Your submission was sent successfully! Close

CVE-2015-2666

Published: 25 March 2015

Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.

From the Ubuntu security team

A stack overflow was discovered in the the microcode loader for the intel x86 platform. A local attacker could exploit this flaw to cause a denial of service (kernel crash) or to potentially execute code with kernel privileges.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise Not vulnerable

trusty
Released (3.13.0-51.84)
upstream
Released (4.0~rc1)
utopic
Released (3.16.0-36.48)
vivid Not vulnerable
(3.19.0-13.13)
wily Not vulnerable
(3.19.0-15.15)
linux-armadaxp
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-ec2
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise Does not exist

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-flo
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

linux-fsl-imx51
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life, does not affect buildd)
precise Does not exist

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-goldfish
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

linux-grouper
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Ignored
(reached end-of-life)
vivid Does not exist

wily Does not exist

linux-linaro-omap
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored
(abandoned)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-linaro-shared
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored
(abandoned)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-linaro-vexpress
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored
(abandoned)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-quantal
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-raring
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored
(was needs-triage now end-of-life)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-saucy
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored
(was pending [3.11.0-34.55~precise1] OEM release)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-trusty
Launchpad, Ubuntu, Debian
lucid Does not exist

precise
Released (3.13.0-51.84~precise1)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-utopic
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was released [3.16.0-36.48~14.04.1])
upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-lts-vivid
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was not-affected [3.19.0-18.18~14.04.1])
upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-maguro
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-mako
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

linux-manta
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was ignored)
upstream
Released (4.0~rc1)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

linux-mvl-dove
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise Does not exist

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-qcm-msm
Launchpad, Ubuntu, Debian
lucid Ignored
(abandoned)
precise Ignored
(abandoned)
trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

linux-raspi2
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream
Released (4.0~rc1)
vivid Does not exist

wily Not vulnerable
(4.2.0-1008.12)
linux-ti-omap4
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable

trusty Does not exist

upstream
Released (4.0~rc1)
utopic Does not exist

vivid Does not exist

wily Does not exist

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
sbeattie
introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec400ddeff200b068ddc6c70f7321f49ecf32ed5 (v3.9-rc1)

References

Bugs