First published: Wed Oct 11 2017(Updated: )
USN-3445-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu 12.04 ESM. Eyal Itkin discovered that the IP over IEEE 1394 (FireWire) implementation in the Linux kernel contained a buffer overflow when handling fragmented packets. A remote attacker could use this to possibly execute arbitrary code with administrative privileges. (CVE-2016-8633) Andrey Konovalov discovered that a divide-by-zero error existed in the TCP stack implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-14106)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-133-generic-lpae | <3.13.0-133.182~precise1 | 3.13.0-133.182~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.13.0-133-generic | <3.13.0-133.182~precise1 | 3.13.0-133.182~precise1 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lpae-lts-trusty | <3.13.0.133.123 | 3.13.0.133.123 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.133.123 | 3.13.0.133.123 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-3445-2
The severity level of this vulnerability is not specified in the advisory.
This vulnerability affects Ubuntu 12.04 LTS through the Linux kernel versions listed in the advisory.
The recommended remedy for this vulnerability is to update to the specified version of the Linux kernel.
You can find more information about this vulnerability in the advisory linked in the description.