Revision Date: | 2015-10-19 | Version: | 1 | Title: | CVE-2015-5283 on Ubuntu 14.04 LTS (trusty) - medium. | Description: | The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished. It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash).
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2015-5283
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-70.113').
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR The 'linux-lts-utopic' package in trusty was vulnerable but has been fixed (note: '3.16.0-52.71~14.04.1').
OR The 'linux-lts-vivid' package in trusty was vulnerable but has been fixed (note: '3.19.0-37.42~14.04.1').
OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected (note: '4.2.0-18.22~14.04.1').
OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected (note: '4.4.0-13.29~14.04.1').
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
|
|