Oval Definition:oval:com.ubuntu.xenial:def:20177374000
Revision Date:2017-03-31Version:1
Title:CVE-2017-7374 on Ubuntu 16.04 LTS (xenial) - high.
Description:Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely. It was discovered that a use-after-free flaw existed in the filesystem encryption subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-7374
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-75.96').
  • OR The 'linux-aws' package in xenial was vulnerable but has been fixed (note: '4.4.0-1016.25').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in xenial is not affected (note: '4.11.0-1009.9').
  • OR NOT While related to the CVE in some way, the 'linux-euclid' package in xenial is not affected (note: '4.4.0-9019.20').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in xenial is not affected.
  • OR NOT While related to the CVE in some way, the 'linux-gcp' package in xenial is not affected (note: '4.10.0-1004.4').
  • OR The 'linux-gke' package in xenial was vulnerable but has been fixed (note: '4.4.0-1012.12').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in xenial is not affected.
  • OR The 'linux-hwe' package in xenial was vulnerable but has been fixed (note: '4.8.0-58.63~16.04.1').
  • OR The 'linux-hwe-edge' package in xenial was vulnerable but has been fixed (note: '4.8.0-58.63~16.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-kvm' package in xenial is not affected (note: '4.4.0-1004.9').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in xenial is not affected.
  • OR NOT While related to the CVE in some way, the 'linux-oem' package in xenial is not affected (note: '4.13.0-1008.9').
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1054.61').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1057.61').
  • BACK