[USN-3002-1] Linux kernel (Wily HWE) vulnerabilities
Several security issues were fixed in the kernel.
Justin Yackoski discovered that the Atheros L2 Ethernet Driver in the Linux
kernel incorrectly enables scatter/gather I/O. A remote attacker could use
this to obtain potentially sensitive information from kernel memory.
(CVE-2016-2117)
Jann Horn discovered that eCryptfs improperly attempted to use the mmap()
handler of a lower filesystem that did not implement one, causing a
recursive page fault to occur. A local unprivileged attacker could use to
cause a denial of service (system crash) or possibly execute arbitrary code
with administrative privileges. (CVE-2016-1583)
Jason A. Donenfeld discovered multiple out-of-bounds reads in the OZMO USB
over wifi device drivers in the Linux kernel. A remote attacker could use
this to cause a denial of service (system crash) or obtain potentially
sensitive information from kernel memory. (CVE-2015-4004)
Ralf Spenneberg discovered that the Linux kernel's GTCO digitizer USB
device driver did not properly validate endpoint descriptors. An attacker
with physical access could use this to cause a denial of service (system
crash). (CVE-2016-2187)
Hector Marco and Ismael Ripoll discovered that the Linux kernel would
improperly disable Address Space Layout Randomization (ASLR) for x86
processes running in 32 bit mode if stack-consumption resource limits were
disabled. A local attacker could use this to make it easier to exploit an
existing vulnerability in a setuid/setgid program. (CVE-2016-3672)
Andrey Konovalov discovered that the CDC Network Control Model USB driver
in the Linux kernel did not cancel work events queued if a later error
occurred, resulting in a use-after-free. An attacker with physical access
could use this to cause a denial of service (system crash). (CVE-2016-3951)
It was discovered that an out-of-bounds write could occur when handling
incoming packets in the USB/IP implementation in the Linux kernel. A remote
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2016-3955)
Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress
hugetlbfs support in X86 paravirtualized guests. An attacker in the guest
OS could cause a denial of service (guest system crash). (CVE-2016-3961)
Kangjie Lu discovered an information leak in the ANSI/IEEE 802.2 LLC type 2
Support implementations in the Linux kernel. A local attacker could use
this to obtain potentially sensitive information from kernel memory.
(CVE-2016-4485)
Kangjie Lu discovered an information leak in the routing netlink socket
interface (rtnetlink) implementation in the Linux kernel. A local attacker
could use this to obtain potentially sensitive information from kernel
memory. (CVE-2016-4486)
Jann Horn discovered that the InfiniBand interfaces within the Linux kernel
could be coerced into overwriting kernel memory. A local unprivileged
attacker could use this to possibly gain administrative privileges on
systems where InifiniBand related kernel modules are loaded.
(CVE-2016-4565)
It was discovered that in some situations the Linux kernel did not handle
propagated mounts correctly. A local unprivileged attacker could use this
to cause a denial of service (system crash). (CVE-2016-4581)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-4.2.0-38-generic?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc64-smp?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc64-emb?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc-smp?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc-e500mc?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-lowlatency?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-generic?distro=trusty | < 4.2.0-38.45~14.04.1 |
pkg:deb/ubuntu/linux-image-4.2.0-38-generic-lpae?distro=trusty | < 4.2.0-38.45~14.04.1 |
- ID
- USN-3002-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-3002-1
- Published
-
2016-06-10T05:42:32
(8 years ago) - Modified
-
2016-06-10T05:42:32
(8 years ago) - Other Advisories
-
- ALAS-2016-694
- ALAS-2016-703
- DSA-3607-1
- ELSA-2016-1277
- ELSA-2016-1406
- ELSA-2016-2124
- ELSA-2016-2574
- ELSA-2016-2766
- ELSA-2016-3570
- ELSA-2016-3572
- ELSA-2016-3573
- ELSA-2016-3579
- ELSA-2016-3587
- ELSA-2016-3588
- ELSA-2016-3589
- ELSA-2016-3596
- ELSA-2016-3635
- ELSA-2016-3636
- ELSA-2016-3644
- ELSA-2016-3646
- ELSA-2017-3514
- ELSA-2017-3515
- ELSA-2017-3516
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2017-3535
- ELSA-2018-1062
- ELSA-2019-4644
- FEDORA-2016-06f1572324
- FEDORA-2016-1c409313f4
- FEDORA-2016-373c063e79
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- FEDORA-2016-76706f51a7
- FEDORA-2016-7e602c0e5e
- FEDORA-2016-7f37d42add
- FEDORA-2016-81fd1b03aa
- FEDORA-2016-8a1f49149e
- FEDORA-2016-8e858f96b8
- FEDORA-2016-a159c484e4
- FEDORA-2016-ed5110c4bb
- FEDORA-2016-ef973efab7
- RHSA-2016:1277
- RHSA-2016:1301
- RHSA-2016:1406
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2766
- RHSA-2018:0676
- RHSA-2018:1062
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1596-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2001-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2003-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2011-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:1183-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- USN-2965-1
- USN-2965-2
- USN-2965-3
- USN-2965-4
- USN-2989-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-2999-1
- USN-3000-1
- USN-3001-1
- USN-3003-1
- USN-3004-1
- USN-3005-1
- USN-3006-1
- USN-3007-1
- USN-3008-1
- USN-3018-1
- USN-3018-2
- USN-3019-1
- USN-3021-1
- USN-3021-2
- USN-3049-1
- USN-3050-1
- USN-3127-1
- USN-3127-2
- XSA-174
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-4.2.0-38-generic?distro=trusty | ubuntu | linux-image-extra-4.2.0-38-generic | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc64-smp?distro=trusty | ubuntu | linux-image-4.2.0-38-powerpc64-smp | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc64-emb?distro=trusty | ubuntu | linux-image-4.2.0-38-powerpc64-emb | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc-smp?distro=trusty | ubuntu | linux-image-4.2.0-38-powerpc-smp | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-powerpc-e500mc?distro=trusty | ubuntu | linux-image-4.2.0-38-powerpc-e500mc | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-lowlatency?distro=trusty | ubuntu | linux-image-4.2.0-38-lowlatency | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-generic?distro=trusty | ubuntu | linux-image-4.2.0-38-generic | < 4.2.0-38.45~14.04.1 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-4.2.0-38-generic-lpae?distro=trusty | ubuntu | linux-image-4.2.0-38-generic-lpae | < 4.2.0-38.45~14.04.1 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |