[USN-3084-1] Linux kernel vulnerabilities
Several security issues were fixed in the kernel.
Pengfei Wang discovered a race condition in the audit subsystem in the
Linux kernel. A local attacker could use this to corrupt audit logs or
disrupt system-call auditing. (CVE-2016-6136)
It was discovered that the powerpc and powerpc64 hypervisor-mode KVM
implementation in the Linux kernel for did not properly maintain state
about transactional memory. An unprivileged attacker in a guest could cause
a denial of service (CPU lockup) in the host OS. (CVE-2016-5412)
Pengfei Wang discovered a race condition in the Chrome OS embedded
controller device driver in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2016-6156)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-extra-4.4.0-38-generic?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc64-smp?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc64-emb?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc-smp?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc-e500mc?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-lowlatency?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-generic?distro=xenial | < 4.4.0-38.57 |
pkg:deb/ubuntu/linux-image-4.4.0-38-generic-lpae?distro=xenial | < 4.4.0-38.57 |
- ID
- USN-3084-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-3084-1
- Published
-
2016-09-19T18:49:00
(8 years ago) - Modified
-
2016-09-19T18:49:00
(8 years ago) - Other Advisories
-
- DSA-3659-1
- ELSA-2016-2574
- ELSA-2016-3644
- ELSA-2016-3645
- ELSA-2016-3646
- ELSA-2017-0307
- FEDORA-2016-30e3636e79
- FEDORA-2016-4b67f775fe
- FEDORA-2016-754e4768d8
- FEDORA-2016-784d5526d8
- FEDORA-2016-90f142aa64
- FEDORA-2016-9a16b2e14e
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2017:0307
- USN-3084-2
- USN-3084-3
- USN-3084-4
- USN-3097-1
- USN-3097-2
- USN-3098-1
- USN-3098-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-extra-4.4.0-38-generic?distro=xenial | ubuntu | linux-image-extra-4.4.0-38-generic | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc64-smp?distro=xenial | ubuntu | linux-image-4.4.0-38-powerpc64-smp | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc64-emb?distro=xenial | ubuntu | linux-image-4.4.0-38-powerpc64-emb | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc-smp?distro=xenial | ubuntu | linux-image-4.4.0-38-powerpc-smp | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-powerpc-e500mc?distro=xenial | ubuntu | linux-image-4.4.0-38-powerpc-e500mc | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-lowlatency?distro=xenial | ubuntu | linux-image-4.4.0-38-lowlatency | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-generic?distro=xenial | ubuntu | linux-image-4.4.0-38-generic | < 4.4.0-38.57 | xenial | ||
Affected | pkg:deb/ubuntu/linux-image-4.4.0-38-generic-lpae?distro=xenial | ubuntu | linux-image-4.4.0-38-generic-lpae | < 4.4.0-38.57 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |