[USN-2890-3] Linux kernel (Raspberry Pi 2) vulnerabilities
Several security issues were fixed in the kernel.
It was discovered that a use-after-free vulnerability existed in the
AF_UNIX implementation in the Linux kernel. A local attacker could use
crafted epoll_ctl calls to cause a denial of service (system crash) or
expose sensitive information. (CVE-2013-7446)
It was discovered that the KVM implementation in the Linux kernel did not
properly restore the values of the Programmable Interrupt Timer (PIT). A
user-assisted attacker in a KVM guest could cause a denial of service in
the host (system crash). (CVE-2015-7513)
It was discovered that the Linux kernel keyring subsystem contained a race
between read and revoke operations. A local attacker could use this to
cause a denial of service (system crash). (CVE-2015-7550)
Sasha Levin discovered that the Reliable Datagram Sockets (RDS)
implementation in the Linux kernel had a race condition when checking
whether a socket was bound or not. A local attacker could use this to cause
a denial of service (system crash). (CVE-2015-7990)
It was discovered that the Btrfs implementation in the Linux kernel
incorrectly handled compressed inline extants on truncation. A local
attacker could use this to expose sensitive information. (CVE-2015-8374)
郭永刚 discovered that the Linux kernel networking implementation did
not validate protocol identifiers for certain protocol families, A local
attacker could use this to cause a denial of service (system crash) or
possibly gain administrative privileges. (CVE-2015-8543)
Dmitry Vyukov discovered that the pptp implementation in the Linux kernel
did not verify an address length when setting up a socket. A local attacker
could use this to craft an application that exposed sensitive information
from kernel memory. (CVE-2015-8569)
David Miller discovered that the Bluetooth implementation in the Linux
kernel did not properly validate the socket address length for Synchronous
Connection-Oriented (SCO) sockets. A local attacker could use this to
expose sensitive information. (CVE-2015-8575)
It was discovered that the netfilter Network Address Translation (NAT)
implementation did not ensure that data structures were initialized when
handling IPv4 addresses. An attacker could use this to cause a denial of
service (system crash). (CVE-2015-8787)
- ID
- USN-2890-3
- Severity
- critical
- Severity from
- CVE-2015-8787
- URL
- https://ubuntu.com/security/notices/USN-2890-3
- Published
-
2016-02-02T02:18:54
(8 years ago) - Modified
-
2016-02-02T02:18:54
(8 years ago) - Other Advisories
-
- ALAS-2015-603
- DSA-3396-1
- DSA-3426-1
- DSA-3434-1
- ELSA-2016-0855
- ELSA-2016-2574
- ELSA-2016-3565
- ELSA-2016-3566
- ELSA-2016-3567
- ELSA-2016-3596
- ELSA-2016-3617
- ELSA-2016-3618
- ELSA-2017-3515
- ELSA-2017-3516
- ELSA-2017-3534
- ELSA-2018-4164
- ELSA-2018-4172
- FEDORA-2015-115c302856
- FEDORA-2015-ac9a19888e
- FEDORA-2015-c1c2f5e168
- FEDORA-2015-c4ed00a68f
- FEDORA-2015-c59710b05d
- FEDORA-2015-cd94ad8d7c
- FEDORA-2015-f2c534bc12
- FEDORA-2016-26e19f042a
- FEDORA-2016-2f25d12c51
- FEDORA-2016-5d43766e33
- FEDORA-2016-6ce812a1e0
- FEDORA-2016-b59fd603be
- RHSA-2016:0855
- RHSA-2016:2574
- RHSA-2016:2584
- SUSE-SU-2015:2108-1
- SUSE-SU-2015:2194-1
- SUSE-SU-2015:2292-1
- SUSE-SU-2015:2339-1
- SUSE-SU-2015:2350-1
- SUSE-SU-2016:0168-1
- SUSE-SU-2016:0335-1
- SUSE-SU-2016:0337-1
- SUSE-SU-2016:0354-1
- SUSE-SU-2016:0380-1
- SUSE-SU-2016:0381-1
- SUSE-SU-2016:0383-1
- SUSE-SU-2016:0384-1
- SUSE-SU-2016:0386-1
- SUSE-SU-2016:0387-1
- SUSE-SU-2016:0434-1
- SUSE-SU-2016:0585-1
- SUSE-SU-2016:0745-1
- SUSE-SU-2016:0746-1
- SUSE-SU-2016:0747-1
- SUSE-SU-2016:0749-1
- SUSE-SU-2016:0750-1
- SUSE-SU-2016:0751-1
- SUSE-SU-2016:0752-1
- SUSE-SU-2016:0753-1
- SUSE-SU-2016:0754-1
- SUSE-SU-2016:0755-1
- SUSE-SU-2016:0756-1
- SUSE-SU-2016:0757-1
- SUSE-SU-2016:0785-1
- SUSE-SU-2016:0911-1
- SUSE-SU-2016:1102-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2001-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2003-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2011-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2017:0333-1
- USN-2886-1
- USN-2886-2
- USN-2887-1
- USN-2887-2
- USN-2888-1
- USN-2889-1
- USN-2889-2
- USN-2890-1
- USN-2890-2
- USN-2907-1
- USN-2907-2
- USN-2910-1
- USN-2911-1
- USN-2911-2
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |