<br \/>\nvalidate device descriptors. A physically proximate attacker could use this<br \/>\nto cause a denial of service (system crash). (CVE-2017-16650)<\/p>\n<p>It was discovered that the HugeTLB component of the Linux kernel did not<br \/>\nproperly handle holes in hugetlb ranges. A local attacker could use this to<br \/>\nexpose sensitive information (kernel memory). (CVE-2017-16994)<\/p>\n<p>It was discovered that the netfilter component of the Linux did not<br \/>\nproperly restrict access to the connection tracking helpers list. A local<br \/>\nattacker could use this to bypass intended access restrictions.<br \/>\n(CVE-2017-17448)<\/p>\n<p>It was discovered that the netfilter passive OS fingerprinting (xt_osf)<br \/>\nmodule did not properly perform access control checks. A local attacker<br \/>\ncould improperly modify the system-wide OS fingerprint list.<br \/>\n(CVE-2017-17450)<\/p>\n<p>Dmitry Vyukov discovered that the KVM implementation in the Linux kernel<br \/>\ncontained an out-of-bounds read when handling memory-mapped I\/O. A local<br \/>\nattacker could use this to expose sensitive information. (CVE-2017-17741)<\/p>\n<p>It was discovered that the Salsa20 encryption algorithm implementations in<br \/>\nthe Linux kernel did not properly handle zero-length inputs. A local<br \/>\nattacker could use this to cause a denial of service (system crash).<br \/>\n(CVE-2017-17805)<\/p>\n<p>It was discovered that the HMAC implementation did not validate the state<br \/>\nof the underlying cryptographic hash algorithm. A local attacker could use<br \/>\nthis to cause a denial of service (system crash) or possibly execute<br \/>\narbitrary code. (CVE-2017-17806)<\/p>\n<p>It was discovered that the keyring implementation in the Linux kernel did<br \/>\nnot properly check permissions when a key request was performed on a tasks&rsquo;<br \/>\ndefault keyring. A local attacker could use this to add keys to<br \/>\nunauthorized keyrings. (CVE-2017-17807)<\/p>\n<p>It was discovered that a race condition existed in the OCFS2 file system<br \/>\nimplementation in the Linux kernel. A local attacker could use this to<br \/>\ncause a denial of service (kernel deadlock). (CVE-2017-18204)<\/p>\n<p>It was discovered that the Broadcom NetXtremeII ethernet driver in the<br \/>\nLinux kernel did not properly validate Generic Segment Offload (GSO) packet<br \/>\nsizes. An attacker could use this to cause a denial of service (interface<br \/>\nunavailability). (CVE-2018-1000026)<\/p>\n<p>It was discovered that the Reliable Datagram Socket (RDS) implementation in<br \/>\nthe Linux kernel contained an out-of-bounds during RDMA page allocation. An<br \/>\nattacker could use this to cause a denial of service (system crash) or<br \/>\npossibly execute arbitrary code. (CVE-2018-5332)<\/p>\n<p>Mohamed Ghannam discovered a null pointer dereference in the RDS (Reliable<br \/>\nDatagram Sockets) protocol implementation of the Linux kernel. A local<br \/>\nattacker could use this to cause a denial of service (system crash).<br \/>\n(CVE-2018-5333)<\/p>\n<p>\u8303\u9f99\u98de discovered that a race condition existed in loop block device<br \/>\nimplementation in the Linux kernel. A local attacker could use this to<br \/>\ncause a denial of service (system crash) or possibly execute arbitrary<br \/>\ncode. (CVE-2018-5344)<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 17.10<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-raspi2\">linux-image-4.13.0-1016-raspi2<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-raspi2\/4.13.0-1016.17\">4.13.0-1016.17<\/a><\/dd>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-raspi2\">linux-image-raspi2<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/linux-raspi2\/4.13.0-1016.17\">4.13.0.1016.14<\/a><\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>\nall the necessary changes.<\/p>\n<p>ATTENTION: Due to an unavoidable ABI change the kernel updates have<br \/>\nbeen given a new version number, which requires you to recompile and<br \/>\nreinstall all third party kernel modules you might have installed.<br \/>\nUnless you manually uninstalled the standard kernel metapackages<br \/>\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,<br \/>\nlinux-powerpc), a standard system upgrade will automatically perform<br \/>\nthis as well.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/usn.ubuntu.com\/usn\/usn-3617-1\">USN-3617-1<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-0861\">CVE-2017-0861<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-15129\">CVE-2017-15129<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16532\">CVE-2017-16532<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16537\">CVE-2017-16537<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16645\">CVE-2017-16645<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16646\">CVE-2017-16646<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16647\">CVE-2017-16647<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16649\">CVE-2017-16649<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16650\">CVE-2017-16650<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-16994\">CVE-2017-16994<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17448\">CVE-2017-17448<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17450\">CVE-2017-17450<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17741\">CVE-2017-17741<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17805\">CVE-2017-17805<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17806\">CVE-2017-17806<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-17807\">CVE-2017-17807<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2017-18204\">CVE-2017-18204<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-1000026\">CVE-2018-1000026<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-5332\">CVE-2018-5332<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-5333\">CVE-2018-5333<\/a><\/li>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2018-5344\">CVE-2018-5344<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/3617-3\/\" target=\"_blank\">USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities linux-raspi2 vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.10 Summary Several security issues were fixed in the Linux kernel. Software Description linux-raspi2 &#8211; Linux kernel for Raspberry Pi 2 Details It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861) It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129) Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3617-3-linux-kernel-raspberry-pi-2-vulnerabilities\/\" title=\"USN-3617-3: Linux kernel (Raspberry Pi 2) vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-23349","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=23349"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23349\/revisions"}],"predecessor-version":[{"id":23350,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/23349\/revisions\/23350"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=23349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=23349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=23349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}