CVE 2015-3288
mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
Related bugs and status
CVE-2015-3288 (Candidate) is related to these bugs:
Bug #1419125: Utopic update to 3.16.7-ckt5 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1419125 | Utopic update to 3.16.7-ckt5 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1419125 | Utopic update to 3.16.7-ckt5 stable release | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1434595: Utopic update to 3.16.7-ckt8 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1434595 | Utopic update to 3.16.7-ckt8 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1434595 | Utopic update to 3.16.7-ckt8 stable release | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1441317: Utopic update to 3.16.7-ckt9 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1441317 | Utopic update to 3.16.7-ckt9 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1441317 | Utopic update to 3.16.7-ckt9 stable release | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1465613: Utopic update to 3.16.7-ckt12 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1465613 | Utopic update to 3.16.7-ckt12 stable release | linux (Ubuntu) | Undecided | Fix Released | ||
1465613 | Utopic update to 3.16.7-ckt12 stable release | linux (Ubuntu Utopic) | Undecided | Fix Released |
Bug #1500484: Trusty update to 3.16.7-ckt17 stable release
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1500484 | Trusty update to 3.16.7-ckt17 stable release | linux (Ubuntu) | Undecided | Invalid | ||
1500484 | Trusty update to 3.16.7-ckt17 stable release | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1571020: CVE-2016-3961
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1571020 | CVE-2016-3961 | linux (Ubuntu) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu) | Medium | New | ||
1571020 | CVE-2016-3961 | linux (Ubuntu Xenial) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu Xenial) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux (Ubuntu Wily) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu Wily) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1571020 | CVE-2016-3961 | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux (Ubuntu Precise) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-ti-omap4 (Ubuntu Precise) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu Trusty) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu Precise) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu Trusty) | Medium | Fix Committed | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu Vivid) | Undecided | New | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu Wily) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-wily (Ubuntu Xenial) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu) | Medium | New | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu Precise) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu Trusty) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu Vivid) | Undecided | New | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu Wily) | Medium | New | ||
1571020 | CVE-2016-3961 | linux-goldfish (Ubuntu Xenial) | Medium | New | ||
1571020 | CVE-2016-3961 | linux-lts-saucy (Ubuntu) | Medium | Invalid | ||
1571020 | CVE-2016-3961 | linux-lts-saucy (Ubuntu Precise) | Medium | Invalid |
Bug #1580370: CVE-2015-3288
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1580370 | CVE-2015-3288 | linux (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu) | Medium | New | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Yakkety) | Medium | New | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Trusty) | Medium | New | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Trusty) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Trusty) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux (Ubuntu Precise) | Medium | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-raspi2 (Ubuntu Precise) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-ti-omap4 (Ubuntu Precise) | Medium | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Precise) | Medium | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Trusty) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-trusty (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Precise) | Medium | Fix Released | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Trusty) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-armadaxp (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Precise) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Trusty) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Vivid) | Undecided | New | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-xenial (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Precise) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Trusty) | Medium | Fix Committed | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Vivid) | Undecided | Won't Fix | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Wily) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Xenial) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-lts-vivid (Ubuntu Yakkety) | Medium | Invalid | ||
1580370 | CVE-2015-3288 | linux-goldfish (Ubuntu) | Medium | New |
Bug #1593075: linux: Implement secure boot state variables
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1593075 | linux: Implement secure boot state variables | linux (Ubuntu) | Medium | Fix Released | ||
1593075 | linux: Implement secure boot state variables | linux (Ubuntu Xenial) | Medium | Fix Released | ||
1593075 | linux: Implement secure boot state variables | linux (Ubuntu Trusty) | Medium | Fix Released |
Bug #1628976: Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng.
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1628976 | Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. | linux (Ubuntu) | High | Fix Released | ||
1628976 | Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. | linux (Ubuntu Yakkety) | High | Fix Released | ||
1628976 | Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. | linux (Ubuntu Xenial) | High | Fix Released | ||
1628976 | Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. | linux (Ubuntu Trusty) | High | Fix Released |
Bug #1629977: sha1-powerpc returning wrong results
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1629977 | sha1-powerpc returning wrong results | linux (Ubuntu) | Undecided | Fix Released | ||
1629977 | sha1-powerpc returning wrong results | linux (Ubuntu Xenial) | Undecided | Fix Released | ||
1629977 | sha1-powerpc returning wrong results | linux (Ubuntu Yakkety) | Undecided | Fix Released | ||
1629977 | sha1-powerpc returning wrong results | linux (Ubuntu Trusty) | Undecided | Fix Released |
Bug #1632462: [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1632462 | [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user | linux (Ubuntu) | High | Fix Released | ||
1632462 | [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user | linux (Ubuntu Yakkety) | High | Fix Released | ||
1632462 | [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user | linux (Ubuntu Trusty) | High | Fix Released | ||
1632462 | [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1634496: proc_keys_show crash when reading /proc/keys
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu) | High | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | Linux | Medium | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu Yakkety) | High | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu Trusty) | High | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu Vivid) | High | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu Precise) | High | Fix Released | ||
1634496 | proc_keys_show crash when reading /proc/keys | linux (Ubuntu Xenial) | High | Fix Released |
Bug #1635430: linux: 3.13.0-101.148 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1635430 | linux: 3.13.0-101.148 -proposed tracker | linux (Ubuntu) | Undecided | Invalid | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | linux (Ubuntu Trusty) | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Invalid | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow upload-to-ppa | Medium | Invalid | ||
1635430 | linux: 3.13.0-101.148 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
Bug #1635437: linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | linux-lts-trusty (Ubuntu) | Undecided | Invalid | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | linux-lts-trusty (Ubuntu Precise) | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1635437 | linux-lts-trusty: 3.13.0-101.148~precise1 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.