vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-4470): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jun 27, 2016
Added
Jul 1, 2017
Modified
Apr 14, 2025

Description

Ben Hawkes discovered that the Linux netfilter implementation did not
correctly perform validation when handling IPT_SO_SET_REPLACE events. A
local unprivileged attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code with administrative
privileges. (CVE-2016-3134)

Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress
hugetlbfs support in X86 paravirtualized guests. An attacker in the guest
OS could cause a denial of service (guest system crash). (CVE-2016-3961)

It was discovered that the keyring implementation in the Linux kernel did
not ensure a data structure was initialized before referencing it after an
error condition occurred. A local attacker could use this to cause a denial
of service (system crash). (CVE-2016-4470)

Kangjie Lu discovered an information leak in the netlink implementation of
the Linux kernel. A local attacker could use this to obtain sensitive
information from kernel memory. (CVE-2016-5243)

Solution(s)

ubuntu-upgrade-linux-image-3-13-0-93-genericubuntu-upgrade-linux-image-3-13-0-93-generic-lpaeubuntu-upgrade-linux-image-3-13-0-93-lowlatencyubuntu-upgrade-linux-image-3-13-0-93-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-93-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-93-powerpc-smpubuntu-upgrade-linux-image-3-13-0-93-powerpc64-embubuntu-upgrade-linux-image-3-13-0-93-powerpc64-smpubuntu-upgrade-linux-image-3-19-0-66-genericubuntu-upgrade-linux-image-3-19-0-66-generic-lpaeubuntu-upgrade-linux-image-3-19-0-66-lowlatencyubuntu-upgrade-linux-image-3-19-0-66-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-66-powerpc-smpubuntu-upgrade-linux-image-3-19-0-66-powerpc64-embubuntu-upgrade-linux-image-3-19-0-66-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-107-genericubuntu-upgrade-linux-image-3-2-0-107-generic-paeubuntu-upgrade-linux-image-3-2-0-107-highbankubuntu-upgrade-linux-image-3-2-0-107-omapubuntu-upgrade-linux-image-3-2-0-107-powerpc-smpubuntu-upgrade-linux-image-3-2-0-107-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-107-virtualubuntu-upgrade-linux-image-3-2-0-1485-omap4ubuntu-upgrade-linux-image-4-4-0-1019-raspi2ubuntu-upgrade-linux-image-4-4-0-1022-snapdragonubuntu-upgrade-linux-image-4-4-0-34-genericubuntu-upgrade-linux-image-4-4-0-34-generic-lpaeubuntu-upgrade-linux-image-4-4-0-34-lowlatencyubuntu-upgrade-linux-image-4-4-0-34-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-34-powerpc-smpubuntu-upgrade-linux-image-4-4-0-34-powerpc64-embubuntu-upgrade-linux-image-4-4-0-34-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.