[USN-3052-1] Linux kernel vulnerabilities
Severity
Medium
Affected Packages
9
CVEs
2
Several security issues were fixed in the kernel.
It was discovered that the keyring implementation in the Linux kernel did
not ensure a data structure was initialized before referencing it after an
error condition occurred. A local attacker could use this to cause a denial
of service (system crash). (CVE-2016-4470)
Kangjie Lu discovered an information leak in the netlink implementation of
the Linux kernel. A local attacker could use this to obtain sensitive
information from kernel memory. (CVE-2016-5243)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-93-generic?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc64-smp?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc64-emb?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-smp?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-e500mc?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-e500?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-lowlatency?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-generic?distro=trusty | < 3.13.0-93.140 |
pkg:deb/ubuntu/linux-image-3.13.0-93-generic-lpae?distro=trusty | < 3.13.0-93.140 |
- ID
- USN-3052-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3052-1
- Published
-
2016-08-10T10:01:05
(8 years ago) - Modified
-
2016-08-10T10:01:05
(8 years ago) - Other Advisories
-
- ALAS-2016-726
- DSA-3607-1
- ELSA-2016-1539
- ELSA-2016-2006
- ELSA-2016-3591
- ELSA-2016-3592
- ELSA-2016-3593
- FEDORA-2016-1c409313f4
- FEDORA-2016-3daf782dfa
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- FEDORA-2016-80edb9d511
- FEDORA-2016-e0f3fcd7df
- RHSA-2016:1539
- RHSA-2016:1541
- RHSA-2016:2006
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:1998-1
- SUSE-SU-2016:1999-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2001-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2003-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2011-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2018-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2525-1
- USN-3049-1
- USN-3050-1
- USN-3051-1
- USN-3053-1
- USN-3054-1
- USN-3055-1
- USN-3056-1
- USN-3057-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-93-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-93-generic | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-93-powerpc64-smp | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-93-powerpc64-emb | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-93-powerpc-smp | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-93-powerpc-e500mc | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-93-powerpc-e500 | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-93-lowlatency | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-generic?distro=trusty | ubuntu | linux-image-3.13.0-93-generic | < 3.13.0-93.140 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-93-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-93-generic-lpae | < 3.13.0-93.140 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |