USN-3127-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-3127-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-3127-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3127-1
Related
  • CVE-2014-9904
  • CVE-2015-3288
  • CVE-2016-3961
  • CVE-2016-7042
Published
2016-11-11T06:50:52.510246Z
Modified
2016-11-11T06:50:52.510246Z
Summary
linux vulnerabilities
Details

It was discovered that the compression handling code in the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel did not properly check for an integer overflow. A local attacker could use this to cause a denial of service (system crash). (CVE-2014-9904)

Kirill A. Shutemov discovered that memory manager in the Linux kernel did not properly handle anonymous pages. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2015-3288)

Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress hugetlbfs support in X86 paravirtualized guests. An attacker in the guest OS could cause a denial of service (guest system crash). (CVE-2016-3961)

Ondrej Kozina discovered that the keyring interface in the Linux kernel contained a buffer overflow when displaying timeout events via the /proc/keys interface. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-7042)

References

Affected packages

Ubuntu:14.04:LTS / linux

Package

Name
linux

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.13.0-101.148

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "linux-image-extra-3.13.0-101-generic": "3.13.0-101.148",
            "linux-image-3.13.0-101-powerpc64-smp": "3.13.0-101.148",
            "linux-image-3.13.0-101-powerpc64-emb": "3.13.0-101.148",
            "linux-image-3.13.0-101-powerpc-e500": "3.13.0-101.148",
            "linux-image-3.13.0-101-powerpc-smp": "3.13.0-101.148",
            "linux-image-3.13.0-101-powerpc-e500mc": "3.13.0-101.148",
            "linux-image-3.13.0-101-generic-lpae": "3.13.0-101.148",
            "linux-image-3.13.0-101-generic": "3.13.0-101.148",
            "linux-image-3.13.0-101-lowlatency": "3.13.0-101.148"
        }
    ]
}