SB2016101128 - Ubuntu update for Linux kernel (Qualcomm Snapdragon)
Published: October 11, 2016 Updated: May 27, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2016-7039)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the IP stack due to stack consumption. A remote attacker can trigger use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, and cause the service to crash.
2) “Use-after-free” error (CVE-ID: CVE-2016-6828)
The vulnerability allows local users to provoke a denial of service.
The vulnerability predicts TCP realization by a local user.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service.
3) Race condition (CVE-ID: CVE-2016-6480)
The vulnerability allows local users to provoke a denial of service.
The vulnerability exists due to parafunction of ioctl_send_fib. By altering "double fetch" vulnerability, a local user can provoke a denial of service.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service
Remediation
Install update from vendor's website.