[USN-2764-1] Linux kernel (Utopic HWE) vulnerability
Severity
High
Affected Packages
8
CVEs
1
The system could be made to crash or run programs as an administrator.
Dmitry Vyukov discovered that the Linux kernel did not properly initialize
IPC object state in certain situations. A local attacker could use this to
escalate their privileges, expose confidential information, or cause a
denial of service (system crash).
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.16.0-50-generic?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc64-smp?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc64-emb?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc-smp?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc-e500mc?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-lowlatency?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-generic?distro=trusty | < 3.16.0-50.67~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-50-generic-lpae?distro=trusty | < 3.16.0-50.67~14.04.1 |
- ID
- USN-2764-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-2764-1
- Published
-
2015-10-05T20:01:36
(9 years ago) - Modified
-
2015-10-05T20:01:36
(9 years ago) - Other Advisories
-
- ALAS-2015-603
- DSA-3372-1
- ELSA-2015-2152
- ELSA-2015-2636
- ELSA-2015-3101
- ELSA-2016-3502
- ELSA-2016-3503
- FEDORA-2015-43145298f4
- FEDORA-2015-d7e074ba30
- FEDORA-2015-dcc260f2f2
- RHSA-2015:2152
- RHSA-2015:2411
- RHSA-2015:2636
- SUSE-SU-2015:1727-1
- SUSE-SU-2015:2084-1
- SUSE-SU-2015:2085-1
- SUSE-SU-2015:2086-1
- SUSE-SU-2015:2087-1
- SUSE-SU-2015:2089-1
- SUSE-SU-2015:2090-1
- SUSE-SU-2015:2091-1
- USN-2761-1
- USN-2762-1
- USN-2763-1
- USN-2765-1
- USN-2792-1
- USN-2796-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.16.0-50-generic?distro=trusty | ubuntu | linux-image-extra-3.16.0-50-generic | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.16.0-50-powerpc64-smp | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.16.0-50-powerpc64-emb | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc-smp?distro=trusty | ubuntu | linux-image-3.16.0-50-powerpc-smp | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.16.0-50-powerpc-e500mc | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-lowlatency?distro=trusty | ubuntu | linux-image-3.16.0-50-lowlatency | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-generic?distro=trusty | ubuntu | linux-image-3.16.0-50-generic | < 3.16.0-50.67~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-50-generic-lpae?distro=trusty | ubuntu | linux-image-3.16.0-50-generic-lpae | < 3.16.0-50.67~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |