[USN-3151-1] Linux kernel vulnerability
Severity
High
Affected Packages
8
CVEs
1
The system could be made to crash or run programs as an administrator.
Philip Pettersson discovered a race condition in the af_packet
implementation in the Linux kernel. A local unprivileged attacker could use
this to cause a denial of service (system crash) or run arbitrary code with
administrative privileges.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-4.4.0-53-generic?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc64-smp?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc64-emb?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc-smp?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc-e500mc?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-lowlatency?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-generic?distro=xenial | < 4.4.0-53.74 |
pkg:deb/ubuntu/linux-image-4.4.0-53-generic-lpae?distro=xenial | < 4.4.0-53.74 |
- ID
- USN-3151-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-3151-1
- Published
-
2016-12-05T12:24:24
(7 years ago) - Modified
-
2016-12-05T12:24:24
(7 years ago) - Other Advisories
-
- ALAS-2016-772
- ASA-201612-6
- ASA-201612-7
- ASA-201612-8
- ELSA-2017-0386
- ELSA-2017-3508
- ELSA-2017-3509
- FEDORA-2016-107f03cc00
- FEDORA-2016-5aff4a6bbc
- FEDORA-2016-5cb5b4082d
- RHSA-2017:0386
- RHSA-2017:0387
- SSA:2016-347-01
- SUSE-SU-2016:3039-1
- SUSE-SU-2016:3049-1
- SUSE-SU-2016:3063-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3096-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3113-1
- SUSE-SU-2016:3116-1
- SUSE-SU-2016:3117-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3169-1
- SUSE-SU-2016:3183-1
- SUSE-SU-2016:3197-1
- SUSE-SU-2016:3205-1
- SUSE-SU-2016:3206-1
- SUSE-SU-2016:3247-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2017:0407-1
- USN-3149-1
- USN-3149-2
- USN-3150-1
- USN-3150-2
- USN-3151-2
- USN-3151-3
- USN-3151-4
- USN-3152-1
- USN-3152-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-53-generic?distro=xenial | ubuntu | linux-image-extra-4.4.0-53-generic | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-53-powerpc64-smp | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-53-powerpc64-emb | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-53-powerpc-smp | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-53-powerpc-e500mc | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-53-lowlatency | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-generic?distro=xenial | ubuntu | linux-image-4.4.0-53-generic | < 4.4.0-53.74 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-53-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-53-generic-lpae | < 4.4.0-53.74 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |