Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related
Dmitry Vyukov discovered that the Linux kernel did not properly
initialize IPC object state in certain situations. A local attacker
could use this to escalate their privileges, expose confidential
information, or cause a denial of service (system crash).
It was discovered that the Linux kernel did not check if a new IPv6
MTU set by a user space application was valid. A remote attacker could
forge a route advertisement with an invalid MTU that a user space
daemon like NetworkManager would honor and apply to the kernel,
causing a denial of service. (CVE-2015-0272)
It was discovered that in certain situations, a directory could be
renamed outside of a bind mounted location. An attacker could use this
to escape bind mount containment and gain access to sensitive
Moein Ghasemzadeh discovered that the USB WhiteHEAT serial driver
contained hardcoded attributes about the USB devices. An attacker
could construct a fake WhiteHEAT USB device that, when inserted,
causes a denial of service (system crash). (CVE-2015-5257).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 5.1
Public Exploit Available : false