First published: Tue Feb 20 2024(Updated: )
It was discovered that the netfilter connection tracker for netlink in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.13.0-196-generic | <3.13.0-196.247 | 3.13.0-196.247 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-3.13.0-196-lowlatency | <3.13.0-196.247 | 3.13.0-196.247 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-generic | <3.13.0.196.206 | 3.13.0.196.206 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-generic-lts-trusty | <3.13.0.196.206 | 3.13.0.196.206 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-lowlatency | <3.13.0.196.206 | 3.13.0.196.206 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-server | <3.13.0.196.206 | 3.13.0.196.206 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/linux-image-virtual | <3.13.0.196.206 | 3.13.0.196.206 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.