CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
82.9%
Andrey Konovalov discovered that the CDC Network Control Model USB driver
in the Linux kernel did not cancel work events queued if a later error
occurred, resulting in a use-after-free. An attacker with physical access
could use this to cause a denial of service (system crash). (CVE-2016-3951)
Kangjie Lu discovered an information leak in the core USB implementation in
the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4482)
Jann Horn discovered that the InfiniBand interfaces within the Linux kernel
could be coerced into overwriting kernel memory. A local unprivileged
attacker could use this to possibly gain administrative privileges on
systems where InifiniBand related kernel modules are loaded.
(CVE-2016-4565)
Kangjie Lu discovered an information leak in the timer handling
implementation in the Advanced Linux Sound Architecture (ALSA) subsystem of
the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4569, CVE-2016-4578)
Kangjie Lu discovered an information leak in the X.25 Call Request handling
in the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4580)
Baozeng Ding discovered a use-after-free issue in the generic PPP layer in
the Linux kernel. A local attacker could use this to cause a denial of
service (system crash). (CVE-2016-4805)
It was discovered that an information leak exists in the Rock Ridge
implementation in the Linux kernel. A local attacker who is able to mount a
malicious iso9660 file system image could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2016-4913)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | linux-image-3.2.0-105-powerpc64-smp | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | block-modules-3.2.0-105-generic-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | block-modules-3.2.0-105-virtual-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | crypto-modules-3.2.0-105-generic-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | crypto-modules-3.2.0-105-virtual-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | fat-modules-3.2.0-105-generic-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | fat-modules-3.2.0-105-virtual-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | fb-modules-3.2.0-105-generic-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | fb-modules-3.2.0-105-virtual-di | < 3.2.0-105.146 | UNKNOWN |
Ubuntu | 12.04 | noarch | firewire-core-modules-3.2.0-105-generic-di | < 3.2.0-105.146 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
82.9%