Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2689-1)

High Nessus Plugin ID 85077


The remote Ubuntu host is missing one or more security-related patches.


Andy Lutomirski discovered a flaw in the Linux kernel's handling of nested NMIs (non-maskable interrupts). An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or potentially escalate their privileges. (CVE-2015-3290)

Colin King discovered a flaw in the add_key function of the Linux kernel's keyring subsystem. A local user could exploit this flaw to cause a denial of service (memory exhaustion). (CVE-2015-1333)

Andy Lutomirski discovered a flaw that allows user to cause the Linux kernel to ignore some NMIs (non-maskable interrupts). A local unprivileged user could exploit this flaw to potentially cause the system to miss important NMIs resulting in unspecified effects.

Andy Lutomirski and Petr Matousek discovered that an NMI (non-maskable interrupt) that interrupts userspace and encounters an IRET fault is incorrectly handled by the Linux kernel. An unprivileged local user could exploit this flaw to cause a denial of service (kernel OOPs), corruption, or potentially escalate privileges on the system.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected linux-image-3.16-generic, linux-image-3.16-generic-lpae and / or linux-image-3.16-lowlatency packages.

Plugin Details

Severity: High

ID: 85077

File Name: ubuntu_USN-2689-1.nasl

Version: $Revision: 2.4 $

Type: local

Agent: unix

Published: 2015/07/29

Modified: 2016/10/26

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-lowlatency, cpe:/o:canonical:ubuntu_linux:14.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/07/28

Reference Information

CVE: CVE-2015-1333, CVE-2015-3290, CVE-2015-3291, CVE-2015-5157

OSVDB: 125207, 125208, 125209, 125430

USN: 2689-1