[USN-2999-1] Linux kernel vulnerability
Severity
High
Affected Packages
9
CVEs
1
The system could be made to crash or run programs as an administrator.
Jann Horn discovered that eCryptfs improperly attempted to use the mmap()
handler of a lower filesystem that did not implement one, causing a
recursive page fault to occur. A local unprivileged attacker could use to
cause a denial of service (system crash) or possibly execute arbitrary code
with administrative privileges.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-88-generic?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc64-smp?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc64-emb?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-smp?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-e500mc?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-e500?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-lowlatency?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-generic?distro=trusty | < 3.13.0-88.135 |
pkg:deb/ubuntu/linux-image-3.13.0-88-generic-lpae?distro=trusty | < 3.13.0-88.135 |
- ID
- USN-2999-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-2999-1
- Published
-
2016-06-10T05:33:22
(8 years ago) - Modified
-
2016-06-10T05:33:22
(8 years ago) - Other Advisories
-
- DSA-3607-1
- ELSA-2016-2124
- ELSA-2016-2766
- ELSA-2016-3635
- ELSA-2016-3636
- ELSA-2016-3644
- ELSA-2016-3646
- ELSA-2019-4644
- FEDORA-2016-1c409313f4
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- RHSA-2016:2766
- SUSE-SU-2016:1596-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3005-1
- USN-3006-1
- USN-3007-1
- USN-3008-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-88-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-88-generic | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-88-powerpc64-smp | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-88-powerpc64-emb | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-88-powerpc-smp | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-88-powerpc-e500mc | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-88-powerpc-e500 | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-88-lowlatency | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-generic?distro=trusty | ubuntu | linux-image-3.13.0-88-generic | < 3.13.0-88.135 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-88-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-88-generic-lpae | < 3.13.0-88.135 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |