USN-3008-1: Linux kernel (Qualcomm Snapdragon) vulnerability
10 June 2016
The system could be made to crash under certain conditions.
Releases
Packages
- linux-snapdragon - Linux kernel for Snapdragon Processors
Details
Jann Horn discovered that eCryptfs improperly attempted to use the mmap()
handler of a lower filesystem that did not implement one, causing a
recursive page fault to occur. A local unprivileged attacker could use to
cause a denial of service (system crash) or possibly execute arbitrary code
with administrative privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
Related notices
- USN-3003-1: linux-image-4.2.0-38-powerpc64-smp, linux, linux-image-4.2.0-38-generic, linux-image-4.2.0-38-lowlatency, linux-image-4.2.0-38-powerpc-e500mc, linux-image-4.2.0-38-generic-lpae, linux-image-4.2.0-38-powerpc-smp, linux-image-4.2.0-38-powerpc64-emb
- USN-2996-1: linux-image-3.2.0-104-virtual, linux-image-3.2.0-104-highbank, linux, linux-image-3.2.0-104-powerpc-smp, linux-image-3.2.0-104-powerpc64-smp, linux-image-3.2.0-104-generic, linux-image-3.2.0-104-generic-pae, linux-image-3.2.0-104-omap
- USN-3000-1: linux-image-3.16.0-73-powerpc64-smp, linux-image-3.16.0-73-powerpc-smp, linux-lts-utopic, linux-image-3.16.0-73-generic, linux-image-3.16.0-73-powerpc-e500mc, linux-image-extra-3.16.0-73-generic, linux-image-3.16.0-73-lowlatency, linux-image-3.16.0-73-generic-lpae, linux-image-3.16.0-73-powerpc64-emb
- USN-3001-1: linux-image-3.19.0-61-powerpc-e500mc, linux-image-3.19.0-61-lowlatency, linux-image-3.19.0-61-powerpc64-smp, linux-image-extra-3.19.0-61-generic, linux-lts-vivid, linux-image-3.19.0-61-generic-lpae, linux-image-3.19.0-61-generic, linux-image-3.19.0-61-powerpc64-emb, linux-image-3.19.0-61-powerpc-smp
- USN-3005-1: linux-image-4.4.0-24-generic, linux-image-4.4.0-24-lowlatency, linux-lts-xenial, linux-image-4.4.0-24-powerpc64-emb, linux-image-4.4.0-24-generic-lpae, linux-image-4.4.0-24-powerpc64-smp, linux-image-extra-4.4.0-24-generic, linux-image-4.4.0-24-powerpc-e500mc, linux-image-4.4.0-24-powerpc-smp
- USN-2997-1: linux-ti-omap4, linux-image-3.2.0-1482-omap4
- USN-3007-1: linux-raspi2, linux-image-4.4.0-1012-raspi2
- USN-3006-1: linux-image-4.4.0-24-generic, linux-image-4.4.0-24-lowlatency, linux, linux-image-4.4.0-24-powerpc64-emb, linux-image-4.4.0-24-generic-lpae, linux-image-4.4.0-24-powerpc64-smp, linux-image-extra-4.4.0-24-generic, linux-image-4.4.0-24-powerpc-e500mc, linux-image-4.4.0-24-powerpc-smp
- USN-2999-1: linux-image-3.13.0-88-powerpc64-smp, linux-image-3.13.0-88-generic-lpae, linux-image-3.13.0-88-powerpc64-emb, linux-image-3.13.0-88-lowlatency, linux, linux-image-3.13.0-88-powerpc-smp, linux-image-3.13.0-88-generic, linux-image-3.13.0-88-powerpc-e500, linux-image-extra-3.13.0-88-generic, linux-image-3.13.0-88-powerpc-e500mc
- USN-3002-1: linux-image-4.2.0-38-powerpc64-smp, linux-image-4.2.0-38-generic, linux-lts-wily, linux-image-4.2.0-38-lowlatency, linux-image-4.2.0-38-generic-lpae, linux-image-4.2.0-38-powerpc-e500mc, linux-image-extra-4.2.0-38-generic, linux-image-4.2.0-38-powerpc-smp, linux-image-4.2.0-38-powerpc64-emb
- USN-2998-1: linux-lts-trusty, linux-image-3.13.0-88-generic-lpae, linux-image-3.13.0-88-generic
- USN-3004-1: linux-raspi2, linux-image-4.2.0-1031-raspi2