SB2016101126 - Ubuntu update for Linux kernel (Trusty HWE)
Published: October 11, 2016 Updated: May 27, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) “Use-after-free” error (CVE-ID: CVE-2016-6828)
The vulnerability allows local users to provoke a denial of service.
The vulnerability predicts TCP realization by a local user.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service.
2) Resource exhaustion (CVE-ID: CVE-2016-7039)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the IP stack due to stack consumption. A remote attacker can trigger use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, and cause the service to crash.
3) Race condition (CVE-ID: CVE-2016-6136)
The vulnerability allows local users to interrupt system-call auditing.
The vulnerability exists due to parafunction of audit_log_single_execve_arg. By altering "double fetch" vulnerability, a local user can bypass set limitations and interrupt system-call auditing.
Successful exploitation of this vulnerability will allow an attacker to interrupt system-call auditing and perform a race condition.
4) Race condition (CVE-ID: CVE-2016-6480)
The vulnerability allows local users to provoke a denial of service.
The vulnerability exists due to parafunction of ioctl_send_fib. By altering "double fetch" vulnerability, a local user can provoke a denial of service.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service
Remediation
Install update from vendor's website.