SB2016101126 - Ubuntu update for Linux kernel (Trusty HWE)



SB2016101126 - Ubuntu update for Linux kernel (Trusty HWE)

Published: October 11, 2016 Updated: May 27, 2020

Security Bulletin ID SB2016101126
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) “Use-after-free” error (CVE-ID: CVE-2016-6828)

The vulnerability allows local users to provoke a denial of service.

The vulnerability predicts TCP realization by a local user.

Successful exploitation of this vulnerability will allow an attacker to cause a denial of service.


2) Resource exhaustion (CVE-ID: CVE-2016-7039)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the IP stack due to stack consumption. A remote attacker can trigger use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, and cause the service to crash.

3) Race condition (CVE-ID: CVE-2016-6136)

The vulnerability allows local users to interrupt system-call auditing.

The vulnerability exists due to parafunction of audit_log_single_execve_arg. By altering "double fetch" vulnerability, a local user can bypass set limitations and interrupt system-call auditing.

Successful exploitation of this vulnerability will allow an attacker to interrupt system-call auditing and perform a race condition.


4) Race condition (CVE-ID: CVE-2016-6480)

The vulnerability allows local users to provoke a denial of service.

The vulnerability exists due to parafunction of ioctl_send_fib. By altering "double fetch" vulnerability, a local user can provoke a denial of service.

Successful exploitation of this vulnerability will allow an attacker to cause a denial of service


Remediation

Install update from vendor's website.