[USN-2806-1] Linux kernel (Vivid HWE) vulnerability
Severity
High
Affected Packages
8
CVEs
1
The system could be made to crash under certain conditions.
Ben Serebrin discovered that the KVM hypervisor implementation in the Linux
kernel did not properly catch Alignment Check exceptions. An attacker in a
guest virtual machine could use this to cause a denial of service (system
crash) in the host OS.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.19.0-33-generic?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc64-smp?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc64-emb?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc-smp?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc-e500mc?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-lowlatency?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-generic?distro=trusty | < 3.19.0-33.38~14.04.1 |
pkg:deb/ubuntu/linux-image-3.19.0-33-generic-lpae?distro=trusty | < 3.19.0-33.38~14.04.1 |
- ID
- USN-2806-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-2806-1
- Published
-
2015-11-10T04:01:30
(8 years ago) - Modified
-
2015-11-10T04:01:30
(8 years ago) - Other Advisories
-
- DSA-3396-1
- DSA-3414-1
- DSA-3454-1
- ELSA-2015-2552
- ELSA-2015-2636
- ELSA-2015-3107
- ELSA-2016-3502
- ELSA-2016-3503
- FEDORA-2015-115c302856
- FEDORA-2015-394835a3f6
- FEDORA-2015-668d213dc3
- FEDORA-2015-cd94ad8d7c
- FEDORA-2015-f150b2a8c8
- FEDORA-2015-f2c534bc12
- FREEBSD:2CABFBAB-8BFB-11E5-BD18-002590263BF5
- RHSA-2015:2552
- RHSA-2015:2636
- SUSE-SU-2015:2108-1
- SUSE-SU-2015:2194-1
- SUSE-SU-2015:2306-1
- SUSE-SU-2015:2324-1
- SUSE-SU-2015:2326-1
- SUSE-SU-2015:2328-1
- SUSE-SU-2015:2338-1
- SUSE-SU-2015:2339-1
- SUSE-SU-2015:2350-1
- SUSE-SU-2016:0354-1
- SUSE-SU-2016:2074-1
- USN-2800-1
- USN-2801-1
- USN-2802-1
- USN-2803-1
- USN-2804-1
- USN-2805-1
- USN-2807-1
- XSA-156
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.19.0-33-generic?distro=trusty | ubuntu | linux-image-extra-3.19.0-33-generic | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.19.0-33-powerpc64-smp | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.19.0-33-powerpc64-emb | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc-smp?distro=trusty | ubuntu | linux-image-3.19.0-33-powerpc-smp | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.19.0-33-powerpc-e500mc | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-lowlatency?distro=trusty | ubuntu | linux-image-3.19.0-33-lowlatency | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-generic?distro=trusty | ubuntu | linux-image-3.19.0-33-generic | < 3.19.0-33.38~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.19.0-33-generic-lpae?distro=trusty | ubuntu | linux-image-3.19.0-33-generic-lpae | < 3.19.0-33.38~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |