First published: Tue Sep 29 2015(Updated: )
Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel. (CVE-2015-5697) Marc-André Lureau discovered that the vhost driver did not properly release the userspace provided log file descriptor. A privileged attacker could use this to cause a denial of service (resource exhaustion). (CVE-2015-6252)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc64-smp | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-generic | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc64-emb | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc-smp | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-generic-lpae | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-lowlatency | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 | ||
All of | ||
ubuntu/linux-image-3.19.0-30-powerpc-e500mc | <3.19.0-30.33 | 3.19.0-30.33 |
=15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-2752-1 is moderate.
A local privileged attacker could exploit USN-2752-1 to obtain sensitive information from the kernel.
Ubuntu version 15.04 is affected by USN-2752-1.
To fix USN-2752-1, update your system to linux-image-3.19.0-30.33 version or higher.
You can find more information about USN-2752-1 on the Ubuntu security website.