vulnerability
Ubuntu: (Multiple Advisories) (CVE-2016-4482): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | May 23, 2016 | Jun 27, 2016 | Apr 14, 2025 |
Description
Jesse Hertz and Tim Newsham discovered that the Linux netfilter
implementation did not correctly perform validation when handling 32 bit
compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local
unprivileged attacker could use this to cause a denial of service (system
crash) or execute arbitrary code with administrative privileges.
(CVE-2016-4997)
Kangjie Lu discovered an information leak in the core USB implementation in
the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4482)
Kangjie Lu discovered an information leak in the timer handling
implementation in the Advanced Linux Sound Architecture (ALSA) subsystem of
the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4569, CVE-2016-4578)
Kangjie Lu discovered an information leak in the X.25 Call Request handling
in the Linux kernel. A local attacker could use this to obtain potentially
sensitive information from kernel memory. (CVE-2016-4580)
It was discovered that an information leak exists in the Rock Ridge
implementation in the Linux kernel. A local attacker who is able to mount a
malicious iso9660 file system image could exploit this flaw to obtain
potentially sensitive information from kernel memory. (CVE-2016-4913)
Baozeng Ding discovered that the Transparent Inter-process Communication
(TIPC) implementation in the Linux kernel did not verify socket existence
before use in some situations. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-4951)
Jesse Hertz and Tim Newsham discovered that the Linux netfilter
implementation did not correctly perform validation when handling
IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to
cause a denial of service (system crash) or obtain potentially sensitive
information from kernel memory. (CVE-2016-4998)
Solution(s)
References
- CVE-2016-4482
- https://attackerkb.com/topics/CVE-2016-4482
- DEBIAN-DLA-516-1
- DEBIAN-DSA-3607
- NVD-CVE-2016-4482
- UBUNTU-USN-2965-1
- UBUNTU-USN-2965-2
- UBUNTU-USN-2965-3
- UBUNTU-USN-2965-4
- UBUNTU-USN-2989-1
- UBUNTU-USN-2998-1
- UBUNTU-USN-3000-1
- UBUNTU-USN-3001-1
- UBUNTU-USN-3002-1
- UBUNTU-USN-3003-1
- UBUNTU-USN-3004-1
- UBUNTU-USN-3005-1
- UBUNTU-USN-3006-1
- UBUNTU-USN-3007-1
- UBUNTU-USN-3016-1
- UBUNTU-USN-3016-2
- UBUNTU-USN-3016-3
- UBUNTU-USN-3016-4
- UBUNTU-USN-3017-1
- UBUNTU-USN-3017-2
- UBUNTU-USN-3017-3
- UBUNTU-USN-3018-1
- UBUNTU-USN-3018-2
- UBUNTU-USN-3019-1
- UBUNTU-USN-3020-1
- UBUNTU-USN-3021-1
- UBUNTU-USN-3021-2

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.