CVE-2017-0605
Publication date 12 May 2017
Last updated 24 July 2024
Ubuntu priority
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
From the Ubuntu Security Team
It was discovered that a buffer overflow existed in the trace subsystem in the Linux kernel. A privileged local attacker could use this to execute arbitrary code.
Notes
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
References
Related Ubuntu Security Notices (USN)
- USN-3314-1
- Linux kernel vulnerabilities
- 7 June 2017
- USN-3313-2
- Linux kernel (HWE) vulnerability
- 7 June 2017
- USN-3343-1
- Linux kernel vulnerabilities
- 29 June 2017
- USN-3312-2
- Linux kernel (Xenial HWE) vulnerabilities
- 7 June 2017
- USN-3312-1
- Linux kernel vulnerabilities
- 7 June 2017
- USN-3343-2
- Linux kernel (Trusty HWE) vulnerabilities
- 29 June 2017
- USN-3313-1
- Linux kernel vulnerability
- 6 June 2017