SB2016101301 - Ubuntu update for Linux kernel (OMAP4)
Published: October 13, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) “Use-after-free” error (CVE-ID: CVE-2016-6828)
The vulnerability allows local users to provoke a denial of service.
The vulnerability predicts TCP realization by a local user.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service.
2) Race condition (CVE-ID: CVE-2016-6136)
The vulnerability allows local users to interrupt system-call auditing.
The vulnerability exists due to parafunction of audit_log_single_execve_arg. By altering "double fetch" vulnerability, a local user can bypass set limitations and interrupt system-call auditing.
Successful exploitation of this vulnerability will allow an attacker to interrupt system-call auditing and perform a race condition.
3) Race condition (CVE-ID: CVE-2016-6480)
The vulnerability allows local users to provoke a denial of service.
The vulnerability exists due to parafunction of ioctl_send_fib. By altering "double fetch" vulnerability, a local user can provoke a denial of service.
Successful exploitation of this vulnerability will allow an attacker to cause a denial of service
Remediation
Install update from vendor's website.