{"id":"USN-3485-3","summary":"linux-aws vulnerabilities","details":"It was discovered that a race condition existed in the ALSA subsystem of\nthe Linux kernel when creating and deleting a port via ioctl(). A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-15265)\n\nEric Biggers discovered that the key management subsystem in the Linux\nkernel did not properly restrict adding a key that already exists but is\nuninstantiated. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2017-15299)\n\nIt was discovered that a race condition existed in the packet fanout\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2017-15649)\n\nEric Biggers discovered a race condition in the key management subsystem of\nthe Linux kernel around keys in a negative state. A local attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-15951)\n\nAndrey Konovalov discovered a use-after-free vulnerability in the USB\nserial console driver in the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-16525)\n\nAndrey Konovalov discovered that the Ultra Wide Band driver in the Linux\nkernel did not properly check for an error condition. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2017-16526)\n\nAndrey Konovalov discovered that the ALSA subsystem in the Linux kernel\ncontained a use-after-free vulnerability. A local attacker could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2017-16527)\n\nAndrey Konovalov discovered that the ALSA subsystem in the Linux kernel did\nnot properly validate USB audio buffer descriptors. A physically proximate\nattacker could use this cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-16529)\n\nAndrey Konovalov discovered that the USB unattached storage driver in the\nLinux kernel contained out-of-bounds error when handling alternative\nsettings. A physically proximate attacker could use to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2017-16530)\n\nAndrey Konovalov discovered that the USB subsystem in the Linux kernel did\nnot properly validate USB interface association descriptors. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-16531)\n\nAndrey Konovalov discovered that the USB subsystem in the Linux kernel did\nnot properly validate USB HID descriptors. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2017-16533)\n\nAndrey Konovalov discovered that the USB subsystem in the Linux kernel did\nnot properly validate CDC metadata. A physically proximate attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-16534)\n\nAndrey Konovalov discovered that the USB subsystem in the Linux kernel did\nnot properly validate USB BOS metadata. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2017-16535)\n","modified":"2026-02-10T04:41:15Z","published":"2017-11-21T18:44:13Z","related":["UBUNTU-CVE-2017-15265","UBUNTU-CVE-2017-15299","UBUNTU-CVE-2017-15649","UBUNTU-CVE-2017-15951","UBUNTU-CVE-2017-16525","UBUNTU-CVE-2017-16526","UBUNTU-CVE-2017-16527","UBUNTU-CVE-2017-16529","UBUNTU-CVE-2017-16530","UBUNTU-CVE-2017-16531","UBUNTU-CVE-2017-16533","UBUNTU-CVE-2017-16534","UBUNTU-CVE-2017-16535"],"upstream":["CVE-2017-15265","CVE-2017-15299","CVE-2017-15649","CVE-2017-15951","CVE-2017-16525","CVE-2017-16526","CVE-2017-16527","CVE-2017-16529","CVE-2017-16530","CVE-2017-16531","CVE-2017-16533","CVE-2017-16534","CVE-2017-16535","UBUNTU-CVE-2017-15265","UBUNTU-CVE-2017-15299","UBUNTU-CVE-2017-15649","UBUNTU-CVE-2017-15951","UBUNTU-CVE-2017-16525","UBUNTU-CVE-2017-16526","UBUNTU-CVE-2017-16527","UBUNTU-CVE-2017-16529","UBUNTU-CVE-2017-16530","UBUNTU-CVE-2017-16531","UBUNTU-CVE-2017-16533","UBUNTU-CVE-2017-16534","UBUNTU-CVE-2017-16535"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3485-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15265"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15299"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15649"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15951"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16525"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16526"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16527"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16529"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16530"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16531"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16533"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16534"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16535"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1003.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1003.3"}]}],"versions":["4.4.0-1002.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.4.0-1003.3","binary_name":"linux-aws-cloud-tools-4.4.0-1003"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-aws-headers-4.4.0-1003"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-aws-tools-4.4.0-1003"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-cloud-tools-4.4.0-1003-aws"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-headers-4.4.0-1003-aws"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-image-4.4.0-1003-aws"},{"binary_version":"4.4.0-1003.3","binary_name":"linux-tools-4.4.0-1003-aws"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3485-3.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15265"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15299"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15649"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15951"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16525"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16526"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-16527"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16529"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16530"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16531"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16533"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16534"},{"severity":[{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16535"}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}