[USN-2931-1] Linux kernel (Utopic HWE) vulnerabilities
Several security issues were fixed in the kernel.
Ben Hawkes discovered that the Linux netfilter implementation did not
correctly perform validation when handling IPT_SO_SET_REPLACE events. A
local unprivileged attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code with administrative
privileges. (CVE-2016-3134)
It was discovered that the Linux kernel did not properly enforce rlimits
for file descriptors sent over UNIX domain sockets. A local attacker could
use this to cause a denial of service. (CVE-2013-4312)
It was discovered that a race condition existed when handling heartbeat-
timeout events in the SCTP implementation of the Linux kernel. A remote
attacker could use this to cause a denial of service. (CVE-2015-8767)
Andy Lutomirski discovered a race condition in the Linux kernel's
translation lookaside buffer (TLB) handling of flush events. A local
attacker could use this to cause a denial of service or possibly leak
sensitive information. (CVE-2016-2069)
Andrey Konovalov discovered that the ALSA USB MIDI driver incorrectly
performed a double-free. A local attacker with physical access could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code with administrative privileges. (CVE-2016-2384)
Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)
framework did not verify that a FIFO was attached to a client before
attempting to clear it. A local attacker could use this to cause a denial
of service (system crash). (CVE-2016-2543)
Dmitry Vyukov discovered that a race condition existed in the Advanced
Linux Sound Architecture (ALSA) framework between timer setup and closing
of the client, resulting in a use-after-free. A local attacker could use
this to cause a denial of service. (CVE-2016-2544)
Dmitry Vyukov discovered a race condition in the timer handling
implementation of the Advanced Linux Sound Architecture (ALSA) framework,
resulting in a use-after-free. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-2545)
Dmitry Vyukov discovered race conditions in the Advanced Linux Sound
Architecture (ALSA) framework's timer ioctls leading to a use-after-free. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2016-2546)
Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)
framework's handling of high resolution timers did not properly manage its
data structures. A local attacker could use this to cause a denial of
service (system hang or crash) or possibly execute arbitrary code.
(CVE-2016-2547, CVE-2016-2548)
Dmitry Vyukov discovered that the Advanced Linux Sound Architecture (ALSA)
framework's handling of high resolution timers could lead to a deadlock
condition. A local attacker could use this to cause a denial of service
(system hang). (CVE-2016-2549)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-3.16.0-67-generic?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc64-smp?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc64-emb?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc-smp?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc-e500mc?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-lowlatency?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-generic?distro=trusty | < 3.16.0-67.87~14.04.1 |
pkg:deb/ubuntu/linux-image-3.16.0-67-generic-lpae?distro=trusty | < 3.16.0-67.87~14.04.1 |
- ID
- USN-2931-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-2931-1
- Published
-
2016-03-14T16:47:32
(8 years ago) - Modified
-
2016-03-14T16:47:32
(8 years ago) - Other Advisories
-
- ALAS-2016-648
- ALAS-2016-694
- DSA-3448-1
- DSA-3503-1
- DSA-3607-1
- ELSA-2016-0715
- ELSA-2016-0855
- ELSA-2016-1277
- ELSA-2016-1847
- ELSA-2016-2574
- ELSA-2016-3551
- ELSA-2016-3552
- ELSA-2016-3553
- ELSA-2016-3554
- ELSA-2016-3559
- ELSA-2016-3565
- ELSA-2016-3566
- ELSA-2016-3567
- ELSA-2016-3596
- ELSA-2016-3623
- ELSA-2016-3624
- ELSA-2016-3625
- ELSA-2017-0817
- ELSA-2018-4134
- ELSA-2018-4145
- FEDORA-2016-02ed08bf15
- FEDORA-2016-2f25d12c51
- FEDORA-2016-3a57b19360
- FEDORA-2016-5d43766e33
- FEDORA-2016-7e12ae5359
- FEDORA-2016-81fd1b03aa
- FEDORA-2016-9fbe2c258b
- FEDORA-2016-e7162262b0
- RHSA-2016:0715
- RHSA-2016:0855
- RHSA-2016:1277
- RHSA-2016:1301
- RHSA-2016:1847
- RHSA-2016:1875
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2017:0817
- SUSE-SU-2016:0585-1
- SUSE-SU-2016:0785-1
- SUSE-SU-2016:0911-1
- SUSE-SU-2016:1019-1
- SUSE-SU-2016:1031-1
- SUSE-SU-2016:1032-1
- SUSE-SU-2016:1033-1
- SUSE-SU-2016:1034-1
- SUSE-SU-2016:1035-1
- SUSE-SU-2016:1037-1
- SUSE-SU-2016:1038-1
- SUSE-SU-2016:1039-1
- SUSE-SU-2016:1040-1
- SUSE-SU-2016:1041-1
- SUSE-SU-2016:1045-1
- SUSE-SU-2016:1046-1
- SUSE-SU-2016:1102-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2001-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3069-1
- SUSE-SU-2016:3304-1
- SUSE-SU-2017:0333-1
- USN-2908-1
- USN-2908-2
- USN-2908-3
- USN-2928-1
- USN-2928-2
- USN-2929-1
- USN-2929-2
- USN-2930-1
- USN-2930-2
- USN-2930-3
- USN-2932-1
- USN-2967-1
- USN-2967-2
- USN-2989-1
- USN-2998-1
- USN-3049-1
- USN-3050-1
- USN-3083-1
- USN-3083-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-3.16.0-67-generic?distro=trusty | ubuntu | linux-image-extra-3.16.0-67-generic | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.16.0-67-powerpc64-smp | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.16.0-67-powerpc64-emb | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc-smp?distro=trusty | ubuntu | linux-image-3.16.0-67-powerpc-smp | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.16.0-67-powerpc-e500mc | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-lowlatency?distro=trusty | ubuntu | linux-image-3.16.0-67-lowlatency | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-generic?distro=trusty | ubuntu | linux-image-3.16.0-67-generic | < 3.16.0-67.87~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.16.0-67-generic-lpae?distro=trusty | ubuntu | linux-image-3.16.0-67-generic-lpae | < 3.16.0-67.87~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |