Oval Definition:oval:com.ubuntu.trusty:def:20155706000
Revision Date:2015-08-31Version:1
Title:CVE-2015-5706 on Ubuntu 14.04 LTS (trusty) - medium.
Description:Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that leverage a duplicate cleanup operation. A double free flaw was discovered in the Linux kernel's path lookup. A local user could cause a denial of service (Oops).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2015-5706
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • The 'linux' package in trusty was vulnerable but has been fixed (note: '3.13.0-58.97').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: '4.4.0-1002.2').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR The 'linux-lts-utopic' package in trusty was vulnerable but has been fixed (note: '3.16.0-43.58~14.04.1').
  • OR The 'linux-lts-vivid' package in trusty was vulnerable but has been fixed (note: '3.19.0-22.22~14.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected (note: '4.2.0-18.22~14.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected (note: '4.4.0-13.29~14.04.1').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • BACK