Ubuntu 14.04 LTS : linux vulnerabilities (USN-2588-1)

Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

A stack overflow was discovered in the the microcode loader for the
intel x86 platform. A local attacker could exploit this flaw to cause
a denial of service (kernel crash) or to potentially execute code with
kernel privileges. (CVE-2015-2666)

It was discovered that the Linux kernel's IPv6 networking stack has a
flaw that allows using route advertisement (RA) messages to set the
'hop_limit' to values that are too low. An unprivileged attacker on a
local network could exploit this flaw to cause a denial of service
(IPv6 messages dropped). (CVE-2015-2922).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected linux-image-3.13-generic,
linux-image-3.13-generic-lpae and / or linux-image-3.13-lowlatency
packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 83179 ()

Bugtraq ID: 73183
74315

CVE ID: CVE-2015-2666
CVE-2015-2922

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now