SB2016071239 - Fedora 23 update for kernel



SB2016071239 - Fedora 23 update for kernel

Published: July 12, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016071239
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2016-6130)

The vulnerability allows a local authenticated user to gain access to sensitive information.

Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.


2) Out-of-bounds read (CVE-ID: CVE-2016-6156)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ec_device_ioctl_xcmd() function in drivers/platform/chrome/cros_ec_dev.c. A local non-authenticated attacker can perform a denial of service (DoS) attack.


3) Man-in-the-middle attack (CVE-ID: CVE-2016-5696)

The vulnerability allows a remote attacker to write arbitrary files and cause DoS condition on the target system.

The weakness exists due to an error in net/ipv4/tcp_input.c while determining the rate of challenge ACK segments. A remote attacker can perform man-in-the-middle attack and hijack TCP sessions via a blind in-window attack.


Remediation

Install update from vendor's website.