*** This bug is a security vulnerability ***
Public security bug reported:
The LIST_POISON feature in include/linux/poison.h in the Linux kernel
before 4.3, as used in Android 6.0.1 before 2016-03-01, does not
properly consider the relationship to the mmap_min_addr value, which
makes it easier for attackers to bypass a poison-pointer protection
mechanism by triggering the use of an uninitialized list entry, aka
Android internal bug 26186802, a different vulnerability than
CVE-2015-3636.
Break-Fix: - 8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-flo (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-goldfish (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-lts-quantal (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-saucy (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-trusty (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-wily (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux-mako (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-manta (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-raspi2 (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-ti-omap4 (Ubuntu)
Importance: Medium
Status: Invalid
** Affects: linux (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-flo (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-goldfish (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-saucy (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-trusty (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux-lts-utopic (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-mako (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-manta (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Precise)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Precise)
Importance: Medium
Status: New
** Affects: linux (Ubuntu Trusty)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-flo (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-goldfish (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-lts-quantal (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-lts-saucy (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-lts-trusty (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Trusty)
Importance: Medium
Status: New
** Affects: linux-lts-vivid (Ubuntu Trusty)
Importance: Medium
Status: New
** Affects: linux-lts-wily (Ubuntu Trusty)
Importance: Medium
Status: New
** Affects: linux-lts-xenial (Ubuntu Trusty)
Importance: Medium
Status: New
** Affects: linux-mako (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-manta (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-raspi2 (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux-ti-omap4 (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-armadaxp (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-flo (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-goldfish (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-quantal (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-raring (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-saucy (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-trusty (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-utopic (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-vivid (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-wily (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-lts-xenial (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-mako (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-manta (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-raspi2 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux-ti-omap4 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-flo (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-goldfish (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-lts-quantal (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-saucy (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-trusty (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux-mako (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-manta (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-raspi2 (Ubuntu Wily)
Importance: Medium
Status: New
** Affects: linux-ti-omap4 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Affects: linux (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-flo (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-goldfish (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-lts-quantal (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-raring (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-saucy (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-trusty (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-utopic (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-vivid (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-wily (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-lts-xenial (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Affects: linux-mako (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-manta (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-raspi2 (Ubuntu Xenial)
Importance: Medium
Status: New
** Affects: linux-ti-omap4 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Tags: kernel-cve-tracking-bug
** Tags added: kernel-cve-tracking-bug
** Information type changed from Public to Public Security
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0821
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1561389
Title:
CVE-2016-0821
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1561389/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs