[USN-3220-2] Linux kernel (Xenial HWE) vulnerability

Severity High
Affected Packages 8
CVEs 1

The system could be made to crash or run programs as an administrator.

USN-3220-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

Alexander Popov discovered that the N_HDLC line discipline implementation
in the Linux kernel contained a double-free vulnerability. A local attacker
could use this to cause a denial of service (system crash) or possibly gain
administrative privileges.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-extra-4.4.0-66-generic?distro=trusty ubuntu linux-image-extra-4.4.0-66-generic < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-powerpc64-smp?distro=trusty ubuntu linux-image-4.4.0-66-powerpc64-smp < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-powerpc64-emb?distro=trusty ubuntu linux-image-4.4.0-66-powerpc64-emb < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-powerpc-smp?distro=trusty ubuntu linux-image-4.4.0-66-powerpc-smp < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-powerpc-e500mc?distro=trusty ubuntu linux-image-4.4.0-66-powerpc-e500mc < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-lowlatency?distro=trusty ubuntu linux-image-4.4.0-66-lowlatency < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-generic?distro=trusty ubuntu linux-image-4.4.0-66-generic < 4.4.0-66.87~14.04.1 trusty
Affected pkg:deb/ubuntu/linux-image-4.4.0-66-generic-lpae?distro=trusty ubuntu linux-image-4.4.0-66-generic-lpae < 4.4.0-66.87~14.04.1 trusty
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...