SB2016072907 - Fedora 23 update for kernel



SB2016072907 - Fedora 23 update for kernel

Published: July 29, 2016 Updated: April 24, 2025

Security Bulletin ID SB2016072907
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2016-6136)

The vulnerability allows local users to interrupt system-call auditing.

The vulnerability exists due to parafunction of audit_log_single_execve_arg. By altering "double fetch" vulnerability, a local user can bypass set limitations and interrupt system-call auditing.

Successful exploitation of this vulnerability will allow an attacker to interrupt system-call auditing and perform a race condition.


2) Memory leak in Airspy USB device driver (CVE-ID: CVE-2016-5400)

The vulnerability allows a local user to consume excessive memory and cause denial of service on the target system.

The vulnerability exists due to a resource error in Airspy USB device driver. A local user can cause a memory leak and consume all available memory resources by creating a specially crafted USB device to emulate multiple SDR devices.

Successful exploitation of this vulnerability may result in denial of service.


Remediation

Install update from vendor's website.