Home / mailings [USN-3404-2] Linux kernel (HWE) vulnerability
Posted on 29 August 2017
Ubuntu Security--===============6379871660759136527==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="huu3jwlh2qxowro2"
Content-Disposition: inline
--huu3jwlh2qxowro2
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================================
Ubuntu Security Notice USN-3404-2
August 28, 2017
linux-hwe vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux-hwe: Linux hardware enablement (HWE) kernel
Details:
USN-3404-1 fixed a vulnerability in the Linux kernel for Ubuntu 17.04.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS.
A reference count bug was discovered in the Linux kernel ipx protocol
stack. A local attacker could exploit this flaw to cause a denial of
service or possibly other unspecified problems.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.10.0-33-generic 4.10.0-33.37~16.04.1
linux-image-4.10.0-33-generic-lpae 4.10.0-33.37~16.04.1
linux-image-4.10.0-33-lowlatency 4.10.0-33.37~16.04.1
linux-image-generic-hwe-16.04 4.10.0.33.35
linux-image-generic-lpae-hwe-16.04 4.10.0.33.35
linux-image-lowlatency-hwe-16.04 4.10.0.33.35
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3404-2
https://www.ubuntu.com/usn/usn-3404-1
CVE-2017-7487
Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.10.0-33.37~16.04.1