SB2016101402 - Denial of service in Linux Kernel



SB2016101402 - Denial of service in Linux Kernel

Published: October 14, 2016 Updated: December 8, 2025

Security Bulletin ID SB2016101402
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Uncontrolled recursion (CVE-ID: CVE-2016-8666)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrollable recursion when parsing IPv4 and GRE headers. A remote attacker can force the kernel to use GRO path for packets with tunnel stacking and perform a denial of service attack.


2) Denial of service (CVE-ID: CVE-2016-8660)

The vulnerability allows a local nonprivileged user to cause DoS conditions on the target system.
The weakness exists due to insufficient access control. By using the vfs syscall group in the trinity program, related to a "page lock order bug in the XFS seek hole/data implementation", attackers can trigger fdatasync failure and system hang.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.

Remediation

Install update from vendor's website.