Ubuntu 16.04 LTS : linux vulnerabilities (USN-3099-1)

High Nessus Plugin ID 93956

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Vladimir Benes discovered an unbounded recursion in the VLAN and TEB Generic Receive Offload (GRO) processing implementations in the Linux kernel, A remote attacker could use this to cause a stack corruption, leading to a denial of service (system crash). (CVE-2016-7039)

Marco Grassi discovered a use-after-free condition could occur in the TCP retransmit queue handling code in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-6828)

Pengfei Wang discovered a race condition in the s390 SCLP console driver for the Linux kernel when handling ioctl()s. A local attacker could use this to obtain sensitive information from kernel memory.
(CVE-2016-6130)

Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller driver in the Linux kernel when handling ioctl()s. A local attacker could use this to cause a denial of service (system crash).
(CVE-2016-6480).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected linux-image-4.4-generic, linux-image-4.4-generic-lpae and / or linux-image-4.4-lowlatency packages.

See Also

https://usn.ubuntu.com/3099-1/

Plugin Details

Severity: High

ID: 93956

File Name: ubuntu_USN-3099-1.nasl

Version: 2.14

Type: local

Agent: unix

Published: 2016/10/11

Updated: 2019/09/18

Dependencies: 12634, 122878

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae, p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency, cpe:/o:canonical:ubuntu_linux:16.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/10/11

Vulnerability Publication Date: 2016/07/03

Reference Information

CVE: CVE-2016-6130, CVE-2016-6480, CVE-2016-6828, CVE-2016-7039

USN: 3099-1