[USN-3145-1] Linux kernel vulnerabilities
Severity
Medium
Affected Packages
9
CVEs
2
Several security issues were fixed in the kernel.
Marco Grassi discovered that the driver for Areca RAID Controllers in the
Linux kernel did not properly validate control messages. A local attacker
could use this to cause a denial of service (system crash) or possibly gain
privileges. (CVE-2016-7425)
Daxing Guo discovered a stack-based buffer overflow in the Broadcom
IEEE802.11n FullMAC driver in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly gain
privileges. (CVE-2016-8658)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-103-generic?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc64-smp?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc64-emb?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-smp?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-e500mc?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-e500?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-lowlatency?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-generic?distro=trusty | < 3.13.0-103.150 |
pkg:deb/ubuntu/linux-image-3.13.0-103-generic-lpae?distro=trusty | < 3.13.0-103.150 |
- ID
- USN-3145-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3145-1
- Published
-
2016-11-30T19:28:58
(7 years ago) - Modified
-
2016-11-30T19:28:58
(7 years ago) - Other Advisories
-
- DSA-3696-1
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2017-3535
- FEDORA-2016-f3d1f79398
- SUSE-SU-2016:2912-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3304-1
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0471-1
- SUSE-SU-2017:0494-1
- USN-3144-1
- USN-3144-2
- USN-3145-2
- USN-3146-1
- USN-3146-2
- USN-3147-1
- USN-3161-3
- USN-3161-4
- USN-3162-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-103-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-103-generic | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-103-powerpc64-smp | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-103-powerpc64-emb | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-103-powerpc-smp | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-103-powerpc-e500mc | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-103-powerpc-e500 | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-103-lowlatency | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-generic?distro=trusty | ubuntu | linux-image-3.13.0-103-generic | < 3.13.0-103.150 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-103-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-103-generic-lpae | < 3.13.0-103.150 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |