[USN-2563-1] Linux kernel vulnerabilities
Several security issues were fixed in the kernel.
Sun Baoliang discovered a use after free flaw in the Linux kernel's SCTP
(Stream Control Transmission Protocol) subsystem during INIT collisions. A
remote attacker could exploit this flaw to cause a denial of service
(system crash) or potentially escalate their privileges on the system.
(CVE-2015-1421)
Marcelo Leitner discovered a flaw in the Linux kernel's routing of packets
to too many different dsts/too fast. A remote attacker on the same subnet can exploit this
flaw to cause a denial of service (system crash). (CVE-2015-1465)
An integer overflow was discovered in the stack randomization feature of
the Linux kernel on 64 bit platforms. A local attacker could exploit this
flaw to bypass the Address Space Layout Randomization (ASLR) protection
mechanism. (CVE-2015-1593)
An information leak was discovered in the Linux Kernel's handling of
userspace configuration of the link layer control (LLC). A local user could
exploit this flaw to read data from other sysctl settings. (CVE-2015-2041)
An information leak was discovered in how the Linux kernel handles setting
the Reliable Datagram Sockets (RDS) settings. A local user could exploit
this flaw to read data from other sysctl settings. (CVE-2015-2042)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-49-generic?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc64-smp?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc64-emb?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-smp?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-e500mc?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-e500?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-lowlatency?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-generic?distro=trusty | < 3.13.0-49.81 |
pkg:deb/ubuntu/linux-image-3.13.0-49-generic-lpae?distro=trusty | < 3.13.0-49.81 |
- ID
- USN-2563-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2563-1
- Published
-
2015-04-08T22:27:31
(9 years ago) - Modified
-
2015-04-08T22:27:31
(9 years ago) - Other Advisories
-
- ALAS-2015-491
- DSA-3170-1
- DSA-3237-1
- ELSA-2015-0726
- ELSA-2015-0864
- ELSA-2015-1137
- ELSA-2015-1221
- ELSA-2015-3019
- ELSA-2015-3020
- ELSA-2015-3021
- ELSA-2015-3045
- ELSA-2015-3046
- ELSA-2015-3047
- ELSA-2017-3597
- ELSA-2019-3517
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-1657
- FEDORA-2015-1672
- FEDORA-2015-3011
- FEDORA-2015-3594
- FEDORA-2015-4059
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2015:0726
- RHSA-2015:0727
- RHSA-2015:0864
- RHSA-2015:1137
- RHSA-2015:1139
- RHSA-2015:1221
- RHSA-2019:3517
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:0832-1
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1478-1
- SUSE-SU-2015:1488-1
- SUSE-SU-2015:1489-1
- USN-2541-1
- USN-2542-1
- USN-2545-1
- USN-2546-1
- USN-2560-1
- USN-2561-1
- USN-2562-1
- USN-2564-1
- USN-2565-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-49-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-49-generic | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-49-powerpc64-smp | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-49-powerpc64-emb | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-49-powerpc-smp | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-49-powerpc-e500mc | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-49-powerpc-e500 | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-49-lowlatency | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-generic?distro=trusty | ubuntu | linux-image-3.13.0-49-generic | < 3.13.0-49.81 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-49-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-49-generic-lpae | < 3.13.0-49.81 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |