{"id":"USN-3632-1","summary":"linux-azure vulnerabilities","details":"It was discovered that a race condition leading to a use-after-free\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-0861)\n\nIt was discovered that the KVM implementation in the Linux kernel allowed\npassthrough of the diagnostic I/O port 0x80. An attacker in a guest VM\ncould use this to cause a denial of service (system crash) in the host OS.\n(CVE-2017-1000407)\n\nIt was discovered that a use-after-free vulnerability existed in the\nnetwork namespaces implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-15129)\n\nIt was discovered that the HugeTLB component of the Linux kernel did not\nproperly handle holes in hugetlb ranges. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2017-16994)\n\nIt was discovered that the netfilter component of the Linux did not\nproperly restrict access to the connection tracking helpers list. A local\nattacker could use this to bypass intended access restrictions.\n(CVE-2017-17448)\n\nIt was discovered that the netfilter passive OS fingerprinting (xt_osf)\nmodule did not properly perform access control checks. A local attacker\ncould improperly modify the system-wide OS fingerprint list.\n(CVE-2017-17450)\n\nDmitry Vyukov discovered that the KVM implementation in the Linux kernel\ncontained an out-of-bounds read when handling memory-mapped I/O. A local\nattacker could use this to expose sensitive information. (CVE-2017-17741)\n\nIt was discovered that the Salsa20 encryption algorithm implementations in\nthe Linux kernel did not properly handle zero-length inputs. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-17805)\n\nIt was discovered that the HMAC implementation did not validate the state\nof the underlying cryptographic hash algorithm. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-17806)\n\nIt was discovered that the keyring implementation in the Linux kernel did\nnot properly check permissions when a key request was performed on a task's\ndefault keyring. A local attacker could use this to add keys to\nunauthorized keyrings. (CVE-2017-17807)\n\nIt was discovered that the Broadcom NetXtremeII ethernet driver in the\nLinux kernel did not properly validate Generic Segment Offload (GSO) packet\nsizes. An attacker could use this to cause a denial of service (interface\nunavailability). (CVE-2018-1000026)\n\nIt was discovered that the Reliable Datagram Socket (RDS) implementation in\nthe Linux kernel contained an out-of-bounds write during RDMA page\nallocation. An attacker could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2018-5332)\n\nMohamed Ghannam discovered a null pointer dereference in the RDS (Reliable\nDatagram Sockets) protocol implementation of the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-5333)\n\n范龙飞 discovered that a race condition existed in loop block device\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-5344)\n\nIt was discovered that the Broadcom UniMAC MDIO bus controller driver in\nthe Linux kernel did not properly validate device resources. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-8043)\n","modified":"2026-02-10T04:41:20Z","published":"2018-04-24T06:25:51Z","related":["UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344","UBUNTU-CVE-2018-8043"],"upstream":["CVE-2017-0861","CVE-2017-1000407","CVE-2017-15129","CVE-2017-16994","CVE-2017-17448","CVE-2017-17450","CVE-2017-17741","CVE-2017-17805","CVE-2017-17806","CVE-2017-17807","CVE-2018-1000026","CVE-2018-5332","CVE-2018-5333","CVE-2018-5344","CVE-2018-8043","UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344","UBUNTU-CVE-2018-8043"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3632-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17450"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17805"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17807"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5332"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5333"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5344"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-8043"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000026"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.13.0-1014.17?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1014.17"}]}],"versions":["4.11.0-1009.9","4.11.0-1011.11","4.11.0-1013.13","4.11.0-1014.14","4.11.0-1015.15","4.11.0-1016.16","4.13.0-1005.7","4.13.0-1006.8","4.13.0-1007.9","4.13.0-1009.12","4.13.0-1011.14","4.13.0-1012.15"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.13.0-1014.17","binary_name":"linux-azure-cloud-tools-4.13.0-1014"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-azure-headers-4.13.0-1014"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-azure-tools-4.13.0-1014"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-cloud-tools-4.13.0-1014-azure"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-headers-4.13.0-1014-azure"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-image-4.13.0-1014-azure"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-image-extra-4.13.0-1014-azure"},{"binary_version":"4.13.0-1014.17","binary_name":"linux-tools-4.13.0-1014-azure"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2017-0861","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-15129","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-16994","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17448","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17450","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17741","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17805","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17806","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17807","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-1000407","severity":[{"score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-5332","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-5333","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-5344","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-8043","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-1000026","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3632-1.json"}}],"schema_version":"1.7.3"}