[USN-3256-1] Linux kernel vulnerability
Severity
High
Affected Packages
22
CVEs
1
The system could be made to crash under certain conditions.
Andrey Konovalov discovered that the AF_PACKET implementation in the Linux
kernel did not properly validate certain block-size data. A local attacker
could use this to cause a denial of service (system crash).
- ID
- USN-3256-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-3256-1
- Published
-
2017-04-05T03:38:55
(7 years ago) - Modified
-
2017-04-05T03:38:55
(7 years ago) - Other Advisories
-
- ALAS-2017-828
- ELSA-2017-1308
- ELSA-2017-3579
- ELSA-2017-3580
- ELSA-2017-3637
- ELSA-2018-1854
- FEDORA-2017-26c9ecd7a4
- FEDORA-2017-8e7549fb91
- RHSA-2017:1298
- RHSA-2017:1308
- RHSA-2018:1854
- SUSE-SU-2017:1059-1
- SUSE-SU-2017:1060-1
- SUSE-SU-2017:1064-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1277-1
- SUSE-SU-2017:1278-1
- SUSE-SU-2017:1279-1
- SUSE-SU-2017:1280-1
- SUSE-SU-2017:1281-1
- SUSE-SU-2017:1283-1
- SUSE-SU-2017:1284-1
- SUSE-SU-2017:1285-1
- SUSE-SU-2017:1287-1
- SUSE-SU-2017:1288-1
- SUSE-SU-2017:1289-1
- SUSE-SU-2017:1290-1
- SUSE-SU-2017:1291-1
- SUSE-SU-2017:1293-1
- SUSE-SU-2017:1294-1
- SUSE-SU-2017:1295-1
- SUSE-SU-2017:1297-1
- SUSE-SU-2017:1299-1
- SUSE-SU-2017:1300-1
- SUSE-SU-2017:1301-1
- SUSE-SU-2017:1302-1
- SUSE-SU-2017:1303-1
- SUSE-SU-2017:1308-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2342-1
- SUSE-SU-2017:2525-1
- USN-3256-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-72-generic?distro=xenial | ubuntu | linux-image-extra-4.4.0-72-generic | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-1010-gke?distro=xenial | ubuntu | linux-image-extra-4.4.0-1010-gke | < 4.4.0-1010.10 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-116-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-116-generic | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-72-powerpc64-smp | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-72-powerpc64-emb | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-72-powerpc-smp | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-72-powerpc-e500mc | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-72-lowlatency | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-generic?distro=xenial | ubuntu | linux-image-4.4.0-72-generic | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-72-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-72-generic-lpae | < 4.4.0-72.93 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1055-snapdragon?distro=xenial | ubuntu | linux-image-4.4.0-1055-snapdragon | < 4.4.0-1055.59 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1052-raspi2?distro=xenial | ubuntu | linux-image-4.4.0-1052-raspi2 | < 4.4.0-1052.59 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1013-aws?distro=xenial | ubuntu | linux-image-4.4.0-1013-aws | < 4.4.0-1013.22 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-1010-gke?distro=xenial | ubuntu | linux-image-4.4.0-1010-gke | < 4.4.0-1010.10 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-116-powerpc64-smp | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-116-powerpc64-emb | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-116-powerpc-smp | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-116-powerpc-e500mc | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-116-powerpc-e500 | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-116-lowlatency | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-generic?distro=trusty | ubuntu | linux-image-3.13.0-116-generic | < 3.13.0-116.163 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-116-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-116-generic-lpae | < 3.13.0-116.163 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |