vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-4794): Linux kernel (Vivid HWE) vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
May 23, 2016
Added
Jul 1, 2017
Modified
Apr 14, 2025

Description

A missing permission check when settings ACLs was discovered in nfsd. A
local user could exploit this flaw to gain access to any file by setting an
ACL. (CVE-2016-1237)

It was discovered that the keyring implementation in the Linux kernel did
not ensure a data structure was initialized before referencing it after an
error condition occurred. A local attacker could use this to cause a denial
of service (system crash). (CVE-2016-4470)

Sasha Levin discovered that a use-after-free existed in the percpu
allocator in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code with
administrative privileges. (CVE-2016-4794)

Kangjie Lu discovered an information leak in the netlink implementation of
the Linux kernel. A local attacker could use this to obtain sensitive
information from kernel memory. (CVE-2016-5243)

Solution(s)

ubuntu-upgrade-linux-image-3-19-0-66-genericubuntu-upgrade-linux-image-3-19-0-66-generic-lpaeubuntu-upgrade-linux-image-3-19-0-66-lowlatencyubuntu-upgrade-linux-image-3-19-0-66-powerpc-e500mcubuntu-upgrade-linux-image-3-19-0-66-powerpc-smpubuntu-upgrade-linux-image-3-19-0-66-powerpc64-embubuntu-upgrade-linux-image-3-19-0-66-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-1019-raspi2ubuntu-upgrade-linux-image-4-4-0-1022-snapdragonubuntu-upgrade-linux-image-4-4-0-34-genericubuntu-upgrade-linux-image-4-4-0-34-generic-lpaeubuntu-upgrade-linux-image-4-4-0-34-lowlatencyubuntu-upgrade-linux-image-4-4-0-34-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-34-powerpc-smpubuntu-upgrade-linux-image-4-4-0-34-powerpc64-embubuntu-upgrade-linux-image-4-4-0-34-powerpc64-smp
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.