[USN-3290-1] Linux kernel vulnerability
Severity
Medium
Affected Packages
9
CVEs
1
The system could be made to crash under certain conditions.
Marco Grassi discovered that the TCP implementation in the Linux kernel
mishandles socket buffer (skb) truncation. A local attacker could use this
to cause a denial of service (system crash).
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.13.0-119-generic?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc64-smp?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc64-emb?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-smp?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-e500mc?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-e500?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-lowlatency?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-generic?distro=trusty | < 3.13.0-119.166 |
pkg:deb/ubuntu/linux-image-3.13.0-119-generic-lpae?distro=trusty | < 3.13.0-119.166 |
- ID
- USN-3290-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3290-1
- Published
-
2017-05-17T00:07:46
(7 years ago) - Modified
-
2017-05-17T00:07:46
(7 years ago) - Other Advisories
-
- ALAS-2016-772
- ELSA-2017-1842
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2017-3535
- FEDORA-2016-29cde72f15
- FEDORA-2016-3548475bca
- FEDORA-2016-ee3a114958
- RHSA-2017:1842
- RHSA-2017:2077
- SUSE-SU-2017:0181-1
- SUSE-SU-2017:0407-1
- SUSE-SU-2017:0464-1
- SUSE-SU-2017:0471-1
- USN-3161-1
- USN-3161-2
- USN-3161-3
- USN-3161-4
- USN-3162-1
- USN-3162-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.13.0-119-generic?distro=trusty | ubuntu | linux-image-extra-3.13.0-119-generic | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-119-powerpc64-smp | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-119-powerpc64-emb | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-119-powerpc-smp | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-119-powerpc-e500mc | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-119-powerpc-e500 | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-119-lowlatency | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-generic?distro=trusty | ubuntu | linux-image-3.13.0-119-generic | < 3.13.0-119.166 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-119-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-119-generic-lpae | < 3.13.0-119.166 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |