{"id":"USN-3342-2","summary":"linux-hwe vulnerabilities","details":"USN-3342-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.10.\nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 16.10 for Ubuntu 16.04 LTS.\n\nUSN-3333-1 fixed a vulnerability in the Linux kernel. However, that\nfix introduced regressions for some Java applications. This update\naddresses the issue. We apologize for the inconvenience.\n\nIt was discovered that a use-after-free flaw existed in the filesystem\nencryption subsystem in the Linux kernel. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2017-7374)\n\nRoee Hay discovered that the parallel port printer driver in the Linux\nkernel did not properly bounds check passed arguments. A local attacker\nwith write access to the kernel command line arguments could use this to\nexecute arbitrary code. (CVE-2017-1000363)\n\nIngo Molnar discovered that the VideoCore DRM driver in the Linux kernel\ndid not return an error after detecting certain overflows. A local attacker\ncould exploit this issue to cause a denial of service (OOPS).\n(CVE-2017-5577)\n\nLi Qiang discovered that an integer overflow vulnerability existed in the\nDirect Rendering Manager (DRM) driver for VMWare devices in the Linux\nkernel. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2017-7294)\n\nIt was discovered that a double-free vulnerability existed in the IPv4\nstack of the Linux kernel. An attacker could use this to cause a denial of\nservice (system crash). (CVE-2017-8890)\n\nAndrey Konovalov discovered an IPv6 out-of-bounds read error in the Linux\nkernel's IPv6 stack. A local attacker could cause a denial of service or\npotentially other unspecified problems. (CVE-2017-9074)\n\nAndrey Konovalov discovered a flaw in the handling of inheritance in the\nLinux kernel's IPv6 stack. A local user could exploit this issue to cause a\ndenial of service or possibly other unspecified problems. (CVE-2017-9075)\n\nIt was discovered that dccp v6 in the Linux kernel mishandled inheritance.\nA local attacker could exploit this issue to cause a denial of service or\npotentially other unspecified problems. (CVE-2017-9076)\n\nIt was discovered that the transmission control protocol (tcp) v6 in the\nLinux kernel mishandled inheritance. A local attacker could exploit this\nissue to cause a denial of service or potentially other unspecified\nproblems. (CVE-2017-9077)\n\nIt was discovered that the IPv6 stack in the Linux kernel was performing\nits over write consistency check after the data was actually overwritten. A\nlocal attacker could exploit this flaw to cause a denial of service (system\ncrash). (CVE-2017-9242)\n","modified":"2026-02-10T04:41:09Z","published":"2017-06-29T17:56:02Z","related":["UBUNTU-CVE-2017-1000363","UBUNTU-CVE-2017-5577","UBUNTU-CVE-2017-7294","UBUNTU-CVE-2017-7374","UBUNTU-CVE-2017-8890","UBUNTU-CVE-2017-9074","UBUNTU-CVE-2017-9075","UBUNTU-CVE-2017-9076","UBUNTU-CVE-2017-9077","UBUNTU-CVE-2017-9242"],"upstream":["CVE-2017-1000363","CVE-2017-5577","CVE-2017-7294","CVE-2017-7374","CVE-2017-8890","CVE-2017-9074","CVE-2017-9075","CVE-2017-9076","CVE-2017-9077","CVE-2017-9242","UBUNTU-CVE-2017-1000363","UBUNTU-CVE-2017-5577","UBUNTU-CVE-2017-7294","UBUNTU-CVE-2017-7374","UBUNTU-CVE-2017-8890","UBUNTU-CVE-2017-9074","UBUNTU-CVE-2017-9075","UBUNTU-CVE-2017-9076","UBUNTU-CVE-2017-9077","UBUNTU-CVE-2017-9242"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3342-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5577"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7294"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7374"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8890"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9075"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9076"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9077"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9242"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000363"},{"type":"REPORT","url":"https://launchpad.net/bugs/1699772"}],"affected":[{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.8.0-58.63~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.8.0-58.63~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"block-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"crypto-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"crypto-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"dasd-extra-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"dasd-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fat-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fat-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fb-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"firewire-core-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"floppy-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fs-core-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fs-core-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fs-secondary-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"fs-secondary-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"input-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"input-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"ipmi-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"ipmi-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"irda-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"irda-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"kernel-image-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"kernel-image-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-cloud-tools-4.8.0-58-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-cloud-tools-4.8.0-58-lowlatency","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-headers-4.8.0-58","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-headers-4.8.0-58-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-headers-4.8.0-58-generic-lpae","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-headers-4.8.0-58-lowlatency","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-hwe-cloud-tools-4.8.0-58","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-hwe-tools-4.8.0-58","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-hwe-udebs-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-hwe-udebs-generic-lpae","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-image-4.8.0-58-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-image-4.8.0-58-generic-lpae","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-image-4.8.0-58-lowlatency","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-image-extra-4.8.0-58-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-source-4.8.0","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-tools-4.8.0-58-generic","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-tools-4.8.0-58-generic-lpae","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"linux-tools-4.8.0-58-lowlatency","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"md-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"md-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"message-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"mouse-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"mouse-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"multipath-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"multipath-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nfs-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nfs-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-pcmcia-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-shared-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-shared-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-usb-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"nic-usb-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"parport-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"parport-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"pata-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"pcmcia-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"pcmcia-storage-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"plip-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"plip-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"ppp-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"ppp-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"sata-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"sata-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"scsi-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"scsi-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"serial-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"storage-core-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"storage-core-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"usb-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"usb-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"virtio-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"vlan-modules-4.8.0-58-generic-di","binary_version":"4.8.0-58.63~16.04.1"},{"binary_name":"vlan-modules-4.8.0-58-generic-lpae-di","binary_version":"4.8.0-58.63~16.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3342-2.json"}}],"schema_version":"1.7.3"}