First published: Tue Jun 06 2017(Updated: )
It was discovered that a buffer overflow existed in the trace subsystem in the Linux kernel. A privileged local attacker could use this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.8.0-54-generic | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-54-powerpc-smp | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-54-powerpc-e500mc | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-smp | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-54-lowlatency | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-54-generic-lpae | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-1038-raspi2 | <4.8.0-1038.41 | 4.8.0-1038.41 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-54-powerpc64-emb | <4.8.0-54.57 | 4.8.0-54.57 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.8.0.54.66 | 4.8.0.54.66 |
=16.10 | ||
All of | ||
ubuntu/linux-image-raspi2 | <4.8.0.1038.42 | 4.8.0.1038.42 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Linux kernel vulnerability is USN-3313-1.
The severity of USN-3313-1 is not specified in the provided information. Please refer to the provided references for more details.
A privileged local attacker can exploit USN-3313-1 by using a buffer overflow in the trace subsystem to execute arbitrary code.
Ubuntu 16.10 is affected by USN-3313-1.
To fix USN-3313-1, update the Linux kernel to version 4.8.0-54.57 or later. Refer to the provided references for more information.