First published: Mon Apr 24 2017(Updated: )
USN-3264-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 LTS. Alexander Popov discovered that a race condition existed in the Stream Control Transmission Protocol (SCTP) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-117-generic | <3.13.0-117.164~precise1 | 3.13.0-117.164~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.13.0-117-generic-lpae | <3.13.0-117.164~precise1 | 3.13.0-117.164~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-lts-trusty | <3.13.0.117.108 | 3.13.0.117.108 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.117.108 | 3.13.0.117.108 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3264-2.
Please refer to the reference links provided for more information on the severity of USN-3264-2.
To fix USN-3264-2, update your Linux kernel to the recommended version mentioned in the reference links.
The affected software for USN-3264-2 is Ubuntu 12.04 LTS with specific Linux kernel versions.
You can find more information about USN-3264-2 in the reference links provided.