First published: Tue Apr 25 2017(Updated: )
Alexander Popov discovered that a race condition existed in the Stream Control Transmission Protocol (SCTP) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp | <4.8.0.49.61 | 4.8.0.49.61 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.8.0.49.61 | 4.8.0.49.61 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-49-generic-lpae | <4.8.0-49.52 | 4.8.0-49.52 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-1035-raspi2 | <4.8.0-1035.38 | 4.8.0-1035.38 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-generic-lpae | <4.8.0.49.61 | 4.8.0.49.61 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-49-lowlatency | <4.8.0-49.52 | 4.8.0-49.52 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-49-powerpc-smp | <4.8.0-49.52 | 4.8.0-49.52 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-49-powerpc-e500mc | <4.8.0-49.52 | 4.8.0-49.52 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-generic | <4.8.0.49.61 | 4.8.0.49.61 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-4.8.0-49-generic | <4.8.0-49.52 | 4.8.0-49.52 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-lowlatency | <4.8.0.49.61 | 4.8.0.49.61 |
Ubuntu Ubuntu | =16.10 | |
All of | ||
ubuntu/linux-image-raspi2 | <4.8.0.1035.39 | 4.8.0.1035.39 |
Ubuntu Ubuntu | =16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3266-1.
This vulnerability can cause a denial of service (system crash).
Ubuntu 16.10 is affected by this vulnerability.
Yes, the remedy for this vulnerability is version 4.8.0.49.61 of the Linux kernel.
You can find more information about this vulnerability at the following references: [CVE-2017-5986](https://ubuntu.com/security/CVE-2017-5986), [USN-3264-1](https://ubuntu.com/security/notices/USN-3264-1), [USN-3264-2](https://ubuntu.com/security/notices/USN-3264-2).