vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-7039): Linux kernel vulnerabilities

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Oct 11, 2016
Added
Jul 1, 2017
Modified
Apr 14, 2025

Description

Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB
Generic Receive Offload (GRO) processing implementations in the Linux
kernel, A remote attacker could use this to cause a stack corruption,
leading to a denial of service (system crash). (CVE-2016-7039)

Marco Grassi discovered a use-after-free condition could occur in the TCP
retransmit queue handling code in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2016-6828)

Pengfei Wang discovered a race condition in the audit subsystem in the
Linux kernel. A local attacker could use this to corrupt audit logs or
disrupt system-call auditing. (CVE-2016-6136)

Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller
driver in the Linux kernel when handling ioctl()s. A local attacker could
use this to cause a denial of service (system crash). (CVE-2016-6480)

Solutions

ubuntu-upgrade-linux-image-3-13-0-98-genericubuntu-upgrade-linux-image-3-13-0-98-generic-lpaeubuntu-upgrade-linux-image-3-13-0-98-lowlatencyubuntu-upgrade-linux-image-3-13-0-98-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-98-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-98-powerpc-smpubuntu-upgrade-linux-image-3-13-0-98-powerpc64-embubuntu-upgrade-linux-image-3-13-0-98-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-1027-raspi2ubuntu-upgrade-linux-image-4-4-0-1030-snapdragonubuntu-upgrade-linux-image-4-4-0-42-genericubuntu-upgrade-linux-image-4-4-0-42-generic-lpaeubuntu-upgrade-linux-image-4-4-0-42-lowlatencyubuntu-upgrade-linux-image-4-4-0-42-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-42-powerpc-smpubuntu-upgrade-linux-image-4-4-0-42-powerpc64-embubuntu-upgrade-linux-image-4-4-0-42-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.