Revision Date: | 2017-02-06 | Version: | 1 | Title: | CVE-2016-10153 on Ubuntu 14.04 LTS (trusty) - low. | Description: | The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-10153
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
|
|