[USN-2564-1] Linux kernel (Utopic HWE) vulnerabilities
Several security issues were fixed in the kernel.
An integer overflow was discovered in the stack randomization feature of
the Linux kernel on 64 bit platforms. A local attacker could exploit this
flaw to bypass the Address Space Layout Randomization (ASLR) protection
mechanism. (CVE-2015-1593)
An information leak was discovered in the Linux Kernel's handling of
userspace configuration of the link layer control (LLC). A local user could
exploit this flaw to read data from other sysctl settings. (CVE-2015-2041)
An information leak was discovered in how the Linux kernel handles setting
the Reliable Datagram Sockets (RDS) settings. A local user could exploit
this flaw to read data from other sysctl settings. (CVE-2015-2042)
A memory corruption flaw was discovered in the Linux kernel's scsi
subsystem. A local attacker could potentially exploit this flaw to cause a
denial of service (system crash). (CVE-2015-4036)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.16.0-34-generic?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc64-smp?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc64-emb?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc-smp?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc-e500mc?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-lowlatency?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-generic?distro=trusty | < 3.16.0-34.45~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-34-generic-lpae?distro=trusty | < 3.16.0-34.45~14.04.1 |
- ID
- USN-2564-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2564-1
- Published
-
2015-04-09T10:32:39
(9 years ago) - Modified
-
2015-04-09T10:32:39
(9 years ago) - Other Advisories
-
- ALAS-2015-491
- DSA-3170-1
- DSA-3237-1
- ELSA-2015-1137
- ELSA-2015-1221
- ELSA-2015-3045
- ELSA-2015-3046
- ELSA-2015-3047
- ELSA-2019-3517
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-3011
- FEDORA-2015-3594
- FEDORA-2015-4059
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2015:1137
- RHSA-2015:1139
- RHSA-2015:1221
- RHSA-2019:3517
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1324-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1478-1
- USN-2560-1
- USN-2561-1
- USN-2562-1
- USN-2563-1
- USN-2565-1
- USN-2633-1
- USN-2634-1
- USN-2636-1
- USN-2638-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.16.0-34-generic?distro=trusty | ubuntu | linux-image-extra-3.16.0-34-generic | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.16.0-34-powerpc64-smp | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.16.0-34-powerpc64-emb | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc-smp?distro=trusty | ubuntu | linux-image-3.16.0-34-powerpc-smp | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.16.0-34-powerpc-e500mc | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-lowlatency?distro=trusty | ubuntu | linux-image-3.16.0-34-lowlatency | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-generic?distro=trusty | ubuntu | linux-image-3.16.0-34-generic | < 3.16.0-34.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-34-generic-lpae?distro=trusty | ubuntu | linux-image-3.16.0-34-generic-lpae | < 3.16.0-34.45~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |