Oval Definition:oval:com.ubuntu.trusty:def:20177184000
Revision Date:2017-03-19Version:1
Title:CVE-2017-7184 on Ubuntu 14.04 LTS (trusty) - high.
Description:The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52. It was discovered that the xfrm framework for transforming packets in the Linux kernel did not properly validate data received from user space. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-7184
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-115.162').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in trusty is not affected (note: '4.15.0-1023.24~14.04.1').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR The 'linux-lts-xenial' package in trusty was vulnerable but has been fixed (note: '4.4.0-71.92~14.04.1').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • BACK