Ubuntu 15.10 : linux-raspi2 vulnerability (USN-3035-2)

Medium Nessus Plugin ID 92316


The remote Ubuntu host is missing a security-related patch.


Jan Stancek discovered that the Linux kernel's memory manager did not properly handle moving pages mapped by the asynchronous I/O (AIO) ring buffer to the other nodes. A local attacker could use this to cause a denial of service (system crash).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected linux-image-4.2-raspi2 package.

Plugin Details

Severity: Medium

ID: 92316

File Name: ubuntu_USN-3035-2.nasl

Version: $Revision: 2.6 $

Type: local

Agent: unix

Published: 2016/07/15

Modified: 2016/12/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.2-raspi2, cpe:/o:canonical:ubuntu_linux:15.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/07/14

Reference Information

CVE: CVE-2016-3070

OSVDB: 138215

USN: 3035-2