[USN-2718-1] Linux kernel (Vivid HWE) vulnerability
Severity
Medium
Affected Packages
8
CVEs
1
The system could be made to crash under certain conditions.
Marcelo Ricardo Leitner discovered a race condition in the Linux kernel's
SCTP address configuration lists when using Address Configuration Change
(ASCONF) options on a socket. An unprivileged local user could exploit this
flaw to cause a denial of service (system crash).
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.19.0-26-generic?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc64-smp?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc64-emb?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc-smp?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc-e500mc?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-lowlatency?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-generic?distro=trusty | < 3.19.0-26.28~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-26-generic-lpae?distro=trusty | < 3.19.0-26.28~14.04.1 |
- ID
- USN-2718-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-2718-1
- Published
-
2015-08-18T00:58:49
(9 years ago) - Modified
-
2015-08-18T00:58:49
(9 years ago) - Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.19.0-26-generic?distro=trusty | ubuntu | linux-image-extra-3.19.0-26-generic | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.19.0-26-powerpc64-smp | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.19.0-26-powerpc64-emb | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc-smp?distro=trusty | ubuntu | linux-image-3.19.0-26-powerpc-smp | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.19.0-26-powerpc-e500mc | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-lowlatency?distro=trusty | ubuntu | linux-image-3.19.0-26-lowlatency | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-generic?distro=trusty | ubuntu | linux-image-3.19.0-26-generic | < 3.19.0-26.28~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-26-generic-lpae?distro=trusty | ubuntu | linux-image-3.19.0-26-generic-lpae | < 3.19.0-26.28~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |