Revision Date: | 2016-08-06 | Version: | 1 | Title: | CVE-2016-6187 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-6187
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-aws' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-flo' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-gke' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-goldfish' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-hwe' package in xenial is not affected (note: '4.8.0-36.36~16.04.1').
OR NOT While related to the CVE in some way, the 'linux-hwe-edge' package in xenial is not affected (note: '4.8.0-36.36~16.04.1').
OR NOT While related to the CVE in some way, the 'linux-mako' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-raspi2' package in xenial is not affected.
OR NOT While related to the CVE in some way, the 'linux-snapdragon' package in xenial is not affected.
|
|