[USN-2635-1] Linux kernel (Utopic HWE) vulnerabilities
Severity
Medium
Affected Packages
8
CVEs
2
Several security issues were fixed in the kernel.
Xiong Zhou discovered a bug in the way the EXT4 filesystem handles
fallocate zero range functionality when the page size is greater than the
block size. A local attacker could exploit this flaw to cause a denial of
service (system crash). (CVE-2015-0275)
Wen Xu discovered a use-after-free flaw in the Linux kernel's ipv4 ping
support. A local user could exploit this flaw to cause a denial of service
(system crash) or gain administrative privileges on the system.
(CVE-2015-3636)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.16.0-39-generic?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc64-smp?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc64-emb?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc-smp?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc-e500mc?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-lowlatency?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-generic?distro=trusty | < 3.16.0-39.53~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-39-generic-lpae?distro=trusty | < 3.16.0-39.53~14.04.1 |
- ID
- USN-2635-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2635-1
- Published
-
2015-06-10T21:49:33
(9 years ago) - Modified
-
2015-06-10T21:49:33
(9 years ago) - Other Advisories
-
- ALAS-2015-523
- DSA-3290-1
- ELSA-2015-1221
- ELSA-2015-1534
- ELSA-2015-1778
- ELSA-2015-3048
- ELSA-2015-3049
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-3011
- FEDORA-2015-3594
- FEDORA-2015-4059
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-7784
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2015:1221
- RHSA-2015:1534
- RHSA-2015:1565
- RHSA-2015:1778
- RHSA-2015:1788
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1071-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1224-1
- SUSE-SU-2015:1376-1
- SUSE-SU-2015:1478-1
- SUSE-SU-2015:1487-1
- SUSE-SU-2015:1488-1
- SUSE-SU-2015:1489-1
- SUSE-SU-2015:1491-1
- USN-2631-1
- USN-2632-1
- USN-2633-1
- USN-2634-1
- USN-2636-1
- USN-2637-1
- USN-2638-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.16.0-39-generic?distro=trusty | ubuntu | linux-image-extra-3.16.0-39-generic | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.16.0-39-powerpc64-smp | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.16.0-39-powerpc64-emb | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc-smp?distro=trusty | ubuntu | linux-image-3.16.0-39-powerpc-smp | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.16.0-39-powerpc-e500mc | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-lowlatency?distro=trusty | ubuntu | linux-image-3.16.0-39-lowlatency | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-generic?distro=trusty | ubuntu | linux-image-3.16.0-39-generic | < 3.16.0-39.53~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-39-generic-lpae?distro=trusty | ubuntu | linux-image-3.16.0-39-generic-lpae | < 3.16.0-39.53~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |