logo
DATABASE RESOURCES PRICING ABOUT US

Linux kernel vulnerabilities

Description

## Releases * Ubuntu 16.10 ## Packages * linux \- Linux kernel Dmitry Vyukov discovered that the KVM implementation in the Linux kernel did not properly initialize the Code Segment (CS) in certain error cases. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2016-9756) Andrey Konovalov discovered that signed integer overflows existed in the setsockopt() system call when handling the SO_SNDBUFFORCE and SO_RCVBUFFORCE options. A local attacker with the CAP_NET_ADMIN capability could use this to cause a denial of service (system crash or memory corruption). (CVE-2016-9793)


Affected Package


OS OS Version Package Name Package Version
Ubuntu 16.10 linux-image-powerpc-smp 4.8.0.34.43
Ubuntu 16.10 linux-image-powerpc-e500mc 4.8.0.34.43
Ubuntu 16.10 linux-image-4.8.0-34-lowlatency 4.8.0-34.36
Ubuntu 16.10 linux-image-generic-lpae 4.8.0.34.43
Ubuntu 16.10 linux-image-4.8.0-34-generic 4.8.0-34.36
Ubuntu 16.10 linux-image-4.8.0-34-generic-lpae 4.8.0-34.36
Ubuntu 16.10 linux-image-4.8.0-34-powerpc64-emb 4.8.0-34.36
Ubuntu 16.10 linux-image-generic 4.8.0.34.43
Ubuntu 16.10 linux-image-4.8.0-34-powerpc-e500mc 4.8.0-34.36
Ubuntu 16.10 linux-image-lowlatency 4.8.0.34.43
Ubuntu 16.10 linux-image-powerpc64-emb 4.8.0.34.43
Ubuntu 16.10 linux-image-4.8.0-34-powerpc-smp 4.8.0-34.36

Related