[USN-2588-1] Linux kernel vulnerabilities
Severity
Medium
Affected Packages
9
CVEs
2
Several security issues were fixed in the kernel.
A stack overflow was discovered in the the microcode loader for the intel
x86 platform. A local attacker could exploit this flaw to cause a denial of
service (kernel crash) or to potentially execute code with kernel
privileges. (CVE-2015-2666)
It was discovered that the Linux kernel's IPv6 networking stack has a flaw
that allows using route advertisement (RA) messages to set the 'hop_limit'
to values that are too low. An unprivileged attacker on a local network
could exploit this flaw to cause a denial of service (IPv6 messages
dropped). (CVE-2015-2922)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-51-generic?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc64-smp?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc64-emb?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-smp?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-e500mc?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-e500?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-lowlatency?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-generic?distro=trusty | < 3.13.0-51.84 |
pkg:deb/ubuntu/linux-image-3.13.0-51-generic-lpae?distro=trusty | < 3.13.0-51.84 |
- ID
- USN-2588-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2588-1
- Published
-
2015-04-30T08:17:18
(9 years ago) - Modified
-
2015-04-30T08:17:18
(9 years ago) - Other Advisories
-
- DSA-3237-1
- ELSA-2015-1221
- ELSA-2015-1534
- ELSA-2015-3048
- ELSA-2015-3049
- ELSA-2015-3050
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6100
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2015:1221
- RHSA-2015:1534
- RHSA-2015:1565
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1478-1
- USN-2585-1
- USN-2586-1
- USN-2587-1
- USN-2589-1
- USN-2590-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-51-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-51-generic | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-51-powerpc64-smp | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-51-powerpc64-emb | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-51-powerpc-smp | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-51-powerpc-e500mc | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-51-powerpc-e500 | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-51-lowlatency | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-generic?distro=trusty | ubuntu | linux-image-3.13.0-51-generic | < 3.13.0-51.84 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-51-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-51-generic-lpae | < 3.13.0-51.84 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |