Revision Date: | 2016-08-06 | Version: | 1 | Title: | CVE-2016-6187 on Ubuntu 14.04 LTS (trusty) - medium. | Description: | The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-6187
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR NOT While related to the CVE in some way, the 'linux-lts-utopic' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected.
OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
OR While related to the CVE in some way, a decision has been made to ignore it.
|
|