Ubuntu 14.10 : linux vulnerabilities (USN-2590-1)

Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related

Description :

Jan Beulich discovered the Xen virtual machine subsystem of the Linux
kernel did not properly restrict access to PCI command registers. A
local guest user could exploit this flaw to cause a denial of service
(host crash). (CVE-2015-2150)

A stack overflow was discovered in the the microcode loader for the
intel x86 platform. A local attacker could exploit this flaw to cause
a denial of service (kernel crash) or to potentially execute code with
kernel privileges. (CVE-2015-2666)

A privilege escalation was discovered in the fork syscal vi the int80
entry on 64 bit kernels with 32 bit emulation support. An unprivileged
local attacker could exploit this flaw to increase their privileges on
the system. (CVE-2015-2830)

It was discovered that the Linux kernel's IPv6 networking stack has a
flaw that allows using route advertisement (RA) messages to set the
'hop_limit' to values that are too low. An unprivileged attacker on a
local network could exploit this flaw to cause a denial of service
(IPv6 messages dropped). (CVE-2015-2922).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected linux-image-3.16-generic,
linux-image-3.16-generic-lpae and / or linux-image-3.16-lowlatency

Risk factor :

Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 6.0
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 83181 ()

Bugtraq ID: 73014

CVE ID: CVE-2015-2150

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now