CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
82.9%
Mikulas Patocka discovered that the asynchronous multibuffer cryptographic
daemon (mcryptd) in the Linux kernel did not properly handle being invoked
with incompatible algorithms. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-10147)
It was discovered that a use-after-free existed in the KVM susbsystem of
the Linux kernel when creating devices. A local attacker could use this to
cause a denial of service (system crash). (CVE-2016-10150)
Qidan He discovered that the ICMP implementation in the Linux kernel did
not properly check the size of an ICMP header. A local attacker with
CAP_NET_ADMIN could use this to expose sensitive information.
(CVE-2016-8399)
Qian Zhang discovered a heap-based buffer overflow in the tipc_msg_build()
function in the Linux kernel. A local attacker could use to cause a denial
of service (system crash) or possibly execute arbitrary code with
administrative privileges. (CVE-2016-8632)
Dmitry Vyukov discovered that the KVM implementation in the Linux kernel
did not properly restrict the VCPU index when I/O APIC is enabled, An
attacker in a guest VM could use this to cause a denial of service (system
crash) or possibly gain privileges in the host OS. (CVE-2016-9777)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.10 | noarch | linux-image-4.8.0-37-powerpc64-emb | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | block-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | crypto-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | fat-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | fb-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | firewire-core-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | floppy-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | fs-core-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | fs-secondary-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
Ubuntu | 16.10 | noarch | input-modules-4.8.0-37-generic-di | < 4.8.0-37.39 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
82.9%