Revision Date: | 2016-07-10 | Version: | 1 | Title: | CVE-2015-8888 on Ubuntu 14.04 LTS (trusty) - medium. | Description: | Integer overflow in app/aboot/aboot.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices allows attackers to bypass intended access restrictions via a crafted block count and block size of a sparse header, aka Android internal bug 28822465 and Qualcomm internal bug CR813933.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2015-8888
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-flo' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-goldfish' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-grouper' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-utopic' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-maguro' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-mako' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-manta' package in trusty is not affected.
|
|