vulnerability

Ubuntu: (Multiple Advisories) (CVE-2016-8645): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 27, 2016
Added
Dec 21, 2016
Modified
Mar 27, 2026

Description

The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.

Solutions

ubuntu-upgrade-linux-image-3-13-0-119-genericubuntu-upgrade-linux-image-3-13-0-119-generic-lpaeubuntu-upgrade-linux-image-3-13-0-119-lowlatencyubuntu-upgrade-linux-image-3-13-0-119-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-119-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-119-powerpc-smpubuntu-upgrade-linux-image-3-13-0-119-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-1038-raspi2ubuntu-upgrade-linux-image-4-4-0-1042-snapdragonubuntu-upgrade-linux-image-4-4-0-57-genericubuntu-upgrade-linux-image-4-4-0-57-generic-lpaeubuntu-upgrade-linux-image-4-4-0-57-lowlatencyubuntu-upgrade-linux-image-4-4-0-57-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-57-powerpc-smpubuntu-upgrade-linux-image-4-4-0-57-powerpc64-embubuntu-upgrade-linux-image-4-4-0-57-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1021-raspi2ubuntu-upgrade-linux-image-4-8-0-32-genericubuntu-upgrade-linux-image-4-8-0-32-generic-lpaeubuntu-upgrade-linux-image-4-8-0-32-lowlatencyubuntu-upgrade-linux-image-4-8-0-32-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-32-powerpc-smpubuntu-upgrade-linux-image-4-8-0-32-powerpc64-embubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon

References

    Title
    Rapid7 Labs

    2026 Global Threat Landscape Report

    The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.