First published: Fri Dec 04 2015(Updated: )
It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash). (CVE-2015-5283) Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash). (CVE-2015-7872)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.19.0-39-powerpc64-emb | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-powerpc64-smp | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-generic | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-powerpc-smp | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-generic-lpae | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-powerpc-e500mc | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-39-lowlatency | <3.19.0-39.44 | 3.19.0-39.44 |
=15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-2829-1.
The severity of the CVE-2015-5283 vulnerability is not mentioned in the advisory.
A local attacker can exploit the CVE-2015-5283 vulnerability to cause a denial of service (system crash).
To fix the CVE-2015-5283 vulnerability, you need to update the affected Linux kernel packages to version 3.19.0-39.44 or higher.
You can find more information about the USN-2829-1 advisory on the Ubuntu website.