First published: Thu Feb 09 2017(Updated: )
Andrey Konovalov discovered that the SCTP implementation in the Linux kernel improperly handled validation of incoming data. A remote attacker could use this to cause a denial of service (system crash). (CVE-2016-9555) It was discovered that multiple memory leaks existed in the XFS implementation in the Linux kernel. A local attacker could use this to cause a denial of service (memory consumption). (CVE-2016-9685)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-omap4 | <3.2.0.1499.94 | 3.2.0.1499.94 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-1499-omap4 | <3.2.0-1499.126 | 3.2.0-1499.126 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3187-2 is moderate.
A remote attacker can exploit CVE-2016-9555 by sending specially crafted data to the SCTP implementation in the Linux kernel, causing a system crash.
Ubuntu 12.04 is affected by USN-3187-2.
To fix the vulnerability, update to Linux kernel version 3.2.0-1499-omap4 (for Ubuntu 12.04) or version 3.2.0.1499.94 (for Ubuntu 12.04).
You can find more information about USN-3187-2 on Ubuntu's security website.