Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.843061
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3208-1)
Summary:The remote host is missing an update for the 'linux, linux-snapdragon' package(s) announced via the USN-3208-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-snapdragon' package(s) announced via the USN-3208-1 advisory.

Vulnerability Insight:
It was discovered that the generic SCSI block layer in the Linux kernel did
not properly restrict write operations in certain situations. A local
attacker could use this to cause a denial of service (system crash) or
possibly gain administrative privileges. (CVE-2016-10088)

CAI Qian discovered that the sysctl implementation in the Linux kernel did
not properly perform reference counting in some situations. An unprivileged
attacker could use this to cause a denial of service (system hang).
(CVE-2016-9191)

Jim Mattson discovered that the KVM implementation in the Linux kernel
mismanages the #BP and #OF exceptions. A local attacker in a guest virtual
machine could use this to cause a denial of service (guest OS crash).
(CVE-2016-9588)

Andy Lutomirski and Willy Tarreau discovered that the KVM implementation in
the Linux kernel did not properly emulate instructions on the SS segment
register. A local attacker in a guest virtual machine could use this to
cause a denial of service (guest OS crash) or possibly gain administrative
privileges in the guest OS. (CVE-2017-2583)

Dmitry Vyukov discovered that the KVM implementation in the Linux kernel
improperly emulated certain instructions. A local attacker could use this
to obtain sensitive information (kernel memory). (CVE-2017-2584)

It was discovered that the KLSI KL5KUSB105 serial-to-USB device driver in
the Linux kernel did not properly initialize memory related to logging. A
local attacker could use this to expose sensitive information (kernel
memory). (CVE-2017-5549)

Andrey Konovalov discovered a use-after-free vulnerability in the DCCP
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash) or possibly gain administrative
privileges. (CVE-2017-6074)

Affected Software/OS:
'linux, linux-snapdragon' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10088
BugTraq ID: 95169
http://www.securityfocus.com/bid/95169
http://www.openwall.com/lists/oss-security/2016/12/30/1
RedHat Security Advisories: RHSA-2017:0817
http://rhn.redhat.com/errata/RHSA-2017-0817.html
RedHat Security Advisories: RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:1842
RedHat Security Advisories: RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2077
RedHat Security Advisories: RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2669
http://www.securitytracker.com/id/1037538
Common Vulnerability Exposure (CVE) ID: CVE-2016-9191
BugTraq ID: 94129
http://www.securityfocus.com/bid/94129
Debian Security Information: DSA-3791 (Google Search)
http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2016/11/05/4
Common Vulnerability Exposure (CVE) ID: CVE-2016-9588
94933
http://www.securityfocus.com/bid/94933
DSA-3804
http://www.debian.org/security/2017/dsa-3804
RHSA-2017:1842
RHSA-2017:2077
USN-3822-1
https://usn.ubuntu.com/3822-1/
USN-3822-2
https://usn.ubuntu.com/3822-2/
[oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
http://www.openwall.com/lists/oss-security/2016/12/15/3
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef85b67385436ddc1998f45f1d6a210f935b3388
https://bugzilla.redhat.com/show_bug.cgi?id=1404924
https://github.com/torvalds/linux/commit/ef85b67385436ddc1998f45f1d6a210f935b3388
Common Vulnerability Exposure (CVE) ID: CVE-2017-2583
95673
http://www.securityfocus.com/bid/95673
DSA-3791
RHSA-2017:1615
https://access.redhat.com/errata/RHSA-2017:1615
RHSA-2017:1616
https://access.redhat.com/errata/RHSA-2017:1616
USN-3754-1
https://usn.ubuntu.com/3754-1/
[oss-security] 20170119 CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
http://www.openwall.com/lists/oss-security/2017/01/19/2
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=33ab91103b3415e12457e3104f0e4517ce12d0f3
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
https://bugzilla.redhat.com/show_bug.cgi?id=1414735
https://github.com/torvalds/linux/commit/33ab91103b3415e12457e3104f0e4517ce12d0f3
Common Vulnerability Exposure (CVE) ID: CVE-2017-2584
BugTraq ID: 95430
http://www.securityfocus.com/bid/95430
http://www.openwall.com/lists/oss-security/2017/01/13/7
http://www.securitytracker.com/id/1037603
Common Vulnerability Exposure (CVE) ID: CVE-2017-5549
BugTraq ID: 95715
http://www.securityfocus.com/bid/95715
http://www.openwall.com/lists/oss-security/2017/01/21/3
Common Vulnerability Exposure (CVE) ID: CVE-2017-6074
BugTraq ID: 96310
http://www.securityfocus.com/bid/96310
https://www.exploit-db.com/exploits/41457/
https://www.exploit-db.com/exploits/41458/
http://www.openwall.com/lists/oss-security/2017/02/22/3
RedHat Security Advisories: RHSA-2017:0293
http://rhn.redhat.com/errata/RHSA-2017-0293.html
RedHat Security Advisories: RHSA-2017:0294
http://rhn.redhat.com/errata/RHSA-2017-0294.html
RedHat Security Advisories: RHSA-2017:0295
http://rhn.redhat.com/errata/RHSA-2017-0295.html
RedHat Security Advisories: RHSA-2017:0316
http://rhn.redhat.com/errata/RHSA-2017-0316.html
RedHat Security Advisories: RHSA-2017:0323
http://rhn.redhat.com/errata/RHSA-2017-0323.html
RedHat Security Advisories: RHSA-2017:0324
http://rhn.redhat.com/errata/RHSA-2017-0324.html
RedHat Security Advisories: RHSA-2017:0345
http://rhn.redhat.com/errata/RHSA-2017-0345.html
RedHat Security Advisories: RHSA-2017:0346
http://rhn.redhat.com/errata/RHSA-2017-0346.html
RedHat Security Advisories: RHSA-2017:0347
http://rhn.redhat.com/errata/RHSA-2017-0347.html
RedHat Security Advisories: RHSA-2017:0365
http://rhn.redhat.com/errata/RHSA-2017-0365.html
RedHat Security Advisories: RHSA-2017:0366
http://rhn.redhat.com/errata/RHSA-2017-0366.html
RedHat Security Advisories: RHSA-2017:0403
http://rhn.redhat.com/errata/RHSA-2017-0403.html
RedHat Security Advisories: RHSA-2017:0501
http://rhn.redhat.com/errata/RHSA-2017-0501.html
RedHat Security Advisories: RHSA-2017:0932
https://access.redhat.com/errata/RHSA-2017:0932
RedHat Security Advisories: RHSA-2017:1209
https://access.redhat.com/errata/RHSA-2017:1209
http://www.securitytracker.com/id/1037876
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.