It was discovered that a buffer overflow existed in the trace subsystem in
the Linux kernel. A privileged local attacker could use this to execute
arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.10 | noarch | linux-image-4.8.0-54-generic | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | block-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | crypto-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | fat-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | fb-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | firewire-core-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | floppy-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | fs-core-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | fs-secondary-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |
Ubuntu | 16.10 | noarch | input-modules-4.8.0-54-generic-di | < 4.8.0-54.57 | UNKNOWN |